首页 > 最新文献

Measurement and Modeling of Computer Systems最新文献

英文 中文
Error estimating codes for insertion and deletion channels 插入和删除信道代码的错误估计
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2591976
Jiwei Huang, Sen Yang, Ashwin Lall, J. Romberg, Jun Xu, Chuang Lin
Error estimating codes (EEC) have recently been proposed for measuring the bit error rate (BER) in packets transmitted over wireless links. They however can provide such measurements only when there are no insertion and deletion errors, which could occur in various wireless network environments. In this work, we propose ``idEEC'', the first technique that can do so even in the presence of insertion and deletion errors. We show that idEEC is provable robust under most bit insertion and deletion scenarios, provided insertion/deletion errors occur with much lower probability than bit flipping errors. Our idEEC design can build upon any existing EEC scheme. The basic idea of the idEEC encoding is to divide the packet into a number of segments, each of which is encoded using the underlying EEC scheme. The basic idea of the idEEC decoding is to divide the packet into a few slices in a randomized manner -- each of which may contain several segments -- and then try to identify a slice that has no insertion and deletion errors in it (called a ``clean slice''). Once such a clean slice is found, it is removed from the packet for later processing, and this ``randomized divide and search'' procedure will be iteratively performed on the rest of the packet until no more clean slices can be found. The BER will then be estimated from all the clean slices discovered through all the iterations. A careful analysis of the accuracy guarantees of the idEEC decoding is provided, and the efficacy of idEEC is further validated by simulation experiments.
误码估计(EEC)最近被提出用于测量无线链路上传输的数据包的误码率(BER)。然而,它们只能在没有插入和删除错误的情况下提供这种测量,而插入和删除错误可能发生在各种无线网络环境中。在这项工作中,我们提出了“idEEC”,这是第一个即使在存在插入和删除错误的情况下也能做到这一点的技术。我们证明了idEEC在大多数插入和删除场景下是鲁棒的,前提是插入/删除错误发生的概率远低于比特翻转错误。我们的idEEC设计可以建立在任何现有的EEC方案之上。eeec编码的基本思想是将数据包分成许多段,每个段都使用底层EEC方案进行编码。idEEC解码的基本思想是以随机的方式将数据包分成几个片段——每个片段可能包含几个片段——然后尝试识别其中没有插入和删除错误的片段(称为“干净片段”)。一旦找到这样一个干净的切片,它将从数据包中删除以供稍后处理,并且这种“随机分割和搜索”过程将在数据包的其余部分上迭代执行,直到再也找不到干净的切片为止。然后将根据通过所有迭代发现的所有干净切片估计误码率。详细分析了idEEC译码的精度保证,并通过仿真实验进一步验证了idEEC译码的有效性。
{"title":"Error estimating codes for insertion and deletion channels","authors":"Jiwei Huang, Sen Yang, Ashwin Lall, J. Romberg, Jun Xu, Chuang Lin","doi":"10.1145/2591971.2591976","DOIUrl":"https://doi.org/10.1145/2591971.2591976","url":null,"abstract":"Error estimating codes (EEC) have recently been proposed for measuring the bit error rate (BER) in packets transmitted over wireless links. They however can provide such measurements only when there are no insertion and deletion errors, which could occur in various wireless network environments. In this work, we propose ``idEEC'', the first technique that can do so even in the presence of insertion and deletion errors. We show that idEEC is provable robust under most bit insertion and deletion scenarios, provided insertion/deletion errors occur with much lower probability than bit flipping errors. Our idEEC design can build upon any existing EEC scheme. The basic idea of the idEEC encoding is to divide the packet into a number of segments, each of which is encoded using the underlying EEC scheme. The basic idea of the idEEC decoding is to divide the packet into a few slices in a randomized manner -- each of which may contain several segments -- and then try to identify a slice that has no insertion and deletion errors in it (called a ``clean slice''). Once such a clean slice is found, it is removed from the packet for later processing, and this ``randomized divide and search'' procedure will be iteratively performed on the rest of the packet until no more clean slices can be found. The BER will then be estimated from all the clean slices discovered through all the iterations. A careful analysis of the accuracy guarantees of the idEEC decoding is provided, and the efficacy of idEEC is further validated by simulation experiments.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129945101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Filter & follow: how social media foster content curation 过滤和关注:社交媒体如何促进内容管理
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592010
Avner May, A. Chaintreau, Nitish Korula, Silvio Lattanzi
The impact of blogs and microblogging on the consumption of news is dramatic, as every day users rely more on these sources to decide what content to pay attention to. In this work, we empirically and theoretically analyze the dynamics of bloggers serving as intermediaries between the mass media and the general public. Our first contribution is to precisely describe the receiving and posting behaviors of today's social media users. For the first time, we study jointly the volume and popularity of URLs received and shared by users. We show that social media platforms exhibit a natural ``content curation'' process. Users and bloggers in particular obey two filtering laws: (1) a user who receives less content typically receives more popular content, and (2) a blogger who is less active typically posts disproportionately popular items. Our observations are remarkably consistent across 11 social media data sets. We find evidence of a variety of posting strategies, which motivates our second contribution: a theoretical understanding of the consequences of strategic posting on the stability of social media, and its ability to satisfy the interests of a diverse audience. We introduce a ``blog-positioning game'' and show that it can lead to ``efficient'' equilibria, in which users generally receive the content they are interested in. Interestingly, this model predicts that if users are overly ``picky'' when choosing who to follow, no pure strategy equilibria exists for the bloggers, and thus the game never converges. However, a bit of leniency by the readers in choosing which bloggers to follow is enough to guarantee convergence.
博客和微博对新闻消费的影响是巨大的,因为每天用户更多地依赖这些来源来决定关注什么内容。在这项工作中,我们从实证和理论上分析了博主作为大众媒体和公众之间中介的动态。我们的第一个贡献是精确描述当今社交媒体用户的接收和发布行为。我们首次联合研究了用户接收和分享的url的数量和受欢迎程度。我们发现,社交媒体平台呈现出一种自然的“内容管理”过程。用户和博主特别遵守两个过滤法则:(1)收到较少内容的用户通常会收到更多受欢迎的内容,(2)不太活跃的博主通常会发布不成比例的受欢迎内容。我们的观察结果在11个社交媒体数据集中非常一致。我们发现了各种发布策略的证据,这激发了我们的第二个贡献:对社交媒体稳定性战略发布后果的理论理解,以及它满足不同受众兴趣的能力。我们引入了一个“博客定位游戏”,并表明它可以导致“有效”的平衡,在这种平衡中,用户通常会收到他们感兴趣的内容。有趣的是,该模型预测,如果用户在选择关注对象时过于“挑剔”,那么对于博主来说就不存在纯粹的策略均衡,因此游戏永远不会收敛。然而,读者在选择追随哪个博主时稍微宽容一点,就足以保证趋同。
{"title":"Filter & follow: how social media foster content curation","authors":"Avner May, A. Chaintreau, Nitish Korula, Silvio Lattanzi","doi":"10.1145/2591971.2592010","DOIUrl":"https://doi.org/10.1145/2591971.2592010","url":null,"abstract":"The impact of blogs and microblogging on the consumption of news is dramatic, as every day users rely more on these sources to decide what content to pay attention to. In this work, we empirically and theoretically analyze the dynamics of bloggers serving as intermediaries between the mass media and the general public.\u0000 Our first contribution is to precisely describe the receiving and posting behaviors of today's social media users. For the first time, we study jointly the volume and popularity of URLs received and shared by users. We show that social media platforms exhibit a natural ``content curation'' process. Users and bloggers in particular obey two filtering laws: (1) a user who receives less content typically receives more popular content, and (2) a blogger who is less active typically posts disproportionately popular items. Our observations are remarkably consistent across 11 social media data sets. We find evidence of a variety of posting strategies, which motivates our second contribution: a theoretical understanding of the consequences of strategic posting on the stability of social media, and its ability to satisfy the interests of a diverse audience. We introduce a ``blog-positioning game'' and show that it can lead to ``efficient'' equilibria, in which users generally receive the content they are interested in. Interestingly, this model predicts that if users are overly ``picky'' when choosing who to follow, no pure strategy equilibria exists for the bloggers, and thus the game never converges. However, a bit of leniency by the readers in choosing which bloggers to follow is enough to guarantee convergence.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130775355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Distributed optimal load shedding for disaster recovery in smart electric power grids: a second-order approach 智能电网灾难恢复的分布式最优减载:二阶方法
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592036
Jia Liu, Cathy H. Xia, N. Shroff, H. Sherali
In this paper, we consider the problem of distributed load shedding optimization for disaster recovery in smart grids. We develop distributed second-order interior-point based load shedding algorithms that enjoy a fast quadratic convergence rate. Our main contributions are two-fold: (i) We propose a rooted spanning tree based reformulation that enables our distributed algorithm design; (ii) Based on the spanning tree reformulation, we design distributed computation schemes for our proposed second-order interior-point based load shedding. Collectively, these results serve as an important first step in load shedding and disaster recovery that uses second-order distributed techniques.
本文研究了面向智能电网容灾的分布式减载优化问题。我们开发了基于分布式二阶内点的减载算法,该算法具有快速的二次收敛速度。我们的主要贡献有两个方面:(i)我们提出了一个基于根生成树的重构,使我们的分布式算法设计成为可能;(ii)在生成树重构的基础上,为我们提出的二阶内点减载设计了分布式计算方案。总的来说,这些结果是使用二阶分布式技术的减载和灾难恢复的重要的第一步。
{"title":"Distributed optimal load shedding for disaster recovery in smart electric power grids: a second-order approach","authors":"Jia Liu, Cathy H. Xia, N. Shroff, H. Sherali","doi":"10.1145/2591971.2592036","DOIUrl":"https://doi.org/10.1145/2591971.2592036","url":null,"abstract":"In this paper, we consider the problem of distributed load shedding optimization for disaster recovery in smart grids. We develop distributed second-order interior-point based load shedding algorithms that enjoy a fast quadratic convergence rate. Our main contributions are two-fold: (i) We propose a rooted spanning tree based reformulation that enables our distributed algorithm design; (ii) Based on the spanning tree reformulation, we design distributed computation schemes for our proposed second-order interior-point based load shedding. Collectively, these results serve as an important first step in load shedding and disaster recovery that uses second-order distributed techniques.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127440964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
GDM: device memory management for gpgpu computing GDM:用于gpgpu计算的设备内存管理
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592002
Kaibo Wang, Xiaoning Ding, Rubao Lee, S. Kato, Xiaodong Zhang
GPGPUs are evolving from dedicated accelerators towards mainstream commodity computing resources. During the transition, the lack of system management of device memory space on GPGPUs has become a major hurdle. In existing GPGPU systems, device memory space is still managed explicitly by individual applications, which not only increases the burden of programmers but can also cause application crashes, hangs, or low performance. In this paper, we present the design and implementation of GDM, a fully functional GPGPU device memory manager to address the above problems and unleash the computing power of GPGPUs in general-purpose environments. To effectively coordinate the device memory usage of different applications, GDM takes control over device memory allocations and data transfers to and from device memory, leveraging a buffer allocated in each application's virtual memory. GDM utilizes the unique features of GPGPU systems and relies on several effective optimization techniques to guarantee the efficient usage of device memory space and to achieve high performance. We have evaluated GDM and compared it against state-of-the-art GPGPU system software on a range of workloads. The results show that GDM can prevent applications from crashes, including those induced by device memory leaks, and improve system performance by up to 43%.
gpgpu正在从专用加速器向主流商用计算资源发展。在过渡过程中,缺乏对gpgpu上设备内存空间的系统管理已成为一个主要障碍。在现有的GPGPU系统中,设备内存空间仍然由各个应用程序显式地管理,这不仅增加了程序员的负担,而且还可能导致应用程序崩溃、挂起或性能低下。在本文中,我们提出了GDM的设计和实现,一个全功能的GPGPU设备内存管理器,以解决上述问题,并释放GPGPU在通用环境中的计算能力。为了有效地协调不同应用程序的设备内存使用,GDM控制设备内存分配和进出设备内存的数据传输,利用在每个应用程序的虚拟内存中分配的缓冲区。GDM利用GPGPU系统的独特特性,并依靠几种有效的优化技术来保证设备内存空间的有效利用并实现高性能。我们已经对GDM进行了评估,并将其与最先进的GPGPU系统软件在一系列工作负载上进行了比较。结果表明,GDM可以防止应用程序崩溃,包括由设备内存泄漏引起的崩溃,并将系统性能提高43%。
{"title":"GDM: device memory management for gpgpu computing","authors":"Kaibo Wang, Xiaoning Ding, Rubao Lee, S. Kato, Xiaodong Zhang","doi":"10.1145/2591971.2592002","DOIUrl":"https://doi.org/10.1145/2591971.2592002","url":null,"abstract":"GPGPUs are evolving from dedicated accelerators towards mainstream commodity computing resources. During the transition, the lack of system management of device memory space on GPGPUs has become a major hurdle. In existing GPGPU systems, device memory space is still managed explicitly by individual applications, which not only increases the burden of programmers but can also cause application crashes, hangs, or low performance.\u0000 In this paper, we present the design and implementation of GDM, a fully functional GPGPU device memory manager to address the above problems and unleash the computing power of GPGPUs in general-purpose environments. To effectively coordinate the device memory usage of different applications, GDM takes control over device memory allocations and data transfers to and from device memory, leveraging a buffer allocated in each application's virtual memory. GDM utilizes the unique features of GPGPU systems and relies on several effective optimization techniques to guarantee the efficient usage of device memory space and to achieve high performance.\u0000 We have evaluated GDM and compared it against state-of-the-art GPGPU system software on a range of workloads. The results show that GDM can prevent applications from crashes, including those induced by device memory leaks, and improve system performance by up to 43%.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129252868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Revisiting caching in content delivery networks 重新访问内容交付网络中的缓存
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592021
M. Shafiq, A. Liu, Amir R. Khakpour
Content Delivery Networks (CDNs) differ from other caching systems in terms of both workload characteristics and performance metrics. However, there has been little prior work on large-scale measurement and characterization of content requests and caching performance in CDNs. For workload characteristics, CDNs deal with extremely large content volume, high content diversity, and strong temporal dynamics. For performance metrics, other than hit ratio, CDNs also need to minimize the disk operations and the volume of traffic from origin servers. In this paper, we conduct a large-scale measurement study to characterize the content request patterns using real-world data from a commercial CDN provider.
内容交付网络(cdn)在工作负载特征和性能指标方面不同于其他缓存系统。然而,关于cdn中内容请求和缓存性能的大规模测量和表征的前期工作很少。对于工作负载特征,cdn处理非常大的内容量、高内容多样性和强时间动态。对于性能指标,除了命中率之外,cdn还需要最小化磁盘操作和来自原始服务器的流量。在本文中,我们进行了一项大规模的测量研究,使用来自商业CDN提供商的真实数据来表征内容请求模式。
{"title":"Revisiting caching in content delivery networks","authors":"M. Shafiq, A. Liu, Amir R. Khakpour","doi":"10.1145/2591971.2592021","DOIUrl":"https://doi.org/10.1145/2591971.2592021","url":null,"abstract":"Content Delivery Networks (CDNs) differ from other caching systems in terms of both workload characteristics and performance metrics. However, there has been little prior work on large-scale measurement and characterization of content requests and caching performance in CDNs. For workload characteristics, CDNs deal with extremely large content volume, high content diversity, and strong temporal dynamics. For performance metrics, other than hit ratio, CDNs also need to minimize the disk operations and the volume of traffic from origin servers. In this paper, we conduct a large-scale measurement study to characterize the content request patterns using real-world data from a commercial CDN provider.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122864974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Energy procurement strategies in the presence of intermittent sources 存在间歇性能源的能源采购策略
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2591982
J. Nair, S. Adlakha, A. Wierman
The increasing penetration of intermittent, unpredictable renewable energy sources such as wind energy, poses significant challenges for utility companies trying to incorporate renewable energy in their portfolio. In this work, we study the problem of conventional energy procurement in the presence of intermittent renewable resources. We model the problem as a variant of the newsvendor problem, in which the presence of renewable resources induces supply side uncertainty, and in which conventional energy may be procured in three stages to balance supply and demand. We compute closed-form expressions for the optimal energy procurement strategy and study the impact of increasing renewable penetration, and of proposed changes to the structure of electricity markets. We explicitly characterize the impact of a growing renewable penetration on the procurement policy by considering a scaling regime that models the aggregation of unpredictable renewable sources. A key insight from our results is that there is a separation between the impact of the stochastic nature of this aggregation, and the impact of market structure and forecast accuracy. Additionally, we study the impact on procurement of two proposed changes to the market structure: the addition and the placement of an intermediate market. We show that addition of an intermediate market does not necessarily increase the efficiency of utilization of renewable sources. Further, we show that the optimal placement of the intermediate market is insensitive to the level of renewable penetration.
间歇性、不可预测的可再生能源(如风能)的日益普及,给试图将可再生能源纳入其投资组合的公用事业公司带来了重大挑战。在这项工作中,我们研究了间歇性可再生资源存在下的常规能源采购问题。我们将这个问题建模为报贩问题的一个变体,其中可再生资源的存在导致了供给侧的不确定性,而传统能源的采购可能分三个阶段来平衡供需。我们计算了最优能源采购策略的封闭表达式,并研究了可再生能源普及率增加的影响,以及电力市场结构的拟议变化。我们通过考虑一个模拟不可预测的可再生能源聚集的规模制度,明确地描述了不断增长的可再生能源渗透对采购政策的影响。从我们的结果中得出的一个关键见解是,这种聚合的随机性质的影响与市场结构和预测准确性的影响之间存在分离。此外,我们还研究了两个拟议的市场结构变化对采购的影响:增加中间市场和安置中间市场。我们表明,中间市场的增加并不一定会提高可再生能源的利用效率。进一步,我们证明了中间市场的最优布局对可再生能源渗透率水平不敏感。
{"title":"Energy procurement strategies in the presence of intermittent sources","authors":"J. Nair, S. Adlakha, A. Wierman","doi":"10.1145/2591971.2591982","DOIUrl":"https://doi.org/10.1145/2591971.2591982","url":null,"abstract":"The increasing penetration of intermittent, unpredictable renewable energy sources such as wind energy, poses significant challenges for utility companies trying to incorporate renewable energy in their portfolio. In this work, we study the problem of conventional energy procurement in the presence of intermittent renewable resources. We model the problem as a variant of the newsvendor problem, in which the presence of renewable resources induces supply side uncertainty, and in which conventional energy may be procured in three stages to balance supply and demand. We compute closed-form expressions for the optimal energy procurement strategy and study the impact of increasing renewable penetration, and of proposed changes to the structure of electricity markets. We explicitly characterize the impact of a growing renewable penetration on the procurement policy by considering a scaling regime that models the aggregation of unpredictable renewable sources. A key insight from our results is that there is a separation between the impact of the stochastic nature of this aggregation, and the impact of market structure and forecast accuracy. Additionally, we study the impact on procurement of two proposed changes to the market structure: the addition and the placement of an intermediate market. We show that addition of an intermediate market does not necessarily increase the efficiency of utilization of renewable sources. Further, we show that the optimal placement of the intermediate market is insensitive to the level of renewable penetration.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"38 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125736455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
Effect of proactive serving on user delay reduction in service systems 服务系统中主动服务对降低用户延迟的影响
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592024
Shaoquan Zhang, Longbo Huang, Minghua Chen, Xin Liu
In online service systems, delay experienced by a user from the service request to the service completion is one of the most critical performance metrics. To improve user delay experience, in this paper, we investigate a novel aspect of system design: proactive serving, where the system can predict future user request arrivals and allocate its capacity to serve these upcoming requests proactively. In particular, we investigate the average user delay under proactive serving from a queuing theory perspective. We show that proactive serving reduces the average user delay exponentially (as a function of the prediction window size) under M/M/1 queueing models. Our simulation results show that, for G/G/1 queueing models, the average user delay also decreases significantly under proactive serving.
在在线服务系统中,用户从服务请求到服务完成的延迟是最关键的性能指标之一。为了改善用户延迟体验,本文研究了系统设计的一个新方面:主动服务,系统可以预测未来的用户请求到达并主动分配其容量来服务这些即将到来的请求。特别地,我们从排队论的角度研究了主动服务下的平均用户延迟。我们证明了在M/M/1排队模型下,主动服务以指数方式(作为预测窗口大小的函数)降低了平均用户延迟。仿真结果表明,对于G/G/1排队模型,主动服务下的平均用户延迟也显著降低。
{"title":"Effect of proactive serving on user delay reduction in service systems","authors":"Shaoquan Zhang, Longbo Huang, Minghua Chen, Xin Liu","doi":"10.1145/2591971.2592024","DOIUrl":"https://doi.org/10.1145/2591971.2592024","url":null,"abstract":"In online service systems, delay experienced by a user from the service request to the service completion is one of the most critical performance metrics. To improve user delay experience, in this paper, we investigate a novel aspect of system design: proactive serving, where the system can predict future user request arrivals and allocate its capacity to serve these upcoming requests proactively. In particular, we investigate the average user delay under proactive serving from a queuing theory perspective. We show that proactive serving reduces the average user delay exponentially (as a function of the prediction window size) under M/M/1 queueing models. Our simulation results show that, for G/G/1 queueing models, the average user delay also decreases significantly under proactive serving.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121707708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Online algorithms for joint application-VM-physical-machine auto-scaling in a cloud 云环境中联合应用-虚拟机-物理机-自动伸缩的在线算法
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592035
Yang Guo, A. Stolyar, A. Elwalid
We develop shadow routing based online algorithms for the joint problem of application-to-VM and VM-to-PM assignments in a cloud environment. The asymptotic optimality of the shadow algorithm is proved and the performance is evaluated by simulations.
我们开发了基于阴影路由的在线算法,用于解决云环境中应用程序到vm和vm到pm分配的联合问题。通过仿真验证了该算法的渐近最优性,并对其性能进行了评价。
{"title":"Online algorithms for joint application-VM-physical-machine auto-scaling in a cloud","authors":"Yang Guo, A. Stolyar, A. Elwalid","doi":"10.1145/2591971.2592035","DOIUrl":"https://doi.org/10.1145/2591971.2592035","url":null,"abstract":"We develop shadow routing based online algorithms for the joint problem of application-to-VM and VM-to-PM assignments in a cloud environment. The asymptotic optimality of the shadow algorithm is proved and the performance is evaluated by simulations.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122289766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Topic modeling from network spread 主题建模来源于网络传播
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592018
Avik Ray, S. Sanghavi, S. Shakkottai
Topic modeling refers to the task of inferring, only from data, the abstract ``topics" that occur in a collection of content. In this paper we look at latent topic modeling in a setting where unlike traditional topic modeling (a) there are no/few features (like words in documents) that are directly indicative of content topics (e.g. un-annotated videos and images, URLs etc.), but (b) users share and view content over a social network. We provide a new algorithm for inferring both the topics in which every user is interested, and thus also the topics in each content piece. We study its theoretical performance and demonstrate its empirical effectiveness over standard topic modeling algorithms.
主题建模指的是仅从数据推断内容集合中出现的抽象“主题”的任务。在本文中,我们着眼于潜在主题建模的设置,与传统主题建模不同的是:(a)没有或很少有特征(如文档中的单词)直接指示内容主题(例如未注释的视频和图像,url等),但是(b)用户在社交网络上共享和查看内容。我们提供了一种新的算法来推断每个用户感兴趣的主题,从而推断每个内容片段中的主题。我们研究了它的理论性能,并证明了它在标准主题建模算法上的经验有效性。
{"title":"Topic modeling from network spread","authors":"Avik Ray, S. Sanghavi, S. Shakkottai","doi":"10.1145/2591971.2592018","DOIUrl":"https://doi.org/10.1145/2591971.2592018","url":null,"abstract":"Topic modeling refers to the task of inferring, only from data, the abstract ``topics\" that occur in a collection of content. In this paper we look at latent topic modeling in a setting where unlike traditional topic modeling (a) there are no/few features (like words in documents) that are directly indicative of content topics (e.g. un-annotated videos and images, URLs etc.), but (b) users share and view content over a social network. We provide a new algorithm for inferring both the topics in which every user is interested, and thus also the topics in each content piece. We study its theoretical performance and demonstrate its empirical effectiveness over standard topic modeling algorithms.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130249174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measuring throughput of data center network topologies 测量数据中心网络拓扑的吞吐量
Pub Date : 2014-06-16 DOI: 10.1145/2591971.2592040
S. Jyothi, Ankit Singla, Brighten Godfrey, A. Kolla
High throughput is a fundamental goal of network design. While myriad network topologies have been proposed to meet this goal, particularly in data center and HPC networking, a consistent and accurate method of evaluating a design's throughput performance and comparing it to past proposals is conspicuously absent. In this work, we develop a framework to benchmark the throughput of network topologies and apply this methodology to reveal insights about network structure. We show that despite being commonly used, cut-based metrics such as bisection bandwidth are the wrong metrics: they yield incorrect conclusions about the throughput performance of networks. We therefore measure flow-based throughput directly and show how to evaluate topologies with nearly-worst-case traffic matrices. We use the flow-based throughput metric to compare the throughput performance of a variety of computer networks. We have made our evaluation framework freely available to facilitate future work on design and evaluation of networks.
高吞吐量是网络设计的基本目标。虽然已经提出了无数的网络拓扑来实现这一目标,特别是在数据中心和HPC网络中,但显然缺乏一致而准确的方法来评估设计的吞吐量性能并将其与过去的建议进行比较。在这项工作中,我们开发了一个框架来对网络拓扑的吞吐量进行基准测试,并应用该方法来揭示有关网络结构的见解。我们表明,尽管被广泛使用,基于切割的指标,如平分带宽是错误的指标:它们产生关于网络吞吐量性能的错误结论。因此,我们直接测量基于流量的吞吐量,并展示如何使用几乎最坏情况的流量矩阵评估拓扑。我们使用基于流量的吞吐量度量来比较各种计算机网络的吞吐量性能。我们免费提供了我们的评估框架,以促进未来网络的设计和评估工作。
{"title":"Measuring throughput of data center network topologies","authors":"S. Jyothi, Ankit Singla, Brighten Godfrey, A. Kolla","doi":"10.1145/2591971.2592040","DOIUrl":"https://doi.org/10.1145/2591971.2592040","url":null,"abstract":"High throughput is a fundamental goal of network design. While myriad network topologies have been proposed to meet this goal, particularly in data center and HPC networking, a consistent and accurate method of evaluating a design's throughput performance and comparing it to past proposals is conspicuously absent. In this work, we develop a framework to benchmark the throughput of network topologies and apply this methodology to reveal insights about network structure. We show that despite being commonly used, cut-based metrics such as bisection bandwidth are the wrong metrics: they yield incorrect conclusions about the throughput performance of networks. We therefore measure flow-based throughput directly and show how to evaluate topologies with nearly-worst-case traffic matrices. We use the flow-based throughput metric to compare the throughput performance of a variety of computer networks. We have made our evaluation framework freely available to facilitate future work on design and evaluation of networks.","PeriodicalId":306456,"journal":{"name":"Measurement and Modeling of Computer Systems","volume":"6 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130489938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
Measurement and Modeling of Computer Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1