The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks

Size: px
Start display at page:

Download "The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks"

Transcription

1 The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks Mingyue Ji, Student Meber, IEEE, Giuseppe Caire, Fellow, IEEE, and Andreas F. Molisch, Fellow, IEEE arxiv:3.637v [cs.it] 8 Jul 05 The authors are with the Departent of Electrical Engineering, University of Southern California, Los Angeles, CA 90089, USA. e-ail: {ingyuej, caire, olisch}@usc.edu. A short version of this work was presented at the 03 IEEE International Syposiu on Inforation Theory, ISIT 03, Istanbul, July 7-, 03. This work was supported by the Intel VAWN Video Aware Wireless Networks progra and the National Science Foundation under grants CCF-4340 and CIF-680.

2 Abstract We consider a wireless device-to-device DD network where the nodes have pre-cached inforation fro a library of available files. Nodes request files at rando. If the requested file is not in the onboard cache, then it is downloaded fro soe neighboring node via one-hop local counication. An outage event occurs when a requested file is not found in the neighborhood of the requesting node, or if the network adission control policy decides not to serve the request. We characterize the optial throughput-outage tradeoff in ters of tight scaling laws for various regies of the syste paraeters, when both the nuber of nodes and the nuber of files in the library grow to infinity. Our analysis is based on Gupta and Kuar protocol odel for the underlying DD wireless network, widely used in the literature on capacity scaling laws of wireless networks without caching. Our results show that the cobination of DD spectru reuse and caching at the user nodes yields a per-user throughput independent of the nuber of users, for any fixed outage probability in 0,. This iplies that the DD caching network is scalable : even though the nuber of users increases, each user achieves constant throughput. This behavior is very different fro the classical Gupta and Kuar result on ad-hoc wireless networks, for which the per-user throughput vanishes as the nuber of users increases. Furtherore, we show that the user throughput is directly proportional to the fraction of cached inforation over the whole file library size. Therefore, we can conclude that DD caching networks can turn eory into bandwidth i.e., doubling the on-board cache eory on the user devices yields a 00% increase of the user throughout. Throughput-outage tradeoff, scaling laws, caching wireless networks, device-to-device counications. Index Ters

3 I. INTRODUCTION Data traffic generated by wireless and obile devices is predicted to increase by soething between one and two orders of agnitude [] in the next five years, ainly due to wireless video streaing. Traditional ethods for increasing the area spectral efficiency, such as using ore spectru and/or deploying ore base stations, are either insufficient to provide the necessary wireless throughput increase, or are too expensive. Thus, exploring alternative strategies that leverage different and cheaper network resources is of great practical and theoretical interest. The bulk of wireless video traffic is due to asynchronous video on deand, where users request video files fro soe library e.g., itunes, Netflix, Hulu or Aazon Prie at arbitrary ties. This type of traffic differs significantly fro live streaing. The latter is essentially a lossy ulticasting proble, for which the broadcast nature of the wireless channel can be naturally exploited see for exaple [] [6]. The theoretical foundation of schees for live streaing relies on well-known inforation theoretic settings for one-to-any transission of a coon essage with possible refineent inforation, such as successive refineent [7] [9] or ultiple description coding [0] []. In contrast, the asynchronous nature of video on deand prevents fro taking advantage of ulticasting, despite the significant overlap of the requests people wish to watch a few very popular files. Hence, even though users keep requesting the sae few popular files, the asynchronis of their requests is large with respect to the duration of the video itself, such that the probability that a single transission fro the base station is useful for ore than one user is essentially zero. Due to this reason, current practical ipleentation of video on deand over wireless networks is handled at the application layer, requiring a dedicated data connection typically TCP/IP between each client user and the server base station, for each streaing user, as if users were requesting independent inforation. One of the ost proising approaches to take advantage of the inherent asynchronous content reuse is caching, widely used in content distribution networks over the wired Internet [3]. In [4], [5], the idea of deploying dedicated helper nodes with large caches, that can be refreshed via wireless at the cellular network off-peak tie, was proposed as a cost-effective alternative to providing large capacity wired backhaul to a network of densely deployed sall cells. An even ore radical view considers caching directly at the wireless users, exploiting the fact that odern devices have tens and even hundreds of GBytes of largely under-utilized storage space, which represents an enorous, cheap and yet untapped network resource. Recently, a coded ulticasting schee exploiting caching at the user nodes was proposed in [6]. In this

4 3 schee, the files in the library are divided in blocks packets and users cache carefully designed subsets of such packets. Then, for given set of user deands, the base station sends to all users ulticasting a coon codeword fored by a sequence of packets obtained as linear cobinations of the original file packets. As noticed in [6], coded ulticasting can handle any for of asynchronis by suitable subpacketization. Hence, the schee is able to create ulticasting opportunities through coding, exploiting the overlap of deands while eliinating the asynchronis proble. For the case of arbitrary adversarial deands, the coded ulticasting schee of [6] is shown to perfor within a sall gap, independent of the nuber of users, of the cache size and of the library size, fro the cut-set bound of the underlying copound channel. However, the schee has soe significant drawbacks that akes it not easy to be ipleented in practice: the construction of the caches is cobinatorial and the sub-packetization explodes exponentially with the library size and nuber of users; changing even a single file in the library requires a significant reconfiguration of the user caches, aking the cache update difficult. In [7], siilar near-optial perforance of coded caching is shown to be achieved also through a rando caching schee, where each user caches a rando selection of bits fro each file in the library. In this case, though, the cobinatorial coplexity of the coded caching schee is transferred fro the caching phase to the coded delivery phase, where the construction of the ulticast codeword requires solving ultiple clique cover probles with fixed clique size known to be NP-coplete, for which a greedy algorith is shown to be efficient. Our contributions: In this paper, we focus on an alternative approach that involves rando independent caching at the user nodes and device-to-device DD counication. Instead of creating ulticasting opportunities by coding, we exploit the spatial reuse provided by concurrent ultiple short-range DD transissions. Inspired by the current standardization of a DD ode for LTE the 4-th generation of cellular systes [8], we restrict to one-hop counication. Under such assuption, requiring that all users ust be served for any request configuration is too constraining. Therefore, we introduce the possibility of outages, i.e., that soe requests are not served, because of soe network adission control policy to be discussed in details later on. For the syste described in Section II, we define the throughput-outage region and obtain achievability and converses that are sufficiently tight to characterize the throughput-outage scaling laws within a sall gap of the constants of the leading ter. Furtherore, our analysis shows very good agreeent with with finite-diensional siulation results. In the relevant regie of sall outage probability, the throughput of the DD one-hop caching network The copound nature of this odel is due to the fact that the schee handles adversarial deands.

5 4 behaves in the sae near-optial way as the throughput of coded ulticasting [6], [7], while the syste architecture is significantly ore straightforward for a practical ipleentation. In particular, for fixed cache size M, as the nuber of users n and the nuber of files becoe large with nm, the throughput of the DD one-hop caching network grows linearly with M, and it is inversely proportional to, but it is independent of n. Hence, DD one-hop caching networks are very attractive to handle situations where a relatively sall library of popular files e.g., the 500 ost popular ovies and TV shows of the week is requested by a large nuber of users e.g., 0,000 users per k in a typical urban environent. In this regie, the proposed syste is able to efficiently turn eory into bandwidth, in the sense that the per-user throughput increases proportionally to the cache capacity of the user devices. We believe that this conclusion is iportant for the design of future wireless systes, since bandwidth is a uch ore scarce and expensive resource than storage capacity. Related literature: The analysis of the capacity scaling laws for large DD or ad-hoc wireless networks has been the subject of a vast body of literature. Gupta and Kuar [9] proposed a network odel where n are randoly placed on soe planar region and counicate through ultiple hops. They characterized the transport capacity scaling as n, under the sae protocol odel considered in our paper see Section II. For rando assignent of source-destination pairs, [9] showed that the per-link capacity ust vanish as O n. In addition, a ulti-hop relaying schee was shown to achieve throughput scaling Ω n log n. The sae results were confired, using a soehow sipler and ore general analysis technique, in [0]. The ulticast capacity of large wireless networks has been investigated in [], []. Finally, Franceschetti, Dousse, Tse and Thiran [3] closed the logn gap between upper bound and achievability in [9], [0] by creating an alost deterinistically placed grid sub-network with vertical and horizontal highways that relay essages with very short hops. The existence of such grid subnetwork is guaranteed with high probability by percolation theory. Given the fact that randoly placed nodes yield the sae scaling laws of nodes placed on a deterinistic squared grid, in this work we assue a grid network fro the start. This allows to focus on the essential aspect of caching at the nodes, and avoid the analytical coplication of randoly placed nodes. The sae approach is taken in [4], where ulti-hop DD counication is considered under the protocol odel for a network of nodes placed deterinistically on a squared grid. If the aggregate distributed Scaling law order notation: given two functions f and g, we say that: fn = O gn if there exists a constant c and integer N such that fn cgn for n > N. fn = o gn if li n fn gn = 0. 3 fn = Ω gn if gn = O fn. 4 fn = ω gn if gn = o fn. 5 fn = Θ gn if fn = O gn and gn = O fn.

6 5 storage space in the network is larger than the total size of the library, ulti-hop guarantees that all user requests can be served by the network. Under the sae assuption ade here of the user requests distribution, [4] finds a deterinistic replication caching schee and a ulti-hop routing schee that achieves order-optial average throughput. Besides the consideration of ultihop and single hop, there are several other key differences between our work and [4]. First, [4] considers a deterinistic caching placeent approach, which depends on the files popularity distribution. This approach is not robust when users ove between cells. In contrast, obility is easily handled by our schee which is based on independent rando caching. Next, in [4], the transission range is fixed, where each node can only reach its four neighbors. Besides the deterinistic caching placeent, the key aspect of the proble is the design of the routing protocol and analyze the traffic through the bottleneck link of the network. Our work focuses on deterining the transission range within which nodes can access their neighbors caches in one hop. This, in turn, deterines the point of the throughput-outage tradeoff at which the syste operates. Finally, [4] only gives the order of the throughput as the nuber of users n goes to infinity, but does not characterizes the ultiplicative constant of the throughput leading ter in the scaling law. Therefore, it is difficult to understand in which regie of large but finite n the scaling laws becoe relevant. In passing, we notice that this is a coon proble in several studies focused on scaling laws of large wireless networks. In our case, we provide outer bounds and inner achievable bounds to the throughput-outage tradeoff, which are tight enough to characterize also the constants of the leading ters, within a bounded gap. In particular, the analysis of our achievability schee atches well with finite-diensional siulations. Preliinary work of the present paper is given in [5], where only the su throughput was considered irrespectively of user outage probability. The analysis in [5] considers a heuristic rando caching policy, while here we find the optial rando caching distribution. More iportantly, the total su throughput is not a sufficient characterization of the perforance of DD one-hop caching networks: in certain regies of the nuber of users and file library size, it can be shown that in order to achieve a large su throughput only a sall portion of the users should be served, while leaving the ajority of the users in outage. In contrast, the throughput-outage tradeoff region considered here is able to capture the notion of fairness, since it focuses on the iniu per-user average throughput and on the fraction of users which are denied service. The paper is organized as follows. Section II introduces the network odel and the precise proble forulation of the throughput-outage tradeoff in DD one-hop caching networks. The ain results on the outer bound and achievability of the throughput-outage tradeoff are presented in Sections III and

7 6 IV, respectively. In Section V we presents soe concluding rearks. All proofs are relegated in the Appendices, in order to aintain the flow of exposition. II. NETWORK MODEL AND PROBLEM FORMULATION We consider a network deployed over a unit-area squared region and fored by n nodes U = {,..., n} placed on a regular grid with iniu node distance / n see Fig.. Each user u U akes a request to a file f u F = {,..., } in an i.i.d. anner, according to a given request probability ass function {P r f : f F}. In order to odel the asynchronous content reuse and forbid any for of for-free ulticasting by overhearing, we consider the following theoretical odel. We assue that each file is fored by a sequence of L packets. Each user deand corresponds to a file index f F and a segent of L < L consecutive packets, starting at soe initial index l, uniforly and independently distributed over {,..., L L +}. The packets of the requested segent are downloaded sequentially. We easure the cache size in files, and in order to copute the syste perforance we consider first the liit for large file size L with L finite, and then study the syste scaling laws for n,. Hence, the probability that users request overlapping segents vanishes for L for any finite n,, L, thus preventing the trivial use of naive ulticasting i.e., overhearing coon essages. In contrast, the probability that two users request segents of the sae file depends on the library size and on the request distribution P r. We hasten to say that this odel is just a way to express in precise atheatical ters the notion of asynchronous content reuse, such that the overlap of the deands and the overlap of concurrent transissions are decoupled. 3 Fig. shows qualitatively our odel assuptions. In our syste, DD counication obeys the following protocol odel [9]: a node u can receive successfully a packet fro node v if du, v R and if no other node v at distance du, v < + R is transitting. The transission range R is a design paraeter that can be set as a function of and n. We consider the following definitions: Definition : Network A network if fored by a set of user nodes U and a set of files F = {,..., }. Nodes in U are placed in the two-diensional unit-square region, and their transissions obeys the protocol odel. In general, all nn directed links between user nodes, subject to the protocol odel, define an interference conflict graph. Only the links in an independent set in the interference graph can be active siultaneously. 3 As a side note, we observe also that the segentation of large files into saller packets or chunks to be sequentially downloaded is consistent with current video streaing protocols such as DASH [6] [9].

8 7 Fig.. Qualitative representation of our syste assuptions: each user caches an entire file, fored by a very large nuber of packets L. Then, users place rando requests of segents of L packets fro files of the library, starting at rando initial points. In the figure, we have L = 4. + R s Fig.. Grid network with n = 49 nodes black circles with iniu separation s = n. The red area is the disk where the protocol odel iposes no other concurrent transission. R is the case transission range and is the interference paraeter, such that the forbidden disk around the receiver has radius + R.

9 8 Definition : Cache placeent The cache placeent Π c is a rule to assign files fro the library F to the user nodes U with replaceent i.e., with possible replication. Let G = {U, F, E} be a bipartite graph with left nodes U, right nodes F and edges E such that u, f E indicates that file f is assigned to the cache of user u. A bi-partite cache placeent graph G is feasible if the degree of each user node is not larger than the axiu user cache size equal to M files. Let G denote the set of all feasible bi-partite graphs G. Then, Π c is a probability ass function over G, i.e., a particular cache placeent G G is assigned with probability Π c G. Notice that deterinistic cache placeents are special cases, corresponding to a single probability ass equal to on the desired assignent G. In contrast, we will be interested in decentralized rando caching placeents constructed as follows: each user node u U selects its cache content in an i.i.d. anner, by independently generating at rando M indices f u,,..., f u,m according to the sae caching probability ass function {P c f : f F}. Definition 3: Rando requests At each request tie integer ultiples of L, each user u U akes a request to a segent of length L of chunks fro file f u F, selected independently with probability P r. The vector of current requests f is a rando vector taking on values in F n, with product joint probability ass function Pf = f,..., f n = n i= P rf i. In this paper, we assue that P r is a Zipf distribution with paraeter 0 < < [30], i.e., P r f = f H,, for f =,...,, and H, x, y = y i=x i. Definition 4: Transission policy The transission policy Π t is a rule to activate the DD links in the network. Let L denote the set of all directed links. Let A L denote the set of all feasible subsets of links this is a subset of the power set of L, fored by all independent sets in the network interference graph. Let A A denote a feasible set of siultaneously active links according to the protocol odel. Then, Π t is a conditional probability ass function over A given f requests and G cache placeent, assigning probability Π t A f, G to A A. We ay think of Π t as a way of scheduling siultaneously copatible sets of links subject to the protocol odel. Modeling the scheduling policy in a probabilistic anner allows the analytical convenience of defining the average per-user throughput see below as an enseble average. As a atter of fact, deterinistic link activation rules can be included by defining the average throughput as a tieaverage. For exaple, a bounded deterinistic delay per user can be guaranteed by activating groups of copatible links foring a axial independent set in the network interference graph in a deterinistic round-robin sequence, such that each user is served with a deterinistic delay. Definition 5: Useful received bits per slot For given P r, Π c and Π t, and user u U, we define the

10 9 rando variable T u as the nuber of useful received inforation bits per slot unit tie by user u at a given scheduling tie irrelevant because of stationarity. This is given by T u = v:u,v A c u,v {f u Gv} where f u denotes the file requested by user node u, c u,v denotes the rate of the link u, v, and Gv denotes the content of the cache of node v, i.e., the neighborhood of node v in the cache placeent graph G. Consistently with the protocol odel, c u,v depends only on the active link u, v A and not on the whole set of active links A. Furtherore, we shall obtain our results under the siplifying assuption usually ade under the protocol odel [9] that c u,v = C for all u, v A. The indicator function {f u Gv} expresses the fact that only the bits relative to the file f u requested by user u are useful and count towards the throughput. Obviously, scheduling links u, v for which f u / Gv is useless for the sake of the throughput defined above. Hence, we can restrict our transission policies to those activating only links u, v for which f u Gv. These links are referred to as potential links, i.e., links potentially carrying useful data. Potential links included in A are active links, at the given scheduling slot. The average throughput for user u U is given by T u = E[T u ], where expectation is with respect to the rando triple f, G, A n i= P rf i Π c GΠ t A f, G. We say that user u is in outage if E[T u f, G] = 0. This condition captures the event that no link u, v with f u Gv is scheduled with positive probability, for given requests vector f and cache placeent G. In other words, a user u for which E[T u f, G] = 0 experiences a long lack of service zero rate, as far as the cache placeent is G and the request vector is f. Definition 6: Nuber of nodes in outage The nuber of nodes in outage is given by Notice that N o is a rando variable, function of f and G. by N o = u U {E[T u f, G] = 0}. Definition 7: Average outage probability The average across the users outage probability is given p o = n E[N o] = P E[T u f, G] = 0. 3 n u U

11 0 In this work we focus on ax-in fairness, i.e., we express the throughput-outage tradeoff in ters of the iniu average user throughput, defined as T in = in u U { T u }. 4 Notice that that the ax-in fairness criterion in our setting is essential to ake the outage probability p o defined in 3 eaningful. In fact, for 0 p o < p o, consider a syste that achieves outage probability p o by serving only a fraction λ of users with outage probability p o = po λ λ, while leaving the reaining fraction λ of users peranently idle. In this case, we have T in = 0 since there are λn > 0 users with identically zero throughput. Hence, a syste that peranently excludes soe users in favor of others is certainly not optial in ters of the throughput-outage tradeoff as defined below: Definition 8: Throughput-Outage Tradeoff For a given network and request probability distribution P r, an throughput-outage pair T, p is achievable if there exists a cache placeent Π c and a transission policy Π t with outage probability p o p and iniu per-user average throughput T in T. The throughput-outage achievable region T is the closure of all achievable throughput-outage pairs T, p. In particular, we let T p = sup{t : T, p T }. Notice that T p is the result of the following optiization proble: axiize T in subject to p o p, 5 where the axiization is with respect to the cache placeent and transission policies Π c, Π t. Hence, it is iediate to see that T p is non-decreasing in p. The range of feasible outage probability, in general, is an interval [p o,in, ] for soe p o,in 0. We say that an achievable point T, p doinates an achievable point T, p if p p and T T. The Pareto boundary of T consists of all achievable points that are not doinated by other achievable points, i.e., it is given by {T p, p : p [p o,in, ]}. It is also iediate to see that the throughput-outage tradeoff region is convex. In fact, consider two achievable points T in, p o and T in, p o corresponding to caching placeents G and G, with probability assignents Π c and Π c. For λ [0, ], the caching placeent G with ixture probability assignent Π c = λπ c + λπ c achieves p o = λp o + λp o. For this value of outage probability, the best possible strategy achieves { } T p o in λt u u + λt u λ in T u u + λ in T u u, where, by definition, T in = in u T u and T in = in u T u. Hence, the segent joining any

12 two achievable throughput-outage points T in, p o and T throughput-outage region. in, p o is contained into the achievable We conclude this section by providing the intuition behind the tension between outage and throughput, and explaining through an intuitive arguent why T p is non-decreasing for p [p o,in, ]. The key tradeoff quantity here is the cooperation cluster size g, that is, the size of the set of nearest neighbor nodes aong which any node u can look for its desired file f u. On one hand, we would like to have g large, in order to take advantage of the content reuse, i.e., the larger g, the larger the probability that any user can find and retrieve its desired file. On the other hand, we would like to have g sall, in order to take advantage of the spatial reuse, i.e., the saller g, the larger the nuber of siultaneously active links that the network can support. Therefore, g describes the tradeoff between content reuse and spatial reuse. As g increases the probability that user u does not find its desired file decreases. Hence, p o is a decreasing function of g see Fig.3a. Since nodes can retrieve their desired files within a cluster of size g, then the counication range of the DD links ust be enough to counicate across such clusters. The average nuber of active links that can be activated without violating the protocol odel is of the order of the nuber of disjoint clusters in the network, i.e., n g. With a probability p o that any user cannot find its requested file, the average per-user throughput is roughly given by T po n n g = po g. Since for sall g we have p o, and for large g we have p o p o,in, where the latter is the probability that a node u does not find its requested file in the whole network, we clearly see that T ust be increasing for sall g and decreasing for large g see Fig.3b. Now, consider the constraint on the outage probability p o p. If p is sall, then the constraint ust be satisfied with equality, yielding the corresponding value of g Fig.3a which in turns yields a corresponding value of T Fig.3b. As p increases, we obtain the concave increasing part of the throughput vs outage Pareto boundary curve qualitatively depicted in Fig. 3c. However, when p becoes larger than soe threshold, the optial throughput is obtained by letting g = g, which is the size that achieves the axiu unconstrained throughput see Fig. 3b. This eans that for values of p beyond this threshold value, the throughput curve reaches a bound horizontal line, equal to the unconstrained axiu throughput, as shown in Fig. 3c. It follows fro the upper bounds developed in Section III that this intuitive arguent, even though it is developed for a cluster-based achievability strategy, holds true also for the upper bounds, despite the fact that the latter do not assue any a priori transission strategy other than the one-hop constraint and

13 outage prob. throughput throughput T p o,in p g cluster size g g cluster size p o,in outage prob. a b c Fig. 3. Qualitative behavior of the tradeoff between throughput and outage probability, by ways of the tradeoff paraeter g, which represents the size of the cluster of nodes over which any node can look for its desired requested file and download it by DD on-hop counication. the protocol odel. III. OUTER BOUNDS Under the one-hop restriction, network topology and protocol odel given in Section II, we can provide an outer bound T ub p on the throughput-outage tradeoff, such that the enseble of points {T ub p, p : p [0, ]} doinates the tradeoff region T. In what follows, the quantity α = plays an iportant role. Notice that 0 α < / under the assuption ade here that 0 < <. The following results are proved in Appendices A and B: Theore : When li n α n T ub p, p given by : T ub p = 6CM p { in + o p = 0, the throughput-outage region is doinated by the set of points, p = MgR } 6CM, f p ub ρ α + o α, Mρ α p < Mρ α f ub ρ α + o α, Mρ α p, where ρ ρ and ρ is the solution with respect to ρ of the equation ζρ = log + ζρ 8 6 7

14 3 with ζρ = + 3 ρ M, 9 g R is any function such that g R = ω α and g R in{ M, n}, and where f ub ρ = 6C ρ e ζρ. 0 Theore : When there exists a positive constant ξ such that ξ li n α n 6 ρ, the throughputoutage region is doinated by the set of points T ub p, p given by: T ub p = { } 6CM in, f p ub ρ α + o α, Mρ α p < Mρ α f ub ρ α + o α, Mρ α p, where ρ is the solution of 8, and ρ [ρ, 6 n ]. α Theore 3: When li n α n > 6 ρ doinated by the set of points T ub p, p given by : Mn T ub p = C + o ρ being the solution of 8, the throughput-outage region is n, Mn p. Notice that the range of p in Theores and 3 is liited to [p o,in, ] with p o,in = Mρ α for Theore and p o,in = Mn for Theore 3, showing that in these regies the outage probability cannot be sall. As a atter of fact, of all the regies identified by Theores, and 3, the only practically interesting one is the first regie of Theore. In particular, Theore and 3 show that, when li n α n is bounded away fro zero, any schee for the one-hop DD caching network yields outage probability that goes to, which is clearly not an acceptable. In contrast, li n n = κ <, there ight exist schees achieving soe fixed target outage probability value p [0,, as n,. Intuitively, the function g R plays the role of the size of the cooperation cluster of neighboring nodes within which each user can find its requested file. For exaple, choosing g R = β for soe constant β in { M, } κ, both conditions gr = ω α and g R in { M, n} are satisfied, for all sufficiently large n. Notice that for κ M, the choice β = /M yields that the outer bound contains points of the type OM/, 0 zero outage probability. We shall see in the next section that throughput-outage points with throughput ΩM/ and fixed p bounded away fro are achievable.

15 4 For a conventional unicast syste where users are served by a single oniscient node e.g., a base station that can store the whole library, the throughput scaling is O/n. 4 Hence, in the case of nm, the cobination of caching and DD spatial reuse yields a very large throughput relative gain with respect to a conventional syste. It is also interesting to notice that despite the first regie of Theore requires that grows ore slowly than n /α, the only practically interesting sub-regie is = on, otherwise conventional unicast fro the base station yields better throughput scaling and zero outage probability all users are served. All other regies in Theores 3 are included for copleteness, in order to prove atheatically a soehow intuitively expected negative result: unless the library size is sall with respect to the aggregate caching eory nm, caching cannot achieve significant throughput gains with respect to conventional unicast fro a single base station. This result is expected since, in this case, the asynchronous content reuse that the DD caching network tries to exploit is essentially non-existent. It is also iportant to notice that here we are considering the realistic case of a heavy tail Zipf request distribution with 0,. If >, then a finite nuber of files collects essentially all the request probability ass, and this case is siilar to the case of = O, which is a special case of = on. As a atter of fact, Zipf-distributed requests with 0, have been observed experientally [3] [33]. In the next section, we show that the upper bounds obtained here are tight in the scaling laws, and that the constants of the leading ters can be deterined within constant gaps. This is obtained by exhibiting and analyzing a specific achievability strategy. IV. ACHIEVABLE THROUGHPUT-OUTAGE TRADEOFF Consistently with the outer bounds in Theores 3 and the concluding rearks in Section III, we consider achievability only in the sall library regie li n α n = 0, for which there is hope to achieve soe target outage probability strictly less than. We obtain an achievable inner bound on the achievable throughput-outage tradeoff region by considering a transission policy based on clustering and a caching policy based on independent rando caching. Clustering: the network is divided into clusters of equal size, denoted by g c, and independent of the users deands and cache placeent realizations. A user can only look for the requested file inside 4 This is obviously achieved by TDMA, serving users on different tie slots in a round-robin fashion. Notice that even if a ore refined physical layer including a Gaussian broadcast channel is considered, the throughput scaling reains the sae.

16 5 Fig. 4. Exaple of TDMA reuse schee: each square represents a cooperation cluster. Gray squares represent the concurrently active clusters in a given tie slot. In other ties slots, other patterns of concurrently active clusters obtained by shifting the pattern in the figure are activated. In this particular exaple, the TDMA reuse paraeter is K = 9. its own cluster. For each user whose deand is found inside its cluster, we say that a potential link exists in the cluster. If a cluster contains at least one potential link, we say that this cluster is good. We use an interference avoidance transission policy Π t for which at ost one concurrent transission is allowed in each cluster, over any tie-frequency slot transission resource. Furtherore, potential links inside the sae cluster are scheduled with equal probability or, equivalently, in round robin, such that all users have the sae throughput T u = T in. To avoid interference between clusters, we use a conventional TDMA with spatial reuse schee [34, Ch. 7], very siilar to the spatial reuse schee of a cellular network, where each cluster acts as a cell. In short, a coloring schee with K colors is applied to the clusters such that clusters with the sae color can be concurrently active on the sae tie slot, without violating the protocol odel. The resulting groups of clusters are assigned to K orthogonal tie slots, and are activated in a round-robin fashion. In particular, we use K = + + in order to guarantee that concurrently active clusters do not interference with each other. Fig. 4 shows an exaple for K = 9. Rando Caching: we consider a caching policy Π c where each node independently caches M files according to a coon probability distribution Pc, given by the following result proved in Appendix C:

17 6 Theore 4: Under the syste odel assuptions and the clustering schee described above, the caching distribution P c its corresponding cluster is given by that axiizes the probability that any user u U finds its requested file inside P c f = [ ν z f ] +, f =,...,, 3 where ν =, z j = P r j Mgc, and = Θ in{ M g c, }. j= z j The following theore proved in Appendices D yields an inner bound on the achievable outagethroughput tradeoff region: Theore 5: Assue li n α n caching and clustering behaves as: C M K ρ + o/, T p = CA K M p = 0. Then, the throughput-outage tradeoff achievable by rando + o CB K α + o α, CD where we define a = M, b = a p p = e ρ, p = a gc aρ α p ab α K α + o α, ab α p,, A =, B = aρ +aρ 4, D = ab +ab and where ρ and ρ are positive paraeters satisfying ρ and ρ b. The cluster size g c is any function of satisfying g c = ω α and g c /M. In all cases, the achievable throughput scaling law both for p bounded away fro and p coincide with the outer bounds of Theore. Therefore, these throughput scaling laws are tight up to soe gap in the constants of the leading ters. In the rest of this section we copare the achievable throughput scaling law of Theore 5 with the outer bounds of Section III and with the perforance achievable by other schees. In particular, we focus on the interesting regie of sall library Theores and 5. Since α < /, even in this regie the library size can grow faster than n. However, we restrict to the practically relevant regie of = On linear or sub-linear in n. Choosing g c = β for soe β > 0, it is apparent fro the first and second line of 4 that p strictly bounded away fro. By fixing a sall but positive target outage probability, the per-user average throughput of the DD one-hop caching network with rando decentralized caching scales as T p = Θ ax { n, M }, where the scaling Θ n can be trivially achieved by letting the whole network to be a single cluster e.g., transission radius R = and serving one deand per unit tie. This scaling is equivalent to conventional unicast fro a single

18 7 oniscient node which can be regarded as the state of the art of today s single cell systes, with a base station or access point serving individual requests without exploiting the asynchronous content reuse. We notice that, when nm, the throughput of the DD caching network achieves per-user throughput that increases linearly with M. In this regie, caching in the user nodes and exploiting the dense spatial reuse of the DD network is a very attractive approach, since storage space is uch cheaper than scarce resources such as bandwidth or dense base station deployent the reader will forgive this vague stateent in this context. It is interesting to notice that our analysis is able to characterize also the constant of the leading ter within a bounded gap. This is a fortunate fact that does not happen often for the scaling analysis of wireless network capacity e.g., see [9] [3]. For exaple, upper and lower bounds Theore and 5, respectively and finite-diensional siulation results are copared in Fig. 5, which shows both theoretical solid lines and siulated dashed lines curves of the throughput y-axis vs. outage x-axis tradeoff for different values of. In this siulation, the throughput is noralized by C, so that it is independent of the link rate. In particular, the theoretical curves show the doinant ter in 4 divided by C. In these exaples we used = 000, n = 0000, M = and the spatial reuse factor K = 4. The Zipf paraeter varies fro 0. to 0.6, corresponding to the curves fro the left blue to the right cyan..5 x 0 3 Noralized Throughput per User p Fig. 5. Coparison between the noralized theoretical result solid lines and noralized siulated result dashed lines in ters of the iniu throughput per user vs. outage probability, where = 000, n = 0000, M = and spatial reuse factor K = 4. The Zipf paraeter varies fro 0. to 0.6 fro the left blue to the right cyan.

19 8 As anticipated in Section I, in order to understand the potential of the cobination of DD one-hop counication and caching in the user devices, it is instructive to copare the scaling laws achieved by the DD caching network with those achievable by other possible approaches. We have already discussed conventional unicast, achieving Θ n throughput. When the nuber of files is less than the nuber of users n, an alternative consists of broadcasting all files on orthogonal channels. In order to guarantee that any requesting user can start its playback within a delay uch shorter than the whole file duration, also in the presence of asynchronous requests, a wellknown approach consists of Haronic Broadcasting [35] [38]. This schee broadcasts continuously to all users a coon essage fored by the ost probable files, each of which is encoded in the way proposed in [35], refined in [36], [37] and whose optiality in an inforation theoretic sense was established in [38]. Without entering the details, each file of length L packets is divided into blocks of length L/N packets and encoded with bandwidth expansion factor H,, N = N i= i, such that the storage space at each user node is 0 < M < less than one entire file is stored at each given tie, and the tie that any user ust wait between the instant at which the streaing session is requested and the instant at which the playback starts is not larger than L/N packets. In order to allow the users to start playback within a finite delay while L, the ratio L/N ust be finite, i.e., it ust be N = ΘL. Furtherore, for and 0 < <, in order to have outage probability bounded away fro, we need = Θ. Therefore, the bandwidth expansion factor of haronic broadcasting in this regie is log N = Θ log L. It follows that the throughput of Haronic Broadcasting scales as Θ log L. Fro a strictly technical viewpoint, since in our syste assuptions we study the syste perforance by first letting L, and then considering n, that siultaneously grow in soe relation, the throughput of haronic broadcasting under our assuption is identically zero. In practice, for large but finite L, the gain of DD caching over Haronic Broadcasting can be appreciated by by coparing the ter M with the ter log L in the per-user throughput. It is clear that Haronic Broadcasting does not take advantage of the user nodes storage eory, and in addition suffers an arbitrarily large ultiplicative penalty as the length of the files L increases. Finally, we exaine the coded ulticasting schee of [6], already briefly described in Section I, which represent another exaple of one-hop network with caching in the user nodes, able to ake efficient and in fact, near-optial in an inforation theoretic sense use of caching. The rate analysis provided in [6] shows that the nuber of equivalent file ulticast transissions fro the base station

20 9 in order to satisfy any set of users requests is given by Nn,, M = n M + Mn such that the iniu average throughput per user is given by T = C 0 + Mn n M, where C 0 is the coon downlink rate at which the base station can send the ulticast coded essage to all users. For large, n and finite M, the scaling of the per-user throughput given again by Θ ax { n, M }, where the two ters inside the ax are realized depending on whether nm, or nm. Interestingly and soehow surprisingly, this is the sae scaling behavior of the DD caching network studied in this paper. 5, V. CONCLUSIONS In this paper we have considered a wireless device-to-device DD network where the nodes have pre-cached inforation fro a fixed library of possible files, users request files at rando and, if the requested file is not in the on-board cache, then it is downloaded fro soe neighboring node via one-hop local counication. To odel the wireless network, we have followed the siple protocol odel, widely considered in the analysis of the transport capacity scaling laws of wireless ad-hoc networks. We have proposed a odel that captures atheatically the asynchronous content reuse typical of on-deand video streaing, where the users requests have strong overlap and concentrate on a sall set of popular ovies, but the deands are copletely asynchronous, such that naive ulticasting is not effective. In our odel, a user is in outage when its requested file is not found within the allowed transission range. We have defined the optial tradeoff between iniu per-user average throughput and the average fraction of users in outage, that we refer to as outage probability. Then, we have characterized such optial tradeoff in ters of tight scaling laws in all the scaling regies of the syste paraeters, when both the nuber of nodes and the nuber of files in the library grow to infinity. The ain result of this work is that, in the relevant regie sall library, i.e., when = On and the aggregate cache capacity of the network, nm is uch larger that the library size, the throughput of 5 For a perforance coparison between the DD caching network of the present work, coded ulticasting in [6], Haronic Broadcasting in [35] and conventional unicasting under realistic assuptions on the underlying DD and cellular physical channels, please see [39].

21 0 the DD one-hop caching network is proportional to M/ and independent of n. Hence, DD one-hop caching networks are very attractive to handle situations where a relatively sall library of popular files e.g., the 500 ost popular ovies and TV shows of the week is requested by a large nuber of users e.g., 0,000 users per k in a typical urban environent. In this regie, the proposed syste is able to efficiently turn eory into bandwidth, in the sense that the per-user throughput increases proportionally to the cache capacity M of the user devices. Since the latter follows the doubling rate of Moore s law, caching in the user devices can achieve orders of agnitude throughput gains without requiring ore bandwidth. Interestingly, the sae throughput scaling law is achieved by coded ulticasting [6], [7] for a different one-hop network topology with caching at the user nodes, where a single central node e.g., a base station ulticast network-coded codewords fored by EXORing data packets. It is worthwhile to point out that, although these schees yield the sae throughput scaling law, they achieve their orderoptial caching gain according to two copletely different principles. The DD caching network exploits the dense spatial reuse provided by caching, i.e., by replicating the sae file any ties in the network, any user with high probability can find its requested file at short distance, such that any siultaneously active links can be supported on the sae tie slot. In contrast, coded ulticasting achieves its gain by using network coding in order to create a single essage which is siultaneously useful for any users. While in the DD network transissions should be as local as possible in order to exploit spatial reuse, in the coded ulticast network transissions should be as global as possible, in order to benefit the largest nuber of users. In a recent follow-up paper [40], we have investigated a decentralized version of network-coded schee of [6] for the sae DD network of the present work, without any oniscient node that has the whole file library. It turns out that coded ulticasting gain and spatial reuse gain do not cuulate. Thus, it sees that the throughput scaling law obtained here is soehow an inherent liitation of one-hop networks with caching in the user nodes. APPENDIX A PROOF OF THEOREMS AND We first provide an outline of the proof and then dig into the details. We define T su = n u= T u and let T sup, p be the solution of axiize T su subject to p o p, 5

22 where the axiization is with respect to the cache placeent and transission policies Π c, Π t. As for T p, also T sup is non-decreasing in p. Furtherore, the inequality T p n T sup follows iediately fro the definition of T sup and T p. We paraeterize proble 5 with respect to the nuber of nodes in a disk of radius R, referred to for brevity as disk size and indicated by g R, where R denotes the one-hop transission range of the protocol odel. For any value g R = g, let T sug denote the largest achievable su throughput with disk size g, and let p og denote the corresponding outage probability. While obtaining exact expressions for T sug and for p og is difficult, we shall obtain an upper bound T ub sug T sug and a lower bound p lb g p og. By the onotonicity property said above, it follows that T ub sug, p lb g doinates T sug, p og and, as a consequence, n T ub sug, p lb g doinates T p, p for p = p og. Also, we have that the set of outage probability values p og obtained by varying g includes the feasibility doain [p o,in, ] of the original proble 5. This iplies that the set of points n T ub sug, p lb g, obtained by varying g, doinates the Pareto boundary of the throughput-outage region T. 3 Finally, we shall consider separately the different regies of the outer bound, by eliinating the paraeter g R. Conceptually, this can be obtained by letting p = p lb g, solving for g as a function of p and replacing the result into T ub sug. The resulting outer bound shall be denoted siply by T ub p, p, given by Theores and. We focus first on Theore, where li n α n = 0, and consider in details step of the above outline. In the following, we shall iplicitly ignore the non-integer effects when they are irrelevant for the scaling laws. For exaple, recalling that the network has node density n we have n nodes in the unit square, the disk size is given up to integer rounding by g R = πr n = g. 6 For given disk size g, a lower bound on p o can be obtained by observing that p o is upper bounded by the axiu over the users u =,, n, of the probability that user u can be served by the DD network. A necessary condition for this to happen is that the essage f u is found in the cache of soe node inside a disk of size g centered at node u. We denote such event by F u g. 6 If g /M, then the outage probability lower bound is zero, since we can arrange the files in the caches such that at least 6 Notice: events are defined in the probability space of the triple f, G, A n i= PrfiΠcGΠtA f, G, of requests, cache placeents and transission scheduling decisions.

23 one node u finds all files in the library within a radius R. Hence, assuing g < /M, we have p o ax P F u u g a = Mg P r f = f= Mg f= f H,, H,, Mg H,,, 7 where a follows by caching all ost popular Mg files within a disk of radius R for a given user. In order to estiate the value of H,,, we have the following lea: Lea : For, then For =, then y + x H, x, y y x + x. 8 Proof: See Appendix E. logy + logx H, x, y logy logx + x. 9 Fro 7 and Lea, we have the lower bound 0 for g p og p lb g = M Mg + for g < M Next, we seek an upper bound on T sug as a function of the disk size g. According to the protocol odel see Section II, the throughput T su is given by 0 T su = C E [L], where L is the nuber of active links over any strategy with transission radius R. Letting i, j and k, l denote two distinct transitter-receiver pairs, using the triangle inequality and the protocol odel constraints, we have dj, l dk, j dk, l + R dk, l + R R = R. Hence, any two receivers ust be separated by distance not saller than R. Equivalently, disks of radius R around any receiver ust be disjoint. Since there is at least a fraction /4 of the area of such

24 3 Fig. 6. Illustration of the fact that the nuber of sall disks intersecting the union of the big disks centered at the active receivers is necessarily an upper bound to the nuber of active receivers. disks inside the unit square containing our network, the nuber of such disjoint disks in the unit square is upper bounded by 6 π R. We wish to upper bound the nuber of siultaneously active receivers L. In order to do so, consider the situation in Fig. 6, where the potentially active receivers those that can receive according to the protocol odel are at the centers of utually exclusive disks of radius R. Now, any of these receivers u can effectively receive only if F u g occurs. Fro 0, we have PF u g p lb g. Now, consider a disk of radius + R around each active receiver shown as filled dots in Fig. 6, and let UR,, L denote the union of all such disks. It is clear that the nuber of active receivers L is less than or equal to the nuber of sall disks of radius R with non-epty intersection with UR,, L. Since, as argued before, there are at ost 6 π R such disks, we can write L 6 π R i= {disk i UR,, L}. 3

Device-to-Device Collaboration through Distributed Storage

Device-to-Device Collaboration through Distributed Storage Device-to-Device Collaboration through Distributed Storage Negin Golrezaei, Student Meber, IEEE, Alexandros G Diakis, Meber, IEEE, Andreas F Molisch, Fellow, IEEE Dept of Electrical Eng University of Southern

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks 1 Optial Resource Allocation in Multicast Device-to-Device Counications Underlaying LTE Networks Hadi Meshgi 1, Dongei Zhao 1 and Rong Zheng 2 1 Departent of Electrical and Coputer Engineering, McMaster

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

Analyzing Simulation Results

Analyzing Simulation Results Analyzing Siulation Results Dr. John Mellor-Cruey Departent of Coputer Science Rice University johnc@cs.rice.edu COMP 528 Lecture 20 31 March 2005 Topics for Today Model verification Model validation Transient

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs

Algorithms for parallel processor scheduling with distinct due windows and unit-time jobs BULLETIN OF THE POLISH ACADEMY OF SCIENCES TECHNICAL SCIENCES Vol. 57, No. 3, 2009 Algoriths for parallel processor scheduling with distinct due windows and unit-tie obs A. JANIAK 1, W.A. JANIAK 2, and

More information

1 Bounding the Margin

1 Bounding the Margin COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #12 Scribe: Jian Min Si March 14, 2013 1 Bounding the Margin We are continuing the proof of a bound on the generalization error of AdaBoost

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

Chapter 6 1-D Continuous Groups

Chapter 6 1-D Continuous Groups Chapter 6 1-D Continuous Groups Continuous groups consist of group eleents labelled by one or ore continuous variables, say a 1, a 2,, a r, where each variable has a well- defined range. This chapter explores:

More information

COS 424: Interacting with Data. Written Exercises

COS 424: Interacting with Data. Written Exercises COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

Polygonal Designs: Existence and Construction

Polygonal Designs: Existence and Construction Polygonal Designs: Existence and Construction John Hegean Departent of Matheatics, Stanford University, Stanford, CA 9405 Jeff Langford Departent of Matheatics, Drake University, Des Moines, IA 5011 G

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

Chaotic Coupled Map Lattices

Chaotic Coupled Map Lattices Chaotic Coupled Map Lattices Author: Dustin Keys Advisors: Dr. Robert Indik, Dr. Kevin Lin 1 Introduction When a syste of chaotic aps is coupled in a way that allows the to share inforation about each

More information

3.8 Three Types of Convergence

3.8 Three Types of Convergence 3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

Kernel Methods and Support Vector Machines

Kernel Methods and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley ENSIAG 2 / osig 1 Second Seester 2012/2013 Lesson 20 2 ay 2013 Kernel ethods and Support Vector achines Contents Kernel Functions...2 Quadratic

More information

Birthday Paradox Calculations and Approximation

Birthday Paradox Calculations and Approximation Birthday Paradox Calculations and Approxiation Joshua E. Hill InfoGard Laboratories -March- v. Birthday Proble In the birthday proble, we have a group of n randoly selected people. If we assue that birthdays

More information

On the Design of MIMO-NOMA Downlink and Uplink Transmission

On the Design of MIMO-NOMA Downlink and Uplink Transmission On the Design of MIMO-NOMA Downlink and Uplink Transission Zhiguo Ding, Meber, IEEE, Robert Schober, Fellow, IEEE, and H. Vincent Poor, Fellow, IEEE Abstract In this paper, a novel MIMO-NOMA fraework for

More information

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES

Proc. of the IEEE/OES Seventh Working Conference on Current Measurement Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Proc. of the IEEE/OES Seventh Working Conference on Current Measureent Technology UNCERTAINTIES IN SEASONDE CURRENT VELOCITIES Belinda Lipa Codar Ocean Sensors 15 La Sandra Way, Portola Valley, CA 98 blipa@pogo.co

More information

arxiv: v1 [cs.ds] 17 Mar 2016

arxiv: v1 [cs.ds] 17 Mar 2016 Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass

More information

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest

More information

Graphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes

Graphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes Graphical Models in Local, Asyetric Multi-Agent Markov Decision Processes Ditri Dolgov and Edund Durfee Departent of Electrical Engineering and Coputer Science University of Michigan Ann Arbor, MI 48109

More information

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies

Approximation in Stochastic Scheduling: The Power of LP-Based Priority Policies Approxiation in Stochastic Scheduling: The Power of -Based Priority Policies Rolf Möhring, Andreas Schulz, Marc Uetz Setting (A P p stoch, r E( w and (B P p stoch E( w We will assue that the processing

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER

ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER IEPC 003-0034 ANALYSIS OF HALL-EFFECT THRUSTERS AND ION ENGINES FOR EARTH-TO-MOON TRANSFER A. Bober, M. Guelan Asher Space Research Institute, Technion-Israel Institute of Technology, 3000 Haifa, Israel

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

CS Lecture 13. More Maximum Likelihood

CS Lecture 13. More Maximum Likelihood CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood

More information

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography Tight Bounds for axial Identifiability of Failure Nodes in Boolean Network Toography Nicola Galesi Sapienza Università di Roa nicola.galesi@uniroa1.it Fariba Ranjbar Sapienza Università di Roa fariba.ranjbar@uniroa1.it

More information

Distributed Subgradient Methods for Multi-agent Optimization

Distributed Subgradient Methods for Multi-agent Optimization 1 Distributed Subgradient Methods for Multi-agent Optiization Angelia Nedić and Asuan Ozdaglar October 29, 2007 Abstract We study a distributed coputation odel for optiizing a su of convex objective functions

More information

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

Lower Bounds for Quantized Matrix Completion

Lower Bounds for Quantized Matrix Completion Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &

More information

Interactive Markov Models of Evolutionary Algorithms

Interactive Markov Models of Evolutionary Algorithms Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary

More information

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials

Fast Montgomery-like Square Root Computation over GF(2 m ) for All Trinomials Fast Montgoery-like Square Root Coputation over GF( ) for All Trinoials Yin Li a, Yu Zhang a, a Departent of Coputer Science and Technology, Xinyang Noral University, Henan, P.R.China Abstract This letter

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors New Slack-Monotonic Schedulability Analysis of Real-Tie Tasks on Multiprocessors Risat Mahud Pathan and Jan Jonsson Chalers University of Technology SE-41 96, Göteborg, Sweden {risat, janjo}@chalers.se

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

Content Caching and Delivery in Wireless Radio Access Networks

Content Caching and Delivery in Wireless Radio Access Networks Content Caching and Delivery in Wireless Radio Access Networks Meixia Tao, Deniz Gündüz, Fan Xu, and Joan S. Pujol Roig Abstract arxiv:904.07599v [cs.it] 6 Apr 209 Today s obile data traffic is doinated

More information

Content-Type Coding. arxiv: v2 [cs.it] 3 Jun Linqi Song UCLA

Content-Type Coding. arxiv: v2 [cs.it] 3 Jun Linqi Song UCLA Content-Type Coding Linqi Song UCLA Eail: songlinqi@ucla.edu Christina Fragouli UCLA and EPFL Eail: christina.fragouli@ucla.edu arxiv:1505.03561v [cs.it] 3 Jun 015 Abstract This paper is otivated by the

More information

Introduction to Discrete Optimization

Introduction to Discrete Optimization Prof. Friedrich Eisenbrand Martin Nieeier Due Date: March 9 9 Discussions: March 9 Introduction to Discrete Optiization Spring 9 s Exercise Consider a school district with I neighborhoods J schools and

More information

Lost-Sales Problems with Stochastic Lead Times: Convexity Results for Base-Stock Policies

Lost-Sales Problems with Stochastic Lead Times: Convexity Results for Base-Stock Policies OPERATIONS RESEARCH Vol. 52, No. 5, Septeber October 2004, pp. 795 803 issn 0030-364X eissn 1526-5463 04 5205 0795 infors doi 10.1287/opre.1040.0130 2004 INFORMS TECHNICAL NOTE Lost-Sales Probles with

More information

Error Exponents in Asynchronous Communication

Error Exponents in Asynchronous Communication IEEE International Syposiu on Inforation Theory Proceedings Error Exponents in Asynchronous Counication Da Wang EECS Dept., MIT Cabridge, MA, USA Eail: dawang@it.edu Venkat Chandar Lincoln Laboratory,

More information

Revealed Preference with Stochastic Demand Correspondence

Revealed Preference with Stochastic Demand Correspondence Revealed Preference with Stochastic Deand Correspondence Indraneel Dasgupta School of Econoics, University of Nottingha, Nottingha NG7 2RD, UK. E-ail: indraneel.dasgupta@nottingha.ac.uk Prasanta K. Pattanaik

More information

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians

Using EM To Estimate A Probablity Density With A Mixture Of Gaussians Using EM To Estiate A Probablity Density With A Mixture Of Gaussians Aaron A. D Souza adsouza@usc.edu Introduction The proble we are trying to address in this note is siple. Given a set of data points

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

MULTIAGENT Resource Allocation (MARA) is the

MULTIAGENT Resource Allocation (MARA) is the EDIC RESEARCH PROPOSAL 1 Designing Negotiation Protocols for Utility Maxiization in Multiagent Resource Allocation Tri Kurniawan Wijaya LSIR, I&C, EPFL Abstract Resource allocation is one of the ain concerns

More information

Estimating Entropy and Entropy Norm on Data Streams

Estimating Entropy and Entropy Norm on Data Streams Estiating Entropy and Entropy Nor on Data Streas Ait Chakrabarti 1, Khanh Do Ba 1, and S. Muthukrishnan 2 1 Departent of Coputer Science, Dartouth College, Hanover, NH 03755, USA 2 Departent of Coputer

More information

Physics 215 Winter The Density Matrix

Physics 215 Winter The Density Matrix Physics 215 Winter 2018 The Density Matrix The quantu space of states is a Hilbert space H. Any state vector ψ H is a pure state. Since any linear cobination of eleents of H are also an eleent of H, it

More information

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings Ipact of Iperfect Channel State Inforation on ARQ

More information

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs

On the Inapproximability of Vertex Cover on k-partite k-uniform Hypergraphs On the Inapproxiability of Vertex Cover on k-partite k-unifor Hypergraphs Venkatesan Guruswai and Rishi Saket Coputer Science Departent Carnegie Mellon University Pittsburgh, PA 1513. Abstract. Coputing

More information

a a a a a a a m a b a b

a a a a a a a m a b a b Algebra / Trig Final Exa Study Guide (Fall Seester) Moncada/Dunphy Inforation About the Final Exa The final exa is cuulative, covering Appendix A (A.1-A.5) and Chapter 1. All probles will be ultiple choice

More information

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines

Intelligent Systems: Reasoning and Recognition. Perceptrons and Support Vector Machines Intelligent Systes: Reasoning and Recognition Jaes L. Crowley osig 1 Winter Seester 2018 Lesson 6 27 February 2018 Outline Perceptrons and Support Vector achines Notation...2 Linear odels...3 Lines, Planes

More information

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October

More information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub

More information

Energy Efficient Predictive Resource Allocation for VoD and Real-time Services

Energy Efficient Predictive Resource Allocation for VoD and Real-time Services Energy Efficient Predictive Resource Allocation for VoD and Real-tie Services Changyang She and Chenyang Yang 1 arxiv:1707.01673v1 [cs.it] 6 Jul 2017 Abstract This paper studies how to exploit the predicted

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

arxiv: v2 [math.co] 3 Dec 2008

arxiv: v2 [math.co] 3 Dec 2008 arxiv:0805.2814v2 [ath.co] 3 Dec 2008 Connectivity of the Unifor Rando Intersection Graph Sion R. Blacburn and Stefanie Gere Departent of Matheatics Royal Holloway, University of London Egha, Surrey TW20

More information

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy Storage Capacity and Dynaics of Nononotonic Networks Bruno Crespi a and Ignazio Lazzizzera b a. IRST, I-38050 Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I-38050 Povo (Trento) Italy INFN Gruppo

More information

Figure 1: Equivalent electric (RC) circuit of a neurons membrane

Figure 1: Equivalent electric (RC) circuit of a neurons membrane Exercise: Leaky integrate and fire odel of neural spike generation This exercise investigates a siplified odel of how neurons spike in response to current inputs, one of the ost fundaental properties of

More information

Lecture 21. Interior Point Methods Setup and Algorithm

Lecture 21. Interior Point Methods Setup and Algorithm Lecture 21 Interior Point Methods In 1984, Kararkar introduced a new weakly polynoial tie algorith for solving LPs [Kar84a], [Kar84b]. His algorith was theoretically faster than the ellipsoid ethod and

More information

Optimal Jamming Over Additive Noise: Vector Source-Channel Case

Optimal Jamming Over Additive Noise: Vector Source-Channel Case Fifty-first Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 2-3, 2013 Optial Jaing Over Additive Noise: Vector Source-Channel Case Erah Akyol and Kenneth Rose Abstract This paper

More information

Generalized Cooperative Multicast in Mobile Ad Hoc Networks

Generalized Cooperative Multicast in Mobile Ad Hoc Networks Generalized Cooperative Multicast in Mobile Ad Hoc Networks Bin Yang Yulong Shen Meber IEEE Xiaohong Jiang Senior Meber IEEE and Tarik Taleb Senior Meber IEEE Abstract Cooperative ulticast serves as an

More information

Controlled Flooding Search with Delay Constraints

Controlled Flooding Search with Delay Constraints Controlled Flooding Search with Delay Constraints Nicholas B. Chang and Mingyan Liu Departent of Electrical Engineering and Coputer Science University of Michigan, Ann Arbor, MI 4809-222 Eail: {changn,ingyan}@eecs.uich.edu

More information

Bipartite subgraphs and the smallest eigenvalue

Bipartite subgraphs and the smallest eigenvalue Bipartite subgraphs and the sallest eigenvalue Noga Alon Benny Sudaov Abstract Two results dealing with the relation between the sallest eigenvalue of a graph and its bipartite subgraphs are obtained.

More information

Data-Driven Imaging in Anisotropic Media

Data-Driven Imaging in Anisotropic Media 18 th World Conference on Non destructive Testing, 16- April 1, Durban, South Africa Data-Driven Iaging in Anisotropic Media Arno VOLKER 1 and Alan HUNTER 1 TNO Stieltjesweg 1, 6 AD, Delft, The Netherlands

More information

Secret-Key Sharing Based on Layered Broadcast Coding over Fading Channels

Secret-Key Sharing Based on Layered Broadcast Coding over Fading Channels Secret-Key Sharing Based on Layered Broadcast Coding over Fading Channels Xiaojun Tang WINLAB, Rutgers University Ruoheng Liu Princeton University Predrag Spasojević WINLAB, Rutgers University H. Vincent

More information

Physically Based Modeling CS Notes Spring 1997 Particle Collision and Contact

Physically Based Modeling CS Notes Spring 1997 Particle Collision and Contact Physically Based Modeling CS 15-863 Notes Spring 1997 Particle Collision and Contact 1 Collisions with Springs Suppose we wanted to ipleent a particle siulator with a floor : a solid horizontal plane which

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

26 Impulse and Momentum

26 Impulse and Momentum 6 Ipulse and Moentu First, a Few More Words on Work and Energy, for Coparison Purposes Iagine a gigantic air hockey table with a whole bunch of pucks of various asses, none of which experiences any friction

More information

1 Identical Parallel Machines

1 Identical Parallel Machines FB3: Matheatik/Inforatik Dr. Syaantak Das Winter 2017/18 Optiizing under Uncertainty Lecture Notes 3: Scheduling to Miniize Makespan In any standard scheduling proble, we are given a set of jobs J = {j

More information

8.1 Force Laws Hooke s Law

8.1 Force Laws Hooke s Law 8.1 Force Laws There are forces that don't change appreciably fro one instant to another, which we refer to as constant in tie, and forces that don't change appreciably fro one point to another, which

More information

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE Proceeding of the ASME 9 International Manufacturing Science and Engineering Conference MSEC9 October 4-7, 9, West Lafayette, Indiana, USA MSEC9-8466 MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL

More information

Asynchronous Gossip Algorithms for Stochastic Optimization

Asynchronous Gossip Algorithms for Stochastic Optimization Asynchronous Gossip Algoriths for Stochastic Optiization S. Sundhar Ra ECE Dept. University of Illinois Urbana, IL 680 ssrini@illinois.edu A. Nedić IESE Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu

More information

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China 6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith

More information

Generalized Alignment Chain: Improved Converse Results for Index Coding

Generalized Alignment Chain: Improved Converse Results for Index Coding Generalized Alignent Chain: Iproved Converse Results for Index Coding Yucheng Liu and Parastoo Sadeghi Research School of Electrical, Energy and Materials Engineering Australian National University, Canberra,

More information

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40

On Poset Merging. 1 Introduction. Peter Chen Guoli Ding Steve Seiden. Keywords: Merging, Partial Order, Lower Bounds. AMS Classification: 68W40 On Poset Merging Peter Chen Guoli Ding Steve Seiden Abstract We consider the follow poset erging proble: Let X and Y be two subsets of a partially ordered set S. Given coplete inforation about the ordering

More information

Randomized Accuracy-Aware Program Transformations For Efficient Approximate Computations

Randomized Accuracy-Aware Program Transformations For Efficient Approximate Computations Randoized Accuracy-Aware Progra Transforations For Efficient Approxiate Coputations Zeyuan Allen Zhu Sasa Misailovic Jonathan A. Kelner Martin Rinard MIT CSAIL zeyuan@csail.it.edu isailo@it.edu kelner@it.edu

More information

Revealed Preference and Stochastic Demand Correspondence: A Unified Theory

Revealed Preference and Stochastic Demand Correspondence: A Unified Theory Revealed Preference and Stochastic Deand Correspondence: A Unified Theory Indraneel Dasgupta School of Econoics, University of Nottingha, Nottingha NG7 2RD, UK. E-ail: indraneel.dasgupta@nottingha.ac.uk

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

ma x = -bv x + F rod.

ma x = -bv x + F rod. Notes on Dynaical Systes Dynaics is the study of change. The priary ingredients of a dynaical syste are its state and its rule of change (also soeties called the dynaic). Dynaical systes can be continuous

More information

Compressive Sensing Over Networks

Compressive Sensing Over Networks Forty-Eighth Annual Allerton Conference Allerton House, UIUC, Illinois, USA Septeber 29 - October, 200 Copressive Sensing Over Networks Soheil Feizi MIT Eail: sfeizi@it.edu Muriel Médard MIT Eail: edard@it.edu

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

Ocean 420 Physical Processes in the Ocean Project 1: Hydrostatic Balance, Advection and Diffusion Answers

Ocean 420 Physical Processes in the Ocean Project 1: Hydrostatic Balance, Advection and Diffusion Answers Ocean 40 Physical Processes in the Ocean Project 1: Hydrostatic Balance, Advection and Diffusion Answers 1. Hydrostatic Balance a) Set all of the levels on one of the coluns to the lowest possible density.

More information

Ph 20.3 Numerical Solution of Ordinary Differential Equations

Ph 20.3 Numerical Solution of Ordinary Differential Equations Ph 20.3 Nuerical Solution of Ordinary Differential Equations Due: Week 5 -v20170314- This Assignent So far, your assignents have tried to failiarize you with the hardware and software in the Physics Coputing

More information

An improved self-adaptive harmony search algorithm for joint replenishment problems

An improved self-adaptive harmony search algorithm for joint replenishment problems An iproved self-adaptive harony search algorith for joint replenishent probles Lin Wang School of Manageent, Huazhong University of Science & Technology zhoulearner@gail.co Xiaojian Zhou School of Manageent,

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

Genetic Quantum Algorithm and its Application to Combinatorial Optimization Problem

Genetic Quantum Algorithm and its Application to Combinatorial Optimization Problem Genetic Quantu Algorith and its Application to Cobinatorial Optiization Proble Kuk-Hyun Han Dept. of Electrical Engineering, KAIST, 373-, Kusong-dong Yusong-gu Taejon, 305-70, Republic of Korea khhan@vivaldi.kaist.ac.kr

More information