The efficient allocation of jobs to grid resources is indispensable for high performance grid-based applications. The scheduling problem is computationally hard even when there are no dependencies among jobs. Thus, we...
详细信息
ISBN:
(纸本)9781424416936
The efficient allocation of jobs to grid resources is indispensable for high performance grid-based applications. The scheduling problem is computationally hard even when there are no dependencies among jobs. Thus, we present in this paper a new tabu search (TS) algorithm for the problem of batch job scheduling on computational grids. We consider the job scheduling as a bi-objective optimization problem consisting of the minimization of the makespan and flowtime. The bi-objectivity is tackled through a hierarchic approach in which makespan is considered a primary objective and flowtime a secondary one. An extensive experimental study has been first conducted in order to fine-tune the parameters of our TS algorithm. Then, our tuned TS is compared versus two well known TS algorithms in the literature (one of them is hybridized with an ant colony optimization algorithm)for the problem. The computational results show that our TS implementation clearly outperforms the compared algorithms. Finally, we evaluated the performance of our TS algorithm on a new set of instances that better fits with the concept of computational grid. These instances are composed of a higher number of -heterogeneous- machines (up to 256) and emulate the dynamic behavior of these systems.
As opposed to representing a document as a "bag of words" in most information retrieval applications, we propose a model of representing a web page as sets of named entities of multiple types. Specifically, ...
详细信息
ISBN:
(纸本)9781605580852
As opposed to representing a document as a "bag of words" in most information retrieval applications, we propose a model of representing a web page as sets of named entities of multiple types. Specifically, four types of named entities are extracted, namely person, geographic location, organization, and time. Moreover, the relations among these entities are also extracted, weighted, classified and marked by labels. On top of this model, some interesting applications are demonstrated. In particular, we introduce a notion of person-activity, which contains four different elements: person, location, time and activity. With this notion and based on a reasonably large set of web pages, we are able to show how one person's activities can be attributed by time and location, which gives a good idea of the mobility of the person under question.
FTTH development is slow but steady in China. The phenomenon is rooted from some major challenges, such as cost, limited bandwidth in Metro networks, bandwidth consumption behaviours. To address above challenges, FTTH...
详细信息
ISBN:
(纸本)9781424429059
FTTH development is slow but steady in China. The phenomenon is rooted from some major challenges, such as cost, limited bandwidth in Metro networks, bandwidth consumption behaviours. To address above challenges, FTTH architectures and bandwidth consumption behaviours are studied in the paper. To remove the bandwidth bottleneck between access and Metro networks and reduce cost, LR-PON (Long-Reach Passive Optical Network) is suggested to be applied in two ways in China. For resolving the challenge of bandwidth exhaustion in Metro networks caused by high-capacity consumption in access networks, a new bandwidth scheduling, Bandwidth on Schedule (BoS) is proposed to improve efficiency of bandwidth utilization. In the paper, the proposed solutions to challenges will be helpful to increase the penetration rate of FTTH deployment in China.
The temporary and unfixed physical topology of a wireless ad-hoc network is determined by the distribution of the wireless nodes as well as the transmission power (range) assignment of each node. This paper studies as...
详细信息
ISBN:
(纸本)9781605581491
The temporary and unfixed physical topology of a wireless ad-hoc network is determined by the distribution of the wireless nodes as well as the transmission power (range) assignment of each node. This paper studies asymmetric power assignments for which the induced communication graph is k-strongly connected, while minimizing the total energy assigned (which is NP-Hard) and maximizing the network lifetime. We show that our power assignment algorithm from [9] achieves a bicriteria approximation of (O(k). O(k √logn kα(n))) with high probability for the minimal total cost/maximal network (respectively) lifetime problem in the plane in the case of arbitrary battery charges. The same algorithm is an (O(k), O(l))-approximation in the case of uniform batteries. To the best of our knowledge, this is the first attempt to provide a bicriteria approximation factor for the total power assignment cost and the network lifetime under the k-fault resilience criterion. We provide some results for the linear power assignment algorithm in [30] as well. In addition, we extend the static algorithms above to support dynamic node insert/ delete operations in O(logn) time for the linear case and an expected O(k poly log n) amortized time in the plane. Copyright 2008 ACM.
Recently cooperative diversity has received a lot of attention as an effective and low-cost technique to combat multipath fading and enhance transmission reliability. However, many existing cooperative protocols suffe...
详细信息
Body Sensor networks are an interesting emerging application of wireless sensor networks to improve healthcare and the Quality of Life. Current research has mainly focused on single-hop networks, although some works c...
详细信息
In this paper we introduced an alternative view of text mining and we review several alternative views proposed by different authors. We propose a classification of text mining techniques into two main groups: techniq...
详细信息
Hierarchical packet classification is a crucial mechanism necessary to support many Internet services such as Quality of Service (QoS) provisioning, traffic policing, and network intrusion detection. Using Ternary Con...
详细信息
Hierarchical packet classification is a crucial mechanism necessary to support many Internet services such as Quality of Service (QoS) provisioning, traffic policing, and network intrusion detection. Using Ternary Content Addressable Memories (TCAMs) to perform high-speed packet classification has become the de facto standard in industry. TCAMs compare packet headers against all rules in a classification database concurrently and thus provide high throughput unparalleled by software-based solutions. However, the complexity of packet classification policies have been growing rapidly as number of services deployed on the Internet continues to increase. High TCAM memory requirement for complex hierarchical policies is a major issue as TCAMs have very limited capacity. In this paper we consider two optimization problems of dual nature: the first problem is to minimize the number of TCAM entries subject to the constraint on the maximum number of levels in the policy hierarchy; the second problem is to minimize the number of levels in the policy hierarchy subject to the constraint on the maximum number of TCAM entries. We propose efficient dynamic programming algorithms for these problems, which reduce the TCAM memory requirement. To the best of our knowledge, this is the first work to study the fundamental tradeoff between the TCAM space and the number of lookups for hierarchical packet classification. Our algorithms do not require any modifications to existing TCAMs and are thus relatively easy to deploy.
暂无评论