首页 > 最新文献

Performance Evaluation最新文献

英文 中文
Modeling and performance analysis of hybrid systems by queues with setup time 具有建立时间的队列混合系统建模与性能分析
IF 2.2 4区 计算机科学 Q2 Mathematics Pub Date : 2023-09-04 DOI: 10.1016/j.peva.2023.102366
Mitsuki Sato , Kohei Kawamura , Ken’ichi Kawanishi , Tuan Phung-Duc

NFV (Network Functions Virtualization) is a technology to provide network services by applying virtualization. While the virtualization technology provides flexible architecture by itself, a specific environment where physical legacy equipment and virtualized machines coexist is also considered to meet a wide range of requirements from not only users but also service providers. Motivated by such hybrid systems, we propose queueing models with two types of service facilities: legacy servers and virtual machines. Key features to focus on are that while legacy servers are always on standby, virtual machines need setup time to be ready for service because they are shutdown to reduce the power consumption if no jobs are waiting. Keeping in mind delay-sensitive real-time services, we evaluate the performance of the queueing models, in particular, the delay and energy efficiency.

NFV(网络功能虚拟化)是一种通过应用虚拟化来提供网络服务的技术。虽然虚拟化技术本身提供了灵活的体系结构,但物理遗留设备和虚拟化机器共存的特定环境也被认为可以满足用户和服务提供商的广泛需求。受这种混合系统的启发,我们提出了具有两种服务设施的排队模型:遗留服务器和虚拟机。需要关注的关键功能是,虽然传统服务器始终处于待机状态,但虚拟机需要设置时间才能准备好服务,因为如果没有作业等待,它们会关闭以降低功耗。考虑到对延迟敏感的实时服务,我们评估了排队模型的性能,特别是延迟和能量效率。
{"title":"Modeling and performance analysis of hybrid systems by queues with setup time","authors":"Mitsuki Sato ,&nbsp;Kohei Kawamura ,&nbsp;Ken’ichi Kawanishi ,&nbsp;Tuan Phung-Duc","doi":"10.1016/j.peva.2023.102366","DOIUrl":"https://doi.org/10.1016/j.peva.2023.102366","url":null,"abstract":"<div><p>NFV (Network Functions Virtualization) is a technology to provide network services<span> by applying virtualization<span>. While the virtualization technology provides flexible architecture by itself, a specific environment where physical legacy equipment and virtualized machines coexist is also considered to meet a wide range of requirements from not only users but also service providers. Motivated by such hybrid systems, we propose queueing models with two types of service facilities: legacy servers and virtual machines. Key features to focus on are that while legacy servers are always on standby, virtual machines need setup time to be ready for service because they are shutdown to reduce the power consumption if no jobs are waiting. Keeping in mind delay-sensitive real-time services, we evaluate the performance of the queueing models, in particular, the delay and energy efficiency.</span></span></p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49874546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A loss queueing game for electric vehicle charging performance evaluation 一种用于电动汽车充电性能评价的损失排队博弈
IF 2.2 4区 计算机科学 Q2 Mathematics Pub Date : 2023-09-01 DOI: 10.1016/j.peva.2023.102350
Alix Dupont , Yezekael Hayel , Tania Jiménez , Olivier Beaude , Jean-Baptiste Breal

The demand of electricity at the Charging Stations (CSs) by Electric Vehicle (EV) users is tremendously increasing. However, EV users still face limited resources at the CSs, both in terms of the number of parking spaces equipped with a charging point, and in terms of available power. This paper deals with the choice of a CS among two CSs by the EV users in a competitive environment. The stochastic nature of arrivals and departures at the CSs is modeled by a queueing system. A queueing game is studied where the EV users are the players and choose the CS that gives the highest expected energy received. An approximation of the expected energy received at the CSs is theoretically provided and the quality of this approximation is numerically illustrated and analyzed through simulations. The existence and uniqueness of the equilibrium of the game is proved, and bounds on the Price of Anarchy (PoA) are also provided. Moreover, the model is simulated using a discrete event framework and a sensitivity analysis of the main metrics of the system with respect to the average parking duration and the power sizing coefficient is provided. The results show that the utility of EV users at equilibrium is close to the optimal utility. This study can help a Charging Point Operator (CPO) to design incentives for EV users in order for instance to limit the parking duration so as to improve the social welfare of the EV users.

电动汽车(EV)用户对充电站(CS)的电力需求正在急剧增加。然而,电动汽车用户在CS仍然面临着有限的资源,无论是在配备充电点的停车位数量还是在可用电力方面。本文讨论了在竞争环境中电动汽车用户在两个CS中选择一个CS的问题。CS的到达和离开的随机性质由排队系统建模。研究了一个排队游戏,其中EV用户是玩家,并选择给出最高期望接收能量的CS。理论上提供了CS处接收的预期能量的近似值,并通过仿真对该近似值的质量进行了数值说明和分析。证明了博弈均衡的存在性和唯一性,并给出了无政府价格的界。此外,使用离散事件框架模拟了该模型,并提供了系统的主要指标相对于平均停车持续时间和功率大小系数的灵敏度分析。结果表明,电动汽车用户在均衡状态下的效用接近最优效用。这项研究可以帮助充电点运营商(CPO)为电动汽车用户设计激励措施,例如限制停车时间,以提高电动汽车用户的社会福利。
{"title":"A loss queueing game for electric vehicle charging performance evaluation","authors":"Alix Dupont ,&nbsp;Yezekael Hayel ,&nbsp;Tania Jiménez ,&nbsp;Olivier Beaude ,&nbsp;Jean-Baptiste Breal","doi":"10.1016/j.peva.2023.102350","DOIUrl":"https://doi.org/10.1016/j.peva.2023.102350","url":null,"abstract":"<div><p><span>The demand of electricity at the Charging Stations (CSs) by Electric Vehicle (EV) users is tremendously increasing. However, EV users still face limited resources at the CSs, both in terms of the number of parking spaces equipped with a charging point, and in terms of available power. This paper deals with the choice of a CS among two CSs by the EV users in a competitive environment. The stochastic nature of arrivals and departures at the CSs is modeled by a queueing system. A queueing game is studied where the EV users are the players and choose the CS that gives the highest expected energy received. An </span>approximation of the expected energy received at the CSs is theoretically provided and the quality of this approximation is numerically illustrated and analyzed through simulations. The existence and uniqueness of the equilibrium of the game is proved, and bounds on the Price of Anarchy (PoA) are also provided. Moreover, the model is simulated using a discrete event framework and a sensitivity analysis of the main metrics of the system with respect to the average parking duration and the power sizing coefficient is provided. The results show that the utility of EV users at equilibrium is close to the optimal utility. This study can help a Charging Point Operator (CPO) to design incentives for EV users in order for instance to limit the parking duration so as to improve the social welfare of the EV users.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49700929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing recommendations under abandonment risks: Models and algorithms 放弃风险下的推荐优化:模型与算法
IF 2.2 4区 计算机科学 Q2 Mathematics Pub Date : 2023-09-01 DOI: 10.1016/j.peva.2023.102351
Xuchuang Wang , Hong Xie , Pinghui Wang , John C.S. Lui

User abandonment behaviors are quite common in recommendation applications such as online shopping recommendation and news recommendation. To maximize its total “reward” under the risk of user abandonment, the online platform needs to carefully optimize its recommendations for its users. Because inappropriate recommendations can lead to user abandoning the platform, which results in a short learning duration and reduces the cumulative reward. To address this problem, we formulate a new online decision model and propose an algorithmic framework to transfer similar users’ information via parametric estimation, and employ this knowledge to optimize later decisions. The framework’s theoretical guarantees depend on requirements for its transfer learning oracle and online decision oracle. We then design an online learning algorithm consisting of two components that fulfills each corresponding oracle’s requirements. We also conduct extensive experiments to demonstrate our algorithm’s performance.

用户放弃行为在网上购物推荐、新闻推荐等推荐应用中相当常见。为了在用户放弃的风险下最大限度地提高其总“回报”,在线平台需要仔细优化其对用户的推荐。因为不恰当的推荐会导致用户放弃平台,从而导致学习持续时间短,并降低累积奖励。为了解决这个问题,我们建立了一个新的在线决策模型,并提出了一个算法框架,通过参数估计传递相似用户的信息,并利用这些知识来优化后续决策。该框架的理论保证取决于对迁移学习预言机和在线决策预言机的要求。然后,我们设计了一个由两个组件组成的在线学习算法,以满足每个相应oracle的需求。我们还进行了大量的实验来证明我们算法的性能。
{"title":"Optimizing recommendations under abandonment risks: Models and algorithms","authors":"Xuchuang Wang ,&nbsp;Hong Xie ,&nbsp;Pinghui Wang ,&nbsp;John C.S. Lui","doi":"10.1016/j.peva.2023.102351","DOIUrl":"https://doi.org/10.1016/j.peva.2023.102351","url":null,"abstract":"<div><p>User abandonment behaviors are quite common in recommendation applications such as online shopping recommendation and news recommendation. To maximize its total “reward” under the risk of user abandonment, the online platform needs to carefully optimize its recommendations for its users. Because inappropriate recommendations can lead to user abandoning the platform, which results in a short learning duration and reduces the cumulative reward. To address this problem, we formulate a new online decision model and propose an algorithmic framework to <em>transfer similar users’ information</em><span> via parametric estimation, and employ this knowledge to </span><em>optimize later decisions</em><span>. The framework’s theoretical guarantees depend on requirements for its transfer learning oracle and online decision oracle. We then design an online learning algorithm consisting of two components that fulfills each corresponding oracle’s requirements. We also conduct extensive experiments to demonstrate our algorithm’s performance.</span></p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49757519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CLC: A cross-level program characterization method CLC:一种跨层次的程序表征方法
IF 2.2 4区 计算机科学 Q2 Mathematics Pub Date : 2023-09-01 DOI: 10.1016/j.peva.2023.102354
Li Tang, Scott Pakin

Characterization of program execution plays a key role in performance improvement. There are numerous transformations applied to each step that a program takes on its lowering from source code to a compiler intermediate representation to machine language to microarchitecture-specific execution. The unpredictable benefit of each transformation step could lead a notionally superior algorithm to exhibit inferior performance once actually run, and it can be hard to discern which step in the transformation path contradicted the code developer’s assumptions.

Conventional approaches to program-execution characterization consider the behavior after only a single one of those steps, which limits the information that can be provided to the user. To help address the issue of myopic views of program execution, this paper presents a novel cross-level characterization approach for understanding the behavior of program execution at different levels in the process of writing, compiling, and running a program. We show that this approach provides a richer view of the sources of performance gains and losses and helps identify program execution in a more accurate manner.

程序执行的特征化在性能改进中起着关键作用。程序从源代码到编译器中间表示,从机器语言到微体系结构特定的执行,每一步都有许多转换。每个转换步骤的不可预测的好处可能会导致一个理论上优越的算法在实际运行后表现出较差的性能,而且很难辨别转换路径中的哪一步与代码开发人员的假设相矛盾。程序执行特征化的传统方法只考虑这些步骤中的一个步骤之后的行为,这限制了可以提供给用户的信息。为了帮助解决程序执行的短视问题,本文提出了一种新的跨级别表征方法,用于理解程序在编写、编译和运行过程中不同级别的执行行为。我们表明,这种方法提供了对性能增益和损失来源的更丰富的视图,并有助于以更准确的方式识别程序执行。
{"title":"CLC: A cross-level program characterization method","authors":"Li Tang,&nbsp;Scott Pakin","doi":"10.1016/j.peva.2023.102354","DOIUrl":"https://doi.org/10.1016/j.peva.2023.102354","url":null,"abstract":"<div><p>Characterization of program execution plays a key role in performance improvement. There are numerous transformations applied to each step that a program takes on its lowering from source code to a compiler intermediate representation to machine language to microarchitecture-specific execution. The unpredictable benefit of each transformation step could lead a notionally superior algorithm to exhibit inferior performance once actually run, and it can be hard to discern which step in the transformation path contradicted the code developer’s assumptions.</p><p>Conventional approaches to program-execution characterization consider the behavior after only a single one of those steps, which limits the information that can be provided to the user. To help address the issue of myopic views of program execution, this paper presents a novel cross-level characterization approach for understanding the behavior of program execution at different levels in the process of writing, compiling, and running a program. We show that this approach provides a richer view of the sources of performance gains and losses and helps identify program execution in a more accurate manner.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49701144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secrecy performance analysis of UAV-based full-duplex two-way relay NOMA system 基于无人机的全双工双向中继NOMA系统保密性能分析
IF 2.2 4区 计算机科学 Q2 Mathematics Pub Date : 2023-09-01 DOI: 10.1016/j.peva.2023.102352
Thanh Trung Nguyen , Van Toan Hoang , Manh Hoang Tran , T. Thanh Huyen Le , Xuan Nam Tran

In this paper, we investigate the secrecy performance of an unmanned aerial vehicle (UAV)-based full-duplex (FD) two-way relay non-orthogonal multiple access (TWR-NOMA) system with two terrestrial users and an eavesdropper. To ensure secure communications, a UAV acts as an aerial relay station, which not only forwards confidential information to legitimate users but also keeps emitting the jamming signal to degrade the performance of any potential eavesdropper. The ergodic secrecy rate (ESR) and secrecy outage probability (SOP) of users and the system are successfully investigated under the assumption of imperfect successive interference and self-interference cancellation. In addition, to provide a better understanding of the secrecy performance, mathematical expressions of asymptotic ESR, secrecy slope, asymptotic SOP, and secrecy diversity order are also studied. Simulation results demonstrate that the FD TWR-NOMA system attains better secrecy performance than that of the FD TWR-NOMA system with a terrestrial relay, the FD TWR-NOMA system without jamming signal, as well as the half-duplex TWR-NOMA system. The secrecy performance of the system is significantly enhanced when UAVs approach the remote user. Furthermore, there is a reasonable power allocation value for jamming and legitimate signals on the UAV to improve secrecy performance.

在本文中,我们研究了一个基于无人机的全双工(FD)双向中继非正交多址(TWR-NOMA)系统的保密性能,该系统具有两个地面用户和一个窃听器。为了确保通信安全,无人机充当空中中继站,不仅将机密信息转发给合法用户,还不断发射干扰信号,以降低任何潜在窃听者的性能。在不完全连续干扰和自干扰消除的假设下,成功地研究了用户和系统的遍历保密率(ESR)和保密中断概率(SOP)。此外,为了更好地理解保密性能,还研究了渐近ESR、保密斜率、渐近SOP和保密分集阶的数学表达式。仿真结果表明,与带地面中继的FD TWR-NOMA系统、无干扰信号的FD TWR-NOMA系统以及半双工TWR-NOMA系统相比,该系统具有更好的保密性能。当无人机接近远程用户时,系统的保密性能显著增强。此外,无人机上的干扰和合法信号有一个合理的功率分配值,以提高保密性能。
{"title":"Secrecy performance analysis of UAV-based full-duplex two-way relay NOMA system","authors":"Thanh Trung Nguyen ,&nbsp;Van Toan Hoang ,&nbsp;Manh Hoang Tran ,&nbsp;T. Thanh Huyen Le ,&nbsp;Xuan Nam Tran","doi":"10.1016/j.peva.2023.102352","DOIUrl":"https://doi.org/10.1016/j.peva.2023.102352","url":null,"abstract":"<div><p><span><span>In this paper, we investigate the secrecy performance of an unmanned aerial vehicle (UAV)-based full-duplex (FD) two-way relay non-orthogonal multiple access (TWR-NOMA) system with two terrestrial users and an eavesdropper. To ensure secure communications, a UAV acts as an aerial relay station, which not only forwards confidential information to legitimate users but also keeps emitting the jamming signal to degrade the performance of any potential eavesdropper. The ergodic secrecy rate (ESR) and secrecy outage </span>probability (SOP) of users and the system are successfully investigated under the assumption of imperfect successive interference and self-interference cancellation. In addition, to provide a better understanding of the secrecy performance, mathematical expressions of asymptotic ESR, secrecy slope, asymptotic SOP, and secrecy </span>diversity order<span> are also studied. Simulation results demonstrate that the FD TWR-NOMA system attains better secrecy performance than that of the FD TWR-NOMA system with a terrestrial relay, the FD TWR-NOMA system without jamming signal, as well as the half-duplex TWR-NOMA system. The secrecy performance of the system is significantly enhanced when UAVs approach the remote user. Furthermore, there is a reasonable power allocation value for jamming and legitimate signals on the UAV to improve secrecy performance.</span></p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49756691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Resource allocation for URLLC and eMBB traffic in uplink wireless networks 无线上行网络中URLLC和eMBB业务的资源分配
IF 2.2 4区 计算机科学 Q2 Mathematics Pub Date : 2023-09-01 DOI: 10.1016/j.peva.2023.102353
Duan-Shin Lee , Cheng-Shang Chang , Ruhui Zhang , Mao-Pin Lee

In this paper we consider two resource allocation problems of URLLC traffic and eMBB traffic in uplink 5G networks. We propose to divide frequencies into a common region and a grant-based region. Frequencies in the grant-based region can only be used by eMBB traffic, while frequencies in the common region can be used by eMBB traffic as well as URLLC traffic. In the first resource allocation problem we propose a two-player game to address the size of the grant-based region and the size of the common region. We show that this game has specific pure Nash equilibria. In the second resource allocation problem we determine the number of bits that each eMBB user can transmit in a request-grant cycle. We propose a constrained optimization problem to minimize the variance of the number of bits granted to the eMBB users. We show that a water-filling algorithm solves this constrained optimization problem. From simulation, we show that our scheme, consisting of resource allocation according to Nash equilibria of a game, persistent random transmission of URLLC packets and allocation of eMBB packets by a water-filling algorithm, works better than four other heuristic methods.

在本文中,我们考虑了上行链路5G网络中URLLC流量和eMBB流量的两个资源分配问题。我们建议将频率划分为一个共同区域和一个基于拨款的区域。基于授权的区域中的频率只能由eMBB流量使用,而公共区域中的频谱可以由eMBB以及URLLC流量使用。在第一个资源分配问题中,我们提出了一个两人博弈来解决基于授权的区域的大小和公共区域的大小。我们证明了此对策具有特定的纯纳什均衡。在第二个资源分配问题中,我们确定每个eMBB用户在请求授权周期中可以发送的比特数。我们提出了一个约束优化问题,以最小化授予eMBB用户的比特数的方差。我们证明了注水算法解决了这个约束优化问题。通过仿真,我们表明,我们的方案,包括根据博弈的纳什均衡进行资源分配,URLLC分组的持久随机传输和eMBB分组的注水算法分配,比其他四种启发式方法效果更好。
{"title":"Resource allocation for URLLC and eMBB traffic in uplink wireless networks","authors":"Duan-Shin Lee ,&nbsp;Cheng-Shang Chang ,&nbsp;Ruhui Zhang ,&nbsp;Mao-Pin Lee","doi":"10.1016/j.peva.2023.102353","DOIUrl":"https://doi.org/10.1016/j.peva.2023.102353","url":null,"abstract":"<div><p><span><span>In this paper we consider two resource allocation problems of URLLC<span> traffic and eMBB traffic in uplink </span></span>5G networks. We propose to divide frequencies into a common region and a grant-based region. Frequencies in the grant-based region can only be used by eMBB traffic, while frequencies in the common region can be used by eMBB traffic as well as URLLC traffic. In the first resource allocation problem we propose a two-player game to address the size of the grant-based region and the size of the common region. We show that this game has specific pure </span>Nash equilibria<span><span>. In the second resource allocation problem we determine the number of bits that each eMBB user can transmit in a request-grant cycle. We propose a constrained optimization problem to minimize the variance of the number of bits granted to the eMBB users. We show that a water-filling algorithm solves this constrained optimization problem. From simulation, we show that our scheme, consisting of resource allocation according to Nash equilibria of a game, persistent random transmission of URLLC packets and allocation of eMBB packets by a water-filling algorithm, works better than four other </span>heuristic methods.</span></p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49701143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stability of a stochastic ring network 随机环网络的稳定性
IF 2.2 4区 计算机科学 Q2 Mathematics Pub Date : 2023-08-28 DOI: 10.1016/j.peva.2023.102355
Pieter Jacob Storm , Wouter Kager , Michel Mandjes , Sem Borst

In this paper we establish a necessary and sufficient stability condition for a stochastic ring network. Such networks naturally appear in a variety of applications within communication, computer, and road traffic systems. They typically involve multiple customer types and some form of priority structure to decide which customer receives service. These two system features tend to complicate the issue of identifying a stability condition, but we demonstrate how the ring topology can be leveraged to solve the problem.

本文建立了随机环网络稳定的一个充要条件。这种网络自然出现在通信、计算机和道路交通系统中的各种应用中。它们通常涉及多种客户类型和某种形式的优先级结构,以决定哪个客户接受服务。这两个系统特征往往会使确定稳定性条件的问题复杂化,但我们展示了如何利用环形拓扑来解决问题。
{"title":"Stability of a stochastic ring network","authors":"Pieter Jacob Storm ,&nbsp;Wouter Kager ,&nbsp;Michel Mandjes ,&nbsp;Sem Borst","doi":"10.1016/j.peva.2023.102355","DOIUrl":"https://doi.org/10.1016/j.peva.2023.102355","url":null,"abstract":"<div><p>In this paper we establish a necessary and sufficient stability condition for a stochastic ring network. Such networks naturally appear in a variety of applications within communication, computer, and road traffic systems. They typically involve <em>multiple customer types</em> and some form of <em>priority structure</em> to decide which customer receives service. These two system features tend to complicate the issue of identifying a stability condition, but we demonstrate how the ring topology can be leveraged to solve the problem.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49874547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient and accurate Lyapunov function-based truncation technique for multi-dimensional Markov chains with applications to discriminatory processor sharing and priority queues 基于Lyapunov函数的多维马尔可夫链截断技术及其在判别处理器共享和优先级队列中的应用
IF 2.2 4区 计算机科学 Q2 Mathematics Pub Date : 2023-08-10 DOI: 10.1016/j.peva.2023.102356
Gagan Somashekar , Mohammad Delasay , Anshul Gandhi

Online service providers aim to satisfy the tail performance requirements of customers through Service-Level Objectives (SLOs). One approach to ensure tail performance requirements is to model the service as a Markov chain and obtain its steady-state probability distribution. However, obtaining the distribution can be challenging, if not impossible, for certain types of Markov chains, such as those with multi-dimensional or infinite state-space and state-dependent transitions. Examples include M/M/1 with Discriminatory Processor Sharing (DPS) and preemptive M/M/c with multiple priority classes and customer abandonment.

To address this fundamental problem, we propose a Lyapunov function-based state-space truncation technique that leverages moments or bounds on moments of the state variables. This technique allows us to obtain tight truncation bounds while ensuring arbitrary probability mass guarantees for the truncated chain. We highlight the efficacy of our technique for multi-dimensional DPS and M/M/c priority queue with abandonment, demonstrating a substantial reduction in state space (up to 74%) compared to existing approaches. Additionally, we present three practical use cases that highlight the applicability of our truncation technique by analyzing the performance of the DPS system.

在线服务提供商的目标是通过服务水平目标(service - level Objectives, slo)来满足客户的尾部性能需求。一种确保尾部性能要求的方法是将服务建模为马尔可夫链,并获得其稳态概率分布。然而,对于某些类型的马尔可夫链,例如具有多维或无限状态空间和状态依赖转换的马尔可夫链,获得分布可能是具有挑战性的,如果不是不可能的话。例子包括具有歧视性处理器共享(DPS)的M/M/1和具有多个优先级类和客户放弃的抢占式M/M/c。为了解决这个基本问题,我们提出了一种基于李雅普诺夫函数的状态空间截断技术,该技术利用状态变量的矩或矩界。这种技术允许我们在保证截断链的任意概率质量保证的同时获得严密的截断边界。我们强调了我们的技术在多维DPS和带放弃的M/M/c优先队列中的有效性,与现有方法相比,显示了状态空间的大幅减少(高达74%)。此外,我们提出了三个实际用例,通过分析DPS系统的性能来突出我们的截断技术的适用性。
{"title":"Efficient and accurate Lyapunov function-based truncation technique for multi-dimensional Markov chains with applications to discriminatory processor sharing and priority queues","authors":"Gagan Somashekar ,&nbsp;Mohammad Delasay ,&nbsp;Anshul Gandhi","doi":"10.1016/j.peva.2023.102356","DOIUrl":"https://doi.org/10.1016/j.peva.2023.102356","url":null,"abstract":"<div><p>Online service providers aim to satisfy the tail performance requirements of customers through Service-Level Objectives (SLOs). One approach to ensure tail performance requirements is to model the service as a Markov chain and obtain its steady-state probability distribution. However, obtaining the distribution can be challenging, if not impossible, for certain types of Markov chains, such as those with multi-dimensional or infinite state-space and state-dependent transitions. Examples include M/M/1 with Discriminatory Processor Sharing (DPS) and preemptive M/M/c with multiple priority classes and customer abandonment.</p><p>To address this fundamental problem, we propose a Lyapunov function-based state-space truncation technique that leverages moments or bounds on moments of the state variables. This technique allows us to obtain tight truncation bounds while ensuring arbitrary probability mass guarantees for the truncated chain. We highlight the efficacy of our technique for multi-dimensional DPS and M/M/c priority queue with abandonment, demonstrating a substantial reduction in state space (up to 74%) compared to existing approaches. Additionally, we present three practical use cases that highlight the applicability of our truncation technique by analyzing the performance of the DPS system.</p></div>","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49874544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reflections on good practice in evaluating Violence Reduction Units: Experiences from across England and Wales 对评估减少暴力单位良好做法的思考:来自英格兰和威尔士各地的经验
IF 2.2 4区 计算机科学 Q2 Mathematics Pub Date : 2023-07-01 DOI: 10.1177/13563890231183993
L. Caulfield, Z. Quigg, Nicole M. Adams-Quackenbush, H. Timpson, Sophie Wilson
Internationally, interpersonal violence places huge burdens on the health, wellbeing and prosperity of society. In response to a notable increase in serious knife crime, in 2019, the UK Government awarded £35 million for the establishment of 18 Violence Reduction Units (VRUs) across England and Wales. There has been limited evaluation of community-level approaches for violence, with almost no published literature on the impact of VRUs. The article presents the approaches and experiences of two interdisciplinary teams of researchers from public health, psychology, criminology, and systems change, working as evaluators of four VRUs in England and Wales. The article describes the value of adopting a whole-system approach to evaluations, outlines good practice in evaluating VRUs, and elicits challenges to developing and embedding evaluation within complex systems.
在国际上,人际暴力给社会的健康、福祉和繁荣带来巨大负担。为应对严重持刀犯罪的显著增加,2019年,英国政府拨款3500万英镑,在英格兰和威尔士建立了18个减少暴力单位。对社区层面的暴力处理方法的评估有限,几乎没有关于虚拟吸毒者影响的已发表文献。本文介绍了来自公共卫生、心理学、犯罪学和系统变化的两个跨学科研究小组的方法和经验,他们作为英格兰和威尔士四个虚拟现实单位的评估者。本文描述了采用全系统方法进行评估的价值,概述了评估vru的良好做法,并引出了在复杂系统中开发和嵌入评估的挑战。
{"title":"Reflections on good practice in evaluating Violence Reduction Units: Experiences from across England and Wales","authors":"L. Caulfield, Z. Quigg, Nicole M. Adams-Quackenbush, H. Timpson, Sophie Wilson","doi":"10.1177/13563890231183993","DOIUrl":"https://doi.org/10.1177/13563890231183993","url":null,"abstract":"Internationally, interpersonal violence places huge burdens on the health, wellbeing and prosperity of society. In response to a notable increase in serious knife crime, in 2019, the UK Government awarded £35 million for the establishment of 18 Violence Reduction Units (VRUs) across England and Wales. There has been limited evaluation of community-level approaches for violence, with almost no published literature on the impact of VRUs. The article presents the approaches and experiences of two interdisciplinary teams of researchers from public health, psychology, criminology, and systems change, working as evaluators of four VRUs in England and Wales. The article describes the value of adopting a whole-system approach to evaluations, outlines good practice in evaluating VRUs, and elicits challenges to developing and embedding evaluation within complex systems.","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81446590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Giving critical theoretical and evaluation practice context to ‘Testing, Testing’ in Jamaica 为牙买加的“测试,测试”提供关键的理论和评估实践背景
IF 2.2 4区 计算机科学 Q2 Mathematics Pub Date : 2023-07-01 DOI: 10.1177/13563890231184274
D. Leslie, Keenan Falconer, Chantol Dormer, Thelma White
This article examines how evaluability assessments can be designed and conducted to generate meaningful and actionable results for reducing youth crime in Jamaica. It draws on case illustrations from the 2021 ‘Testing, Testing’ CAPRI research study report to highlight the nexus between research and evaluation and promote adopting practices that can enhance the quality and relevance of evaluations conducted within the Caribbean region and beyond. The findings suggest that data needed to inform evaluation and evidenced-based policymaking remain limited despite re-energised regional and global efforts to address this challenge. Particularly, low data quality, production, and use continue to hinder measuring progress on the Sustainable Development Goals. The article, therefore, offers an accessible decolonising framework for understanding, supporting and critically assessing how inertia within the context of evaluation practice can be challenged. Concrete suggestions for action include using local knowledge and underutilised techniques such as evaluability assessments.
本文探讨了如何设计和实施可评估性评估,以产生有意义和可操作的结果,以减少牙买加的青少年犯罪。它借鉴了2021年“测试,测试”CAPRI研究报告中的案例说明,以突出研究与评估之间的联系,并促进采用可提高加勒比地区内外开展的评估的质量和相关性的做法。研究结果表明,尽管区域和全球为应对这一挑战重新注入了活力,但为评估和基于证据的决策提供信息所需的数据仍然有限。特别是,低质量的数据、生产和使用继续阻碍衡量可持续发展目标的进展。因此,本文提供了一个易于理解的非殖民化框架,用于理解、支持和批判性地评估如何挑战评估实践背景下的惯性。具体的行动建议包括利用当地知识和未充分利用的技术,如可评价性评估。
{"title":"Giving critical theoretical and evaluation practice context to ‘Testing, Testing’ in Jamaica","authors":"D. Leslie, Keenan Falconer, Chantol Dormer, Thelma White","doi":"10.1177/13563890231184274","DOIUrl":"https://doi.org/10.1177/13563890231184274","url":null,"abstract":"This article examines how evaluability assessments can be designed and conducted to generate meaningful and actionable results for reducing youth crime in Jamaica. It draws on case illustrations from the 2021 ‘Testing, Testing’ CAPRI research study report to highlight the nexus between research and evaluation and promote adopting practices that can enhance the quality and relevance of evaluations conducted within the Caribbean region and beyond. The findings suggest that data needed to inform evaluation and evidenced-based policymaking remain limited despite re-energised regional and global efforts to address this challenge. Particularly, low data quality, production, and use continue to hinder measuring progress on the Sustainable Development Goals. The article, therefore, offers an accessible decolonising framework for understanding, supporting and critically assessing how inertia within the context of evaluation practice can be challenged. Concrete suggestions for action include using local knowledge and underutilised techniques such as evaluability assessments.","PeriodicalId":19964,"journal":{"name":"Performance Evaluation","volume":null,"pages":null},"PeriodicalIF":2.2,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90322153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Performance Evaluation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1