2,671 research outputs found

    A Framework for Applying Reinforcement Learning to Deadlock Handling in Intralogistics

    Get PDF
    Intralogistics systems, while complex, are crucial for a range of industries. One of their challenges is deadlock situations that can disrupt operations and decrease efficiency. This paper presents a four-stage framework for applying reinforcement learning algorithms to manage deadlocks in such systems. The stages include Problem Formulation, Model Selection, Algorithm Selection, and System Deployment. We carefully identify the problem, select an appropriate model to represent the system, choose a suitable reinforcement learning algorithm, and finally deploy the solution. Our approach provides a structured method to tackle deadlocks, improving system resilience and responsiveness. This comprehensive guide can serve researchers and practitioners alike, offering a new avenue for enhancing intralogistics performance. Future research can explore the framework’s effectiveness and applicability across different systems

    An energy-efficient memory unit for clustered microarchitectures

    Get PDF
    Whereas clustered microarchitectures themselves have been extensively studied, the memory units for these clustered microarchitectures have received relatively little attention. This article discusses some of the inherent challenges of clustered memory units and shows how these can be overcome. Clustered memory pipelines work well with the late allocation of load/store queue entries and physically unordered queues. Yet this approach has characteristic problems such as queue overflows and allocation patterns that lead to deadlocks. We propose techniques to solve each of these problems and show that a distributed memory unit can offer significant energy savings and speedups over a centralized unit. For instance, compared to a centralized cache with a load/store queue of 64/24 entries, our four-cluster distributed memory unit with load/store queues of 16/8 entries each consumes 31 percent less energy and performs 4,7 percent better on SPECint and consumes 36 percent less energy and performs 7 percent better for SPECfp.Peer ReviewedPostprint (author's final draft

    An efficient deadlock prevention approach for service oriented transaction processing

    Get PDF
    Transaction processing can guarantee the reliability of business applications. Locking resources is widely used in distributed transaction management (e.g., two phase commit, 2PC) to keep the system consistent. The locking mechanism, however, potentially results in various deadlocks. In service oriented architecture (SOA), the deadlock problem becomes even worse because multiple (sub)transactions try to lock shared resources in the unexpectable way due to the more randomicity of transaction requests, which has not been solved by existing research results. In this paper, we investigate how to prevent local deadlocks, caused by the resource competition among multiple sub-transactions of a global transaction, and global deadlocks from the competition among different global transactions. We propose a replication based approach to avoid the local deadlocks, and a timestamp based approach to significantly mitigate the global deadlocks. A general algorithm is designed for both local and global deadlock prevention. The experimental results demonstrate the effectiveness and efficiency of our deadlock prevention approach. Further, it is also proved that our approach provides higher system performance than traditional resource allocation schemes. © 2011 Elsevier Ltd. All rights reserved.link_to_subscribed_fulltex

    The value of theoretical multiplicity for steering transitions towards sustainability

    Get PDF
    Transition management, as a theory of directing structural societal changes towards sustainable system innovations, has become a major topic in scientific research over the last years. In this paper we focus on the question how transitions towards sustainability can be steered, governed or managed, in particular by governmental actors. We suggest an approach of theoretical multiplicity, arguing that multiple theories will be needed simultaneously for dealing with the complex societal sustainability issues. Therefore, we address the steering question by theoretically comparing transition management theory to a number of related theories on societal change and intervention, such as multi-actor collaboration, network governance, configuration management, policy agenda setting, and adaptive management. We conclude that these related theories put the managerial assumptions of transition management into perspective, by adding other steering roles and leadership mechanisms to the picture. Finally we argue that new modes of steering inevitable have consequences for the actual governance institutions. New ways of governing change ask for change within governance systems itself and vice versa. Our argument for theoretical multiplicity implicates the development of multiple, potentially conflicting, governance capacitie

    Conflict in Organizations

    Get PDF
    {Excerpt} Michael Cohen, James March, and Johan Olsen9 have developed an influential, agent-based representation of organizational decision-making processes. They submit that organizations are—at least in part and part of the time—distinguished by three general properties: (i) problematic preferences, (ii) unclear technology, and (iii) fluid participation. Citing, “Although organizations can often be viewed conveniently as vehicles for solving well-defined problems or structures within which conflict is resolved through bargaining, they also provide sets of procedures through which participants arrive at an interpretation of what they are doing and what they have done while in the process of doing it. From this point of view, an organization is a collection of choices looking for problems, issues and feelings looking for decision situations in which they might be aired, solutions looking for issues to which they might be the answer, and decision makers looking for work.” Decision opportunities characterized by problematic preferences, unclear technology, and fluid participation, viz., ambiguous stimuli, generate three possible outcomes, each driven by the energy it requires within the confines of organizational structure. These outcomes, whose meaning changes over time, are resolution, oversight, and flight. Significantly, resolution of problems as a style for making decisions is not the most common; in its place, decision making by flight or oversight is the feature. Is it any wonder then that the relatively complicated intermeshing of elements does not enable organizations to resolve problems as often as their mandates demand

    Petri Games: Synthesis of Distributed Systems with Causal Memory

    Full text link
    We present a new multiplayer game model for the interaction and the flow of information in a distributed system. The players are tokens on a Petri net. As long as the players move in independent parts of the net, they do not know of each other; when they synchronize at a joint transition, each player gets informed of the causal history of the other player. We show that for Petri games with a single environment player and an arbitrary bounded number of system players, deciding the existence of a safety strategy for the system players is EXPTIME-complete.Comment: In Proceedings GandALF 2014, arXiv:1408.556

    An Approach for Supporting Ad-hoc Modifications in Distributed Workflow Management Systems

    Get PDF
    Supporting enterprise-wide or even cross-organizational business processes is a characteristic challenge for any workflow management system (WfMS). Scalability at the presence of high loads as well as the capability to dynamically modify running workflow (WF) instances (e.g., to cope with exceptional situations) are essential requirements in this context. Should the latter one, in particular, not be met, the WfMS will not have the necessary flexibility to cover the wide range of process-oriented applications deployed in many organizations. Scalability and flexibility have, for the most part, been treated separately in the relevant literature thus far. Even though they are basic needs for a WfMS, the requirements related with them are totally different. To achieve satisfactory scalability, on the one hand, the system needs to be designed such that a workflow instance can be controlled by several WF servers that are as independent from each other as possible. Yet dynamic WF modifications, on the other hand, necessitate a (logical) central control instance which knows the current and global state of a WF instance. For the first time, this paper presents methods which allow ad-hoc modifications (e.g., to insert, delete, or shift steps) to be performed in a distributed WfMS; i.e., in a WfMS with partitioned WF execution graphs and distributed WF control. It is especially noteworthy that the system succeeds in realizing the full functionality as given in the central case while, at the same time, achieving extremely favorable behavior with respect to communication costs

    Access Control Synthesis for Physical Spaces

    Full text link
    Access-control requirements for physical spaces, like office buildings and airports, are best formulated from a global viewpoint in terms of system-wide requirements. For example, "there is an authorized path to exit the building from every room." In contrast, individual access-control components, such as doors and turnstiles, can only enforce local policies, specifying when the component may open. In practice, the gap between the system-wide, global requirements and the many local policies is bridged manually, which is tedious, error-prone, and scales poorly. We propose a framework to automatically synthesize local access control policies from a set of global requirements for physical spaces. Our framework consists of an expressive language to specify both global requirements and physical spaces, and an algorithm for synthesizing local, attribute-based policies from the global specification. We empirically demonstrate the framework's effectiveness on three substantial case studies. The studies demonstrate that access control synthesis is practical even for complex physical spaces, such as airports, with many interrelated security requirements
    corecore