25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 1 Rudolf Mak November 5, 2004 Taxonomy of maximally elastic.

Slides:



Advertisements
Similar presentations
Clustering II.
Advertisements

Routing and Congestion Problems in General Networks Presented by Jun Zou CAS 744.
Hierarchical Clustering. Produces a set of nested clusters organized as a hierarchical tree Can be visualized as a dendrogram – A tree-like diagram that.
Implementation Approaches with FPGAs Compile-time reconfiguration (CTR) CTR is a static implementation strategy where each application consists of one.
2004/05/03 Clustering 1 Clustering (Part One) Ku-Yaw Chang Assistant Professor, Department of Computer Science and Information.
On Approximating the Average Distance Between Points Kfir Barhum, Oded Goldreich and Adi Shraibman Weizmann Institute of Science.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 19th Lecture Christian Schindelhauer.
Addressing Optimization for Loop Execution Targeting DSP with Auto-Increment/Decrement Architecture Wei-Kai Cheng Youn-Long Lin* Computer & Communications.
Process Scheduling for Performance Estimation and Synthesis of Hardware/Software Systems Slide 1 Process Scheduling for Performance Estimation and Synthesis.
Several Graph Layout Problems for Grids Vladimir Lipets Ben-Gurion University of the Negev Advisors: Prof. Daniel Berend Prof. Ephraim Korach.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Time-Variant Spatial Network Model Vijay Gandhi, Betsy George (Group : G04) Group Project Overview of Database Research Fall 2006.
Randomized Competitive Analysis for Two Server Problems Wolfgang Bein Kazuo Iwama Jun Kawahara.
A Platform-based Design Flow for Kahn Process Networks Abhijit Davare Qi Zhu December 10, 2004.
Design and Performance Analysis of Buffers: a Constructive Approach Rudolf H. Mak Dept. of Mathematics and Computer Science Technische Universiteit Eindhoven.
Policy-based Fault Management for Integrating IP over Optical Networks Cláudio Carvalho Edmundo Madeira Institute of Computing (IC) Unicamp – Brazil São.
Roger ZimmermannCOMPSAC 2004, September 30 Spatial Data Query Support in Peer-to-Peer Systems Roger Zimmermann, Wei-Shinn Ku, and Haojun Wang Computer.
Dependability Models for Designing Disaster Tolerant Cloud Computing Systems.
Computer Networks Performance Evaluation. Chapter 12 Single Class MVA Performance by Design: Computer Capacity Planning by Example Daniel A. Menascé,
Hierarchical Cooperation Achieves Linear Scaling in Ad Hoc Wireless Networks David Tse Wireless Foundations U.C. Berkeley AISP Workshop May 2, 2007 Joint.
Richard Socher Cliff Chiung-Yu Lin Andrew Y. Ng Christopher D. Manning
Steady and Fair Rate Allocation for Rechargeable Sensors in Perpetual Sensor Networks Zizhan Zheng Authors: Kai-Wei Fan, Zizhan Zheng and Prasun Sinha.
1 Optimal Power Allocation and AP Deployment in Green Wireless Cooperative Communications Xiaoxia Zhang Department of Electrical.
Term 2 Grade 11 Core Project The Polynomial Project Done by: Abdulla Mohammed Almuhiri & Mohammed Saeed Class :
Institute of Applied Microelectronics and Computer Engineering College of Computer Science and Electrical Engineering, University of Rostock Slide 1 Spezielle.
Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and David H.C. Du Dept. of.
Delay-Throughput Tradeoff with Correlated Mobility in Ad-Hoc Networks Shuochao Yao*, Xinbing Wang*, Xiaohua Tian* ‡, Qian Zhang † *Department of Electronic.
An Efficient Clustering Algorithm For Low Power Clock Tree Synthesis Rupesh S. Shelar Enterprise Microprocessor Group Intel Corporation, Hillsboro, OR.
Bounds on the Geometric Mean of Arc Lengths for Bounded- Degree Planar Graphs M. K. Hasan Sung-eui Yoon Kyung-Yong Chwa KAIST, Republic of Korea.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Optimal Partitioning of Fine-Grained Scalable Video Streams Mohamed Hefeeda.
Implementation of Finite Field Inversion
Joint work with Yuval Peres, Mikkel Thorup, Peter Winkler and Uri Zwick Overhang Bounds Mike Paterson DIMAP & Dept of Computer Science University of Warwick.
Mobile Agent Migration Problem Yingyue Xu. Energy efficiency requirement of sensor networks Mobile agent computing paradigm Data fusion, distributed processing.
Fast BVH Construction on GPUs (Eurographics 2009) Park, Soonchan KAIST (Korea Advanced Institute of Science and Technology)
Data Mining Practical Machine Learning Tools and Techniques Chapter 4: Algorithms: The Basic Methods Section 4.7: Instance-Based Learning Rodney Nielsen.
Prepared by: Mahmoud Rafeek Al-Farra
Measuring and Understanding Throughput of Network Topologies
Hierarchical Clustering Produces a set of nested clusters organized as a hierarchical tree Can be visualized as a dendrogram – A tree like diagram that.
1 Simple provisioning, complex consolidation – An approach to improve the efficiency of provisioning oriented optical networks Tamás Kárász Budapest University.
U of Minnesota DIWANS'061 Energy-Aware Scheduling with Quality of Surveillance Guarantee in Wireless Sensor Networks Jaehoon Jeong, Sarah Sharafkandi and.
Bayesian Optimization Algorithm, Decision Graphs, and Occam’s Razor Martin Pelikan, David E. Goldberg, and Kumara Sastry IlliGAL Report No May.
Structures for In-Network Moving Object Tracking in Wireless Sensor Networks Chih-Yu Lin and Yu-Chee Tseng Department of Computer Science and Information.
1 Chapter 6 Reformulation-Linearization Technique and Applications.
October 20-23rd, 2015 Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features Joshua Saxe, Dr. Konstantin Berlin Invincea.
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
Parallel processing is not easy
Data Science Algorithms: The Basic Methods
Objects as a programming concept
CS522 Advanced database Systems
CS522 Advanced database Systems
RE-Tree: An Efficient Index Structure for Regular Expressions
Amplify-and-Forward Schemes for Wireless Communications
Jason Cong, David Zhigang Pan & Prasanna V. Srinivas
Professor Arne Thesen, University of Wisconsin-Madison
A Hybrid PCA-LDA Model for Dimension Reduction Nan Zhao1, Washington Mio2 and Xiuwen Liu1 1Department of Computer Science, 2Department of Mathematics Florida.
Unsupervised learning
Architecture of Distributed Systems
Disadvantages of Discrete Neurons
Rudolf Mak January 21, Nov-18 Rudolf Mak
Autumn 2015 Lecture 11 Minimum Spanning Trees (Part II)
EE 122: Quality of Service and Resource Allocation
L12. Network optimization
Bounds for Optimal Compressed Sensing Matrices
Rudolf Mak January 21, Jan-19 Rudolf Mak
Perceptrons Introduced in1957 by Rosenblatt
The use of Neural Networks to schedule flow-shop with dynamic job arrival ‘A Multi-Neural Network Learning for lot Sizing and Sequencing on a Flow-Shop’
CS184a: Computer Architecture (Structures and Organization)
Richard Anderson Lecture 10 Minimum Spanning Trees
Self Organizing Maps A major principle of organization is the topographic map, i.e. groups of adjacent neurons process information from neighboring parts.
Jason Cong, David Zhigang Pan & Prasanna V. Srinivas
Presentation transcript:

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 1 Rudolf Mak November 5, 2004 Taxonomy of maximally elastic buffers (based on CS-Report 04-26)

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 2 Motivation

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 3 B asic Building Blocks One-place buffer Split component Merge component

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 4 One-place buffer

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 5 Split component

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 6 Merge component

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 7 Composition Methods Serial composition Wagging composition Multi-wagging composition

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 8 Class S

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 9 Wagging Composition

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 10 Tree Buffers

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 11 Diamond Buffer

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 12 Class W n

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 13 Multi-wagging Composition

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 14 Square Buffers

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 15 Class M n

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 16 Lattice of Buffer Classes

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 17 Design Parameters Capacity I/o-distance

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 18 Design Space Area A2 con- tains all equi- distant buffers in class M

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 19 Performance Metrics Average throughput  (X) Average occupancy  (X) Elasticity   (X)

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 20 Optimal Buffers Elasticity bound: A buffer is optimal when its elasticity attains its upper bound for every throughput

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 21 Questions For a pair of design parameters we ask: Does there exists an optimal buffer? Does there exist a simple optimal buffer, where simple means: “in class M”? What is the simplest structure of an optimal buffer?

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 22 Bisection Lemma (before) UV

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 23 Bisection Lemma (after) UV

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 24 Production rules Application of the bisection lemma using each of the construction methods yields:

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 25 Contours

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 26 Design Space revisited

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 27 Contour Computation Is based on production rules in ( ,  )-space:

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 28 Wagging Contours

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 29 Multi-wagging Contours

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 30 Limit Contours

25-Jun-15 Rudolf Mak TU/e Computer Science, System Architecture and Networking 31 Conclusions Fine-grained, well-fitted taxonomy For almost all design parameters an optimal buffer is known. For almost all design parameters the optimal buffer has a simple structure The taxonomy is extendable –With additional building blocks –With additional construction methods