A Tight Upper Bound on Online Buffer Management for Multi-Queue Switches with Bicodal Buffers
スポンサーリンク
概要
- 論文の詳細を見る
The online buffer management problem formulates the problem of queuing policies of network switches supporting QoS (Quality of Service) guarantee. In this paper, we consider one of the most standard models, called multi-queue switches model. In this model, Albers et al. gave a lower bound $\frac{e}{e-1}$, and Azar et al. gave an upper bound $\frac{e}{e-1}$ on the competitive ratio when m, the number of input ports, is large. They are tight, but there still remains a gap for small m. In this paper, we consider the case where m = 2, namely, a switch is equipped with two ports, which is called a bicordal buffer model. We propose an online algorithm called Segmental Greedy Algorithm (SG) and show that its competitive ratio is at most $\frac{16}{13} (\simeq 1.231)$, improving the previous upper bound by $\frac{9}{7} (\simeq 1.286)$. This matches the lower bound given by Schmidt.
- (社)電子情報通信学会の論文
- 2008-12-01
著者
-
Okabe Yasuo
Kyoto Univ. Kyoto Jpn
-
Okabe Yasuo
Academic Center For Computing And Media Studies Kyoto University
-
MIYAZAKI Shuichi
Academic Center for Computing and Media Studies, Kyoto University
-
KOBAYASHI Koji
Graduate School of Informatics, Kyoto University
-
Miyazaki Shuichi
Kyoto Univ. Kyoto‐shi Jpn
-
Miyazaki Shuichi
Academic Center For Computing And Media Studies Kyoto University
-
Kobayashi Koji
Graduate School Of Informatics Kyoto University
関連論文
- A (2-c(logN)/N)-Approximation Algorithm for the Stable Marriage Problem(Invited Papers from New Horizons in Computing)
- Computational Complexities of University Interview Timetabling
- Multi-Bit Embedding in Asymmetric Digital Watermarking without Exposing Secret Information
- Unsupervised Anomaly Detection Based on Clustering and Multiple One-Class SVM
- A Tight Upper Bound on Online Buffer Management for Multi-Queue Switches with Bicodal Buffers
- A Tight Bound on Online Buffer Management for Two-Port Shared-Memory Switches
- A Clustering Method for Improving Performance of Anomaly-Based Intrusion Detection System
- A Comparative Study of Unsupervised Anomaly Detection Techniques Using Honeypot Data
- The Online Graph Exploration Problem on Restricted Graphs
- Special Section on New Challenge for Internet Technology and its Architecture
- Special Section on Discrete Mathematics and Its Applications
- FOREWORD