To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
We consider a server with large capacity delivering video files encoded in various resolutions. We assume that the system is under saturation in the sense that the total demand exceeds the server capacity C. In such a case, requests may be rejected. For the policies considered in this paper, instead of rejecting a video request, it is downgraded. When the occupancy of the server is above some value C0 < C, the server delivers the video at a minimal bit rate. The quantity C0 is the bit rate adaptation threshold. For these policies, request blocking is thus replaced with bit rate adaptation. Under the assumptions of Poisson request arrivals and exponential service times, we show that, by rescaling the system, a process associated with the occupancy of the server converges to some limiting process whose invariant distribution is computed explicitly. This allows us to derive an asymptotic expression of the key performance measure of such a policy, namely the equilibrium probability that a request is transmitted at requested bitrate. Numerical applications of these results are presented.
We study a nonpreemptive scheduling on two parallel identical machines with a dedicated loading server and a dedicated unloading server. Each job has to be loaded by the loading server before being processed on one of the machines and unloaded immediately by the unloading server after its processing. The loading and unloading times are both equal to one unit of time. The goal is to minimize the makespan. Since the problem is NP-hard, we apply the classical list scheduling and largest processing time heuristics, and show that they have worst-case ratios, $8/5$ and $6/5$, respectively.
We analyse a parallel (identical) machine scheduling problem with job delivery to a single customer. For this problem, each job needs to be processed on $m$ parallel machines non-pre-emptively and then transported to a customer by one vehicle with a limited physical capacity. The optimization goal is to minimize the makespan, the time at which all the jobs are processed and delivered and the vehicle returns to the machine. We present an approximation algorithm with a tight worst-case performance ratio of $7/3-1/m$ for the general case, $m\geq 3$.
Computer or communication networks are so designed that they do not easily get disrupted under external attack. Moreover, they are easily reconstructed when they do get disrupted. These desirable properties of networks can be measured by various parameters, such as connectivity, toughness and scattering number. Among these parameters, the isolated scattering number is a comparatively better parameter to measure the vulnerability of networks. In this paper we first prove that for split graphs, this number can be computed in polynomial time. Then we determine the isolated scattering number of the Cartesian product and the Kronecker product of special graphs and special permutation graphs.
In this paper we propose a model for biological neural nets where the activity of the network is described by Hawkes processes having a variable length memory. The particularity in this paper is that we deal with an infinite number of components. We propose a graphical construction of the process and build, by means of a perfect simulation algorithm, a stationary version of the process. To implement this algorithm, we make use of a Kalikow-type decomposition technique. Two models are described in this paper. In the first model, we associate to each edge of the interaction graph a saturation threshold that controls the influence of a neuron on another. In the second model, we impose a structure on the interaction graph leading to a cascade of spike trains. Such structures, where neurons are divided into layers, can be found in the retina.
A service system with multiple types of customers, arriving according to Poisson processes, is considered. The system is heterogeneous in that the servers can also be of multiple types. Each customer has an independent, exponentially distributed service time, with the mean determined by its type. Multiple customers (possibly of different types) can be placed for service into one server, subject to `packing' constraints, which depend on the server type. Service times of different customers are independent, even if served simultaneously by the same server. The large-scale asymptotic regime is considered such that the customer arrival rates grow to ∞. We consider two variants of the model. For the infinite-server model, we prove asymptotic optimality of the greedy random (GRAND) algorithm in the sense of minimizing the weighted (by type) number of occupied servers in steady state. (This version of GRAND generalizes that introduced by Stolyar and Zhong (2015) for homogeneous systems, with all servers of the same type.) We then introduce a natural extension of the GRAND algorithm for finite-server systems with blocking. Assuming subcritical system load, we prove existence, uniqueness, and local stability of the large-scale system equilibrium point such that no blocking occurs. This result strongly suggests a conjecture that the steady-state blocking probability under the algorithm vanishes in the large-scale limit.
We study an M/G/1-type queueing model with the following additional feature. The server works continuously, at fixed speed, even if there are no service requirements. In the latter case, it is building up inventory, which can be interpreted as negative workload. At random times, with an intensity ω(x) when the inventory is at level x>0, the present inventory is removed, instantaneously reducing the inventory to 0. We study the steady-state distribution of the (positive and negative) workload levels for the cases ω(x) is constant and ω(x) = ax. The key tool is the Wiener–Hopf factorization technique. When ω(x) is constant, no specific assumptions will be made on the service requirement distribution. However, in the linear case, we need some algebraic hypotheses concerning the Laplace–Stieltjes transform of the service requirement distribution. Throughout the paper, we also study a closely related model arising from insurance risk theory.
In this paper we present closed-form expressions for the distribution of the virtual (actual) queueing time for the BMAP/R/1 and BMAP/D/1 queues, where `R' represents a class of distributions having rational Laplace‒Stieltjes transforms. The closed-form analysis is based on the roots of the underlying characteristic equation. Numerical aspects have been tested for a variety of arrival and service-time distributions and results are matched with those obtained using the matrix-analytic method (MAM). Further, a comparative study of computation time of the proposed method with the MAM has been carried out. Finally, we also present closed-form expressions for the distribution of the virtual (actual) system time. The proposed method is analytically quite simple and easy to implement.
We consider a system of N parallel queues with identical exponential service rates and a single dispatcher where tasks arrive as a Poisson process. When a task arrives, the dispatcher always assigns it to an idle server, if there is any, and to a server with the shortest queue among d randomly selected servers otherwise (1≤d≤N). This load balancing scheme subsumes the so-called join-the-idle queue policy (d=1) and the celebrated join-the-shortest queue policy (d=N) as two crucial special cases. We develop a stochastic coupling construction to obtain the diffusion limit of the queue process in the Halfin‒Whitt heavy-traffic regime, and establish that it does not depend on the value of d, implying that assigning tasks to idle servers is sufficient for diffusion level optimality.
Classical Jackson networks are a well-established tool for the analysis of complex systems. In this paper we analyze Jackson networks with the additional features that (i) nodes may have an infinite supply of low priority work and (ii) nodes may be unstable in the sense that the queue length at these nodes grows beyond any bound. We provide the limiting distribution of the queue length distribution at stable nodes, which turns out to be of product form. A key step in establishing this result is the development of a new algorithm based on adjusted traffic equations for detecting unstable nodes. Our results complement the results known in the literature for the subcases of Jackson networks with either infinite supply nodes or unstable nodes by providing an analysis of the significantly more challenging case of networks with both types of nonstandard node present. Building on our product-form results, we provide closed-form solutions for common customer and system oriented performance measures.
We consider continuous review inventory systems with general doubly stochastic Poisson demand. In this specific case the demand rate, experienced by the system, varies as a function of the age of the oldest unit in the system. It is known that the stationary distributions of the ages in such models often have a strikingly simple form. In particular, they exhibit a typical feature of a Poisson process: given the age of the oldest unit the remaining ages are uniform. The model we treat here generalizes some known inventory models dealing with partial backorders, perishable items, and emergency replenishment. We derive the limiting joint density of the ages of the units in the system by solving partial differential equations. We also answer the question of the uniqueness of the stationary distributions which was not addressed in the related literature.
In this paper we study random Apollonian networks (RANs) and evolving Apollonian networks (EANs), in d dimensions for any d≥2, i.e. dynamically evolving random d-dimensional simplices, looked at as graphs inside an initial d-dimensional simplex. We determine the limiting degree distribution in RANs and show that it follows a power-law tail with exponent τ=(2d-1)/(d-1). We further show that the degree distribution in EANs converges to the same degree distribution if the simplex-occupation parameter in the nth step of the dynamics tends to 0 but is not summable in n. This result gives a rigorous proof for the conjecture of Zhang et al. (2006) that EANs tend to exhibit similar behaviour as RANs once the occupation parameter tends to 0. We also determine the asymptotic behaviour of the shortest paths in RANs and EANs for any d≥2. For RANs we show that the shortest path between two vertices chosen u.a.r. (typical distance), the flooding time of a vertex chosen uniformly at random, and the diameter of the graph after n steps all scale as a constant multiplied by log n. We determine the constants for all three cases and prove a central limit theorem for the typical distances. We prove a similar central limit theorem for typical distances in EANs.
We study G/G/∞ queues with renewal alternating service interruptions, where the service station experiences `up' and `down' periods. The system operates normally in the up periods, and all servers stop functioning while customers continue entering the system during the down periods. The amount of service a customer has received when an interruption occurs will be conserved and the service will resume when the down period ends. We use a two-parameter process to describe the system dynamics: Xr(t,y) tracking the number of customers in the system at time t that have residual service times strictly greater than y. The service times are assumed to satisfy either of the two conditions: they are independent and identically distributed with a distribution of a finite support, or are a stationary and weakly dependent sequence satisfying the ϕ-mixing condition and having a continuous marginal distribution function. We consider the system in a heavy-traffic asymptotic regime where the arrival rate gets large and service time distribution is fixed, and the interruption down times are asymptotically negligible while the up times are of the same order as the service times. We show the functional law of large numbers and functional central limit theorem (FCLT) for the process Xr(t,y) in this regime, where the convergence is in the space 𝔻([0,∞), (𝔻, L1)) endowed with the Skorokhod M1 topology. The limit processes in the FCLT possess a stochastic decomposition property.
We investigate several aspects of a self-similar evolutionary process that builds a random bipolar network from building blocks that are themselves small bipolar networks. We characterize admissible outdegrees in the history of the evolution. We obtain the limit distribution of the polar degrees (when suitably scaled) characterized by its sequence of moments. We also obtain the asymptotic joint multivariate normal distribution of the number of nodes of small admissible outdegrees. Five possible substructures arise, and each has its own parameters (mean vector and covariance matrix) in the multivariate distribution. Several results are obtained by mapping bipolar networks into Pólya urns.
The signature of a coherent system is a useful tool in the study and comparison of lifetimes of engineered systems. In order to compare two systems of different sizes with respect to their signatures, the smaller system needs to be represented by an equivalent system of the same size as the larger system. In the paper we show how to construct equivalent systems by adding irrelevant components to the smaller system. This leads to simpler proofs of some current key results, and throws new light on the interpretation of mixed systems. We also present a sufficient condition for equivalence of systems of different sizes when restricting to coherent systems. In cases where for a given system there is no equivalent system of smaller size, we characterize the class of lower-sized systems with a signature vector which stochastically dominates the signature of the larger system. This setup is applied to an optimization problem in reliability economics.
We investigate queueing networks in a random environment. The impact of the evolving environment on the network is by changing service capacities (upgrading and/or degrading, breakdown, repair) when the environment changes its state. On the other side, customers departing from the network may enforce the environment to jump immediately. This means that the environment is nonautonomous and therefore results in a rather complex two-way interaction, especially if the environment is not itself Markov. To react to the changes of the capacities we implement randomised versions of the well-known deterministic rerouteing schemes 'skipping' (jump-over protocol) and `reflection' (repeated service, random direction). Our main result is an explicit expression for the joint stationary distribution of the queue-lengths vector and the environment which is of product form.