Numerical methods for solution of queuing-network problems with applications to models of multiprogrammed computer systems.
Humfeld, George Robert
Gaver, Donald P.
MetadataShow full item record
The major difficulties in determination of the steady-state properties of a Markovian queuing network by numerical solution of a set of linear balance equations are the choice of vector representation of the states, the generation and storage of the states, and generation, storage and solution of the balance equations. Lexicographic sequencing of the vector representations are shown in this thesis to lead to efficiencies in the storage and solution of the balance equations and to provide a key to efficient generation and storage of the states. Convergence properties of three iterative solution methods are examined for cyclic models, such as those which can result from a central-server model. An analysis of possible bias in software monitors on computer systems is analyzed in terms of a central-server model of such systems. Techniques for examining tape-mounting policies and core-allocation policies are also suggested.
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Pollman, Anthony G.; Gannon, Anthony J. (ASME, 2015);A methodology to investigate the generation, transport and storage of energy based on a multi-physics approach, tied to the end use application, is presented. Often little or no consideration is given to the end use or ...
Hinke, Themba D. (Monterey, California: Naval Postgraduate School, 2014-06);This thesis outlines the design of a renewable energy heat generation system with thermal storage for DOD facilities. The DOD is seeking to implement an increased percentage of renewable energy systems at its facilities ...
Klaus, Christian (Monterey, California: Naval Postgraduate School, 2014-03);We define and solve two network-design problems. In the first, (1) a defender uses limited resources to select a portfolio of paths or design a sub-network; (2) an attacker then uses limited attack resources to destroy ...