Age of Information: Whittle Index for Scheduling Stochastic Arrivals

Size: px
Start display at page:

Download "Age of Information: Whittle Index for Scheduling Stochastic Arrivals"

Transcription

1 Age of Information: Whittle Index for Scheduling Stochastic Arrivals Yu-Pin Hsu Deartment of Communication Engineering National Taiei University arxiv: v2 [math.oc] 7 Ar 208 Abstract Age of information is a new concet that characterizes the freshness of information at end devices. This aer studies the age of information from a scheduling ersective. We consider a wireless broadcast network where a base-station udates many users on stochastic information arrivals. Suose that only one user can be udated for each time. In this context, we aim at develoing a transmission scheduling algorithm for minimizing the long-run average age. To develo a low-comlexity transmission scheduling algorithm, we aly the Whittle s framework for restless bandits. We successfully derive the Whittle index in a closed form and establish the indexability. Based on the Whittle index, we roose a scheduling algorithm, while exerimentally showing that it closely aroximates an age-otimal scheduling algorithm. I. INTRODUCTION In recent years, there has been a dramatic roliferation of research on an age of information. The age of information is insired by a variety of network alications requiring timely information to accomlish some tasks. Examles include information udates for smart-hone users, e.g., traffic and transortation, as well as status udates for smart systems, e.g., smart transortation systems and smart grid systems. On the one hand, a smart-hone user needs timely traffic and transortation information for lanning the best route. On the other hand, timely information about vehicles ositions and seeds is needed for lanning a collision-free transortation system. In both cases, snashots of the information are generated by their sources at some eochs and sent to the end devices (e.g., smart-hone users and vehicles) in the form of ackets over wired or wireless networks. Since the information at the end devices is exected to be as timely as ossible, the age of information is therefore roosed to cature the freshness of the information at the end devices; more recisely, it measures the elased time since the generation of the freshest ackets. The goal is to develo networks suorting the agesensitive alications. It is interesting that either throughutotimal design or delay-otimal design might not result in the minimum age []. In this aer, we consider that a base-station (BS) udates many users over a wireless broadcast network, where new information is randomly generated. We assume that the BS can udate at most one user for each transmission oortunity. Under the transmission constraint, a transmission scheduling algorithm manages how the channel resources are allocated for each time, deending on the acket arrivals and the ages of the information. The scheduling design is a critical issue to rovide good network erformance. We hence design and analyze a scheduling algorithm to minimize the long-run average age. The wireless broadcast network is similar to the model in the earlier work [2] of the resent author; however, a lowcomlexity scheduling algorithm is unexlored. To fill this ga, this work investigates an age-otimal scheduling from the ersective of restless bandits [3]. Whittle [4] considers a relaxed restless multi-armed bandit roblem and decoule the roblem into many sub-roblems consisting of a single bandit, while roosing an index olicy and a concet of indexability. The Whittle index olicy is asymtotically otimal under certain conditions [5], and in ractice erforms strikingly well [6]. Note that each user in our roblem can be viewed as a restless bandit; as such, we aly the Whittle s aroach to develo a scheduling algorithm. A. Contributions We transform our roblem into a relaxed restless multiarmed bandit roblem and investigate the roblem from the Whittle s ersective. However, in general, a closed form of the Whittle index might be unavailable. To tackle this issue, we formulate each decouled sub-roblem as a Markov decision rocess (MDP), with the urose of minimizing an average cost. Since our MDP involves an average cost otimization over infinite horizon with a countably infinite state sace, our roblem is challenging to analyze [7]. We rove that an otimal olicy of the MDP is stationary and deterministic; in articular, it is a simle threshold tye. We then derive an otimal threshold by exloiting the threshold tye along with a ost-action age. It turns out that the ost-action age simlifies the calculation of the average cost; as such, we successfully obtain the Whittle index in a closed form and show the indexability. Finally, we roose a Whittle index scheduling algorithm and numerically validate its erformance. B. Related works The age of information has attracted many interests from the research community, e.g., [, 8, 9] and see the survey [0]. Of the most relevant works on scheduling multile users are [ 4]. The works [, 2] consider queues at a BS to store all out-of-date ackets, different from ours. The aer [3] considers a buffer to store the latest information with

2 2 sources s s 2 s N Λ (t) Λ 2 (t) Λ N (t) base-station users u u 2 u N A (t) A 2 (t) A N (t) age increases linearly with slots. Then, the dynamics of the age of information for user u i is { if Λi (t) = and D(t) = i; X i (t+) = X i (t)+ else, where the age in the next slot is one if the user gets udated on the new information; otherwise, the age increases by one. Since the BS can udate at most one user for each slot, X i (t) for all i, X i (t) X j (t) for all i j, and N i= X i(t) +2+ +N for all t. Fig.. A BS udates N users u,,u N on information from sources s,,s N, resectively. eriodic arrivals; whereas information udates in [4] can be generated at will. Our work contributes to the age of information by develoing a low-comlexity algorithm for scheduling stochastic information arrivals. A. Network model II. SYSTEM OVERVIEW We consider a wireless broadcast network consisting of a base-station (BS) and N wireless users u,,u N in Fig.. Each useru i is interested in a tye of information generated by a source s i, for i =,,N, resectively. All information is sent in the form of ackets by the BS over a noiseless broadcast channel. We consider a discrete-time system with slot t = 0,,. The ackets from the sources (if any) arrive at the BS at the beginning of each slot. The arrivals at the BS for different users are indeendent of each other, and also indeendent and identically distributed (i.i.d.) over slots, governed by a Bernoulli distribution. Precisely, by Λ i (t) we indicate if a acket from source s i arrives at the BS in slot t, where Λ i (t) = if there is a acket, with P[Λ i (t) = ] = i ; otherwise, Λ i (t) = 0. We assume that the BS can send at most one acket during each slot, i.e., the BS can udate at most one user in each slot. Moreover, we focus on the setting that the BS does not buffer a acket if it is not transmitted in the arriving slot. The no-buffer network is motivated by [2]. By D(t) {0,, N} we denote a decision of the BS in slot t, where D(t) = 0 if no one will be udated in slot t and D(t) = i for i =,,N if user u i is scheduled to be udated in slot t. A scheduling algorithm θ = {D(0),D(), } secifies a decision for each slot. Next, we will define an age of information as our design criterion. B. Age of information model The age of information imlies the freshness of the information at the users. We initialize the ages of all arriving ackets at the BS to be zero. The age of information at a user becomes one on receiving a acket, due to one slot of the transmission time. Let X i (t) be the age of information for user u i in slot t before the BS makes a scheduling decision. Suose that the C. Problem formulation We define the average age under a scheduling algorithm θ by [ T ] lim su T T + E N θ X i (t), t=0 i= where E θ reresents the conditional exectation, given that the algorithm θ is emloyed. Note that we focus on the total age, but our work can be easily extended to a weighted sum of the ages. Our goal is to develo a low-comlexity scheduling algorithm whose average age is close to the minimum by leveraging the Whittle s methodology [4]. III. SCHEDULING ALGORITHM DESIGN We will develo a scheduling algorithm based on restless bandits [3] in stochastic control theory. To reach the goal, in this section, we start with casting our roblem as a restless multi-armed bandit roblem [3], followed by introducing the Whittle index [4] as a solution to the multi-armed bandit roblem. A challenge of this aroach is to obtain the Whittle index. We then exlicitly derive the Whittle index in a simler way using a ost-action age. We finally roose a scheduling algorithm based on the Whittle index. A. Restless bandits and Whittle s aroach A restless bandit generalizes a classic bandit by allowing the bandit to kee evolving under a assive action, but in a distinct way from its continuation under an active action. However, the restless bandits roblem, in general, is PSPACEhard [3]. Whittle hence investigates a relaxed version, where a constraint on the number of active bandits for each slot is relaced by the exected number. With this relaxation, Whittle then alies a Lagrangian aroach to decoule the multiarmed bandit roblem into multile sub-roblems. We can regard each user in our roblem as a restless bandit. Following the Whittle s aroach, we can decoule our roblem into N sub-roblems. A sub-roblem consists of a user u i and adheres to the network model in Section II with N =, excet for an additional cost C for udating the user. In each sub-roblem, we aim at determining whether or not the user should be udated for each slot, in order to strike a balance between the udating cost and the cost incurred by age. In fact, the cost C is a scalar Lagrange multilier in the Lagrangian aroach. Since each sub-roblem consists of a single user, hereafter we omit the index i for simlicity.

3 3 B. Decouled sub-roblem We formulate the sub-roblem as a Markov decision rocess (MDP), with the comonents [5] as follows. States: We define the state s(t) of the MDP in slot t by s(t) = (X(t),Λ(t)). This is an infinite-state MDP as the age is ossibly unbounded. Actions: Let a(t) {0,} be an action of the MDP in slot t indicating the BS s decision, where a(t) = if the BS decides to udate the user and a(t) = 0 if the BS decides to idle. Transition robabilities: The transition robability from state s = (x,λ) to state s under action a(t) = a is: P[s = (x+,) s = (x,λ),a(t) = 0] = ; P[s = (x+,0) s = (x,λ),a(t) = 0] = ; P[s = (,) s = (x,),a(t) = ] = ; P[s = (,0) s = (x,),a(t) = ] = ; P[s = (x+,) s = (x,0),a(t) = ] = ; P[s = (x+,0) s = (x,0),a(t) = ] =. Cost: Let C(s(t),a(t)) be an immediate cost if action a(t) is taken in slot t under states(t), with the definition as follows. ( ) C s(t) = (x,λ),a(t) = a (x+ x a λ)+c a, where the first art x+ x a λ is the resulting age in the next slot and the second art is the incurred cost for udating the user. A olicy µ = {a(0),a(), } of the MDP secifies an action for each slot. A olicy µ is history deendent if a(t) deends on s(0),,s(t) and a(0),a(t ). A olicy is stationary if a(t ) = a(t 2 ) when s(t ) = s(t 2 ) for any t,t 2. Moreover, a randomized olicy chooses an action with a robability, while a deterministic olicy chooses an action with certainty. The average cost under a olicy µ is defined by lim su T T + E µ [ T ] C(s(t),a(t)). t=0 Definition. A olicy µ (that can be history deendent) is cost-otimal if it minimizes the average cost. The objective of the MDP is to find a olicy µ that minimizes the average cost. According to [5], there may not exist a cost-otimal olicy that is stationary or deterministic. Hence, in the next section, we aim at investigating a costotimal olicy. C. Characterizing a cost-otimal olicy We will study structures of a cost-otimal olicy in this section. First, we show that a cost-otimal olicy is stationary and deterministic as follows. Theorem 2. There exists a stationary and deterministic olicy that is cost-otimal, indeendent of initial state s(0). () Proof: Given initial state s(0) = s, we define the exected Fig The age X(t) under the olicy f forms a DTMC. total discounted cost [5] under olicy µ by [ T ] J α (s;µ) = limsue µ α t C(s(t),a(t)) s(0) = s, T t=0 where 0 < α < is a discount factor. Moreover, let J α (s) = min µ J α (s;µ) be the minimum exected total discounted cost. A olicy that minimizes the exected total α-discounted cost is called α-otimal olicy. According to [6], a deterministic stationary olicy is costotimal if the following two conditions hold. ) There exists a deterministic stationary olicy of the MDP such that the associated average cost is finite: Let f be the deterministic stationary olicy of always choosing the action a(t) = for each slot t if there is an arrival. The age X(t) under the olicy f forms a discretetime Markov chain (DTMC) in Fig. 2. The steady-state distribution π = (π,π 2,,) of the DTMC is π i = ( ) i for all i =,2,. Hence, the average age is iπ i = i( ) i =. i= i= On the other hand, the average udating cost is C as the arrival robability is. Hence, the average cost under the olicy f is the average age (i.e., /) lus the average udating cost (i.e., C ), which is finite and yields the result. 2) There exists a non-negative L such that the relative cost function h α (s) J α (s) J α (0) L for all s and α, where 0 is a reference state: Similar to [2], we can show that J α (x,λ) is a non-decreasing function in age x given arrival indicator λ; moreover,j α (x,λ) is a nonincreasing function in λ given x. Then, we can choose L = 0 by choosing the reference state 0 = (0,). By verifying the two conditions, the theorem immediately follows from [6]. Next, we further investigate a cost-otimal olicy by showing that it is a secial tye of deterministic stationary olicy. Definition 3. A threshold-tye olicy is a deterministic stationary olicy of the MDP. The action for state (x,0) is to idle, for all x. Moreover, if the action for state (x,) is to udate, then the action for state (x+,) is to udate as well. In other words, there exists a threshold X {,2, } such that the action is to udate if there is an arrival and the age is greater than or equal to X; otherwise, the action is to idle.

4 4 X Fig. 3. The ost-action age Y(t) under the threshold-tye olicy forms a DTMC. Theorem 4. If C 0, then there exists a olicy of the threshold tye that is cost-otimal. Proof: It is obvious that an otimal action for state (x,0) is to idle if C 0. To establish the otimality of the threshold structure for state (x, ), we need the discounted cost otimality equation (see the roof of Theorem 2 and [5]): if the first condition in the roof of Theorem 2 holds, then for any state s the minimum exected total discounted cost J α (s) satisfies X - X + J α (s) = min a {0,} C(s,a)+αE[J α(s )], where the exectation is taken over all ossible next state s reachable from state s. Subsequently, we intend to rove that an α-otimal olicy is the threshold tye. Let J α (s;a) = C(s;a)+αE[J α (s )]. Then, J α (s) = min a {0,} J α (s;a). Moreover, an α-otimal action for state s is argmin a {0,} J α (s;a) [5]. Suose an α-otimal action for state (x,) is to udate, i.e., J α (x,;) J α (x,;0) 0. Then, an α-otimal action for state (x+,) is still to udate since J α (x+,;) J α (x+,;0) =(+C +αe[j α (,λ )]) (x+2+αe[j α (x+2,λ )]) (a) (+C +αe[j α (,λ )]) (x++αe[j α (x+,λ )]) =J α (x,;) J α (x,;0) 0, where (a) results from the non-decreasing function of J α (x,λ) in x given λ (see roof of Theorem 2). Hence, an α-otimal olicy is the threshold tye. Finally, we conclude that a cost-otimal olicy is the threshold tye as well since a cost-otimal olicy is the limit oint of α-otimal olicies with α if both conditions in the roof of Theorem 2 hold [2]. To find an otimal threshold for minimizing the average cost, we exlicitly derive the average cost in the next theorem. Theorem 5. Given the threshold-tye olicy with the threshold X {,2, }, then the average cost, denoted by C( X), under the olicy is C( X) = X 2 2 +( 2 ) X + 2 +C X +. (2) Proof: Let Y(t) be the age after an action in slot t; recisely, ifs(t) = (x,λ) anda(t) = a, theny(t) = x+ x a λ. - Note that Y(t), called ost-action age (similar to the ostdecsion state [7]), is different from the re-action age X(t). The ost-action age Y(t) forms a DTMC in Fig. 3. Moreover, we associate each state in the DTMC with a cost. The DTMC incurs the cost of C+ in slot t when the ost-action age in slot t is Y(t) = since the ost-action age Y(t) = imlies that the BS udates the user, while incurring the cost of y in slot t when the ost-action age is Y(t) = y. Then, the steady-state distribution π = (π,π 2, ) of the DTMC is π i = X+ X+ if i =,, X; ( ) i X if i = X +,. Therefore, the average cost of the DTMC is (+C)π + iπ i = i=2 X 2 2 +( 2 ) X + 2 +C X +. We want to elaborate on the ost-action age in the roof. There might be alternatives for obtaining the average cost as follows: As in many literature, e.g., [3], we can find an otimal action for each state by solving the average cost otimality equation [5]. However, we might not arrive at the average cost otimality equation as this is an infinitestate MDP [6]. Even though the average cost otimality equation is established, it is usually hard to solve the otimality equation directly. Given threshold X, then state (X(t),Λ(t)) forms a twodimensional DTMC. It is usually hard to solve the steadystate distribution for a multi-dimensional DTMC. Given threshold X, the re-action age X(t) forms a DTMC as well. However, we cannot associate each state with a cost, since the cost deends on not only state but also action (see Eq. ()). On the contrary, the cost for the ost-action age Y(t) is determined by state only. D. Deriving the Whittle index Now, we are ready to define the Whittle index. Definition 6. We define the Whittle index I(s) by the cost C that makes both actions for state s equally desirable. Theorem 7. The Whittle index of the sub-roblem for state (x,λ) is { 0 if λ = 0; I(x,λ) = x 2 2 x 2 + x if λ =. Proof: It is obvious that the Whittle index for state (x,0) is I(x,0) = 0 as both actions result in the same immediate cost and the same age of next slot if C = 0. Let g(x) = C(x) in Eq. (2) for the domain of {x R : x }. Note that g(x) is strictly convex in the domain. Let x be the minimizer of g(x). Then, an otimal threshold for minimizing the average cost C( X) is either x or x : the otimal threshold is X = x if C( x ) C( x ) and

5 5 X = x if C( x ) C( x ). If there is a tie, both choices are otimal. Hence, both actions for state (x, ) are equally desirable if and only if the age x satisfies C(x) = C(x+), i.e., x = x and both thresholds of x and x+ are otimal. By solving the above equation, we obtain the cost to make both actions equally desirable, as the Whittle index in the theorem. According to Theorem 7, both actions might have a tie. If there is a tie, we break the tie in favor of idling. Then, we can exlicitly exress the otimal threshold in the next theorem. Theorem 8. The otimal threshold for minimizing the average cost is X = x if the cost satisfies I(x,) C < I(x,), for all x =,2,. Proof: Since I(x) is the cost to make both actions for state (x,) equally desirable and we break a tie in favor of idling, then the otimal threshold is X = x + if the cost is C = I(x), for all x. We claim that the otimal threshold monotonically increases with cost C, and then the theorem follows. To verify the claim, we can focus on an α-otimal olicy according to the roof of Theorem 4. Suose that an α- otimal action, associated with a cost C, for state (x,) is to idle, i.e., x++αe[j α (x+,λ )] +C +αe[j α (,λ )]. Then, an α-otimal action, associated with a cost C 2 C, for state (x,) is to idle as well since x++αe[j α (x+,λ )] +C +αe[j α (,λ )] +C 2 +αe[j α (,λ )]. Then, the monotonicity is established. Next, according to [4], we have to demonstrate the indexability defined as follows. Definition 9. Given cost C, let S(C) be the set of states s such that the otimal action for the states is to idle. The subroblem is indexable if the set S(C) monotonically increases from the emty set to the entire state sace, as C increases from to. Theorem 0. The sub-roblem is indexable. Proof: If C < 0, the otimal action for every state is to udate; as such, S(0) =. If C 0, then S(C) is comosed of the set {s = (x,0) : x =,2, } and a set of (x,) for some x s. According to Theorem 8, the otimal threshold monotonically increases as C increases, and hence the set S(C) monotonically increases to the entire state sace. E. Scheduling algorithm design Now, we are ready to roose a scheduling algorithm based on the Whittle index. For each slot t, the BS observes age X i (t) and arrival indicator Λ i (t) for every user u i ; then, udate a user u i with the highest value of the Whittle index Fig. 4. Average age for two users under the roosed Whittle index scheduling algorithm and an age-otimal scheduling algorithm. I(X i (t),λ i (t)). We can think of the index I(X i (t),λ i (t)) as the cost to udate user u i. The intuition of the scheduling algorithm is that the BS intends to send the most valuable acket. In Fig. 4, we comare the roosed algorithm with the age-otimal scheduling algorithm in [2] for two users over 00,000 slots. It turns out that the simle index algorithm almost achieves the minimum average age. IV. CONCLUSION This aer treated a wireless broadcast network, where many users are interested in different tyes of information delivered by a base-station. Under a transmission constraint, we studied a transmission scheduling roblem, with resect to the age of information. We have roosed a low-comlexity scheduling algorithm leveraging the Whittle s methodology. Numerical studies showed that the roosed algorithm almost minimizes the average age. To investigate a regime under which the roosed algorithm is otimal would be an interesting extension. ACKNOWLEDGEMENT The author is grateful to anonymous reviewers for their constructive comments. REFERENCES [] S. Kaul, R. D. Yates, and M. Gruteser, Real-Time Status: How Often Should One Udate? Proc of IEEE INFOCOM, , 202. [2] Y.-P. Hsu, E. Modiano, and L. Duan, Age of Information: Design and Analysis of Otimal Scheduling Algorithms, Proc. of IEEE ISIT, , 207. [3] J. Gittins, K. Glazebrook, and R. Weber, Multi-Armed Bandit Allocation Indices. John Wiley & Sons, 20. [4] P. Whittle, Restless Bandits: Activity Allocation in a Changing World, Journal of alied robability, , 988. [5] R. R. Weber and G. Weiss, On an index olicy for restless bandits, Journal of Alied Probability, vol. 27, no. 3, , 990. [6] M. Larranaga, U. Ayesta, and I. M. Verloo, Stochastic and Fluid Index Policies for Resource Allocation Problems, Proc. of IEEE INFOCOM, , 205. [7] D. P. Bertsekas, Dynamic Programming and Otimal Control Vol. I and II. Athena Scientific, 202. [8] M. Costa, M. Codreanu, and A. Ehremides, On the Age of Information in Status Udate Systems with Packet Management, IEEE Trans. Inf. Theory, vol. 62, no. 4, , 206.

6 [9] A. M. Bedewy, Y. Sun, and N. B. Shroff, Age-Otimal Information Udates in Multiho Networks, Proc. of IEEE ISIT, , 207. [0] A. Kosta, N. Paas, and V. Angelakis, Age of Information: A New Concet, Metric, and Tool, Foundations and Trends R in Networking, vol. 2, no. 3, , 207. [] Q. He, D. Yuan, and A. Ehremides, Otimal Link Scheduling for Age Minimization in Wireless Systems, acceted to IEEE Trans. Inf. Theory, 207. [2] C. Joo and A. Eryilmaz, Wireless Scheduling for Information Freshness and Synchrony: Drift-based Design and Heavy- Traffic Analysis, Proc. of IEEE WIOPT,. 8, 207. [3] I. Kadota, E. Uysal-Biyikoglu, R. Singh, and E. Modiano, Minimizing Age of Information in Broadcast Wireless Networks, Proc. of Allerton, 206. [4] R. D. Yates, P. Ciblat, A. Yener, and M. Wigger, Age-Otimal Constrained Cache Udating, Proc. of IEEE ISIT,. 4 45, 207. [5] M. L. Puterman, Markov Decision Processes: Discrete Stochastic Dynamic Programming. The MIT Press, 994. [6] L. I. Sennott, Average Cost Otimal Stationary Policies in Infinite State Markov Decision Processes with Unbounded Costs, Oerations Research, vol. 37, , 989. [7] W. B. Powell, Aroximate Dynamic Programming: Solving the Curses of Dimensionality. John Wiley & Sons, 20. 6

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting On the Role of Finite Queues in Cooerative Cognitive Radio Networks with Energy Harvesting Mohamed A. Abd-Elmagid, Tamer Elatt, and Karim G. Seddik Wireless Intelligent Networks Center (WINC), Nile University,

More information

Power Aware Wireless File Downloading: A Constrained Restless Bandit Approach

Power Aware Wireless File Downloading: A Constrained Restless Bandit Approach PROC. WIOP 204 Power Aware Wireless File Downloading: A Constrained Restless Bandit Aroach Xiaohan Wei and Michael J. Neely, Senior Member, IEEE Abstract his aer treats ower-aware throughut maximization

More information

Optimizing Age of Information in Wireless Networks with Throughput Constraints

Optimizing Age of Information in Wireless Networks with Throughput Constraints Optimizing Age of Information in Wireless Networks with Throughput Constraints Igor adota, Abhishek Sinha and Eytan Modiano Laboratory for Information & Decision Systems, MIT Abstract Age of Information

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

An Analysis of TCP over Random Access Satellite Links

An Analysis of TCP over Random Access Satellite Links An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

Can Decentralized Status Update Achieve Universally Near-Optimal Age-of-Information in Wireless Multiaccess Channels?

Can Decentralized Status Update Achieve Universally Near-Optimal Age-of-Information in Wireless Multiaccess Channels? Can Decentralized Status Update Achieve Universally Near-Optimal Age-of-Information in Wireless Multiaccess Channels? Zhiyuan Jiang, Bhaskar Krishnamachari, Sheng Zhou, Zhisheng Niu, Fellow, IEEE {zhiyuan,

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Approximate Dynamic Programming for Dynamic Capacity Allocation with Multiple Priority Levels

Approximate Dynamic Programming for Dynamic Capacity Allocation with Multiple Priority Levels Aroximate Dynamic Programming for Dynamic Caacity Allocation with Multile Priority Levels Alexander Erdelyi School of Oerations Research and Information Engineering, Cornell University, Ithaca, NY 14853,

More information

Mobility-Induced Service Migration in Mobile. Micro-Clouds

Mobility-Induced Service Migration in Mobile. Micro-Clouds arxiv:503054v [csdc] 7 Mar 205 Mobility-Induced Service Migration in Mobile Micro-Clouds Shiiang Wang, Rahul Urgaonkar, Ting He, Murtaza Zafer, Kevin Chan, and Kin K LeungTime Oerating after ossible Deartment

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies Online Aendix to Accomany AComarisonof Traditional and Oen-Access Aointment Scheduling Policies Lawrence W. Robinson Johnson Graduate School of Management Cornell University Ithaca, NY 14853-6201 lwr2@cornell.edu

More information

Age-Optimal Updates of Multiple Information Flows

Age-Optimal Updates of Multiple Information Flows Age-Optimal Updates of Multiple Information Flows Yin Sun, Elif Uysal-Biyikoglu, and Sastry Kompella Dept. of ECE, Auburn University, Auburn, AL Dept. of EEE, Middle East Technical University, Ankara,

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Asymptotically Optimal Simulation Allocation under Dependent Sampling Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 On the Relationshi Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 Imad Antonios antoniosi1@southernct.edu CS Deartment MO117 Southern Connecticut State University 501 Crescent St.

More information

Distributed Scheduling Algorithms for Optimizing Information Freshness in Wireless Networks

Distributed Scheduling Algorithms for Optimizing Information Freshness in Wireless Networks Distributed Scheduling Algorithms for Optimizing Information Freshness in Wireless Networks Rajat Talak, Sertac Karaman, and Eytan Modiano arxiv:803.06469v [cs.it] 7 Mar 208 Abstract Age of Information

More information

On Code Design for Simultaneous Energy and Information Transfer

On Code Design for Simultaneous Energy and Information Transfer On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter

More information

Delay Performance of Threshold Policies for Dynamic Spectrum Access

Delay Performance of Threshold Policies for Dynamic Spectrum Access IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO. 7, JULY 83 Delay Performance of Threshold Policies for Dynamic Sectrum Access Rong-Rong Chen and Xin Liu Abstract In this aer, we analyze the delay

More information

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS #A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS Ramy F. Taki ElDin Physics and Engineering Mathematics Deartment, Faculty of Engineering, Ain Shams University, Cairo, Egyt

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging 1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014

More information

Algorithms for Air Traffic Flow Management under Stochastic Environments

Algorithms for Air Traffic Flow Management under Stochastic Environments Algorithms for Air Traffic Flow Management under Stochastic Environments Arnab Nilim and Laurent El Ghaoui Abstract A major ortion of the delay in the Air Traffic Management Systems (ATMS) in US arises

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

Using Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor

Using Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor Using Erasure Feedback for Online Timely Updating with an Energy Harvesting Sensor Ahmed Arafa, Jing Yang, Sennur Ulukus 3, and H. Vincent Poor Electrical Engineering Department, Princeton University School

More information

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley Elements of Asymtotic Theory James L. Powell Deartment of Economics University of California, Berkeley Objectives of Asymtotic Theory While exact results are available for, say, the distribution of the

More information

A MONOTONICITY RESULT FOR A G/GI/c QUEUE WITH BALKING OR RENEGING

A MONOTONICITY RESULT FOR A G/GI/c QUEUE WITH BALKING OR RENEGING J. Al. Prob. 43, 1201 1205 (2006) Printed in Israel Alied Probability Trust 2006 A MONOTONICITY RESULT FOR A G/GI/c QUEUE WITH BALKING OR RENEGING SERHAN ZIYA, University of North Carolina HAYRIYE AYHAN

More information

Age-Optimal Constrained Cache Updating

Age-Optimal Constrained Cache Updating 17 IEEE International Symposium on Information Theory (ISIT) -Optimal Constrained Cache Updating Roy D. Yates, Philippe Ciblat, Aylin Yener, Michèle Wigger Rutgers University, USA, ryates@winlab.rutgers.edu

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Recursive Estimation of the Preisach Density function for a Smart Actuator

Recursive Estimation of the Preisach Density function for a Smart Actuator Recursive Estimation of the Preisach Density function for a Smart Actuator Ram V. Iyer Deartment of Mathematics and Statistics, Texas Tech University, Lubbock, TX 7949-142. ABSTRACT The Preisach oerator

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

Minimizing Age of Information with Soft Updates

Minimizing Age of Information with Soft Updates Minimizing Age of Information with Soft Updates Melih Bastopcu Sennur Ulukus arxiv:8.0848v [cs.it] 9 Dec 08 Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

State Estimation with ARMarkov Models

State Estimation with ARMarkov Models Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,

More information

Optimism, Delay and (In)Efficiency in a Stochastic Model of Bargaining

Optimism, Delay and (In)Efficiency in a Stochastic Model of Bargaining Otimism, Delay and In)Efficiency in a Stochastic Model of Bargaining Juan Ortner Boston University Setember 10, 2012 Abstract I study a bilateral bargaining game in which the size of the surlus follows

More information

1 Gambler s Ruin Problem

1 Gambler s Ruin Problem Coyright c 2017 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins

More information

Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges

Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges Age-Minimal Online Policies for Energy Harvesting Sensors with Incremental Battery Recharges Ahmed Arafa, Jing Yang 2, Sennur Ulukus 3, and H. Vincent Poor Electrical Engineering Department, Princeton

More information

On a Markov Game with Incomplete Information

On a Markov Game with Incomplete Information On a Markov Game with Incomlete Information Johannes Hörner, Dinah Rosenberg y, Eilon Solan z and Nicolas Vieille x{ January 24, 26 Abstract We consider an examle of a Markov game with lack of information

More information

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment

More information

3312 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 5, MAY 2016

3312 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 5, MAY 2016 3312 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 5, MAY 2016 L -Problem-Based Transmission Rate Allocation With Packet Loss and Power Metrics Over Satellite Networks Igor Bisio, Senior Member,

More information

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment Neutrosohic Sets and Systems Vol 14 016 93 University of New Mexico Otimal Design of Truss Structures Using a Neutrosohic Number Otimization Model under an Indeterminate Environment Wenzhong Jiang & Jun

More information

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

Developing A Deterioration Probabilistic Model for Rail Wear

Developing A Deterioration Probabilistic Model for Rail Wear International Journal of Traffic and Transortation Engineering 2012, 1(2): 13-18 DOI: 10.5923/j.ijtte.20120102.02 Develoing A Deterioration Probabilistic Model for Rail Wear Jabbar-Ali Zakeri *, Shahrbanoo

More information

Discrete-time Geo/Geo/1 Queue with Negative Customers and Working Breakdowns

Discrete-time Geo/Geo/1 Queue with Negative Customers and Working Breakdowns Discrete-time GeoGeo1 Queue with Negative Customers and Working Breakdowns Tao Li and Liyuan Zhang Abstract This aer considers a discrete-time GeoGeo1 queue with server breakdowns and reairs. If the server

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

Session 5: Review of Classical Astrodynamics

Session 5: Review of Classical Astrodynamics Session 5: Review of Classical Astrodynamics In revious lectures we described in detail the rocess to find the otimal secific imulse for a articular situation. Among the mission requirements that serve

More information

arxiv: v1 [cs.lg] 31 Jul 2014

arxiv: v1 [cs.lg] 31 Jul 2014 Learning Nash Equilibria in Congestion Games Walid Krichene Benjamin Drighès Alexandre M. Bayen arxiv:408.007v [cs.lg] 3 Jul 204 Abstract We study the reeated congestion game, in which multile oulations

More information

A continuous review inventory model with the controllable production rate of the manufacturer

A continuous review inventory model with the controllable production rate of the manufacturer Intl. Trans. in O. Res. 12 (2005) 247 258 INTERNATIONAL TRANSACTIONS IN OERATIONAL RESEARCH A continuous review inventory model with the controllable roduction rate of the manufacturer I. K. Moon and B.

More information

Lecture 6. 2 Recurrence/transience, harmonic functions and martingales

Lecture 6. 2 Recurrence/transience, harmonic functions and martingales Lecture 6 Classification of states We have shown that all states of an irreducible countable state Markov chain must of the same tye. This gives rise to the following classification. Definition. [Classification

More information

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and

More information

A generalization of Amdahl's law and relative conditions of parallelism

A generalization of Amdahl's law and relative conditions of parallelism A generalization of Amdahl's law and relative conditions of arallelism Author: Gianluca Argentini, New Technologies and Models, Riello Grou, Legnago (VR), Italy. E-mail: gianluca.argentini@riellogrou.com

More information

Robust Solutions to Markov Decision Problems

Robust Solutions to Markov Decision Problems Robust Solutions to Markov Decision Problems Arnab Nilim and Laurent El Ghaoui Deartment of Electrical Engineering and Comuter Sciences University of California, Berkeley, CA 94720 nilim@eecs.berkeley.edu,

More information

General Linear Model Introduction, Classes of Linear models and Estimation

General Linear Model Introduction, Classes of Linear models and Estimation Stat 740 General Linear Model Introduction, Classes of Linear models and Estimation An aim of scientific enquiry: To describe or to discover relationshis among events (variables) in the controlled (laboratory)

More information

arxiv: v1 [physics.data-an] 26 Oct 2012

arxiv: v1 [physics.data-an] 26 Oct 2012 Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch

More information

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System Vol.7, No.7 (4),.37-38 htt://dx.doi.org/.457/ica.4.7.7.3 Robust Predictive Control of Inut Constraints and Interference Suression for Semi-Trailer System Zhao, Yang Electronic and Information Technology

More information

Statics and dynamics: some elementary concepts

Statics and dynamics: some elementary concepts 1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and

More information

Vision Graph Construction in Wireless Multimedia Sensor Networks

Vision Graph Construction in Wireless Multimedia Sensor Networks University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Conference and Worksho Paers Comuter Science and Engineering, Deartment of 21 Vision Grah Construction in Wireless Multimedia

More information

q-ary Symmetric Channel for Large q

q-ary Symmetric Channel for Large q List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

Partial Identification in Triangular Systems of Equations with Binary Dependent Variables

Partial Identification in Triangular Systems of Equations with Binary Dependent Variables Partial Identification in Triangular Systems of Equations with Binary Deendent Variables Azeem M. Shaikh Deartment of Economics University of Chicago amshaikh@uchicago.edu Edward J. Vytlacil Deartment

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

Reducing Risk in Convex Order

Reducing Risk in Convex Order Reducing Risk in Convex Order Junnan He a, Qihe Tang b and Huan Zhang b a Deartment of Economics Washington University in St. Louis Camus Box 208, St. Louis MO 6330-4899 b Deartment of Statistics and Actuarial

More information

substantial literature on emirical likelihood indicating that it is widely viewed as a desirable and natural aroach to statistical inference in a vari

substantial literature on emirical likelihood indicating that it is widely viewed as a desirable and natural aroach to statistical inference in a vari Condence tubes for multile quantile lots via emirical likelihood John H.J. Einmahl Eindhoven University of Technology Ian W. McKeague Florida State University May 7, 998 Abstract The nonarametric emirical

More information

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley Elements of Asymtotic Theory James L. Powell Deartment of Economics University of California, Berkeley Objectives of Asymtotic Theory While exact results are available for, say, the distribution of the

More information

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)

More information

Chapter 1 Fundamentals

Chapter 1 Fundamentals Chater Fundamentals. Overview of Thermodynamics Industrial Revolution brought in large scale automation of many tedious tasks which were earlier being erformed through manual or animal labour. Inventors

More information

arxiv: v1 [cs.ro] 24 May 2017

arxiv: v1 [cs.ro] 24 May 2017 A Near-Otimal Searation Princile for Nonlinear Stochastic Systems Arising in Robotic Path Planning and Control Mohammadhussein Rafieisakhaei 1, Suman Chakravorty 2 and P. R. Kumar 1 arxiv:1705.08566v1

More information

1 Probability Spaces and Random Variables

1 Probability Spaces and Random Variables 1 Probability Saces and Random Variables 1.1 Probability saces Ω: samle sace consisting of elementary events (or samle oints). F : the set of events P: robability 1.2 Kolmogorov s axioms Definition 1.2.1

More information

SIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING. Ruhul SARKER. Xin YAO

SIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING. Ruhul SARKER. Xin YAO Yugoslav Journal of Oerations Research 13 (003), Number, 45-59 SIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING Ruhul SARKER School of Comuter Science, The University of New South Wales, ADFA,

More information

Interactive Hypothesis Testing Against Independence

Interactive Hypothesis Testing Against Independence 013 IEEE International Symosium on Information Theory Interactive Hyothesis Testing Against Indeendence Yu Xiang and Young-Han Kim Deartment of Electrical and Comuter Engineering University of California,

More information

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical

More information

6 Stationary Distributions

6 Stationary Distributions 6 Stationary Distributions 6. Definition and Examles Definition 6.. Let {X n } be a Markov chain on S with transition robability matrix P. A distribution π on S is called stationary (or invariant) if π

More information

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels oname manuscrit o. will be inserted by the editor) Quantitative estimates of roagation of chaos for stochastic systems with W, kernels Pierre-Emmanuel Jabin Zhenfu Wang Received: date / Acceted: date Abstract

More information

Stochastic integration II: the Itô integral

Stochastic integration II: the Itô integral 13 Stochastic integration II: the Itô integral We have seen in Lecture 6 how to integrate functions Φ : (, ) L (H, E) with resect to an H-cylindrical Brownian motion W H. In this lecture we address the

More information

Principal Components Analysis and Unsupervised Hebbian Learning

Principal Components Analysis and Unsupervised Hebbian Learning Princial Comonents Analysis and Unsuervised Hebbian Learning Robert Jacobs Deartment of Brain & Cognitive Sciences University of Rochester Rochester, NY 1467, USA August 8, 008 Reference: Much of the material

More information

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment

More information

Elementary theory of L p spaces

Elementary theory of L p spaces CHAPTER 3 Elementary theory of L saces 3.1 Convexity. Jensen, Hölder, Minkowski inequality. We begin with two definitions. A set A R d is said to be convex if, for any x 0, x 1 2 A x = x 0 + (x 1 x 0 )

More information

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino

More information

Optimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI

Optimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI Otimal Power Control over Fading Cognitive Radio Channels by Exloiting Primary User CSI Rui Zhang Abstract arxiv:0804.67v2 [cs.it] 7 Feb 2009 This aer is concerned with sectrum sharing cognitive radio

More information

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes Infinite Series 6.2 Introduction We extend the concet of a finite series, met in Section 6., to the situation in which the number of terms increase without bound. We define what is meant by an infinite

More information

STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS. A Dissertation JAMES ROBERT FISHER

STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS. A Dissertation JAMES ROBERT FISHER STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS A Dissertation by JAMES ROBERT FISHER Submitted to the Office of Graduate Studies of Texas A&M University in artial fulfillment

More information

1-way quantum finite automata: strengths, weaknesses and generalizations

1-way quantum finite automata: strengths, weaknesses and generalizations 1-way quantum finite automata: strengths, weaknesses and generalizations arxiv:quant-h/9802062v3 30 Se 1998 Andris Ambainis UC Berkeley Abstract Rūsiņš Freivalds University of Latvia We study 1-way quantum

More information

k- price auctions and Combination-auctions

k- price auctions and Combination-auctions k- rice auctions and Combination-auctions Martin Mihelich Yan Shu Walnut Algorithms March 6, 219 arxiv:181.3494v3 [q-fin.mf] 5 Mar 219 Abstract We rovide for the first time an exact analytical solution

More information

Delay characterization of multi-hop transmission in a Poisson field of interference

Delay characterization of multi-hop transmission in a Poisson field of interference 1 Delay characterization of multi-ho transmission in a Poisson field of interference Kostas Stamatiou and Martin Haenggi, Senior Member, IEEE Abstract We evaluate the end-to-end delay of a multi-ho transmission

More information

5. PRESSURE AND VELOCITY SPRING Each component of momentum satisfies its own scalar-transport equation. For one cell:

5. PRESSURE AND VELOCITY SPRING Each component of momentum satisfies its own scalar-transport equation. For one cell: 5. PRESSURE AND VELOCITY SPRING 2019 5.1 The momentum equation 5.2 Pressure-velocity couling 5.3 Pressure-correction methods Summary References Examles 5.1 The Momentum Equation Each comonent of momentum

More information

How to Estimate Expected Shortfall When Probabilities Are Known with Interval or Fuzzy Uncertainty

How to Estimate Expected Shortfall When Probabilities Are Known with Interval or Fuzzy Uncertainty How to Estimate Exected Shortfall When Probabilities Are Known with Interval or Fuzzy Uncertainty Christian Servin Information Technology Deartment El Paso Community College El Paso, TX 7995, USA cservin@gmail.com

More information

DETC2003/DAC AN EFFICIENT ALGORITHM FOR CONSTRUCTING OPTIMAL DESIGN OF COMPUTER EXPERIMENTS

DETC2003/DAC AN EFFICIENT ALGORITHM FOR CONSTRUCTING OPTIMAL DESIGN OF COMPUTER EXPERIMENTS Proceedings of DETC 03 ASME 003 Design Engineering Technical Conferences and Comuters and Information in Engineering Conference Chicago, Illinois USA, Setember -6, 003 DETC003/DAC-48760 AN EFFICIENT ALGORITHM

More information

Research Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inputs

Research Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inputs Abstract and Alied Analysis Volume 203 Article ID 97546 5 ages htt://dxdoiorg/055/203/97546 Research Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inuts Hong

More information

An Adaptive Three-bus Power System Equivalent for Estimating Voltage Stability Margin from Synchronized Phasor Measurements

An Adaptive Three-bus Power System Equivalent for Estimating Voltage Stability Margin from Synchronized Phasor Measurements An Adative Three-bus Power System Equivalent for Estimating oltage Stability argin from Synchronized Phasor easurements Fengkai Hu, Kai Sun University of Tennessee Knoxville, TN, USA fengkaihu@utk.edu

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information