首页 > 最新文献

Performance Evaluation最新文献

英文 中文
Two families of indexable partially observable restless bandits and Whittle index computation 两类可转位的部分可观测的不动匪和Whittle指数计算
IF 2.2 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-01-01 Epub Date: 2023-12-02 DOI: 10.1016/j.peva.2023.102394
Nima Akbarzadeh, Aditya Mahajan

We consider the restless bandits with general finite state space under partial observability with two observational models: first, the state of each bandit is not observable at all, and second, the state of each bandit is observable when it is selected. Under the assumption that the models satisfy a restart property, we prove that both models are indexable. For the first model, we derive a closed-form expression for the Whittle index. For the second model, we propose an efficient algorithm to compute the Whittle index by exploiting the qualitative properties of the optimal policy. We present detailed numerical experiments for multiple instances of machine maintenance problem. The result indicates that the Whittle index policy outperforms myopic policy and can be close to optimal in different setups.

在部分可观测条件下,考虑具有一般有限状态空间的不动土匪,采用两种观测模型:一是每个土匪的状态完全不可观测,二是每个土匪的状态在被选择时是可观测的。在模型满足重启属性的假设下,证明了两个模型都是可索引的。对于第一个模型,我们推导了惠特尔指数的封闭表达式。对于第二个模型,我们提出了一种利用最优策略的定性性质来计算惠特尔指数的有效算法。针对机器维修问题的多个实例,给出了详细的数值实验。结果表明,Whittle索引策略优于近视策略,在不同的设置下可以接近最优。
{"title":"Two families of indexable partially observable restless bandits and Whittle index computation","authors":"Nima Akbarzadeh,&nbsp;Aditya Mahajan","doi":"10.1016/j.peva.2023.102394","DOIUrl":"10.1016/j.peva.2023.102394","url":null,"abstract":"<div><p>We consider the restless bandits with general finite state space under partial observability with two observational models: first, the state of each bandit is not observable at all, and second, the state of each bandit is observable when it is selected. Under the assumption that the models satisfy a restart property, we prove that both models are indexable. For the first model, we derive a closed-form expression for the Whittle index. For the second model, we propose an efficient algorithm to compute the Whittle index by exploiting the qualitative properties of the optimal policy. We present detailed numerical experiments for multiple instances of machine maintenance problem. The result indicates that the Whittle index policy outperforms myopic policy and can be close to optimal in different setups.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":"163 ","pages":"Article 102394"},"PeriodicalIF":2.2,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0166531623000640/pdfft?md5=98383ecb3b115be5f69d3bebd74f984f&pid=1-s2.0-S0166531623000640-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138495078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Marginal and joint distribution of inter-departure times for a PH/PH/c queue PH/PH/c队列出发时间的边际和联合分布
IF 2.2 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-01-01 Epub Date: 2023-11-04 DOI: 10.1016/j.peva.2023.102383
Ruth Sagron , Yoav Kerner

In this paper, we introduce the Laplace–Stieltjes transform (LST) of the inter-departure time distribution in a PH/PH/c queue, and the two-dimensional joint LST of two consecutive inter-departure times to construct their correlation structure. We exploit the properties of phase-type (PH) random variables, as well as the steady-state distribution of the underlying continuous-time Markov chain in a PH/PH/c queue to construct these LSTs. We demonstrate our approach through numerical examples, while validating the results. Later, we analyze the correlation between two consecutive inter-departure times for various PH/PH/c queues. We observe that, if the fundamental elements of the queue have high (low) variability, then the correlation is positive (negative).

本文引入了PH/PH/c队列出发时间分布的Laplace-Stieltjes变换(LST),以及两个连续出发时间的二维联合LST,构建了它们的关联结构。我们利用相型(PH)随机变量的性质,以及PH/PH/c队列中底层连续时间马尔可夫链的稳态分布来构建这些lst。我们通过数值例子来证明我们的方法,同时验证结果。随后,我们分析了不同PH/PH/c队列的两个连续出发时间之间的相关性。我们观察到,如果队列的基本元素具有高(低)可变性,则相关性为正(负)。
{"title":"Marginal and joint distribution of inter-departure times for a PH/PH/c queue","authors":"Ruth Sagron ,&nbsp;Yoav Kerner","doi":"10.1016/j.peva.2023.102383","DOIUrl":"10.1016/j.peva.2023.102383","url":null,"abstract":"<div><p>In this paper, we introduce the Laplace–Stieltjes transform (LST) of the inter-departure time distribution in a <em>PH/PH/c</em> queue, and the two-dimensional joint LST of two consecutive inter-departure times to construct their correlation structure. We exploit the properties of phase-type (PH) random variables, as well as the steady-state distribution of the underlying continuous-time Markov chain in a <em>PH/PH</em>/<em>c</em> queue to construct these LSTs. We demonstrate our approach through numerical examples, while validating the results. Later, we analyze the correlation between two consecutive inter-departure times for various <em>PH/PH/c</em> queues. We observe that, if the fundamental elements of the queue have high (low) variability, then the correlation is positive (negative).</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":"163 ","pages":"Article 102383"},"PeriodicalIF":2.2,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0166531623000536/pdfft?md5=b3ce45055b5a49cf2750969c2b7c7d10&pid=1-s2.0-S0166531623000536-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135411886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized fault tolerant source localization without sensor parameters in wireless sensor networks 无线传感器网络中无需传感器参数的分散容错源定位
IF 2.2 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-01-01 Epub Date: 2023-12-08 DOI: 10.1016/j.peva.2023.102395
Akram Hussain, Yuan Luo

In this paper, we study the source (event) localization problem in decentralized wireless sensor networks (WSNs) under faulty sensor nodes without knowledge of the sensor parameters. Source localization has many applications, such as localizing WiFi hotspots and mobile users. Some works in the literature localize the source by utilizing the knowledge or estimates of the fault probability of each sensor node or the region of influence of the source. However, this paper proposes two approaches: the hitting set and feature selection for estimating the source location without any knowledge of the sensor parameters under faulty sensor nodes in WSN. The proposed approaches provide better or comparable source localization performances. For the hitting set approach, we also derive a lower bound on the required number of samples. In addition, we extend the proposed methods for localizing multiple sources. Finally, we provide extensive simulations to illustrate the performances of the proposed methods against the centroid, maximum likelihood (ML), fault-tolerant ML (FTML), and subtract on negative add on positive (SNAP) estimators. The proposed approaches significantly outperform the centroid and maximum likelihood estimators for faulty sensor nodes while providing comparable or better performance to FTML or SNAP algorithm. In addition, we use real-world WiFi data set to localize the source in comparison to the support vector machine based estimator in the literature, where the proposed methods outperformed the estimator.

本文研究了分散式无线传感器网络(WSN)中,在不知道传感器参数的情况下,传感器节点出现故障时的源(事件)定位问题。源定位有很多应用,如定位 WiFi 热点和移动用户。文献中的一些作品通过利用每个传感器节点的故障概率或源影响区域的知识或估计值来定位源。然而,本文提出了两种方法:命中集和特征选择,用于在不了解 WSN 中故障传感器节点的传感器参数的情况下估计信号源位置。这两种方法都能提供更好或相当的源定位性能。对于命中集方法,我们还推导出了所需样本数量的下限。此外,我们还扩展了建议的多源定位方法。最后,我们提供了大量仿真,说明了所提方法与中心点、最大似然 (ML)、容错 ML (FTML) 和正负相减 (SNAP) 预估器的性能对比。对于故障传感器节点,所提出的方法明显优于中心点和最大似然估计法,同时与 FTML 或 SNAP 算法的性能相当或更好。此外,我们使用真实世界的 WiFi 数据集来定位信号源,与文献中基于支持向量机的估计器进行比较,发现所提出的方法优于该估计器。
{"title":"Decentralized fault tolerant source localization without sensor parameters in wireless sensor networks","authors":"Akram Hussain,&nbsp;Yuan Luo","doi":"10.1016/j.peva.2023.102395","DOIUrl":"10.1016/j.peva.2023.102395","url":null,"abstract":"<div><p>In this paper, we study the source (event) localization problem in decentralized wireless sensor networks (WSNs) under faulty sensor nodes without knowledge of the sensor parameters. Source localization has many applications, such as localizing WiFi hotspots and mobile users. Some works in the literature localize the source by utilizing the knowledge or estimates of the fault probability of each sensor node or the region of influence of the source. However, this paper proposes two approaches: the hitting set and feature selection for estimating the source location without any knowledge of the sensor parameters under faulty sensor nodes in WSN. The proposed approaches provide better or comparable source localization performances. For the hitting set approach, we also derive a lower bound on the required number of samples. In addition, we extend the proposed methods for localizing multiple sources. Finally, we provide extensive simulations to illustrate the performances of the proposed methods against the centroid, maximum likelihood (ML), fault-tolerant ML (FTML), and subtract on negative add on positive (SNAP) estimators. The proposed approaches significantly outperform the centroid and maximum likelihood estimators for faulty sensor nodes while providing comparable or better performance to FTML or SNAP algorithm. In addition, we use real-world WiFi data set to localize the source in comparison to the support vector machine based estimator in the literature, where the proposed methods outperformed the estimator.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":"163 ","pages":"Article 102395"},"PeriodicalIF":2.2,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0166531623000652/pdfft?md5=917546a42fc91c4d2235d2f09f3e4318&pid=1-s2.0-S0166531623000652-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138553529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ASIP tandem queues with consumption 带消费的ASIP串联队列
IF 2.2 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-01-01 Epub Date: 2023-10-18 DOI: 10.1016/j.peva.2023.102380
Yaron Yeger , Onno Boxma , Jacques Resing , Maria Vlasiou

The Asymmetric Inclusion Process (ASIP) tandem queue is a model of stations in series with a gate after each station. At a gate opening, all customers in that station instantaneously move to the next station unidirectionally. In our study, we enhance the ASIP model by introducing the capability for individual customers to independently move from one station to the next, and by allowing both individual customers and batches of customers from any station to exit the system. The model is inspired by the process by which macromolecules are transported within cells.

We present a comprehensive analysis of various aspects of the queue length in the ASIP tandem model. Specifically, we provide an exact analysis of queue length moments and correlations and, under certain circumstances, of the queue length distribution. Furthermore, we propose an approximation for the joint queue length distribution. This approximation is derived using three different approaches, one of which employs the concept of the replica mean-field limit. Among other results, our analysis offers insight into the extent to which nutrients can support the survival of a cell.

非对称包含过程(ASIP)串列队列是站的串联模型,每个站后面都有一个门。门打开时,该站的所有顾客立即单向地移动到下一站。在我们的研究中,我们通过引入单个客户独立地从一个站点移动到下一个站点的能力,以及允许来自任何站点的单个客户和批量客户退出系统来增强ASIP模型。该模型的灵感来自于大分子在细胞内运输的过程。我们提出了在ASIP串联模型的队列长度的各个方面的全面分析。具体来说,我们提供了对队列长度矩和相关性的精确分析,以及在某些情况下对队列长度分布的精确分析。此外,我们提出了一个近似的联合队列长度分布。这个近似是用三种不同的方法推导出来的,其中一种方法采用了复制平均场极限的概念。在其他结果中,我们的分析提供了对营养物质在多大程度上支持细胞存活的见解。
{"title":"ASIP tandem queues with consumption","authors":"Yaron Yeger ,&nbsp;Onno Boxma ,&nbsp;Jacques Resing ,&nbsp;Maria Vlasiou","doi":"10.1016/j.peva.2023.102380","DOIUrl":"https://doi.org/10.1016/j.peva.2023.102380","url":null,"abstract":"<div><p>The Asymmetric Inclusion Process (ASIP) tandem queue is a model of stations in series with a gate after each station. At a gate opening, all customers in that station instantaneously move to the next station unidirectionally. In our study, we enhance the ASIP model by introducing the capability for individual customers to independently move from one station to the next, and by allowing both individual customers and batches of customers from any station to exit the system. The model is inspired by the process by which macromolecules are transported within cells.</p><p>We present a comprehensive analysis of various aspects of the queue length in the ASIP tandem model. Specifically, we provide an exact analysis of queue length moments and correlations and, under certain circumstances, of the queue length distribution. Furthermore, we propose an approximation for the joint queue length distribution. This approximation is derived using three different approaches, one of which employs the concept of the replica mean-field limit. Among other results, our analysis offers insight into the extent to which nutrients can support the survival of a cell.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":"163 ","pages":"Article 102380"},"PeriodicalIF":2.2,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0166531623000500/pdfft?md5=979d6daae1fd3cf701761a51f472a8ff&pid=1-s2.0-S0166531623000500-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92030401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance of the Gittins policy in the G/G/1 and G/G/k, with and without setup times Gittins策略在G/G/1和G/G/k中的性能,有和没有设置时间
IF 2.2 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-01-01 Epub Date: 2023-10-29 DOI: 10.1016/j.peva.2023.102377
Yige Hong , Ziv Scully

How should we schedule jobs to minimize mean queue length? In the preemptive M/G/1 queue, we know the optimal policy is the Gittins policy, which uses any available information about jobs’ remaining service times to dynamically prioritize jobs. For models more complex than the M/G/1, optimal scheduling is generally intractable. This leads us to ask: beyond the M/G/1, does Gittins still perform well?

Recent results show Gittins performs well in the M/G/k, meaning that its additive suboptimality gap is bounded by an expression which is negligible in heavy traffic. But allowing multiple servers is just one way to extend the M/G/1, and most other extensions remain open. Does Gittins still perform well with non-Poisson arrival processes? Or if servers require setup times when transitioning from idle to busy?

In this paper, we give the first analysis of the Gittins policy that can handle any combination of (a) multiple servers, (b) non-Poisson arrivals, and (c) setup times. Our results thus cover the G/G/1 and G/G/k, with and without setup times, bounding Gittins’s suboptimality gap in each case. Each of (a), (b), and (c) adds a term to our bound, but all the terms are negligible in heavy traffic, thus implying Gittins’s heavy-traffic optimality in all the systems we consider. Another consequence of our results is that Gittins is optimal in the M/G/1 with setup times at all loads.

我们应该如何调度作业以最小化平均队列长度?在抢占式M/G/1队列中,我们知道最优策略是Gittins策略,该策略使用有关作业剩余服务时间的任何可用信息来动态地确定作业的优先级。对于比M/G/1更复杂的模型,最优调度通常是难以解决的。这让我们不禁要问:除了M/G/1之外,gittin的表现还好吗?最近的结果表明,Gittins在M/G/k中表现良好,这意味着它的加性次优性差距由一个表达式限定,在繁忙的交通中可以忽略不计。但是允许多个服务器只是扩展M/G/1的一种方式,大多数其他扩展仍然是开放的。gittin在非泊松到达过程中仍然表现良好吗?或者服务器从空闲到繁忙是否需要设置时间?在本文中,我们首次分析了可以处理(a)多个服务器,(b)非泊松到达和(c)设置时间的任何组合的Gittins策略。因此,我们的结果涵盖了G/G/1和G/G/k,有和没有设置时间,在每种情况下都限定了Gittins的次优性差距。(a)、(b)和(c)中的每一个都给我们的边界增加了一项,但是所有的项在繁忙的交通中都是可以忽略不计的,因此暗示了Gittins在我们考虑的所有系统中的繁忙交通最优性。我们的结果的另一个结果是,在M/G/1中,gittin在所有负载下的设置时间都是最优的。
{"title":"Performance of the Gittins policy in the G/G/1 and G/G/k, with and without setup times","authors":"Yige Hong ,&nbsp;Ziv Scully","doi":"10.1016/j.peva.2023.102377","DOIUrl":"https://doi.org/10.1016/j.peva.2023.102377","url":null,"abstract":"<div><p>How should we schedule jobs to minimize mean queue length? In the preemptive M/G/1 queue, we know the optimal policy is the Gittins policy, which uses any available information about jobs’ remaining service times to dynamically prioritize jobs. For models more complex than the M/G/1, optimal scheduling is generally intractable. This leads us to ask: beyond the M/G/1, does Gittins still perform well?</p><p>Recent results show Gittins performs well in the M/G/<em>k</em>, meaning that its additive suboptimality gap is bounded by an expression which is negligible in heavy traffic. But allowing multiple servers is just one way to extend the M/G/1, and most other extensions remain open. Does Gittins still perform well with non-Poisson arrival processes? Or if servers require setup times when transitioning from idle to busy?</p><p>In this paper, we give the first analysis of the Gittins policy that can handle any combination of (a) multiple servers, (b) non-Poisson arrivals, and (c) setup times. Our results thus cover the G/G/1 and G/G/<em>k</em>, with and without setup times, bounding Gittins’s suboptimality gap in each case. Each of (a), (b), and (c) adds a term to our bound, but all the terms are negligible in heavy traffic, thus implying Gittins’s heavy-traffic optimality in all the systems we consider. Another consequence of our results is that Gittins is optimal in the M/G/1 with setup times at all loads.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":"163 ","pages":"Article 102377"},"PeriodicalIF":2.2,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0166531623000470/pdfft?md5=688fb1b83300cd7ea4fea9d191278825&pid=1-s2.0-S0166531623000470-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92030400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The effect of network delays on Distributed Ledgers based on Directed Acyclic Graphs: A mathematical model 基于有向无环图的分布式账本网络时延影响:一个数学模型
IF 2.2 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2024-01-01 Epub Date: 2023-11-25 DOI: 10.1016/j.peva.2023.102392
Navdeep Kumar , Alexandre Reiffers-Masson , Isabel Amigo , Santiago Ruano Rincón

We present a new stochastic model for the evolution of Directed Acyclic Graphs (DAG)-based distributed ledgers (DL), under the presence of heterogeneous delay. This model is used to analyse the performance metrics of the DL, showing in particular that the number of unapproved messages, in expectation, does not diverge to infinity, even under the presence of delay. We propose an analysis based on conveniently defined sets, as well as an alternative drift-based analysis. The former allows to get a bound on the average number of unapproved messages, while the latter, through a simpler analysis, allows to prove the existence of such bound. For particular scenarios, we are able to derive the expected value of the drift of unapproved messages, through a Markov process-based approach. State-of-the-art mathematical models trying to capture the impact of delays on the performance of such DLs rely on some particular simplifications. In contrast, through our model, we are able to analytically derive similar performance guarantees, in a more realistic setup. In particular, we focus on IOTA foundation’s tangle, while our results can be extended to other DAG-based distributed ledgers. We compare our results to results obtained in a real testbed, showing good accordance between them.

我们提出了一种新的基于有向无环图(DAG)的分布式账本(DL)在异构延迟下演化的随机模型。该模型用于分析DL的性能指标,特别是表明,即使在存在延迟的情况下,预期中未经批准的消息的数量也不会发散到无穷大。我们提出了一种基于方便定义集的分析,以及一种基于漂移的替代分析。前者允许得到未经批准消息的平均数量的一个界限,而后者通过更简单的分析,允许证明这个界限的存在。对于特定的场景,我们能够通过基于马尔可夫过程的方法推导出未经批准的消息漂移的期望值。试图捕捉延迟对此类人工智能性能影响的最先进的数学模型依赖于一些特定的简化。相比之下,通过我们的模型,我们能够在更现实的设置中解析地获得类似的性能保证。特别是,我们专注于IOTA基金会的缠结,而我们的结果可以扩展到其他基于dag的分布式账本。将所得结果与实际试验台的结果进行了比较,结果表明两者吻合较好。
{"title":"The effect of network delays on Distributed Ledgers based on Directed Acyclic Graphs: A mathematical model","authors":"Navdeep Kumar ,&nbsp;Alexandre Reiffers-Masson ,&nbsp;Isabel Amigo ,&nbsp;Santiago Ruano Rincón","doi":"10.1016/j.peva.2023.102392","DOIUrl":"https://doi.org/10.1016/j.peva.2023.102392","url":null,"abstract":"<div><p>We present a new stochastic model for the evolution of Directed Acyclic Graphs (DAG)-based distributed ledgers (DL), under the presence of heterogeneous delay. This model is used to analyse the performance metrics of the DL, showing in particular that the number of unapproved messages, in expectation, does not diverge to infinity, even under the presence of delay. We propose an analysis based on conveniently defined sets, as well as an alternative drift-based analysis. The former allows to get a bound on the average number of unapproved messages, while the latter, through a simpler analysis, allows to prove the existence of such bound. For particular scenarios, we are able to derive the expected value of the drift of unapproved messages, through a Markov process-based approach. State-of-the-art mathematical models trying to capture the impact of delays on the performance of such DLs rely on some particular simplifications. In contrast, through our model, we are able to analytically derive similar performance guarantees, in a more realistic setup. In particular, we focus on IOTA foundation’s tangle, while our results can be extended to other DAG-based distributed ledgers. We compare our results to results obtained in a real testbed, showing good accordance between them.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":"163 ","pages":"Article 102392"},"PeriodicalIF":2.2,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0166531623000627/pdfft?md5=418849af0d02f48109fd2defe85bc15f&pid=1-s2.0-S0166531623000627-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138474715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
POBO: Safe and optimal resource management for cloud microservices POBO:云微服务的安全和优化资源管理
IF 2.2 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-01 Epub Date: 2023-10-10 DOI: 10.1016/j.peva.2023.102376
Hengquan Guo , Hongchen Cao , Jingzhu He, Xin Liu, Yuanming Shi

Resource management in microservices is challenging due to the uncertain latency–resource relationship, dynamic environment, and strict Service-Level Agreement (SLA) guarantees. This paper presents a Pessimistic and Optimistic Bayesian Optimization framework, named POBO, for safe and optimal resource configuration for microservice applications. POBO leverages Bayesian learning to estimate the uncertain latency–resource functions and combines primal–dual and penalty-based optimization to maximize resource efficiency while guaranteeing strict SLAs. We prove that POBO can achieve sublinear regret and SLA violation against the optimal resource configuration in hindsight. We have implemented a prototype of POBO and conducted extensive experiments on a real-world microservice application. Our results show that POBO can find the safe and optimal configuration efficiently, outperforming Kubernetes’ built-in auto-scaling module and the state-of-the-art algorithms.

由于不确定的延迟-资源关系、动态环境和严格的服务水平协议(SLA)保证,微服务中的资源管理具有挑战性。本文提出了一种悲观和乐观贝叶斯优化框架,即POBO,用于微服务应用的安全优化资源配置。POBO利用贝叶斯学习来估计不确定的延迟资源函数,并结合原始对偶和基于惩罚的优化来最大化资源效率,同时保证严格的sla。事后证明POBO可以实现对最优资源配置的次线性后悔和SLA违反。我们已经实现了POBO的原型,并在一个真实的微服务应用程序上进行了大量的实验。我们的研究结果表明,POBO可以有效地找到安全和最佳配置,优于Kubernetes内置的自动缩放模块和最先进的算法。
{"title":"POBO: Safe and optimal resource management for cloud microservices","authors":"Hengquan Guo ,&nbsp;Hongchen Cao ,&nbsp;Jingzhu He,&nbsp;Xin Liu,&nbsp;Yuanming Shi","doi":"10.1016/j.peva.2023.102376","DOIUrl":"https://doi.org/10.1016/j.peva.2023.102376","url":null,"abstract":"<div><p>Resource management in microservices<span> is challenging due to the uncertain latency–resource relationship, dynamic environment, and strict Service-Level Agreement (SLA) guarantees. This paper presents a Pessimistic and Optimistic Bayesian Optimization<span><span> framework, named POBO, for safe and optimal resource configuration for microservice applications. POBO leverages </span>Bayesian learning to estimate the uncertain latency–resource functions and combines primal–dual and penalty-based optimization to maximize resource efficiency while guaranteeing strict SLAs. We prove that POBO can achieve sublinear regret and SLA violation against the optimal resource configuration in hindsight. We have implemented a prototype of POBO and conducted extensive experiments on a real-world microservice application. Our results show that POBO can find the safe and optimal configuration efficiently, outperforming Kubernetes’ built-in auto-scaling module and the state-of-the-art algorithms.</span></span></p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":"162 ","pages":"Article 102376"},"PeriodicalIF":2.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49874154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fixed confidence community mode estimation 固定置信度社区模式估计
IF 2.2 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-01 Epub Date: 2023-10-12 DOI: 10.1016/j.peva.2023.102379
Meera Pai, Nikhil Karamchandani, Jayakrishnan Nair

Our aim is to estimate the largest community (a.k.a., mode) in a population composed of multiple disjoint communities. This estimation is performed in a fixed confidence setting via sequential sampling of individuals with replacement. We consider two sampling models: (i) an identityless model, wherein only the community of each sampled individual is revealed, and (ii) an identity-based model, wherein the learner is able to discern whether or not each sampled individual has been sampled before, in addition to the community of that individual. The former model corresponds to the classical problem of identifying the mode of a discrete distribution, whereas the latter seeks to capture the utility of identity information in mode estimation. For each of these models, we establish information theoretic lower bounds on the expected number of samples needed to meet the prescribed confidence level, and propose sound algorithms with a sample complexity that is provably asymptotically optimal. Our analysis highlights that identity information can indeed be utilized to improve the efficiency of community mode estimation.

我们的目标是在由多个不相交的群落组成的种群中估计最大的群落(即模式)。这种估计是在一个固定的置信度设置下通过对替换个体的顺序抽样进行的。我们考虑了两种抽样模型:(i)无身份模型,其中只显示每个抽样个体的社区;(ii)基于身份的模型,其中学习者能够辨别每个抽样个体之前是否被抽样过,以及该个体的社区。前一种模型对应于识别离散分布模式的经典问题,而后一种模型旨在捕获模式估计中身份信息的效用。对于这些模型中的每一个,我们建立了满足规定置信水平所需的期望样本数量的信息理论下界,并提出了具有可证明的渐近最优样本复杂度的可靠算法。我们的分析强调了身份信息确实可以用来提高社区模式估计的效率。
{"title":"Fixed confidence community mode estimation","authors":"Meera Pai,&nbsp;Nikhil Karamchandani,&nbsp;Jayakrishnan Nair","doi":"10.1016/j.peva.2023.102379","DOIUrl":"https://doi.org/10.1016/j.peva.2023.102379","url":null,"abstract":"<div><p>Our aim is to estimate the largest community (a.k.a., mode) in a population composed of multiple disjoint communities. This estimation is performed in a fixed confidence setting via sequential sampling of individuals with replacement. We consider two sampling models: (i) an identityless model, wherein only the community of each sampled individual is revealed, and (ii) an identity-based model, wherein the learner is able to discern whether or not each sampled individual has been sampled before, in addition to the community of that individual. The former model corresponds to the classical problem of identifying the mode of a discrete distribution, whereas the latter seeks to capture the utility of identity information in mode estimation. For each of these models, we establish information theoretic lower bounds on the expected number of samples needed to meet the prescribed confidence level, and propose sound algorithms with a sample complexity that is provably asymptotically optimal. Our analysis highlights that identity information can indeed be utilized to improve the efficiency of community mode estimation.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":"162 ","pages":"Article 102379"},"PeriodicalIF":2.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92025544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation modeling of Zoom traffic on a campus network: A case study 校园网上Zoom流量的仿真建模:一个案例研究
IF 2.2 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-01 Epub Date: 2023-10-10 DOI: 10.1016/j.peva.2023.102382
Mehdi Karamollahi, Carey Williamson, Martin Arlitt

In this paper, we develop a synthetic workload model for the Zoom network application based on empirical Zoom traffic measurements from a campus network. We then use this model in a simulation study of Zoom network traffic at the campus scale. The simulation results show that hybrid learning places a substantial load on the campus network. Additional simulation experiments investigate the potential benefits of locally-hosted Zoom infrastructure, improved load balancing strategies for Zoom servers, and multicast delivery for Zoom network traffic. The simulation results show that the multicast approach offers the greatest potential benefit for improving Zoom performance on our campus network.

本文基于对某校园网Zoom流量的实证测量,建立了Zoom网络应用的综合工作负载模型。然后,我们使用该模型对校园规模的Zoom网络流量进行了仿真研究。仿真结果表明,混合学习给校园网带来了很大的负荷。另外的仿真实验研究了本地托管的Zoom基础设施、改进的Zoom服务器负载平衡策略以及Zoom网络流量的多播传递的潜在好处。仿真结果表明,组播方法对提高校园网的变焦性能具有最大的潜在效益。
{"title":"Simulation modeling of Zoom traffic on a campus network: A case study","authors":"Mehdi Karamollahi,&nbsp;Carey Williamson,&nbsp;Martin Arlitt","doi":"10.1016/j.peva.2023.102382","DOIUrl":"https://doi.org/10.1016/j.peva.2023.102382","url":null,"abstract":"<div><p>In this paper, we develop a synthetic workload model for the Zoom network application based on empirical Zoom traffic measurements from a campus network. We then use this model in a simulation study of Zoom network traffic at the campus scale. The simulation results show that hybrid learning places a substantial load on the campus network. Additional simulation experiments investigate the potential benefits of locally-hosted Zoom infrastructure, improved load balancing strategies for Zoom servers, and multicast delivery for Zoom network traffic. The simulation results show that the multicast approach offers the greatest potential benefit for improving Zoom performance on our campus network.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":"162 ","pages":"Article 102382"},"PeriodicalIF":2.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49874543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the regret of online edge service hosting 关于在线边缘服务托管的遗憾
IF 2.2 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-11-01 Epub Date: 2023-09-11 DOI: 10.1016/j.peva.2023.102367
R. Sri Prakash, Nikhil Karamchandani, Sharayu Moharir

We consider the problem of service hosting where a service provider can dynamically rent edge resources via short term contracts to ensure better quality of service to its customers. The service can also be partially hosted at the edge, in which case, customers’ requests can be partially served at the edge. The total cost incurred by the system is modeled as a combination of the rent cost, the service cost incurred due to latency in serving customers, and the fetch cost incurred as a result of the bandwidth used to fetch the code/databases of the service from the cloud servers to host the service at the edge. In this paper, we compare multiple hosting policies with regret as a metric, defined as the difference in the cost incurred by the policy and the optimal policy over some time horizon T. In particular we consider the Retro Renting (RR) and Follow The Perturbed Leader (FTPL) policies proposed in the literature and provide performance guarantees on the regret of these policies. We show that under i.i.d stochastic arrivals, RR policy has linear regret while FTPL policy has constant regret. Next, we propose a variant of FTPL, namely Wait then FTPL (W-FTPL), which also has constant regret while demonstrating much better dependence on the fetch cost. We also show that under adversarial arrivals, RR policy has linear regret while both FTPL and W-FTPL have regret O(T) which is order-optimal.

我们考虑服务托管的问题,服务提供商可以通过短期合同动态租用边缘资源,以确保为客户提供更好的服务质量。服务也可以部分托管在边缘,在这种情况下,客户的请求可以部分在边缘得到服务。系统产生的总成本被建模为租金成本、由于服务客户的延迟而产生的服务成本以及由于用于从云服务器获取服务的代码/数据库以在边缘托管服务的带宽而产生的获取成本的组合。在本文中,我们比较了以后悔为度量标准的多个托管策略,后悔被定义为策略和最优策略在一段时间内产生的成本差异。特别是,我们考虑了文献中提出的回溯租赁(RR)和跟随扰动领导者(FTPL)策略,并为这些策略的后悔提供了性能保证。我们证明了在i.i.d随机到达下,RR策略具有线性后悔,而FTPL策略具有恒定后悔。接下来,我们提出了FTPL的一个变体,即等待然后FTPL(W-FTPL),它也有持续的遗憾,同时表现出对获取成本的更好依赖性。我们还证明了在对抗性到达下,RR策略具有线性后悔,而FTPL和W-FTPL都具有阶最优的后悔O(T)。
{"title":"On the regret of online edge service hosting","authors":"R. Sri Prakash,&nbsp;Nikhil Karamchandani,&nbsp;Sharayu Moharir","doi":"10.1016/j.peva.2023.102367","DOIUrl":"https://doi.org/10.1016/j.peva.2023.102367","url":null,"abstract":"<div><p><span>We consider the problem of service hosting where a service provider can dynamically rent edge resources via short term contracts to ensure better quality of service to its customers. The service can also be partially hosted at the edge, in which case, customers’ requests can be partially served at the edge. The total cost incurred by the system is modeled as a combination of the rent cost, the service cost incurred due to latency in serving customers, and the fetch cost incurred as a result of the bandwidth used to fetch the code/databases of the service from the cloud servers to host the service at the edge. In this paper, we compare multiple hosting policies with regret as a metric, defined as the difference in the cost incurred by the policy and the optimal policy over some time horizon </span><span><math><mi>T</mi></math></span>. In particular we consider the Retro Renting (RR) and Follow The Perturbed Leader (FTPL) policies proposed in the literature and provide performance guarantees on the regret of these policies. We show that under i.i.d stochastic arrivals, RR policy has linear regret while FTPL policy has constant regret. Next, we propose a variant of FTPL, namely Wait then FTPL (W-FTPL), which also has constant regret while demonstrating much better dependence on the fetch cost. We also show that under adversarial arrivals, RR policy has linear regret while both FTPL and W-FTPL have regret <span><math><mrow><mi>O</mi><mrow><mo>(</mo><msqrt><mrow><mi>T</mi></mrow></msqrt><mo>)</mo></mrow></mrow></math></span> which is order-optimal.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":"162 ","pages":"Article 102367"},"PeriodicalIF":2.2,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49874545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Performance Evaluation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1