首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Borst  Sem  Boxma  Onno  Jelenković  Predrag 《Queueing Systems》2003,43(4):273-306
We analyze the queueing behavior of long-tailed traffic flows under the Generalized Processor Sharing (GPS) discipline. We show a sharp dichotomy in qualitative behavior, depending on the relative values of the weight parameters. For certain weight combinations, an individual flow with long-tailed traffic characteristics is effectively served at a constant rate. The effective service rate may be interpreted as the maximum average traffic rate for the flow to be stable, which is only influenced by the traffic characteristics of the other flows through their average rates. In particular, the flow is essentially immune from excessive activity of flows with heavier-tailed traffic characteristics. In many situations, the effective service rate is simply the link rate reduced by the aggregate average rate of the other flows. This confirms that GPS-based scheduling algorithms provide a potential mechanism for extracting significant multiplexing gains, while isolating individual flows. For other weight combinations however, a flow may be strongly affected by the activity of heavier-tailed flows, and may inherit their traffic characteristics, causing induced burstiness. The stark contrast in qualitative behavior illustrates the crucial importance of the weight parameters.  相似文献   

2.
We introduce a one dimensional contact process for which births to the right of the rightmost particle and to the left of the leftmost particle occur at rate e (where e is for external). Other births occur at rate i (where i is for internal). Deaths occur at rate 1. The case e= i is the well known basic contact process for which there is a critical value c>1 such that if the birth rate is larger than c the process has a positive probability of surviving. Our main motivation here is to understand the relative importance of the external birth rates. We show that if e1 then the process always dies out while if e>1 and if i is large enough then the process may survive. We also show that if i< c the process dies out for all e. To extend this notion to d>1 we introduce a second process that has an epidemiological interpretation. For this process each site can be in one of three states: infected, a susceptible that has never been infected, or a susceptible that has been infected previously. Furthermore, the rates at which the two types of susceptible become infected are different. We obtain some information about the phase diagram about this case as well.  相似文献   

3.
Large Deviations of Queues Sharing a Randomly Time-Varying Server   总被引:1,自引:0,他引:1  
We consider a discrete-time model where multiple queues, each with its own exogenous arrival process, are served by a server whose capacity varies randomly and asynchronously with respect to different queues. This model is primarily motivated by the problem of efficient scheduling of transmissions of multiple data flows sharing a wireless channel. We address the following problem of controlling large deviations of the queues: find a scheduling rule, which is optimal in the sense of maximizing
(0.1)
where Q i is the length of the i-th queue in a stationary regime, and a i >0 are parameters. Thus, we seek to maximize the minimum of the exponential decay rates of the tails of distributions of weighted queue lengths a i Q i . We give a characterization of the upper bound on (0.1) under any scheduling rule, and of the lower bound on (0.1) under the exponential (EXP) rule. We prove that the two bounds match, thus proving optimality of the EXP rule. The EXP rule is very parsimonious in that it does not require any “pre-computation” of its parameters, and uses only current state of the queues and of the server. The EXP rule is not invariant with respect to scaling of the queues, which complicates its analysis in the large deviations regime. To overcome this, we introduce and prove a refined sample path large deviations principle, or refined Mogulskii theorem, which is of independent interest.   相似文献   

4.
Kurkova  I.A. 《Queueing Systems》2001,37(4):379-389
A load-balanced network with two queues Q 1 and Q 2 is considered. Each queue receives a Poisson stream of customers at rate i , i=1,2. In addition, a Poisson stream of rate arrives to the system; the customers from this stream join the shorter of two queues. After being served in the ith queue, i=1,2, customers leave the system with probability 1–p i *, join the jth queue with probability p(i,j), j=1,2, and choose the shortest of two queues with probability p(i,{1,2}). We establish necessary and sufficient conditions for stability of the system.  相似文献   

5.
General exact light traffic limit theorems are given for the distribution of steadystate workloadV, in open queueing networks having as input a general stationary ergodic marked point process {(t n ,K n )n0 (where tn denotes the arrival time and Kn the routing and service times of the nth customer). No independence assumptions of any kind are required of the input. As the light traffic regime, it is only required that the Palm distribution for the exogenous interarrival time converges weakly to infinity (while the service mechanism is not allowed to change much). As is already known in the context of a single-server queue, work is much easier to deal with mathematically in light traffic than is customer delayD, and consequently, our results are far more general than existing results forD. We obtain analogous results for multi-channel and infinite-channel queues. In the context of open queueing networks, we handle both the total workload in the network as well as the workload at isolated nodes.Research supported in part by the Japan Society for the Promotion of Science during the author's fellowship in Tokyo, and by NSF Grant DDM 895 7825.  相似文献   

6.
Summary Let (xini, y i be a sequence of independent identically distributed random variables, where x i R p and y i R, and let R p be an unknown vector such that y i =x i +u i (*), where u i is independent of x i and has distribution function F(u/), where >0 is an unknown parameter. This paper deals with a general class of M-estimates of regression and scale, ( *,*), defined as solutions of the system: , where r= (y i x i 1*/)*, with R p ×RR and RR. This class contains estimators of (, ) proposed by Huber, Mallows and Krasker and Welsch. The consistency and asymptotic normality of the general M-estimators are proved assuming general regularity conditions on and and assuming the joint distribution of (x i , y i ) to fulfill the model (*) only approximately.  相似文献   

7.
In this paper we consider a generalization of the so called M/G/ model where M types of sessions enter a buffer. The instantaneous rates of the sessions are functions of the occupancy of an M/G/ system with Weibullian G distributions. In particular we assume that a session of type i transmits r i cells per unit time and lasts for a random time with a Weibull distribution given by x) \sim {\text{e}}^{{\text{ - }}\gamma ix^{\alpha i} } $$ " align="middle" border="0"> , where 0< i <1, i >0. We show that the complementary buffer occupancy distribution for large buffer size is Weibullian whose parameters can be determined as the solution of a deterministic nonlinear knapsack problem. For i <0.5, upper and lower bound factors are determined. When specialized to the homogeneous case, i.e., when all the sessions are identical, the result coincides with a lower bound reported in the literature.  相似文献   

8.
This paper studies a fluid queue with coupled input and output. Flows arrive according to a Poisson process, and when n flows are present, each of them transmits traffic into the queue at a rate c/(n+1), where the remaining c/(n+1) is used to serve the queue. We assume exponentially distributed flow sizes, so that the queue under consideration can be regarded as a system with Markov fluid input. The rationale behind studying this queue lies in ad hoc networks: bottleneck links have roughly this type of sharing policy. We consider four performance metrics: (i) the stationary workload of the queue, (ii) the queueing delay, i.e., the delay of a ‘packet’ (a fluid particle) that arrives at the queue at an arbitrary point in time, (iii) the flow transfer delay, i.e., the time elapsed between arrival of a flow and the epoch that all its traffic has been put into the queue, and (iv) the sojourn time, i.e., the flow transfer time increased by the time it takes before the last fluid particle of the flow is served. For each of these random variables we compute the Laplace transform. The corresponding tail probabilities decay exponentially, as is shown by a large-deviations analysis. F. Roijers’ work has been carried out partly in the SENTER-NOVEM funded project Easy Wireless.  相似文献   

9.
We suggest a construction that, given an orbital diffeomorphism between two Hamiltonian systems, produces integrals of them. We treat geodesic equivalence of metrics as the main example of it. In this case, the integrals commute; they are functionally independent if the eigenvalues of the tensor g ij are all different; if the eigenvalues are all different at least at one point then they are all different at almost each point and the geodesic flows of the metrics are Liouville integrable. This gives us topological obstacles to geodesic equivalence.  相似文献   

10.
We consider the estimation of ordered parameters ofk ( 2) exponential distributions by improving upon the usual estimators. TheBrewsterzidek technique is used to find sufficient conditions for an estimator of i and/or i (i=1,...,k), to be inadmissible with respect to the MSE criterion where i and i are the location and scale parameters respectively of thei-th exponential population. Using these sufficient conditions improved estimators of i and/or i (i=1,...,k) are obtained.  相似文献   

11.
Let (X,) be a topological space, X i X for i I, and < i be a topogenity on X i . We look for a topogenity < on X such that is the topology induced by < and <|X i =< i for i I.  相似文献   

12.
We prove the Jackson theorem for a zero-preserving approximation of periodic functions (i.e., in the case where the approximating polynomial has the same zeros y i) and for a sign-preserving approximation [i.e., in the case where the approximating polynomial is of the same sign as a function f on each interval (y i, y i – 1)]. Here, y i are the points obtained from the initial points – y 2s y 2s–1 <...< y1 < using the equality yi = yi + 2s + 2 furthermore, these points are zeros of a 2-periodic continuous function f.  相似文献   

13.
Summary Consider an unconstrained minimization of an uniformly convex functionf(z). Let be an algorithm that, for solving it constructs a sequence {z i} withz i+1 =z i + (i) h i ,h i R n , (i) R = and –h i T f(z i ) > 0. For any algorithm that converges linearly and that uses parabolic or cubic interpolations for the line search, upper bounds on the number of function evaluations needed to approximate the minimum off(z) within a given accuracy, are calculated. The obtained results allow to compare the line search procedure under investigation.  相似文献   

14.
A repairable system is composed of components ofI types. A component can be loaded, put on standby, queued or repaired. The repair facility is here assumed to be a queueing system of a rather general structure though interruption of repairs is not allowed. Typei components possess a lifetime distributionA i (t) and repair time distributionB t (t). The lifetime of componentj is exhausted with a state-dependent rate j (t). A Markov process Z(t) with supplementary variables is built to investigate the system behaviour. An ergodic result, Theorem 1, is established under a set of conditions convenient for light traffic analysis. In Theorems 2 to 6, a light traffic limit is derived for the joint steady state distribution of supplementary variables. Applying these results, Theorems 7 to 10 derive light traffic properties of a busy period-measured random variable. Essentially, the concepts of light traffic equivalence due to Daley and Rolski (1992) and Asmussen (1992) are used. The asymptotic (light traffic) insensitivity of busy period and steady state parameters to the form ofA i(t) [given their means and (in some cases) values of density functions for smallt], is observed under some analytic conditions.Some abbreviations & notations LHS, RHS lefthand side, righthand side - w.r.t. with respect to - (i.i.d.) r.v. (independent identically distributed) random variables - A c complement event - d.f., p.d.f. distribution function, probability density function - m.g.f. moment generating function - I A indicator function of eventA - (t) =1–A(t)  相似文献   

15.
Let i be an i-tb population with a probability density function f(· | i ) with one dimensional unknown parameter i = 1, 2, ... , k. Let n i sample be drawn from each i . The likelihood ratio criteria j|(j–1) for testing hypothesis that the first j parameters are equal against alternative hypothesis that the first (j – 1) parameters are equal and the j-th parameter is different with the previous ones are defined, j = 2, 3, ... , k. The paper shows the asymptotic independence of j|(j–1)'s up to the order 1/n under a hypothesis of equality of k parameters, where n is a number of total samples.  相似文献   

16.
LetB,B be bases of a matroid, withX B, X B. SetsX,X are asymmetric exchange if(B – X) X and(B – X) X are bases. SetsX,X are astrong serial B-exchange if there is a bijectionf: X X, where for any ordering of the elements ofX, sayx i ,i = 1, , m, bases are formed by the sets B0 = B, Bi = (Bi–1 – xi) f(x i), fori = 1, , m. Any symmetric exchangeX,X can be decomposed by partitioning X = i=1 m Yi, X = i=1 m Yi, X, where (1) bases are formed by the setsB 0 =B, B i = (B i–1 Y i ) Y i ; (2) setsY i ,Y i are a strong serialB i–1 -exchange; (3) properties analogous to (1) and (2) hold for baseB and setsY i ,Y i .  相似文献   

17.
We prove the convergence of a class of iterative algorithms for solving locally Lipschitz feasibility problems, that is, finite systems of inequalities f i (x)0, (i I), where each f i is a locally Lipschitz functional on n . We also obtain a new convergence criterion for the so-called block-iterative projection methods of finding common points of finite families of convex closed subsets of n as defined by Aharoni and Censor ([3]).The work of Dan Butnariu was done while visiting the Department of Mathematics of the University of Texas at Arlington.  相似文献   

18.
The solution of ak-extremal problem is defined as the set of pairs (x i * , i),i = 1, ,k, where x t * isi th local minimum and i is the volume of the set of attraction of this minimum. A Bayesian estimate ofk and ( 1 , , k ) is constructed.This paper has been written while the author was a CNR visiting professor at the Institute of Mathematics of the Milano University.  相似文献   

19.
We obtain a complete solution of the problem of the maximum of the fourth diameter in the family of continua with capacity 1. Let E(o, ei, e–i). 0<i, e–i; H(=cap E(o, ei, e–i). Let C() be the common point of three analytic arcs which form E(o, ei, e–i). One shows that the indicated maximum is realized by the continuum ={z:H(0)z 2E(o, ei, e–i)} where 0, o<0z ei z+C ( is a real and C is a complex constant). One finds the value of the required maximum. The paper contains a brief exposition of the proof of this result.Translated from Zapiski Nauchnykh Seminarov Leningradskogo Otdeleniya Matematicheskogo Instituta im. V. A. Steklova AN SSSR, Vol. 59, pp. 60–79, 1976.  相似文献   

20.
Stochastic algorithms for optimization problems, where function evaluations are done by Monte Carlo simulations, are presented. At each iteratex i, they draw a predetermined numbern(i) of sample points from an underlying probability space; based on these sample points, they compute a feasible-descent direction, an Armijo stepsize, and the next iteratex i+1. For an appropriate optimality function , corresponding to an optimality condition, it is shown that, ifn(i) , then (x i) 0, whereJ is a set of integers whose upper density is zero. First, convergence is shown for a general algorithm prototype: then, a steepest-descent algorithm for unconstrained problems and a feasible-direction algorithm for problems with inequality constraints are developed. A numerical example is supplied.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号