In-Order Delivery Delay of Transport Layer Coding

Size: px
Start display at page:

Download "In-Order Delivery Delay of Transport Layer Coding"

Transcription

1 In-Order Delivery Delay of Transort Layer Coding Jason Cloud, Douglas Leith, and Muriel Médard Massachusetts Institute of Technology, Cambridge, MA 039, USA Hamilton Institute, National University of Ireland Maynooth, Ireland arxiv: v cs.it] Aug 04 Abstract A large number of streaming alications use reliable transort rotocols such as TC to deliver content over the Internet. However, head-of-line blocing due to acet loss recovery can often result in unwanted behavior and oor alication layer erformance. Transort layer coding can hel mitigate this issue by heling to recover from lost acets without waiting for retransmissions. We consider the use of an on-line networ code that inserts coded acets at strategic locations within the underlying acet stream. If retransmissions are necessary, additional coding acets are transmitted to ensure the receiver s ability to decode. An analysis of this scheme is rovided that hels determine both the exected in-order acet delivery delay and its variance. Numerical results are then used to determine when and how many coded acets should be inserted into the acet stream, in addition to determining the trade-offs between reducing the in-order delay and the achievable rate. The analytical results are finally comared with exerimental results to rovide insight into how to minimize the delay of existing transort layer rotocols. I. INTRODUCTION Reliable transort rotocols are used in a variety of settings to rovide data transort for time sensitive alications. In fact, video streaming services such as Netflix and YouTube, which both use TC, account for the majority of fixed and mobile traffic in both North America and Euroe ]. In fixed, wireline networs where the acet erasure rate is low, the quality of user exerience QoE for these services is usually satisfactory. However, the growing trend towards wireless networs, esecially at the networ edge, is increasing non-congestion related acet erasures within the networ. This can result in degraded TC erformance and unaccetable QoE for time sensitive alications. While TC congestion control throttling is a major factor in the degraded erformance, head-of-line blocing when recovering from acet losses is another. This aer will focus on the latter by alying coding techniques to overcome lost acets and reduce head-of-line blocing issues so that overall in-order acet delay is minimized. These head-of-line blocing issues result from using techniques lie selective reeat automatic-reeat-request SR- ARQ, which is used in most reliable transort rotocols e.g., TC. While it hels to ensure high efficiency, one roblem with SR-ARQ is that acet recovery due to a loss can tae on the order of a round-tri time RTT or more ]. When the RT T or more recisely the bandwidthdelay roduct BD is very small and feedbac is close to being instantaneous, SR-ARQ rovides near otimal inorder acet delay. Unfortunately, feedbac is often delayed and only contains a artial ma of the receiver s nowledge. This can have major imlications for alications that require reliable delivery with constraints on the time between the transmission and in-order delivery of a acet. As a result, we are forced to loo at alternatives to SR-ARQ. This aer will exlore the use of a systematic random linear networ code RLNC, in conjunction with a coded generalization of SR-ARQ, to hel reduce the time needed to recover from losses. The scheme considered first adds redundancy to the original data stream by injecting coded acets at ey locations to hel overcome otential losses. This has the benefit of reducing the number of retransmissions and, consequently, the delay. However, correlated losses or incorrect information about the networ can result in the receiver s inability to decode. Therefore, feedbac and coded retransmission of data is also considered. The following sections will rovide the answers to two questions about the roosed scheme: when should redundant acets be inserted into the original acet stream to minimize in-order acet delay; and how much redundancy should be added to meet a user s requested QoE. These answers will be rovided through an analysis of the in-order delivery delay as a function of the coding window size and redundancy. We will then use numerical results to hel determine the cost in terms of rate of reducing the delay and as a tool to hel determine the aroriate coding window size for a given networ ath/lin. While an in-deth comarison of our scheme with others is not within the scoe of this aer, we will use SR-ARQ as a baseline to hel show the benefits of coding at the transort layer. The remainder of the aer is organized as follows. Section II rovides an overview of the related wor in the area of transort layer coding and coding for reducing delay. Section III describes the coding algorithm and system model used throughout the aer. Section IV rovides the tools needed to analyze the roosed scheme; and an analysis of the first two moments of the in-order delay are rovided in Sections V and VI. Furthermore, the throughut efficiency is derived in Section VII to hel determine the cost of coding. Numerical results are finally resented in Section VIII and we conclude in Section IX. II. RELATED WORK A resurgence of interest in coding at the transort layer has taen lace to hel overcome TC s oor erformance in wireless networs. Sundararajan et. al. 3] first roosed TC with Networ Coding TC/NC. They insert a coding shim

2 between the TC and I layers that introduces redundancy into the networ in order to soof TC into believing the networ is error-free. Loss-Tolerant TC LT-TC 4], 5], ] is another aroach using Reed-Solomon RS codes and exlicit congestion notification ECN to overcome random acet erasures and imrove erformance. In addition, Coded TC CTC 7] uses RLNC 8] and a modified additive-increase, multilicative decrease AIMD algorithm for maintaining high throughut in high acet erasure networs. While these roosals have shown coding can hel increase throughut, esecially in challenged networs, only anecdotal evidence has been rovided showing the benefits for time sensitive alications. On the other hand, a large body of research investigating the delay of coding in different settings has taen lace. In general, most of these wors can be summarized by Figure. The coding delay of chuned and overlaing chuned codes 9] shown in Figure a, networ coding in timedivision dulexing TDD channels 0], ], ], and networ coding in line networs where coding also occurs at intermediate nodes 3] is well understood. In addition, a non-asymtotic analysis of the delay distributions of random linear networ coding RLNC 4] and various multicast scenarios 5], ], 7] using a variant of the scheme in Figure b have also been investigated. Furthermore, the research that loos at the in-order acet delay is rovided in ] and 8] for uncoded systems, while 9], 0], and ] considers the in-order acet delay for non-systematic coding schemes similar to the one shown in Figure b. However, these non-systematic schemes may not be the otimum strategy in networs or communication channels with a long RT T. ossibly the closest wor to ours is that done by Joshi et. al. ], 3] and Tömösözi et. al. 4]. Bounds on the exected in-order delay and a study of the rate/delay trade-offs using a time-invariant coding scheme is rovided in ] and 3] where they assume feedbac is instantaneous, rovided in a bloc-wise manner, or not available at all. A generalized examle of their coding scheme is shown in Figure c. While their analysis rovides insight into the benefits of coding for streaming alications, their model is similar to a half-dulex communication channel where the sender transmits a finite bloc a information and then waits for the receiver to send feedbac. Unfortunately, it is unclear if their analysis can be extended to full-dulex channels or models where feedbac does not rovide comlete information about the receiver s state-sace. Finally, the wor in 4] considers the in-order delay of online networ coding where feedbac determines the source acets used to generate coded acets. However, they only rovide exerimental results and do not attemt an analysis. III. CODING ALGORITHM AND SYSTEM MODEL We consider a time-slotted model to determine the coding window size and added redundancy R that minimizes the er-acet, or laybac, delay D. The duration of each slot is t s s t/rate where s t is the size of each transmitted Time Time Information acets i a Chun Code acet Delivery c Time-Invariant Streaming Code Information acets i Feedbac Received b Rateless Code Lost acet 3 3 n R b d Systematic Code with Feedbac Our Scheme Figure : Coding matrices for various schemes assuming an identical loss attern and a feedbac delay of 4 time-slots. The columns reresent the original information acet i, and the rows reresent the comosition of the transmitted acet at time t e.g., the transmitted acet in time-slot of a is c j 4 i α i,j i where α i,j is defined in Section III. Lines within a matrix indicate when feedbac about a generation reresented by different colors was received. acet and Rate is the transmission rate of the networ. Also let t be the roagation delay between the sender and the receiver i.e., RTT t s +t assuming that the size of each acnowledgement is sufficiently small. acet erasures are assumed to be indeendently and identically distributed i.i.d. with ǫ being the robability of a acet erasure within the networ. Source acets i, i {,...,N}, are first artitioned } into coding generations G j { j+,..., minj,n, j, N / ]. Each generation G j is transmitted using the systematic networ coding scheme shown in Algorithm where the coding window sans the entire generation. The coded acets c j,m shown in the algorithm are generated by taing random linear combinations of the information acets contained within the generation where the coding coefficients α i,j,m F q are chosen at random and i is treated as a vector in F q. Once every acet in G j has been transmitted both uncoded and coded, the coding window slides to the next generation G j+ and the rocess reeats without waiting for feedbac. We assume that delayed feedbac is rovided about each generation i.e., multile coding generations can be in-flight at

3 Algorithm Code Generation Algorithm : for all j, N / ] do : for all acets i, i j +,minj,n] do 3: Transmit i 4: for all m,n ] do 5: Transmit c j,m minj,n ij+ α i,j,m i Algorithm DOF Retransmission Algorithm : ACK From G j Received : if No acets from G j in-flight and l > 0 then 3: for all m,r l] do 4: Transmit c j,m minj,n ij+ α i,j,m i any time; and this feedbac contains the number of degrees of freedom dof s l still required to decode the generation. If l > 0, an additional n l R l l coded acets or dof s are retransmitted. This rocess is shown in Algorithm and continues until all dofs have been received and the generation can be decoded and delivered. Figure d rovides an examle of the roosed scheme. Here we can see that source acets are artitioned into coding generations of size 3 acets, and one coded acet is also transmitted for each generation i.e., R.33. In this case, the first two acets of the blue generation can be delivered, but the third acet cannot since it is lost and the generation cannot be decoded. Delayed feedbac indicates that additional dof s are needed and two additional transmission attemts are required to successfully transmit the required dof. Once the dof is delivered, the remainder of the blue generation, as well as the entire green generation, can be delivered in-order. Due to the comlexity of the rocess, several assumtions are needed. First, retransmissions occur immediately after feedbac is obtained indicating additional dof s are needed without waiting for the coding window to shift to a new generation. Second, the time to transmit acets after the first round does not increase the delay. For examle, the acet transmission time is t s seconds. Assuming l dof retransmissions are needed, the additionaln l t s seconds needed to transmit these acets are not taen into account. Third, the number of reviously transmitted generations that can cause head-of-line blocing is limited to b where b BD /n. Fourth, all acets within a generation are available to the transort layer without delay i.e., we assume an infinite acet source. Finally, the coding window/generation size with the added redundancy is smaller than thebd i.e.,n < BD. Without this assumtion, feedbac will be received rior to the transmission of the coded acets allowing for the use of SR- ARQ without a large imact to the erformance. It is imortant to note that these assumtions rovide a lower bound. The first two assumtions ensure feedbac is acted uon immediately and does not imact the delay exerienced by other generations. The third assumtion limits the ossibility of a reviously transmitted generation reventing delivery, thereby decreasing the overall delay. IV. RELIMINARIES We first define several robability distributions and random variables that will be used extensively in later sections. Define ] R + + to be the transition matrix of a Marov chain. Each transition within the chain reresents the number of dofs, or acets, successfully received after a round of transmissions, and each state reresents the number of dof s still needed by the client to decode. As a result, the elements of ] can be defined as follows: Bn i,ij,ǫ for i,],0 < j i ij ] ni mi Bn i,m,ǫ for i,],j 0 for i 0,j 0, where Bn,, n n. Let X r be the state of the chain ] at time r. It follows ] that r{x r j X 0 i} r ij for r and 0 ij 0. In our model, X0 with robability equal to and a generation is successfully decoded when state 0 is entered at time r. Furthermore, the robability i0 r ] is the robability that all acets within a single generation have been successfully received in or before r transmission rounds. Using this Marov chain, define Y to be the number of transmission rounds required to transfer a single generation. The distribution on Y is: { ] y Y y ] y for y 0 otherwise. Next, define Z i to be the number of transmission rounds required to transfer i generations. Before defining the distribution on Z i, we first rovide the following Lemma. Lemma. Let N indeendent rocesses defined by the transition matrix ] start at the same time. The robability that all rocesses comlete in less than or equal to z rounds, or transitions, with at least one rocess comleting in round z is r{z z} z ]N z ] N. roof: Let f z z j Y j. The robability of N indeendent rocesses comleting in less than or equal to z rounds with at least one rocess comleting in round z is: r{z z} N i Y z BN,i,f z 3 f z i N N i i z z Y z i z ] Ni 4 ] N+ ] N+ z ]N+ z ] z N+ z ] ] N+ z ] z ] ] z N+ z ] z ]N z 5 ] N.

4 Given Lemma, the distribution on Z i is: { zi Zi z i ]i zi ] i for z i,i b 0 otherwise. Also define S to be the number of uncoded acets that are successfully transferred within a generation rior to the first acet loss. The distribution on S is: ǫǫ s for s 0,],y ǫ s for s,y S Y s y ǫǫ s 8 for s 0,],y, ǫ 0 otherwise, and its first three moments are given by the following lemma. Lemma. Define s i E S i Y ] and s i E S i Y ]. Then given Y y, the first through third moments of S are s ǫ ǫ 7 ǫ, 9 s ǫ ǫ ǫ+ǫ s, 0 s 3 ǫ3 ǫ 3 ǫ+ǫ +3ǫs and 3 ǫ +ǫ+ +43ǫs, for i,,3. s i si i ǫ ǫ, roof: Define the moment generating function of S when Y to be M S Y t Ee ts Y ] 3 ǫ e t ǫ e t +ǫe t +e t ǫ. 4 The first, second, and third moments ofs wheny are then δ/δtm S Y 0, δ /δt M S Y 0, and δ3 /δt 3 M S Y 0 resectively. For Y, we need to scale the above exectations accordingly. This can be done by subtracting the term i ǫ from each of the moments above and dividing by ǫ. Finally, let V i, i b, describe the osition of the last received generation reventing delivery in round z i. The following lemma hels to define the distribution on V i. Lemma 3. Let N indeendent rocesses defined by the transition matrix ] start at the same time, and all rocesses comlete in or before round z N with at least one rocess comleting in round z N. The robability that the jth rocess is the last to comlete is defined by the distribution VN Z N v N z N zn ]NvN zn ZN z N ] vn Y z N 5 for v N 0,...N, j Nv N, Y y defined in, and Zi z i defined in 7. Furthermore, define vn i E VN i Z N]. Then and v N z N] vn z N] Y z N N z N] N ZN z N Y z N + z N] Y z N ] N+, N zn ] N ZN z N N zn Y z N ZN z N. 7 roof: Let β zn Y zn / z N ], be the robability of a generation finishing in roundz N given all of then generations have comleted transmission in or before round z N. The distribution on V N 0,N ] is VN Z N v N z N β zn β zn vn N j0 β z N β zn j 8 β z N β zn vn+ β zn N 9 zn ]NvN zn ] vn Y z N. ZN z N 0 Define the moment generating function of V N given Z N to be M VN Z N t Ee tvn Z N z N ] zn ]N zn ] N e Nt Y z N z N ] zn ]. e t ZN z N The first and second moments of V N given Z N are δ/δtm VN Z N 0 and δ /δt M VN Z N 0 resectively. Now that we have the distributions for the random variables Y, Z i, S, andv i, as well as several relevant moments, we have the tools needed to derive the exected in-order delivery delay. V. EXECTED IN-ORDER DELIVERY DELAY A lower bound on the exected delay, ED], can be derived using the law of total exectation: ED] E Y EZb E D D Y,Z b ]] ]. From, there are four distinct cases that must be evaluated. For each case, define d Yy,Zz ED Y y,z b z]. A. Case : Y,Z b The latest generation in transit comletes within the first round of transmission and no reviously transmitted generations revent delivery. As a result, all acets received rior to the first loss i.e., acets,... s are immediately delivered. Once a acet loss is observed, acets received after the loss i.e., acets s+,..., are buffered until the entire generation is decoded. An examle is given in Figure a where n, 4, the number of acets received rior to the first loss is s, and the number of coded acets needed to recover from the two acet losses is c.

5 Server Client Server Client Server Client Server Client d t s +t s d t s +t G G G G 3 4 s d t s +t 3 c, G 3 G v G 3 G v c, c, c, 3, 4 c c,3 d 3 4t s +t d 4 3t s +t ACKl d 5t s +t d 3 4t s +3t, 3 a Case : Y,Z b b Case : Y >,Z b Figure : Examle of a case and b case. The delay d i of each acet is listed next to the time when it is delivered to the alication layer. Taing the exectation over all S and all acets within the generation, the mean delay is d Y,Z t s +t s + s t + si i0 +EC S] t s S Y s +t s +t S Y t + t s s s + + sec S] S Y s + t + t s s s + + s S Y s t s s +s t, where s and s are given by Lemma ; and EC S] is the exected number of coded acets needed to recover from all acet erasures occurring in the first acets. When s <, the number of coded acets required is at least one i.e., EC S] leading to the bound in 5. B. Case : Y >,Z b All acets {,... s } are delivered immediately until the first acet loss is observed. Since Y >, at least one retransmission event is needed to roerly decode. Once all dofs have been received and the generation can be decoded, the remaining acets { s+,..., } are delivered in-order. An examle is rovided in Figure b. The generation cannot be decoded because there are too many acet losses during the first transmission attemt. As a result, one additional dof is retransmitted allowing the client to decode in round two i.e., Y. Taing the exectation over all S and all acets within the generation, the exected delay for this case is 3 G 3 + +s+ +s+ 3 a Case 3: Z b > Y,Z b > b Case 4: Y Z b,z b > Figure 3: Examle of a case 3 and b case 4 where b 3. d Y>,Z t +t s s+ s i0 t +y t + si+n t s S Y s y 7 s n s +n + t s y s y + t, 8 where s and s are given by Lemma. It is imortant to note that we do not tae into account the time to transmit acets after the first round see the assumtions in Section III. C. Case 3: Z b > Y,Z b > In this case, generation G j comletes rior to a reviously sent generation. } As a result, all acets { j+,..., j G j are buffered until all revious generations have been delivered. Once there are no earlier generations reventing in-order delivery, all acets in G j are immediately delivered. Figure 3a rovides an examle. Consider the delay exerienced by acets in G 3. While G 3 is successfully decoded after the first transmission attemt, generation G cannot be decoded forcing all acets in G 3 to be buffered until G is delivered. Taing the exectation over all acets within the generation and all ossible locations of the last unsuccessfully decoded generation, the exected delay is d Z>Y,Z> n +it s +t +t z i v n b + t s 9 z t vb n + t s, 30 where vb is given by Lemma 3. D. Case 4: Y Z b,z b > Finally, this case is a mixture of the last two. The generation G j comletes after all reviously transmitted generations, but it requires more than one transmission round to decode. acets received before the first acet loss are buffered until

6 all revious generations are delivered, and acets received after the first acet loss are buffered until G j can be decoded. An examle is rovided in Figure 3b. Consider the delay of acets in G 3. Both G and G 3 cannot be decoded after the first transmission attemt. After the second { transmission attemt, } G can be decoded allowing acets +,..., +s+ G3 to be delivered; although acets { } +s+,..., 3 G3 must wait to be delivered until after G 3 is decoded. Taing the exectation over all S, all acets within the generation, and all ossible locations of the last unsuccessfully decoded generation, the exected delay is d Y Z,Z> s n i+t s +t z i v b + n t s + js+ t y +n j +t s S Y s y 3 z y s t +y n v b + s n + t s. 3 The exectations s and v b are given by Lemmas and resectively. Combining the cases above, we obtain the following: Theorem 4. The exected in-order acet delay for the roosed coding scheme is lower bounded by ED] d Y y,zzb Y y Zb z b. 33 z b y where d Yy,Zzb is given in equations, 8, 30, and 3; and the distributions Y y and Zb z b are given in equations and 7 resectively. VI. IN-ORDER DELIVERY DELAY VARIANCE The second moment of the in-order delivery delay can be determined in a similar manner as the first. Again, we can use the law of total exectation to find the moment: ED ] E Y EZb ED D Y,Z b ]]]. 34 As with the first moment, four distinct cases exist that must be dealt with searately. For each case, define d Y y,zz E D Y y,z b z ]. While we omit the initial ste in the derivation of each case, d Y,Z can be determined using the same assumtions as above. A. Case : Y,Z b Using the exectations defined in Lemma, the second moment d Y,Z is shown below. For s <, the number of coded acets needed to decode the generation will always be greater than or equal to one i.e., c. Therefore, the bound in 35 follows from letting c and C S s for all s. d Y,Z t + +3t t s t s t s t + t s s +3 + t s + t t s s 3 t ss B. Case : Y >,Z b This case can be derived in a similar manner as the last. Again, each s i, i {,,3}, are given by Lemma. d Y>,Z n n t s + n y y + + t t s + n +t s +yt t s s 3 t ss 3 n +n + t s +yn +t t s +y t s + y + t. 3 C. Case 3: Z b > Y,Z b > The second moment d Z>Y,Z> can be derived as follows: d Z>Y,Z> n v b + n vb + 3 t s z n v b + t t s +z t. D. Case 4: Y Z b,z b > 37 Using Lemmas and 3, the second moment d Y Z,Z> is: d Y Z,Z> y n +t s t +y t + n n t s + n v t b + s +y zt t s s + n n v v b b t s n v b z +y +y z t t s 4y zy +z t s. 38 Combining the cases above, we obtain:

7 Theorem 5. The second moment of the in-order acet delay for the roosed coding scheme is lower bounded by ED ] d Yy,Zz b Y y Zb z b, 39 z b y where d Yy,Zz b is given in equations 35, 3, 37, and 38; and the distributions Y y and Zb z b are given in and 7 resectively. Furthermore, the in-order delay variance is σd ED ] ED] where ED] is given in. VII. EFFICIENCY The above results show adding redundancy into a acet stream decreases the in-order delivery delay. However, doing so comes with a cost. We characterize this cost in terms of efficiency. Before defining the efficiency, let M i, i 0,], be the number of acets received at the sin as a result of transmitting a generation of sizei. Alternatively,M i is the total number of acets received by the sin for any ath starting in state i and ending in state 0 of the Marov chain defined in Section III. Furthermore, define M ij to be the number of acets received by the sin as a result of a single transition from state i to state j i.e., i j. M ij is deterministic e.g., m ij i j when i,j and i j. For any transition i 0, i, m i0 i,n i ] has robability Bn i,m i0,ǫ Mi0 m i0 ni ji Bn 40 i,j,ǫ /a i0bn i,m i0,ǫ. 4 Therefore, the exected number of acets received by the sin is { ij for i,j,i j EM ij ] ni a i0 xi x Bn i,x,ǫ for i,j 0. 4 Given EM ij ] i,j, the total number of acets received by the sin when transmitting a generation of size i is i EM i ] EM ij ]+EM j ]a ij 43 a ii j0 where EM 0 ] 0. This leads us to the following theorem. Theorem. The efficiencyη, defined as the ratio between the number of information acets or dof s within each generation of size and the exected number of acets received by the sin, is η EM ]. 44 VIII. NUMERICAL RESULTS The analysis resented in the last few sections rovided a method to lower bound the exected in-order delivery delay. Unfortunately, the comlexity of the rocess revents us from determining a closed form exression for this bound. However, this section will rovide numerical results. Before roceeding, several items need to be noted. First, we do not consider the terms where Y y Zb z b < 0 when calculating ED] and E D ] since they have little effect on the overall ED] ED] RTT 500 ms RTT 00 ms Coding Window/Generation Size RTT 500 ms RTT 00 ms a ǫ Coding Window/Generation Size b ǫ 0. R 0.05 R 0. SRARQ R 0.05 R 0. SRARQ Figure 4: The in-order delay for two erasure rates as a function of on a 0 Mbs lin. The error bars show σ D above and below the mean. The analytical and simulated results are reresented using solid and dotted lines resectively. Note the log scale of both the x-axis and y-axis. calculation. Second, the analytical curves are samled at local maxima. As the code generation size increases, the number of in-flight generations, b BD /, incrementally decreases. Uon each decrease in b, a discontinuity occurs that causes an artificial decrease in ED] that becomes less noticeable as increases towards the next decrease in b. This transient behavior in the analysis is more rominent in the cases where R /ǫ and less so when R /ǫ. Regardless, the figures show an aroximation with this transient behavior removed. Third, we note that R may not be an integer. To overcome this issue when generating and transmitting coded acets, R and R coded acets are sent with robability R R and R R resectively Finally, we denote the redundancy used in each of the figures as R x +x /ǫ. A. Coding Window Size and Redundancy Selection Results for four different networs/lins are shown in Figure 4. The simulation was develoed in Matlab utilizing a model similar to that resented in Section III, although several of the assumtions are relaxed. The time it taes to retransmit coded acets after feedbac is received is taen into account. Furthermore, the number of generations reventing delivery is not limited to a single BD of acets, which increases

8 R, ε R 0., ε 0.0 R 0.5, ε 0.0 R 0.05, ε 0. R 0., ε 0. R, ε ED] t ms ε 0.00 ε 0.0 ε 0. ε BD Figure 5: as a function of the BD. the robability of head-of-line blocing. Both of these relaxations effectively increases the delay exerienced by a acet. Finally, the figure shows the delay of an idealized version of SR-ARQ where we assume infinite buffer sizes and the delay is measured from the time a acet is first transmitted until the time it is delivered in-order. Figure 4 illustrates that adding redundancy and/or choosing the correct coding window/generation size can have major imlications on the in-order delay. Not only does choosing correctly reduce the delay, but can also reduce the jitter. However, it is aarent when viewing ED] as a function of that the roer selection of for a given R is critical for minimizing ED] and E D ]. In fact, Figure 4 indicates that adding redundancy and choosing a moderately sized generation is needed in most cases to ensure both are minimized. Before roceeding, it is imortant to note that a certain level of redundancy is needed to see benefits. Each curve shows results for R > /ǫ. For R /ǫ, it is ossible to see inorder delays and jitter worse than the idealized ARQ scheme. Consider an examle where a acet loss is observed near the beginning of a generation that cannot be decoded after the first transmission attemt. Since feedbac is not sent/acted uon until the end of the generation, the extra time waiting for the feedbac can induce larger delays than what would have occurred under a simle ARQ scheme. We can reduce this time by reacting to feedbac before the end of a generation; but it is still extremely imortant to ensure that the choice of and R will decrease the robability of a decoding failure and rovide imroved delay erformance. The shae of the curves in the figure also indicate that there are two major contributors to the in-order delay that need to be balanced. Let be the generation size where ED] is minimized for a given ǫ and R, i.e., argmin ED]. 45 To the left, the delay is dominated by head-of-line blocing and resequencing delay created by revious generations. To the right of, the delay is dominated by the time it taes to receive enough dof s to decode the generation. While there are gains in efficiency for >, the benefits are negligible for most time-sensitive alications. As a result, we show for a given ǫ and R as a function of the BD in Figure Efficiency η Figure : Rate-delay trade-off for a 0 Mbs lin with a RTT of 00 ms. The error bars reresent σ D above and below the mean, and the delay for ARQ is shown for η. Note the log scale of the y-axis. and mae three observations concerning this figure. First, the coding window size increases with ǫ, which is oosite of what we would exect from a tyical erasure code 5]. In the case of small ǫ, it is better to try and quicly correct only some of the acet losses occurring within a generation using the initially transmitted coded acets while relying heavily on feedbac to overcome any decoding errors. In the case of large ǫ, a large generation size is better where the majority of acet losses occurring within a generation are corrected using the initially transmitted coded acets and feedbac is relied uon to hel overcome the rare decoding error. Second, increasingr decreases. This due to the receiver s increased ability to decode a generation without having to wait for retransmissions. Third, is not very sensitive to the BD in most cases enabling increased flexibility during system design and imlementation. B. Rate-Delay Trade-Off While transort layer coding can hel meet strict delay constraints, the decreased delay comes at the cost of throughut, or efficiency. Let ED ], σ D, and η be the exected inorder delay, the standard deviation, and the exected efficiency resectively that corresonds to defined in eq. 45. The rate-delay trade-off is shown by lotting ED ] as a function of η in Figure. The exected SR-ARQ delay i.e., the data oint for η is also lotted for each acet erasure rate as a reference. The figure shows that an initial increase in R or a decrease in η has the biggest effect on ED]. In fact, the majority of the decrease is observed at the cost of just a few ercent - 5% of the available networ caacity when ǫ is small. As R is increased further, the rimary benefit resents itself as a reduction in the jitter or E D ]. Furthermore, the figure shows that even for high acet erasure rates e.g.,0%, strict delay constraints can be met as long as the user is willing to sacrifice throughut. C. Real-World Comarison We finally comare the analysis with exerimentally obtained results in Figure 7 and show that our analysis rovides

9 ED] t ms Redundancy R Figure 7: Exerimental solid lines and analytical dotted lines results for various over a 5 Mbs lin with RTT 0 ms and ǫ 0.. a reasonable aroximation to real-world rotocols. The exeriments were conducted using Coded TC CTC over an emulated networ similar to the one used in 7] with a rate of 5 Mbs and a RTT of 0 ms. The only difference between our setu and theirs was that we fixed CTC s congestion control window size cwnd to be equal to the BD of the networ in order to eliminate the affects of fluctuating cwnd sizes. There are several contributing factors for the differences between the exerimental and analytical results shown in the figure. First, the analytical model aroximates the algorithm used in CTC. Where we assume feedbac is only acted uon at the end of a generation, CTC roactively acts uon feedbac and does not wait until the end of a generation to determine if retransmissions are required. CTC s standard deviation is less than the analytical standard deviation as a result. Second, the exeriments include additional rocessing time needed to accomlish tass such as coding and decoding, while the analysis does not. Finally, the assumtions made in Sections III and V effectively lower boundsed] and E D ]. Regardless, the analysis does rovide a fairly good estimate of the in-order delay and can be used to hel inform decisions regarding the aroriate generation size to use for a given networ/lin. IX. CONCLUSION In this aer, we addressed the use of transort layer coding to imrove alication layer erformance. A coding algorithm and an analysis of the in-order delivery delay s first two moments were resented, in addition to numerical results addressing when and how much redundancy should be added to a acet stream to meet a user s delay constraints. These results showed that the coding window size that minimizes the exected in-order delay is largely insensitive to the BD of the networ for some cases. Finally, we comared our analysis with the measured delay of an imlemented transort rotocol, CTC. While our analysis and the behavior of CTC do not rovide a one-to-one comarison, we illustrated how our wor can be used to hel inform system decisions when attemting to minimize delay. ACKNOWLEDGMENTS We would lie to than the authors of 7] for the use of their CTC code. Without their hel, we would not have been able to collect the exerimental results. REFERENCES ] Sandvine, Global Internet henomena. Online, May 04. ] Y. Xia and D. Tse, Analysis on acet Resequencing for Reliable Networ rotocols, in INFOCOM, vol., , Mar ] J. K. Sundararajan, D. Shah, M. Médard, S. Jaubcza, M. Mitzenmacher, and J. Barros, Networ Coding Meets TC: Theory and Imlementation, roc. of the IEEE, vol. 99, , Mar. 0. 4] V. Subramanian, S. Kalyanaraman, and K. K. Ramarishnan, Hybrid acet FEC and Retransmission-Based Erasure Recovery Mechanisms for Lossy Networs: Analysis and Design, in COMSWARE, ] O. Ticoo, V. Subraman, S. Kalyanaraman, and K. K. Ramarishnan, LT-TC: End-to-End Framewor to Imrove TC erformance Over Networs with Lossy Channels, in IWQoS,. 8 93, 005. ] B. Ganguly, B. Holzbauer, K. Kar, and K. Battle, Loss-Tolerant TC LT-TC: Imlementation and Exerimental Evaluation, in MILCOM, 0. 7] M. Kim, J. Cloud, A. arandehgheibi, L. Urbina, K. Fouli, D. J. Leith, and M. Médard, Congestion Control for Coded Transort Layers, in ICC, June 04. 8] T. Ho, M. Médard, R. Koetter, D. Karger, M. Effros, J. Shi, and B. Leong, A Random Linear Networ Coding Aroach to Multicast, IEEE Trans. on Info. Theory, vol. 5, no. 0, , 00. 9] A. Heidarzadeh, Design and Analysis of Random Linear Networ Coding Schemes: Dense Codes, Chuned Codes and Overlaed Chuned Codes. h.d. Thesis, Carleton University, Ottawa, Canada, Dec. 0. 0] D. Lucani, M. Médard, and M. Stojanovic, Broadcasting in Time- Division Dulexing: A Random Linear Networ Coding Aroach, in NetCod,. 7, June 009. ] D. Lucani, M. Médard, and M. Stojanovic, Online Networ Coding for Time-Division Dulexing, in GLOBECOM, Dec. 00. ] D. Lucani, M. Stojanovic, and M. Médard, Random Linear Networ Coding For Time Division Dulexing: When To Sto Taling And Start Listening, in INFOCOM, , Ar ] T. Dialiotis, A. Dimais, T. Ho, and M. Effros, On the Delay of Networ Coding Over Line Networs, in ISIT, June ] M. Nistor, R. Costa, T. Vinhoza, and J. Barros, Non-Asymtotic Analysis of Networ Coding Delay, in NetCod, June 00. 5] E. Drinea, C. Fragouli, and L. Keller, Delay with Networ Coding and Feedbac, in ISIT, , June 009. ] A. Eryilmaz, A. Ozdaglar, and M. Médard, On Delay erformance Gains From Networ Coding, in CISS, , Mar ] B. Swana, A. Eryilmaz, and N. Shroff, Throughut-Delay Analysis of Random Linear Networ Coding for Wireless Broadcasting, IEEE Trans. on Information Theory, vol. 59, , Oct ] H. Yao, Y. Kochman, and G. W. Wornell, A Multi-Burst Transmission Strategy for Streaming Over Blocage Channels with Long Feedbac Delay, IEEE JSAC, vol. 9, , Dec. 0. 9] M. Nistor, J. Barros, F. Vieira, T. Vinhoza, and J. Widmer, Networ Coding Delay: A Brute-Force Analysis, in ITA, Jan ] J. Sundararajan,. Sadeghi, and M. Médard, A Feedbac-Based Adative Broadcast Coding Scheme for Reducing In-Order Delivery Delay, in NetCod, June 009. ] W. Zeng, C. Ng, and M. Médard, Joint Coding and Scheduling Otimization in Wireless Systems with Varying Delay Sensitivities, in SECON,. 4 44, June 0. ] G. Joshi, Y. Kochman, and G. W. Wornell, On laybac Delay in Streaming Communication, in ISIT, , July 0. 3] G. Joshi, Y. Kochman, and G. Wornell, Effect of Bloc-Wise Feedbac on the Throughut-Delay Trade-Off in Streaming, in INFOCOM Worsho on Contemorary Video, Ar ] M. Tömösözi, F. H. Fitze, F. H. Fitze, D. E. Lucani, M. V. edersen, and. Seeling, On the Delay Characteristics for oint-to- oint Lins using Random Linear Networ Coding with On-the-Fly Coding Caabilities, in Euroean Wireless 04, May 04. 5] R. Koetter and F. Kschischang, Coding for Errors and Erasures in Random Networ Coding, IEEE Trans. on Information Theory, vol. 54, , Aug. 008.

An Analysis of TCP over Random Access Satellite Links

An Analysis of TCP over Random Access Satellite Links An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

A Simple Throughput Model for TCP Veno

A Simple Throughput Model for TCP Veno A Simle Throughut Model for TCP Veno Bin Zhou, Cheng Peng Fu, Dah-Ming Chiu, Chiew Tong Lau, and Lek Heng Ngoh School of Comuter Engineering, Nanyang Technological University, Singaore 639798 Email: {zhou00,

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is

More information

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION O P E R A T I O N S R E S E A R C H A N D D E C I S I O N S No. 27 DOI:.5277/ord73 Nasrullah KHAN Muhammad ASLAM 2 Kyung-Jun KIM 3 Chi-Hyuck JUN 4 A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)

More information

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

SIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING. Ruhul SARKER. Xin YAO

SIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING. Ruhul SARKER. Xin YAO Yugoslav Journal of Oerations Research 13 (003), Number, 45-59 SIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING Ruhul SARKER School of Comuter Science, The University of New South Wales, ADFA,

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging 1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014

More information

Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications

Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Bartłomiej Błaszczyszyn Paul Muhlethaler Nadjib Achir INRIA/ENS INRIA Rocquencourt INRIA Rocquencourt

More information

A Study of Active Queue Management for Congestion Control

A Study of Active Queue Management for Congestion Control A Study of Active Queue Management for Congestion Control Victor Firoiu vfiroiu@nortelnetworks.com Nortel Networks 3 Federal St. illerica, MA 1821 USA Marty orden mborden@tollbridgetech.com Tollridge Technologies

More information

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

On queueing in coded networks queue size follows degrees of freedom

On queueing in coded networks queue size follows degrees of freedom On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,

More information

Algorithms for Air Traffic Flow Management under Stochastic Environments

Algorithms for Air Traffic Flow Management under Stochastic Environments Algorithms for Air Traffic Flow Management under Stochastic Environments Arnab Nilim and Laurent El Ghaoui Abstract A major ortion of the delay in the Air Traffic Management Systems (ATMS) in US arises

More information

arxiv: v1 [physics.data-an] 26 Oct 2012

arxiv: v1 [physics.data-an] 26 Oct 2012 Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu

More information

Signaled Queueing. Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT. Categories and Subject Descriptors. General Terms. Keywords

Signaled Queueing. Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT. Categories and Subject Descriptors. General Terms. Keywords Signaled Queueing Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT Burstiness in queues where customers arrive indeendently leads to rush eriods when wait times are long. We roose a simle signaling scheme

More information

Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process

Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process Using the Divergence Information Criterion for the Determination of the Order of an Autoregressive Process P. Mantalos a1, K. Mattheou b, A. Karagrigoriou b a.deartment of Statistics University of Lund

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting On the Role of Finite Queues in Cooerative Cognitive Radio Networks with Energy Harvesting Mohamed A. Abd-Elmagid, Tamer Elatt, and Karim G. Seddik Wireless Intelligent Networks Center (WINC), Nile University,

More information

Interactive Hypothesis Testing Against Independence

Interactive Hypothesis Testing Against Independence 013 IEEE International Symosium on Information Theory Interactive Hyothesis Testing Against Indeendence Yu Xiang and Young-Han Kim Deartment of Electrical and Comuter Engineering University of California,

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

A SIMPLE PLASTICITY MODEL FOR PREDICTING TRANSVERSE COMPOSITE RESPONSE AND FAILURE

A SIMPLE PLASTICITY MODEL FOR PREDICTING TRANSVERSE COMPOSITE RESPONSE AND FAILURE THE 19 TH INTERNATIONAL CONFERENCE ON COMPOSITE MATERIALS A SIMPLE PLASTICITY MODEL FOR PREDICTING TRANSVERSE COMPOSITE RESPONSE AND FAILURE K.W. Gan*, M.R. Wisnom, S.R. Hallett, G. Allegri Advanced Comosites

More information

A Recursive Block Incomplete Factorization. Preconditioner for Adaptive Filtering Problem

A Recursive Block Incomplete Factorization. Preconditioner for Adaptive Filtering Problem Alied Mathematical Sciences, Vol. 7, 03, no. 63, 3-3 HIKARI Ltd, www.m-hiari.com A Recursive Bloc Incomlete Factorization Preconditioner for Adative Filtering Problem Shazia Javed School of Mathematical

More information

START Selected Topics in Assurance

START Selected Topics in Assurance START Selected Toics in Assurance Related Technologies Table of Contents Introduction Statistical Models for Simle Systems (U/Down) and Interretation Markov Models for Simle Systems (U/Down) and Interretation

More information

Understanding and Using Availability

Understanding and Using Availability Understanding and Using Availability Jorge Luis Romeu, Ph.D. ASQ CQE/CRE, & Senior Member Email: romeu@cortland.edu htt://myrofile.cos.com/romeu ASQ/RD Webinar Series Noviembre 5, J. L. Romeu - Consultant

More information

Vision Graph Construction in Wireless Multimedia Sensor Networks

Vision Graph Construction in Wireless Multimedia Sensor Networks University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Conference and Worksho Paers Comuter Science and Engineering, Deartment of 21 Vision Grah Construction in Wireless Multimedia

More information

Extreme Value FEC for Reliable Broadcasting in Wireless Networks

Extreme Value FEC for Reliable Broadcasting in Wireless Networks Extreme Value FEC for Reliable Broadcasting in Wireless Networks Weiyao Xiao and David Starobinski Deartment of Electrical and Comuter Engineering Boston University, Boston, MA 225 Email:{weiyao, staro}@bu.edu

More information

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210

More information

Age of Information: Whittle Index for Scheduling Stochastic Arrivals

Age of Information: Whittle Index for Scheduling Stochastic Arrivals Age of Information: Whittle Index for Scheduling Stochastic Arrivals Yu-Pin Hsu Deartment of Communication Engineering National Taiei University yuinhsu@mail.ntu.edu.tw arxiv:80.03422v2 [math.oc] 7 Ar

More information

Multicast With Prioritized Delivery: How Fresh is Your Data?

Multicast With Prioritized Delivery: How Fresh is Your Data? Multicast With Prioritized Delivery: How Fresh is Your Data? Jing Zhong, Roy D Yates and Emina Solanin Department of ECE, Rutgers University, {ingzhong, ryates, eminasolanin}@rutgersedu arxiv:885738v [csit

More information

Construction of High-Girth QC-LDPC Codes

Construction of High-Girth QC-LDPC Codes MITSUBISHI ELECTRIC RESEARCH LABORATORIES htt://wwwmerlcom Construction of High-Girth QC-LDPC Codes Yige Wang, Jonathan Yedidia, Stark Draer TR2008-061 Setember 2008 Abstract We describe a hill-climbing

More information

A STUDY ON THE UTILIZATION OF COMPATIBILITY METRIC IN THE AHP: APPLYING TO SOFTWARE PROCESS ASSESSMENTS

A STUDY ON THE UTILIZATION OF COMPATIBILITY METRIC IN THE AHP: APPLYING TO SOFTWARE PROCESS ASSESSMENTS ISAHP 2005, Honolulu, Hawaii, July 8-10, 2003 A SUDY ON HE UILIZAION OF COMPAIBILIY MERIC IN HE AHP: APPLYING O SOFWARE PROCESS ASSESSMENS Min-Suk Yoon Yosu National University San 96-1 Dundeok-dong Yeosu

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage 1 Minimum Repair andwidth for Exact Regeneration in Distributed Storage Vivec R Cadambe, Syed A Jafar, Hamed Malei Electrical Engineering and Computer Science University of California Irvine, Irvine, California,

More information

q-ary Symmetric Channel for Large q

q-ary Symmetric Channel for Large q List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu

More information

Coding Along Hermite Polynomials for Gaussian Noise Channels

Coding Along Hermite Polynomials for Gaussian Noise Channels Coding Along Hermite olynomials for Gaussian Noise Channels Emmanuel A. Abbe IG, EFL Lausanne, 1015 CH Email: emmanuel.abbe@efl.ch Lizhong Zheng LIDS, MIT Cambridge, MA 0139 Email: lizhong@mit.edu Abstract

More information

An Improved Generalized Estimation Procedure of Current Population Mean in Two-Occasion Successive Sampling

An Improved Generalized Estimation Procedure of Current Population Mean in Two-Occasion Successive Sampling Journal of Modern Alied Statistical Methods Volume 15 Issue Article 14 11-1-016 An Imroved Generalized Estimation Procedure of Current Poulation Mean in Two-Occasion Successive Samling G. N. Singh Indian

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

Analysis of M/M/n/K Queue with Multiple Priorities

Analysis of M/M/n/K Queue with Multiple Priorities Analysis of M/M/n/K Queue with Multile Priorities Coyright, Sanjay K. Bose For a P-riority system, class P of highest riority Indeendent, Poisson arrival rocesses for each class with i as average arrival

More information

A Network-Flow Based Cell Sizing Algorithm

A Network-Flow Based Cell Sizing Algorithm A Networ-Flow Based Cell Sizing Algorithm Huan Ren and Shantanu Dutt Det. of ECE, University of Illinois-Chicago Abstract We roose a networ flow based algorithm for the area-constrained timing-driven discrete

More information

RUN-TO-RUN CONTROL AND PERFORMANCE MONITORING OF OVERLAY IN SEMICONDUCTOR MANUFACTURING. 3 Department of Chemical Engineering

RUN-TO-RUN CONTROL AND PERFORMANCE MONITORING OF OVERLAY IN SEMICONDUCTOR MANUFACTURING. 3 Department of Chemical Engineering Coyright 2002 IFAC 15th Triennial World Congress, Barcelona, Sain RUN-TO-RUN CONTROL AND PERFORMANCE MONITORING OF OVERLAY IN SEMICONDUCTOR MANUFACTURING C.A. Bode 1, B.S. Ko 2, and T.F. Edgar 3 1 Advanced

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S.

2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S. -D Analysis for Iterative Learning Controller for Discrete-ime Systems With Variable Initial Conditions Yong FANG, and ommy W. S. Chow Abstract In this aer, an iterative learning controller alying to linear

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

Observer/Kalman Filter Time Varying System Identification

Observer/Kalman Filter Time Varying System Identification Observer/Kalman Filter Time Varying System Identification Manoranjan Majji Texas A&M University, College Station, Texas, USA Jer-Nan Juang 2 National Cheng Kung University, Tainan, Taiwan and John L. Junins

More information

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS #A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS Ramy F. Taki ElDin Physics and Engineering Mathematics Deartment, Faculty of Engineering, Ain Shams University, Cairo, Egyt

More information

FAST AND EFFICIENT SIDE INFORMATION GENERATION IN DISTRIBUTED VIDEO CODING BY USING DENSE MOTION REPRESENTATIONS

FAST AND EFFICIENT SIDE INFORMATION GENERATION IN DISTRIBUTED VIDEO CODING BY USING DENSE MOTION REPRESENTATIONS 18th Euroean Signal Processing Conference (EUSIPCO-2010) Aalborg, Denmark, August 23-27, 2010 FAST AND EFFICIENT SIDE INFORMATION GENERATION IN DISTRIBUTED VIDEO CODING BY USING DENSE MOTION REPRESENTATIONS

More information

An Introduction to Information Theory: Notes

An Introduction to Information Theory: Notes An Introduction to Information Theory: Notes Jon Shlens jonshlens@ucsd.edu 03 February 003 Preliminaries. Goals. Define basic set-u of information theory. Derive why entroy is the measure of information

More information

OPTIMIZATION OF EARTH FLIGHT TEST TRAJECTORIES TO QUALIFY PARACHUTES FOR USE ON MARS

OPTIMIZATION OF EARTH FLIGHT TEST TRAJECTORIES TO QUALIFY PARACHUTES FOR USE ON MARS OPTIMIZATION OF EARTH FLIGHT TEST TRAJECTORIES TO QUALIFY PARACHUTES FOR USE ON MARS Christoher L. Tanner (1) (1) Sace Systems Design Laboratory, Daniel Guggenheim School of Aerosace Engineering Georgia

More information

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi

More information

The decision-feedback equalizer optimization for Gaussian noise

The decision-feedback equalizer optimization for Gaussian noise Journal of Theoretical and Alied Comuter Science Vol. 8 No. 4 4. 5- ISSN 99-634 (rinted 3-5653 (online htt://www.jtacs.org The decision-feedback eualizer otimization for Gaussian noise Arkadiusz Grzbowski

More information

Unit 1 - Computer Arithmetic

Unit 1 - Computer Arithmetic FIXD-POINT (FX) ARITHMTIC Unit 1 - Comuter Arithmetic INTGR NUMBRS n bit number: b n 1 b n 2 b 0 Decimal Value Range of values UNSIGND n 1 SIGND D = b i 2 i D = 2 n 1 b n 1 + b i 2 i n 2 i=0 i=0 [0, 2

More information

Guess & Check Codes for Deletions, Insertions, and Synchronization

Guess & Check Codes for Deletions, Insertions, and Synchronization Guess & Chec Codes for Deletions, Insertions, and Synchronization Serge Kas Hanna, Salim El Rouayheb ECE Department, IIT, Chicago sashann@hawiitedu, salim@iitedu Abstract We consider the problem of constructing

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies Online Aendix to Accomany AComarisonof Traditional and Oen-Access Aointment Scheduling Policies Lawrence W. Robinson Johnson Graduate School of Management Cornell University Ithaca, NY 14853-6201 lwr2@cornell.edu

More information

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System Vol.7, No.7 (4),.37-38 htt://dx.doi.org/.457/ica.4.7.7.3 Robust Predictive Control of Inut Constraints and Interference Suression for Semi-Trailer System Zhao, Yang Electronic and Information Technology

More information

page 1 This question-paper you hand in, together with your solutions. ================================================================

page 1 This question-paper you hand in, together with your solutions. ================================================================ age EXAMINATION Jan 9 Time :5-7:5 QUEUEING THEORY EP9, HF ( 6H78), Lecturer: Armin Halilovic Instructions:. You ARE allowed to use a calculator.. You are NOT allowed to use your own tables of mathematical

More information

A Social Welfare Optimal Sequential Allocation Procedure

A Social Welfare Optimal Sequential Allocation Procedure A Social Welfare Otimal Sequential Allocation Procedure Thomas Kalinowsi Universität Rostoc, Germany Nina Narodytsa and Toby Walsh NICTA and UNSW, Australia May 2, 201 Abstract We consider a simle sequential

More information

Delay characterization of multi-hop transmission in a Poisson field of interference

Delay characterization of multi-hop transmission in a Poisson field of interference 1 Delay characterization of multi-ho transmission in a Poisson field of interference Kostas Stamatiou and Martin Haenggi, Senior Member, IEEE Abstract We evaluate the end-to-end delay of a multi-ho transmission

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

PROCESSING OF LOW-VISCOSITY CBT THERMOPLASTIC COMPOSITES: HEAT TRANSFER ANALYSIS

PROCESSING OF LOW-VISCOSITY CBT THERMOPLASTIC COMPOSITES: HEAT TRANSFER ANALYSIS PROCESSING OF LOW-VISCOSITY CBT THERMOPLASTIC COMPOSITES: HEAT TRANSFER ANALYSIS Dr. Adrian Murtagh, Siora Coll and Dr. Conchúr Ó Brádaigh Comosites Research Unit Det. of Mechanical & Biomedical Engineering,

More information

Hidden Predictors: A Factor Analysis Primer

Hidden Predictors: A Factor Analysis Primer Hidden Predictors: A Factor Analysis Primer Ryan C Sanchez Western Washington University Factor Analysis is a owerful statistical method in the modern research sychologist s toolbag When used roerly, factor

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict

More information

Implementation of a Column Generation Heuristic for Vehicle Scheduling in a Medium-Sized Bus Company

Implementation of a Column Generation Heuristic for Vehicle Scheduling in a Medium-Sized Bus Company 7e Conférence Internationale de MOdélisation et SIMulation - MOSIM 08 - du 31 mars au 2 avril 2008 Paris- France «Modélisation, Otimisation MOSIM 08 et Simulation du 31 mars des Systèmes au 2 avril : 2008

More information

Deformation Effect Simulation and Optimization for Double Front Axle Steering Mechanism

Deformation Effect Simulation and Optimization for Double Front Axle Steering Mechanism 0 4th International Conference on Comuter Modeling and Simulation (ICCMS 0) IPCSIT vol. (0) (0) IACSIT Press, Singaore Deformation Effect Simulation and Otimization for Double Front Axle Steering Mechanism

More information

EE 508 Lecture 13. Statistical Characterization of Filter Characteristics

EE 508 Lecture 13. Statistical Characterization of Filter Characteristics EE 508 Lecture 3 Statistical Characterization of Filter Characteristics Comonents used to build filters are not recisely redictable L C Temerature Variations Manufacturing Variations Aging Model variations

More information

DETC2003/DAC AN EFFICIENT ALGORITHM FOR CONSTRUCTING OPTIMAL DESIGN OF COMPUTER EXPERIMENTS

DETC2003/DAC AN EFFICIENT ALGORITHM FOR CONSTRUCTING OPTIMAL DESIGN OF COMPUTER EXPERIMENTS Proceedings of DETC 03 ASME 003 Design Engineering Technical Conferences and Comuters and Information in Engineering Conference Chicago, Illinois USA, Setember -6, 003 DETC003/DAC-48760 AN EFFICIENT ALGORITHM

More information

Maximum Entropy and the Stress Distribution in Soft Disk Packings Above Jamming

Maximum Entropy and the Stress Distribution in Soft Disk Packings Above Jamming Maximum Entroy and the Stress Distribution in Soft Disk Packings Above Jamming Yegang Wu and S. Teitel Deartment of Physics and Astronomy, University of ochester, ochester, New York 467, USA (Dated: August

More information

VIBRATION ANALYSIS OF BEAMS WITH MULTIPLE CONSTRAINED LAYER DAMPING PATCHES

VIBRATION ANALYSIS OF BEAMS WITH MULTIPLE CONSTRAINED LAYER DAMPING PATCHES Journal of Sound and Vibration (998) 22(5), 78 85 VIBRATION ANALYSIS OF BEAMS WITH MULTIPLE CONSTRAINED LAYER DAMPING PATCHES Acoustics and Dynamics Laboratory, Deartment of Mechanical Engineering, The

More information

Distributed K-means over Compressed Binary Data

Distributed K-means over Compressed Binary Data 1 Distributed K-means over Comressed Binary Data Elsa DUPRAZ Telecom Bretagne; UMR CNRS 6285 Lab-STICC, Brest, France arxiv:1701.03403v1 [cs.it] 12 Jan 2017 Abstract We consider a networ of binary-valued

More information

On ARQ for Packet Erasure Channels with Bernoulli Arrivals

On ARQ for Packet Erasure Channels with Bernoulli Arrivals On ARQ for Packet Erasure Channels with Bernoulli Arrivals Dinkar Vasudevan, Vijay G. Subramanian and Douglas J. Leith Hamilton Institute, National University of Ireland, Maynooth Abstract We study packet

More information

8 STOCHASTIC PROCESSES

8 STOCHASTIC PROCESSES 8 STOCHASTIC PROCESSES The word stochastic is derived from the Greek στoχαστικoς, meaning to aim at a target. Stochastic rocesses involve state which changes in a random way. A Markov rocess is a articular

More information

Calculation of MTTF values with Markov Models for Safety Instrumented Systems

Calculation of MTTF values with Markov Models for Safety Instrumented Systems 7th WEA International Conference on APPLIE COMPUTE CIENCE, Venice, Italy, November -3, 7 3 Calculation of MTTF values with Markov Models for afety Instrumented ystems BÖCÖK J., UGLJEA E., MACHMU. University

More information

Probability Estimates for Multi-class Classification by Pairwise Coupling

Probability Estimates for Multi-class Classification by Pairwise Coupling Probability Estimates for Multi-class Classification by Pairwise Couling Ting-Fan Wu Chih-Jen Lin Deartment of Comuter Science National Taiwan University Taiei 06, Taiwan Ruby C. Weng Deartment of Statistics

More information

ECE 6960: Adv. Random Processes & Applications Lecture Notes, Fall 2010

ECE 6960: Adv. Random Processes & Applications Lecture Notes, Fall 2010 ECE 6960: Adv. Random Processes & Alications Lecture Notes, Fall 2010 Lecture 16 Today: (1) Markov Processes, (2) Markov Chains, (3) State Classification Intro Please turn in H 6 today. Read Chater 11,

More information

Periodic scheduling 05/06/

Periodic scheduling 05/06/ Periodic scheduling T T or eriodic scheduling, the best that we can do is to design an algorithm which will always find a schedule if one exists. A scheduler is defined to be otimal iff it will find a

More information

A Bound on the Error of Cross Validation Using the Approximation and Estimation Rates, with Consequences for the Training-Test Split

A Bound on the Error of Cross Validation Using the Approximation and Estimation Rates, with Consequences for the Training-Test Split A Bound on the Error of Cross Validation Using the Aroximation and Estimation Rates, with Consequences for the Training-Test Slit Michael Kearns AT&T Bell Laboratories Murray Hill, NJ 7974 mkearns@research.att.com

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie Wireless Intelligent Networks Center WINC, Nile University,

More information

COMPARISON OF VARIOUS OPTIMIZATION TECHNIQUES FOR DESIGN FIR DIGITAL FILTERS

COMPARISON OF VARIOUS OPTIMIZATION TECHNIQUES FOR DESIGN FIR DIGITAL FILTERS NCCI 1 -National Conference on Comutational Instrumentation CSIO Chandigarh, INDIA, 19- March 1 COMPARISON OF VARIOUS OPIMIZAION ECHNIQUES FOR DESIGN FIR DIGIAL FILERS Amanjeet Panghal 1, Nitin Mittal,Devender

More information

Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal

Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal Matthew Johnston, Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge,

More information

EXACTLY PERIODIC SUBSPACE DECOMPOSITION BASED APPROACH FOR IDENTIFYING TANDEM REPEATS IN DNA SEQUENCES

EXACTLY PERIODIC SUBSPACE DECOMPOSITION BASED APPROACH FOR IDENTIFYING TANDEM REPEATS IN DNA SEQUENCES EXACTLY ERIODIC SUBSACE DECOMOSITION BASED AROACH FOR IDENTIFYING TANDEM REEATS IN DNA SEUENCES Ravi Guta, Divya Sarthi, Ankush Mittal, and Kuldi Singh Deartment of Electronics & Comuter Engineering, Indian

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

Modeling Residual-Geometric Flow Sampling

Modeling Residual-Geometric Flow Sampling 1 Modeling Residual-Geometric Flow Samling Xiaoming Wang, Xiaoyong Li, and Dmitri Loguinov Abstract Traffic monitoring and estimation of flow arameters in high seed routers have recently become challenging

More information

1-way quantum finite automata: strengths, weaknesses and generalizations

1-way quantum finite automata: strengths, weaknesses and generalizations 1-way quantum finite automata: strengths, weaknesses and generalizations arxiv:quant-h/9802062v3 30 Se 1998 Andris Ambainis UC Berkeley Abstract Rūsiņš Freivalds University of Latvia We study 1-way quantum

More information

Rotations in Curved Trajectories for Unconstrained Minimization

Rotations in Curved Trajectories for Unconstrained Minimization Rotations in Curved rajectories for Unconstrained Minimization Alberto J Jimenez Mathematics Deartment, California Polytechnic University, San Luis Obiso, CA, USA 9407 Abstract Curved rajectories Algorithm

More information

A continuous review inventory model with the controllable production rate of the manufacturer

A continuous review inventory model with the controllable production rate of the manufacturer Intl. Trans. in O. Res. 12 (2005) 247 258 INTERNATIONAL TRANSACTIONS IN OERATIONAL RESEARCH A continuous review inventory model with the controllable roduction rate of the manufacturer I. K. Moon and B.

More information