Enhancing Energy Efficiency among Communication, Computation and Caching with QoI-Guarantee
|
|
- Kristian Cox
- 5 years ago
- Views:
Transcription
1 Enhancing Energy Efficiency among Communication, Computation and Caching with QoI-Guarantee Faheem Zafari 1, Jian Li 2, Kin K. Leung 1, Don Towsley 2, Ananthram Swami 3 1 Imperial College London 2 University of Massachusetts Amherst 3 US Army Research Laboratory Sept 25, 2017 DAIS-ITA Annual Fall Meeting 2017 Zafari et al. C3 Energy Optimization Sept 25, / 24
2 Motivation Energy is one of the fundamental limitations of sensors Zafari et al. C3 Energy Optimization Sept 25, / 24
3 Motivation Energy is one of the fundamental limitations of sensors Sensors are responsible and consume energy for Communication Computation Caching Zafari et al. C3 Energy Optimization Sept 25, / 24
4 Motivation Energy is one of the fundamental limitations of sensors Sensors are responsible and consume energy for Communication Computation Caching Tradeoffs among communication, computation and caching energy costs Computation (e.g. compression) consumes energy, but may reduce communication energy cost Caching reduces communication cost but also consumes energy Zafari et al. C3 Energy Optimization Sept 25, / 24
5 The Big Question? To achieve desirable tradeoffs How much data compression is needed? Where to cache data optimally? Zafari et al. C3 Energy Optimization Sept 25, / 24
6 Importance of C3 tradeoffs to DAIS-ITA/P1? Coalition infrastructure includes the C3 resources which we need to use efficiently Zafari et al. C3 Energy Optimization Sept 25, / 24
7 Importance of C3 tradeoffs to DAIS-ITA/P1? Coalition infrastructure includes the C3 resources which we need to use efficiently Sensor networks often have limited energy supply = important to optimize energy usage Zafari et al. C3 Energy Optimization Sept 25, / 24
8 Importance of C3 tradeoffs to DAIS-ITA/P1? Coalition infrastructure includes the C3 resources which we need to use efficiently Sensor networks often have limited energy supply = important to optimize energy usage We developed optimization solution for C3 tradeoffs that can be applied to other problems Zafari et al. C3 Energy Optimization Sept 25, / 24
9 Data movement direction System Model Tree network is modeled as a directed graph G = (V, E ) sink node s Cached data S v δ ki K Leaf nodes Data source nodes Tree-Structured Network Zafari et al. C3 Energy Optimization Sept 25, / 24
10 Data movement direction System Model Tree network is modeled as a directed graph G = (V, E ) K V : the set of leaf nodes (data source) with K = K sink node s Cached data S v δ ki K Leaf nodes Data source nodes Tree-Structured Network Zafari et al. C3 Energy Optimization Sept 25, / 24
11 Data movement direction System Model Tree network is modeled as a directed graph G = (V, E ) K V : the set of leaf nodes (data source) with K = K Only leaf nodes k K can generate data of y k bits Cached data S v sink node s δ ki K Leaf nodes Data source nodes Tree-Structured Network Zafari et al. C3 Energy Optimization Sept 25, / 24
12 Data movement direction System Model Tree network is modeled as a directed graph G = (V, E ) K V : the set of leaf nodes (data source) with K = K Only leaf nodes k K can generate data of y k bits Data is transmitted from a leaf node towards the sink node s δ ki Cached data S v sink node s K Leaf nodes Data source nodes Tree-Structured Network Zafari et al. C3 Energy Optimization Sept 25, / 24
13 Data movement direction System Model Tree network is modeled as a directed graph G = (V, E ) K V : the set of leaf nodes (data source) with K = K Only leaf nodes k K can generate data of y k bits Data is transmitted from a leaf node towards the sink node s Data of leaf node k can be compressed before further transmission with δ k,i reduction factor δ ki Cached data K S v Leaf nodes sink node s Data source nodes Tree-Structured Network Zafari et al. C3 Energy Optimization Sept 25, / 24
14 Data movement direction System Model Tree network is modeled as a directed graph G = (V, E ) K V : the set of leaf nodes (data source) with K = K Only leaf nodes k K can generate data of y k bits Data is transmitted from a leaf node towards the sink node s Data of leaf node k can be compressed before further transmission with δ k,i reduction factor Leaf node data can be cached at most in one node along the path towards sink node s δ ki Cached data K S v Leaf nodes sink node Tree-Structured Network s Data source nodes Zafari et al. C3 Energy Optimization Sept 25, / 24
15 Data movement direction System Model The caching capacity at node v V : S v sink node s Cached data S v δ ki K Leaf nodes Data source nodes Tree-Structured Network Zafari et al. C3 Energy Optimization Sept 25, / 24
16 Data movement direction System Model The caching capacity at node v V : S v Caching decision variable for leaf node data k at depth i: b k,i {0, 1} Cached data S v sink node s δ ki K Leaf nodes Data source nodes Tree-Structured Network Zafari et al. C3 Energy Optimization Sept 25, / 24
17 Data movement direction System Model The caching capacity at node v V : S v Caching decision variable for leaf node data k at depth i: b k,i {0, 1} Per-bit transmission, reception and computation energy cost: ε vt, ε vr, and ε vc, define f (δ v ) = ε vr + ε vt δ k,i + ε kc ( 1 δ k,i 1) δ ki Cached data K S v Leaf nodes sink node s Data source nodes Tree-Structured Network Zafari et al. C3 Energy Optimization Sept 25, / 24
18 Data movement direction System Model The caching capacity at node v V : S v Caching decision variable for leaf node data k at depth i: b k,i {0, 1} Per-bit transmission, reception and computation energy cost: ε vt, ε vr, and ε vc, define f (δ v ) = ε vr + ε vt δ k,i + ε kc ( 1 δ k,i 1) During a time period T, R k requests for data y k generated by leaf node k δ ki Cached data K S v Leaf nodes sink node Tree-Structured Network s Data source nodes Zafari et al. C3 Energy Optimization Sept 25, / 24
19 Energy Efficiency Optimization E C : energy for data received, transmitted, and possibly compressed k by all nodes on the path from leaf node k to sink node s E C k y k f (δ k,i ) = h(k) i=0 h(k) m=i+1 δ k,m (1) Zafari et al. C3 Energy Optimization Sept 25, / 24
20 Energy Efficiency Optimization E C : energy for data received, transmitted, and possibly compressed k by all nodes on the path from leaf node k to sink node s E C k y k f (δ k,i ) = h(k) i=0 h(k) m=i+1 δ k,m (1) E R : the total energy consumed in responding to the subsequent k (R k 1) requests E R k = h(k) i=0 { y k (R k 1) f (δ k,i ) + ( h(k) m=i h(k) m=i+1 i 1 ) δ k,m (1 b k,j j=0 } w ca T δ k,m )b k,i ( (R k 1) + ε kt ). (2) Zafari et al. C3 Energy Optimization Sept 25, / 24
21 Energy Efficiency Optimization E total (δ, b) k K ( ) E C k + E R k Non-convex Mixed Integer Nonlinear Programming (MINLP) (3) min δ,b s.t. E total (δ, b) k K δ k,i γ, y k h(k) i=0 b k,i {0, 1}, k K, i = 0,, h(k), k C v b k,h(v ) y k h(v ) j=h(k) δ k,j S v, v V, h(k) b k,i 1, k K. (4) i=0 Zafari et al. C3 Energy Optimization Sept 25, / 24
22 Part 1: Solving the Non-Convex MINLP Problem using our Variant of Spatial Branch and Bound Algorithm (V-SBB) Zafari C3 Energy Optimization September 15, / 24
23 Symbolic Reformulation Reformulated Problem Non-Convex MINLP problem min ψ(x, Y ) s.t. G (X, Y ) 0 H(X, Y ) = 0 X L X X U, X R Y [Y L,..., Y U ] min w s.t. w obj Aw = b w l w w u Y [Y L,..., Y U ] w k w i w j (i, j, k) τ bt w k w i w j (i, j, k) τ lft w k w n i (i, k, n) τ et w k fn(w i ) (i, k) τ uft Zafari C3 Energy Optimization September 15, / 24
24 Spatial Branch-and-Bound BBM example (taken from https: //optimization.mccormick.northwestern.edu/index.php/file:sbb.png) Zafari C3 Energy Optimization September 15, / 24
25 V-SBB Algorithm 1 Variant of Spatial Branch-and-Bound (V-SBB) Step 1: Initialize φ u := and L to a single domain Step 2: Choose a subregion R L using least lower bound rule if L = or R L, φ R,l is infeasible then Go to Step 6 if φ R,l φ u ɛ then Go to Step 5 Step 3: Obtain the upper bound φ R,u if upper bound cannot be obtained or if φ R,u > φ u then Go to Step 4 else φ u :=φ R,u and, from the list L, delete all subregions S L such that φ S,l φ u ɛ if φ R,u φ R,l ɛ then Go to Step 5 Step 4: Partition R into new subregions R right and R left Step 5: Delete R from L and go to Step 2 Step 6: Terminate Search if φ u = then Problem is infeasible else φ u is ɛ-global optimal Decomposes non-linear functions of the original problem symbolically and recursively with simple operators into simple functions Zafari C3 Energy Optimization September 15, / 24
26 Evaluation Parameters used in simulations Parameter Value y k 1000 R k 100 w ca T 10s ε vr ε vt ε cr γ [1, k K y k ] Candidate network topologies used in the experiments Zafari C3 Energy Optimization September 15, / 24
27 Evaluations The Best Solution to the Objective Function (Obj.) and Convergence time for Seven-node network (γ is the required QoI threshold) Method γ = 1 γ = 1000 γ = 2000 γ = 3000 γ = 4000 Obj. Time (s) Obj. Time (s) Obj. Time (s) Obj. Time (s) Obj. Time (s) Bonmin NOMAD GA V-SBB Summary of Results V-SBB outperforms all other algorithms in terms of obtaining better objective value Bonmin is faster but it has infeasibility issue and poor performance for some cases Zafari C3 Energy Optimization September 15, / 24
28 Evaluations Infeasibility: Not being able to find a solution when it exists Infeasibility of Bonmin for different networks Networks (a) (b) (c) (d) Number of testing γ values Number of infeasible solutions Infeasibility (%) Comparison between V-SBB and Bonmin for small γ values in seven-node network Method γ =1 γ =5 γ =50 Obj. Time (s) Obj. Time Obj. Time Bonmin V-SBB Imp. (%) Zafari C3 Energy Optimization September 15, / 24
29 Importance of C3 over C2 tradeoffs Total Energy Cost C3 ( =1000) C3 ( =3000) C2a C2o ( =1000) C20 ( =3000) Comparison of C3 with C Number of Requests Comparison of C3 and C2 optimization for the seven nodes network. Zafari C3 Energy Optimization September 15, / 24
30 Conclusions Formulated energy tradeoffs among communication, computation and caching with QoI guarantee as non-convex MINLP optimization problem Zafari C3 Energy Optimization September 15, / 24
31 Conclusions Formulated energy tradeoffs among communication, computation and caching with QoI guarantee as non-convex MINLP optimization problem Proposed a variant of spatial branch-and-bound (V-SBB) algorithm, which can solve the MINLP with ɛ-optimality guarantee Zafari C3 Energy Optimization September 15, / 24
32 Conclusions Formulated energy tradeoffs among communication, computation and caching with QoI guarantee as non-convex MINLP optimization problem Proposed a variant of spatial branch-and-bound (V-SBB) algorithm, which can solve the MINLP with ɛ-optimality guarantee Observed that C3 optimization improves energy efficiency by as much as 88% compared with either of the C2 optimizations Zafari C3 Energy Optimization September 15, / 24
33 Ongoing Work 1 New formulation: minimize latency with energy constraints Zafari C3 Energy Optimization September 15, / 24
34 Ongoing Work 1 New formulation: minimize latency with energy constraints 2 Design approximate algorithms to these non-convex MINLP problems to achieve a constant approximation ratio in polynomial time Zafari C3 Energy Optimization September 15, / 24
35 Ongoing Work 1 New formulation: minimize latency with energy constraints 2 Design approximate algorithms to these non-convex MINLP problems to achieve a constant approximation ratio in polynomial time 3 Formulate Multi-Objective Optimization (MOO) for Software Defined Coalitions (SDC) Zafari C3 Energy Optimization September 15, / 24
36 Ongoing Work 1 New formulation: minimize latency with energy constraints 2 Design approximate algorithms to these non-convex MINLP problems to achieve a constant approximation ratio in polynomial time 3 Formulate Multi-Objective Optimization (MOO) for Software Defined Coalitions (SDC) Apply Cooperative Game Theory to coalition environment Zafari C3 Energy Optimization September 15, / 24
37 Ongoing Work 1 New formulation: minimize latency with energy constraints 2 Design approximate algorithms to these non-convex MINLP problems to achieve a constant approximation ratio in polynomial time 3 Formulate Multi-Objective Optimization (MOO) for Software Defined Coalitions (SDC) Apply Cooperative Game Theory to coalition environment Explore Trust based regions Zafari C3 Energy Optimization September 15, / 24
38 Thank you! Zafari C3 Energy Optimization September 15, / 24
39 Backup Slides Zafari C3 Energy Optimization September 15, / 24
40 System Model E v : the total energy consumption at node v E v = E vr + E vt + E vc + E vs, (5) E vr = y v ε vr is the reception cost E vt = y v ε vt δ v is the transmission cost E vc = y v ε vc l v (δ v ) is the computation cost E vs = w ca y v T is the storage cost l v (δ v ) :a decreasing differentiable function of the reduction rate, e.g., l v (δ v ) = 1 δ v 1 1 During a time period of T, R k requests for the data y k generated by leaf node k 1 Eswaran, Sharanya, et al. Adaptive in-network processing for bandwidth and energy constrained mission-oriented multihop wireless networks. IEEE Transactions on Mobile Computing 11.9 (2012): Zafari C3 Energy Optimization September 15, / 24
41 Symbolic Reformulation Example We consider k = 1 and h(k) = 1 in (4), i.e., one leaf node and one sink node. Then (1) and (2) reduce to E C 1 = y 1f (δ 1,0 )δ 1,1 + y 1 f (δ 1,1 ), [ ] E R 1 = y w ca T 1(R 1 1) f (δ 1,0 )δ 1,1 + δ 1,0 δ 1,1 b 1,0 ( (R 1 1) + ε 1T ) [ ] w ca T + y 1 (R 1 1) f (δ 1,1 )(1 b 1,0 ) + δ 1,1 b 1,1 ( (R 1 1) + ε 1T ), (6) min δ,b E total (δ, b) = E C 1 + E R 1 s.t. y 1 δ 1,0 δ 1,1 γ, b 1,0, b 1,1 {0, 1}, b 1,0 y 1 δ 1,0 δ 1,1 S 0, b 1,1 y 1 δ 1,1 S 1, b 1,0 + b 1,1 1. (7) Zafari C3 Energy Optimization September 15, / 24
42 Symbolic Reformulation min δ,b s.t. w obj y 1 w bt 1,0 γ, b 1,0, b 1,1 {0, 1}, y 1 w bt 1,0 S 0, y 1 w bt 1,1 S 1, b 1,0 + b 1,1 1, w bt 1,0 = δ 1,1 δ 1,0, w lft 1,0 = δ 1,1/δ 1,0, w bt 1,0 = b 1,0 w b 1,0, w bt 1,1 = b 1,1 δ 1,1, w bt 1,0 = δ 1,1 b 1,0, w lft 1,0 = b 1,0/δ 1,1, w obj = y 1 ε 1R δ 1,1 + ε 1T y 1 w bt 1,0 + y 1ε 1C w lft 1,0 y 1ε 1C δ 1,1 + y 1 ε 1R + ε 1T y 1 δ 1,1 + y 1 ε 1C /δ 1,1 y 1 ε 1C + y 1 (R 1 1) [ ε 1R δ 1,1 + ε 1T w1,0 bt + ε 1C w1,0 lft ε 1C δ 1,1 ] + w ca T w bt 1,0/(R 1 1) + ε 1T w bt 1,0 + y 1 (R 1 1) [ ε 1R + δ 1,1 ε 1T + ε 1C /δ 1,1 ε 1C ε 1R b 1,0 ε 1T w bt 1,0 )] ε 1C w lft 1,0 + ε 1C b 1,0 + w bt 1,1 (w ca T /(R 1 1) + ε 1T (8) Zafari C3 Energy Optimization September 15, / 24
43 Evaluations Objective Function Value Increase in Total Energy Cost with Number of Requests 2 Node Network ( =250) 2 Node Network ( =750) 7 Node Network ( =1000) 7 Node Network ( =3000) Number of Requests Total Energy Costs vs. Number of Requests. Zafari C3 Energy Optimization September 15, / 24
Node Failure Localization: Theorem Proof
Node Failure Localization: Theorem Proof Liang Ma, Ting He, Ananthram Swami, Don Towsley, and Kin K. Leung IBM T. J. Watson Research Center, Yorktown, NY, USA. Email: {maliang, the}@us.ibm.com Army Research
More informationMixed Integer Non Linear Programming
Mixed Integer Non Linear Programming Claudia D Ambrosio CNRS Research Scientist CNRS & LIX, École Polytechnique MPRO PMA 2016-2017 Outline What is a MINLP? Dealing with nonconvexities Global Optimization
More informationOptimal matching in wireless sensor networks
Optimal matching in wireless sensor networks A. Roumy, D. Gesbert INRIA-IRISA, Rennes, France. Institute Eurecom, Sophia Antipolis, France. Abstract We investigate the design of a wireless sensor network
More informationA Branch-and-Refine Method for Nonconvex Mixed-Integer Optimization
A Branch-and-Refine Method for Nonconvex Mixed-Integer Optimization Sven Leyffer 2 Annick Sartenaer 1 Emilie Wanufelle 1 1 University of Namur, Belgium 2 Argonne National Laboratory, USA IMA Workshop,
More informationA Robust Event-Triggered Consensus Strategy for Linear Multi-Agent Systems with Uncertain Network Topology
A Robust Event-Triggered Consensus Strategy for Linear Multi-Agent Systems with Uncertain Network Topology Amir Amini, Amir Asif, Arash Mohammadi Electrical and Computer Engineering,, Montreal, Canada.
More informationDisconnecting Networks via Node Deletions
1 / 27 Disconnecting Networks via Node Deletions Exact Interdiction Models and Algorithms Siqian Shen 1 J. Cole Smith 2 R. Goli 2 1 IOE, University of Michigan 2 ISE, University of Florida 2012 INFORMS
More informationMixed-Integer Nonlinear Programming
Mixed-Integer Nonlinear Programming Claudia D Ambrosio CNRS researcher LIX, École Polytechnique, France pictures taken from slides by Leo Liberti MPRO PMA 2016-2017 Motivating Applications Nonlinear Knapsack
More informationPart 4. Decomposition Algorithms
In the name of God Part 4. 4.4. Column Generation for the Constrained Shortest Path Problem Spring 2010 Instructor: Dr. Masoud Yaghini Constrained Shortest Path Problem Constrained Shortest Path Problem
More informationComputing and Communicating Functions over Sensor Networks
Computing and Communicating Functions over Sensor Networks Solmaz Torabi Dept. of Electrical and Computer Engineering Drexel University solmaz.t@drexel.edu Advisor: Dr. John M. Walsh 1/35 1 Refrences [1]
More informationMINLP: Theory, Algorithms, Applications: Lecture 3, Basics of Algorothms
MINLP: Theory, Algorithms, Applications: Lecture 3, Basics of Algorothms Jeff Linderoth Industrial and Systems Engineering University of Wisconsin-Madison Jonas Schweiger Friedrich-Alexander-Universität
More informationDistributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security
Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security Edmond Nurellari The University of Leeds, UK School of Electronic and Electrical
More informationMinimizing the Service Cost of Mobile Chargers while Maintaining the Perpetual Operations of WRSNs
Minimizing the Service Cost of Mobile Chargers while Maintaining the Perpetual Operations of WRSNs Wenzheng Xu and Weifa Liang Abstract The wireless energy transfer technology based on magnetic resonant
More informationGraph-based codes for flash memory
1/28 Graph-based codes for flash memory Discrete Mathematics Seminar September 3, 2013 Katie Haymaker Joint work with Professor Christine Kelley University of Nebraska-Lincoln 2/28 Outline 1 Background
More informationCooperative HARQ with Poisson Interference and Opportunistic Routing
Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline
More informationcertain class of distributions, any SFQ can be expressed as a set of thresholds on the sufficient statistic. For distributions
Score-Function Quantization for Distributed Estimation Parvathinathan Venkitasubramaniam and Lang Tong School of Electrical and Computer Engineering Cornell University Ithaca, NY 4853 Email: {pv45, lt35}@cornell.edu
More informationSoftware for Integer and Nonlinear Optimization
Software for Integer and Nonlinear Optimization Sven Leyffer, leyffer@mcs.anl.gov Mathematics & Computer Science Division Argonne National Laboratory Roger Fletcher & Jeff Linderoth Advanced Methods and
More information23. Cutting planes and branch & bound
CS/ECE/ISyE 524 Introduction to Optimization Spring 207 8 23. Cutting planes and branch & bound ˆ Algorithms for solving MIPs ˆ Cutting plane methods ˆ Branch and bound methods Laurent Lessard (www.laurentlessard.com)
More informationSums of Products. Pasi Rastas November 15, 2005
Sums of Products Pasi Rastas November 15, 2005 1 Introduction This presentation is mainly based on 1. Bacchus, Dalmao and Pitassi : Algorithms and Complexity results for #SAT and Bayesian inference 2.
More informationCh. 10 Vector Quantization. Advantages & Design
Ch. 10 Vector Quantization Advantages & Design 1 Advantages of VQ There are (at least) 3 main characteristics of VQ that help it outperform SQ: 1. Exploit Correlation within vectors 2. Exploit Shape Flexibility
More informationDownlink Traffic Scheduling in Green Vehicular Roadside Infrastructure
Downlink Traffic Scheduling in Green Vehicular Roadside Infrastructure Abdulla A. Hammad, Terence D. Todd, George Karakostas and Dongmei Zhao Department of Electrical and Computer Engineering McMaster
More informationIntroduction to integer programming II
Introduction to integer programming II Martin Branda Charles University in Prague Faculty of Mathematics and Physics Department of Probability and Mathematical Statistics Computational Aspects of Optimization
More informationInteger Linear Programming (ILP)
Integer Linear Programming (ILP) Zdeněk Hanzálek, Přemysl Šůcha hanzalek@fel.cvut.cz CTU in Prague March 8, 2017 Z. Hanzálek (CTU) Integer Linear Programming (ILP) March 8, 2017 1 / 43 Table of contents
More informationSolving Mixed-Integer Nonlinear Programs
Solving Mixed-Integer Nonlinear Programs (with SCIP) Ambros M. Gleixner Zuse Institute Berlin MATHEON Berlin Mathematical School 5th Porto Meeting on Mathematics for Industry, April 10 11, 2014, Porto
More informationIS-ZC444: ARTIFICIAL INTELLIGENCE
IS-ZC444: ARTIFICIAL INTELLIGENCE Lecture-07: Beyond Classical Search Dr. Kamlesh Tiwari Assistant Professor Department of Computer Science and Information Systems, BITS Pilani, Pilani, Jhunjhunu-333031,
More informationNetwork Flows. 6. Lagrangian Relaxation. Programming. Fall 2010 Instructor: Dr. Masoud Yaghini
In the name of God Network Flows 6. Lagrangian Relaxation 6.3 Lagrangian Relaxation and Integer Programming Fall 2010 Instructor: Dr. Masoud Yaghini Integer Programming Outline Branch-and-Bound Technique
More informationBoolean decision diagrams and SAT-based representations
Boolean decision diagrams and SAT-based representations 4th July 200 So far we have seen Kripke Structures 2 Temporal logics (and their semantics over Kripke structures) 3 Model checking of these structures
More informationDevelopment of an algorithm for solving mixed integer and nonconvex problems arising in electrical supply networks
Development of an algorithm for solving mixed integer and nonconvex problems arising in electrical supply networks E. Wanufelle 1 S. Leyffer 2 A. Sartenaer 1 Ph. Toint 1 1 FUNDP, University of Namur 2
More informationRevenue Maximization in a Cloud Federation
Revenue Maximization in a Cloud Federation Makhlouf Hadji and Djamal Zeghlache September 14th, 2015 IRT SystemX/ Telecom SudParis Makhlouf Hadji Outline of the presentation 01 Introduction 02 03 04 05
More informationOn the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation
On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation Mikael Fallgren Royal Institute of Technology December, 2009 Abstract
More informationCensoring for Improved Sensing Performance in Infrastructure-less Cognitive Radio Networks
Censoring for Improved Sensing Performance in Infrastructure-less Cognitive Radio Networks Mohamed Seif 1 Mohammed Karmoose 2 Moustafa Youssef 3 1 Wireless Intelligent Networks Center (WINC),, Egypt 2
More informationMath Models of OR: Branch-and-Bound
Math Models of OR: Branch-and-Bound John E. Mitchell Department of Mathematical Sciences RPI, Troy, NY 12180 USA November 2018 Mitchell Branch-and-Bound 1 / 15 Branch-and-Bound Outline 1 Branch-and-Bound
More informationDeterministic Global Optimization Algorithm and Nonlinear Dynamics
Deterministic Global Optimization Algorithm and Nonlinear Dynamics C. S. Adjiman and I. Papamichail Centre for Process Systems Engineering Department of Chemical Engineering and Chemical Technology Imperial
More informationThe Budget-Constrained Maximum Flow Problem
9 The Budget-Constrained Maximum Flow Problem In this chapter we consider the following problem which is called the constrained maximum flow problem ( Cmfp) [AO95]: We are given a budget B and we seek
More informationAlgorithm Design CS 515 Fall 2015 Sample Final Exam Solutions
Algorithm Design CS 515 Fall 2015 Sample Final Exam Solutions Copyright c 2015 Andrew Klapper. All rights reserved. 1. For the functions satisfying the following three recurrences, determine which is the
More informationRLT-POS: Reformulation-Linearization Technique (RLT)-based Optimization Software for Polynomial Programming Problems
RLT-POS: Reformulation-Linearization Technique (RLT)-based Optimization Software for Polynomial Programming Problems E. Dalkiran 1 H.D. Sherali 2 1 The Department of Industrial and Systems Engineering,
More informationof a bimatrix game David Avis McGill University Gabriel Rosenberg Yale University Rahul Savani University of Warwick
Finding all Nash equilibria of a bimatrix game David Avis McGill University Gabriel Rosenberg Yale University Rahul Savani University of Warwick Bernhard von Stengel London School of Economics Nash equilibria
More informationEncoder Decoder Design for Event-Triggered Feedback Control over Bandlimited Channels
Encoder Decoder Design for Event-Triggered Feedback Control over Bandlimited Channels LEI BAO, MIKAEL SKOGLUND AND KARL HENRIK JOHANSSON IR-EE- 26: Stockholm 26 Signal Processing School of Electrical Engineering
More informationName (NetID): (1 Point)
CS446: Machine Learning Fall 2016 October 25 th, 2016 This is a closed book exam. Everything you need in order to solve the problems is supplied in the body of this exam. This exam booklet contains four
More informationScheduling Parallel Jobs with Linear Speedup
Scheduling Parallel Jobs with Linear Speedup Alexander Grigoriev and Marc Uetz Maastricht University, Quantitative Economics, P.O.Box 616, 6200 MD Maastricht, The Netherlands. Email: {a.grigoriev, m.uetz}@ke.unimaas.nl
More informationPower Allocation and Coverage for a Relay-Assisted Downlink with Voice Users
Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,
More informationMessage Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs
01 7th International ICST Conference on Communications and Networking in China (CHINACOM) Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs Jiajia Liu Tohoku University Sendai,
More informationEven More on Dynamic Programming
Algorithms & Models of Computation CS/ECE 374, Fall 2017 Even More on Dynamic Programming Lecture 15 Thursday, October 19, 2017 Sariel Har-Peled (UIUC) CS374 1 Fall 2017 1 / 26 Part I Longest Common Subsequence
More informationCollaborative Target Detection in Wireless Sensor Networks with Reactive Mobility
1 / 24 Collaborative Target Detection in Wireless Sensor Networks with Reactive Mobility Rui Tan 1 Guoliang Xing 1 Jianping Wang 1 Hing Cheung So 2 1 Department of Computer Science City University of Hong
More informationIntroduction to Mathematical Programming IE406. Lecture 21. Dr. Ted Ralphs
Introduction to Mathematical Programming IE406 Lecture 21 Dr. Ted Ralphs IE406 Lecture 21 1 Reading for This Lecture Bertsimas Sections 10.2, 10.3, 11.1, 11.2 IE406 Lecture 21 2 Branch and Bound Branch
More informationOn Two Class-Constrained Versions of the Multiple Knapsack Problem
On Two Class-Constrained Versions of the Multiple Knapsack Problem Hadas Shachnai Tami Tamir Department of Computer Science The Technion, Haifa 32000, Israel Abstract We study two variants of the classic
More informationShortest Link Scheduling with Power Control under Physical Interference Model
2010 Sixth International Conference on Mobile Ad-hoc and Sensor Networks Shortest Link Scheduling with Power Control under Physical Interference Model Peng-Jun Wan Xiaohua Xu Department of Computer Science
More informationGeometric Semantic Genetic Programming (GSGP): theory-laden design of semantic mutation operators
Geometric Semantic Genetic Programming (GSGP): theory-laden design of semantic mutation operators Andrea Mambrini 1 University of Birmingham, Birmingham UK 6th June 2013 1 / 33 Andrea Mambrini GSGP: theory-laden
More informationOptimizing Mobile Computational Offloading with Delay Constraints
Optimizing Mobile Computational Offloading with Delay Constraints Yi-Hsuan Kao Department of Electrical Engineering University of Southern California Los Angeles, California 90089, USA Email: yihsuank@usc.edu
More informationDistributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach
Distributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach Ning Li, Student Member, IEEE, Jose-Fernan Martinez-Ortega, Gregorio Rubio Abstract-
More informationModels and Cuts for the Two-Echelon Vehicle Routing Problem
Models and Cuts for the Two-Echelon Vehicle Routing Problem Guido Perboli Roberto Tadei Francesco Masoero Department of Control and Computer Engineering, Politecnico di Torino Corso Duca degli Abruzzi,
More informationQUANTIZATION FOR DISTRIBUTED ESTIMATION IN LARGE SCALE SENSOR NETWORKS
QUANTIZATION FOR DISTRIBUTED ESTIMATION IN LARGE SCALE SENSOR NETWORKS Parvathinathan Venkitasubramaniam, Gökhan Mergen, Lang Tong and Ananthram Swami ABSTRACT We study the problem of quantization for
More informationLecture #8: We now take up the concept of dynamic programming again using examples.
Lecture #8: 0.0.1 Dynamic Programming:(Chapter 15) We now take up the concept of dynamic programming again using examples. Example 1 (Chapter 15.2) Matrix Chain Multiplication INPUT: An Ordered set of
More informationCS320 The knapsack problem
CS320 The knapsack problem 1 Search and Discrete Optimization Discrete Optimization Problem (S,f) S: space of feasible solutions (satisfying some constraints) f : S R function that maps all feasible solutions
More informationQueue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling
1 Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling Saswati Sarkar and Koushik Kar Abstract In this paper, we consider queue-length stability in wireless
More informationFundamental rate delay tradeoffs in multipath routed and network coded networks
Fundamental rate delay tradeoffs in multipath routed and network coded networks John Walsh and Steven Weber Drexel University, Dept of ECE Philadelphia, PA 94 {jwalsh,sweber}@ecedrexeledu IP networks subject
More informationIntroduction to Wireless & Mobile Systems. Chapter 4. Channel Coding and Error Control Cengage Learning Engineering. All Rights Reserved.
Introduction to Wireless & Mobile Systems Chapter 4 Channel Coding and Error Control 1 Outline Introduction Block Codes Cyclic Codes CRC (Cyclic Redundancy Check) Convolutional Codes Interleaving Information
More informationComputational and Statistical Learning theory
Computational and Statistical Learning theory Problem set 2 Due: January 31st Email solutions to : karthik at ttic dot edu Notation : Input space : X Label space : Y = {±1} Sample : (x 1, y 1,..., (x n,
More informationGiuseppe Bianchi, Ilenia Tinnirello
Capacity of WLAN Networs Summary Per-node throughput in case of: Full connected networs each node sees all the others Generic networ topology not all nodes are visible Performance Analysis of single-hop
More informationMultivalued Decision Diagrams. Postoptimality Analysis Using. J. N. Hooker. Tarik Hadzic. Cork Constraint Computation Centre
Postoptimality Analysis Using Multivalued Decision Diagrams Tarik Hadzic Cork Constraint Computation Centre J. N. Hooker Carnegie Mellon University London School of Economics June 2008 Postoptimality Analysis
More informationDecision Trees. Lewis Fishgold. (Material in these slides adapted from Ray Mooney's slides on Decision Trees)
Decision Trees Lewis Fishgold (Material in these slides adapted from Ray Mooney's slides on Decision Trees) Classification using Decision Trees Nodes test features, there is one branch for each value of
More information0-1 Knapsack Problem in parallel Progetto del corso di Calcolo Parallelo AA
0-1 Knapsack Problem in parallel Progetto del corso di Calcolo Parallelo AA 2008-09 Salvatore Orlando 1 0-1 Knapsack problem N objects, j=1,..,n Each kind of item j has a value p j and a weight w j (single
More informationA fast algorithm for the Kolakoski sequence
A fast algorithm for the Kolakoski sequence Richard P. Brent Australian National University and University of Newcastle 13 December 2016 (updated 30 Dec. 2016) Joint work with Judy-anne Osborn The Kolakoski
More informationCS Algorithms and Complexity
CS 50 - Algorithms and Complexity Linear Programming, the Simplex Method, and Hard Problems Sean Anderson 2/15/18 Portland State University Table of contents 1. The Simplex Method 2. The Graph Problem
More informationMixed Integer Programming Solvers: from Where to Where. Andrea Lodi University of Bologna, Italy
Mixed Integer Programming Solvers: from Where to Where Andrea Lodi University of Bologna, Italy andrea.lodi@unibo.it November 30, 2011 @ Explanatory Workshop on Locational Analysis, Sevilla A. Lodi, MIP
More information12. LOCAL SEARCH. gradient descent Metropolis algorithm Hopfield neural networks maximum cut Nash equilibria
12. LOCAL SEARCH gradient descent Metropolis algorithm Hopfield neural networks maximum cut Nash equilibria Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley h ttp://www.cs.princeton.edu/~wayne/kleinberg-tardos
More informationVoI for Learning and Inference! in Sensor Networks!
ARO MURI on Value-centered Information Theory for Adaptive Learning, Inference, Tracking, and Exploitation VoI for Learning and Inference in Sensor Networks Gene Whipps 1,2, Emre Ertin 2, Randy Moses 2
More informationSpeeding up the Dreyfus-Wagner Algorithm for minimum Steiner trees
Speeding up the Dreyfus-Wagner Algorithm for minimum Steiner trees Bernhard Fuchs Center for Applied Computer Science Cologne (ZAIK) University of Cologne, Weyertal 80, 50931 Köln, Germany Walter Kern
More informationLecture 4 : Adaptive source coding algorithms
Lecture 4 : Adaptive source coding algorithms February 2, 28 Information Theory Outline 1. Motivation ; 2. adaptive Huffman encoding ; 3. Gallager and Knuth s method ; 4. Dictionary methods : Lempel-Ziv
More informationRaptor Codes: From a Math Idea to LTE embms. BIRS, October 2015
Raptor Codes: From a Math Idea to LTE embms BIRS, October 2015 The plan is to... 1 introduce LT codes and Raptor codes 2 provide insights into their design 3 address some common misconceptions 2 / 31 The
More informationINF4130: Dynamic Programming September 2, 2014 DRAFT version
INF4130: Dynamic Programming September 2, 2014 DRAFT version In the textbook: Ch. 9, and Section 20.5 Chapter 9 can also be found at the home page for INF4130 These slides were originally made by Petter
More informationOn the Sizes of Decision Diagrams Representing the Set of All Parse Trees of a Context-free Grammar
Proceedings of Machine Learning Research vol 73:153-164, 2017 AMBN 2017 On the Sizes of Decision Diagrams Representing the Set of All Parse Trees of a Context-free Grammar Kei Amii Kyoto University Kyoto
More informationVLSI Signal Processing
VLSI Signal Processing Lecture 1 Pipelining & Retiming ADSP Lecture1 - Pipelining & Retiming (cwliu@twins.ee.nctu.edu.tw) 1-1 Introduction DSP System Real time requirement Data driven synchronized by data
More information3. Branching Algorithms COMP6741: Parameterized and Exact Computation
3. Branching Algorithms COMP6741: Parameterized and Exact Computation Serge Gaspers 12 1 School of Computer Science and Engineering, UNSW Australia 2 Optimisation Resarch Group, NICTA Semester 2, 2015
More informationLecture and notes by: Alessio Guerrieri and Wei Jin Bloom filters and Hashing
Bloom filters and Hashing 1 Introduction The Bloom filter, conceived by Burton H. Bloom in 1970, is a space-efficient probabilistic data structure that is used to test whether an element is a member of
More informationNetwork Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast. Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas
Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas Slides are partially based on the joint work of Christos Litsas, Aris Pagourtzis,
More informationMulti-criteria approximation schemes for the resource constrained shortest path problem
Noname manuscript No. (will be inserted by the editor) Multi-criteria approximation schemes for the resource constrained shortest path problem Markó Horváth Tamás Kis Received: date / Accepted: date Abstract
More informationAn Reformulation-Linearization Technique-based Approach to Joint Topology Design and Load Balancing in FSO Networks
An Reformulation-Linearization Technique-based Approach to Joint Topology Design and Load Balancing in FSO Networks In Keun Son and Shiwen Mao Department of Electrical and Computer Engineering, Auburn
More informationCircuits. Lecture 11 Uniform Circuit Complexity
Circuits Lecture 11 Uniform Circuit Complexity 1 Recall 2 Recall Non-uniform complexity 2 Recall Non-uniform complexity P/1 Decidable 2 Recall Non-uniform complexity P/1 Decidable NP P/log NP = P 2 Recall
More informationBinary Decision Diagrams and Symbolic Model Checking
Binary Decision Diagrams and Symbolic Model Checking Randy Bryant Ed Clarke Ken McMillan Allen Emerson CMU CMU Cadence U Texas http://www.cs.cmu.edu/~bryant Binary Decision Diagrams Restricted Form of
More informationOn Randomized Network Coding
On Randomized Network Coding Tracey Ho, Muriel Médard, Jun Shi, Michelle Effros and David R. Karger Massachusetts Institute of Technology, University of California, Los Angeles, California Institute of
More informationOn the Relationship between Transmission Power and Capacity of an Underwater Acoustic Communication Channel
On the Relationship between Transmission Power and Capacity of an Underwater Acoustic Communication Channel Daniel E. Lucani LIDS, MIT Cambridge, Massachusetts, 02139 Email: dlucani@mit.edu Milica Stojanovic
More informationAdvanced linear programming
Advanced linear programming http://www.staff.science.uu.nl/~akker103/alp/ Chapter 10: Integer linear programming models Marjan van den Akker 1 Intro. Marjan van den Akker Master Mathematics TU/e PhD Mathematics
More informationAsynchronous Non-Convex Optimization For Separable Problem
Asynchronous Non-Convex Optimization For Separable Problem Sandeep Kumar and Ketan Rajawat Dept. of Electrical Engineering, IIT Kanpur Uttar Pradesh, India Distributed Optimization A general multi-agent
More informationLinear Codes, Target Function Classes, and Network Computing Capacity
Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, and Kenneth Zeger IEEE Transactions on Information Theory Submitted:
More informationRobust Optimal Discrete Arc Sizing for Tree-Shaped Potential Networks
Robust Optimal Discrete Arc Sizing for Tree-Shaped Potential Networks Martin Robinius, Lars Schewe, Martin Schmidt, Detlef Stolten, Johannes Thürauf, Lara Welder Abstract. We consider the problem of discrete
More informationCommunication constraints and latency in Networked Control Systems
Communication constraints and latency in Networked Control Systems João P. Hespanha Center for Control Engineering and Computation University of California Santa Barbara In collaboration with Antonio Ortega
More informationarxiv: v2 [cs.ds] 3 Oct 2017
Orthogonal Vectors Indexing Isaac Goldstein 1, Moshe Lewenstein 1, and Ely Porat 1 1 Bar-Ilan University, Ramat Gan, Israel {goldshi,moshe,porately}@cs.biu.ac.il arxiv:1710.00586v2 [cs.ds] 3 Oct 2017 Abstract
More informationSource Coding and Function Computation: Optimal Rate in Zero-Error and Vanishing Zero-Error Regime
Source Coding and Function Computation: Optimal Rate in Zero-Error and Vanishing Zero-Error Regime Solmaz Torabi Dept. of Electrical and Computer Engineering Drexel University st669@drexel.edu Advisor:
More informationOn the Relationship between Transmission Power and Capacity of an Underwater Acoustic Communication Channel
On the Relationship between Transmission Power and Capacity of an Underwater Acoustic Communication Channel Daniel E. Lucani LIDS, MIT Cambridge, Massachusetts, 02139 Email: dlucani@mit.edu Milica Stojanovic
More informationEntropy as a measure of surprise
Entropy as a measure of surprise Lecture 5: Sam Roweis September 26, 25 What does information do? It removes uncertainty. Information Conveyed = Uncertainty Removed = Surprise Yielded. How should we quantify
More informationNumerical Optimization. Review: Unconstrained Optimization
Numerical Optimization Finding the best feasible solution Edward P. Gatzke Department of Chemical Engineering University of South Carolina Ed Gatzke (USC CHE ) Numerical Optimization ECHE 589, Spring 2011
More informationLecture 23 Branch-and-Bound Algorithm. November 3, 2009
Branch-and-Bound Algorithm November 3, 2009 Outline Lecture 23 Modeling aspect: Either-Or requirement Special ILPs: Totally unimodular matrices Branch-and-Bound Algorithm Underlying idea Terminology Formal
More informationStructured Problems and Algorithms
Integer and quadratic optimization problems Dept. of Engg. and Comp. Sci., Univ. of Cal., Davis Aug. 13, 2010 Table of contents Outline 1 2 3 Benefits of Structured Problems Optimization problems may become
More informationLecture 8: Shannon s Noise Models
Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007) Lecture 8: Shannon s Noise Models September 14, 2007 Lecturer: Atri Rudra Scribe: Sandipan Kundu& Atri Rudra Till now we have
More informationBasic notions of Mixed Integer Non-Linear Programming
Basic notions of Mixed Integer Non-Linear Programming Claudia D Ambrosio CNRS & LIX, École Polytechnique 5th Porto Meeting on Mathematics for Industry, April 10, 2014 C. D Ambrosio (CNRS) April 10, 2014
More informationTransmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations
Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Xiaolu Zhang, Meixia Tao and Chun Sum Ng Department of Electrical and Computer Engineering National
More informationThe Polymatroid Steiner Problems
The Polymatroid Steiner Problems G. Calinescu 1 and A. Zelikovsky 2 1 Department of Computer Science, Illinois Institute of Technology, Chicago, IL 60616. E-mail: calinesc@iit.edu. 2 Department of Computer
More informationBounds on the OBDD-Size of Integer Multiplication via Universal Hashing
Bounds on the OBDD-Size of Integer Multiplication via Universal Hashing Philipp Woelfel Dept. of Computer Science University Dortmund D-44221 Dortmund Germany phone: +49 231 755-2120 fax: +49 231 755-2047
More informationResearch Article Scheduling Algorithm: Tasks Scheduling Algorithm for Multiple Processors with Dynamic Reassignment
Hindawi Publishing Corporation Journal of Computer Systems, Networks, and Communications Volume 008, Article ID 57880, 9 pages doi:0.55/008/57880 Research Article Scheduling Algorithm: Tasks Scheduling
More informationThree-partition Flow Cover Inequalities for Constant Capacity Fixed-charge Network Flow Problems
Three-partition Flow Cover Inequalities for Constant Capacity Fixed-charge Network Flow Problems Alper Atamtürk, Andrés Gómez Department of Industrial Engineering & Operations Research, University of California,
More information