With the advent of rapidly evolving nanoelectronic systems, compact implementation of versatile and dense network-on-chips (NoCs) on a die has emerged as technology-of-choice for multicore computing. However, because ...
详细信息
Multi-Access Edge computing (MEC) is a promising new paradigm enabling low-latency access to services deployed on edge servers. This helps to avert network latencies often encountered in accessing cloud services. The ...
详细信息
ISBN:
(纸本)9781665400633
Multi-Access Edge computing (MEC) is a promising new paradigm enabling low-latency access to services deployed on edge servers. This helps to avert network latencies often encountered in accessing cloud services. The cornerstone of a MEC environment is a resource allocation policy used to partition and allocate computational resources such as bandwidth, memory available on the edge server to user service invocations availing such services. In this work, we propose a generic data-driven framework to model and analyze such MEC resource allocation policies. We model a MEC system as a Turn-Based Stochastic Multi-Player Game and use Probabilistic Model Checking to derive quantitative guarantees on resource allocation policies against requirements expressed in Probabilistic Alternating-Time Temporal Logic with Rewards. We present results on state-of-the-art MEC resource allocation policies to demonstrate the effectiveness of our framework.
In this paper we consider a simplified variant of the discrete Voronoi Game in R2, which is also of independent interest in competitive facility location. The game consists of two players P1 and P2, and a finite set U...
详细信息
In this paper we consider a simplified variant of the discrete Voronoi Game in R2, which is also of independent interest in competitive facility location. The game consists of two players P1 and P2, and a finite set U of users in the plane. The players have already placed two sets of facilities F and S, respectively in the plane. The game begins by P1 placing a new facility followed by P2 placing another facility, and the objective of both the players is to maximize their own total payoffs. When |F| = |S| = m, this corresponds to the last round of the (m + 1)-round discrete Voronoi Game in R2. In this paper we propose polynomial time algorithms for obtaining optimal strategies of both the players under arbitrary locations of the existing facilities F and S. We show that the optimal strategy of P2, given any placement of P1, can be found in O(n2) time, and the optimal strategy of P1 can be found in O(n8) time.
Determination of an isothetic polygonal approximation of the outer or inner contour of an object is a challenging problem with numerous applications to pattern recognition and image processing. In this paper, a novel ...
详细信息
We present two improved algorithms for weighted discrete p-center problem for tree networks with n vertices. One of our proposed algorithms runs in O(n log n + p log2 n log(n/p)) time. For all values of p, our algorit...
详细信息
Advances in flow-based microfluidics now allow an efficient implementation of biochemistry on-a-chip for DNA sequencing, drug discovery, and point-of-care disease diagnosis. However, the adoption of flow-based biochip...
详细信息
Quantum error-correcting code for higher dimensional systems can, in general, be directly constructed from the codes for qubit systems. What remains unknown is whether there exist efficient code design techniques for ...
详细信息
Quantum error correcting code (QECC) with encoding and decoding circuits having low gate count, is an important criterion for realizing quantum computing systems. CSS QECCs are known to have simple circuits. Shaw et a...
详细信息
ISBN:
(数字)9781728154060
ISBN:
(纸本)9781728154077
Quantum error correcting code (QECC) with encoding and decoding circuits having low gate count, is an important criterion for realizing quantum computing systems. CSS QECCs are known to have simple circuits. Shaw et al. showed that it is not possible to have a 6-qubit CSS type QECC without sharing entanglement between the encoder and the decoder. In this paper, we propose a 6-qutrit approximate QECC (AQECC) of CSS structure which can simultaneously correct phase errors in upto six qutrits, and one bit error in only four of the six qutrits, without sharing prior entanglement. Our AQECC corrects a single error with probability 0.75 for symmetric error model, and probability 0.9988 for asymmetric error model. It also maintains CSS structure without sharing prior entanglement. Furthermore, the quantum cost of a circuit for this AQECC is 55.72% less than that for the 9-qutrit exact QECC. Overall, low qutrit count, low cost circuit realization with low depth and the ability to correct multiple phase errors make our proposed AQECC a suitable candidate for real life quantum channels.
Large-scale quantum computers mandate error correction and fault tolerance. Due to constraints on the number of qubits, fault tolerance is difficult to achieve in near-term quantum systems. Therefore, error correction...
详细信息
ISBN:
(数字)9781728197104
ISBN:
(纸本)9781728197111
Large-scale quantum computers mandate error correction and fault tolerance. Due to constraints on the number of qubits, fault tolerance is difficult to achieve in near-term quantum systems. Therefore, error correction should require minimal resources. Gates in the near-term devices are also noisy. Quantum error correction code blocks built with these noisy gates can inject further error in the circuit. The goals for error correction in near-term systems are as follows: (i) using a small number of qubits for encoding, and (ii) keeping cost of circuits for encoding and decoding low. In this paper, we propose two techniques to achieve these mutually orthogonal goals. For a binary quantum system we propose an error estimation method that can aid in reducing the number of error correcting blocks via sparse scheduling. For ternary quantum systems, we propose an approximate code that can correct errors with high probability while significantly reducing the circuit cost. These techniques are expected to be helpful for error mitigation in near-term systems in the absence of fault tolerance.
暂无评论