System Stability Under Adversarial Injection of Dependent Tasks
نویسندگان
چکیده
Technological changes (NFV, Osmotic Computing, Cyber-physical Systems) are making very important devising techniques to efficiently run a flow of jobs formed by dependent tasks in set servers. These problem can be seen as generalizations the dynamic job-shop scheduling problem, with rich dependency patterns and arrival assumptions. In this work, we consider computational model distributed system servers which jobs, that continuously arriving, have executed. Every job is (i. e., each task may wait for others completed before it started), has executed one The their properties assumed controlled bounded adversary, whose only restriction cannot overload any server. This non-trivial generalization Adversarial Queuing Theory Borodin et al. , and, like model, focuses on stability system: whether number pending at all times. We show multiple results instability adversarial under different combinations policy used servers, rate, dependence between jobs.
منابع مشابه
stability and attraction domains of traffic equilibria in day-to-day dynamical system formulation
در این پژوهش مسئله واگذاری ترافیک را از دید سیستم های دینامیکی فرمول بندی می کنیم.فرض کرده ایم که همه فاکتورهای وابسته در طول زمان ثابت باشند و تعادل کاربر را از طریق فرایند منظم روزبه روز پیگیری کنیم.دینامیک ترافیک توسط یک نگاشت بازگشتی نشان داده می شود که تکامل سیستم در طول زمان را نشان می دهد.پایداری تعادل و دامنه جذب را توسط مطالعه ویژگی های توپولوژیکی تکامل سیستم تجزیه و تحلیل می کنیم.پاید...
Stability in Heterogeneous Multimedia Networks under Adversarial Attacks
A distinguishing feature of today's large-scale platforms for multimedia distribution and communication, such as the Internet, is their heterogeneity, predominantly manifested by the fact that a variety of communication protocols are simultaneously running over different hosts. A fundamental question that naturally arises for such common settings of heterogeneous multimedia systems concerns the...
متن کاملAn Unattended Study of Users Performing Security Critical Tasks Under Adversarial Noise
User errors while performing security-critical tasks can lead to undesirable or even disastrous consequences. One major factor influencing mistakes and failures is complexity of such tasks, which has been studied extensively in prior research. Another important issue which hardly received any attention is the impact of both accidental and intended distractions on users performing security-criti...
متن کاملDistributed Optimization Under Adversarial Nodes
We investigate the vulnerabilities of consensus-based distributed optimization protocols to nodes that deviate from the prescribed update rule (e.g., due to failures or adversarial attacks). We first characterize certain fundamental limitations on the performance of any distributed optimization algorithm in the presence of adversaries. We then propose a resilient distributed optimization algori...
متن کاملStability of FIFO networks under adversarial models: State of the art
Network stability is an important issue that has attracted the attention of many researchers in recent years. Such interest comes from the need to ensure that, as the system runs for an arbitrarily length of time, no server will suffer an unbounded queue buildup. Over the last few years, much research has been carried out to gain an understanding of the factors that affect the stability of pack...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: ['2169-3536']
DOI: https://doi.org/10.1109/access.2021.3119849