We present the first experimental study of online packet buffering algorithms for network switches. We consider a basic scenario in which m queues of size B have to be maintained so as to maximize the packet throughpu...
详细信息
We present the first experimental study of online packet buffering algorithms for network switches. We consider a basic scenario in which m queues of size B have to be maintained so as to maximize the packet throughput. For this model various online algorithms with competitive factors ranging between 2 and 1.5 were developed in the literature. We first develop a new 2-competitive online algorithm, called HSFOD, which is especially designed to perform well under real-world conditions. In our experimental study we have implemented all the proposed algorithms, including HSFOD, and tested them on packet traces from benchmark libraries. We have evaluated the experimentally observed competitiveness, the running times, memory requirements and actual packet throughput of the strategies. The tests were executed for varying values of m and B as well as varying switch speeds. It shows that greedy-like strategies and HSFOD perform best in practice.
Finding and recommending suitable services for mobile devices are increasingly important due to the popularity of mobile Internet. While recent research has attempted to use role-based approaches to recommend services...
详细信息
Finding and recommending suitable services for mobile devices are increasingly important due to the popularity of mobile Internet. While recent research has attempted to use role-based approaches to recommend services, role discovery is still an ongoing research topic. Using role-based approaches, popular mobile services can be recommended to other members in the same role group in a context- dependent manner. This paper proposes several role mining algorithms, to suit different application requirements, that automatically group users according to their interests and habits dynamically. Most importantly, we propose an online role mining algorithm that can discover role patterns efficiently and incrementally. Finally, we present a complete, question-based framework that can efficiently perform role mining for context-aware service recommendation in a mobile environment-where a device may not be always connected to the server and/or scalability of the role mining algorithm running on the server is critical.
This paper studies a variation of online bin packing where there is a capacitated buffer to temporarily store items during packing, and item size is bounded within for some . The problem is motivated by surgery schedu...
详细信息
This paper studies a variation of online bin packing where there is a capacitated buffer to temporarily store items during packing, and item size is bounded within for some . The problem is motivated by surgery scheduling such that we regard the planned uniform available time interval in each day as a unit size bin and surgeries as items to be packed. Our focus is on the asymptotic performance of NF (Next Fit) and NF-based online algorithms. We show that the classical NF algorithm without use of the buffer has an asymptotic competitive ratio of . An NF-based algorithm which makes use of the buffer is further proposed, and proved to be asymptotic 13/9-competitive for any given buffer size not less than 1. We also present a lower bound of 4/3.
Internet of Things (IoT) applications can benefit greatly from cloud-hosted message broker services that utilize publish-subscribe communications. The operators of IoT cloud-hosted services are often interested in del...
详细信息
Internet of Things (IoT) applications can benefit greatly from cloud-hosted message broker services that utilize publish-subscribe communications. The operators of IoT cloud-hosted services are often interested in delivering services that maximize their revenue given quality of service guarantees. In this paper, we formulate the problem of maximizing the profit of the service provider given the prior knowledge of the request sequence as an integer linear program and prove that it is strongly NP-complete, and thus there is no fully polynomial-time approximation scheme for the problem, unless P = NP. Due to the above-mentioned problem and the difficulty of obtaining the request sequence in advance in real-world scenarios, we propose an auction-based online algorithm that does not require the prior knowledge of the request sequence. We prove that the competitive ratio of the online algorithm is O(log(N)), where N is the number of cloud zones that host the publish-subscribe services. Moreover, we show that no online algorithm can achieve a competitive ratio better than Omega(log(N)). Therefore, our online algorithm achieves the optimal competitive ratio in the asymptotic sense. Our simulations, based on real data traces, show that our algorithm achieves up to 83% more profit compared to a heuristic approach, while consuming 60% less resources.
Logs are a reliable source of information for development and maintenance purposes. They record information at runtime regarding the state of a system and are commonly used to analyze its behavior. Parsing operations ...
详细信息
Logs are a reliable source of information for development and maintenance purposes. They record information at runtime regarding the state of a system and are commonly used to analyze its behavior. Parsing operations on logs structure the information embedded within the log message and are a crucial step for many log mining applications. In such use cases, parsing effectiveness can impact performance. For systems that require real-time performance, parsing efficiency is also an important factor. In this paper, we present USTEP, an online log parser that uses an evolving tree structure to encode and discover new parsing rules on the fly. Our evaluation of 14 datasets from different logging environments highlights the superiority of our method in terms of robustness and effectiveness compared to the state of the art. Our analysis of space and time complexity shows that USTEP is the only considered method capable of processing logs in constant time regardless of their length. We also propose here USTEP-UP, a way of running multiple USTEP instances in parallel.
We present a new Gaussian process (GP) inference algorithm, called online sparse matrix Gaussian processes (OSMGP), and demonstrate its merits by applying it to the problems of head pose estimation and visual tracking...
详细信息
We present a new Gaussian process (GP) inference algorithm, called online sparse matrix Gaussian processes (OSMGP), and demonstrate its merits by applying it to the problems of head pose estimation and visual tracking. The OSMGP is based upon the observation that for kernels with local support, the Gram matrix is typically sparse. Maintaining and updating the sparse Cholesky factor of the Gram matrix can be done efficiently using Givens rotations. This leads to an exact, online algorithm whose update time scales linearly with the size of the Gram matrix. Further, we provide a method for constant time operation of the OSMGP using matrix downdates. The downdates maintain the Cholesky factor at a constant size by removing certain rows and columns corresponding to discarded training examples. We demonstrate that, using these matrix downdates, online hyperparameter estimation can be included at cost linear in the number of total training examples. We describe a robust appearance-based head pose estimation system based upon the OSMGP. Numerous experiments and comparisons with existing methods using a large dataset system demonstrate the efficiency and accuracy of our system. Further, to showcase the applicability of OSMGP to a wide variety of problems, we also describe a regression-based visual tracking method. Experiments show that our OSMGP algorithm generalizes well using online learning.
For most data stream applications, the volume of data is too huge to be stored in permanent devices or to be thoroughly scanned more than once. It is hence recognized that approximate answers are usually sufficient, w...
详细信息
For most data stream applications, the volume of data is too huge to be stored in permanent devices or to be thoroughly scanned more than once. It is hence recognized that approximate answers are usually sufficient, where a good approximation obtained in a timely manner is often better than the exact answer that is delayed beyond the window of opportunity. Unfortunately, this is not the case for mining frequent patterns over data streams where algorithms capable of online processing data streams do not conform strictly to a precise error guarantee. Since the quality of approximate answers is as important as their timely delivery, it is necessary to design algorithms to meet both criteria at the same time. In this paper, we propose an algorithm that allows online processing of streaming data and yet guaranteeing the support error of frequent patterns strictly within a user-specified threshold. Our theoretical and experimental studies show that our algorithm is an effective and reliable method for finding frequent sets in data stream environments when both constraints need to be satisfied.
We propose a new variant Of the standard online knapsack problem where the only information missing to the provided instances is the capacity B of the knapsack. We refer to this problem as the online Knapsack of Unkno...
详细信息
We propose a new variant Of the standard online knapsack problem where the only information missing to the provided instances is the capacity B of the knapsack. We refer to this problem as the online Knapsack of Unknown Capacity (KUC) problem. Any algorithm solving the KUC problem must provide a strategy for filling online the knapsack until its capacity is revealed. When the knapsack capacity is revealed, no other item can be inserted and also the last inserted item is discarded if it does not completely fit in the knapsack. Apart for the interest in a new version of the fundamental knapsack problem, the motivations that lead to define this new variant come from energy consumption constraints in smartphones communications. We provide lower and upper bounds to the problem for various cases. In general, we design an optimal algorithm admitting a :1/2-competitive ratio. When all items admit uniform ratio of profit over size, our algorithm provides a 49/86 = .569 ... competitive ratio that leaves some gap with the provided bound of 1/phi =.618 ..., the inverse of the golden number. We then conduct experimental analysis for the competitive ratio guaranteed algorithms compared to the optimum and to various heuristics. (C) 2017 Elsevier B.V. All rights reserved.
The paper considers an online scheduling problem with the effects of both learning and deterioration to minimize the total completion time. More specifically, we assume that the actual processing length of job J(j) is...
详细信息
The paper considers an online scheduling problem with the effects of both learning and deterioration to minimize the total completion time. More specifically, we assume that the actual processing length of job J(j) is p(jr) = p(j)r(b) thorn at, where p(j) is the initial processing time of J(j), t is the starting time of J(j), r is the seating arrangement position of J(j), b is the learning factor and a is the deterioration factor, respectively. For this problem, we show that the performance ratio of any deterministic online algorithm is not <2 and provide a best possible online algorithm DSBPT with a competitive ratio of 2. Furthermore, we also present a concise computational simulation study to verify the effectiveness and efficiency of the proposed algorithm DSBPT, as well as the management implications provided for decisionmakers to production optimization.
We consider an online scheduling problem in a parallel batch processing system with jobs in a batch being allowed to restart. online means that jobs arrive over time, and all jobs' characteristics are unknown befo...
详细信息
We consider an online scheduling problem in a parallel batch processing system with jobs in a batch being allowed to restart. online means that jobs arrive over time, and all jobs' characteristics are unknown before their arrival times. A parallel batch processing machine can handle up to several jobs simultaneously. All jobs in a batch start and complete at the same time. The processing time of a batch is equal to the longest processing time of jobs in the batch. We are allowed to restart a batch, that is, a running batch may be interrupted, losing all the work done on it. Jobs in the interrupted batch are released and become independently unscheduled jobs. We deal with an unbounded model where each batch's capacity is sufficiently large. We provide a linear online algorithm with competitive ratio 3/2 for the problem. We also show that the considered problem has no online algorithm using restarts with competitive ratio less than (5 - root 5)/2. (C) 2007 Elsevier B.V. All rights reserved.
暂无评论