140 research outputs found

    A Self-Adaptive Database Buffer Replacement Scheme.

    Get PDF
    The overall performance of a database system is very sensitive to the buffer replacement algorithm used. However, the performance evaluation of database buffer replacement algorithms commonly assumes that database accesses are independent and the probability for each individual database record to be accessed is fixed. Due to these rigid assumptions, the results of performance evaluation are not always reliable. In this dissertation, we apply Simon\u27s model of information accessing to model database accessing frequencies. This approach relaxes the independent assumption, and since it also allows certain dynamic behavior in accessing frequencies; thus, it is more robust and preferable over the traditional artificial data approach. Furthermore, taking advantage of the conceptual similarity between the self-organizing linear search heuristics and the traditional buffer replacement algorithms, we propose a self-adaptive buffer replacement scheme that outperforms conventional database buffer replacement algorithms. The findings of our study can be further applied to many other computer applications, e.g. the more complex problem of archival storage design in larger database systems

    A flexible metaheuristic framework for solving rich vehicle routing problems

    Get PDF
    Route planning is one of the most studied research topics in the operations research area. While the standard vehicle routing problem (VRP) is the classical problem formulation, additional requirements arising from practical scenarios such as time windows or vehicle compartments are covered in a wide range of so-called rich VRPs. Many solution algorithms for various VRP variants have been developed over time as well, especially within the class of so-called metaheuristics. In practice, routing software must be tailored to the business rules and planning problems of a specific company to provide valuable decision support. This also concerns the embedded solution methods of such decision support systems. Yet, publications dealing with flexibility and customization of VRP heuristics are rare. To fill this gap this thesis describes the design of a flexible framework to facilitate and accelerate the development of custom metaheuristics for the solution of a broad range of rich VRPs. The first part of the thesis provides background information to the reader on the field of vehicle routing problems and on metaheuristic solution methods - the most common and widely-used solution methods to solve VRPs. Specifically, emphasis is put on methods based on local search (for intensification of the search) and large neighborhood search (for diversification of the search), which are combined to hybrid methods and which are the foundation of the proposed framework. Then, the main part elaborates on the concepts and the design of the metaheuristic VRP framework. The framework fulfills requirements of flexibility, simplicity, accuracy, and speed, enforcing the structuring and standardization of the development process and enabling the reuse of code. Essentially, it provides a library of well-known and accepted heuristics for the standard VRP together with a set of mechanisms to adapt these heuristics to specific VRPs. Heuristics and adaptation mechanisms such as templates for user-definable checking functions are explained on a pseudocode level first, and the most relevant classes of a reference implementation using the Microsoft .NET framework are presented afterwards. Finally, the third part of the thesis demonstrates the use of the framework for developing problem-specific solution methods by exemplifying specific customizations for five rich VRPs with diverse characteristics, namely the VRP with time windows, the VRP with compartments, the split delivery VRP, the periodic VRP, and the truck and trailer routing problem. These adaptations refer to data structures and neighborhood search methods and can serve as a source of inspiration to the reader when designing algorithms for new, so far unstudied VRPs. Computational results are presented to show the effectiveness and efficiency of the proposed framework and methods, which are competitive with current state-of-the-art solvers of the literature. Special attention is given to the overall robustness of heuristics, which is an important aspect for practical application

    A Study of Client-based Caching for Parallel I/O

    Get PDF
    The trend in parallel computing toward large-scale cluster computers running thousands of cooperating processes per application has led to an I/O bottleneck that has only gotten more severe as the the number of processing cores per CPU has increased. Current parallel file systems are able to provide high bandwidth file access for large contiguous file region accesses; however, applications repeatedly accessing small file regions on unaligned file region boundaries continue to experience poor I/O throughput due to the high overhead associated with accessing parallel file system data. In this dissertation we demonstrate how client-side file data caching can improve parallel file system throughput for applications performing frequent small and unaligned file I/O. We explore the impacts of cache page size and cache capacity using the popular FLASH I/O benchmark and explore a novel cache sharing approach that leverages the trend toward multi-core processors. We also explore a technique we call progressive page caching that represents cache data using dynamic data structures rather than fixed-size pages of file data. Finally, we explore a cache aggregation scheme that leverages the high-level file I/O interfaces provided by the PVFS file system to provide further performance enhancements. In summary, our results indicate that a correctly configured middleware-based file data cache can dramatically improve the performance of I/O workloads dominated by small unaligned file accesses. Further, we demonstrate that a well designed cache can offer stable performance even when the selected cache page granularity is not well matched to the provided workload. Finally, we have shown that high-level file system interfaces can significantly accelerate application performance, and interfaces beyond those currently envisioned by the MPI-IO standard could provide further performance benefits

    Heuristiken im Service Operations Management

    Get PDF
    This doctoral thesis deals with the application of operation research methods in practice. With two cooperation companies from the service sector (retailing and healthcare), three practice-relevant decision problems are jointly elicited and defined. Subsequently, the planning problems are transferred into mathematical problems and solved with the help of optimal and/or heuristic methods. The status quo of the companies could be significantly improved for all the problems dealt with.Diese Doktorarbeit beschäftigt sich mit der Anwendung von Operation Research Methoden in der Praxis. Mit zwei Kooperationsunternehmen aus dem Dienstleistungssektor (Einzelhandel und Gesundheitswesen) werden drei praxisrelevante Planungsprobleme gemeinsam eruiert und definiert. In weiterer Folge werden die Entscheidungsmodelle in mathematische Probleme transferiert und mit Hilfe von optimalen und/oder heuristischen Verfahren gelöst. Bei allen behandelten Problemstellungen konnte der bei den Unternehmen angetroffene Status Quo signifikant verbessert werden

    Reducing Flood Risk in Shkodra through Community Engagement

    Get PDF
    Our project aids the work of the Deutsche Gesellschaft für Internationale Zusammenarbeit (GIZ) to manage flood risks in the Shkodër Region of Albania. We conducted interviews with Aarhus Information Center, the Civil Emergencies Brigade, the GIZ, and the Institute for Geosciences, Energy, Water and Environment (IGJEUM) and residents of eight different communities to understand people’s experiences, perceptions, and decision making for flooding. Interview discussions revealed that residents are unaware of some actions to take to prepare for a flood. We developed outreach tools to increase personal agency in an effort to reduce their risks for future floods. Our outreach tools will help the ongoing efforts of GIZ and its partners by increasing accessibility and discussion

    Top-k aggregation queries in large-scale distributed systems

    Get PDF
    Distributed top-k query processing has recently become an essential functionality in a large number of emerging application classes like Internet traffic monitoring and Peer-to-Peer Web search. This work addresses efficient algorithms for distributed top-k queries in wide-area networks where the index lists for the attribute values (or text terms) of a query are distributed across a number of data peers. More precisely, in this thesis, we make the following distributions: We present the family of KLEE algorithms that are a fundamental building-block towards efficient top-k query processing in distributed systems. We present means to model score distributions and show how these score models can be used to reason about parameter values that play an important role in the overall performance of KLEE. We present GRASS, a family of novel algorithms based on three optimization techniques significantly increased overall performance of KLEE and related algorithms. We present probabilistic guarantees for the result quality. Moreover, we present Minerva1, a distributed search engine. Minerva offers a highly distributed (in both the data dimension and the computational dimension), scalable, and efficient solution toward the development of internet-scale search engines.Top-k Anfragen spielen eine große Rolle in einer Vielzahl von Anwendungen, insbesondere im Bereich von Informationssystemen, bei denen eine kleine, sorgfältig ausgewählte Teilmenge der Ergebnisse den Benutzern präsentiert werden soll. Beispiele hierfür sind Suchmaschinen wie Google, Yahoo oder MSN. Obwohl die Forschung in diesem Bereich in den letzten Jahren große Fortschritte gemacht hat, haben Top-k-Anfragen in verteilten Systemen, bei denen die Daten auf verschiedenen Rechnern verteilt sind, vergleichsweise wenig Aufmerksamkeit erlangt. In dieser Arbeit beschäftigen wir uns mit der effizienten Verarbeitung eben dieser Anfragen. Die Hauptbeiträge gliedern sich wie folgt. Wir präsentieren KLEE, eine Familie neuartiger Top-k-Algorithmen. Wir entwickeln Modelle mit denen Datenverteilungen beschrieben werden können. Diese Modelle sind die Grundlage für eine Schätzung diverser Parameter, die einen großen Einfluss auf die Performanz von KLEE und anderen ähnlichen Algorithmen haben. Wir präsentieren GRASS, eine Familie von Algorithmen, basierend auf drei neuartigen Optimierungstechniken, mit denen die Performanz von KLEE und ähnlichen Algorithmen verbessert wird. Wir präsentieren probabilistische Garantien für die Ergebnisgüte. Wir präsentieren Minerva, eine neuartige verteilte Peer-to-Peer-Suchmaschine

    Fundamental Computational Geometry on the GPU

    Get PDF
    Ph.DDOCTOR OF PHILOSOPH

    Analysis avoidance techniques of malicious software

    Get PDF
    Anti Virus (AV) software generally employs signature matching and heuristics to detect the presence of malicious software (malware). The generation of signatures and determination of heuristics is dependent upon an AV analyst having successfully determined the nature of the malware, not only for recognition purposes, but also for the determination of infected files and startup mechanisms that need to be removed as part of the disinfection process. If a specimen of malware has not been previously extensively analyzed, it is unlikely to be detected by AV software. In addition, malware is becoming increasingly profit driven and more likely to incorporate stealth and deception techniques to avoid detection and analysis to remain on infected systems for a myriad of nefarious purposes. Malware extends beyond the commonly thought of virus or worm, to customized malware that has been developed for specific and targeted miscreant purposes. Such customized malware is highly unlikely to be detected by AV software because it will not have been previously analyzed and a signature will not exist. Analysis in such a case will have to be conducted by a digital forensics analyst to determine the functionality of the malware. Malware can employ a plethora of techniques to hinder the analysis process conducted by AV and digital forensics analysts. The purpose of this research has been to answer three research questions directly related to the employment of these techniques as: 1. What techniques can malware use to avoid being analyzed? 2. How can the use of these techniques be detected? 3. How can the use of these techniques be mitigated

    Bit-Flip Aware Data Structures for Phase Change Memory

    Get PDF
    Big, non-volatile, byte-addressable, low-cost, and fast non-volatile memories like Phase Change Memory are appearing in the marketplace. They have the capability to unify both memory and storage and allow us to rethink the present memory hierarchy. An important draw-back to Phase Change Memory is limited write-endurance. In addition, Phase Change Memory shares with other Non-Volatile Random Access Memories an asym- metry in the energy costs of writes and reads. Best use of Non-Volatile Random Access Memories limits the number of times a Non-Volatile Random Access Memory cell changes contents, called a bit-flip. While the future of main memory is still unknown, we should already start to create data structures for them in order to shape the future era. This thesis investigates the creation of bit-flip aware data structures.The thesis first considers general ways in which a data structure can save bit- flips by smart overwrites and by using the exclusive-or of pointers. It then shows how a simple content dependent encoding can reduce bit-flips for web corpora. It then shows how to build hash based dictionary structures for Linear Hashing and Spiral Storage. Finally, the thesis presents Gray counters, close to bit-flip optimal counters that even enable age- based wear leveling with counters managed by the Non-Volatile Random Access Memories themselves instead of by the Operating Systems
    corecore