<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/">
<channel>
<title>Doctoral Dissertations</title>
<link>http://hdl.handle.net/123456789/4</link>
<description/>
<items>
<rdf:Seq>
<rdf:li resource="http://hdl.handle.net/123456789/5786"/>
<rdf:li resource="http://hdl.handle.net/123456789/5783"/>
<rdf:li resource="http://hdl.handle.net/123456789/5782"/>
<rdf:li resource="http://hdl.handle.net/123456789/5781"/>
</rdf:Seq>
</items>
</channel>
<item rdf:about="http://hdl.handle.net/123456789/5786">
<title>DIRECT DATA-SNAPSHOTTING AND SNAPSHOT SHARING ACROSS CLOUD-NATIVE APPLICATIONS</title>
<link>http://hdl.handle.net/123456789/5786</link>
<description>DIRECT DATA-SNAPSHOTTING AND SNAPSHOT SHARING ACROSS CLOUD-NATIVE APPLICATIONS

Ristović, Ivan

Cloud-computing platforms provide services to consumers through multiple serviceoffering&#13;
models. Recent advances in these models have led to the emergence of serverless computing,&#13;
or simply serverless, where infrastructure is managed by the service provider. Serverless&#13;
is usually coupled with function-based programming model in which software systems are composed&#13;
of reusable, lightweight units of code executed within isolated sandboxed environments.&#13;
Major cloud-computing platforms, including Amazon Web Services (AWS), Microsoft Azure,&#13;
and Google Cloud, report that a substantial proportion of their customers employ serverless&#13;
solutions.&#13;
Most cloud-computing providers employ a pay-as-you-go billing model. Inefficient utilization&#13;
of computing resources, particularly CPU time and working memory, which constitute the&#13;
most costly resources, leads to increased overall operational costs. Moreover, the requirement&#13;
for resource isolation adversely affects initialization latency and results in additional CPU and&#13;
working-memory overhead. Serverless sandboxes are typically deployed on top of heavyweight&#13;
virtualization stacks that includeJava, JavaScript, or Python runtime environments with accompanying&#13;
frameworks, further increasing working-memory consumption.&#13;
Modern cloud-computing architectures use Checkpoint/Restore (abbr. c/r) techniques to&#13;
freeze initialized sandboxes into a continuable form. Such techniques, in combination with&#13;
cloud-native deployments, allow the virtualized environment to optimize resource consumption&#13;
and share code and pre-initialized data across multiple sandboxes. However, such solutions&#13;
either operate at application-build time to support data pre-initialization or sharing, or operate&#13;
at execution time with limited sharing potential for data available during application execution.&#13;
Such data is processed multiple times and duplicated in each sandbox.&#13;
This dissertation presents Doss, a direct object snapshotting and sharing system that&#13;
performs data c/r during application execution. Doss persists data directly, without transformations,&#13;
into reusable and shareable snapshots. Direct snapshotting allows Doss to achieve&#13;
near-constant data deserialization time, greatly improving initialization times and reducing&#13;
CPU usage. Doss architecture enables snapshot sharing across application instances, eliminating&#13;
the excess memory footprint associated with data re-processing and duplication.&#13;
GraalDoss, a Doss implementation for Java, is integrated into the GraalVM ecosystem.&#13;
GraalDoss is evaluated using 106 correctness and robustness tests and a novel set of cloudnative&#13;
micro and macro benchmarks that exercise real-world scenarios. A comprehensive evaluation&#13;
of GraalDoss shows a consistent near-constant data-deserialization overhead with serialization&#13;
times comparable to state-of-the-art Java JSON and binary serialization libraries.&#13;
GraalDoss reduces the memory footprint of web API microservice caches by sharing populated&#13;
cache snapshots across microservice instances, improving the overall density by 41% for&#13;
8 microservice instances and improving first-response times by 34%. In NLP applications,&#13;
GraalDoss improves the pipeline execution times by six orders of magnitude by snapshotting&#13;
pipeline results and subsequently loading the snapshots.

</description>
</item>
<item rdf:about="http://hdl.handle.net/123456789/5783">
<title>INTEGRALNE SREDINE KOMPOZICIONOG OPERATORA NA PROSTORIMA HOLOMORFNIH FUNKCIJA</title>
<link>http://hdl.handle.net/123456789/5783</link>
<description>INTEGRALNE SREDINE KOMPOZICIONOG OPERATORA NA PROSTORIMA HOLOMORFNIH FUNKCIJA

Dmitrović, Dušica

The study of integral means of the composition of functions defined&#13;
on the unit disk D in the complex plane dates back to the 1920s, with one of the&#13;
earliest results in this area being Littlewood’s subordination principle.&#13;
When investigating the norm of composition operators on certain spaces of&#13;
holomorphic functions, a natural need arises to study the relationship between&#13;
the integral means of the composition f ◦ φ and those of the function f itself.&#13;
Littlewood’s principle is one of the main tools used to establish this connection.&#13;
However, it is not the only one. In this dissertation, additional methods for&#13;
studying the relationship between these integral means are presented. By applying&#13;
these methods, two-sided estimates for the norm of the composition operator Cφ on&#13;
spaces of mixed norm Hp,q,α are obtained in the form K1 ≤ ∥ Cφ ∥Hp,q,α→Hp,q,α ≤ K2,&#13;
where the constants K1 and K2 depend on the parameters p, q, α and |φ(0)|.&#13;
Furthermore, the monotonicity of the integral mean of a holomorphic function&#13;
f on the unit disk D, denoted by Mp,q,α[f ](ρ, R, s) , is investigated, where 0 &lt;&#13;
p, q, α &lt; ∞, 0 ≤ ρ &lt; R ≤ 1 and 0 ≤ s ≤ 1. One consequence of this result is&#13;
the monotonicity of the norm ∥f ∥p,q,α in mixed norm spaces with respect to the&#13;
parameters p, q, α.&#13;
One of the operators that can be represented as an integral of weighted&#13;
composition operators Tt is the Hilbert matrix operator H acting on the weighted&#13;
Bergman spaces Ap&#13;
γ . Moreover, it is known that the operator H is bounded if and&#13;
only if 1 &lt; γ + 2 &lt; p, and in this case, the following lower bound for the norm&#13;
of the operator holds: ∥H∥Ap&#13;
γ →Ap&#13;
γ ≥ π/ sin (γ+2)π&#13;
p . When γ &gt; 0 and p ≥ 2(γ + 2),&#13;
it is known that the norm is equal to this constant. In studying the norm of the&#13;
operator H, after applying Minkowski’s theorem, the application of Minkowski’s&#13;
inequality reduces the problem to estimating the norm of the operator Tt. As a&#13;
result of this analysis, in the case where γ &lt; 0 a new upper bound for the norm of&#13;
the operator H is obtained, while in the case where γ &gt; 0, the interval on which&#13;
the norm equals the constant π/ sin (γ+2)π&#13;
p is extended.&#13;
Finally, the dissertation presents a refinement of Littlewood’s subordination&#13;
principle under an additional injectivity assumption, together with applications&#13;
of the new inequality to the Rogosinski theorem and to norm estimates for&#13;
compositions of functions on weighted Bergman spaces.

</description>
</item>
<item rdf:about="http://hdl.handle.net/123456789/5782">
<title>Metode za efikasno rešavanje dominacijskih problema na velikim grafovima</title>
<link>http://hdl.handle.net/123456789/5782</link>
<description>Metode za efikasno rešavanje dominacijskih problema na velikim grafovima

Kapunac, Stefan

This dissertation addresses methods for efficiently solving several important variants&#13;
of domination problems on graphs, with a particular focus on large-scale instances that frequ-&#13;
ently appear in real-world systems. Domination problems have numerous applications in the&#13;
analysis and management of complex networks, including social, telecommunication, transport,&#13;
and biological networks. The study covers four problems: minimum weight total domination,&#13;
minimum weight independent domination, k-strong Roman domination, and the canonical mi-&#13;
nimum domination problem on large graphs.&#13;
For the minimum weight total domination problem, a variable neighborhood search approach&#13;
is proposed, with carefully designed mechanisms for shaking, local search, and fitness function&#13;
evaluation. The results show that the proposed algorithm achieves optimal solutions on small&#13;
and medium instances and outperforms competing approaches on large graphs. Additionally,&#13;
an application of this problem for accelerating information spreading in social networks is&#13;
proposed.&#13;
For the minimum weight independent domination problem, two new integer linear pro-&#13;
gramming models are developed. Solving these models finds optimal solutions for all smaller&#13;
instances while demonstrating superior performance compared to competing exact approaches&#13;
on larger graphs. In addition, a greedy heuristic is proposed that outperforms competing greedy&#13;
methods on most instances.&#13;
In the case of k-strong Roman domination, a greedy heuristic based on node coverage&#13;
information is developed, along with a metaheuristic approach based on variable neighborhood&#13;
search that uses the greedy algorithm for initialization. This problem is particularly challenging&#13;
due to the exponential complexity of solution feasibility verification, leading to the introduction&#13;
of the concept of quasi-feasibility that enables efficient feasibility assessment during the search.&#13;
Experimental results show that the proposed algorithm consistently outperforms the greedy&#13;
approach and existing competing methods, especially on larger graphs. The practical value&#13;
of the algorithm is illustrated through a case study involving the optimal positioning of fire&#13;
stations and vehicles in urban municipalities to ensure the entire city is safe in the event of k&#13;
simultaneous fires.&#13;
For the minimum domination problem, a new hybrid approach called IRIS is proposed. IRIS&#13;
is designed as a general-purpose framework that bridges the gap between exact integer linear&#13;
programming solvers and heuristic search by iteratively fixing selected variables to reduce the&#13;
search space. Тhe novelty lies in its flexible subproblem construction mechanism, which can be&#13;
tailored using various selection strategies. In this study, we implement and evaluate a specific&#13;
configuration of IRIS that utilizes historical statistical data and a node-coverage-based heuristic&#13;
to intelligently identify variables for fixing. This targeted approach allows the ILP solver to find&#13;
high-quality solutions for large-scale instances that are computationally prohibitive for exact&#13;
methods. Experimental results demonstrate that IRIS achieves competitive performance com-&#13;
pared to the best existing methods, establishing it as a valid alternative for solving domination&#13;
and potentially other NP-hard problems.

</description>
</item>
<item rdf:about="http://hdl.handle.net/123456789/5781">
<title>U- AND V-STATISTICS FOR INCOMPLETE DATA AND THEIR APPLICATION TO MODEL SPECIFICATION TESTING</title>
<link>http://hdl.handle.net/123456789/5781</link>
<description>U- AND V-STATISTICS FOR INCOMPLETE DATA AND THEIR APPLICATION TO MODEL SPECIFICATION TESTING

Aleksić, Danijel

This dissertation addresses the problem of model specification testing in situa-&#13;
tions where data are incomplete, utilizing the existing theory of non-degenerate and weakly&#13;
degenerate U- and V-statistics. The first two chapters lay the theoretical groundwork by pre-&#13;
senting essential concepts related to U- and V-statistics and the general mathematical frame-&#13;
work of missing data analysis, which serve as the foundation for the new results developed in&#13;
subsequent chapters.&#13;
In Chapter 3, a novel test for assessing the missing completely at random (MCAR) assump-&#13;
tion is introduced. This test demonstrates improved control of the type I error rate and supe-&#13;
rior power performance compared to the main competitor across the majority of the simulated&#13;
scenarios examined.&#13;
Chapter 4 explores the application of Kendall’s test for independence in the presence of&#13;
MCAR data. It provides both theoretical insights and simulation-based comparisons of the&#13;
complete-case analysis and median imputation, pointing out their individual advantages and&#13;
drawbacks.&#13;
Chapter 5 focuses on testing for multivariate normality when data are incomplete. It rig-&#13;
orously establishes the validity of the complete-case approach under MCAR and proposes a&#13;
bootstrap method to approximate p -values when imputation is employed. Additionally, vari-&#13;
ous imputation techniques are evaluated with respect to their impact on the type I error and&#13;
the power of the test.&#13;
Finally, Chapter 6 adapts the energy-based two-sample test to handle missing data by intro-&#13;
ducing a weighted framework that makes full use of all available observations. Alongside some&#13;
theoretical developments, the chapter presents two distinct bootstrap algorithms for p -value&#13;
estimation under this approach. Additionally, the performance of several imputation methods&#13;
is examined in this context, and appropriate bootstrap algorithm is proposed for that setting.

</description>
</item>
</rdf:RDF>
