Network Coding for Multiple Unicasts: An Approach based on Linear Optimization
|
|
- Hector Pitts
- 5 years ago
- Views:
Transcription
1 Network Coding for Mltiple Unicasts: An Approach based on Linear Optimization Danail Traskov, Niranjan Ratnakar, Desmond S. Ln, Ralf Koetter, and Mriel Médard Abstract In this paper we consider the application of network coding to a mltiple nicast setp. We present two sboptimal, yet practical code constrction techniqes. One consists of a linear program and the other of an integer program with fewer variables and constraints. We discss the performance of the proposed techniqes as well as their complexity. I. INTRODUCTION We consider the problem of setting p several simltaneos and independent point-to-point connections that share a common network and refer to this as a mltiple nicast setp. The notion of network coding [1] permits intermediate network nodes to encode observed data as opposed to traditional operation, where the network nodes are restricted to roting and replicating. An example of sch an encoding is illstrated in Fig. 1(a), where observes b 1 and b 2 and transmits b 1 b 2. We are interested in applying network coding to the mltiple nicast setp. Most reslts on network coding so far assme a mlticast setting, i.e. a single sorce transmits the same data simltaneosly to a set of receivers [1, 2]. This scenario is considerably simpler than the mltiple nicast problem. One simplifying aspect is the fact that the problem of finding a minimm-cost mlticast connection decomposes into two independent sbproblems [3]. First, one has to identify a sbgraph whose link capacities can spport the mlticast connection. Second, the code can be constrcted independent of the sbgraph by e.g. a randomized code constrction [2]. On the other hand, in the mltiple nicast scenario, the problems of selecting a sbgraph and the code constrction have to be solved jointly. The selection of a sbgraph is typically modeled as an optimization problem on flows in a network, whereas the code constrction is an algebraic and combinatorial problem. Since we have to solve them jointly, we restrict orselves to simple network codes, whose constrction can be combined with network flow problems of tractable complexity. We assme the nderlying network to be a directed graph G =(V, E), where V and E are the sets of vertices and directed edges respectively. We desire commnication of independent information from nodes s i to d i at a rate R i for i =1,...,n. A connection is defined as a triple (s i,d i,r i ). The n triples (s i,d i,r i ) are feasible with network coding if there exists a network code that allows for simltaneos transmission of information at a rate R i from s i to d i. The triples are said to D. Traskov, N. Ratnakar, and R. Koetter are with the Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, 1308 Main St., Urbana IL ( {traskov2, ratnakar, koetter}@ic.ed). This material is based pon work spported by the NSF nder Award No. NSF CCR D. S. Ln, M. Médard are with the Laboratory for Information and Decision Systems, Massachsetts Institte of Technology, Cambridge, MA ( {dsln, medard}@mit.ed). be feasible with roting if there exists a network code involving only roting and in this case the problem of determining flows that satisfy these connections is referred to as a mlticommodity flow problem [4]. The application of network coding in a mltiple nicast setp is discssed in [5]. In particlar, we know of two approaches for constrcting network codes for the non-mlticast scenario. In [6], the athors present algebraic code constrction techniqes for all connection triples that are feasible with linear network coding. However, the comptational complexity of solving the reslting system of polynomial eqation is exponential in the size of the nderlying network and therefore hardly tractable in practice. On the other hand, the athors in [7] present an opportnistic heristic code constrction for wireless networks. The approach presented in this paper fits in between these two schemes. We present code constrction techniqes for certain connection triples that are feasible with network coding, bt are not necessarily feasible with roting. However, we emphasize that the techniqes described here fail to provide network codes for all connection triples that are feasible with linear network coding. We restrict network coding to operations sing only binary XOR, derive flow formlations of the problem, and state it first as a linear program and then as an integer program. This constittes a sboptimal, yet practical and systematic scheme to constrct network codes. The linear and integer program model the same problem and, althogh not eqivalent, are qite similar. Their main difference lies in comptational isses. The paper is organized as follows: In Section II, we present a code constrction scheme based on a linear program. In Section III we present an alternative formlation with fewer variables and constraints, albeit in the form of an integer program. A comparison of both formlations in terms of their complexity and simlation reslts is given in Section IV. We smmarize or reslts in Section V. II. CODE CONSTRUCTION AS A LINEAR PROGRAM For an edge e =(, v) we define tail(e)=and head(e)=v. We se Γ I (v) to denote the set of edges whose head is v V and Γ O (v) to denote the set of edges with tail v. The n triples (s i,d i,r i ) are feasible with roting if the following conditions are satisfied [4]. For i =1, 2,...,nand e E, v V, n x e (i) z e C e, x e (i) 0 (1) x e (i) R i if v = s i x e (i) = R i if v = d i 0 otherwise (2) /06/$ IEEE 1758
2 s 1 s b 1 b b 1 b 2 b 1 d b 1 b 2 b 1 b 2 (a) d 1 b 2 r(1 2) = 1 s 1 s 2 d 2 q(1 2) = 1 q(2 1) = 1 p(1 2) = 1 p(2 1) = 1 p(1 2) = 1p(2 1) = 1 Fig. 1. (a) shows the btterfly network. The edges 1 throgh 7 are marked and the network coding soltion with the corresponding transmission on each edge is shown. b i represents data for the i-th connection for i =1, 2. In (b), the btterfly network with the poison, antidote reqest, and antidote variables that are non-zero on each edge. All variables correspond to the poison generated at node. In the above eqations, x e (i) is a flow from s i to d i of vale R i and z e is the aggregate load on e. However, when network coding is permitted, the notion of a flow is not clear. For example, consider the so-called btterfly network shown in Fig. 1(a) where all the edges have nit capacity. It can be verified that R 1 = R 2 =1is not feasible with roting, yet feasible with network coding as shown in Fig. 1(a). It is no longer clear how to interpret this code as concrrent flows. Note that the data transmitted on edge 4 is b 1 b 2 and knowledge of b 2 is needed at d 1 in order to recover b 1.We interpret the transmission of b 1 b 2 as a poisoning of the two flows and the transmission of b 2 (b 1 ) on edge 5 (3) as an antidote. We also introdce the notion of an antidote reqest which notifies node s 1 (s 2 ) of the poisoning downstream and reqests an antidote to d 2 (d 1 ). Given an arbitrary network and mltiple nicast connections, we wish to identify network codes sing this poison-antidote approach. In order to do so, we enrich the variable-space by introdcing variables p e (i j, ),q e (i j, ),r e (i j, ) for every vertex. These variables respectively keep track of the poison, antidote reqest, and antidote associated with the poisoning of ser j s data by ser i sdataatvertex. This is done to ensre that the poison originating at a particlar vertex is remedied by the appropriate antidote. In this section, we derive sfficient conditions for the existence of a network coding soltion involving roting, dplicating, and bit-level XOR. Theorem 1: For a network G =(V, E), with the capacity of edge e given by C e and the ranges of the variables given by v, V, e E, 1 i n, 1 j n, and i j, consider the following set of eqations. For all v,, i, and j: p e (i j, )+q e (i j, )+r e (i j, ) = p e (i j, )+q e (i j, )+r e (i j, ) (3) q e (i j, ) (b) r(2 1) = 1 d 1 { 0 if v = q e (i j, ) 0 otherwise (4) p e (i j, ) For all, i, and j: { 0 if v = p e (i j, ) 0 otherwise (5) p e (j i, ) =p e (i j, ) if e Γ O () (6) At every edge e: n max(p e (i j, ),p e (j i, )) + x e (i) i<j + r e (i j, ) z e C e (7) At every edge e and j: x e (j)+ (p e (i j, )+q e (j i, )) 0 (8) i x e ( ) 0, r e ( ) 0, p e ( ) 0, q e ( ) 0 If the conditions specified in (2) - (8) are satisfied, then the rate triples (s i,d i,r i ) for i =1, 2,...,nare feasible with network coding. Frther, the only operations involved are dplication, roting, and bit-level XOR. Proof: We assme that the variables satisfying (2) - (8) are integers, which is jstified by scaling the network over time [6]. We begin by making the following observations. Observation 1: From (4) we see that antidote reqest q e (i j, ) (a negative qantity) can terminate only at node. Observation 2: From (5) we see that poison p e (i j, ) (a negative qantity) can originate only at node. Observation 3: For edge e, let f e (i j, ) = p e (i j, ) +q e (i j, ) +r e (i j, ). Fix i, j, and. From (3) we see that f e (i j, ) is conserved at each node. In the example shown in Fig. 1(b), f e (1 2,) = 1 for e = 3 and f e (1 2,)= 1 for e =1, 4, 6. Notice that the edges 1,3,4, and 6 form a cycle if we reverse the direction of edges with f e (1 2,)= 1, i.e., 1,4, and 6. In general, for any network, f e (i j, ) can be decomposed as a sperposition of cycles where f e(i j, ) =±1 for all edges e with the nderstanding that if f e(i j, ) = 1, then the direction of e is reversed. De to pacity of space, we skip the proof here. We refer to each of these cycles as an f (i j, ) cycle for i, j, and. Frther, since the qantities p( ), q( ), and r( ) are integers, it follows that along any edge of an f (i j, ) cycle, only one of these qantities is nonzero. From Observations 1 and 2 we see that q e (i j, ) terminates only at and that p e (i j, ) originates only at. (To simplify notation we represent a path from 1 to v m as ( 1,v m ). The distinction between an edge (, v) and a path ( 1,v m ) is clear from the context.) Ths, any f (i j, ) cycle comprises three paths (v, ), (, w) and (v, w) sch that (v, ) satisfies q e (i j, ) = 1, (, w) satisfies p e (i j, ) = 1, and (v, w) satisfies r e (i j, ) = 1. Some f (i j, ) cycles might have v =, which wold mean that it comprises of only the poison and antidote paths. 1759
3 From (6), we see that if tail(e) = then we can associate p e (j i, ) with p e (i j, ). This can be extended and we can associate an f (j i, ) cycle with an f (i j, ) cycle. Ths, all the poison, antidote, and antidote-reqest variables can be written as a sperposition of pairs of f (i j, ) and f (j i, ) cycles. We show that we can perform network coding on each of these pairs of cycles. Consider one sch pair of cycles. Let the cycles be f (i j, 3 ) and f (j i, 3 ). From the discssion above, the f (i j, 3 ) cycle is composed of paths ( 1, 3 ) with q e (i j, 3 ) = 1, ( 3, 4 ) with p e (i j, 3 ) = 1, and ( 1, 4 ) with r e (i j, 3 ) = 1. Similarly, the f (j i, 3 ) cycle is composed of paths ( 2, 3 ) with q e (j i, 3 )= 1, ( 3, 5 ) with p e (j i, 3 )= 1, and ( 2, 5 ) with r e (j i, 3 )=1. Using (8), we note that we can associate a niqe nit-rate path, say, x e(i) =1to the paths ( 1, 3 ) and ( 3, 5 ). Similarly we can associate a niqe nit-rate path say x e(j) =1to the paths ( 2, 3 ) and ( 3, 4 ). In the example shown in Fig. 1(b), we have 1 = s 1, 2 = s 2, 3 =, 4 = d 1, and 5 = d 2. Note that x e (1) = 1 (x e (2) = 1)) fore =1, 4, 7. (e =2, 4, 6.) Let b 1 represent a nit rate bit stream corresponding to x(i) available at 1 and b 2 represent a nit rate bit stream corresponding to x(j) available at 2. We perform the following network coding in order to reliably transmit one nit data from 1 to 5 and one nit of data from 2 to 4. b 1 is transmitted along the paths ( 1, 3 ) and ( 1, 4 ). b 2 is transmitted along the paths ( 2, 3 ) and ( 2, 5 ). b 1 b 2 is transmitted along the paths ( 3, 4 ) and ( 3, 5 ). This encoding, in effect, is eqivalent to replacing x e(i),x e(j) and the f (i j, 3 ),f (j i, 3 ) cycles by two nit-capacity virtal edges e 1 =( 1, 5 ) and e 2 =( 2, 4 ) sch that x e1 (i) =1and x e2 (j) =1. This replacement ensres that the nmber of f (i j, )and f (j i, ) cycles is redced while still ensring that x e (i) and x e (j) (the affected flows) satisfy the flow-conservation eqations. For this encoding, it can be verified that the sage of all edges along the paths ( 1, 3 ), ( 2, 3 ), ( 3, 4 ), ( 3, 5 ), ( 1, 4 ), and ( 2, 5 ) is given by the expression max(p e (i j, 3 ),p e (j i, 3 )) + x e (i)+x e (j) +r e (i j, 3 )+r e (j i, 3 ) (9) which evalates to one along all the edges. Ths, the sage of the edges in this pair of f (i j, 3 ) and f (j i, 3 ) cycles is given by (9). Note that the terms r e (i j, 3 )+r e (j i, 3 ) correspond to physical transmissions of bits. The term x e (i)+x e (j) can be thoght of as the data that wold be transmitted if data is sent by roting. However, by sending b 1 b 2, we transmit at a lower rate, lower by max(p e (i j, 3 ),p e (j i, 3 )). These can be thoght of as savings obtained de to network coding. Using Observation 3, we see that f e (i j, ) is a sperposition of pairs of cycles, each of which can be replaced by a pair of virtal edges over which roting sffices. By performing this operation till there are no more sch cycles left, we end p with an eqivalent network over which the connection triples (s i,d i,r i ) for i =1, 2,...,nare feasible with roting. If all the data is transmitted by roting, then the load on any edge is n x e(i). However, recall that de to an f (i j, ) cycle, the load on the edges in the cycle is adjsted by the qantity in (9). Since f e (i j, ) is a sperposition of many f (i j, ) cycles, the net adjstment of the load on the edges is obtained by smming (9) over all the f (i j, ) cycles. This expression is given by the left hand side of (7). The interpretation of the varios terms appearing in the smmation is as follows: By network coding, we obtain a savings of max(p e (i j, ),p e (j i, )) (which is negative) which is offset by excess load of r e (i j, ) (which is positive) de to the remedies. Usally, the savings are non-zero on congested edges and the remedies are non-zero on edges with spare capacity, ths allowing s to trade off bottleneck links with excess capacities. Every soltion that satisfies the constraints (2) - (8) corresponds to a network code that transmits data at a rate z e (see (7)) on edge e. These constraints can be combined with several possible objective fnctions, e.g., one can maximize the total throghpt (the sm of rates i R i) or minimize the cost of commnicating certain fixed rates sbject to the capacity constraints of the graph. III. INTEGER PROGRAMMING FORMULATION The previos linear program offers some flexibility in the choice of objective fnctions, permits roting (and network coding) along several paths from sorce to destination and makes little assmption abot the nderlying network topology. However, it reslts in large optimization problems, both in terms of the nmber of constraints and the nmber of variables. We will discss the complexity in Section IV. In particlar, keeping track of the origin of the poison increases the complexity drastically. (The term in p e (i j, ) can be thoght of as the variable keeping track of the origin of the poison.) This motivates s to consider a simpler optimization problem, where we restrict the connections to be of nit rate. 1 This makes the reslting optimization problem an integer program, bt with fewer constraints and variables than the original formlation. Consider the following linear program, where throghot 1 i, j n, and i j: at every node v V: x e (i) r e (i) p e (i, j) min e E a e z e +1 if v = s i x e (i) = 1 if v = d i 0 otherwise r e (i) p e (i, j) (x e (i)+ (10) n p e (i, j)) j=1 (11) r e (j) (12) 1 Higher rates can be modeled by placing several connections between the same sorce-destination pair. 1760
4 i<j at every destination node d i : at every edge e E: e Γ O(d i) j=1 n p e (i, j) =0 (13) n n max(p e (i, j),p e (j, i)) + x e (i)+ r e (i) z e C e x e (i)+ (14) n p e (i, j) 0 (15) j=1 x e ( ) 0, r e ( ) 0, p e ( ) 0 Note that we reqire flows of nit rate (10), ths losing some flexibility in the problems that can be modeled. The cost fnction takes the form of a minimm cost flow problem, with cost coefficients a e mltiplying the sage z e of every edge. Frthermore, we reqire the nderlying graph to be acyclic, which becomes necessary to exclde invalid network coding soltions. In the following we prove that soltions of this integer program are in fact valid network codes, which can be constrcted by sing roting and the binary XOR operation. Lemma 1: The cost of the optimal soltion of the linear program (10)-(15) is smaller or eqal to the optimal cost of the associated mlti-commodity flow problem (10), (16), and (17). Proof: Set all variables r e ( ) and p e ( ) to zero. Then, the linear program redces to the following form: min e E a e z e sbject to (10) at every node v Vand n x e (i) z e C e (16) x e (i) 0 (17) at every edge e E. This is identified to be the associated mlti-commodity flow problem consisting of the flow conservation constraints at the nodes, the constraint that the edge sages z e do not exceed the edge capacities C e and the nonnegativity constraints on the flows. The optimal soltion to this mlticommodity flow problem is a basic feasible soltion to the linear program (10)-(15) and therefore is also an pper bond on its optimal soltion. Contining along similar lines, it is possible to prove that the optimal cost of the linear program (2)-(8) is also lower than the cost of the optimal soltion of the associated mlti-commodity flow problem Theorem 2: If a soltion to the linear program (10)-(15) is integer, then it corresponds to a feasible network coding soltion involving only the binary XOR as a coding operation. Proof: Assme, we have an integer soltion. Since the flows are of nit rate we have x e (i) {0, +1}. Frthermore, from (15) we conclde that p e (i, j) {0, 1}. If all p e (, ) variables are zero, then according to the previos lemma the Variables Constraints Linear Program 3 E V n(n 1) V (n 2 n)(3 V + E ) Integer Program E n(n 1) (n 2 + n) V +(n +1) E TABLE I THE COMPLEXITY OF BOTH OPTIMIZATION PROBLEMS. WE APPROXIMATE THE NUMBERS UP TO LEADING TERMS. soltion corresponds to a mlti-commodity flow problem and therefore the connections can be established by roting only. Assme now some p(, ) variables eqal to 1 and pick an edge e (with tail(e) = and head(e) =v), where p e (i, j) = 1. (15) implies that x e (i) =1on this edge also. Since the flows are of rate one and we insist on integer soltions, flow i takes precisely one path from its sorce s i to its destination d i and clearly edge e lies on this path. The poison p e (i, j) satisfies a conservation law of the form (12), and therefore forms a path which can se only edges on the path of flow i (15). From (13) the p e (i, j)-path has to terminate at a node w d i 2. At the termination point w of the p e (i, j)-path an antidote r(j) has to enter the node (12). This antidote also forms a path (11) and let its sorce be node t. The RHS of (11) has to be strictly positive at node t, which implies that the flow x(j) entering node t mst be one, and the poison p(j, ) entering t mst be zero. Given a soltion to the proposed integer linear program, we constrct the network code by transmitting the following bit streams on edge e: x(i) if x e (i) =1and p e (i, ) =0, x(i) x(j) if x e (i) =1and p e (i, j) = 1 for some j, x(i) if r e (i) =1. We have proved, that every poison is canceled by the appropriate antidote, and that every antidote has its origin at a node, where npoisoned flow of the proper type enters. The assmption that the graph is acyclic is needed to ensre that the antidote comes from a node pstream of the poisoning node. This shows the validity of the proposed code constrction scheme and completes the proof. IV. PERFORMANCE EVALUATION Conting the nmber of variables and constraints (see Table I) of both formlations, we see that the integer program is of considerably smaller size than the linear program. On the other hand, solving an integer program is in general more complex than solving a linear program withot integer constraints. Integer programming is NP-complete [8] and networks exist where the integer program is very difficlt to solve. To find integer soltions we have sed a linear programming-based branch-andbond algorithm. In general one has to consider the trade-off between the redced size of the optimization problem (10)-(15) and the increase in complexity de to branch-and-bond. The first setp that we considered for performance evalation of or network coding scheme is the freqently sed geometric random graph model. Here, a nmber of nodes are scattered niformly over a nit sqare and nodes whose distance is below a certain threshold are considered connected with a point-to-point link. We have condcted extensive simlations 2 Since we reqire a directed acyclic graph, the vertices can be topologically sorted, thereby defining an order on the vertex set V. 1761
5 on random geometric networks, sing different objective fnctions sch as total throghpt or minimm cost, bt cold not observe gains. This observation motivates s to consider more reglar grid networks, sch as the one depicted in Fig. 2. We illstrate the performance of the integer program 3 on the grid network as docmented in Table II. We consider no capacity constraints and a minimm-cost objective fnction. The random parameters in the simlations are the cost coefficients of the links. We consider two different distribtions according to which they are drawn. The first distribtion models a scenario where most links have low cost, and a few links have large cost, ths representing bottlenecks. In this setp we observe gains de to network coding. When the link costs are niformly distribted, however, the gains disappear. A comparison with the simlation reslts given by the athors in [9] and more recently [7] is in order. In particlar, in [7] the athors consider a wireless network, which ses geographic (min-hop) roting. They report large gains in the total throghpt, when implementing an opportnistic heristic code constrction techniqe. These gains can be explained with several factors, the most important being the lack of congestion control when sing solely geographic roting. If the rotes are chosen based on geography, withot taking congestion into accont, a drastic breakdown of the total throghpt is experienced as the nmber of flows is increased. Network coding acts here as a congestion resoltion techniqe and gives large gains. Another fndamental difference between the setp in [7] and or model is that the former works on a wireless network, where nodes broadcast their messages to a set of neighbors, a phenomenon referred to as the wireless mlticast advantage [10]; we on the other hand consider a wired network with point-to-point links. The gains that we report are fairly modest, compared to [7,9]. However, these reslts hold only for the narrow setp that we consider, namely wireline networks, optimal roting 4 as the benchmark and no consideration of practical implementation isses sch as protocol design. Frthermore, we assme the flows in the network static and do not consider the dynamic behavior of the network. It is worthwhile to investigate the tility of network coding, when any of these restrictions is relaxed. Based on the previos discssion, larger gains might be observed in wireless networks (de to the wireless mlticast advantage), when the cost coefficients or capacities of the links are distribted highly non-niform, or when considering network coding as a tool to enhance roting, e.g. as a congestion resoltion techniqe. Also, frther research is indicated on the dynamic aspects of networks sing network coding and the interplay between practical network design and network coding. V. CONCLUSIONS Few explicit code constrction techniqes are known for the mltiple nicast setp. In this paper we proposed a systematic approach to introdce sboptimal, yet practical network coding for mltiple nicasts. Or scheme comes in two variations, a linear program and an integer program of smaller size. We discssed the comptational complexity and based on simlations a b c d e f Fig. 2. The grid network sed for simlations. Note, that all edges are directed from the sorces a, b, c down to the sinks d, e, f. Approach Connections Networks Average with gains gain a i 1 wp % 28.0% 100 wp % 24.9% a i nif(1, 100) TABLE II SIMULATION RESULTS ON THE GRID NETWORK IN FIG. 2:ANUMBER OF CONNECTIONS IS RANDOMLY SELECTED FROM THE DESIGNATED SOURCE AND DESTINATION PAIRS. THE LINK COSTS ARE RANDOMLY FIXED ACCORDING TO THE SPECIFIED DISTRIBUTION. WE REPORT THE FRACTION OF NETWORKS, WHERE NETWORK CODING RESULTED IN A LOWER TRANSMISSION COST THAN ROUTING. THE COST GAIN IS DEFINED AS cost roting cost coding AND IS CALCULATED OVER THE NETWORKS, cost roting WHERE A GAIN WAS OBSERVED. evalated the network coding gains. We also compared them with recently pblished reslts by other athors. REFERENCES [1] R. Ahlswede, N. Cai, S.-Y. R. Li, and R. W. Yeng, Network information flow, IEEE Trans. on Inf. Theory, vol. IT-46, pp , [2] T. Ho, M. Médard, R. Koetter, D.R. Karger, M. Effros, J. Shi, and B. Leong, A random linear network coding approach to mlticast, sbmitted to IEEE Trans. on Inf. Theory. [3] D. S. Ln, M. Medard, T. Ho, and R. Koetter, Network coding with a cost criterion, in Proc. Intl. Symp. on Inf. Theory and its Appl., [4] D. P. Berstekas, Network optimization: Continos and discrete models, Belmont, MA: Athena Scientific, [5] N. Ratnakar, D. Traskov, and R. Koetter, Approaches to network coding for mltiple nicast, in Intern. Zrich Seminar on Comm., Febr [6] R. Koetter and M. Médard, An algebraic approach to network coding, IEEE/ACM Trans. on Networking, vol. 11, no. 5, pp , Oct [7] S. Katti, D. Katabi, Wenjn H, and Rahl Hariharan, The importance of being opportnistic: Practical network coding for wireless environments, in Allerton Conference, [8] I. Barland, P.G. Kolaitis, and M.N. Thakr, Integer programming as a framework for optimization and approximability, In Proc. IEEE Conference on Comptational Complexity, pages , [9] R. Khalili and K. Salamatian, A new relaying scheme for cheap wireless relay nodes in Wiopt 2005, Trentino, Italy. [10] D.S. Ln, N. Ratnakar, M. Medard, R. Koetter, D.R. Karger, T. Ho, E. Ahmed, Minimm-cost mlticast over coded packet networks, sbmitted to IEEE Trans. on Inf. Theory. 3 Since both the linear and the integer program model the same problem, the linear program in this case wold have given eqivalent reslts. 4 By optimal roting we mean the optimal soltion of the associated mlticommodity flow problem. 1762
Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled.
Jnction elements in network models. Classify by nmber of ports and examine the possible strctres that reslt. Using only one-port elements, no more than two elements can be assembled. Combining two two-ports
More informationJoint Transfer of Energy and Information in a Two-hop Relay Channel
Joint Transfer of Energy and Information in a Two-hop Relay Channel Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, and Mohammad Reza Aref Information Systems and Secrity Lab (ISSL Department of Electrical
More informationOptimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance
Optimal Control of a Heterogeneos Two Server System with Consideration for Power and Performance by Jiazheng Li A thesis presented to the University of Waterloo in flfilment of the thesis reqirement for
More informationSection 7.4: Integration of Rational Functions by Partial Fractions
Section 7.4: Integration of Rational Fnctions by Partial Fractions This is abot as complicated as it gets. The Method of Partial Fractions Ecept for a few very special cases, crrently we have no way to
More informationMulti-Voltage Floorplan Design with Optimal Voltage Assignment
Mlti-Voltage Floorplan Design with Optimal Voltage Assignment ABSTRACT Qian Zaichen Department of CSE The Chinese University of Hong Kong Shatin,N.T., Hong Kong zcqian@cse.chk.ed.hk In this paper, we stdy
More informationModelling by Differential Equations from Properties of Phenomenon to its Investigation
Modelling by Differential Eqations from Properties of Phenomenon to its Investigation V. Kleiza and O. Prvinis Kanas University of Technology, Lithania Abstract The Panevezys camps of Kanas University
More informationPulses on a Struck String
8.03 at ESG Spplemental Notes Plses on a Strck String These notes investigate specific eamples of transverse motion on a stretched string in cases where the string is at some time ndisplaced, bt with a
More informationDiscontinuous Fluctuation Distribution for Time-Dependent Problems
Discontinos Flctation Distribtion for Time-Dependent Problems Matthew Hbbard School of Compting, University of Leeds, Leeds, LS2 9JT, UK meh@comp.leeds.ac.k Introdction For some years now, the flctation
More informationDecision Oriented Bayesian Design of Experiments
Decision Oriented Bayesian Design of Experiments Farminder S. Anand*, Jay H. Lee**, Matthew J. Realff*** *School of Chemical & Biomoleclar Engineering Georgia Institte of echnology, Atlanta, GA 3332 USA
More informationNonlinear parametric optimization using cylindrical algebraic decomposition
Proceedings of the 44th IEEE Conference on Decision and Control, and the Eropean Control Conference 2005 Seville, Spain, December 12-15, 2005 TC08.5 Nonlinear parametric optimization sing cylindrical algebraic
More information1. Tractable and Intractable Computational Problems So far in the course we have seen many problems that have polynomial-time solutions; that is, on
. Tractable and Intractable Comptational Problems So far in the corse we have seen many problems that have polynomial-time soltions; that is, on a problem instance of size n, the rnning time T (n) = O(n
More informationInformation Source Detection in the SIR Model: A Sample Path Based Approach
Information Sorce Detection in the SIR Model: A Sample Path Based Approach Kai Zh and Lei Ying School of Electrical, Compter and Energy Engineering Arizona State University Tempe, AZ, United States, 85287
More informationDecoder Error Probability of MRD Codes
Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehighed Zhiyan Yan Department of Electrical
More informationOn relative errors of floating-point operations: optimal bounds and applications
On relative errors of floating-point operations: optimal bonds and applications Clade-Pierre Jeannerod, Siegfried M. Rmp To cite this version: Clade-Pierre Jeannerod, Siegfried M. Rmp. On relative errors
More informationLecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2
BIJU PATNAIK UNIVERSITY OF TECHNOLOGY, ODISHA Lectre Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 Prepared by, Dr. Sbhend Kmar Rath, BPUT, Odisha. Tring Machine- Miscellany UNIT 2 TURING MACHINE
More informationChapter 2 Difficulties associated with corners
Chapter Difficlties associated with corners This chapter is aimed at resolving the problems revealed in Chapter, which are cased b corners and/or discontinos bondar conditions. The first section introdces
More informationCHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES. George P. Yanev
Pliska Std. Math. Blgar. 2 (211), 233 242 STUDIA MATHEMATICA BULGARICA CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES George P. Yanev We prove that the exponential
More informationFEA Solution Procedure
EA Soltion Procedre (demonstrated with a -D bar element problem) EA Procedre for Static Analysis. Prepare the E model a. discretize (mesh) the strctre b. prescribe loads c. prescribe spports. Perform calclations
More informationFormal Methods for Deriving Element Equations
Formal Methods for Deriving Element Eqations And the importance of Shape Fnctions Formal Methods In previos lectres we obtained a bar element s stiffness eqations sing the Direct Method to obtain eact
More informationB-469 Simplified Copositive and Lagrangian Relaxations for Linearly Constrained Quadratic Optimization Problems in Continuous and Binary Variables
B-469 Simplified Copositive and Lagrangian Relaxations for Linearly Constrained Qadratic Optimization Problems in Continos and Binary Variables Naohiko Arima, Snyong Kim and Masakaz Kojima October 2012,
More informationPerformance analysis of GTS allocation in Beacon Enabled IEEE
1 Performance analysis of GTS allocation in Beacon Enabled IEEE 8.15.4 Pangn Park, Carlo Fischione, Karl Henrik Johansson Abstract Time-critical applications for wireless sensor networks (WSNs) are an
More informationOn the tree cover number of a graph
On the tree cover nmber of a graph Chassidy Bozeman Minerva Catral Brendan Cook Oscar E. González Carolyn Reinhart Abstract Given a graph G, the tree cover nmber of the graph, denoted T (G), is the minimm
More informationStability of Model Predictive Control using Markov Chain Monte Carlo Optimisation
Stability of Model Predictive Control sing Markov Chain Monte Carlo Optimisation Elilini Siva, Pal Golart, Jan Maciejowski and Nikolas Kantas Abstract We apply stochastic Lyapnov theory to perform stability
More informationA Regulator for Continuous Sedimentation in Ideal Clarifier-Thickener Units
A Reglator for Continos Sedimentation in Ideal Clarifier-Thickener Units STEFAN DIEHL Centre for Mathematical Sciences, Lnd University, P.O. Box, SE- Lnd, Sweden e-mail: diehl@maths.lth.se) Abstract. The
More informationCollective Inference on Markov Models for Modeling Bird Migration
Collective Inference on Markov Models for Modeling Bird Migration Daniel Sheldon Cornell University dsheldon@cs.cornell.ed M. A. Saleh Elmohamed Cornell University saleh@cam.cornell.ed Dexter Kozen Cornell
More informationDecoder Error Probability of MRD Codes
Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehigh.ed Zhiyan Yan Department of Electrical
More information1 Differential Equations for Solid Mechanics
1 Differential Eqations for Solid Mechanics Simple problems involving homogeneos stress states have been considered so far, wherein the stress is the same throghot the component nder std. An eception to
More informationAssignment Fall 2014
Assignment 5.086 Fall 04 De: Wednesday, 0 December at 5 PM. Upload yor soltion to corse website as a zip file YOURNAME_ASSIGNMENT_5 which incldes the script for each qestion as well as all Matlab fnctions
More informationCode Construction for Two-Source Interference Networks
Code Construction for Two-Source Interference Networks Elona Erez and Meir Feder Dept. of Electrical Engineering-Systems, Tel Aviv University, Tel Aviv, 69978, Israel, E-mail:{elona, meir}@eng.tau.ac.il
More informationSources of Non Stationarity in the Semivariogram
Sorces of Non Stationarity in the Semivariogram Migel A. Cba and Oy Leangthong Traditional ncertainty characterization techniqes sch as Simple Kriging or Seqential Gassian Simlation rely on stationary
More informationKrauskopf, B., Lee, CM., & Osinga, HM. (2008). Codimension-one tangency bifurcations of global Poincaré maps of four-dimensional vector fields.
Kraskopf, B, Lee,, & Osinga, H (28) odimension-one tangency bifrcations of global Poincaré maps of for-dimensional vector fields Early version, also known as pre-print Link to pblication record in Explore
More information3 2D Elastostatic Problems in Cartesian Coordinates
D lastostatic Problems in Cartesian Coordinates Two dimensional elastostatic problems are discssed in this Chapter, that is, static problems of either plane stress or plane strain. Cartesian coordinates
More informationSecond-Order Wave Equation
Second-Order Wave Eqation A. Salih Department of Aerospace Engineering Indian Institte of Space Science and Technology, Thirvananthapram 3 December 016 1 Introdction The classical wave eqation is a second-order
More informationBLOOM S TAXONOMY. Following Bloom s Taxonomy to Assess Students
BLOOM S TAXONOMY Topic Following Bloom s Taonomy to Assess Stdents Smmary A handot for stdents to eplain Bloom s taonomy that is sed for item writing and test constrction to test stdents to see if they
More informationSymmetric Range Assignment with Disjoint MST Constraints
Symmetric Range Assignment with Disjoint MST Constraints Eric Schmtz Drexel University Philadelphia, Pa. 19104,USA Eric.Jonathan.Schmtz@drexel.ed ABSTRACT If V is a set of n points in the nit sqare [0,
More informationEXERCISES WAVE EQUATION. In Problems 1 and 2 solve the heat equation (1) subject to the given conditions. Assume a rod of length L.
.4 WAVE EQUATION 445 EXERCISES.3 In Problems and solve the heat eqation () sbject to the given conditions. Assme a rod of length.. (, t), (, t) (, ),, > >. (, t), (, t) (, ) ( ) 3. Find the temperatre
More informationMove Blocking Strategies in Receding Horizon Control
Move Blocking Strategies in Receding Horizon Control Raphael Cagienard, Pascal Grieder, Eric C. Kerrigan and Manfred Morari Abstract In order to deal with the comptational brden of optimal control, it
More informationEssentials of optimal control theory in ECON 4140
Essentials of optimal control theory in ECON 4140 Things yo need to know (and a detail yo need not care abot). A few words abot dynamic optimization in general. Dynamic optimization can be thoght of as
More informationUNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL
8th International DAAAM Baltic Conference "INDUSTRIAL ENGINEERING - 19-1 April 01, Tallinn, Estonia UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL Põdra, P. & Laaneots, R. Abstract: Strength analysis is a
More informationLeast-squares collocation with covariance-matching constraints
J Geodesy DOI 1.17/s19-7-133-5 ORIGINAL ARTICLE Least-sqares collocation with covariance-matching constraints Christopher Kotsakis Received: 18 Agst 26 / Accepted: 28 December 26 Springer-Verlag 27 Abstract
More informationLecture 8: September 26
10-704: Information Processing and Learning Fall 2016 Lectrer: Aarti Singh Lectre 8: September 26 Note: These notes are based on scribed notes from Spring15 offering of this corse. LaTeX template cortesy
More informationRELIABILITY ASPECTS OF PROPORTIONAL MEAN RESIDUAL LIFE MODEL USING QUANTILE FUNC- TIONS
RELIABILITY ASPECTS OF PROPORTIONAL MEAN RESIDUAL LIFE MODEL USING QUANTILE FUNC- TIONS Athors: N.UNNIKRISHNAN NAIR Department of Statistics, Cochin University of Science Technology, Cochin, Kerala, INDIA
More informationThe Linear Quadratic Regulator
10 The Linear Qadratic Reglator 10.1 Problem formlation This chapter concerns optimal control of dynamical systems. Most of this development concerns linear models with a particlarly simple notion of optimality.
More informationComputational Geosciences 2 (1998) 1, 23-36
A STUDY OF THE MODELLING ERROR IN TWO OPERATOR SPLITTING ALGORITHMS FOR POROUS MEDIA FLOW K. BRUSDAL, H. K. DAHLE, K. HVISTENDAHL KARLSEN, T. MANNSETH Comptational Geosciences 2 (998), 23-36 Abstract.
More information4.2 First-Order Logic
64 First-Order Logic and Type Theory The problem can be seen in the two qestionable rles In the existential introdction, the term a has not yet been introdced into the derivation and its se can therefore
More informationDistribution Network Planning Based on Entropy Fuzzy Comprehensive
Applied Mechanics and Materials Vols. 6-8 010 pp 780-784 Online: 010-06-30 010 Trans Tech Pblications, Switzerland doi:10.408/www.scientific.net/amm.6-8.780 Distribtion Network Planning Based on Entropy
More informationEvaluation of the Fiberglass-Reinforced Plastics Interfacial Behavior by using Ultrasonic Wave Propagation Method
17th World Conference on Nondestrctive Testing, 5-8 Oct 008, Shanghai, China Evalation of the Fiberglass-Reinforced Plastics Interfacial Behavior by sing Ultrasonic Wave Propagation Method Jnjie CHANG
More informationEOQ Problem Well-Posedness: an Alternative Approach Establishing Sufficient Conditions
pplied Mathematical Sciences, Vol. 4, 2, no. 25, 23-29 EOQ Problem Well-Posedness: an lternative pproach Establishing Sfficient Conditions Giovanni Mingari Scarpello via Negroli, 6, 226 Milano Italy Daniele
More informationNonparametric Identification and Robust H Controller Synthesis for a Rotational/Translational Actuator
Proceedings of the 6 IEEE International Conference on Control Applications Mnich, Germany, October 4-6, 6 WeB16 Nonparametric Identification and Robst H Controller Synthesis for a Rotational/Translational
More informationOptimal Control, Statistics and Path Planning
PERGAMON Mathematical and Compter Modelling 33 (21) 237 253 www.elsevier.nl/locate/mcm Optimal Control, Statistics and Path Planning C. F. Martin and Shan Sn Department of Mathematics and Statistics Texas
More informationLINEAR COMBINATIONS AND SUBSPACES
CS131 Part II, Linear Algebra and Matrices CS131 Mathematics for Compter Scientists II Note 5 LINEAR COMBINATIONS AND SUBSPACES Linear combinations. In R 2 the vector (5, 3) can be written in the form
More informationRobust Network Codes for Unicast Connections: A Case Study
Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,
More informationA Theory of Markovian Time Inconsistent Stochastic Control in Discrete Time
A Theory of Markovian Time Inconsistent Stochastic Control in Discrete Time Tomas Björk Department of Finance, Stockholm School of Economics tomas.bjork@hhs.se Agatha Mrgoci Department of Economics Aarhs
More informationStep-Size Bounds Analysis of the Generalized Multidelay Adaptive Filter
WCE 007 Jly - 4 007 London UK Step-Size onds Analysis of the Generalized Mltidelay Adaptive Filter Jnghsi Lee and Hs Chang Hang Abstract In this paper we analyze the bonds of the fixed common step-size
More informationThe Coset Distribution of Triple-Error-Correcting Binary Primitive BCH Codes
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., APRIL 00 177 The Coset Distribtion of iple-error-correcting Binary Primitive BCH Codes Pascale Charpin, Member, IEEE, TorHelleseth, Fellow, IEEE, VictorA.
More informationCHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK. Wassim Jouini and Christophe Moy
CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK Wassim Joini and Christophe Moy SUPELEC, IETR, SCEE, Avene de la Bolaie, CS 47601, 5576 Cesson Sévigné, France. INSERM U96 - IFR140-
More informationWireless Networks Without Edges : Dynamic Radio Resource Clustering and User Scheduling
Wireless Networks Withot Edges : Dynamic Radio Resorce Clstering and User Schedling Yhan D and Gstavo de Veciana Department of Electrical and Compter Engineering, The University of Texas at Astin Email:
More informationFOUNTAIN codes [3], [4] provide an efficient solution
Inactivation Decoding of LT and Raptor Codes: Analysis and Code Design Francisco Lázaro, Stdent Member, IEEE, Gianligi Liva, Senior Member, IEEE, Gerhard Bach, Fellow, IEEE arxiv:176.5814v1 [cs.it 19 Jn
More informationSimplified Identification Scheme for Structures on a Flexible Base
Simplified Identification Scheme for Strctres on a Flexible Base L.M. Star California State University, Long Beach G. Mylonais University of Patras, Greece J.P. Stewart University of California, Los Angeles
More informationElements of Coordinate System Transformations
B Elements of Coordinate System Transformations Coordinate system transformation is a powerfl tool for solving many geometrical and kinematic problems that pertain to the design of gear ctting tools and
More informationCubic graphs have bounded slope parameter
Cbic graphs have bonded slope parameter B. Keszegh, J. Pach, D. Pálvölgyi, and G. Tóth Agst 25, 2009 Abstract We show that every finite connected graph G with maximm degree three and with at least one
More informationLecture Notes: Finite Element Analysis, J.E. Akin, Rice University
9. TRUSS ANALYSIS... 1 9.1 PLANAR TRUSS... 1 9. SPACE TRUSS... 11 9.3 SUMMARY... 1 9.4 EXERCISES... 15 9. Trss analysis 9.1 Planar trss: The differential eqation for the eqilibrim of an elastic bar (above)
More informationStudy of the diffusion operator by the SPH method
IOSR Jornal of Mechanical and Civil Engineering (IOSR-JMCE) e-issn: 2278-684,p-ISSN: 2320-334X, Volme, Isse 5 Ver. I (Sep- Oct. 204), PP 96-0 Stdy of the diffsion operator by the SPH method Abdelabbar.Nait
More informationOn relative errors of floating-point operations: optimal bounds and applications
On relative errors of floating-point operations: optimal bonds and applications Clade-Pierre Jeannerod, Siegfried M. Rmp To cite this version: Clade-Pierre Jeannerod, Siegfried M. Rmp. On relative errors
More informationSTEP Support Programme. STEP III Hyperbolic Functions: Solutions
STEP Spport Programme STEP III Hyperbolic Fnctions: Soltions Start by sing the sbstittion t cosh x. This gives: sinh x cosh a cosh x cosh a sinh x t sinh x dt t dt t + ln t ln t + ln cosh a ln ln cosh
More informationTechnical Note. ODiSI-B Sensor Strain Gage Factor Uncertainty
Technical Note EN-FY160 Revision November 30, 016 ODiSI-B Sensor Strain Gage Factor Uncertainty Abstract Lna has pdated or strain sensor calibration tool to spport NIST-traceable measrements, to compte
More informationCuckoo hashing: Further analysis
Information Processing Letters 86 (2003) 215 219 www.elsevier.com/locate/ipl Cckoo hashing: Frther analysis Lc Devroye,PatMorin School of Compter Science, McGill University, 3480 University Street, Montreal,
More informationStudy on the impulsive pressure of tank oscillating by force towards multiple degrees of freedom
EPJ Web of Conferences 80, 0034 (08) EFM 07 Stdy on the implsive pressre of tank oscillating by force towards mltiple degrees of freedom Shigeyki Hibi,* The ational Defense Academy, Department of Mechanical
More informationHomotopy Perturbation Method for Solving Linear Boundary Value Problems
International Jornal of Crrent Engineering and Technolog E-ISSN 2277 4106, P-ISSN 2347 5161 2016 INPRESSCO, All Rights Reserved Available at http://inpressco.com/categor/ijcet Research Article Homotop
More informationSubcritical bifurcation to innitely many rotating waves. Arnd Scheel. Freie Universitat Berlin. Arnimallee Berlin, Germany
Sbcritical bifrcation to innitely many rotating waves Arnd Scheel Institt fr Mathematik I Freie Universitat Berlin Arnimallee 2-6 14195 Berlin, Germany 1 Abstract We consider the eqation 00 + 1 r 0 k2
More information1 Undiscounted Problem (Deterministic)
Lectre 9: Linear Qadratic Control Problems 1 Undisconted Problem (Deterministic) Choose ( t ) 0 to Minimize (x trx t + tq t ) t=0 sbject to x t+1 = Ax t + B t, x 0 given. x t is an n-vector state, t a
More informationDirect linearization method for nonlinear PDE s and the related kernel RBFs
Direct linearization method for nonlinear PDE s and the related kernel BFs W. Chen Department of Informatics, Uniersity of Oslo, P.O.Box 1080, Blindern, 0316 Oslo, Norway Email: wenc@ifi.io.no Abstract
More informationQueueing analysis of service deferrals for load management in power systems
Qeeing analysis of service deferrals for load management in power systems Andrés Ferragt and Fernando Paganini Universidad ORT Urgay Abstract With the advent of renewable sorces and Smart- Grid deployments,
More informationConditions for Approaching the Origin without Intersecting the x-axis in the Liénard Plane
Filomat 3:2 (27), 376 377 https://doi.org/.2298/fil7276a Pblished by Faclty of Sciences and Mathematics, University of Niš, Serbia Available at: http://www.pmf.ni.ac.rs/filomat Conditions for Approaching
More informationThe Dual of the Maximum Likelihood Method
Department of Agricltral and Resorce Economics University of California, Davis The Dal of the Maximm Likelihood Method by Qirino Paris Working Paper No. 12-002 2012 Copyright @ 2012 by Qirino Paris All
More informationA FIRST COURSE IN THE FINITE ELEMENT METHOD
INSTRUCTOR'S SOLUTIONS MANUAL TO ACCOMANY A IRST COURS IN TH INIT LMNT MTHOD ITH DITION DARYL L. LOGAN Contents Chapter 1 1 Chapter 3 Chapter 3 3 Chapter 17 Chapter 5 183 Chapter 6 81 Chapter 7 319 Chapter
More informationMinimum-Latency Beaconing Schedule in Multihop Wireless Networks
This fll text paper was peer reiewed at the direction of IEEE Commnications Society sbject matter experts for pblication in the IEEE INFOCOM 009 proceedings Minimm-Latency Beaconing Schedle in Mltihop
More informationREINFORCEMENT LEARNING AND OPTIMAL ADAPTIVE CONTROL
Lewis c11.tex V1-10/19/2011 4:10pm Page 461 11 REINFORCEMENT LEARNING AND OPTIMAL ADAPTIVE CONTROL In this book we have presented a variety of methods for the analysis and design of optimal control systems.
More informationSimulation investigation of the Z-source NPC inverter
octoral school of energy- and geo-technology Janary 5 20, 2007. Kressaare, Estonia Simlation investigation of the Z-sorce NPC inverter Ryszard Strzelecki, Natalia Strzelecka Gdynia Maritime University,
More informationModel Discrimination of Polynomial Systems via Stochastic Inputs
Model Discrimination of Polynomial Systems via Stochastic Inpts D. Georgiev and E. Klavins Abstract Systems biologists are often faced with competing models for a given experimental system. Unfortnately,
More informationPHASE STEERING AND FOCUSING BEHAVIOR OF ULTRASOUND IN CEMENTITIOUS MATERIALS
PHAS STRING AND FOCUSING BHAVIOR OF ULTRASOUND IN CMNTITIOUS MATRIALS Shi-Chang Wooh and Lawrence Azar Department of Civil and nvironmental ngineering Massachsetts Institte of Technology Cambridge, MA
More informationA New Approach to Direct Sequential Simulation that Accounts for the Proportional Effect: Direct Lognormal Simulation
A ew Approach to Direct eqential imlation that Acconts for the Proportional ffect: Direct ognormal imlation John Manchk, Oy eangthong and Clayton Detsch Department of Civil & nvironmental ngineering University
More informationPower Enhancement in High Dimensional Cross-Sectional Tests
Power Enhancement in High Dimensional Cross-Sectional ests arxiv:30.3899v2 [stat.me] 6 Ag 204 Jianqing Fan, Yan Liao and Jiawei Yao Department of Operations Research and Financial Engineering, Princeton
More informationConstructive Root Bound for k-ary Rational Input Numbers
Constrctive Root Bond for k-ary Rational Inpt Nmbers Sylvain Pion, Chee Yap To cite this version: Sylvain Pion, Chee Yap. Constrctive Root Bond for k-ary Rational Inpt Nmbers. 19th Annal ACM Symposim on
More informationResearch Article Permanence of a Discrete Predator-Prey Systems with Beddington-DeAngelis Functional Response and Feedback Controls
Hindawi Pblishing Corporation Discrete Dynamics in Natre and Society Volme 2008 Article ID 149267 8 pages doi:101155/2008/149267 Research Article Permanence of a Discrete Predator-Prey Systems with Beddington-DeAngelis
More informationarxiv: v1 [physics.flu-dyn] 11 Mar 2011
arxiv:1103.45v1 [physics.fl-dyn 11 Mar 011 Interaction of a magnetic dipole with a slowly moving electrically condcting plate Evgeny V. Votyakov Comptational Science Laboratory UCY-CompSci, Department
More informationUniversal Scheme for Optimal Search and Stop
Universal Scheme for Optimal Search and Stop Sirin Nitinawarat Qalcomm Technologies, Inc. 5775 Morehose Drive San Diego, CA 92121, USA Email: sirin.nitinawarat@gmail.com Vengopal V. Veeravalli Coordinated
More informationSolving a System of Equations
Solving a System of Eqations Objectives Understand how to solve a system of eqations with: - Gass Elimination Method - LU Decomposition Method - Gass-Seidel Method - Jacobi Method A system of linear algebraic
More informationNew Multi-User OFDM Scheme: Braided Code Division Multiple Access
New Mlti-User Scheme: Braided Code Division Mltiple Access Marcos B.S. Tavares, Michael Lentmaier, Kamil Sh. Zigangirov and Gerhard. Fettweis Vodafone Chair Mobile Commnications Systems, Technische Universität
More informationRESGen: Renewable Energy Scenario Generation Platform
1 RESGen: Renewable Energy Scenario Generation Platform Emil B. Iversen, Pierre Pinson, Senior Member, IEEE, and Igor Ardin Abstract Space-time scenarios of renewable power generation are increasingly
More informationCharacterizations of probability distributions via bivariate regression of record values
Metrika (2008) 68:51 64 DOI 10.1007/s00184-007-0142-7 Characterizations of probability distribtions via bivariate regression of record vales George P. Yanev M. Ahsanllah M. I. Beg Received: 4 October 2006
More informationImprecise Continuous-Time Markov Chains
Imprecise Continos-Time Markov Chains Thomas Krak *, Jasper De Bock, and Arno Siebes t.e.krak@.nl, a.p.j.m.siebes@.nl Utrecht University, Department of Information and Compting Sciences, Princetonplein
More informationDEFINITION OF A NEW UO 2 F 2 DENSITY LAW FOR LOW- MODERATED SOLUTIONS (H/U < 20) AND CONSEQUENCES ON CRITICALITY SAFETY
DEFINITION OF A NEW UO 2 F 2 DENSITY LAW FOR LOW- MODERATED SOLUTIONS ( < 20) AND CONSEQUENCES ON CRITICALITY SAFETY N. Leclaire, S. Evo, I.R.S.N., France Introdction In criticality stdies, the blk density
More informationLOS Component-Based Equal Gain Combining for Ricean Links in Uplink Massive MIMO
016 Sixth International Conference on Instrmentation & Measrement Compter Commnication and Control LOS Component-Based Eqal Gain Combining for Ricean Lins in plin Massive MIMO Dian-W Ye College of Information
More informationJ.A. BURNS AND B.B. KING redced order controllers sensors/actators. The kernels of these integral representations are called fnctional gains. In [4],
Jornal of Mathematical Systems, Estimation, Control Vol. 8, No. 2, 1998, pp. 1{12 c 1998 Birkhaser-Boston A Note on the Mathematical Modelling of Damped Second Order Systems John A. Brns y Belinda B. King
More informationCommunicating the sum of sources in a 3-sources/3-terminals network
Communicating the sum of sources in a 3-sources/3-terminals network Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel Email: mikel@openu.ac.il Aditya Ramamoorthy
More informationStair Matrix and its Applications to Massive MIMO Uplink Data Detection
1 Stair Matrix and its Applications to Massive MIMO Uplink Data Detection Fan Jiang, Stdent Member, IEEE, Cheng Li, Senior Member, IEEE, Zijn Gong, Senior Member, IEEE, and Roy S, Stdent Member, IEEE Abstract
More informationSurvivable Virtual Topology Mapping To Provide Content Connectivity Against Double-Link Failures
BONSAI Lab Srvivable Virtal Topology Mapping To Provide Content Connectivity Against Doble-Link Failres Ali Hmaity Massimo Tornatore Franceo Msmeci OUTLINE Motivations Srvivable virtal topology mapping
More informationChapter 3. Preferences and Utility
Chapter 3 Preferences and Utilit Microeconomics stdies how individals make choices; different individals make different choices n important factor in making choices is individal s tastes or preferences
More informationPrediction of Transmission Distortion for Wireless Video Communication: Analysis
Prediction of Transmission Distortion for Wireless Video Commnication: Analysis Zhifeng Chen and Dapeng W Department of Electrical and Compter Engineering, University of Florida, Gainesville, Florida 326
More information