Cloud-Aided Interference Management with Cache-Enabled Edge Nodes and Users
|
|
- Imogen Ashlie Nelson
- 5 years ago
- Views:
Transcription
1 F arxiv: v [cs.it] 0 Jan 09 C F ireless nel Clou-Aie Interference Management with Cache-Enable Ege Noes an Users Seye Pooya Shariatpanahi,, Jingjing Zhang 3, Osvalo Simeone 3, Babak Hossein Khalaj 4, Mohamma-Ali Maah-Ali 5. School of Electrical an Computer Engineering, University of Tehran, Tehran, Iran. School of Computer Science, Institute for Research in Funamental Sciences (IPM, Tehran, Iran 3. Department of Informatics, King s College Lonon, Lonon, UK 4. Department of Electrical Engineering, Sharif University of Technology, Tehran, Iran 5. Nokia Bell Labs, Holmel, NJ, USA Abstract This paper consiers a clou-ran architecture with cache-enable multi-antenna Ege Noes (ENs that eliver content to cache-enable en-users. The ENs are connecte to a central server via limite-capacity fronthaul links, an, base on the information receive from the central server an the cache contents, they transmit on the share wireless meium to satisfy users requests. By leveraging cooperative transmission as enable by ENs caches an fronthaul links, as well as multicasting opportunities provie by users caches, a close-tooptimal caching an elivery scheme is propose. As a result, the minimum Normalize Delivery Time (NDT, a high-snr measure of elivery latency, is characterize to within a multiplicative constant gap of 3/ uner the assumption of uncoe caching an fronthaul transmission, an of one-shot linear precoing. This result emonstrates the interplay among fronthaul links capacity, ENs caches, an en-users caches in minimizing the content elivery time. nt K R I. INTRODUCTION Caching content at the network ege can mitigate the heavy traffic buren at network peak times. Contents are proactively store in caches at the Ege Noes (ENs or at the enusers uring low-traffic perios, relieving network congestion at peak hours [], []. Ege caching at the ENs can enable Clou cooperative wireles transmission in the presence of share cache contents across multiple ENs [4], [9], [4]. In contrast, m(μ, r caching of share content at the users enables the multicasting EN ENof p coe EN q information EN n EN that KT is useful simultaneously for multiple users [5] [8]. m(μ, Inr practice, not all contents can be cache, an requeste uncache contents shoul be fetche from a central server through m(μ, r finite-capacity m(μ, fronthaul r links. This more general set- illustratein βfig., was stuie in [9] [] (see also βup, cache reference therein uncache in the absence of users caches. These references consier as the performance metric of interest the (b μk overall T m elivery min (r latency, incluing both fronthaul an wireless contributions. In particular, in prior works [4] [5], the elivery latency is measure in the high Signal-to-Noise Ratio (SNR regime. While [9] [] allow any form of elivery strategy, incluing interference alignment, in [], the optimal high-snr latency performance is stuie uner the assumption that wireless transmission can only use practical one-shot Library Fronthaul Caches Ege Noes En Users r Clou r Share Wireless Channel K R r Fig.. Clou-RAN system with cache-enable ENs an en-users. linear precoing strategies. Reference [] presents a cachingfronthaul-wireless transmission scheme that is shown to be latency-optimal within a multiplicative factor of 3/. In this paper, we exten the results in [] by allowing caching not only at the ENs but also at the en-users. To this en, we consier the clou-ran Clou scenario in Fig. an evaluate the impact of both cooperative transmission opportunities at the ENs an multicasting opportunities brought by caching at the users. Caching at the users has, in fact, EN EN m(μ,r EN q EN n EN two potentially beneficial effects on the network KT performance. First, since users have alreay cache some parts of the library, m(μ, r m(μ, r they nee not receive from the network the cache portion of the requeste file this isiknown as j the local F C caching gain. Secon, as assume, by a careful cache content placement, a common coe message can cache benefit more than one user, which is known as the global caching gain [5]. Assuming that entire library is cache (a μkacross T m min ENs (r an users an that the fronthaul links are absent, reference [4] prove that the gains accrue form cooperative transmission by the ENs an the global caching gain provie by users caches are aitive. Here, we generalize this conclusion by consiering the role of finite-capacity fronthaul links an by allowing for partial caching of the library of popular files across ENs an users. μ R μ T caches caches EN W n EN W n W n W n3
2 The rest of the paper is organize as follows. In Section II we escribe the system moel. Section III presents the main results along with an intuitive iscussion. In Section IV we etail the propose caching an elivery scheme. Then, we erive a converse in Section V, which is prove to be within a multiplicative gap of 3/ as compare to the high- SNR performance achievable by the propose scheme. Finally, Section VI conclues the paper. II. SYSTEM MODEL We consier a content elivery scenario, illustrate in Fig., in which Ege Noes (ENs, each with antennas, eliver requeste contents to K R single-antenna users via a share wireless meium. The contents library inclues N files, each of L bits, which are collecte in set W {W,..., W N }. Furthermore, each file W n is ivie into F packets, collecte in the set W n {W nf } F f, where F is an arbitrary integer an each packet consists of L/F bits. Each EN is connecte to a central server, where the library resies, via a wire fronhaul link of capacity C F bits per symbol of the wireless channel. Moreover, each EN is equippe with a cache of size µ T N files, for µ T. In this paper, in contrast to [], we assume that the users are also cache-enable, each with a cache of size µ R N files, for µ R. Henceforth, for simplicity, we assume that both µ T an µ R K R are integers, with extensions following irectly as in [9], [], [4] The system operation inclues two phases, namely the cache content placement an content elivery phases. In the first phase, each EN an each user caches uncoe fractions of the files in the library at network off-peak traffic hours an without knowing the actual requests of the users in the next phase. In the secon phase, at network peak traffic hours, at any transmission slot, each active user requests access to one of the files in the library, i.e., user k {,..., K R } requests file W k, k {,..., N}. For elivery, first, the clou sens on each fronthaul link some uncoe fractions of the requeste files to the ENs. For more general ways to use the fronthaul links, we refer to [9]. After fronthaul transmission, the ENs collaboratively eliver the requeste contents to the users via the ege wireless ownlink channel base on the cache contents an fronthaul signals. The signal receive by each user k on the ownlink channel is given as y k h H kix i + z k, ( in which h ki C is the complex representation of the faing channel vector from EN i to user k; x i C is the transmitte vector from EN i; z k is unit-power aitive Gaussian noise; an (. H represents the Hermitian transpose. The faing channels are rawn from a continuous istribution an are constant in each transmission slot. The transmission power of each EN is constraine by E [ x i ] SNR. Furthermore, as in [], [4], the ENs transmit using oneshot linear precoing, so that the vector transmitte by each EN at time slot t is given as x i v inf s nf, ( (n,f where s nf is a symbol encoing file fraction W nf, an v inf is the corresponing beamforming vector. Furthermore, we assume that Channel State Information (CSI is available to all the entities in the network. The performance metric of interest is the Normalize Delivery Time (NDT introuce in [9], which measures the high-snr latency ue to fronthaul an wireless transmissions. To this en, we write C F r log SNR, hence allowing the fronthaul capacity to scale with the wireless ege SNR with a scaling constant r 0. Then, enoting the time require to complete the fronthaul an wireless ege transmissions as T F a E (measure in symbol perios of the wireless channel respectively, the total NDT is efine as the following limit over SNR an file size F + E (3 ( lim lim E[TF ] SNR L L/log(SNR + E[T E ]. L/log(SNR In (3, the term L/log(SNR represents the normalizing elivery time on an interference-free channel; the term F lim SNR lim L E[T F ]/(L/log(SNR is efine as the fronthaul NDT; an E lim SNR lim L E[T E ]/(L/log(SNR as the ege NDT. Accoringly, for given clou an caching resources efine by the triple (r, µ T, µ R, the minimal NDT over all achievable policies is efine as (r, µ T, µ R inf{(r, µ T, µ R : (r, µ T, µ R is achievable}, (4 where the infimum is over all uncoe caching, uncoe fronthaul, an one-shot linear ege transmissions policies that ensure reliable elivery for any set of requeste files [9], []. III. MAIN RESULT In this section we state our main result an its implications. We procee by first proposing an achievable scheme an then proving its optimality within a constant multiplicative gap. In the cache content placement phase, the scheme follows the stanar approach of sharing a istinct fraction of a file to all subsets of µ T ENs an µ R K R users, hence satisfying the cache capacity constraints [4]. As a result, each fraction of any requeste file is available at m R µ R K R users, which we efine as receive-sie multiplicity, an at µ T ENs. As we will see, in the content elivery phase, the transmit-sie multiplicity m T, i.e., the number of ENs at which any fraction of a requeste files is available, can be increase beyon µ T by means of fronthaul transmission.
3 NDT As prove in [4], an briefly reviewe below, the content multiplicities m T an m R can be leverage in orer to erive a elivery scheme that serves simultaneously u(m T, m R min(k R, m T + m R (5 users at the maximum high-snr rate of log(snr. Unlike [4], however, here the transmit-sie multiplicity m T is not fixe, since any uncache fraction of a file can be elivere to an EN by the clou on the fronthaul. The multiplicity m T can be hence increase at the cost of a larger fronthaul elay F. Therefore, the multiplicity m T shoul be chosen carefully, by accounting for the fronthaul latency F as well as for the wireless NDT E, which ecreases with the size of the number u(m T, m R of users that can be serve simultaneously. Our main result below obtains an approximately optimal solution in terms of minimum NDT. Before etailing the main result, we briefly present how the scheme in [4] serves u(m T, m R users simultaneously at rate log(snr by leveraging both multicasting an cooperative Zero-Forcing (ZF precoing. Assume that m T +m R K R (the complement case follows in a similar way. At any given time, m T + m R ENs transmit simultaneously to eliver fractions of the requeste files to m T + m R users. To this en, the active ENs are groupe into all subsets of m T active ENs. Note that there are ( m T +m R m T such groups, an that each EN generally belongs to multiple groups. All groups transmit at the same time, with each group elivering collaboratively a share fraction of a file to the requesting user. Transmission by a group is one within the null space of the channel of other m T active users by means of Zero-Forcing (ZF one-shot linear precoing. The interference create by this transmission to the remaining m R active users is remove by leveraging the information in the receive-sie caches. This is possible since the caching strategy ensures that the message transmitte by a group of m T ENs is also available to m R users. Note that the scheme in [4] assumes, but the extension escribe above is straightforwar. Base on the above mentione achievable scheme, along with an optimize transmit-sie multiplicity, the following theorem characterizes the minimum NDT (4 to within a multiplicative constant equal to 3/. Theorem (Multiplicative gap on minimum NDT. The NDT up (r, µ T, µ R K R (m(r, µ T, µ R µ T + K R ( µ R + min {K R, m(r, µ T, µ R + K R µ R } (6 is achievable, where m(r, µ R if µ T < m(r, µ R, m(r, µ T, µ R µ T if m(r, µ R µ T m max, m max if µ T > m max, (7 [ ] an ( µ R r n m(r, µ R T K Rµ R if r < r th, (8 m max if r r th, Achievable NDT Lower boun Fig.. Achievable NDT up(r, µ R, µ T an lower boun (r, µ R, µ T versus µ T for ifferent values of µ T an, with, K R 4 an r 4. with an r th ( m max + K Rµ R, (9 ( µ R { m max min, KR ( µ R Moreover, the minimum NDT satisfies the inequalities }. (0 3 up(r, µ T, µ R (r, µ T, µ R up (r, µ T, µ R. ( Theorem implies that the multiplicity m T m(r, µ R, µ T in (7 is optimal in terms of NDT, up to a constant multiplicative gap. Importantly, in contrast to [], the choice of m T in (7 epens also on the caching capacity µ R at the users, an it reuces to selection in [] when µ R 0. The first term in (6 is the fronthaul NDT F require to convey the uncache portions of files to achieve the esire multiplicity m T m(r, µ T, µ R in (7. The secon term is the ege transmission NDT E, which accounts for the local caching gain (i.e., ( µ R, an for the combine global caching gain ue to the users caches an for the cooperation gain ue to the ENs caches an to fronthaul transmission (i.e., m+k R µ R. The result hence generalizes the main conclusion from [3] an [4] that the gains from coe caching multicasting opportunities at the receive sie an cooperation at the transmit sie are aitive. Example. The achievable NDT up (r, µ T, µ R in (6, along with the lower boun (r, µ T, µ R erive in Lemma in Section V, are plotte in Fig. as a function of the users cache capacity µ R for ifferent values of the parameters, r an µ T. We set the number of ENs an users to an K R 4 an the fronthaul rate to r 4. Note that for non-integer values of µ R K R, the achievable NDT is obtaine by memory sharing between the receive-sie multiplicities µ R K R an µ R K R [6]. It is observe that caching at the en-users is more effective when the number of EN transmit antennas an/or the transmit-sie caches are small. Furthermore, when the transmit-sie multiplicity is sufficient to serve all K R users at the same time, en-user caching only provies local caching gains. In particular, this happens when µ T 6 an 4, in which case the NDT is seen to ecrease linearly with µ R K R.
4 IV. ACHIEVABLE SCHEME The achievable scheme generalizes the strategies propose in [] an [4] by accounting for fronthaul transmission an for the caches available at the users. As iscusse in Section III, the cache content placement phase uses the same approach propose in [4], which guarantees content replication of µ T an m R µ R K R at the transmit an receive sies, respectively. In the content elivery phase, fronthaul transmission provies packets from the requeste files to the ENs in orer to increase the transmit-sie multiplicity m T to the esire value m. This is at the cost of the fronthaul elay F (m K R (m µ T +, ( given that (m µ T + L bits nee to be elivere for each requeste file (see also []. Base on the multiplicities m R an m T, the number of users that can be serve at the same time is (5. Since each user has cache a ( µ R -fraction of its requeste file, the ege NDT is given by [] E (m K R( µ R. (3 u(m The transmit-sie multiplicity m T m shoul be tune such that the total elivery latency E (m + F (m is minimize. First, we etermine the maximum possible multiplicity m max from the following necessary conitions m, m + K R µ R K R, (4 which result in m max given in (0. To procee, we first focus on the case of µ T 0, an fin a close-to-optimal multiplicity m(r, µ R. Then, base on the expression for m(r, µ R, we propose a specific choice for the multiplicity for the general case where µ T 0. To start, in the case when µ T 0, from ( an (3, the total NDT is (m K Rm + K R( µ R. (5 u(m In orer to optimize over m, we fin the (only stationary point for function (5 as ( µ R r m 0 K Rµ R. (6 We then approximate the integer solution of the original problem to be the nearest positive integer smaller than m max, yieling (8. For the general case µ T 0, we propose the choice (7 for the transmit-sie multiplicity. Accoringly, when µ T < m(r, µ R, an hence the transmit-sie caches are small, packets are sent over the fronthaul links so that the aggregate multiplicity is equal to the value m(r, µ R selecte above when µ T 0. For the case µ T m(r, µ R, instea, the transmit-sie multiplicity (7 only relies on EN caching, an fronthaul transmission is not carrie out. In particular, Fig. 3. Transmit-sie multiplicity m(r, µ T, µ R in (7 versus K R µ R for, K R 4, µ T 4 an ifferent values of r. when µ T m max, the maximum multiplicity m max can be guarantee irectly by EN caching. Theorem emonstrates the near-optimality of this choice. As illustration for how the user cache capacity µ R K R affects transmit-sie multiplicity m(r, µ T, µ R is shown in Fig. 3 for, K R 4, µ T 4. As µ R K R increases, user-sie caching becomes more effective, an less EN-sie cooperation is neee to null out interference. Accoringly, the transmit-sie multiplicity ecreases with µ R K R, an it epens on r only when µ R K R is sufficiently small. V. MULTIPLICATIVE OPTIMALITY In this section we emonstrate that the achievable NDT iheorem is within a multiplicative constant gap of the minimum NDT by proving (. To this en, we exten the converse proof evelope in [] in orer to account for the presence of users caches. First, without loss of generality, consier a split of each file W n into ( K R subsets of packets W n {W nτt τ R }, such that each part W nτt τ R is inexe by the subsets of inices τ T [ ]\{ } an τ R [K R ]. The subset W nτt τ R inclues the packets of W n that are present at all the ENs i τ T after fronthaul transmissions an at all the users j τ R. We also efine τ R as the number of packets of file W n that are cache at all the ENs in τ T, an at all the users in τ R ; f nτt τ R ( to be number of packets from file W n that are transmitte to all the users in τ T via the fronthaul for a given eman vector an cache at all the users in τ R. Note that these quantities are well-efine for every policy. With these efinitions, NDT of any achievable policy can be lower boune by the solution to the following optimization problem: (a min { τ R } {f nτt τ R (} subject (b (c N n to i τ T max K R K R E ({ τ R (}, + F ( + f nτt τ R ( F, n, (7 τ R µ T F N, i [ ]
5 ( (e N n F r j τ R n i τ T K R + f nτt τ R ( µ R F N, j [K R ], f nτt τ R ( F (, i [ ], (f{ τ R, f nτt τ R (} 0, 0 F ( Fmax, (8 where function E ({c nτ T τ R (}, is implicitly efine as the minimum ege NDT in (3 for given cache an fronthaul policies when the request vector is, while F ( is a function for that satisfies conitions (e an (f. We have also efine Fmax K R(m max µ T +. (9 In (7, the equality (b guarantees the availability of all the requeste files; inequalities (c are ue to the fact that the size of the cache content of each EN i [ ] is limite by the cache capacity µ T F N; similarly, inequalities ( enforce the cache capacity constraint at each user j [K R ]; inequalities (e follow from the efinition of fronthaul NDT in (3, since the left-han sie is the number of packets sent to EN i via the fronthaul link; in (f, F ( is upper boune by F max since the maximum multiplicity is m max an hence the total number of bits require via fronthaul is K R (m max µ T +. In (7, the expression of function E ({c nτ T τ R (}, is generally unknown. Notwithstaning this complication, the following Lemma gives a lower boun to the solution of the above optimization problem. Proof can be foun in Appenix A. Lemma. The minimum value of the optimization problem in (7 is lower boune by f(x K R (x µ T + K R( µ R x + µ R K R, (0 where we have efine x K R ib ij, fnτt τ R an b ij :n f nτ T τ R ( K R π(n, K R, N. ( n Finally, the following lemma analyzes the gap between the lower boun erive in Lemma an the upper boun (6, completing the proof of Theorem. A proof can be foun in Appenix B. Lemma. Function f(x in (0 is lower boune by 3 up(r, µ T, µ R, where up (r, µ T, µ R is given iheorem. VI. CONCLUSIONS For a cache-enable clou-ran architecture where both the ENs an the en-users have caches, this paper has characterize the minimum elivery latency in the high-snr to within a multiplicative gap of 3/. Uner the practical constraint that the ENs can only transmit using one-shot linear precoing, the main result shows that the cooperation gains accrue by EN cooperation via EN caching an fronthaul transmission are aitive with respect to the multicasting gains offere by en-user caching. ACKNOWLEDGEMENTS Jingjing Zhang an Osvalo Simeone have receive funing from the European Research Council (ERC uner the European Union s Horizon 00 Research an Innovation Programme (Grant Agreement No REFERENCES [] J. Kangasharju, J. Roberts, an K. Ross, Object Replication Strategies in Content Distribution Networks, Computer Communications, vol. 38, no. 4, pp , 00. [] E. Nygren, R.K. Sitaraman, an J. Sun. The Akamai Network: A platform for high-performance Internet application, ACM SIGOPS Operating Systems Review, vol. 44, no. 3, pp. 9, 00. [3] K. Shanmugam, N. Golrezaei, A. G. Dimakis, A. F. Molisch an G. Caire, FemtoCaching: Wireless Content Delivery Through Distribute Caching Helpers, IEEE Trans. Inf. Theory, vol. 59, no., pp , Dec. 03. [4] A. Liu an V. K. N. Lau, Exploiting Base Station Caching in MIMO Cellular Networks: Opportunistic Cooperation for Vieo Streaming, IEEE Trans. Signal Process., vol. 63, no., pp , Jan. 05. [5] M. A. Maah-Ali an U. Niesen, Funamental limits of caching, IEEE Trans. Inf. Theory, vol. 60, no. 5, pp , 04. [6] N. Karamchanani, U. Niesen, M. A. Maah-Ali, an S. N. Diggavi, Hierarchical Coe Caching, IEEE Trans. Inf. Theory, vol. 6, no. 6, pp. 3 39, 06. [7] R. Pearsani, M. A. Maah-Ali an U. Niesen, Online Coe Caching, IEEE/ACM Trans. Netw., vol. 4, no., pp , April 06. [8] J. Zhang an P. Elia, Funamental limits of cache-aie wireless BC: Interplay of coe-caching an CSIT feeback, IEEE Trans. Inf. Theory, vol. 63, no. 5, pp , 07. [9] A. Sengupta, R. Tanon, an O. Simeone, Fog-aie wireless networks for content elivery: Funamental latency traeoffs, IEEE Trans. Inf. Theory, vol. 63, no. 0, pp , Oct. 07. [0] R. Tanon an O. Simeone, Clou-aie wireless networks with ege caching: Funamental latency trae-offs in fog raio access networks, in Proc. IEEE Int. Symp. on Inf. Theory (ISIT, pp , 06. [] S. M. Azimi, O. Simeone, A. Sengupta, an R. Tanon, Online Ege Caching in Fog-Aie Wireless Network, in Proc. IEEE Int. Symp. on Inf. Theory (ISIT, pp. 7, 07. [] J. Zhang, O. Simeone, Funamental Limits of Clou an Cache-Aie Interference Management with Multi-Antenna Base Stations in Proc. IEEE Int. Symp. on Inf. Theory (ISIT, pp , 08. [3] S. P. Shariatpanahi, S. A. Motahari an B. H. Khalaj, Multi-Server Coe Caching, IEEE Trans. Inf. Theory, vol. 6, no., pp , Dec. 06. [4] N. Naerializaeh, M. A. Maah-Ali an A. S. Avestimehr, Funamental Limits of Cache-Aie Interference Management, IEEE Trans. Inf. Theory, vol. 63, no. 5, pp , May 07. [5] M. A. Maah-Ali an U. Niesen, Cache-aie interference channels, in Proc. IEEE Int. Symp. on Inf. Theory (ISIT, pp , 05. [6] H. Ghasemi an A.Ramamoorthy, Improve Lower Bouns for Coe Caching, IEEE Trans. Inf. Theory, vol. 63, no. 7, pp , July, 07.
6 APPENDIX A PROOF OF LEMMA To prove Lemma, we substitute the maximum over all the possible request vectors in the objective of (7 with an average over them. The solution of the resulting problem yiels a lower boun to the solution of the orginal problem. Mathematically, the objective (a in (7 is substitute with min { τ R } {f nτt τ R (} π(n, K R ( [ E ({ τ R (}, + F (], where we have efine π(n, K R N! /(N K R!. In orer to eal with the unknown function E ({c nτ T τ R (},, we nee the following lemma. Lemma 3. Define τ T l as the subset of ege noes that have access to the packet W nl f l after the fronhaul transmission, an τ Rl as the subset of users that have cache the packet W nl f l. Then, the number u of users that can be serve at the same time is upper boune by u min l [u] τ T l + τ Rl. (3 Proof. This lemma is generalization of Lemma in [] to the case where we have cache at the users. The main proof is consiering the role of receivers caches in a similar way as in Lemma 3 of [4], an the rest of the proof is the same. Using the above lemma we will have the following lower boun on the minimum ege NDT: E ({ τ R (}, ( µ R F K R K R k c k τ T τ R + f k τ T τ R (, i + j (4 respectively. Now we lower boun the first term in ( as π(n, K R K R k E ({ τ R (}, (a µ R F π(n, K R K R k K R (b µ R F π(n, K R K R( µ R K R K R K R (c K R( µ R ( K R( µ R (e K R( µ R K R i + j µ R F π(n, K R c k τ T τ R + f k τ T τ R ( i + j (c k τ T τ R + f k τ T τ R ( K R π(n, K R i + j N n i + j N n ( KT KT KT b ij i + j K R ( µ R KT KR ib ij + KR b ij KR (i + jb ij ( KR (i + jb ij KT KR jb, ij where (a hols because of Lemma 3; in (b we have efine :n f nτt τ R f nτ T τ R ( K R π(n, K R ; (5 in (c we have efine b ij N ; (6 n in ( we have use the inequality i,j u ij v ij i,j u ij i,j v ij ; (7 since at most i + j users can be serve simultaneously when the multiplicities at the ENs an the users are i an j, with u ij b ij /(i + j an v ij b ij (i + j; an finally (e results from the equality KR b ij.
7 This results from summing up (8b for all π(n, K R request vectors an for all K R files in each request vector as follows: π(n, K R K R F (8 n K R K R π(n, K R N K R n K R π(n, K R K R + f nτt τ R ( N n K R K R π(n, K R b ij. Now we lower boun for the term relate to the fronthaul elay as follows: π(n, K R F ( (9 π(n, K R F r n i π(n, K R F r i π(n, K R F r K R i N F r n i τ T K R π(n, K R N n K R K R i N F r b ij K R (a K R K R f nτt ib ij N n i K R ib ij µ T, f nτt ( f nτt ( N n f nτt N n in which we have efine f nτt f nτt K R K R K R τ R f nτt τ R f nτt τ R, an in (a we have use the following inequality ue to the ege noes cache size constraint in (8c µ T F N N n N n N i n i (30 i τ T N. n Finally, we can a up the terms corresponing to the lower bouns for the elay an ege NDT to arrive at the NDT lower boun K R K R ib ij µ T + (3 K R ( µ R KT KR ib ij + KT KR jb ij K R (x µ T + K R( µ R, x + µ R K R in which we have efine x K R ib ij, (3 an have use the following inequality ue to cache size constraint at the users state in (8 K R jb ij (33 K R j j µ R K R. N n
8 APPENDIX B PROOF OF LEMMA To prove the inequality f(x up (r, µ T, µ R /3, we first focus on the minimum f min of f(x. To this en, we first erive the omain of function f(x. From (7 an (9, we can have the inequalities K R (x µ T /( F ( F max. Hence, the maximum value of x is given as x max max{m max, µ T }. We also have the inequality KT KR ib ij ue to the equality KR b ij in (8. This yiels the necessary conition x. Also because x 0, the minimum value is given as x min max{µ T, }. Hence, x lies in the interval [x min, x max ]. Since function f(x is convex for x > 0, an the only stationary point is x m 0, i.e., f (m 0 0, where we have m 0 ( µ R r/ K R µ R /. Therefore, the esire minimum f min is given as { f(m0, if x f min min m 0 x max min{f(x min, f(x max }, otherwise, (34 which can be rewritten as K R (m (r,µ R µ T + K f min R ( µ R m (µ R,r +µ R K R, : µ < m (r, µ R K R ( µ R µ T +µ R K R, : µ m (µ R, r (35 where we have efine m (r, µ R { max{m 0, } : r < r th, m max : r r th. (36 As a result, if we can prove the inequality f min up (r, µ T, µ R /3, then Lemma hols immeiately. Since f min is quite intractable, we turn to choose a simpler function, enote as lb (r, µ T, µ R that satisfies lb (r, µ T, µ R lb (r, µ T, µ R, where we have efine lb (r, µ T, µ R f min. The lower boun lb (r, µ T, µ R is given as lb(r, µ T, µ R ( (i + µt K R ( µ R + (µ T i (i + + µ R K R (i + + µ R K R (37 for µ T [i, i +, with m(r, µ R i m max ; an lb(r, µ T, µ R { KR (m (r,µ R µ T + K R ( µ R m (r,µ R +µ R K R, K R (m(r,µ R µ T + lb (r, m(r,µ R, µ R, (38 for µ T m(r, µ R, an the first expression is for the regime m (r [(m(r, µ R 0.5, m(r, µ R ], while the secon expression is for the regime m (r [m(r, µ R, (m(r, µ R + 0.5], where m (r, µ R is given in (36. To procee, we now prove the inequality lb (r, µ T, µ R lb (r, µ T, µ R. Proof. Since m(r, µ R is the nearest integer point of m 0 when r < r th, we have the inequality m(r, µ R + > m 0, yieling m(r, µ R + > m (r, µ R for this range of r. Furthermore, we also have m(r, µ R m (r, µ R when r r th. Hence, the inequality m(r, µ R + m (r, µ R hols for any value of r. As a result, for any sub-interval µ [i, i +, with m(r, µ R + i m max, lb (r, µ T, µ R, i.e., f min, is given as K R ( µ R /(µ T +µ R K R from (35 since µ T m (r, µ R. By simple comparison between the above lb (r, µ T, µ R an lb (r, µ T, µ R in (37, we have the inequality lb (r, µ T, µ R lb (r, µ T, µ R. For the remaining interval µ istinguish the following two cases. m(r, µ R +, we Case : m (r, µ R [(m(r, µ R 0.5, m(r, µ R ]. Hence, we have the inequality m (r, µ R m(r, µ R. For interval µ T [m(r, µ R, m(r, µ R + ], the inequality lb (r, µ T, µ R lb (r, µ T, µ R hols with the same reason as above. Moveover, by comparison, we have that lb (r, µ T, µ R in (38 is equal to lb (r, µ T, µ R in (35 for µ m (r, µ R. Instea, for µ [m (r, µ R, m(r, µ R ], since both lb (r, µ T, µ R in (38 an lb (r, µ T, µ R K R ( µ R /(µ T + µ R K R are ecreasing functions of µ T, they are equal for µ T m (r, µ R, an the former has a smaller graient for the whole range of value of µ T at han, we have lb (r, µ T, µ R lb (r, µ T, µ R. Case : m (r, µ R [m(r, µ R, (m(r, µ R + 0.5]. In this range, the inequality m (r, µ R m(r, µ R hols immeiately. For interval µ T [m(r, µ R, m(r, µ R + ], since both lb (r, µ T, µ R in (38 an lb (r, µ T, µ R are ecreasing functions of µ T, they are equal for µ T m(r, µ R +, an the former has a smaller graient, we have lb (r, µ T, µ R lb (r, µ T, µ R. This hols also for the value µ T m(r, µ R. Combining this with the fact that lb (r, µ T, µ R in (38 an lb (r, µ T, µ R in (35 are linear an parallel for µ T m(r, µ R, we have lb (r, m(r, µ R/, µ R lb (r, µ T, µ R in this range. To complete the proof, we procee to prove the multiplicative gap between the upper boun up (r, µ T, µ R (6 an the lower boun lb (r, µ T, µ R. For µ T [i, i +, with m(r, µ R i m max, we have up (r, µ T, µ R lb (r, µ T, µ R + (a up(r, µ T i/, µ R lb (r, µ T i/, µ R (i + K R µ R ((i K R µ R 3, (39 where inequality (a hols because up (r, µ T, µ R an lb (r, µ T, µ R are both linearly ecreasing an they coincie at the enpoint µ T i +. For µ T m(r, µ R in
9 Case, the gap is given as up (r, µ T, µ R lb (r, µ T, µ R (b (a up(r, µ T m(r, µ R /, µ R lb (r, µ T m(r, µ R /, µ R m(r,µ R +µ R K R m (r,µ R m(r,µ R + m (r,µ R +µ R K R /p(m(r, µ R /p(m (r, µ R p(m(r, µ R /p(m (r, µ R (c /4 + (m(r, µ R + µ R K R (m(r, µ R + µ R K R ( 3, where inequality (a hols because up (r, µ T, µ R an lb (r, µ T, µ R ecrease with the same slope an the maximum ratio is at the enpoint µ T m(r, µ R ; equality (b hols ue to the efinition of p(x x + µ R K R an m (r, µ R ; inequality (c hols ue to the constraints m (r, µ R [(m(r 0.5, m(r]; an inequality ( hols for any m(r, while for m(r, we have / [0, ] an µ [0, ]. With simple comparison, we can get up (r, µ T, µ R lb (r, µ T, µ R. Finally, for µ m(r in Case, the gap is given as up (r, µ T, µ R lb (r, µ T, µ R + (a up(r, µ T m(r, µ R /, µ R lb (r, µ T m(r, µ R /, µ R (m(r, µ R + K R µ R ((m(r, µ R K R µ R 3, (4 where inequality (a hols as inequality (a in (39. This completes the proof.
Fundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Edge Nodes
Fundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Edge Nodes Jingjing Zhang and Osvaldo Simeone arxiv:72.04266v4 [cs.it] 2 Mar 208 Abstract In fog-aided cellular systems,
More informationCapacity Analysis of MIMO Systems with Unknown Channel State Information
Capacity Analysis of MIMO Systems with Unknown Channel State Information Jun Zheng an Bhaskar D. Rao Dept. of Electrical an Computer Engineering University of California at San Diego e-mail: juzheng@ucs.eu,
More informationA New Converse Bound for Coded Caching
A ew Converse Boun for Coe Caching Chien-Yi Wang, Sung Hoon Lim, an Michael Gastpar School of Computer an Communication Sciences EPFL Lausanne, Switzerlan {chien-yiwang, sunglim, michaelgastpar}@epflch
More informationFundamental Limits on Latency in Small-Cell Caching Systems: An Information-Theoretic Analysis
Fundamental Limits on Latency in Small-ell aching Systems: An Information-Theoretic Analysis Seyyed Mohammadreza Azimi, Osvaldo Simeone, and Ravi Tandon Abstract aching of popular multimedia content at
More informationLectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs
Lectures - Week 10 Introuction to Orinary Differential Equations (ODES) First Orer Linear ODEs When stuying ODEs we are consiering functions of one inepenent variable, e.g., f(x), where x is the inepenent
More informationNew Bounds for Distributed Storage Systems with Secure Repair
New Bouns for Distribute Storage Systems with Secure Repair Ravi Tanon 1 an Soheil Mohajer 1 Discovery Analytics Center & Department of Computer Science, Virginia Tech, Blacksburg, VA Department of Electrical
More informationAn Analytical Expression of the Probability of Error for Relaying with Decode-and-forward
An Analytical Expression of the Probability of Error for Relaying with Decoe-an-forwar Alexanre Graell i Amat an Ingmar Lan Department of Electronics, Institut TELECOM-TELECOM Bretagne, Brest, France Email:
More informationComputing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions
Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5
More informationTime-of-Arrival Estimation in Non-Line-Of-Sight Environments
2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor
More informationOn the Aloha throughput-fairness tradeoff
On the Aloha throughput-fairness traeoff 1 Nan Xie, Member, IEEE, an Steven Weber, Senior Member, IEEE Abstract arxiv:1605.01557v1 [cs.it] 5 May 2016 A well-known inner boun of the stability region of
More informationSpace-time Linear Dispersion Using Coordinate Interleaving
Space-time Linear Dispersion Using Coorinate Interleaving Jinsong Wu an Steven D Blostein Department of Electrical an Computer Engineering Queen s University, Kingston, Ontario, Canaa, K7L3N6 Email: wujs@ieeeorg
More informationOn Characterizing the Delay-Performance of Wireless Scheduling Algorithms
On Characterizing the Delay-Performance of Wireless Scheuling Algorithms Xiaojun Lin Center for Wireless Systems an Applications School of Electrical an Computer Engineering, Purue University West Lafayette,
More informationCloud and Cache-Aided Wireless Networks: Fundamental Latency Trade-Offs
Cloud and Cache-Aided Wireless Networks: Fundamental Latency Trade-Offs Avik Sengupta, Student Member, IEEE, Ravi Tandon, Member, IEEE, Osvaldo Simeone, Fellow, IEEE Abstract A cloud and cache-aided wireless
More informationClosed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device
Close an Open Loop Optimal Control of Buffer an Energy of a Wireless Device V. S. Borkar School of Technology an Computer Science TIFR, umbai, Inia. borkar@tifr.res.in A. A. Kherani B. J. Prabhu INRIA
More informationLinear First-Order Equations
5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)
More information6 General properties of an autonomous system of two first order ODE
6 General properties of an autonomous system of two first orer ODE Here we embark on stuying the autonomous system of two first orer ifferential equations of the form ẋ 1 = f 1 (, x 2 ), ẋ 2 = f 2 (, x
More informationControl-Data Separation across Edge and Cloud for Uplink Communications in C-RAN
1 Control-Data Separation across Ege an Clou for Uplink Communications in C-RAN Jinkyu Kang, Osvalo Simeone, Joonhyuk Kang an Shlomo Shamai (Shitz) School of Engineering an Applie Sciences, Harvar University,
More informationLyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering,
On the Queue-Overflow Probability of Wireless Systems : A New Approach Combining Large Deviations with Lyapunov Functions V. J. Venkataramanan an Xiaojun Lin Center for Wireless Systems an Applications
More informationLeast-Squares Regression on Sparse Spaces
Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction
More informationALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS
ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an
More informationK User Interference Channel with Backhaul
1 K User Interference Channel with Backhaul Cooperation: DoF vs. Backhaul Load Trade Off Borna Kananian,, Mohammad A. Maddah-Ali,, Babak H. Khalaj, Department of Electrical Engineering, Sharif University
More informationSchrödinger s equation.
Physics 342 Lecture 5 Schröinger s Equation Lecture 5 Physics 342 Quantum Mechanics I Wenesay, February 3r, 2010 Toay we iscuss Schröinger s equation an show that it supports the basic interpretation of
More informationLaplacian Cooperative Attitude Control of Multiple Rigid Bodies
Laplacian Cooperative Attitue Control of Multiple Rigi Boies Dimos V. Dimarogonas, Panagiotis Tsiotras an Kostas J. Kyriakopoulos Abstract Motivate by the fact that linear controllers can stabilize the
More informationA. Incorrect! The letter t does not appear in the expression of the given integral
AP Physics C - Problem Drill 1: The Funamental Theorem of Calculus Question No. 1 of 1 Instruction: (1) Rea the problem statement an answer choices carefully () Work the problems on paper as neee (3) Question
More informationAgmon Kolmogorov Inequalities on l 2 (Z d )
Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,
More informationJUST THE MATHS UNIT NUMBER DIFFERENTIATION 2 (Rates of change) A.J.Hobson
JUST THE MATHS UNIT NUMBER 10.2 DIFFERENTIATION 2 (Rates of change) by A.J.Hobson 10.2.1 Introuction 10.2.2 Average rates of change 10.2.3 Instantaneous rates of change 10.2.4 Derivatives 10.2.5 Exercises
More informationHybrid Centralized-Distributed Resource Allocation for Device-to-Device Communication Underlaying Cellular Networks
Hybri Centralize-Distribute Resource Allocation for Device-to-Device Communication Unerlaying Cellular Networks 1 arxiv:1502.04539v1 [cs.gt] 16 Feb 2015 Setareh Maghsui an Sławomir Stańczak, Senior Member,
More informationQubit channels that achieve capacity with two states
Qubit channels that achieve capacity with two states Dominic W. Berry Department of Physics, The University of Queenslan, Brisbane, Queenslan 4072, Australia Receive 22 December 2004; publishe 22 March
More informationarxiv: v1 [cs.it] 21 Aug 2017
Performance Gains of Optimal Antenna Deployment for Massive MIMO ystems Erem Koyuncu Department of Electrical an Computer Engineering, University of Illinois at Chicago arxiv:708.06400v [cs.it] 2 Aug 207
More informationChapter 6: Energy-Momentum Tensors
49 Chapter 6: Energy-Momentum Tensors This chapter outlines the general theory of energy an momentum conservation in terms of energy-momentum tensors, then applies these ieas to the case of Bohm's moel.
More informationIterated Point-Line Configurations Grow Doubly-Exponentially
Iterate Point-Line Configurations Grow Doubly-Exponentially Joshua Cooper an Mark Walters July 9, 008 Abstract Begin with a set of four points in the real plane in general position. A to this collection
More informationThroughput Optimal Control of Cooperative Relay Networks
hroughput Optimal Control of Cooperative Relay Networks Emun Yeh Dept. of Electrical Engineering Yale University New Haven, C 06520, USA E-mail: emun.yeh@yale.eu Ranall Berry Dept. of Electrical an Computer
More informationLower Bounds for the Smoothed Number of Pareto optimal Solutions
Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.
More informationTractability results for weighted Banach spaces of smooth functions
Tractability results for weighte Banach spaces of smooth functions Markus Weimar Mathematisches Institut, Universität Jena Ernst-Abbe-Platz 2, 07740 Jena, Germany email: markus.weimar@uni-jena.e March
More informationLeaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes
Leaving Ranomness to Nature: -Dimensional Prouct Coes through the lens of Generalize-LDPC coes Tavor Baharav, Kannan Ramchanran Dept. of Electrical Engineering an Computer Sciences, U.C. Berkeley {tavorb,
More informationDelay Limited Capacity of Ad hoc Networks: Asymptotically Optimal Transmission and Relaying Strategy
Delay Limite Capacity of A hoc Networks: Asymptotically Optimal Transmission an Relaying Strategy Eugene Perevalov Lehigh University Bethlehem, PA 85 Email: eup2@lehigh.eu Rick Blum Lehigh University Bethlehem,
More informationCalculus of Variations
16.323 Lecture 5 Calculus of Variations Calculus of Variations Most books cover this material well, but Kirk Chapter 4 oes a particularly nice job. x(t) x* x*+ αδx (1) x*- αδx (1) αδx (1) αδx (1) t f t
More informationOnline Appendix for Trade Policy under Monopolistic Competition with Firm Selection
Online Appenix for Trae Policy uner Monopolistic Competition with Firm Selection Kyle Bagwell Stanfor University an NBER Seung Hoon Lee Georgia Institute of Technology September 6, 2018 In this Online
More informationII. First variation of functionals
II. First variation of functionals The erivative of a function being zero is a necessary conition for the etremum of that function in orinary calculus. Let us now tackle the question of the equivalent
More informationDegrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel
/33 Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel Presented by Paul de Kerret Joint work with Antonio Bazco, Nicolas Gresset, and David Gesbert ESIT 2017 in Madrid,
More informationPerformance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University
Performance Limits of Coded Caching under Heterogeneous Settings Xiaojun Lin Associate Professor, Purdue University Joint work with Jinbei Zhang (SJTU), Chih-Chun Wang (Purdue) and Xinbing Wang (SJTU)
More informationThe total derivative. Chapter Lagrangian and Eulerian approaches
Chapter 5 The total erivative 51 Lagrangian an Eulerian approaches The representation of a flui through scalar or vector fiels means that each physical quantity uner consieration is escribe as a function
More informationSliding mode approach to congestion control in connection-oriented communication networks
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. xx. No xx (200x), pp. xx-xx Sliing moe approach to congestion control in connection-oriente communication networks Anrzej Bartoszewicz, Justyna Żuk Technical University
More informationPDE Notes, Lecture #11
PDE Notes, Lecture # from Professor Jalal Shatah s Lectures Febuary 9th, 2009 Sobolev Spaces Recall that for u L loc we can efine the weak erivative Du by Du, φ := udφ φ C0 If v L loc such that Du, φ =
More informationIPA Derivatives for Make-to-Stock Production-Inventory Systems With Backorders Under the (R,r) Policy
IPA Derivatives for Make-to-Stock Prouction-Inventory Systems With Backorers Uner the (Rr) Policy Yihong Fan a Benamin Melame b Yao Zhao c Yorai Wari Abstract This paper aresses Infinitesimal Perturbation
More informationPerturbation Analysis and Optimization of Stochastic Flow Networks
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. XX, NO. Y, MMM 2004 1 Perturbation Analysis an Optimization of Stochastic Flow Networks Gang Sun, Christos G. Cassanras, Yorai Wari, Christos G. Panayiotou,
More information19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control
19 Eigenvalues, Eigenvectors, Orinary Differential Equations, an Control This section introuces eigenvalues an eigenvectors of a matrix, an iscusses the role of the eigenvalues in etermining the behavior
More informationarxiv: v1 [physics.flu-dyn] 8 May 2014
Energetics of a flui uner the Boussinesq approximation arxiv:1405.1921v1 [physics.flu-yn] 8 May 2014 Kiyoshi Maruyama Department of Earth an Ocean Sciences, National Defense Acaemy, Yokosuka, Kanagawa
More informationDiagonalization of Matrices Dr. E. Jacobs
Diagonalization of Matrices Dr. E. Jacobs One of the very interesting lessons in this course is how certain algebraic techniques can be use to solve ifferential equations. The purpose of these notes is
More informationThe Press-Schechter mass function
The Press-Schechter mass function To state the obvious: It is important to relate our theories to what we can observe. We have looke at linear perturbation theory, an we have consiere a simple moel for
More informationLogarithmic spurious regressions
Logarithmic spurious regressions Robert M. e Jong Michigan State University February 5, 22 Abstract Spurious regressions, i.e. regressions in which an integrate process is regresse on another integrate
More informationConservation Laws. Chapter Conservation of Energy
20 Chapter 3 Conservation Laws In orer to check the physical consistency of the above set of equations governing Maxwell-Lorentz electroynamics [(2.10) an (2.12) or (1.65) an (1.68)], we examine the action
More informationMath 1271 Solutions for Fall 2005 Final Exam
Math 7 Solutions for Fall 5 Final Eam ) Since the equation + y = e y cannot be rearrange algebraically in orer to write y as an eplicit function of, we must instea ifferentiate this relation implicitly
More informationA new proof of the sharpness of the phase transition for Bernoulli percolation on Z d
A new proof of the sharpness of the phase transition for Bernoulli percolation on Z Hugo Duminil-Copin an Vincent Tassion October 8, 205 Abstract We provie a new proof of the sharpness of the phase transition
More informationThe derivative of a function f(x) is another function, defined in terms of a limiting expression: f(x + δx) f(x)
Y. D. Chong (2016) MH2801: Complex Methos for the Sciences 1. Derivatives The erivative of a function f(x) is another function, efine in terms of a limiting expression: f (x) f (x) lim x δx 0 f(x + δx)
More informationOn the Broadcast Capacity of Multihop Wireless Networks: Interplay of Power, Density and Interference
On the Broacast Capacity of Multihop Wireless Networks: Interplay of Power, Density an Interference Alireza Keshavarz-Haa Ruolf Riei Department of Electrical an Computer Engineering an Department of Statistics
More informationImplicit Differentiation
Implicit Differentiation Thus far, the functions we have been concerne with have been efine explicitly. A function is efine explicitly if the output is given irectly in terms of the input. For instance,
More informationNode Density and Delay in Large-Scale Wireless Networks with Unreliable Links
Noe Density an Delay in Large-Scale Wireless Networks with Unreliable Links Shizhen Zhao, Xinbing Wang Department of Electronic Engineering Shanghai Jiao Tong University, China Email: {shizhenzhao,xwang}@sjtu.eu.cn
More informationNOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy,
NOTES ON EULER-BOOLE SUMMATION JONATHAN M BORWEIN, NEIL J CALKIN, AND DANTE MANNA Abstract We stuy a connection between Euler-MacLaurin Summation an Boole Summation suggeste in an AMM note from 196, which
More informationConvergence of Random Walks
Chapter 16 Convergence of Ranom Walks This lecture examines the convergence of ranom walks to the Wiener process. This is very important both physically an statistically, an illustrates the utility of
More informationCalculus of Variations
Calculus of Variations Lagrangian formalism is the main tool of theoretical classical mechanics. Calculus of Variations is a part of Mathematics which Lagrangian formalism is base on. In this section,
More information05 The Continuum Limit and the Wave Equation
Utah State University DigitalCommons@USU Founations of Wave Phenomena Physics, Department of 1-1-2004 05 The Continuum Limit an the Wave Equation Charles G. Torre Department of Physics, Utah State University,
More informationu!i = a T u = 0. Then S satisfies
Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace
More informationLower bounds on Locality Sensitive Hashing
Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,
More informationImproved Rate-Based Pull and Push Strategies in Large Distributed Networks
Improve Rate-Base Pull an Push Strategies in Large Distribute Networks Wouter Minnebo an Benny Van Hout Department of Mathematics an Computer Science University of Antwerp - imins Mielheimlaan, B-00 Antwerp,
More informationWhy Bernstein Polynomials Are Better: Fuzzy-Inspired Justification
Why Bernstein Polynomials Are Better: Fuzzy-Inspire Justification Jaime Nava 1, Olga Kosheleva 2, an Vlaik Kreinovich 3 1,3 Department of Computer Science 2 Department of Teacher Eucation University of
More informationBalancing Expected and Worst-Case Utility in Contracting Models with Asymmetric Information and Pooling
Balancing Expecte an Worst-Case Utility in Contracting Moels with Asymmetric Information an Pooling R.B.O. erkkamp & W. van en Heuvel & A.P.M. Wagelmans Econometric Institute Report EI2018-01 9th January
More informationSwitching Time Optimization in Discretized Hybrid Dynamical Systems
Switching Time Optimization in Discretize Hybri Dynamical Systems Kathrin Flaßkamp, To Murphey, an Sina Ober-Blöbaum Abstract Switching time optimization (STO) arises in systems that have a finite set
More informationA simplified macroscopic urban traffic network model for model-based predictive control
Delft University of Technology Delft Center for Systems an Control Technical report 9-28 A simplifie macroscopic urban traffic network moel for moel-base preictive control S. Lin, B. De Schutter, Y. Xi,
More informationPower Generation and Distribution via Distributed Coordination Control
Power Generation an Distribution via Distribute Coorination Control Byeong-Yeon Kim, Kwang-Kyo Oh, an Hyo-Sung Ahn arxiv:407.4870v [math.oc] 8 Jul 204 Abstract This paper presents power coorination, power
More informationHarmonic Modelling of Thyristor Bridges using a Simplified Time Domain Method
1 Harmonic Moelling of Thyristor Briges using a Simplifie Time Domain Metho P. W. Lehn, Senior Member IEEE, an G. Ebner Abstract The paper presents time omain methos for harmonic analysis of a 6-pulse
More informationEuler equations for multiple integrals
Euler equations for multiple integrals January 22, 2013 Contents 1 Reminer of multivariable calculus 2 1.1 Vector ifferentiation......................... 2 1.2 Matrix ifferentiation........................
More informationDecoding Delay and Outage Performance Analysis of Full-Duplex Decode-Forward Relaying: Backward or Sliding Window Decoding
Decoing Delay an Outage Performance Analysis of Full-Duplex Decoe-Forwar Relaying: Backwar or Sliing Winow Decoing Ahma Abu Al Haija Member IEEE an Chintha Tellambura Fellow IEEE Abstract High reliability
More informationAn M/G/1 Retrial Queue with Priority, Balking and Feedback Customers
Journal of Convergence Information Technology Volume 5 Number April 1 An M/G/1 Retrial Queue with Priority Balking an Feeback Customers Peishu Chen * 1 Yiuan Zhu 1 * 1 Faculty of Science Jiangsu University
More informationIntroduction to the Vlasov-Poisson system
Introuction to the Vlasov-Poisson system Simone Calogero 1 The Vlasov equation Consier a particle with mass m > 0. Let x(t) R 3 enote the position of the particle at time t R an v(t) = ẋ(t) = x(t)/t its
More informationarxiv: v3 [quant-ph] 16 Feb 2016
What is the probability of a thermoynamical transition? arxiv:504.00020v3 [quant-ph] 6 Feb 206 Álvaro M. Alhambra,, Jonathan Oppenheim,, 2, an Christopher Perry, Department of Physics an Astronomy, University
More informationarxiv: v4 [cs.ds] 7 Mar 2014
Analysis of Agglomerative Clustering Marcel R. Ackermann Johannes Blömer Daniel Kuntze Christian Sohler arxiv:101.697v [cs.ds] 7 Mar 01 Abstract The iameter k-clustering problem is the problem of partitioning
More informationMath 342 Partial Differential Equations «Viktor Grigoryan
Math 342 Partial Differential Equations «Viktor Grigoryan 6 Wave equation: solution In this lecture we will solve the wave equation on the entire real line x R. This correspons to a string of infinite
More informationLATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION
The Annals of Statistics 1997, Vol. 25, No. 6, 2313 2327 LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION By Eva Riccomagno, 1 Rainer Schwabe 2 an Henry P. Wynn 1 University of Warwick, Technische
More informationLower Bounds for Local Monotonicity Reconstruction from Transitive-Closure Spanners
Lower Bouns for Local Monotonicity Reconstruction from Transitive-Closure Spanners Arnab Bhattacharyya Elena Grigorescu Mahav Jha Kyomin Jung Sofya Raskhonikova Davi P. Wooruff Abstract Given a irecte
More informationTEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE
TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS Yannick DEVILLE Université Paul Sabatier Laboratoire Acoustique, Métrologie, Instrumentation Bât. 3RB2, 8 Route e Narbonne,
More informationTDD Linear Precoding Methods for Next Generation Mobile Communication Systems
MEE10:118 Master s Thesis Electrical Engineering with emphasis on Raio Communications TDD Linear Precoing Methos for Next Generation Mobile Communication Systems Author: Yuan Ding Email: ingyuan.hit@gmail.com
More informationRamsey numbers of some bipartite graphs versus complete graphs
Ramsey numbers of some bipartite graphs versus complete graphs Tao Jiang, Michael Salerno Miami University, Oxfor, OH 45056, USA Abstract. The Ramsey number r(h, K n ) is the smallest positive integer
More informationDIFFERENTIAL GEOMETRY, LECTURE 15, JULY 10
DIFFERENTIAL GEOMETRY, LECTURE 15, JULY 10 5. Levi-Civita connection From now on we are intereste in connections on the tangent bunle T X of a Riemanninam manifol (X, g). Out main result will be a construction
More informationQuantum Mechanics in Three Dimensions
Physics 342 Lecture 20 Quantum Mechanics in Three Dimensions Lecture 20 Physics 342 Quantum Mechanics I Monay, March 24th, 2008 We begin our spherical solutions with the simplest possible case zero potential.
More informationSYNCHRONOUS SEQUENTIAL CIRCUITS
CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents
More informationTIME-DELAY ESTIMATION USING FARROW-BASED FRACTIONAL-DELAY FIR FILTERS: FILTER APPROXIMATION VS. ESTIMATION ERRORS
TIME-DEAY ESTIMATION USING FARROW-BASED FRACTIONA-DEAY FIR FITERS: FITER APPROXIMATION VS. ESTIMATION ERRORS Mattias Olsson, Håkan Johansson, an Per öwenborg Div. of Electronic Systems, Dept. of Electrical
More informationCopyright Warning & Restrictions
Copyright Warning & Restrictions The copyright law of the United States (Title 17, United States Code) governs the making of photocopies or other reproductions of copyrighted material. Under certain conditions
More informationOne-dimensional I test and direction vector I test with array references by induction variable
Int. J. High Performance Computing an Networking, Vol. 3, No. 4, 2005 219 One-imensional I test an irection vector I test with array references by inuction variable Minyi Guo School of Computer Science
More informationCoded Caching under Arbitrary Popularity Distributions
Coded Caching under Arbitrary Popularity Distributions Jinbei Zhang, Xiaojun Lin, Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University, China School of Electrical and Computer Engineering,
More informationStopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Codes
Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Coes Kaiann Fu an Achilleas Anastasopoulos Electrical Engineering an Computer Science Dept. University of Michigan, Ann Arbor, MI
More informationConsider for simplicity a 3rd-order IIR filter with a transfer function. where
Basic IIR Digital Filter The causal IIR igital filters we are concerne with in this course are characterie by a real rational transfer function of or, equivalently by a constant coefficient ifference equation
More informationCoded Caching with Low Subpacketization Levels
Electrical and Computer Engineering Conference Papers, Posters and Presentations Electrical and Computer Engineering 06 Coded Caching with Low Subpacetization Levels Li Tang Iowa State University, litang@iastateedu
More informationMath Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors
Math 18.02 Notes on ifferentials, the Chain Rule, graients, irectional erivative, an normal vectors Tangent plane an linear approximation We efine the partial erivatives of f( xy, ) as follows: f f( x+
More informationOn the Connectivity Analysis over Large-Scale Hybrid Wireless Networks
This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM proceeings This paper was presente as part of the main Technical
More informationBasic IIR Digital Filter Structures
Basic IIR Digital Filter Structures The causal IIR igital filters we are concerne with in this course are characterie by a real rational transfer function of or, equivalently by a constant coefficient
More informationQuantum mechanical approaches to the virial
Quantum mechanical approaches to the virial S.LeBohec Department of Physics an Astronomy, University of Utah, Salt Lae City, UT 84112, USA Date: June 30 th 2015 In this note, we approach the virial from
More information4. Important theorems in quantum mechanics
TFY4215 Kjemisk fysikk og kvantemekanikk - Tillegg 4 1 TILLEGG 4 4. Important theorems in quantum mechanics Before attacking three-imensional potentials in the next chapter, we shall in chapter 4 of this
More informationCalculus and optimization
Calculus an optimization These notes essentially correspon to mathematical appenix 2 in the text. 1 Functions of a single variable Now that we have e ne functions we turn our attention to calculus. A function
More informationRelative Entropy and Score Function: New Information Estimation Relationships through Arbitrary Additive Perturbation
Relative Entropy an Score Function: New Information Estimation Relationships through Arbitrary Aitive Perturbation Dongning Guo Department of Electrical Engineering & Computer Science Northwestern University
More information