共查询到20条相似文献,搜索用时 7 毫秒
1.
The earliest-pseudo-deadline-first (
) Pfair scheduling algorithm is less expensive than some other known Pfair algorithms, but is not optimal for scheduling recurrent
real-time tasks on more than two processors. In prior work, sufficient per-task weight (i.e., utilization) restrictions were established for ensuring that tasks either do not miss their deadlines or have bounded tardiness
when scheduled under
. Implicit in these restrictions is the assumption that the total system utilization may equal the total available processing
capacity (i.e., the total number of processors). This paper considers an orthogonal issue, namely, determining a sufficient restriction
on the total utilization of a task set for it to be schedulable (i.e., a schedulable utilization bound) under
, assuming that there are no per-task weight restrictions. We prove that a task set with total utilization at most
is correctly scheduled under
on M processors, regardless of how large each task’s weight is. At present, we do not know whether this value represents the worst-case
for
, but we do provide a counterexample that shows that it cannot be improved to exceed 86% of the total processing capacity.
The schedulable utilization bound we derive is expressed in terms of the maximum weight of any task, and hence, if this value
is known, may be used to schedule task sets with total utilization greater than
.
相似文献
UmaMaheswari C. DeviEmail: |
2.
Tomasz Jurdziński Friedrich Otto František Mráz Martin Plátek 《Theory of Computing Systems》2008,42(4):488-518
The
-automaton is the weakest form of the nondeterministic version of the restarting automaton that was introduced by Jančar et al. to model the so-called analysis by reduction. Here it is shown that the class ℒ(R) of languages that are accepted by
-automata is incomparable under set inclusion to the class
of Church-Rosser languages and to the class
of growing context-sensitive languages. In fact this already holds for the class
of languages that are accepted by 2-monotone
-automata. In addition, we prove that already the latter class contains
-complete languages, showing that already the 2-monotone
-automaton has a surprisingly large expressive power.
The results of this paper have been announced at DLT 2004 in Auckland, New Zealand.
This work was mainly carried out while T. Jurdziński was visiting the University of Kassel, supported by a grant from the
Deutsche Forschungsgemeinschaft (DFG).
F. Mráz and M. Plátek were partially supported by the Grant Agency of the Czech Republic under Grant-No. 201/04/2102 and by
the program ‘Information Society’ under project 1ET100300517. F. Mráz was also supported by the Grant Agency of Charles University
in Prague under Grant-No. 358/2006/A-INF/MFF. 相似文献
3.
In this paper, the method of well-combined semantics and syntax proposed by Pavelka is applied to the research of the propositional
calculus formal system
. The partial constant values are taken as formulas, formulas are fuzzified in two manners of semantics and syntax, and inferring
processes are fuzzified. A sequence of new extensions {
} of the system
is proposed, and the completeness of
is proved. 相似文献
4.
Enrico Marchioni 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2009,13(6):559-564
In this work we further explore the connection between -algebras and ordered fields. We show that any two -chains generate the same variety if and only if they are related to ordered fields that have the same universal theory.
This will yield that any -chain generates the whole variety if and only if it contains a subalgebra isomorphic to the -chain of real algebraic numbers, that consequently is the smallest -chain generating the whole variety. We also show that any two different subalgebras of the -chain over the real algebraic numbers generate different varieties. This will be exploited in order to prove that the lattice
of subvarieties of -algebras has the cardinality of the continuum. Finally, we will also briefly deal with some model-theoretic properties of
-chains related to real closed fields, proving quantifier-elimination and related results. 相似文献
5.
6.
Jianming Zhan Wiesław A. Dudek Young Bae Jun 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2009,13(1):13-21
We introduce the concept of quasi-coincidence of a fuzzy interval value with an interval valued fuzzy set. By using this new
idea, we introduce the notions of interval valued -fuzzy filters of pseudo BL-algebras and investigate some of their related properties. Some characterization theorems of these generalized interval valued
fuzzy filters are derived. The relationship among these generalized interval valued fuzzy filters of pseudo BL-algebras is considered. Finally, we consider the concept of implication-based interval valued fuzzy implicative filters of
pseudo BL-algebras, in particular, the implication operators in Lukasiewicz system of continuous-valued logic are discussed. 相似文献
7.
Jialu Zhang Guojun Wang Mingdi Hu 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2008,12(6):585-591
This paper introduces the concepts of R
0 valuation, R
0 semantic, countable R
0 category , R
0 fuzzy topological category , etc. It is established in a natural way that the fuzzy topology δ and its cut topology on the set Ω
M
consisting of all R
0 valuations of an R
0 algebra M, and some properties of fuzzy topology δ and its cut topology are investigated carefully. Moreover, the representation theorem
for R
0 algebras by means of fuzzy topology is given, that is to say the category is equivalent to the category . By studying the relation between valuations and filters, the Loomis–Sikorski theorem for R
0 algebras is obtained. As an application, K-compactness of the R
0 logic is discussed. 相似文献
8.
Chvátal-Gomory cuts are among the most well-known classes of cutting planes for general integer linear programs (ILPs). In
case the constraint multipliers are either 0 or
, such cuts are known as
-cuts. It has been proven by Caprara and Fischetti (Math. Program. 74:221–235, 1996) that separation of
-cuts is
-hard.
In this paper, we study ways to separate
-cuts effectively in practice. We propose a range of preprocessing rules to reduce the size of the separation problem. The
core of the preprocessing builds a Gaussian elimination-like procedure. To separate the most violated
-cut, we formulate the (reduced) problem as integer linear program. Some simple heuristic separation routines complete the
algorithmic framework.
Computational experiments on benchmark instances show that the combination of preprocessing with exact and/or heuristic separation
is a very vital idea to generate strong generic cutting planes for integer linear programs and to reduce the overall computation
times of state-of-the-art ILP-solvers. 相似文献
9.
The convergence analysis of multigrid methods for boundary element equations arising from negative-order pseudo-differential operators is quite different from the usual finite element multigrid analysis for elliptic partial differential equations. In this paper, we study the convergence of geometrical multigrid methods for solving large-scale, data-sparse boundary element equations. In particular, we investigate multigrid methods for \(\mathcal{H}\)-matrices arising from the adaptive cross approximation to the single layer potential operator. 相似文献
10.
Generalized fuzzy bi-ideals of semigroups 总被引:1,自引:0,他引:1
Osman Kazancı Sultan Yamak 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2008,12(11):1119-1124
After the introduction of fuzzy sets by Zadeh, there have been a number of generalizations of this fundamental concept. The
notion of (∈, ∈ ∨q)-fuzzy subgroups introduced by Bhakat is one among them. In this paper, using the relations between fuzzy points and fuzzy
sets, the concept of a fuzzy bi-ideal with thresholds is introduced and some interesting properties are investigated. The
acceptable nontrivial concepts obtained in this manner are the (∈, ∈ ∨q)-fuzzy bi-ideals and -fuzzy bi-ideals, which are extension of the concept of a fuzzy bi-ideal in semigroup. 相似文献
11.
12.
Xueling Ma Jianming Zhan Yang Xu 《Soft Computing - A Fusion of Foundations, Methodologies and Applications》2007,11(11):1079-1087
In this paper, we introduce the notions of interval valued -fuzzy filters and interval valued -fuzzy Boolean (implicative) filters in R
0-algebras and investigate some of their related properties. Some characterization theorems of these generalized fuzzy filters
are derived. In particular, we prove that an interval valued fuzzy set F in R
0-algebras is an interval valued -fuzzy Boolean filter if and only if it is an interval valued -fuzzy implicative filter. 相似文献
13.
In this paper, a method for matching complex objects in line-drawings is presented. Our approach is based on the notion of
-signatures, which are a special kind of histogram of forces [17,19,28]. Such histograms have low time complexity and describe signatures that are invariant to fundamental geometrical transformations such as scaling, translation, symmetry, and rotation. This article presents a new application of this notion in the field of symbol identification and recognition. To improve the efficiency of matching, we propose using an approximation of the
-signature from Fourier series and the associated matching.Received: 7 October 2002, Accepted: 1 December 2002, Published online: 4 July 2003 相似文献
14.
A method is described for the determination of limits of vibration suppression in an elastic structure by means of a given number of control actuators. The method is based on a theorem, described and proved herein, that defines the lower limit of residual deformations for specified disturbances and a given map of placement of actuators which can produce finite control forces. The new method can identify regions of placement which result in acceptable residual deformations, thus making control design easier and reduces the cost of searching for optimal actuator positions. Unlike traditional methods used to solve this class of problems, the new method does not require knowledge about the excitation states of various deformation modes. The method is demonstrated by applying it to a simply supported beam and a plate. 相似文献
15.
Querying high-dimensional data in single-dimensional space 总被引:1,自引:0,他引:1
In this paper, we propose a new tunable index scheme, called iMinMax(
), that maps points in high-dimensional spaces to single-dimensional values determined by their maximum or minimum values among all dimensions. By varying the tuning knob,
, we can obtain different families of iMinMax structures that are optimized for different distributions of data sets. The transformed data can then be indexed using existing single-dimensional indexing structures such as the B + -trees. Queries in the high-dimensional space have to be transformed into queries in the single-dimensional space and evaluated there. We present efficient algorithms for evaluating window queries as range queries on the single-dimensional space. We conducted an extensive performance study to evaluate the effectiveness of the proposed schemes. Our results show that iMinMax(
) outperforms existing techniques, including the Pyramid scheme and VA-file, by a wide margin. We then describe how iMinMax could be used in approximate K-nearest neighbor (KNN) search, and we present a comparative study against the recently proposed iDistance, a specialized KNN indexing method.Received: 21 May 2000, Revised: 14 March 2002, Published online: 8 April 2004Edited by: M. Kitsuregawa. 相似文献
16.
Littlestone developed a simple deterministic on-line learning algorithm for learning k-literal disjunctions. This algorithm (called
) keeps one weight for each of then variables and does multiplicative updates to its weights. We develop a randomized version of
and prove bounds for an adaptation of the algorithm for the case when the disjunction may change over time. In this case a possible target disjunction schedule
is a sequence of disjunctions (one per trial) and the shift size is the total number of literals that are added/removed from the disjunctions as one progresses through the sequence.We develop an algorithm that predicts nearly as well as the best disjunction schedule for an arbitrary sequence of examples. This algorithm that allows us to track the predictions of the best disjunction is hardly more complex than the original version. However, the amortized analysis needed for obtaining worst-case mistake bounds requires new techniques. In some cases our lower bounds show that the upper bounds of our algorithm have the right constant in front of the leading term in the mistake bound and almost the right constant in front of the second leading term. Computer experiments support our theoretical findings. 相似文献
17.
In this paper we construct several numerical approximations for first order Hamilton–Jacobi equations on triangular meshes. We show that, thanks to a filtering procedure, the high order versions are non-oscillatory in the sense of satisfying the maximum principle. The methods are based on the first order Lax–Friedrichs scheme [2] which is improved here adjusting the dissipation term. The resulting first order scheme is -monotonic (we explain the expression in the paper) and converges to the viscosity solution as
for the L
-norm. The first high order method is directly inspired by the ENO philosophy in the sense where we use the monotonic Lax–Friedrichs Hamiltonian to reconstruct our numerical solutions. The second high order method combines a spatial high order discretization with the classical high order Runge–Kutta algorithm for the time discretization. Numerical experiments are performed for general Hamiltonians and L
1, L
2 and L
-errors with convergence rates calculated in one and two space dimensions show the k-th order rate when piecewise polynomial of degree k functions are used, measured in L
1-norm. 相似文献
18.
19.
We give “syntactic’’ characterizations of context-sensitive languages (CSLs) in terms of some restricted models of symport/antiport P systems. These are the first such characterizations of CSLs in terms of P systems. In particular, we show the following for any language L over a binary alphabet:
- (1)
- Let m be any integer ≥1. Then L is a CSL if and only if it can be accepted by a restricted symport/antiport P system with m membranes and multiple number of symbols (objects). Moreover, holding the number of membranes at m, there is an infinite hierarchy in computational power (within the class of binary CSLs) with respect to the number of symbols. 相似文献