<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Designing Reliable Communication for Heterogeneous Computer Systems</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Miroslaw</forename><surname>Hajder</surname></persName>
							<email>miroslaw.hajder@gmail.com</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Information Technology and Management</orgName>
								<address>
									<settlement>Rzeszow</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Janusz</forename><surname>Kolbusz</surname></persName>
							<email>jkolbusz@wsiz.rzeszow.pl</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Information Technology and Management</orgName>
								<address>
									<settlement>Rzeszow</settlement>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Roman</forename><surname>Korostenskyi</surname></persName>
							<email>rkorostenskyi@wsiz.rzeszow.pl</email>
							<affiliation key="aff0">
								<orgName type="institution">University of Information Technology and Management</orgName>
								<address>
									<settlement>Rzeszow</settlement>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Designing Reliable Communication for Heterogeneous Computer Systems</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">96FBDEEA740260647F1778E8F2F394FD</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T18:17+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Multipartite hypergraphs</term>
					<term>architecture connections</term>
					<term>system reliability model</term>
					<term>design methodology</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This study describes the network design solution to the problem of connecting heterogeneous computer systems based on analysis of multipartite hypergraphs. To do this proposes a mathematical model of reliability for the two modes of operation of the system: with redundancy communication subsystem and the division of communication load. As the evaluation criteria applied solutions expected changes in processing capacity, latency communication and system reliability. Solution design task is sought in the collection Pareto optima, which describes a method for selecting a particular solution in case of equivalence with respect to the vector of the objective function.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Another important feature of modern processing systems is the variety of offered services. Nowadays, in the same network they are different, often incompatible with communication services (eg. Isochronous and synchronous transfer). This issue requires a change of quality of provided services, through the dynamic allocation of independent communication channels to users or services present in the network specifically in particular, this applies to multimedia services rendered in real-time or services comprising critical infrastructure. Modern distributed systems are also characterized by high dynamics of changes in operating parameters. Load elements of computing and communications is changing rapidly, which prevents the design and execution of the network to meet even medium-term requirements of the users. Another disadvantage occurring in communication subsystems ubiquity of traffic is bursty traffic, obstructing, and sometimes preventing proper functioning of the network. Currently, the solution to the above problems is the use of load leveling, both communications and computing. Moreover, an effective solution to most of these problems can be also providing a flexible reconfiguration of connections, preferably at the logical level, without having to modify the hardware architecture. In this way, links can be dynamically adapted to the current traffic pattern.</p><p>Effective methods of reconfiguring connections should be seen in the use of modern communication technologies, especially those that allow to realize it at the logical level and which additionally improve the utilization of physical communication channels. An interesting issue is the construction of multi-channel network of bus-sharing bus logic dynamic range conversion of a set of buses to which the user is attached. Because of that it becomes possible to adapt to the existing network architecture in the traffic patterns. However, the use of such architecture requires solving a specific design task, which for obvious reasons should be characterized by an acceptable time complexity and memory. Because of the combinatorial nature of the task it is difficult to meet.</p><p>These issue may include the design task to build large class of system configuration tasks. This task is mostly decomposed into three basic subtasks: a. The selection of system components; b. their deployment; c. determining the connection between them. In previous work, component selection subtask is solved inter alia by implemented using for this purpose methods seeking the shortest path <ref type="bibr" target="#b0">[1]</ref>, <ref type="bibr" target="#b1">[2]</ref> Backpack block <ref type="bibr" target="#b1">[2]</ref>, <ref type="bibr" target="#b2">[3]</ref> the clustering multipartite graph <ref type="bibr" target="#b3">[4]</ref>, mullioned clique <ref type="bibr" target="#b4">[5]</ref>, morphological analysis. Subsequently, a solution subtasks arrangement of the components, currently is the most frequently used variants task assignment <ref type="bibr" target="#b1">[2]</ref>, <ref type="bibr" target="#b5">[6]</ref>, <ref type="bibr" target="#b6">[7]</ref>, <ref type="bibr" target="#b7">[8]</ref>. To determine the connections between system components there is the most commonly used a method of agglomeration <ref type="bibr" target="#b8">[9]</ref>, <ref type="bibr" target="#b9">[10]</ref> and the method solving the task of building the optimal hierarchy <ref type="bibr" target="#b10">[11]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Architecture Connections and System Reliability Model</head><p>The Fig. <ref type="figure" target="#fig_0">1</ref> shows a distributed system consisting of K N node calculation -decoration, each of which has a K l retunes elements of the transceiver and the K B communication buses. Buses B i (i = 1, . . . , K B ) are logical and can be implemented on the basis of methods of reproduction of wave-go in one physical bus D F . The addition of logical channels to any node N i physical bus B F is done by using a physical connection channels l and distributors of bus channels C. to another logical bus. The system can operate in two modes: a. redundancy communication subsystem; b. the communication load sharing. To evaluate the operating characteristics of the system in one of these modes, the probabilistic model suggested combinatorial, and in particular evaluating the reliability R. In this model, the kit: the transceiver -receiving (≈), the physical connection cable (l), and a manifold physical channel (C) are treated as a single device connection. Let p io -the probability of performance transceiver -the receiving node computational p l -probability of physical fitness connecting channel; p c -the probability of the distributor channel efficiency Trunk, the p f k -probability of physical fitness BUS channel. Then, the probability of p ku efficiency of connecting the node to the logical channel BUS is defined as: p ku = p io p l p c and p uku probability of the merger selected node with other nodes calculation is equal to p uku = p io p l p c p f k .</p><p>Trunk consider the reliability of a distributed system with connections complete (each compute node is connected to each bus logic) and equal rights computational nodes, which is the most general example of this class of systems. The probability p we (k we ) efficiency connection sets providing connection to the bus channel not less than k min we compute nodes with their total number K N determined by the expression:</p><formula xml:id="formula_0">p we (k we ) = p f k K N i=k min we C i k p i ku (1 − p ku ) kwe−i<label>(1)</label></formula><p>Let K B to be the amount of bus logic (ie. The maximum multiplicity system interface), p sp we -likely performance computing node. Then, using expression (1), according to the proposed condition for the system in redundancy, reliability R is defined by the following formula:</p><formula xml:id="formula_1">R = K N j=k min we C j K N (p sp we ) j (1 − p sp we ) K N −j K B k=1 C k K B p we (j) k (1 − p we (j)) K B −k (2)</formula><p>Consider the current system of equal rights computational nodes working in load sharing mode of communication. Let W (k we , k m , σ) to be the amount of system efficiency states consisting of k we compute nodes, connected with k m canals system, which can be selected with the existence of σ denials transceiver components. In order to determine the amount of W (k we , k m , σ) state performance of the system in the event of damage, etc., it is proposed to use the methods of include -exemption. H 1 (σ) number of states malfunction of the entire system in case of refusal not less than one minimum section for a system with equal rights nodes is equal to:</p><formula xml:id="formula_2">H 1 (σ) = K N C σ−K B (K N −1)K B + C 2 K N C σ−K B (K N −1)K B K B−1 α=1 C α K B = C σ−K B (K N e −1)K B K N + C 2 K N K B −1 α=1 C α K B<label>(3)</label></formula><p>Then, the value of W is equal to</p><formula xml:id="formula_3">W (k we , k m , σ) = C σ kwekm + iσ i=1 (−1) i H i (σ),</formula><p>where: C σ kwekm -total number of states σ denials system for transmitting elementsreceiving; i σ -the maximum number taken into account when assessing the minimum cross sections; H i (σ) -the number of states of a computing system failure, refusal to transmit elements -receiving no less than the minimum i sections. The probability P ku (k we , k m , σ), k wu ensures consistency nodes by k m bus for refusals σ is defined by the expression:</p><formula xml:id="formula_4">P ku (k we , k m , σ) = W (k we , k m , σ) p kwekm−σ ku (1 − p ku ) σ (4)</formula><p>Using the expression (4), the likelihood of P ku (k we , k m ) ensures the consistency of computing nodes k we , k m buses, with denials of the existence of σ can be written as:</p><formula xml:id="formula_5">P ku (k we , k m ) = (kwe−1)km σ=0 P ku (k we , k m , σ)<label>(5)</label></formula><p>Using the expression ( <ref type="formula" target="#formula_5">5</ref>), it will determine the likelihood of consistency P uku (k we ), k we compute nodes:</p><formula xml:id="formula_6">P uku (k we ) = K B l=k min m C l K B p l f k (1 − p f k ) K B −l P ku (k we , l),</formula><p>where: k min m -the minimum required number of buses needed to provide the required bandwidth. In this way, the reliability of calculation system is equal to:</p><formula xml:id="formula_7">R = K N n=k min we C n K N (p sp we ) n (1 − p sp we ) K N −n P uku (n)<label>(6)</label></formula><p>For computing system client-server mode redundancy it will determine the likelihood of P ks (K K , K S ) efficiency BUS communication channel to which, through the operational elements transmitter -receiver including no less than k min k customers with their total number of K K and k min s servers with the total number of K S :</p><formula xml:id="formula_8">P ks (K K , K S ) = p f k K K i=k min k K S j=k min s C i K K p i ku (1 − p ku ) K K −i • C j K S p j ku (1 − p ku ) K S −j<label>(7)</label></formula><p>Let p sp k and p sp s be the likelihood of efficiency for clients and servers nodes, respectively. Then, using the expression <ref type="bibr" target="#b6">(7)</ref>, reliability Rcan be written as:</p><formula xml:id="formula_9">R = K K m=k min k C m K K (p sp k ) m (1 − p sp k ) K K −m • K S n=k min s C n K K (p sp s ) n (1 − p sp s ) K S −n • Km l=1 C l Km (P ks (K K , K S )) l (1 − P ks (K K , K S )) Km−l .<label>(8)</label></formula><p>Let's consider the reliability of client-server system with a complete blend of computing and communication subsystem working in load sharing mode. Let W (k s , k k , k m , σ)to be the number of states efficient system consisting of servers k s , k k clients, k m bus, in the presence of σ denials transceiver components. For the clientserver system, the number of failure conditions the H 1 (σ) no less than a minimum cross section can be determined using the expression:</p><formula xml:id="formula_10">H 1 (σ) = (k k + k s ) C σ−km km(k k +ks−1) + k k k s C σ−km km(k k +ks−1) = = C σ−km km(k k +ks−1) k k + k s + k k k s km−1 α=1 C α km ,<label>(9)</label></formula><p>a number of states proper functioning as:</p><formula xml:id="formula_11">W (k k , k s , k m , σ) = C σ km(k k +ks) + iσ i=1 (−1) i H i (σ) ,<label>(10)</label></formula><p>Where: C σ km(k k +ks) -the total number of computing system states that may occur at σ refusals. The probability P ks (k s , k k , k m , σ) ensures consistency k s servers and k k clients using k m bus in case of refusal elements σtransmitter -receiver can be written as:</p><formula xml:id="formula_12">P ku (k s , k k , k m , σ) = W (k s , k k , k m , σ) p (ks+k k )km−σ ku (1 − p ku ) σ . (<label>11</label></formula><formula xml:id="formula_13">)</formula><p>The probability of P ku (k s , k k , k m ) servers to ensure coherence k s and k k clients using k m bus in the event of a refusal elements transmitter -receiver has been defined as:</p><formula xml:id="formula_14">P ku (k s , k k , k m ) = (ks+k k )km s=0 P ku (k s , k k , k m , σ) ,<label>(12)</label></formula><p>and the probability P ku (k s , k m ) of consistency k s servers and k k clients as:</p><formula xml:id="formula_15">P ku (k s , k k ) = Km km=1 C k Km p km f k (1 − p f k ) Km−km P ku (k s , k k , k m ) . (<label>13</label></formula><formula xml:id="formula_16">)</formula><p>Using the expression <ref type="bibr" target="#b10">(11)</ref>, <ref type="bibr" target="#b11">(12)</ref>, and (13) the sought reliability R will be written as:</p><formula xml:id="formula_17">R = K k k=k min k C k K k (p sp k ) k (1 − p sp k ) K k −k • Ks s=k min s C s Ks (p sp s ) s (1 − p sp s ) Ks−s P ku (s, k)<label>(14)</label></formula><p>The above-described methodology we will use for further connections to network design measuring system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Task Design and Its Solution</head><p>We will consider hypergraph H = (V, E) comprising a set V = {v} of vertices and a set of E = {e} of edges, which represent a subset of the set V, i.e. e ⊆ V . Hypergraph H is a k-regular if each of its edge e ∈ E consists of k vertices. On the other hand, hypergraph H is l-partite graph, if the set of its vertices is divided into l subsetsV 1 , V 2 , . . . , V l , in such a manner that the vertices of each of the edges e = (v 1 , v 2 , . . . , v l ) ∈ E belong to different parts of the graph, ie. v i ∈ V i , where i = 1, . . . , l. For the determination of l-partite hypergraphs we will use record form</p><formula xml:id="formula_18">H = (V 1 , V 2 , . . . , V l ).</formula><p>Let's consider the l-partite hypergraph H = (V 1 , V 2 , . . . , V l ). In this graph, the part a = V A 1 , . . . , V A i , . . . , V A l , E A , for i = 1, . . . , l and V A l ⊆ V l , where any two edges e 1 , e 2 ∈ E A overlap in one and the same vertex v ∈ V A 1 and do not overlap at any vertex v ∈ V A l , will be called star. This means that the cardinality of V A 1 is 1, and the vertex v ∈ V A 1 , will be called the center of the star. We distinguish the simple and complex stars. If any pair of edges e 1 , e 2 ∈ E A covers only in one vertex v ∈ V A 1 , then the star is called simple. Otherwise, a star will be called complex. The number of edges of the star will be called degree. For the edge e = (v 1 , v 2 , . . . , v l ) ∈ E of the star verticesv 1 and v l we will call end. In turn, the vertices v 2 , . . . , v l−1 will be determined as internal. Vertices set of the part of graph V 2 , . . . , V l−1 are composed of empty pairs of disjoint sets V i (v j ), v j ∈ V j , where: i = 2, . . . , l − 1, j = i + 1.</p><p>For hypergraph H = (V, E) its subhypergraph H 1 = (W, U ) we'll be called hypergraph for which set of the vertices W is the vertices subset V of hypergraph H, ie. W ⊆ V and the edge set U is the edges subset E of the hypergraph H, wherein if the (x, y) ∈ E and x, y ∈ W , then (x, y) ∈ U . Hypergraph cohesion component will be called the set of its vertices, such as any of two of its elements there is a path between them, but there is no path leading from the vertex of belonging to this collection to any other vertex outside. If there is in the subhypergraph</p><formula xml:id="formula_19">H 1 = (V 1 , E 1 )</formula><p>of hypergraph H consistency of each component there is a star with center at some vertex v ∈ V 1 , the H 1 we will call the coverage of hypergraph H stars.</p><p>Fixed design task was to find such a connection structure that will ensure the maximization or minimization of operating parameters, such as communication delay, errors in access to the communication medium as a result of his occupation, performance computational processing nodes and others. Such a task can be solved by seeking the cover at least the stars of trigeminal graph. Let's consider the task.</p><p>Input data. As an input data we use the design task:</p><p>1. B = {b} -A set of logical communication bus dedicated by physical channel under communication using any of the methods of reproduction communication; 2. F = {f } -A set of access protocols, which describes the functioning logical BUS communication <ref type="bibr" target="#b11">[12]</ref>; 3. N = {n} -A set of customers of the system, using BUS communication channels. The definition of design task. Each of the compute nodes n ∈ N should be assigned a set of M bus b, which is a subset of B, ie. M ⊆ B, each of which will operate on the basis of one of the access protocols f ∈ F .</p><p>The mathematical model. The task design is iteratively solved. In each of the steps and for each of the compute nodes there is sought one bus b ∈ B providing for node communication services using Access Protocol f ∈ F . To avoid multiple of includes a node on the same bus at each successive step from the available buses the client is excluded from those for whom it has already been connected.</p><p>The mathematical model is based on the 3-partite hypergraph H = (V, E) = (X, Y, Z, E). Busses from the set B = {b} correspond to the vertices of the first part x (x ∈ X). Each of them (at the same time each logical bus) is assigned to the label η (x) determining the transmission characteristics of the bus, in the simplest case, the number of nodes measured, that it can handle.</p><p>The f elements of the set F bus access protocols correspond to the vertices y of the second part of hypergraph H (y ∈ Y ), and the elements n from N compute nodes correspond to the vertices zof the third part of hypergraph (z ∈ Z).The set of edges E = {e} includes all three vertices (x, y, z)such that x ∈ X_, y ∈ Y , z ∈ Z. There are permitted only those edges, for which a selected bus the client can handle b i ∈ X using a communication protocol f l ∈ Y 2 . Collection E = {e} of all edges is determined essentially by a set of all admissible triples e = (x, y, z). Taking account of the value of the parameter n (x) for x ∈ Xin hypergraph H = (V, E) = (X, Y, Z, E) permissible step design task solution will be any of his sub hypergraph β = (V β , E β ) forV β ⊆ V and E β ⊆ Eof which each component represents the simple consistency star of stage with the center in the apex x ∈ X. As S = S (H) = {s}we denote the set of all feasible solutions of tasks covering hypergraph H stars.</p><p>Each of edges e ∈ E of hypergraph H = (V, E) there is assigned three scales describing the following characteristics solutions:</p><p>1. ω (e) = φ (x, y, z) -Expected customer conversion processing performance in a system in which the client is supported in communication with the bus X, which uses a communication protocol y. To evaluate the performance characteristics of the proposed process there were used in <ref type="bibr" target="#b12">[13]</ref>, <ref type="bibr" target="#b13">[14]</ref>, <ref type="bibr" target="#b14">[15]</ref>. Described measures therein are modified so that they reflect the change in performance which are due to changes in the architecture of calls. Because of the nature of the bus network connecting the primary measure of performance is the number of nodes, for which there is available transportation network <ref type="bibr" target="#b15">[16]</ref>. 2. ξ (e) = φ (x, y, z) -Expected change in the communication delay on demand of the customer for these conditions. The level of changes in the delay is determined on the basis of the stochastic model using the method described in <ref type="bibr" target="#b16">[17]</ref>. 3. ψ (e) = φ (x, y, z) -Expected change in system reliability for client-server preserved the conditions of point. 1. To determine the reliability of the method was applied changes presented in §2.</p><p>Solution design task. The rating of the solutions will be shown as a multi-criteria. The proposed set of criteria is obviously exemplary, and his selection depends on the needs of the designer, in particular concerning the nature of the future operation of the network merger. For the case of under consideration there are the three functions described below.</p><p>Let's consider the set A = {a} of acceptable solutions of design task. For each of them we define the following characteristics assessing the quality of solutions: The possibilities of the above method is not limited to the application of the summation as a min or max. To assess the quality of solutions it can be used any of the method of folding (convolution) parameters, including methods taking the weight of each sub-parameters into account. These sub-criteria are related by a function to form Φ (a) = (Φ 1 (a) , Φ 2 (a) , Φ 3 (a)). Multi-criteria objective function Φ (a)defines a set A feasible solutions, a set of Pareto A p composed of Pareto optima a p . If two solutions a 1 , a 2 ∈ A vector objective function Φ (a) are equivalent, then the set of A p is secreted full set of alternatives A A , which is, in fact, a maximum system vectorially different optima Pareto.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">The Research, Results and Further Work</head><p>The work approach used to create a multi-channel design methodology destined for fieldbus communication service systems, client-server computing. The existing methodology is focused on providing definite level of computing capacity of the entire system, regardless of its reliability parameters. In the presented in the work version, methodology seeks the optimal solution with respect to multi-criteria objective function that one of the criteria is reliability. Depending on how sub-criteria ties and a set of restrictions proposed methodology also allows you to specify the connection architecture, characterized by: a. maximum reliability with certain: the minimum efficiency and maximum delay network communication links; b. the minimum communication delay with the reduction in the minimum reliability and performance; c. maximum computing performance of a specified acceptable level of reliability and delays. There was also tested solution, the aim of which was to design load leveling various communication buses. For each of the solutions sought there are limited the maximum cost of construction. We analyzed the network of connections complete and partial, flat and hierarchical.</p><p>Simulation studies of obtained architectures for computing model client-server based on the methodology presented in <ref type="bibr" target="#b15">[16]</ref> showed that the use of multi-channel communication systems can flexibly adapt to the current needs of the computing system. Increasing performance computing system with unchanging resources, obtained by reconfiguring its connections reached 260%. Deviations in terms of the burden of communication channels does not exceed 31% and the probability of rejecting a service request has fallen nearly 8-fold. The algorithm of the interconnection network is characterized by polynomial time complexity, which can react in real time to any change in traffic patterns.</p><p>Further research will focus on finding effective methods of searching for coverage of celebrities simple multipartite hypergraph, which will allow the use of graphs in the design process of any of valor, and this will introduce further design criteria.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Trunk generalized computing system architecture</figDesc><graphic coords="2,152.06,488.93,311.24,140.35" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head></head><label></label><figDesc>Customers are divided into groups d ∈ D taking their communication requirements into account, where D = {d} -is a set of types of communication requirements. Elements of the set D shall be as follows: d = 0 -service streams sensitive to errors and latency; d = 1 -support for latency-sensitive flows; d = 2 -service streams are sensitive to transmission errors; d = 3 -handling sensitive streams not being sensitive to these factors.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>1 . 2 .</head><label>12</label><figDesc>Criterion performance computing: Φ 1 (a) = max a∈A min e∈Ea ω (e), where: E a -sub of edge of hypergraph H belonging to solution a. Using this criterion, we strive to maximize the minimum level of performance (computing or communication) system. Communication delay criterion: Φ 2 (a) = min e∈Ea ξ (e), which provides network search junction with minimal delay summary. For systems with varying levels of validity of nodes, the value ξ (e) of expected changes in the communication delay is called using vertex priority. 3. The criterion of reliability: Φ 3 (a) = max e∈Ea ψ (e). This criterion provides a network architecture search for which the total reliability is maximum likewise in the case of a delay criterion communication Φ 2 .</figDesc></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Efficient Algorithms for Web Services Selection with End-to-End QoS Constraints</title>
		<author>
			<persName><forename type="first">T</forename><surname>Yu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><forename type="middle">J</forename><surname>Lin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Transaction on The Web</title>
		<imprint>
			<biblScope unit="volume">1</biblScope>
			<biblScope unit="issue">1</biblScope>
			<date type="published" when="2007-05">May 2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">R</forename><surname>Garey</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">S</forename><surname>Johnson</surname></persName>
		</author>
		<title level="m">Computers and Interactability. The Guide to the Theory of NP-Completeness</title>
				<meeting><address><addrLine>San Francisco</addrLine></address></meeting>
		<imprint>
			<publisher>W.H. Freeman &amp; Company</publisher>
			<date type="published" when="1979">1979</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">H</forename><surname>Kellerer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Pferschy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Pisinger</surname></persName>
		</author>
		<title level="m">Knapsack Problems</title>
				<meeting><address><addrLine>Berlin</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Optimal clustering of multipartite graphs</title>
		<author>
			<persName><forename type="first">C</forename><surname>Chekuri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Hudry</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Discr. Appl. Math</title>
		<imprint>
			<biblScope unit="volume">156</biblScope>
			<biblScope unit="issue">8</biblScope>
			<biblScope unit="page" from="1330" to="1347" />
			<date type="published" when="2008">2008</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">On bipartite and multipartite clique problems</title>
		<author>
			<persName><forename type="first">M</forename><surname>Dawande</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Keskinocak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Swaminathan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Algorithms</title>
		<imprint>
			<biblScope unit="volume">41</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="388" to="403" />
			<date type="published" when="2001">2001</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">A multicriteria assignment problem</title>
		<author>
			<persName><forename type="first">A</forename><surname>Scarelli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">C</forename><surname>Narulla</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Multi-Criteria Decision Analysis</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="65" to="74" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">The Quadratic Assignment Problem</title>
		<author>
			<persName><forename type="first">E</forename><surname>Cela</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1998">1998</date>
			<publisher>Kluwer Academic Publishers</publisher>
			<pubPlace>Dordrecht</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">A survey on the generalized assignment problem</title>
		<author>
			<persName><forename type="first">T</forename><surname>Oncan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">INFOR</title>
		<imprint>
			<biblScope unit="volume">45</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="123" to="141" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Data clustering: a review</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">K</forename><surname>Jain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">N</forename><surname>Murty</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">J</forename><surname>Flynn</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Comput. Surv</title>
		<imprint>
			<biblScope unit="volume">31</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="264" to="323" />
			<date type="published" when="1992">1992</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<author>
			<persName><forename type="first">N</forename><surname>Jardine</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Sibson</surname></persName>
		</author>
		<title level="m">Mathematical Taxonomy</title>
				<meeting><address><addrLine>London</addrLine></address></meeting>
		<imprint>
			<publisher>John Wiley &amp; Sons</publisher>
			<date type="published" when="1971">1971</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Optimal organizational hierarchies in firms</title>
		<author>
			<persName><forename type="first">S</forename><surname>Mishin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">J. of Business Economics and Management</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="79" to="99" />
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">Traffic Grooming for Optical Networks</title>
		<author>
			<persName><forename type="first">R</forename><surname>Dutta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">E</forename><surname>Kamal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">E</forename><surname>Rouskas</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Performance of computer communication systems : a model-based approach</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">R</forename><surname>Haverkort</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>John Wiley &amp; Sons Ltd</publisher>
			<pubPlace>Chichester</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Hajder</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Loutskii</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Streciwilk</surname></persName>
		</author>
		<title level="m">Informatyka. Wirtualna podroz w swiat systemow i sieci komuterowych</title>
				<meeting><address><addrLine>Rzeszow</addrLine></address></meeting>
		<imprint>
			<publisher>Wydawnictwo Wyzszej Szkoşy Informatyki i Zarzadzania w Rzeszowie</publisher>
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Parallel Computing: Performance Metrics and Models</title>
		<author>
			<persName><forename type="first">S</forename><surname>Sahni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Thanvantri</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Parallel and Distributed Technology</title>
		<imprint>
			<biblScope unit="volume">4</biblScope>
			<biblScope unit="page" from="43" to="56" />
			<date type="published" when="1996-01">Jan. 1996</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Improving the efficiency of multi-channel backbones client-server</title>
		<author>
			<persName><forename type="first">M</forename><surname>Hajder</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Visnyk of National Technical University of Ukraine</title>
		<imprint>
			<biblScope unit="volume">37</biblScope>
			<biblScope unit="page" from="37" to="48" />
			<date type="published" when="2002">2002</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Matematyczny model opoznien w sieci z komutacja pakietow</title>
		<author>
			<persName><forename type="first">M</forename><surname>Hajder</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kielbus</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">XV Konferencja Sieci i Systemy Informatyczne</title>
				<meeting><address><addrLine>Lodz</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="47" to="50" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
