首页 > 最新文献

Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems最新文献

英文 中文
The Cost of Uncertainty in Curing Epidemics 治疗流行病的不确定性的代价
Jessica Hoffmann, C. Caramanis
Epidemic models are used across biological and social sciences, engineering, and computer science, and have had important impact in the study of the dynamics of human disease and computer viruses, but also trends rumors, viral videos, and most recently the spread of fake news on social networks. In this paper, we focus on epidemics propagating on a graph, as introduced by the seminal paper [5]. In particular, we consider so-called SI models (see below for a precise definition) where an infected node can only propagate the infection to its non-infected neighbor, as opposed to the fully mixed models considered in the early literature. This graph-based approach provides a more realistic model, in which the spread of the epidemic is determined by the connectivity of the graph, and accordingly some nodes may play a larger role than others in the spread of the infection.
流行病模型广泛应用于生物科学、社会科学、工程学和计算机科学,对人类疾病和计算机病毒的动态研究产生了重要影响,也对谣言趋势、病毒视频以及最近在社交网络上传播的假新闻产生了重要影响。在这篇论文中,我们关注的是流行病在图上的传播,这是由开创性论文[5]介绍的。特别是,我们考虑了所谓的SI模型(精确定义见下文),其中感染节点只能将感染传播给未感染的邻居,而不是早期文献中考虑的完全混合模型。这种基于图的方法提供了一个更现实的模型,其中流行病的传播是由图的连通性决定的,因此一些节点在感染的传播中可能比其他节点发挥更大的作用。
{"title":"The Cost of Uncertainty in Curing Epidemics","authors":"Jessica Hoffmann, C. Caramanis","doi":"10.1145/3219617.3219622","DOIUrl":"https://doi.org/10.1145/3219617.3219622","url":null,"abstract":"Epidemic models are used across biological and social sciences, engineering, and computer science, and have had important impact in the study of the dynamics of human disease and computer viruses, but also trends rumors, viral videos, and most recently the spread of fake news on social networks. In this paper, we focus on epidemics propagating on a graph, as introduced by the seminal paper [5]. In particular, we consider so-called SI models (see below for a precise definition) where an infected node can only propagate the infection to its non-infected neighbor, as opposed to the fully mixed models considered in the early literature. This graph-based approach provides a more realistic model, in which the spread of the epidemic is determined by the connectivity of the graph, and accordingly some nodes may play a larger role than others in the spread of the infection.","PeriodicalId":210440,"journal":{"name":"Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116410976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Practical Bounds on Optimal Caching with Variable Object Sizes 可变对象大小的最优缓存的实际边界
Daniel S. Berger, Nathan Beckmann, Mor Harchol-Balter
Many recent caching systems aim to improve miss ratios, but there is no good sense among practitioners of how much further miss ratios can be improved. In other words, should the systems community continue working on this problem? Currently, there is no principled answer to this question. In practice, object sizes often vary by several orders of magnitude, where computing the optimal miss ratio (OPT) is known to be NP-hard. The few known results on caching with variable object sizes provide very weak bounds and are impractical to compute on traces of realistic length. We propose a new method to compute upper and lower bounds on OPT. Our key insight is to represent caching as a min-cost flow problem, hence we call our method the flow-based offline optimal (FOO). We prove that, under simple independence assumptions, FOO's bounds become tight as the number of objects goes to infinity. Indeed, FOO's error over 10M requests of production CDN and storage traces is negligible: at most 0.3%. FOO thus reveals, for the first time, the limits of caching with variable object sizes. While FOO is very accurate, it is computationally impractical on traces with hundreds of millions of requests. We therefore extend FOO to obtain more efficient bounds on OPT, which we call practical flow-based offline optimal (PFOO). We evaluate PFOO on several full production traces and use it to compare OPT to prior online policies. This analysis shows that current caching systems are in fact still far from optimal, suffering 11-43% more cache misses than OPT, whereas the best prior offline bounds suggest that there is essentially no room for improvement.
许多最新的缓存系统都旨在提高未命中率,但是在从业者中没有很好的意识到未命中率可以进一步提高多少。换句话说,系统社区应该继续解决这个问题吗?目前,这个问题没有原则性的答案。在实践中,对象大小经常变化几个数量级,其中计算最佳脱靶率(OPT)被认为是np困难的。关于可变对象大小的缓存的几个已知结果提供了非常弱的边界,并且在实际长度的轨迹上计算是不切实际的。我们提出了一种计算OPT上界和下界的新方法。我们的关键观点是将缓存表示为最小成本流问题,因此我们称我们的方法为基于流的离线最优(FOO)。我们证明,在简单的独立性假设下,当对象的数量趋于无穷大时,FOO的边界变得紧密。实际上,FOO在生产CDN和存储跟踪的10M请求上的错误可以忽略不计:最多0.3%。因此,FOO首次揭示了使用可变对象大小进行缓存的限制。虽然FOO非常精确,但是对于数亿个请求的跟踪来说,它在计算上是不切实际的。因此,我们扩展FOO以获得更有效的OPT边界,我们称之为实际基于流的离线最优(PFOO)。我们在几个完整的生产轨迹上评估PFOO,并用它来比较OPT与之前的在线策略。这一分析表明,当前的缓存系统实际上仍远未达到最佳状态,比OPT的缓存丢失率高出11-43%,而最佳的先前离线边界表明基本上没有改进的余地。
{"title":"Practical Bounds on Optimal Caching with Variable Object Sizes","authors":"Daniel S. Berger, Nathan Beckmann, Mor Harchol-Balter","doi":"10.1145/3219617.3219627","DOIUrl":"https://doi.org/10.1145/3219617.3219627","url":null,"abstract":"Many recent caching systems aim to improve miss ratios, but there is no good sense among practitioners of how much further miss ratios can be improved. In other words, should the systems community continue working on this problem? Currently, there is no principled answer to this question. In practice, object sizes often vary by several orders of magnitude, where computing the optimal miss ratio (OPT) is known to be NP-hard. The few known results on caching with variable object sizes provide very weak bounds and are impractical to compute on traces of realistic length. We propose a new method to compute upper and lower bounds on OPT. Our key insight is to represent caching as a min-cost flow problem, hence we call our method the flow-based offline optimal (FOO). We prove that, under simple independence assumptions, FOO's bounds become tight as the number of objects goes to infinity. Indeed, FOO's error over 10M requests of production CDN and storage traces is negligible: at most 0.3%. FOO thus reveals, for the first time, the limits of caching with variable object sizes. While FOO is very accurate, it is computationally impractical on traces with hundreds of millions of requests. We therefore extend FOO to obtain more efficient bounds on OPT, which we call practical flow-based offline optimal (PFOO). We evaluate PFOO on several full production traces and use it to compare OPT to prior online policies. This analysis shows that current caching systems are in fact still far from optimal, suffering 11-43% more cache misses than OPT, whereas the best prior offline bounds suggest that there is essentially no room for improvement.","PeriodicalId":210440,"journal":{"name":"Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125917414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees 蒲公英++:具有正式匿名保证的轻量级加密货币网络
G. Fanti, S. Venkatakrishnan, Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew K. Miller, P. Viswanath
Recent work has demonstrated significant anonymity vulnerabilities in Bitcoin's networking stack. In particular, the current mechanism for broadcasting Bitcoin transactions allows third-party observers to link transactions to the IP addresses that originated them. This lays the groundwork for low-cost, large-scale deanonymization attacks. In this work, we present Dandelion++, a first-principles defense against large-scale deanonymization attacks with near-optimal information-theoretic guarantees. Dandelion++ builds upon a recent proposal called Dandelion that exhibited similar goals. However, in this paper, we highlight some simplifying assumptions made in Dandelion, and show how they can lead to serious deanonymization attacks when violated. In contrast, Dandelion++ defends against stronger adversaries that are allowed to disobey protocol. Dandleion++ is lightweight, scalable, and completely interoperable with the existing Bitcoin network.We evaluate it through experiments on Bitcoin's mainnet (i.e., the live Bitcoin network) to demonstrate its interoperability and low broadcast latency overhead.
最近的研究表明,比特币网络堆栈中存在严重的匿名性漏洞。特别是,目前广播比特币交易的机制允许第三方观察者将交易链接到发起交易的IP地址。这为低成本、大规模的去匿名化攻击奠定了基础。在这项工作中,我们提出了dandelion++,这是一种具有接近最优信息论保证的大规模去匿名化攻击的第一原理防御。蒲公英++基于最近一个名为Dandelion的提案,该提案展示了类似的目标。然而,在本文中,我们强调了在Dandelion中做出的一些简化假设,并展示了它们如何在违反时导致严重的去匿名化攻击。与此相反,Dandelion++防御那些被允许违反协议的更强大的对手。dandleion++是轻量级的,可扩展的,并且与现有的比特币网络完全可互操作。我们通过在比特币主网(即实时比特币网络)上的实验来评估它,以证明其互操作性和低广播延迟开销。
{"title":"Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees","authors":"G. Fanti, S. Venkatakrishnan, Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew K. Miller, P. Viswanath","doi":"10.1145/3219617.3219620","DOIUrl":"https://doi.org/10.1145/3219617.3219620","url":null,"abstract":"Recent work has demonstrated significant anonymity vulnerabilities in Bitcoin's networking stack. In particular, the current mechanism for broadcasting Bitcoin transactions allows third-party observers to link transactions to the IP addresses that originated them. This lays the groundwork for low-cost, large-scale deanonymization attacks. In this work, we present Dandelion++, a first-principles defense against large-scale deanonymization attacks with near-optimal information-theoretic guarantees. Dandelion++ builds upon a recent proposal called Dandelion that exhibited similar goals. However, in this paper, we highlight some simplifying assumptions made in Dandelion, and show how they can lead to serious deanonymization attacks when violated. In contrast, Dandelion++ defends against stronger adversaries that are allowed to disobey protocol. Dandleion++ is lightweight, scalable, and completely interoperable with the existing Bitcoin network.We evaluate it through experiments on Bitcoin's mainnet (i.e., the live Bitcoin network) to demonstrate its interoperability and low broadcast latency overhead.","PeriodicalId":210440,"journal":{"name":"Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114690688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 83
Fork and Join Queueing Networks with Heavy Tails: Scaling Dimension and Throughput Limit 重尾分叉和连接排队网络:扩展维度和吞吐量限制
Yun Zeng, Jian Tan, Cathy H. Xia
Parallel and distributed computing systems are foundational to the success of cloud computing and big data analytics. Fork-Join Queueing Networks with Blocking (FJQN/Bs) are natural models for such systems. While engineering solutions have long been made to build and scale such systems, it is challenging to rigorously characterize the throughput performance of ever-growing systems, especially in the presence of heavy-tailed delays. In this paper, we utilize an infinite sequence of FJQN/Bs to study the throughput limit and focus on regularly varying service times with index α>1. We introduce two novel geometric concepts - scaling dimension and extended metric dimension - and show that an infinite sequence of FJQN/Bs is throughput scalable if the extended metric dimension <α-1 and only if the scaling dimension łe α-1. These results provide new insights on the scalability of a rich class of FJQN/Bs.
并行和分布式计算系统是云计算和大数据分析成功的基础。带有阻塞的分叉连接排队网络(FJQN/ b)是这种系统的自然模型。虽然工程解决方案长期以来一直用于构建和扩展此类系统,但严格描述不断增长的系统的吞吐量性能是一项挑战,特别是在存在重尾延迟的情况下。本文利用FJQN/ b无穷序列来研究其吞吐量极限,重点研究服务时间有规律变化且指标α>1的问题。我们引入了两个新的几何概念-缩放维数和扩展度量维数,并证明了FJQN/ b无穷序列在扩展度量维数<α-1且缩放维数łe α-1时是吞吐量可伸缩的。这些结果为富类FJQN/ b的可扩展性提供了新的见解。
{"title":"Fork and Join Queueing Networks with Heavy Tails: Scaling Dimension and Throughput Limit","authors":"Yun Zeng, Jian Tan, Cathy H. Xia","doi":"10.1145/3219617.3219668","DOIUrl":"https://doi.org/10.1145/3219617.3219668","url":null,"abstract":"Parallel and distributed computing systems are foundational to the success of cloud computing and big data analytics. Fork-Join Queueing Networks with Blocking (FJQN/Bs) are natural models for such systems. While engineering solutions have long been made to build and scale such systems, it is challenging to rigorously characterize the throughput performance of ever-growing systems, especially in the presence of heavy-tailed delays. In this paper, we utilize an infinite sequence of FJQN/Bs to study the throughput limit and focus on regularly varying service times with index α>1. We introduce two novel geometric concepts - scaling dimension and extended metric dimension - and show that an infinite sequence of FJQN/Bs is throughput scalable if the extended metric dimension <α-1 and only if the scaling dimension łe α-1. These results provide new insights on the scalability of a rich class of FJQN/Bs.","PeriodicalId":210440,"journal":{"name":"Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-05-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129884842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Multi-armed Bandit with Additional Observations 多手强盗与额外的观察
Donggyu Yun, Sumyeong Ahn, A. Proutière, Jinwoo Shin, Yung Yi
We study multi-armed bandit (MAB) problems with additional observations, where in each round, the decision maker selects an arm to play and can also observe rewards of additional arms (within a given budget) by paying certain costs. We propose algorithms that are asymptotic-optimal and order-optimal in their regrets under the settings of stochastic and adversarial rewards, respectively.
我们用额外的观察来研究多臂盗匪(MAB)问题,在每一轮中,决策者选择一只手臂来玩,并通过支付一定的成本来观察额外武器的奖励(在给定的预算范围内)。我们分别提出了在随机奖励和对抗性奖励设置下的懊悔算法的渐近最优和序最优。
{"title":"Multi-armed Bandit with Additional Observations","authors":"Donggyu Yun, Sumyeong Ahn, A. Proutière, Jinwoo Shin, Yung Yi","doi":"10.1145/3219617.3219639","DOIUrl":"https://doi.org/10.1145/3219617.3219639","url":null,"abstract":"We study multi-armed bandit (MAB) problems with additional observations, where in each round, the decision maker selects an arm to play and can also observe rewards of additional arms (within a given budget) by paying certain costs. We propose algorithms that are asymptotic-optimal and order-optimal in their regrets under the settings of stochastic and adversarial rewards, respectively.","PeriodicalId":210440,"journal":{"name":"Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126536410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Power-of-d-choices with Least Loaded Server Selection 关于最少负载服务器选择的功率选择
T. Hellemans, B. V. Houdt
Motivated by distributed schedulers that combine the power-of-d-choices with late binding and systems that use replication with cancellation-on-start, we study the performance of the LL(d) policy which assigns a job to a server that currently has the least workload among d randomly selected servers in large-scale homogeneous clusters. We consider general job size distributions and propose a partial integro-differential equation to describe the evolution of the system. This equation relies on the earlier proven ansatz for LL(d) which asserts that the workload distribution of any finite set of queues becomes independent of one another as the number of servers tends to infinity. Based on this equation we propose a fixed point iteration for the limiting workload distribution and study its convergence.
受将power-of-d选择与延迟绑定相结合的分布式调度程序和使用复制与启动时取消的系统的激励,我们研究了LL(d)策略的性能,该策略将作业分配给大规模同质集群中随机选择的d台服务器中当前工作量最小的服务器。我们考虑了一般的作业规模分布,并提出了一个描述系统演化的偏积分微分方程。该方程依赖于先前证明的LL(d)的分析,该分析断言,随着服务器数量趋于无穷大,任何有限队列集合的工作负载分布变得相互独立。在此方程的基础上,提出了极限负荷分配的不动点迭代算法,并研究了其收敛性。
{"title":"On the Power-of-d-choices with Least Loaded Server Selection","authors":"T. Hellemans, B. V. Houdt","doi":"10.1145/3219617.3219664","DOIUrl":"https://doi.org/10.1145/3219617.3219664","url":null,"abstract":"Motivated by distributed schedulers that combine the power-of-d-choices with late binding and systems that use replication with cancellation-on-start, we study the performance of the LL(d) policy which assigns a job to a server that currently has the least workload among d randomly selected servers in large-scale homogeneous clusters. We consider general job size distributions and propose a partial integro-differential equation to describe the evolution of the system. This equation relies on the earlier proven ansatz for LL(d) which asserts that the workload distribution of any finite set of queues becomes independent of one another as the number of servers tends to infinity. Based on this equation we propose a fixed point iteration for the limiting workload distribution and study its convergence.","PeriodicalId":210440,"journal":{"name":"Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2018-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126529141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
A Refined Mean Field Approximation 一个改进的平均场近似
Nicolas Gast, B. V. Houdt
Stochastic models have been used to assess the performance of computer (and other) systems for many decades. As a direct analysis of large and complex stochastic models is often prohibitive, approximations methods to study their behavior have been devised. One very popular approximation method relies on mean field theory. Its widespread use can be explained by the relative ease involved to define and solve a mean field model in combination with its high accuracy for large systems.
几十年来,随机模型一直被用于评估计算机(和其他)系统的性能。由于对大型和复杂的随机模型的直接分析往往是禁止的,因此设计了近似方法来研究它们的行为。一种非常流行的近似方法依赖于平均场理论。它的广泛应用可以解释为相对容易定义和求解平均场模型,以及它对大型系统的高精度。
{"title":"A Refined Mean Field Approximation","authors":"Nicolas Gast, B. V. Houdt","doi":"10.1145/3219617.3219663","DOIUrl":"https://doi.org/10.1145/3219617.3219663","url":null,"abstract":"Stochastic models have been used to assess the performance of computer (and other) systems for many decades. As a direct analysis of large and complex stochastic models is often prohibitive, approximations methods to study their behavior have been devised. One very popular approximation method relies on mean field theory. Its widespread use can be explained by the relative ease involved to define and solve a mean field model in combination with its high accuracy for large systems.","PeriodicalId":210440,"journal":{"name":"Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123152572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 60
On Non-Preemptive VM Scheduling in the Cloud 云中的虚拟机非抢占调度
Konstantinos Psychas, Javad Ghaderi
We study the problem of scheduling VMs (Virtual Machines) in a distributed server platform, motivated by cloud computing applications. The VMs arrive dynamically over time to the system, and require a certain amount of resources (e.g. memory, CPU, etc) for the duration of their service. To avoid costly preemptions, we consider non-preemptive scheduling: Each VM has to be assigned to a server which has enough residual capacity to accommodate it, and once a VM is assigned to a server, its service cannot be disrupted (preempted). Prior approaches to this problem either have high complexity, require synchronization among the servers, or yield queue sizes/delays which are excessively large. We propose a non-preemptive scheduling algorithm that resolves these issues. In general, given an approximation algorithm to Knapsack with approximation ratio r , our scheduling algorithm can provide rβ fraction of the throughput region for β < r. In the special case of a greedy approximation algorithm to Knapsack, we further show that this condition can be relaxed to β<1. The parameters β and r can be tuned to provide a tradeoff between achievable throughput, delay, and computational complexity of the scheduling algorithm. Finally extensive simulation results using both synthetic and real traffic traces are presented to verify the performance of our algorithm.
在云计算应用的驱动下,我们研究了分布式服务器平台上的虚拟机调度问题。随着时间的推移,虚拟机动态到达系统,并且在其服务期间需要一定数量的资源(例如内存,CPU等)。为了避免代价高昂的抢占,我们考虑非抢占式调度:每个VM必须分配到一个有足够剩余容量来容纳它的服务器上,并且一旦VM被分配到一个服务器上,它的服务就不会被中断(抢占)。先前解决这个问题的方法要么非常复杂,需要在服务器之间进行同步,要么产生过大的队列大小/延迟。我们提出了一种非抢占式调度算法来解决这些问题。在一般情况下,给定一个近似比为r的近似算法,我们的调度算法可以在β< r时提供rβ分数的吞吐量区域。在一个贪心近似算法的特殊情况下,我们进一步证明了这个条件可以松弛到β<1。参数β和r可以调优,以提供可实现的吞吐量,延迟和调度算法的计算复杂性之间的权衡。最后给出了综合和真实流量轨迹的大量仿真结果,验证了算法的性能。
{"title":"On Non-Preemptive VM Scheduling in the Cloud","authors":"Konstantinos Psychas, Javad Ghaderi","doi":"10.1145/3219617.3219644","DOIUrl":"https://doi.org/10.1145/3219617.3219644","url":null,"abstract":"We study the problem of scheduling VMs (Virtual Machines) in a distributed server platform, motivated by cloud computing applications. The VMs arrive dynamically over time to the system, and require a certain amount of resources (e.g. memory, CPU, etc) for the duration of their service. To avoid costly preemptions, we consider non-preemptive scheduling: Each VM has to be assigned to a server which has enough residual capacity to accommodate it, and once a VM is assigned to a server, its service cannot be disrupted (preempted). Prior approaches to this problem either have high complexity, require synchronization among the servers, or yield queue sizes/delays which are excessively large. We propose a non-preemptive scheduling algorithm that resolves these issues. In general, given an approximation algorithm to Knapsack with approximation ratio r , our scheduling algorithm can provide rβ fraction of the throughput region for β < r. In the special case of a greedy approximation algorithm to Knapsack, we further show that this condition can be relaxed to β<1. The parameters β and r can be tuned to provide a tradeoff between achievable throughput, delay, and computational complexity of the scheduling algorithm. Finally extensive simulation results using both synthetic and real traffic traces are presented to verify the performance of our algorithm.","PeriodicalId":210440,"journal":{"name":"Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126377420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance of Balanced Fairness in Resource Pools: A Recursive Approach 资源池中平衡公平性的性能:递归方法
T. Bonald, Céline Comte, Fabien Mathieu
Understanding the performance of a pool of servers is crucial for proper dimensioning. One of the main challenges is to take into account the complex interactions between servers that are pooled to process jobs. In particular, a job can generally not be processed by any server of the cluster due to various constraints like data locality. In this paper, we represent these constraints by some assignment graph between jobs and servers. We present a recursive approach to computing performance metrics like mean response times when the server capacities are shared according to balanced fairness. While the computational cost of these formulas can be exponential in the number of servers in the worst case, we illustrate their practical interest by introducing broad classes of pool structures that can be exactly analyzed in polynomial time. This extends considerably the class of models for which explicit performance metrics are accessible.
了解服务器池的性能对于正确地划分维度至关重要。其中一个主要的挑战是要考虑服务器之间的复杂交互,这些服务器汇集在一起处理作业。特别是,由于数据局部性等各种限制,作业通常不能由集群的任何服务器处理。在本文中,我们用作业和服务器之间的分配图来表示这些约束。我们提出了一种递归方法来计算性能指标,如根据平衡公平性共享服务器容量时的平均响应时间。虽然在最坏的情况下,这些公式的计算成本可能与服务器数量呈指数关系,但我们通过介绍可以在多项式时间内精确分析的广泛类型的池结构来说明它们的实际意义。这在很大程度上扩展了可访问显式性能度量的模型类。
{"title":"Performance of Balanced Fairness in Resource Pools: A Recursive Approach","authors":"T. Bonald, Céline Comte, Fabien Mathieu","doi":"10.1145/3219617.3219669","DOIUrl":"https://doi.org/10.1145/3219617.3219669","url":null,"abstract":"Understanding the performance of a pool of servers is crucial for proper dimensioning. One of the main challenges is to take into account the complex interactions between servers that are pooled to process jobs. In particular, a job can generally not be processed by any server of the cluster due to various constraints like data locality. In this paper, we represent these constraints by some assignment graph between jobs and servers. We present a recursive approach to computing performance metrics like mean response times when the server capacities are shared according to balanced fairness. While the computational cost of these formulas can be exponential in the number of servers in the worst case, we illustrate their practical interest by introducing broad classes of pool structures that can be exactly analyzed in polynomial time. This extends considerably the class of models for which explicit performance metrics are accessible.","PeriodicalId":210440,"journal":{"name":"Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115202575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Fine-grained Event-based Modem Power Model for Enabling In-depth Modem Energy Drain Analysis 一种细粒度的基于事件的调制解调器功率模型,用于调制解调器能量损耗的深度分析
Xiaomeng Chen, Jiayi Meng
Cellular modems enable ubiquitous Internet connectivities to modern smartphones, but in doing so they become a major contributor to the smartphone energy drain. Understanding modem energy drain requires a detailed power model. The prior art, an RRC-state based power model, was developed primarily to model the modem energy drain of application data transfer. As such, it serves well its original purpose, but is insufficient to study detailed modem behavior, eg. activities in the control plane. In [2], we propose a new methodology of modeling modem power draw behavior at the event-granularity, and develop to our knowledge the first fine-grained modem power model that captures the power draw of all LTE modem radio-on events in different RRC modes. Second, we quantitatively demonstrate the advantages of the new model over the state-based power model under a wide variety of context via controlled experiments. Finally, using our fine-grained modem power model, we perform the first detailed modem energy drain in-the-wild study involving 12 Nexus 6 phones under normal usage by 12 volunteers spanning a total of 348 days. Our study provides the first quantitative analysis of energy drain due to modem control activities in the wild and exposes their correlation with context such as location and user mobility. In this abstracts, we introduce the essence of the methodology and the highlighted results from the in-the-wild study.
蜂窝调制解调器为现代智能手机提供了无处不在的互联网连接,但与此同时,它们也成为了智能手机耗电的主要原因。理解调制解调器的能量消耗需要一个详细的功率模型。现有技术是一种基于rrc状态的功率模型,主要用于模拟应用数据传输的调制解调器能量损耗。因此,它很好地满足了最初的目的,但不足以研究详细的现代行为,例如:控制平面中的活动。在b[2]中,我们提出了一种在事件粒度上建模调制解调器功耗行为的新方法,并开发了据我们所知的第一个细粒度调制解调器功耗模型,该模型可以捕获不同RRC模式下所有LTE调制解调器无线电打开事件的功耗。其次,我们通过控制实验定量地证明了新模型在各种环境下优于基于状态的权力模型。最后,使用我们的细粒度调制解调器功率模型,我们进行了第一次详细的调制解调器能量消耗野外研究,涉及12名志愿者在正常使用下的12部Nexus 6手机,共348天。我们的研究首次对野外现代控制活动导致的能量消耗进行了定量分析,并揭示了它们与环境(如位置和用户移动性)的相关性。在这篇摘要中,我们介绍了该方法的本质和野外研究的重点结果。
{"title":"A Fine-grained Event-based Modem Power Model for Enabling In-depth Modem Energy Drain Analysis","authors":"Xiaomeng Chen, Jiayi Meng","doi":"10.1145/3219617.3219660","DOIUrl":"https://doi.org/10.1145/3219617.3219660","url":null,"abstract":"Cellular modems enable ubiquitous Internet connectivities to modern smartphones, but in doing so they become a major contributor to the smartphone energy drain. Understanding modem energy drain requires a detailed power model. The prior art, an RRC-state based power model, was developed primarily to model the modem energy drain of application data transfer. As such, it serves well its original purpose, but is insufficient to study detailed modem behavior, eg. activities in the control plane. In [2], we propose a new methodology of modeling modem power draw behavior at the event-granularity, and develop to our knowledge the first fine-grained modem power model that captures the power draw of all LTE modem radio-on events in different RRC modes. Second, we quantitatively demonstrate the advantages of the new model over the state-based power model under a wide variety of context via controlled experiments. Finally, using our fine-grained modem power model, we perform the first detailed modem energy drain in-the-wild study involving 12 Nexus 6 phones under normal usage by 12 volunteers spanning a total of 348 days. Our study provides the first quantitative analysis of energy drain due to modem control activities in the wild and exposes their correlation with context such as location and user mobility. In this abstracts, we introduce the essence of the methodology and the highlighted results from the in-the-wild study.","PeriodicalId":210440,"journal":{"name":"Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127932709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Abstracts of the 2018 ACM International Conference on Measurement and Modeling of Computer Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1