排序方式: 共有32条查询结果,搜索用时 15 毫秒
11.
I. Gilath S. Eliezer T. Bar-Noy R. Englman Z. Jaeger 《International Journal of Impact Engineering》1993,14(1-4):279-289
Dynamic fracture at hypervelocity impact conditions was investigated in different materials using short pulsed laser induced shock waves. All stages of damage evolution were identified for one dimensional or spherical shock wave impact geometry. A new experimental method is presented to estimate the shock pressure decay in materials. In the theoretical section we obtain the damage induced in the target, as follows: The shock wave is modeled by an expanding stress front, which creates micro-damage in the laser impacted layer and extrudes a bulge at the far surface. The calculated bulge geometry compares well with that observed by us for metal-adhesive-metal sandwiches. The micro-defects coalesce into macro- damage or fracture by a mechanism which is described by percolation theory. 相似文献
12.
This paper presents a schematic algorithm for distributed systems. This schematic algorithm uses a black-box procedure for communication, the output of which must meet two requirements: a global-order requirement and a deadlock-free requirement. This algorithm is valid in any distributed system model that can provide such a communication procedure that complies with these requirements. Two such models exist in an asynchronous fail-stop environment: one in the shared-memory model and one in the message-passing model. The implementation of the block-box procedure in these models enables us to translate existing algorithms between the two models whenever these algorithms are based on the schematic algorithm.We demonstrate this idea in two ways. First, we present a randomized algorithm for the consensus problem in the message-passing model based on the algorithm of Aspnes and Herlihy [AH] in the shared-memory model. This solution is the fastest known randomized algorithm that solves the consensus problem against a strong fail-stop adversary with one-half resiliency. Second, we solve the processor renaming problem in the shared-memory model based on the solution of Attiyaet al. [ABD+] in the message-passing model. The existence of the solution to the renaming problem should be contrasted with the impossibility result for the consensus problem in the shared-memory model [CIL], [DDS], [LA].A preliminary version of this paper, Shared-Memory vs. Message-Passing in an Asynchronous Distributed Environment, appeared inProc. 8th ACM Symp. on Principles of Distributed Computing, pp. 307–318, 1989. Part of this work was done while A. Bar-Noy visited the Computer Science Department, Stanford University, Stanford, CA 94305, USA, and his research was supported in part by a Weizmann fellowship, by Contract ONR N00014-88-K-0166, and by a grant of Stanford's Center for Integrated Systems. 相似文献
13.
Fangfei Chen Matthew P. Johnson Amotz Bar-Noy Thomas F. La Porta 《Wireless Networks》2012,18(7):749-762
In many situations and domains it is important to deliver information to personnel as they work in the field. We consider a specialized content distribution application in wireless mesh networks. When a new mission arrives??for example, when a fire alarm sounds??data is pushed to storage nodes at the mission site where it may be retrieved locally by responding personnel (e.g., police, firefighters, paramedics, government officials, and the media). It is important that information is available at low latency, when requested or pulled by the personnel. The total latency experienced will be a combination of the push delay (if the personnel arrive at the mission site before all the data can be pushed), and the pull delay. Each delay component will in turn be a function of (1) the hop distance traveled by the data when pushed or pulled and (2) any congestion on the links. In this paper, we define algorithms and protocols that trade-off the push and pull latencies depending on the type of application. Our goal is to choose a storage node assignment minimizing the total latency-based cost. We start with a simple model in which cost is a function of distance, and then extend the model, explicitly taking congestion into account. Since the problem is NP-hard even to approximate, our focus is on developing efficient algorithms and distributed protocols that can be easily deployed in wireless mesh networks. In NS2 simulations, we find that our heuristic algorithms achieve, on average, a cost within at most 15% of the optimum. 相似文献
14.
Abstract. Consider the following problem. A switch connecting n input channels to a single output channel must deliver all incoming messages through this channel. Messages are composed
of packets , and in each time slot the switch can deliver a single packet from one of the input queues to the output channel. In order
to prevent packet loss, a buffer is maintained for each input channel. The goal of a switching policy is to minimize the maximum
buffer size. The setting is on-line; decisions must be made based on the current state without knowledge of future events.
This general scenario models multiplexing tasks in various systems such as communication networks, cable modem systems, and
traffic control. Traditionally, researchers analyzed the performance of a given policy assuming some distribution on the arrival
rates of messages at the input queues, or assuming that the service rate is at least the aggregate of all the input rates.
We use competitive analysis, avoiding any prior assumptions on the input. We show O(log n )-competitive switching policies for the problem and demonstrate matching lower bounds. 相似文献
15.
Amotz Bar-Noy Mihir Bellare Magnús M Halldórsson Hadas Shachnai Tami Tamir 《Information and Computation》1998,140(2):183
This paper studies an optimization problem that arises in the context of distributed resource allocation: Given a conflict graph that represents the competition of processors over resources, we seek an allocation under which no two jobs with conflicting requirements are executed simultaneously. Our objective is to minimize theaverage response timeof the system. In alternative formulation this is known as theMinimum Color Sum (MCS)problem (E. Kubicka and A. J. Schwenk, 1989. An introduction to chromatic sums,in“Proceedings of the ACM Computer Science Conference,” pp. 39–45.). We show that the algorithm based on finding iteratively a maximum independent set (MaxIS) is a 4-approximation to the MCS. This bound is tight to within a factor of 2. We give improved ratios for the classes of bipartite, bounded-degree, and line graphs. The bound generalizes to a 4ρ-approximation of MCS for classes of graphs for which the maximum independent set problem can be approximated within a factor ofρ. On the other hand, we show that ann1−ε-approximation is NP-hard, for someε>0. For some instances of the resource allocation problem, such as theDining Philosophers, an efficient solution requiresedgecoloring of the conflict graph. We introduce theMinimum Edge Color Sum (MECS)problem which is shown to be NP-hard. We show that a 2-approximation to MECS(G) can be obtained distributively usingcompactcoloring withinO(log2 n) communication rounds 相似文献
16.
Bar-Noy A. Bruck J. Ching-Tien Ho Kipnis S. Schieber B. 《Parallel and Distributed Systems, IEEE Transactions on》1995,6(8):896-900
Consider a message-passing system of n processors, in which each processor holds one piece of data initially. The goal is to compute an associative and commutative reduction function on the n pieces of data and to make the result known to all the n processors. This operation is frequently used in many message-passing systems and is typically referred to as global combine, census computation, or gossiping. This paper explores the problem of global combine in the multiport postal model. This model is characterized by three parameters: n-the number of processors, k-the number of ports per processor, and λ-the communication latency. In this model, in every round r, each processor can send k distinct messages to k other processors, and it can receive k messages that were sent from k other processors λ-1 rounds earlier. This paper provides an optimal algorithm for the global combine problem that requires the least number of communication rounds and minimizes the time spent by any processor in sending and receiving messages 相似文献
17.
Amotz Bar-Noy Richard E. Ladner Tami Tamir Tammy VanDeGrift 《Journal of Scheduling》2012,15(2):141-155
The generalized windows scheduling problem for n jobs on multiple machines is defined as follows: Given is a sequence, I=〈(w
1,ℓ
1),(w
2,ℓ
2),…,(w
n
,ℓ
n
)〉 of n pairs of positive integers that are associated with the jobs 1,2,…,n, respectively. The processing length of job i is ℓ
i
slots where a slot is the processing time of one unit of length. The goal is to repeatedly and non-preemptively schedule
all the jobs on the fewest possible machines such that the gap (window) between two consecutive beginnings of executions of
job i is at most w
i
slots. This problem arises in push broadcast systems in which data are transmitted on multiple channels. The problem is NP-hard
even for unit-length jobs and a (1+ε)-approximation algorithm is known for this case by approximating the natural lower bound W(I)=?i=1n(1/wi)W(I)=\sum_{i=1}^{n}(1/w_{i}). The techniques used for approximating unit-length jobs cannot be extended for arbitrary-length jobs mainly because the optimal
number of machines might be arbitrarily larger than the generalized lower bound W(I)=?i=1n(li/wi)W(I)=\sum_{i=1}^{n}(\ell_{i}/w_{i}). The main result of this paper is an 8-approximation algorithm for the WS problem with arbitrary lengths using new methods,
different from those used for the unit-length case. The paper also presents another algorithm that uses 2(1+ε)W(I)+logw
max machines and a greedy algorithm that is based on a new tree representation of schedules. The greedy algorithm is optimal
for some special cases, and computational experiments show that it performs very well in practice. 相似文献
18.
19.
Consider the following problem. A switch connecting n input channels to a single output channel must deliver all incoming messages through this channel. Messages are composed of packets , and in each time slot the switch can deliver a single packet from one of the input queues to the output channel. In order to prevent packet loss, a buffer is maintained for each input channel. The goal of a switching policy is to minimize the maximum buffer size. The setting is on-line; decisions must be made based on the current state without knowledge of future events. This general scenario models multiplexing tasks in various systems such as communication networks, cable modem systems, and traffic control. Traditionally, researchers analyzed the performance of a given policy assuming some distribution on the arrival rates of messages at the input queues, or assuming that the service rate is at least the aggregate of all the input rates. We use competitive analysis, avoiding any prior assumptions on the input. We show O(log n )-competitive switching policies for the problem and demonstrate matching lower bounds. 相似文献
20.