Cloud-Aided Interference Management with Cache-Enabled Edge Nodes and Users

Size: px
Start display at page:

Download "Cloud-Aided Interference Management with Cache-Enabled Edge Nodes and Users"

Transcription

1 F arxiv: v [cs.it] 0 Jan 09 C F ireless nel Clou-Aie Interference Management with Cache-Enable Ege Noes an Users Seye Pooya Shariatpanahi,, Jingjing Zhang 3, Osvalo Simeone 3, Babak Hossein Khalaj 4, Mohamma-Ali Maah-Ali 5. School of Electrical an Computer Engineering, University of Tehran, Tehran, Iran. School of Computer Science, Institute for Research in Funamental Sciences (IPM, Tehran, Iran 3. Department of Informatics, King s College Lonon, Lonon, UK 4. Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran 5. Nokia Bell Labs, Holmel, NJ, USA Abstract This paper consiers a clou-ran architecture with cache-enable multi-antenna Ege Noes (ENs that eliver content to cache-enable en-users. The ENs are connecte to a central server via limite-capacity fronthaul links, an, base on the information receive from the central server an the cache contents, they transmit on the share wireless meium to satisfy users requests. By leveraging cooperative transmission as enable by ENs caches an fronthaul links, as well as multicasting opportunities provie by users caches, a close-tooptimal caching an elivery scheme is propose. As a result, the minimum Normalize Delivery Time (NDT, a high-snr measure of elivery latency, is characterize to within a multiplicative constant gap of 3/ uner the assumption of uncoe caching an fronthaul transmission, an of one-shot linear precoing. This result emonstrates the interplay among fronthaul links capacity, ENs caches, an en-users caches in minimizing the content elivery time. nt K R I. INTRODUCTION Caching content at the network ege can mitigate the heavy traffic buren at network peak times. Contents are proactively store in caches at the Ege Noes (ENs or at the enusers uring low-traffic perios, relieving network congestion at peak hours [], []. Ege caching at the ENs can enable Clou cooperative wireles transmission in the presence of share cache contents across multiple ENs [4], [9], [4]. In contrast, m(μ, r caching of share content at the users enables the multicasting EN ENof p coe EN q information EN n EN that KT is useful simultaneously for multiple users [5] [8]. m(μ, Inr practice, not all contents can be cache, an requeste uncache contents shoul be fetche from a central server through m(μ, r finite-capacity m(μ, fronthaul r links. This more general set- illustratein βfig., was stuie in [9] [] (see also βup, cache reference therein uncache in the absence of users caches. These references consier as the performance metric of interest the (b μk overall T m elivery min (r latency, incluing both fronthaul an wireless contributions. In particular, in prior works [4] [5], the elivery latency is measure in the high Signal-to-Noise Ratio (SNR regime. While [9] [] allow any form of elivery strategy, incluing interference alignment, in [], the optimal high-snr latency performance is stuie uner the assumption that wireless transmission can only use practical one-shot Library Fronthaul Caches Ege Noes En Users r Clou r Share Wireless Channel K R r Fig.. Clou-RAN system with cache-enable ENs an en-users. linear precoing strategies. Reference [] presents a cachingfronthaul-wireless transmission scheme that is shown to be latency-optimal within a multiplicative factor of 3/. In this paper, we exten the results in [] by allowing caching not only at the ENs but also at the en-users. To this en, we consier the clou-ran Clou scenario in Fig. an evaluate the impact of both cooperative transmission opportunities at the ENs an multicasting opportunities brought by caching at the users. Caching at the users has, in fact, EN EN m(μ,r EN q EN n EN two potentially beneficial effects on the network KT performance. First, since users have alreay cache some parts of the library, m(μ, r m(μ, r they nee not receive from the network the cache portion of the requeste file this isiknown as j the local F C caching gain. Secon, as assume, by a careful cache content placement, a common coe message can cache benefit more than one user, which is known as the global caching gain [5]. Assuming that entire library is cache (a μkacross T m min ENs (r an users an that the fronthaul links are absent, reference [4] prove that the gains accrue form cooperative transmission by the ENs an the global caching gain provie by users caches are aitive. Here, we generalize this conclusion by consiering the role of finite-capacity fronthaul links an by allowing for partial caching of the library of popular files across ENs an users. μ R μ T caches caches EN W n EN W n W n W n3

2 The rest of the paper is organize as follows. In Section II we escribe the system moel. Section III presents the main results along with an intuitive iscussion. In Section IV we etail the propose caching an elivery scheme. Then, we erive a converse in Section V, which is prove to be within a multiplicative gap of 3/ as compare to the high- SNR performance achievable by the propose scheme. Finally, Section VI conclues the paper. II. SYSTEM MODEL We consier a content elivery scenario, illustrate in Fig., in which Ege Noes (ENs, each with antennas, eliver requeste contents to K R single-antenna users via a share wireless meium. The contents library inclues N files, each of L bits, which are collecte in set W {W,..., W N }. Furthermore, each file W n is ivie into F packets, collecte in the set W n {W nf } F f, where F is an arbitrary integer an each packet consists of L/F bits. Each EN is connecte to a central server, where the library resies, via a wire fronhaul link of capacity C F bits per symbol of the wireless channel. Moreover, each EN is equippe with a cache of size µ T N files, for µ T. In this paper, in contrast to [], we assume that the users are also cache-enable, each with a cache of size µ R N files, for µ R. Henceforth, for simplicity, we assume that both µ T an µ R K R are integers, with extensions following irectly as in [9], [], [4] The system operation inclues two phases, namely the cache content placement an content elivery phases. In the first phase, each EN an each user caches uncoe fractions of the files in the library at network off-peak traffic hours an without knowing the actual requests of the users in the next phase. In the secon phase, at network peak traffic hours, at any transmission slot, each active user requests access to one of the files in the library, i.e., user k {,..., K R } requests file W k, k {,..., N}. For elivery, first, the clou sens on each fronthaul link some uncoe fractions of the requeste files to the ENs. For more general ways to use the fronthaul links, we refer to [9]. After fronthaul transmission, the ENs collaboratively eliver the requeste contents to the users via the ege wireless ownlink channel base on the cache contents an fronthaul signals. The signal receive by each user k on the ownlink channel is given as y k h H kix i + z k, ( in which h ki C is the complex representation of the faing channel vector from EN i to user k; x i C is the transmitte vector from EN i; z k is unit-power aitive Gaussian noise; an (. H represents the Hermitian transpose. The faing channels are rawn from a continuous istribution an are constant in each transmission slot. The transmission power of each EN is constraine by E [ x i ] SNR. Furthermore, as in [], [4], the ENs transmit using oneshot linear precoing, so that the vector transmitte by each EN at time slot t is given as x i v inf s nf, ( (n,f where s nf is a symbol encoing file fraction W nf, an v inf is the corresponing beamforming vector. Furthermore, we assume that Channel State Information (CSI is available to all the entities in the network. The performance metric of interest is the Normalize Delivery Time (NDT introuce in [9], which measures the high-snr latency ue to fronthaul an wireless transmissions. To this en, we write C F r log SNR, hence allowing the fronthaul capacity to scale with the wireless ege SNR with a scaling constant r 0. Then, enoting the time require to complete the fronthaul an wireless ege transmissions as T F a E (measure in symbol perios of the wireless channel respectively, the total NDT is efine as the following limit over SNR an file size F + E (3 ( lim lim E[TF ] SNR L L/log(SNR + E[T E ]. L/log(SNR In (3, the term L/log(SNR represents the normalizing elivery time on an interference-free channel; the term F lim SNR lim L E[T F ]/(L/log(SNR is efine as the fronthaul NDT; an E lim SNR lim L E[T E ]/(L/log(SNR as the ege NDT. Accoringly, for given clou an caching resources efine by the triple (r, µ T, µ R, the minimal NDT over all achievable policies is efine as (r, µ T, µ R inf{(r, µ T, µ R : (r, µ T, µ R is achievable}, (4 where the infimum is over all uncoe caching, uncoe fronthaul, an one-shot linear ege transmissions policies that ensure reliable elivery for any set of requeste files [9], []. III. MAIN RESULT In this section we state our main result an its implications. We procee by first proposing an achievable scheme an then proving its optimality within a constant multiplicative gap. In the cache content placement phase, the scheme follows the stanar approach of sharing a istinct fraction of a file to all subsets of µ T ENs an µ R K R users, hence satisfying the cache capacity constraints [4]. As a result, each fraction of any requeste file is available at m R µ R K R users, which we efine as receive-sie multiplicity, an at µ T ENs. As we will see, in the content elivery phase, the transmit-sie multiplicity m T, i.e., the number of ENs at which any fraction of a requeste files is available, can be increase beyon µ T by means of fronthaul transmission.

3 NDT As prove in [4], an briefly reviewe below, the content multiplicities m T an m R can be leverage in orer to erive a elivery scheme that serves simultaneously u(m T, m R min(k R, m T + m R (5 users at the maximum high-snr rate of log(snr. Unlike [4], however, here the transmit-sie multiplicity m T is not fixe, since any uncache fraction of a file can be elivere to an EN by the clou on the fronthaul. The multiplicity m T can be hence increase at the cost of a larger fronthaul elay F. Therefore, the multiplicity m T shoul be chosen carefully, by accounting for the fronthaul latency F as well as for the wireless NDT E, which ecreases with the size of the number u(m T, m R of users that can be serve simultaneously. Our main result below obtains an approximately optimal solution in terms of minimum NDT. Before etailing the main result, we briefly present how the scheme in [4] serves u(m T, m R users simultaneously at rate log(snr by leveraging both multicasting an cooperative Zero-Forcing (ZF precoing. Assume that m T +m R K R (the complement case follows in a similar way. At any given time, m T + m R ENs transmit simultaneously to eliver fractions of the requeste files to m T + m R users. To this en, the active ENs are groupe into all subsets of m T active ENs. Note that there are ( m T +m R m T such groups, an that each EN generally belongs to multiple groups. All groups transmit at the same time, with each group elivering collaboratively a share fraction of a file to the requesting user. Transmission by a group is one within the null space of the channel of other m T active users by means of Zero-Forcing (ZF one-shot linear precoing. The interference create by this transmission to the remaining m R active users is remove by leveraging the information in the receive-sie caches. This is possible since the caching strategy ensures that the message transmitte by a group of m T ENs is also available to m R users. Note that the scheme in [4] assumes, but the extension escribe above is straightforwar. Base on the above mentione achievable scheme, along with an optimize transmit-sie multiplicity, the following theorem characterizes the minimum NDT (4 to within a multiplicative constant equal to 3/. Theorem (Multiplicative gap on minimum NDT. The NDT up (r, µ T, µ R K R (m(r, µ T, µ R µ T + K R ( µ R + min {K R, m(r, µ T, µ R + K R µ R } (6 is achievable, where m(r, µ R if µ T < m(r, µ R, m(r, µ T, µ R µ T if m(r, µ R µ T m max, m max if µ T > m max, (7 [ ] an ( µ R r n m(r, µ R T K Rµ R if r < r th, (8 m max if r r th, Achievable NDT Lower boun Fig.. Achievable NDT up(r, µ R, µ T an lower boun (r, µ R, µ T versus µ T for ifferent values of µ T an, with, K R 4 an r 4. with an r th ( m max + K Rµ R, (9 ( µ R { m max min, KR ( µ R Moreover, the minimum NDT satisfies the inequalities }. (0 3 up(r, µ T, µ R (r, µ T, µ R up (r, µ T, µ R. ( Theorem implies that the multiplicity m T m(r, µ R, µ T in (7 is optimal in terms of NDT, up to a constant multiplicative gap. Importantly, in contrast to [], the choice of m T in (7 epens also on the caching capacity µ R at the users, an it reuces to selection in [] when µ R 0. The first term in (6 is the fronthaul NDT F require to convey the uncache portions of files to achieve the esire multiplicity m T m(r, µ T, µ R in (7. The secon term is the ege transmission NDT E, which accounts for the local caching gain (i.e., ( µ R, an for the combine global caching gain ue to the users caches an for the cooperation gain ue to the ENs caches an to fronthaul transmission (i.e., m+k R µ R. The result hence generalizes the main conclusion from [3] an [4] that the gains from coe caching multicasting opportunities at the receive sie an cooperation at the transmit sie are aitive. Example. The achievable NDT up (r, µ T, µ R in (6, along with the lower boun (r, µ T, µ R erive in Lemma in Section V, are plotte in Fig. as a function of the users cache capacity µ R for ifferent values of the parameters, r an µ T. We set the number of ENs an users to an K R 4 an the fronthaul rate to r 4. Note that for non-integer values of µ R K R, the achievable NDT is obtaine by memory sharing between the receive-sie multiplicities µ R K R an µ R K R [6]. It is observe that caching at the en-users is more effective when the number of EN transmit antennas an/or the transmit-sie caches are small. Furthermore, when the transmit-sie multiplicity is sufficient to serve all K R users at the same time, en-user caching only provies local caching gains. In particular, this happens when µ T 6 an 4, in which case the NDT is seen to ecrease linearly with µ R K R.

4 IV. ACHIEVABLE SCHEME The achievable scheme generalizes the strategies propose in [] an [4] by accounting for fronthaul transmission an for the caches available at the users. As iscusse in Section III, the cache content placement phase uses the same approach propose in [4], which guarantees content replication of µ T an m R µ R K R at the transmit an receive sies, respectively. In the content elivery phase, fronthaul transmission provies packets from the requeste files to the ENs in orer to increase the transmit-sie multiplicity m T to the esire value m. This is at the cost of the fronthaul elay F (m K R (m µ T +, ( given that (m µ T + L bits nee to be elivere for each requeste file (see also []. Base on the multiplicities m R an m T, the number of users that can be serve at the same time is (5. Since each user has cache a ( µ R -fraction of its requeste file, the ege NDT is given by [] E (m K R( µ R. (3 u(m The transmit-sie multiplicity m T m shoul be tune such that the total elivery latency E (m + F (m is minimize. First, we etermine the maximum possible multiplicity m max from the following necessary conitions m, m + K R µ R K R, (4 which result in m max given in (0. To procee, we first focus on the case of µ T 0, an fin a close-to-optimal multiplicity m(r, µ R. Then, base on the expression for m(r, µ R, we propose a specific choice for the multiplicity for the general case where µ T 0. To start, in the case when µ T 0, from ( an (3, the total NDT is (m K Rm + K R( µ R. (5 u(m In orer to optimize over m, we fin the (only stationary point for function (5 as ( µ R r m 0 K Rµ R. (6 We then approximate the integer solution of the original problem to be the nearest positive integer smaller than m max, yieling (8. For the general case µ T 0, we propose the choice (7 for the transmit-sie multiplicity. Accoringly, when µ T < m(r, µ R, an hence the transmit-sie caches are small, packets are sent over the fronthaul links so that the aggregate multiplicity is equal to the value m(r, µ R selecte above when µ T 0. For the case µ T m(r, µ R, instea, the transmit-sie multiplicity (7 only relies on EN caching, an fronthaul transmission is not carrie out. In particular, Fig. 3. Transmit-sie multiplicity m(r, µ T, µ R in (7 versus K R µ R for, K R 4, µ T 4 an ifferent values of r. when µ T m max, the maximum multiplicity m max can be guarantee irectly by EN caching. Theorem emonstrates the near-optimality of this choice. As illustration for how the user cache capacity µ R K R affects transmit-sie multiplicity m(r, µ T, µ R is shown in Fig. 3 for, K R 4, µ T 4. As µ R K R increases, user-sie caching becomes more effective, an less EN-sie cooperation is neee to null out interference. Accoringly, the transmit-sie multiplicity ecreases with µ R K R, an it epens on r only when µ R K R is sufficiently small. V. MULTIPLICATIVE OPTIMALITY In this section we emonstrate that the achievable NDT iheorem is within a multiplicative constant gap of the minimum NDT by proving (. To this en, we exten the converse proof evelope in [] in orer to account for the presence of users caches. First, without loss of generality, consier a split of each file W n into ( K R subsets of packets W n {W nτt τ R }, such that each part W nτt τ R is inexe by the subsets of inices τ T [ ]\{ } an τ R [K R ]. The subset W nτt τ R inclues the packets of W n that are present at all the ENs i τ T after fronthaul transmissions an at all the users j τ R. We also efine τ R as the number of packets of file W n that are cache at all the ENs in τ T, an at all the users in τ R ; f nτt τ R ( to be number of packets from file W n that are transmitte to all the users in τ T via the fronthaul for a given eman vector an cache at all the users in τ R. Note that these quantities are well-efine for every policy. With these efinitions, NDT of any achievable policy can be lower boune by the solution to the following optimization problem: (a min { τ R } {f nτt τ R (} subject (b (c N n to i τ T max K R K R E ({ τ R (}, + F ( + f nτt τ R ( F, n, (7 τ R µ T F N, i [ ]

5 ( (e N n F r j τ R n i τ T K R + f nτt τ R ( µ R F N, j [K R ], f nτt τ R ( F (, i [ ], (f{ τ R, f nτt τ R (} 0, 0 F ( Fmax, (8 where function E ({c nτ T τ R (}, is implicitly efine as the minimum ege NDT in (3 for given cache an fronthaul policies when the request vector is, while F ( is a function for that satisfies conitions (e an (f. We have also efine Fmax K R(m max µ T +. (9 In (7, the equality (b guarantees the availability of all the requeste files; inequalities (c are ue to the fact that the size of the cache content of each EN i [ ] is limite by the cache capacity µ T F N; similarly, inequalities ( enforce the cache capacity constraint at each user j [K R ]; inequalities (e follow from the efinition of fronthaul NDT in (3, since the left-han sie is the number of packets sent to EN i via the fronthaul link; in (f, F ( is upper boune by F max since the maximum multiplicity is m max an hence the total number of bits require via fronthaul is K R (m max µ T +. In (7, the expression of function E ({c nτ T τ R (}, is generally unknown. Notwithstaning this complication, the following Lemma gives a lower boun to the solution of the above optimization problem. Proof can be foun in Appenix A. Lemma. The minimum value of the optimization problem in (7 is lower boune by f(x K R (x µ T + K R( µ R x + µ R K R, (0 where we have efine x K R ib ij, fnτt τ R an b ij :n f nτ T τ R ( K R π(n, K R, N. ( n Finally, the following lemma analyzes the gap between the lower boun erive in Lemma an the upper boun (6, completing the proof of Theorem. A proof can be foun in Appenix B. Lemma. Function f(x in (0 is lower boune by 3 up(r, µ T, µ R, where up (r, µ T, µ R is given iheorem. VI. CONCLUSIONS For a cache-enable clou-ran architecture where both the ENs an the en-users have caches, this paper has characterize the minimum elivery latency in the high-snr to within a multiplicative gap of 3/. Uner the practical constraint that the ENs can only transmit using one-shot linear precoing, the main result shows that the cooperation gains accrue by EN cooperation via EN caching an fronthaul transmission are aitive with respect to the multicasting gains offere by en-user caching. ACKNOWLEDGEMENTS Jingjing Zhang an Osvalo Simeone have receive funing from the European Research Council (ERC uner the European Union s Horizon 00 Research an Innovation Programme (Grant Agreement No REFERENCES [] J. Kangasharju, J. Roberts, an K. Ross, Object Replication Strategies in Content Distribution Networks, Computer Communications, vol. 38, no. 4, pp , 00. [] E. Nygren, R.K. Sitaraman, an J. Sun. The Akamai Network: A platform for high-performance Internet application, ACM SIGOPS Operating Systems Review, vol. 44, no. 3, pp. 9, 00. [3] K. Shanmugam, N. Golrezaei, A. G. Dimakis, A. F. Molisch an G. Caire, FemtoCaching: Wireless Content Delivery Through Distribute Caching Helpers, IEEE Trans. Inf. Theory, vol. 59, no., pp , Dec. 03. [4] A. Liu an V. K. N. Lau, Exploiting Base Station Caching in MIMO Cellular Networks: Opportunistic Cooperation for Vieo Streaming, IEEE Trans. Signal Process., vol. 63, no., pp , Jan. 05. [5] M. A. Maah-Ali an U. Niesen, Funamental limits of caching, IEEE Trans. Inf. Theory, vol. 60, no. 5, pp , 04. [6] N. Karamchanani, U. Niesen, M. A. Maah-Ali, an S. N. Diggavi, Hierarchical Coe Caching, IEEE Trans. Inf. Theory, vol. 6, no. 6, pp. 3 39, 06. [7] R. Pearsani, M. A. Maah-Ali an U. Niesen, Online Coe Caching, IEEE/ACM Trans. Netw., vol. 4, no., pp , April 06. [8] J. Zhang an P. Elia, Funamental limits of cache-aie wireless BC: Interplay of coe-caching an CSIT feeback, IEEE Trans. Inf. Theory, vol. 63, no. 5, pp , 07. [9] A. Sengupta, R. Tanon, an O. Simeone, Fog-aie wireless networks for content elivery: Funamental latency traeoffs, IEEE Trans. Inf. Theory, vol. 63, no. 0, pp , Oct. 07. [0] R. Tanon an O. Simeone, Clou-aie wireless networks with ege caching: Funamental latency trae-offs in fog raio access networks, in Proc. IEEE Int. Symp. on Inf. Theory (ISIT, pp , 06. [] S. M. Azimi, O. Simeone, A. Sengupta, an R. Tanon, Online Ege Caching in Fog-Aie Wireless Network, in Proc. IEEE Int. Symp. on Inf. Theory (ISIT, pp. 7, 07. [] J. Zhang, O. Simeone, Funamental Limits of Clou an Cache-Aie Interference Management with Multi-Antenna Base Stations in Proc. IEEE Int. Symp. on Inf. Theory (ISIT, pp , 08. [3] S. P. Shariatpanahi, S. A. Motahari an B. H. Khalaj, Multi-Server Coe Caching, IEEE Trans. Inf. Theory, vol. 6, no., pp , Dec. 06. [4] N. Naerializaeh, M. A. Maah-Ali an A. S. Avestimehr, Funamental Limits of Cache-Aie Interference Management, IEEE Trans. Inf. Theory, vol. 63, no. 5, pp , May 07. [5] M. A. Maah-Ali an U. Niesen, Cache-aie interference channels, in Proc. IEEE Int. Symp. on Inf. Theory (ISIT, pp , 05. [6] H. Ghasemi an A.Ramamoorthy, Improve Lower Bouns for Coe Caching, IEEE Trans. Inf. Theory, vol. 63, no. 7, pp , July, 07.

6 APPENDIX A PROOF OF LEMMA To prove Lemma, we substitute the maximum over all the possible request vectors in the objective of (7 with an average over them. The solution of the resulting problem yiels a lower boun to the solution of the orginal problem. Mathematically, the objective (a in (7 is substitute with min { τ R } {f nτt τ R (} π(n, K R ( [ E ({ τ R (}, + F (], where we have efine π(n, K R N! /(N K R!. In orer to eal with the unknown function E ({c nτ T τ R (},, we nee the following lemma. Lemma 3. Define τ T l as the subset of ege noes that have access to the packet W nl f l after the fronhaul transmission, an τ Rl as the subset of users that have cache the packet W nl f l. Then, the number u of users that can be serve at the same time is upper boune by u min l [u] τ T l + τ Rl. (3 Proof. This lemma is generalization of Lemma in [] to the case where we have cache at the users. The main proof is consiering the role of receivers caches in a similar way as in Lemma 3 of [4], an the rest of the proof is the same. Using the above lemma we will have the following lower boun on the minimum ege NDT: E ({ τ R (}, ( µ R F K R K R k c k τ T τ R + f k τ T τ R (, i + j (4 respectively. Now we lower boun the first term in ( as π(n, K R K R k E ({ τ R (}, (a µ R F π(n, K R K R k K R (b µ R F π(n, K R K R( µ R K R K R K R (c K R( µ R ( K R( µ R (e K R( µ R K R i + j µ R F π(n, K R c k τ T τ R + f k τ T τ R ( i + j (c k τ T τ R + f k τ T τ R ( K R π(n, K R i + j N n i + j N n ( KT KT KT b ij i + j K R ( µ R KT KR ib ij + KR b ij KR (i + jb ij ( KR (i + jb ij KT KR jb, ij where (a hols because of Lemma 3; in (b we have efine :n f nτt τ R f nτ T τ R ( K R π(n, K R ; (5 in (c we have efine b ij N ; (6 n in ( we have use the inequality i,j u ij v ij i,j u ij i,j v ij ; (7 since at most i + j users can be serve simultaneously when the multiplicities at the ENs an the users are i an j, with u ij b ij /(i + j an v ij b ij (i + j; an finally (e results from the equality KR b ij.

7 This results from summing up (8b for all π(n, K R request vectors an for all K R files in each request vector as follows: π(n, K R K R F (8 n K R K R π(n, K R N K R n K R π(n, K R K R + f nτt τ R ( N n K R K R π(n, K R b ij. Now we lower boun for the term relate to the fronthaul elay as follows: π(n, K R F ( (9 π(n, K R F r n i π(n, K R F r i π(n, K R F r K R i N F r n i τ T K R π(n, K R N n K R K R i N F r b ij K R (a K R K R f nτt ib ij N n i K R ib ij µ T, f nτt ( f nτt ( N n f nτt N n in which we have efine f nτt f nτt K R K R K R τ R f nτt τ R f nτt τ R, an in (a we have use the following inequality ue to the ege noes cache size constraint in (8c µ T F N N n N n N i n i (30 i τ T N. n Finally, we can a up the terms corresponing to the lower bouns for the elay an ege NDT to arrive at the NDT lower boun K R K R ib ij µ T + (3 K R ( µ R KT KR ib ij + KT KR jb ij K R (x µ T + K R( µ R, x + µ R K R in which we have efine x K R ib ij, (3 an have use the following inequality ue to cache size constraint at the users state in (8 K R jb ij (33 K R j j µ R K R. N n

8 APPENDIX B PROOF OF LEMMA To prove the inequality f(x up (r, µ T, µ R /3, we first focus on the minimum f min of f(x. To this en, we first erive the omain of function f(x. From (7 an (9, we can have the inequalities K R (x µ T /( F ( F max. Hence, the maximum value of x is given as x max max{m max, µ T }. We also have the inequality KT KR ib ij ue to the equality KR b ij in (8. This yiels the necessary conition x. Also because x 0, the minimum value is given as x min max{µ T, }. Hence, x lies in the interval [x min, x max ]. Since function f(x is convex for x > 0, an the only stationary point is x m 0, i.e., f (m 0 0, where we have m 0 ( µ R r/ K R µ R /. Therefore, the esire minimum f min is given as { f(m0, if x f min min m 0 x max min{f(x min, f(x max }, otherwise, (34 which can be rewritten as K R (m (r,µ R µ T + K f min R ( µ R m (µ R,r +µ R K R, : µ < m (r, µ R K R ( µ R µ T +µ R K R, : µ m (µ R, r (35 where we have efine m (r, µ R { max{m 0, } : r < r th, m max : r r th. (36 As a result, if we can prove the inequality f min up (r, µ T, µ R /3, then Lemma hols immeiately. Since f min is quite intractable, we turn to choose a simpler function, enote as lb (r, µ T, µ R that satisfies lb (r, µ T, µ R lb (r, µ T, µ R, where we have efine lb (r, µ T, µ R f min. The lower boun lb (r, µ T, µ R is given as lb(r, µ T, µ R ( (i + µt K R ( µ R + (µ T i (i + + µ R K R (i + + µ R K R (37 for µ T [i, i +, with m(r, µ R i m max ; an lb(r, µ T, µ R { KR (m (r,µ R µ T + K R ( µ R m (r,µ R +µ R K R, K R (m(r,µ R µ T + lb (r, m(r,µ R, µ R, (38 for µ T m(r, µ R, an the first expression is for the regime m (r [(m(r, µ R 0.5, m(r, µ R ], while the secon expression is for the regime m (r [m(r, µ R, (m(r, µ R + 0.5], where m (r, µ R is given in (36. To procee, we now prove the inequality lb (r, µ T, µ R lb (r, µ T, µ R. Proof. Since m(r, µ R is the nearest integer point of m 0 when r < r th, we have the inequality m(r, µ R + > m 0, yieling m(r, µ R + > m (r, µ R for this range of r. Furthermore, we also have m(r, µ R m (r, µ R when r r th. Hence, the inequality m(r, µ R + m (r, µ R hols for any value of r. As a result, for any sub-interval µ [i, i +, with m(r, µ R + i m max, lb (r, µ T, µ R, i.e., f min, is given as K R ( µ R /(µ T +µ R K R from (35 since µ T m (r, µ R. By simple comparison between the above lb (r, µ T, µ R an lb (r, µ T, µ R in (37, we have the inequality lb (r, µ T, µ R lb (r, µ T, µ R. For the remaining interval µ istinguish the following two cases. m(r, µ R +, we Case : m (r, µ R [(m(r, µ R 0.5, m(r, µ R ]. Hence, we have the inequality m (r, µ R m(r, µ R. For interval µ T [m(r, µ R, m(r, µ R + ], the inequality lb (r, µ T, µ R lb (r, µ T, µ R hols with the same reason as above. Moveover, by comparison, we have that lb (r, µ T, µ R in (38 is equal to lb (r, µ T, µ R in (35 for µ m (r, µ R. Instea, for µ [m (r, µ R, m(r, µ R ], since both lb (r, µ T, µ R in (38 an lb (r, µ T, µ R K R ( µ R /(µ T + µ R K R are ecreasing functions of µ T, they are equal for µ T m (r, µ R, an the former has a smaller graient for the whole range of value of µ T at han, we have lb (r, µ T, µ R lb (r, µ T, µ R. Case : m (r, µ R [m(r, µ R, (m(r, µ R + 0.5]. In this range, the inequality m (r, µ R m(r, µ R hols immeiately. For interval µ T [m(r, µ R, m(r, µ R + ], since both lb (r, µ T, µ R in (38 an lb (r, µ T, µ R are ecreasing functions of µ T, they are equal for µ T m(r, µ R +, an the former has a smaller graient, we have lb (r, µ T, µ R lb (r, µ T, µ R. This hols also for the value µ T m(r, µ R. Combining this with the fact that lb (r, µ T, µ R in (38 an lb (r, µ T, µ R in (35 are linear an parallel for µ T m(r, µ R, we have lb (r, m(r, µ R/, µ R lb (r, µ T, µ R in this range. To complete the proof, we procee to prove the multiplicative gap between the upper boun up (r, µ T, µ R (6 an the lower boun lb (r, µ T, µ R. For µ T [i, i +, with m(r, µ R i m max, we have up (r, µ T, µ R lb (r, µ T, µ R + (a up(r, µ T i/, µ R lb (r, µ T i/, µ R (i + K R µ R ((i K R µ R 3, (39 where inequality (a hols because up (r, µ T, µ R an lb (r, µ T, µ R are both linearly ecreasing an they coincie at the enpoint µ T i +. For µ T m(r, µ R in

9 Case, the gap is given as up (r, µ T, µ R lb (r, µ T, µ R (b (a up(r, µ T m(r, µ R /, µ R lb (r, µ T m(r, µ R /, µ R m(r,µ R +µ R K R m (r,µ R m(r,µ R + m (r,µ R +µ R K R /p(m(r, µ R /p(m (r, µ R p(m(r, µ R /p(m (r, µ R (c /4 + (m(r, µ R + µ R K R (m(r, µ R + µ R K R ( 3, where inequality (a hols because up (r, µ T, µ R an lb (r, µ T, µ R ecrease with the same slope an the maximum ratio is at the enpoint µ T m(r, µ R ; equality (b hols ue to the efinition of p(x x + µ R K R an m (r, µ R ; inequality (c hols ue to the constraints m (r, µ R [(m(r 0.5, m(r]; an inequality ( hols for any m(r, while for m(r, we have / [0, ] an µ [0, ]. With simple comparison, we can get up (r, µ T, µ R lb (r, µ T, µ R. Finally, for µ m(r in Case, the gap is given as up (r, µ T, µ R lb (r, µ T, µ R + (a up(r, µ T m(r, µ R /, µ R lb (r, µ T m(r, µ R /, µ R (m(r, µ R + K R µ R ((m(r, µ R K R µ R 3, (4 where inequality (a hols as inequality (a in (39. This completes the proof.

Fundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Edge Nodes

Fundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Edge Nodes Fundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Edge Nodes Jingjing Zhang and Osvaldo Simeone arxiv:72.04266v4 [cs.it] 2 Mar 208 Abstract In fog-aided cellular systems,

More information

Capacity Analysis of MIMO Systems with Unknown Channel State Information

Capacity Analysis of MIMO Systems with Unknown Channel State Information Capacity Analysis of MIMO Systems with Unknown Channel State Information Jun Zheng an Bhaskar D. Rao Dept. of Electrical an Computer Engineering University of California at San Diego e-mail: juzheng@ucs.eu,

More information

A New Converse Bound for Coded Caching

A New Converse Bound for Coded Caching A ew Converse Boun for Coe Caching Chien-Yi Wang, Sung Hoon Lim, an Michael Gastpar School of Computer an Communication Sciences EPFL Lausanne, Switzerlan {chien-yiwang, sunglim, michaelgastpar}@epflch

More information

Fundamental Limits on Latency in Small-Cell Caching Systems: An Information-Theoretic Analysis

Fundamental Limits on Latency in Small-Cell Caching Systems: An Information-Theoretic Analysis Fundamental Limits on Latency in Small-ell aching Systems: An Information-Theoretic Analysis Seyyed Mohammadreza Azimi, Osvaldo Simeone, and Ravi Tandon Abstract aching of popular multimedia content at

More information

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs Lectures - Week 10 Introuction to Orinary Differential Equations (ODES) First Orer Linear ODEs When stuying ODEs we are consiering functions of one inepenent variable, e.g., f(x), where x is the inepenent

More information

New Bounds for Distributed Storage Systems with Secure Repair

New Bounds for Distributed Storage Systems with Secure Repair New Bouns for Distribute Storage Systems with Secure Repair Ravi Tanon 1 an Soheil Mohajer 1 Discovery Analytics Center & Department of Computer Science, Virginia Tech, Blacksburg, VA Department of Electrical

More information

An Analytical Expression of the Probability of Error for Relaying with Decode-and-forward

An Analytical Expression of the Probability of Error for Relaying with Decode-and-forward An Analytical Expression of the Probability of Error for Relaying with Decoe-an-forwar Alexanre Graell i Amat an Ingmar Lan Department of Electronics, Institut TELECOM-TELECOM Bretagne, Brest, France Email:

More information

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

On the Aloha throughput-fairness tradeoff

On the Aloha throughput-fairness tradeoff On the Aloha throughput-fairness traeoff 1 Nan Xie, Member, IEEE, an Steven Weber, Senior Member, IEEE Abstract arxiv:1605.01557v1 [cs.it] 5 May 2016 A well-known inner boun of the stability region of

More information

Space-time Linear Dispersion Using Coordinate Interleaving

Space-time Linear Dispersion Using Coordinate Interleaving Space-time Linear Dispersion Using Coorinate Interleaving Jinsong Wu an Steven D Blostein Department of Electrical an Computer Engineering Queen s University, Kingston, Ontario, Canaa, K7L3N6 Email: wujs@ieeeorg

More information

On Characterizing the Delay-Performance of Wireless Scheduling Algorithms

On Characterizing the Delay-Performance of Wireless Scheduling Algorithms On Characterizing the Delay-Performance of Wireless Scheuling Algorithms Xiaojun Lin Center for Wireless Systems an Applications School of Electrical an Computer Engineering, Purue University West Lafayette,

More information

Cloud and Cache-Aided Wireless Networks: Fundamental Latency Trade-Offs

Cloud and Cache-Aided Wireless Networks: Fundamental Latency Trade-Offs Cloud and Cache-Aided Wireless Networks: Fundamental Latency Trade-Offs Avik Sengupta, Student Member, IEEE, Ravi Tandon, Member, IEEE, Osvaldo Simeone, Fellow, IEEE Abstract A cloud and cache-aided wireless

More information

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device Close an Open Loop Optimal Control of Buffer an Energy of a Wireless Device V. S. Borkar School of Technology an Computer Science TIFR, umbai, Inia. borkar@tifr.res.in A. A. Kherani B. J. Prabhu INRIA

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

6 General properties of an autonomous system of two first order ODE

6 General properties of an autonomous system of two first order ODE 6 General properties of an autonomous system of two first orer ODE Here we embark on stuying the autonomous system of two first orer ifferential equations of the form ẋ 1 = f 1 (, x 2 ), ẋ 2 = f 2 (, x

More information

Control-Data Separation across Edge and Cloud for Uplink Communications in C-RAN

Control-Data Separation across Edge and Cloud for Uplink Communications in C-RAN 1 Control-Data Separation across Ege an Clou for Uplink Communications in C-RAN Jinkyu Kang, Osvalo Simeone, Joonhyuk Kang an Shlomo Shamai (Shitz) School of Engineering an Applie Sciences, Harvar University,

More information

Lyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering,

Lyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering, On the Queue-Overflow Probability of Wireless Systems : A New Approach Combining Large Deviations with Lyapunov Functions V. J. Venkataramanan an Xiaojun Lin Center for Wireless Systems an Applications

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an

More information

K User Interference Channel with Backhaul

K User Interference Channel with Backhaul 1 K User Interference Channel with Backhaul Cooperation: DoF vs. Backhaul Load Trade Off Borna Kananian,, Mohammad A. Maddah-Ali,, Babak H. Khalaj, Department of Electrical Engineering, Sharif University

More information

Schrödinger s equation.

Schrödinger s equation. Physics 342 Lecture 5 Schröinger s Equation Lecture 5 Physics 342 Quantum Mechanics I Wenesay, February 3r, 2010 Toay we iscuss Schröinger s equation an show that it supports the basic interpretation of

More information

Laplacian Cooperative Attitude Control of Multiple Rigid Bodies

Laplacian Cooperative Attitude Control of Multiple Rigid Bodies Laplacian Cooperative Attitue Control of Multiple Rigi Boies Dimos V. Dimarogonas, Panagiotis Tsiotras an Kostas J. Kyriakopoulos Abstract Motivate by the fact that linear controllers can stabilize the

More information

A. Incorrect! The letter t does not appear in the expression of the given integral

A. Incorrect! The letter t does not appear in the expression of the given integral AP Physics C - Problem Drill 1: The Funamental Theorem of Calculus Question No. 1 of 1 Instruction: (1) Rea the problem statement an answer choices carefully () Work the problems on paper as neee (3) Question

More information

Agmon Kolmogorov Inequalities on l 2 (Z d )

Agmon Kolmogorov Inequalities on l 2 (Z d ) Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,

More information

JUST THE MATHS UNIT NUMBER DIFFERENTIATION 2 (Rates of change) A.J.Hobson

JUST THE MATHS UNIT NUMBER DIFFERENTIATION 2 (Rates of change) A.J.Hobson JUST THE MATHS UNIT NUMBER 10.2 DIFFERENTIATION 2 (Rates of change) by A.J.Hobson 10.2.1 Introuction 10.2.2 Average rates of change 10.2.3 Instantaneous rates of change 10.2.4 Derivatives 10.2.5 Exercises

More information

Hybrid Centralized-Distributed Resource Allocation for Device-to-Device Communication Underlaying Cellular Networks

Hybrid Centralized-Distributed Resource Allocation for Device-to-Device Communication Underlaying Cellular Networks Hybri Centralize-Distribute Resource Allocation for Device-to-Device Communication Unerlaying Cellular Networks 1 arxiv:1502.04539v1 [cs.gt] 16 Feb 2015 Setareh Maghsui an Sławomir Stańczak, Senior Member,

More information

Qubit channels that achieve capacity with two states

Qubit channels that achieve capacity with two states Qubit channels that achieve capacity with two states Dominic W. Berry Department of Physics, The University of Queenslan, Brisbane, Queenslan 4072, Australia Receive 22 December 2004; publishe 22 March

More information

arxiv: v1 [cs.it] 21 Aug 2017

arxiv: v1 [cs.it] 21 Aug 2017 Performance Gains of Optimal Antenna Deployment for Massive MIMO ystems Erem Koyuncu Department of Electrical an Computer Engineering, University of Illinois at Chicago arxiv:708.06400v [cs.it] 2 Aug 207

More information

Chapter 6: Energy-Momentum Tensors

Chapter 6: Energy-Momentum Tensors 49 Chapter 6: Energy-Momentum Tensors This chapter outlines the general theory of energy an momentum conservation in terms of energy-momentum tensors, then applies these ieas to the case of Bohm's moel.

More information

Iterated Point-Line Configurations Grow Doubly-Exponentially

Iterated Point-Line Configurations Grow Doubly-Exponentially Iterate Point-Line Configurations Grow Doubly-Exponentially Joshua Cooper an Mark Walters July 9, 008 Abstract Begin with a set of four points in the real plane in general position. A to this collection

More information

Throughput Optimal Control of Cooperative Relay Networks

Throughput Optimal Control of Cooperative Relay Networks hroughput Optimal Control of Cooperative Relay Networks Emun Yeh Dept. of Electrical Engineering Yale University New Haven, C 06520, USA E-mail: emun.yeh@yale.eu Ranall Berry Dept. of Electrical an Computer

More information

Lower Bounds for the Smoothed Number of Pareto optimal Solutions

Lower Bounds for the Smoothed Number of Pareto optimal Solutions Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.

More information

Tractability results for weighted Banach spaces of smooth functions

Tractability results for weighted Banach spaces of smooth functions Tractability results for weighte Banach spaces of smooth functions Markus Weimar Mathematisches Institut, Universität Jena Ernst-Abbe-Platz 2, 07740 Jena, Germany email: markus.weimar@uni-jena.e March

More information

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes Leaving Ranomness to Nature: -Dimensional Prouct Coes through the lens of Generalize-LDPC coes Tavor Baharav, Kannan Ramchanran Dept. of Electrical Engineering an Computer Sciences, U.C. Berkeley {tavorb,

More information

Delay Limited Capacity of Ad hoc Networks: Asymptotically Optimal Transmission and Relaying Strategy

Delay Limited Capacity of Ad hoc Networks: Asymptotically Optimal Transmission and Relaying Strategy Delay Limite Capacity of A hoc Networks: Asymptotically Optimal Transmission an Relaying Strategy Eugene Perevalov Lehigh University Bethlehem, PA 85 Email: eup2@lehigh.eu Rick Blum Lehigh University Bethlehem,

More information

Calculus of Variations

Calculus of Variations 16.323 Lecture 5 Calculus of Variations Calculus of Variations Most books cover this material well, but Kirk Chapter 4 oes a particularly nice job. x(t) x* x*+ αδx (1) x*- αδx (1) αδx (1) αδx (1) t f t

More information

Online Appendix for Trade Policy under Monopolistic Competition with Firm Selection

Online Appendix for Trade Policy under Monopolistic Competition with Firm Selection Online Appenix for Trae Policy uner Monopolistic Competition with Firm Selection Kyle Bagwell Stanfor University an NBER Seung Hoon Lee Georgia Institute of Technology September 6, 2018 In this Online

More information

II. First variation of functionals

II. First variation of functionals II. First variation of functionals The erivative of a function being zero is a necessary conition for the etremum of that function in orinary calculus. Let us now tackle the question of the equivalent

More information

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel /33 Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel Presented by Paul de Kerret Joint work with Antonio Bazco, Nicolas Gresset, and David Gesbert ESIT 2017 in Madrid,

More information

Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University

Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Joint work with Jinbei Zhang (SJTU), Chih-Chun Wang (Purdue) and Xinbing Wang (SJTU)

More information

The total derivative. Chapter Lagrangian and Eulerian approaches

The total derivative. Chapter Lagrangian and Eulerian approaches Chapter 5 The total erivative 51 Lagrangian an Eulerian approaches The representation of a flui through scalar or vector fiels means that each physical quantity uner consieration is escribe as a function

More information

Sliding mode approach to congestion control in connection-oriented communication networks

Sliding mode approach to congestion control in connection-oriented communication networks JOURNAL OF APPLIED COMPUTER SCIENCE Vol. xx. No xx (200x), pp. xx-xx Sliing moe approach to congestion control in connection-oriente communication networks Anrzej Bartoszewicz, Justyna Żuk Technical University

More information

PDE Notes, Lecture #11

PDE Notes, Lecture #11 PDE Notes, Lecture # from Professor Jalal Shatah s Lectures Febuary 9th, 2009 Sobolev Spaces Recall that for u L loc we can efine the weak erivative Du by Du, φ := udφ φ C0 If v L loc such that Du, φ =

More information

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Backorders Under the (R,r) Policy

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Backorders Under the (R,r) Policy IPA Derivatives for Make-to-Stock Prouction-Inventory Systems With Backorers Uner the (Rr) Policy Yihong Fan a Benamin Melame b Yao Zhao c Yorai Wari Abstract This paper aresses Infinitesimal Perturbation

More information

Perturbation Analysis and Optimization of Stochastic Flow Networks

Perturbation Analysis and Optimization of Stochastic Flow Networks IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. XX, NO. Y, MMM 2004 1 Perturbation Analysis an Optimization of Stochastic Flow Networks Gang Sun, Christos G. Cassanras, Yorai Wari, Christos G. Panayiotou,

More information

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control 19 Eigenvalues, Eigenvectors, Orinary Differential Equations, an Control This section introuces eigenvalues an eigenvectors of a matrix, an iscusses the role of the eigenvalues in etermining the behavior

More information

arxiv: v1 [physics.flu-dyn] 8 May 2014

arxiv: v1 [physics.flu-dyn] 8 May 2014 Energetics of a flui uner the Boussinesq approximation arxiv:1405.1921v1 [physics.flu-yn] 8 May 2014 Kiyoshi Maruyama Department of Earth an Ocean Sciences, National Defense Acaemy, Yokosuka, Kanagawa

More information

Diagonalization of Matrices Dr. E. Jacobs

Diagonalization of Matrices Dr. E. Jacobs Diagonalization of Matrices Dr. E. Jacobs One of the very interesting lessons in this course is how certain algebraic techniques can be use to solve ifferential equations. The purpose of these notes is

More information

The Press-Schechter mass function

The Press-Schechter mass function The Press-Schechter mass function To state the obvious: It is important to relate our theories to what we can observe. We have looke at linear perturbation theory, an we have consiere a simple moel for

More information

Logarithmic spurious regressions

Logarithmic spurious regressions Logarithmic spurious regressions Robert M. e Jong Michigan State University February 5, 22 Abstract Spurious regressions, i.e. regressions in which an integrate process is regresse on another integrate

More information

Conservation Laws. Chapter Conservation of Energy

Conservation Laws. Chapter Conservation of Energy 20 Chapter 3 Conservation Laws In orer to check the physical consistency of the above set of equations governing Maxwell-Lorentz electroynamics [(2.10) an (2.12) or (1.65) an (1.68)], we examine the action

More information

Math 1271 Solutions for Fall 2005 Final Exam

Math 1271 Solutions for Fall 2005 Final Exam Math 7 Solutions for Fall 5 Final Eam ) Since the equation + y = e y cannot be rearrange algebraically in orer to write y as an eplicit function of, we must instea ifferentiate this relation implicitly

More information

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d A new proof of the sharpness of the phase transition for Bernoulli percolation on Z Hugo Duminil-Copin an Vincent Tassion October 8, 205 Abstract We provie a new proof of the sharpness of the phase transition

More information

The derivative of a function f(x) is another function, defined in terms of a limiting expression: f(x + δx) f(x)

The derivative of a function f(x) is another function, defined in terms of a limiting expression: f(x + δx) f(x) Y. D. Chong (2016) MH2801: Complex Methos for the Sciences 1. Derivatives The erivative of a function f(x) is another function, efine in terms of a limiting expression: f (x) f (x) lim x δx 0 f(x + δx)

More information

On the Broadcast Capacity of Multihop Wireless Networks: Interplay of Power, Density and Interference

On the Broadcast Capacity of Multihop Wireless Networks: Interplay of Power, Density and Interference On the Broacast Capacity of Multihop Wireless Networks: Interplay of Power, Density an Interference Alireza Keshavarz-Haa Ruolf Riei Department of Electrical an Computer Engineering an Department of Statistics

More information

Implicit Differentiation

Implicit Differentiation Implicit Differentiation Thus far, the functions we have been concerne with have been efine explicitly. A function is efine explicitly if the output is given irectly in terms of the input. For instance,

More information

Node Density and Delay in Large-Scale Wireless Networks with Unreliable Links

Node Density and Delay in Large-Scale Wireless Networks with Unreliable Links Noe Density an Delay in Large-Scale Wireless Networks with Unreliable Links Shizhen Zhao, Xinbing Wang Department of Electronic Engineering Shanghai Jiao Tong University, China Email: {shizhenzhao,xwang}@sjtu.eu.cn

More information

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy,

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy, NOTES ON EULER-BOOLE SUMMATION JONATHAN M BORWEIN, NEIL J CALKIN, AND DANTE MANNA Abstract We stuy a connection between Euler-MacLaurin Summation an Boole Summation suggeste in an AMM note from 196, which

More information

Convergence of Random Walks

Convergence of Random Walks Chapter 16 Convergence of Ranom Walks This lecture examines the convergence of ranom walks to the Wiener process. This is very important both physically an statistically, an illustrates the utility of

More information

Calculus of Variations

Calculus of Variations Calculus of Variations Lagrangian formalism is the main tool of theoretical classical mechanics. Calculus of Variations is a part of Mathematics which Lagrangian formalism is base on. In this section,

More information

05 The Continuum Limit and the Wave Equation

05 The Continuum Limit and the Wave Equation Utah State University DigitalCommons@USU Founations of Wave Phenomena Physics, Department of 1-1-2004 05 The Continuum Limit an the Wave Equation Charles G. Torre Department of Physics, Utah State University,

More information

u!i = a T u = 0. Then S satisfies

u!i = a T u = 0. Then S satisfies Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace

More information

Lower bounds on Locality Sensitive Hashing

Lower bounds on Locality Sensitive Hashing Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,

More information

Improved Rate-Based Pull and Push Strategies in Large Distributed Networks

Improved Rate-Based Pull and Push Strategies in Large Distributed Networks Improve Rate-Base Pull an Push Strategies in Large Distribute Networks Wouter Minnebo an Benny Van Hout Department of Mathematics an Computer Science University of Antwerp - imins Mielheimlaan, B-00 Antwerp,

More information

Why Bernstein Polynomials Are Better: Fuzzy-Inspired Justification

Why Bernstein Polynomials Are Better: Fuzzy-Inspired Justification Why Bernstein Polynomials Are Better: Fuzzy-Inspire Justification Jaime Nava 1, Olga Kosheleva 2, an Vlaik Kreinovich 3 1,3 Department of Computer Science 2 Department of Teacher Eucation University of

More information

Balancing Expected and Worst-Case Utility in Contracting Models with Asymmetric Information and Pooling

Balancing Expected and Worst-Case Utility in Contracting Models with Asymmetric Information and Pooling Balancing Expecte an Worst-Case Utility in Contracting Moels with Asymmetric Information an Pooling R.B.O. erkkamp & W. van en Heuvel & A.P.M. Wagelmans Econometric Institute Report EI2018-01 9th January

More information

Switching Time Optimization in Discretized Hybrid Dynamical Systems

Switching Time Optimization in Discretized Hybrid Dynamical Systems Switching Time Optimization in Discretize Hybri Dynamical Systems Kathrin Flaßkamp, To Murphey, an Sina Ober-Blöbaum Abstract Switching time optimization (STO) arises in systems that have a finite set

More information

A simplified macroscopic urban traffic network model for model-based predictive control

A simplified macroscopic urban traffic network model for model-based predictive control Delft University of Technology Delft Center for Systems an Control Technical report 9-28 A simplifie macroscopic urban traffic network moel for moel-base preictive control S. Lin, B. De Schutter, Y. Xi,

More information

Power Generation and Distribution via Distributed Coordination Control

Power Generation and Distribution via Distributed Coordination Control Power Generation an Distribution via Distribute Coorination Control Byeong-Yeon Kim, Kwang-Kyo Oh, an Hyo-Sung Ahn arxiv:407.4870v [math.oc] 8 Jul 204 Abstract This paper presents power coorination, power

More information

Harmonic Modelling of Thyristor Bridges using a Simplified Time Domain Method

Harmonic Modelling of Thyristor Bridges using a Simplified Time Domain Method 1 Harmonic Moelling of Thyristor Briges using a Simplifie Time Domain Metho P. W. Lehn, Senior Member IEEE, an G. Ebner Abstract The paper presents time omain methos for harmonic analysis of a 6-pulse

More information

Euler equations for multiple integrals

Euler equations for multiple integrals Euler equations for multiple integrals January 22, 2013 Contents 1 Reminer of multivariable calculus 2 1.1 Vector ifferentiation......................... 2 1.2 Matrix ifferentiation........................

More information

Decoding Delay and Outage Performance Analysis of Full-Duplex Decode-Forward Relaying: Backward or Sliding Window Decoding

Decoding Delay and Outage Performance Analysis of Full-Duplex Decode-Forward Relaying: Backward or Sliding Window Decoding Decoing Delay an Outage Performance Analysis of Full-Duplex Decoe-Forwar Relaying: Backwar or Sliing Winow Decoing Ahma Abu Al Haija Member IEEE an Chintha Tellambura Fellow IEEE Abstract High reliability

More information

An M/G/1 Retrial Queue with Priority, Balking and Feedback Customers

An M/G/1 Retrial Queue with Priority, Balking and Feedback Customers Journal of Convergence Information Technology Volume 5 Number April 1 An M/G/1 Retrial Queue with Priority Balking an Feeback Customers Peishu Chen * 1 Yiuan Zhu 1 * 1 Faculty of Science Jiangsu University

More information

Introduction to the Vlasov-Poisson system

Introduction to the Vlasov-Poisson system Introuction to the Vlasov-Poisson system Simone Calogero 1 The Vlasov equation Consier a particle with mass m > 0. Let x(t) R 3 enote the position of the particle at time t R an v(t) = ẋ(t) = x(t)/t its

More information

arxiv: v3 [quant-ph] 16 Feb 2016

arxiv: v3 [quant-ph] 16 Feb 2016 What is the probability of a thermoynamical transition? arxiv:504.00020v3 [quant-ph] 6 Feb 206 Álvaro M. Alhambra,, Jonathan Oppenheim,, 2, an Christopher Perry, Department of Physics an Astronomy, University

More information

arxiv: v4 [cs.ds] 7 Mar 2014

arxiv: v4 [cs.ds] 7 Mar 2014 Analysis of Agglomerative Clustering Marcel R. Ackermann Johannes Blömer Daniel Kuntze Christian Sohler arxiv:101.697v [cs.ds] 7 Mar 01 Abstract The iameter k-clustering problem is the problem of partitioning

More information

Math 342 Partial Differential Equations «Viktor Grigoryan

Math 342 Partial Differential Equations «Viktor Grigoryan Math 342 Partial Differential Equations «Viktor Grigoryan 6 Wave equation: solution In this lecture we will solve the wave equation on the entire real line x R. This correspons to a string of infinite

More information

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION The Annals of Statistics 1997, Vol. 25, No. 6, 2313 2327 LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION By Eva Riccomagno, 1 Rainer Schwabe 2 an Henry P. Wynn 1 University of Warwick, Technische

More information

Lower Bounds for Local Monotonicity Reconstruction from Transitive-Closure Spanners

Lower Bounds for Local Monotonicity Reconstruction from Transitive-Closure Spanners Lower Bouns for Local Monotonicity Reconstruction from Transitive-Closure Spanners Arnab Bhattacharyya Elena Grigorescu Mahav Jha Kyomin Jung Sofya Raskhonikova Davi P. Wooruff Abstract Given a irecte

More information

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS Yannick DEVILLE Université Paul Sabatier Laboratoire Acoustique, Métrologie, Instrumentation Bât. 3RB2, 8 Route e Narbonne,

More information

TDD Linear Precoding Methods for Next Generation Mobile Communication Systems

TDD Linear Precoding Methods for Next Generation Mobile Communication Systems MEE10:118 Master s Thesis Electrical Engineering with emphasis on Raio Communications TDD Linear Precoing Methos for Next Generation Mobile Communication Systems Author: Yuan Ding Email: ingyuan.hit@gmail.com

More information

Ramsey numbers of some bipartite graphs versus complete graphs

Ramsey numbers of some bipartite graphs versus complete graphs Ramsey numbers of some bipartite graphs versus complete graphs Tao Jiang, Michael Salerno Miami University, Oxfor, OH 45056, USA Abstract. The Ramsey number r(h, K n ) is the smallest positive integer

More information

DIFFERENTIAL GEOMETRY, LECTURE 15, JULY 10

DIFFERENTIAL GEOMETRY, LECTURE 15, JULY 10 DIFFERENTIAL GEOMETRY, LECTURE 15, JULY 10 5. Levi-Civita connection From now on we are intereste in connections on the tangent bunle T X of a Riemanninam manifol (X, g). Out main result will be a construction

More information

Quantum Mechanics in Three Dimensions

Quantum Mechanics in Three Dimensions Physics 342 Lecture 20 Quantum Mechanics in Three Dimensions Lecture 20 Physics 342 Quantum Mechanics I Monay, March 24th, 2008 We begin our spherical solutions with the simplest possible case zero potential.

More information

SYNCHRONOUS SEQUENTIAL CIRCUITS

SYNCHRONOUS SEQUENTIAL CIRCUITS CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents

More information

TIME-DELAY ESTIMATION USING FARROW-BASED FRACTIONAL-DELAY FIR FILTERS: FILTER APPROXIMATION VS. ESTIMATION ERRORS

TIME-DELAY ESTIMATION USING FARROW-BASED FRACTIONAL-DELAY FIR FILTERS: FILTER APPROXIMATION VS. ESTIMATION ERRORS TIME-DEAY ESTIMATION USING FARROW-BASED FRACTIONA-DEAY FIR FITERS: FITER APPROXIMATION VS. ESTIMATION ERRORS Mattias Olsson, Håkan Johansson, an Per öwenborg Div. of Electronic Systems, Dept. of Electrical

More information

Copyright Warning & Restrictions

Copyright Warning & Restrictions Copyright Warning & Restrictions The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Under certain conditions

More information

One-dimensional I test and direction vector I test with array references by induction variable

One-dimensional I test and direction vector I test with array references by induction variable Int. J. High Performance Computing an Networking, Vol. 3, No. 4, 2005 219 One-imensional I test an irection vector I test with array references by inuction variable Minyi Guo School of Computer Science

More information

Coded Caching under Arbitrary Popularity Distributions

Coded Caching under Arbitrary Popularity Distributions Coded Caching under Arbitrary Popularity Distributions Jinbei Zhang, Xiaojun Lin, Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University, China School of Electrical and Computer Engineering,

More information

Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Codes

Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Codes Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Coes Kaiann Fu an Achilleas Anastasopoulos Electrical Engineering an Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

Consider for simplicity a 3rd-order IIR filter with a transfer function. where

Consider for simplicity a 3rd-order IIR filter with a transfer function. where Basic IIR Digital Filter The causal IIR igital filters we are concerne with in this course are characterie by a real rational transfer function of or, equivalently by a constant coefficient ifference equation

More information

Coded Caching with Low Subpacketization Levels

Coded Caching with Low Subpacketization Levels Electrical and Computer Engineering Conference Papers, Posters and Presentations Electrical and Computer Engineering 06 Coded Caching with Low Subpacetization Levels Li Tang Iowa State University, litang@iastateedu

More information

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors Math 18.02 Notes on ifferentials, the Chain Rule, graients, irectional erivative, an normal vectors Tangent plane an linear approximation We efine the partial erivatives of f( xy, ) as follows: f f( x+

More information

On the Connectivity Analysis over Large-Scale Hybrid Wireless Networks

On the Connectivity Analysis over Large-Scale Hybrid Wireless Networks This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM proceeings This paper was presente as part of the main Technical

More information

Basic IIR Digital Filter Structures

Basic IIR Digital Filter Structures Basic IIR Digital Filter Structures The causal IIR igital filters we are concerne with in this course are characterie by a real rational transfer function of or, equivalently by a constant coefficient

More information

Quantum mechanical approaches to the virial

Quantum mechanical approaches to the virial Quantum mechanical approaches to the virial S.LeBohec Department of Physics an Astronomy, University of Utah, Salt Lae City, UT 84112, USA Date: June 30 th 2015 In this note, we approach the virial from

More information

4. Important theorems in quantum mechanics

4. Important theorems in quantum mechanics TFY4215 Kjemisk fysikk og kvantemekanikk - Tillegg 4 1 TILLEGG 4 4. Important theorems in quantum mechanics Before attacking three-imensional potentials in the next chapter, we shall in chapter 4 of this

More information

Calculus and optimization

Calculus and optimization Calculus an optimization These notes essentially correspon to mathematical appenix 2 in the text. 1 Functions of a single variable Now that we have e ne functions we turn our attention to calculus. A function

More information

Relative Entropy and Score Function: New Information Estimation Relationships through Arbitrary Additive Perturbation

Relative Entropy and Score Function: New Information Estimation Relationships through Arbitrary Additive Perturbation Relative Entropy an Score Function: New Information Estimation Relationships through Arbitrary Aitive Perturbation Dongning Guo Department of Electrical Engineering & Computer Science Northwestern University

More information