Improving the Accuracy of Boolean Tomography by Exploiting Path Congestion Degrees

Size: px
Start display at page:

Download "Improving the Accuracy of Boolean Tomography by Exploiting Path Congestion Degrees"

Transcription

1 Improving the Accuracy of Booean Tomography by Expoiting Path Congestion Degrees Zhiyong Zhang, Gaoei Fei, Fucai Yu, Guangmin Hu Schoo of Communication and Information Engineering, University of Eectronic Science and Technoogy of China fcyu, Abstract Booean tomography is based on expoiting performance eve correations of end-to-end measurements to identify the congested inks. Most work to date attempts to find the congested inks according to the observed pattern of congested paths and the prior ink congestion probabiities. In their work, the prior ink congestion probabiities are either assumed to be unreaisticay equa or estimated by a computationay compex agorithm. Furthermore, a congested paths are mapped down to the same bad state regardess of their congestion degrees, then separate causes of congestion may be identified as a common cause. In this paper, we propose a fast Bottom-Up Approach named to estimate the prior probabiities based on a sma number of measurement snapshots. is computationay simper than the existing approaches since it computes the congestion probabiity of each individua ink through an expicit function of the measurements. We then extract the subsets of congested paths that might traverse the same congested inks in current measurement snapshot according to their congestion degrees. The inks that cause the congestion of each subset of paths are identified with the aid of the earnt probabiities. Simuations in different network scenarios demonstrate that our approach is abe to improve the accuracy of the identification procedure. I. INTRODUCTION Booean tomography is a powerfu too for network troubeshooting. It identifies the poory performing inks using reguar unicast probes at the edge of the intervening networks. The appea of this approach is that it is abe to monitor the states of network inks without the coaboration of network interna devices and direct monitoring each singe ink. Endusers can use Booean network tomography to assess the performance of Internet Service Providers (ISPs) so as to choose reiabe ISPs. ISPs coud use it to troubeshoot probems in their own networks or monitor the performance of their peers. In principe, Booean tomography reduces the probem to a binary probem in which inks and paths can have one of two states: good and congested (aso referred to as bad ) [] [2]. If a inks on a path are good then the path is good, otherwise the path is congested. Booean tomography tries to identify the ink states from the observed path states. This probem is underdetermined, i.e., there are many different ink states matching the path states, since the number of inks aways far exceeds the number of paths. Thus additiona information is required to find a proper soution. Based on the assumptions that congested inks are rare and a inks have the same probabiity of being congested, N. Duffied proposes a fast and simpe agorithm SCFS, which designates the east inks that are consistent with the observed pattern of bad paths as congested [] [2]. Considering that a inks have the same congestion probabiity is unreaistic in practice, H. Nguyen et a. propose to find the prior ink congestion probabiities uniquey by matrix inversion based on mutipe measurement snapshots [3]. According to the estimated prior probabiities and the measurements in subsequent snapshot, the congested inks can be identified with higher accuracy by a Maximum A-Posteriori estimator. However, the ink probabiities estimation method proposed in [3] is not computationay efficient for arge-scae networks. Based on the work in [3], D. Ghita et a. study Booean tomography in the scenarios that inks the ink states are not mutuay independent [4] [5]. Booean tomography is motivated to be more practica by their work. There is another set of approaches that expoit secondorder moments of end-to-end fows. It is assumed that oss rates of congested inks have high variances and oss rates of most good inks have zero first- and second-order moments [6] [7]. After cacuating the ink variances from mutipe measurements, the authors approximate the oss rates of the inks with sma variances by zeros and compute the oss rates of the remaining inks by soving a fu rank inear system of equations. Thus the state of each ink can be identified by comparing the estimated oss rate with a threshod. However, the approximation wi cause the oss rates of some inks to be under-estimated and those of the remaining inks to be overestimated, and it is impossibe to te to what extent these errors degrade the identification accuracy. In this paper, we focus on identifying the ossiest inks since high oss rate is one of the most significant characteristics of congested inks. We make two contributions. First, we propose a fast Bottom-Up Approach named to estimate the prior ink congestion probabiities using a sma number of measurements. Contrary to the existing work that computes the probabiities of a inks by soving a high dimensiona inear system [3], is more computationay efficient since it cacuates the probabiity of each individua ink based on an expicit estimator from bottom up. Second, given the estimated ink congestion probabiities, we combine them with the end-to-end data in subsequent snapshot to identify currenty congested inks. Existing approaches identicay cassify a congested paths as congested regardess of their actua congestion degrees and that is too coarse-grained for characterizing the /2/$3. 22 IEEE 725

2 state of congested paths. Actuay, congestion degrees of the paths can be used to improve the identification accuracy. The gist is the foowing: the paths traversing the same congested inks have simiar oss degrees, since a congested ink identicay degrade the performance of the paths traversing it [6] [7] and packet osses of a congested path mainy happen at its congested constituent inks [8]. Based on this property, we divide the set of a congested paths into severa subsets through a simpe comparison method according to their oss degrees, and identify the congested inks in each subset of the congested paths using the knowedge of the prior probabiities. The remaining sections of the paper are organized as foows. We describe the network and performance mode in Section II and derive the ink probabiity estimation approach in Section III. In Section IV, we show how to divide a the congested paths into severa subsets according to their congestion degrees and identify the congested inks in each subset of congested paths. Then, we present the simuations used to evauate our method in Section V and concude this paper in Section VI. II. THE NETWORK AND PERFORMANCE MODEL We start in Section II-A by presenting our terminoogy for networks. Section II-B formaizes the mapping of inks and paths into good and congested states. A. Network Mode Simiar to [] [2], we consider the networks consisting of the paths from one source to mutipe receivers. The network topoogy is known and remains unchanged throughout the measurement period. Let the directed tree T =(V,L) denote the ogica network topoogy [9], where V is the set of nodes and L is the set of inks. The source is the root node s V which sends probe packets to the receivers. The receivers are ocated at the eaf nodes R V. Apart from s, each node k V has a unique parent f(k) and k L denotes the ink from f(k) to k. Weusej k to denote k is descended from j. Then j k signifies j k or j = k. Let a(j, k) denote the nearest common ancestor of j and k. For each interna node k V \ (R {s}), it has a set of chid nodes D(k) ={i f(i) =k, i V }. D(k) 2 since a interna nodes with a singe chid are deeted when obtaining T [9]. We consider s has a singe chid d s. If it does not hod, we divide the origina tree into mutipe sub-trees so that within each sub-tree, s has ony one chid d s, then process each sub-tree separatey. For any r R, we use P r to denote the end-to-end path from s to r. Let P = {P r r R} denote the set of a endto-end paths. So, there are L inks and P = R end-to-end paths in the network. In addition, et T (k) =(V (k),l(k)) denote the subtree of T rooted at node k, and R(k) =R V (k) denotes the set of eaf nodes contained in T (k). We define T ( k )=(V (k) {f(k)},l(k) { k }) as the subtree T (k) pus a ink k. B. Performance Mode A random variabe α k is used to represent the transmission rate of k (i.e. the oss rate of k is α k ). The ink threshod t, predefined depending on practica appications, is used to separate inks into good and congested subsets. We say that k is congested if α k <t, despite the origin of the osses. Otherwise k is good. Let X k denote the state of k : X k = if k is good and X k =if k is congested. Let p k = P(X k = ) = P(α k t ) denotes the probabiity that ink k is good and p =[p p 2 p L ] T. Let Y r denote the state of P r : Y r =if P r is good and Y r = if P r is congested. P r is good if and ony if its a constituent inks are good, so Y r = k P r X k, where denotes the booean OR operation. Under the assumption that the ink states are mutuay independent, P r is good with probabiity P(Y r =)= k P r p k. To infer the vector p, we divide a period of measurement time into m intervas (snapshots). In each snapshot, we cacuate the end-to-end transmission rates of a paths and obtain their states by comparing the transmission rates with a path threshod [] - [5]. Let y = [y () y (2) y (m) ] denote the path states in m snapshots, where y (n) = [Y (n) Y (n) 2 Y (n) P ]T ( n m). After earning p from y, we can combine it with the end-to-end transmission rates in the subsequent snapshot to identify the congested inks. III. ESTIMATING THE PRIOR PROBABILITIES It has been proved that p can be estimated from a sufficient number of snapshots if p ies in the parameter set Ω p = {p p k <, k L } in [3]. The authors suggest to construct a fu coumn rank system of inear equations and inverse the coefficient matrix of the system to find vector p. As the size of network increases, the inear system becomes high-dimensiona, which eads to increase in the computationa compexity. To overcome this probem, we present a fast Bottom-Up Approach, named, to estimate the prior ink probabiities. A. The Bottom-Up Approach For any k V, we define Z k = k k X k. Let q k be the probabiity that Z k =, i.e. the path segment from s to k is good. By convention, q s =. Provided that the ink states are independent from each other, q k = q f(k) p k, and so p k = q k /q f(k). () For any k V \{s}, q k can be estimated based on an expicit function of the path states. We define U k = min r R(k) Y r and U (n) k = min r R(k) Y r (n). Then U k = means that at east one path traversing k is good. u k = P(U k =)can be estimated by û k = m m n= U (n) k. For k R, it is obvious that q k = u k. So, q k can be estimated by q k = û k, for k R, (2) which is a consistent estimator of q k by the aw of arge numbers /2/$3. 22 IEEE 726

3 For each k V \(R {s}), et Q(k) ={{i, j} D(k) i j} be the set of distinct chid pairs of k. We define U i,j = max{u i,u j } and U (n) i,j =max{u (n) i,u (n) j } for any {i, j} Q(k). Let u i,j = P(u i,j =), then the estimator of u i,j is û i,j = m m n= U (n) i,j. The foowing theorem gives an expicit estimator for q k. Theorem : Assume p Ω p, then for k V \ (R {s}): (i) q k = u i u j /u i,j, for {i, j} Q(k). (ii) Define q k (i, j) = û i û j /û i,j. Then any convex combination {i,j} Q(k) λ i,jq k (i, j) (i.e. with the λ i,j and summing to ) is a consistent estimator of q k. proof : (i) U i,j =impies Z k =, hence u i,j = P(U i,j =,Z k =) = q k P(U i,j = Z k =) = q k P(U i =,U j = Z k =) (3) = q k P(U i = Z k =)P(U j = Z k =) = q k ( u i )( u j ). q k q k Therefore, q k = u i u j /u i,j. (ii) By the aw of arge numbers, for {i, j} Q(k), û i u i, û j u j and û i,j u i,j amost surey as m. {i,j} Q(k) λ i,j ui u j u i,j is evidenty continuous as p Ω p, then {i,j} Q(k) λ i,jq k (i, j) is consistent. Theorem -(ii) constructs a convex famiy of consistent estimators for q k. It is appeaing to find the estimator of minima variance. However, finding the minima variance estimator comes at some computationa cost []. For computationa simpicity, we adopt the uniform estimator (i.e. with the λ i,j =/ Q(k) ) q k = û i û j. (4) Q(k) û i,j {i,j} Q(k) Combining (2) and (4), estimates q k through an expicit function of the observed path states from the bottom up unti k = d s. Once q k and q f(k) are obtained, the prior probabiity of k can be estimated by p k = q k / q f(k), which is aso consistent evidenty. B. Computationa Compexity Anaysis In this section, we demonstrate that is computationay simper than the High-dimensiona Matrix Inversion based method () presented in [3]. For simpicity, we consider a uniform tree with branching ratio d. In cacuation of the empirica probabiities û k and û i,j, needs to cacuate the combined path states U k = min r R(k) Y r =min i D(k) U i, and U i,j =max{u i,u j }. This takes respectivey m(d ) and md(d )/2 times of booean operation for m snapshots. Thus, O(m( L P )) times of booean operation are needed for a interna inks. Thereafter, the computation of is very computationay efficient, just needing expicit computations on the empirica probabiities. In constructing a fu coumn rank system of inear equations, takes L P ( P )/2 and m P ( P )/2 times of booean operation to cacuate the coefficient matrix and the empirica probabiities, respectivey [3]. A significant amount of time is needed for arge-scae networks [6]. Besides, the computationa compexity of using a standard technique from inear agebra to invert the matrix is O( P 2 L 2 L 3 /3) [], which is far more compex than the expicit computation of. Therefore, is more computationay efficient than, and the computationa compexity of increases faster than that of as the number of inks increases. Preiminary simuation resuts presented in Section V-B aso vaidate this deduction. IV. IDENTIFYING THE CONGESTED LINKS In this section, we propose an Improved Congested Link Identification agorithm (ICLI), which combines the estimated ink probabiities introduced in the previous section with the end-to-end transmission rates in current snapshot to identify currenty congested inks. A. Dividing the Set of Congested Paths Previous work [] - [5] identicay cassifies the paths whose oss rates exceed the path threshod as congested, despite their actua congestion degrees. This might cause fase negative errors if one path contains mutipe congested inks and fase positive errors if separate congestion happen at different inks derived from the same parent node. To overcome this probem, it is necessary to differentiate paths with different congestion degrees. A natura method is to spit the congestion state into mutipe sub-states. However, the reation between the ink states and the path states wi be more compex [2]. In order to expoit the knowedge of the congestion degrees and avoid spitting the congestion state into mutipe substates, we adopt a simpe method which ony invoves comparison operation to divide the set of a congested paths into severa subsets. Before that, we need to identify and remove a the good paths from the origina tree T at first, by comparing the path transmission rates β = {β r } r R in current snapshot with the path threshod [] - [5]. Thus T is separated into severa maxima congested subtrees [2]. Then we can process each subtree separatey since the paths in different maxima congested subtrees cannot contain common congested inks. For the maxima congested subtree rooted at node k, the state of ink k is aso undetermined, so we use T ( k ) instead of T (k) to denote this subtree. Let P (k) ={P r r R(k)} denote the set of the paths in T ( k ). We first extract the east congested paths in P (k), identify the inks that resut in the congestion of these paths, and remove these paths from T ( k ). Then, we are eft with some congested subtrees of T ( k ) formed by the remaining paths. These subtrees do not share common inks, so we can appy the same operation with T ( k ) to process each remaining subtree unti a the congested paths are removed. In order to extract the east congested paths in P (k), we choose the path P m P (k) with the maximum transmission rate as a representative. For any path P n P (k) \{P m }, /2/$3. 22 IEEE 727

4 Fig.. An exampe of maxima congested subtree T ( k ) P m and P n separate at node j = a(m, n) as shown in Fig.. Let P j,n denote the path segment from node j to n. We adopt the criterion that P n shoud not be put into the set of east congested paths if P j,n contains congested inks. Referring to the method adopted in [2] [3] for choosing path threshod in a weak separabe performance mode, we take t h(j,n) as the transmission rate threshod of P j,n for identifying whether it contains congested inks or not, where h(j, n) is the ength of P j,n. Unfortunatey, there is no way to accuratey compute the transmission rate of P j,n ony according to the end-to-end data. Here, we use β i,i to denote the transmission rate of the path segment from node i to i. Then, β j,n = β n /β s,j = β n β j,m /β m, where β n and β m can be observed whereas β j,m cannot. So we approximate β j,n by β j,n β j,m β j,n = β n /β m. That is to say, if β n /β m <t h(j,n), P s,n is excuded from the set of east congested paths. Through a simpe comparison operation, any path P n P (k) \{P m } can be identified whether it shoud be put in the set of east congested paths. It takes P (k) times of comparison to identify a the paths in P (k), so this operation is computationay efficient. To seect t h(j,n) as the transmission rate threshod of P j,n and approximate β j,n by β s,n /β s,m may cause some errors. On one hand, if one ink i P j,n is congested, the chance for P n to be put in the set of congested paths is P(β j,n /β j,m t h(j,n) i congested) = P(β j,n β j,m t h(j,n) α i <t ) P(α i β j,m t h(j,n) α i <t ) = P(α i [β j,m t h(j,n),t ) i congested). Note that this bound wi decrease as β j,m increases and h(j, n) decreases. So, choosing the path with the maximum transmission rate as the representative can ensure a sma bound. For the genera oss rate mode in [2], the bound is β j,m t h(j,n), e.g., about 5% for β j,m =.99 and h(j, n) =5. On the other hand, if a the inks in P j,n are good, then β j,n t h(j,n) β j,m t h(j,n). P n wi be aways correcty identified. (5) B. Identifying the Congested Links in the Set of Least Congested Paths Let P (k) P k denote the set of east congested paths, T ( k )=(V ( k ),L ( k )) denote the subtree of T ( k ) formed by the paths in P (k), and R ( k ) denote the eaf nodes in T ( k ). Then, the congested inks in T ( k ) can be identified with the aid of the prior ink probabiities p. This probem is equivaent to find a vector X L( k ) that maximizes the conditiona probabiity given p and P (k) are congested: P p (X L( k ))=P p (X L( k ) = x Y R( k ) = ). From Bayes rue, P p (X L ( k ) = x Y R ( k ) = ) (6) P p (X L ( k ) = x)p p (Y R ( k ) = X L ( k ) = x) and P p (Y R ( k ) = X L ( k ) = x) { k if = j r x j =for r R ( k ) (7), otherwise P p (X L( k ) = x) = j L ( k ) j L ( k ) p x j j ( p j ) xj x j og p j p j, we are eft with the equivaent optimization probem: argmax P p (X L ( k ))=argmax x j og p j p j j L ( k ) = argmin p (9) j x j og p j j L ( k ) subject to k j r x j =for a r R ( k ). The optimization probem in (9) is indeed the weighted set cover probem where the universe is P (k) and the weight of subset P ( j )=P ( j ) P (k) is og(p j /( p j )). The heuristic agorithm CLINK in [3] can be used to sove this probem. Contrary to [3] and most other reated work, which is to find the congested inks in each maxima congested subtree at once, ICLI extracts the east congested subtrees and finds their congested constituent inks. That makes ICLI achieve higher accuracy. V. PERFORMANCE EVALUATION In this section, we evauate our approach by simuations in different scenarios. We first describe the simuation configurations in Section V-A and then investigate the behavior of in V-B. Section V-C presents the simuation resuts of ICLI. A. Simuation Setup The network topoogies are randomy constructed with the number of inks ( L ) ranging from to 3. Apart from the root and eaf nodes, the branching ratio of each node (the number of chidren) is picked at random between 2 and. To evauate the approach under different congestion eves, the proportion of congested inks, denoted by f, is varying (8) /2/$3. 22 IEEE 728

5 TABLE I RUNNING TIME OF AND (IN MILLISECONDS) L the Logarithm of Running Time Cumuative Distribution Absoute Error (a) CDF of the absoute errors when the number of inks is..9 Cumuative Distribution Absoute Error (b) CDF of the absoute errors when the number of inks is Number of Links ( L ) Cumuative Distribution.8.7 Cumuative Distribution.8.7 Fig. 2. Running time of and when f =5%and L is varying from to 4. from 5% to 35%. Given f, the prior ink probabiities p are randomy generated such that the average number of congested inks equas to L f. The number of measurement snapshots used for earning p, i.e. m, is set to be. Within each snapshot, ink k is randomy designated to be congested with probabiity p k. We use the genera oss rate mode in [2] to assign transmission rates to inks, where the transmission rates of congested inks and good inks are uniformy picked from [,.99] and [.99, ] respectivey. The ink threshod is t =.99 and the path threshod for identifying path states is t p = t h, where h is the number of inks traversed by the path. We repeat our simuations times for each configuration, where each repetition has a new topoogy and prior ink probabiity assignments. We first appy to estimate the prior ink probabiities p using the end-to-end data in m snapshots and then proceed to identify the congested inks in a new snapshot. B. Evauation of prior probabiity estimation agorithms Here, we compare and with respect to their running time and accuracy of estimating the prior ink probabiities. It is hard to impement such that the simuation competes within a reasonabe amount of time and memory space, given a arge-scae network, so we assess their performance with the number of inks varying from to 4. The running time of the two agorithms are independent on f, so the resuts for different proportions of congested inks are simiar. We ony give the comparisons for f =5%, as shown in Tabe I and Fig. 2. We observe that the running time of is much onger than that of under the same conditions... Absoute Error (c) CDF of the absoute errors when the number of inks is 3... Absoute Error (d) CDF of the absoute errors when the number of inks is 4. Fig. 3. Accuracy of and when f = 35% and L is varying from to 4. As the size of network increases, the running time of amost increases ineary, whereas that of increases more significanty. This is consistent with our anaysis resut in section III-B. Fig. 3 shows the Cumuative Distribution Functions (CDFs) of the absoute errors of the estimated prior probabiities. We just give the resuts for one of the ten trees with f = 35% since the resuts for other trees and f are simiar. The errors in come from two sources: (i) the samping errors in estimating the empirica probabiities, which aso exists in ; (ii) the errors accumuated from estimation of the downstream inks, which is indeed the cost that incurred by s computationa simpicity. Even under these errors, we observe that achieves accuracy comparabe to in genera. Actuay, the sma differences between the prior probabiities estimated from and do not make the fina identification resuts different. C. Evauation of congested ink identification agorithms To evauate the performance of the congested ink identification agorithms, we use the foowing metrics: the detection rate (DR), which is the proportion of inks that are identified as congested correcty, and the fase positive rate (FPR), which is the proportion of inks that are good but we identify them as congested. If F denotes the set of the actua congested inks, and X denotes the set of inks identified as congested, then DR= F X / F, FPR= X \ F / X /2/$3. 22 IEEE 729

6 Fig. 4. DR and FPR of the CLINK and ICLI agorithms for -ink networks when f is varying from 5% to 35%. We compare ICLI with the CLINK agorithm proposed in [3]. Simiar to ICLI, CLINK combines the earnt prior probabiities with the current measurements to identify the congested inks. In order to evauate the performance of ICLI and CLINK in arge-scae networks, we ony use the prior probabiities earnt from as input. In fact, the prior probabiities earnt from and can both be used as input to ICLI and CLINK. However, the resuts of the same identification agorithm are simiar in most scenarios even though different prior probabiity estimation methods are used. That is because the orders of the weight of each ink, i.e. the vaue og(p j /( p j )), in the congested subtrees are rarey different. Fig. 4 shows the DR and FPR of the two congested ink identification agorithms when the network is under different congestion eves. We note that both ICLI and CLINK perform we when f changes. This bois down to the fact that they use prior probabiities to overcome the bias against shared inks. Meanwhie, ICLI aso differentiates the congested paths with different congestion eves and therefore it has higher DR and ower FPR than CLINK. Furthermore, the confidence intervas of ICLI are smaer than those of CLINK. We beieve that to divide each maxima congested subtree into severa sma subtrees is one reason for the stabiity of ICLI. We aso observe that the DR of CLINK increases a bit as f grows from 2% to 35%. However, this comes at the cost of a high FPR ranging from 5% to 2%. Such a high FPR is unacceptabe when there are a ot of congested inks in the networks since the cost of fase positive is reativey higher than that of fase negatives. Fig. 5 and Fig. 6 show the scaing behavior of the CLINK and ICLI agorithms for arge-scae networks when f =5% and 35% respectivey. We observe that the reative performance remains quaitativey the same even for arger networks. ICLI performs better than CLINK with higher DR. When f =5%, ICLI and CLINK achieve comparabe FPRs which are ess than 5% for most of the networks. When f = 35%, the FPR of ICLI is much ower than that of CLINK, which is Fig. 5. DR and FPR of the CLINK and ICLI agorithms for networks of different number of inks when f =5%. Fig. 6. DR and FPR of the CLINK and ICLI agorithms for networks of different number of inks when f = 35%. consistent with Fig. 4. VI. CONCLUSION In this paper, we propose a fast and accurate approach to identify the congested inks by using the prior ink congestion probabiities and end-to-end data in current snapshot. Since our approach expoits the congestion degrees to differentiate the congested paths that have separate causes of congestion, it has the potentia to overcome some issues in the existing approaches, such as omitting some congested inks ocating in the same path and the bias against shared inks. To compute the prior probabiities quicky, we propose a consistent estimator which is an expicit function of the measurements. We vaidate the effectiveness of our approach through simuations and observe that it achieves better accuracy than the existing approaches especiay when the networks are under heavy congestion eves. ACKNOWLEDGEMENT This work was supported in part by the Nationa Natura Science Foundation of China (No and No /2/$3. 22 IEEE 73

7 679) and the Fundamenta Research Funds for the Centra Universities of UESTC (No E22525). REFERENCES [] N. Duffied. Simpe network performance tomography. In Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement, pages ACM, 23. [2] N. Duffied. Network tomography of binary network performance characteristics. Information Theory, IEEE Transactions on, 52(2): , 26. [3] H.X. Nguyen and P. Thiran. The booean soution to the congested ip ink ocation probem: Theory and practice. In INFOCOM th IEEE Internationa Conference on Computer Communications. IEEE, pages IEEE, 27. [4] D. Ghita, K. Argyraki, and P. Thiran. Network tomography on correated inks. In Proceedings of the th annua conference on Internet measurement, pages ACM, 2. [5] D. Ghita, C. Karakus, K. Argyraki, and P. Thiran. Shifting Network Tomography Toward A Practica Goa. In Proceedings of the ACM Internationa Conference on emerging Networking EXperiments and Technoogies (CoNext), 2. [6] H.X. Nguyen and P. Thiran. Network oss inference with second order statistics of end-to-end fows. In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, pages ACM, 27. [7] D. Ghita, H. Nguyen, M. Kurant, K. Argyraki, and P. Thiran. Netscope: practica network oss tomography. In INFOCOM, 2 Proceedings IEEE, pages 9. IEEE, 2. [8] V.N. Padmanabhan, L. Qiu, and H.J. Wang. Server-based inference of internet ink ossiness. In INFOCOM 23. Twenty-Second Annua Joint Conference of the IEEE Computer and Communications. IEEE Societies, voume, pages IEEE, 23. [9] R. Caceres, N.G. Duffied, J. Horowitz, and D.F. Towsey. Muticastbased inference of network-interna oss characteristics. Information Theory, IEEE Transactions on, 45(7): , 999. [] N.G. Duffied and F. Lo Presti. Muticast inference of packet deay variance at interior network inks. In INFOCOM 2. Nineteenth Annua Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, voume 3, pages IEEE, 2. [] G.H. Goub and C.F. Van Loan. Matrix computations, voume 3. Johns Hopkins Univ Pr, /2/$3. 22 IEEE 73

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai

More information

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance Send Orders for Reprints to reprints@benthamscience.ae 340 The Open Cybernetics & Systemics Journa, 015, 9, 340-344 Open Access Research of Data Fusion Method of Muti-Sensor Based on Correation Coefficient

More information

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with?

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with? Bayesian Learning A powerfu and growing approach in machine earning We use it in our own decision making a the time You hear a which which coud equay be Thanks or Tanks, which woud you go with? Combine

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c)

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c) A Simpe Efficient Agorithm of 3-D Singe-Source Locaization with Uniform Cross Array Bing Xue a * Guangyou Fang b Yicai Ji c Key Laboratory of Eectromagnetic Radiation Sensing Technoogy, Institute of Eectronics,

More information

BP neural network-based sports performance prediction model applied research

BP neural network-based sports performance prediction model applied research Avaiabe onine www.jocpr.com Journa of Chemica and Pharmaceutica Research, 204, 6(7:93-936 Research Artice ISSN : 0975-7384 CODEN(USA : JCPRC5 BP neura networ-based sports performance prediction mode appied

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Brandon Maone Department of Computer Science University of Hesini February 18, 2014 Abstract This document derives, in excrutiating

More information

Separation of Variables and a Spherical Shell with Surface Charge

Separation of Variables and a Spherical Shell with Surface Charge Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation

More information

FRST Multivariate Statistics. Multivariate Discriminant Analysis (MDA)

FRST Multivariate Statistics. Multivariate Discriminant Analysis (MDA) 1 FRST 531 -- Mutivariate Statistics Mutivariate Discriminant Anaysis (MDA) Purpose: 1. To predict which group (Y) an observation beongs to based on the characteristics of p predictor (X) variabes, using

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

Adaptive Multicast Topology Inference

Adaptive Multicast Topology Inference 1 Adaptive Muticast Topoogy Inference N.G. Duffied 1 J. Horowitz 2 F. Lo Presti 1;3 1 AT&T Labs Research 2 Dept. Math. & Statistics 3 Dept. of Computer Science 18 Park Avenue University of Massachusetts

More information

On the Goal Value of a Boolean Function

On the Goal Value of a Boolean Function On the Goa Vaue of a Booean Function Eric Bach Dept. of CS University of Wisconsin 1210 W. Dayton St. Madison, WI 53706 Lisa Heerstein Dept of CSE NYU Schoo of Engineering 2 Metrotech Center, 10th Foor

More information

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay Throughput Optima Scheduing for Wireess Downinks with Reconfiguration Deay Vineeth Baa Sukumaran vineethbs@gmai.com Department of Avionics Indian Institute of Space Science and Technoogy. Abstract We consider

More information

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron Neura Information Processing - Letters and Reviews Vo. 5, No. 2, November 2004 LETTER A Soution to the 4-bit Parity Probem with a Singe Quaternary Neuron Tohru Nitta Nationa Institute of Advanced Industria

More information

A Novel Learning Method for Elman Neural Network Using Local Search

A Novel Learning Method for Elman Neural Network Using Local Search Neura Information Processing Letters and Reviews Vo. 11, No. 8, August 2007 LETTER A Nove Learning Method for Eman Neura Networ Using Loca Search Facuty of Engineering, Toyama University, Gofuu 3190 Toyama

More information

Alberto Maydeu Olivares Instituto de Empresa Marketing Dept. C/Maria de Molina Madrid Spain

Alberto Maydeu Olivares Instituto de Empresa Marketing Dept. C/Maria de Molina Madrid Spain CORRECTIONS TO CLASSICAL PROCEDURES FOR ESTIMATING THURSTONE S CASE V MODEL FOR RANKING DATA Aberto Maydeu Oivares Instituto de Empresa Marketing Dept. C/Maria de Moina -5 28006 Madrid Spain Aberto.Maydeu@ie.edu

More information

Toward the Practical Use of Network Tomography for Internet Topology Discovery

Toward the Practical Use of Network Tomography for Internet Topology Discovery This fu text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for pubication in the IEEE INFOCOM 010 proceedings This paper was presented as part of the main

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

Data Mining Technology for Failure Prognostic of Avionics

Data Mining Technology for Failure Prognostic of Avionics IEEE Transactions on Aerospace and Eectronic Systems. Voume 38, #, pp.388-403, 00. Data Mining Technoogy for Faiure Prognostic of Avionics V.A. Skormin, Binghamton University, Binghamton, NY, 1390, USA

More information

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network

More information

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische

More information

Melodic contour estimation with B-spline models using a MDL criterion

Melodic contour estimation with B-spline models using a MDL criterion Meodic contour estimation with B-spine modes using a MDL criterion Damien Loive, Ney Barbot, Oivier Boeffard IRISA / University of Rennes 1 - ENSSAT 6 rue de Kerampont, B.P. 80518, F-305 Lannion Cedex

More information

Statistical Learning Theory: A Primer

Statistical Learning Theory: A Primer Internationa Journa of Computer Vision 38(), 9 3, 2000 c 2000 uwer Academic Pubishers. Manufactured in The Netherands. Statistica Learning Theory: A Primer THEODOROS EVGENIOU, MASSIMILIANO PONTIL AND TOMASO

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

Do Schools Matter for High Math Achievement? Evidence from the American Mathematics Competitions Glenn Ellison and Ashley Swanson Online Appendix

Do Schools Matter for High Math Achievement? Evidence from the American Mathematics Competitions Glenn Ellison and Ashley Swanson Online Appendix VOL. NO. DO SCHOOLS MATTER FOR HIGH MATH ACHIEVEMENT? 43 Do Schoos Matter for High Math Achievement? Evidence from the American Mathematics Competitions Genn Eison and Ashey Swanson Onine Appendix Appendix

More information

Automobile Prices in Market Equilibrium. Berry, Pakes and Levinsohn

Automobile Prices in Market Equilibrium. Berry, Pakes and Levinsohn Automobie Prices in Market Equiibrium Berry, Pakes and Levinsohn Empirica Anaysis of demand and suppy in a differentiated products market: equiibrium in the U.S. automobie market. Oigopoistic Differentiated

More information

Efficient Generation of Random Bits from Finite State Markov Chains

Efficient Generation of Random Bits from Finite State Markov Chains Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

SVM: Terminology 1(6) SVM: Terminology 2(6)

SVM: Terminology 1(6) SVM: Terminology 2(6) Andrew Kusiak Inteigent Systems Laboratory 39 Seamans Center he University of Iowa Iowa City, IA 54-57 SVM he maxima margin cassifier is simiar to the perceptron: It aso assumes that the data points are

More information

High Spectral Resolution Infrared Radiance Modeling Using Optimal Spectral Sampling (OSS) Method

High Spectral Resolution Infrared Radiance Modeling Using Optimal Spectral Sampling (OSS) Method High Spectra Resoution Infrared Radiance Modeing Using Optima Spectra Samping (OSS) Method J.-L. Moncet and G. Uymin Background Optima Spectra Samping (OSS) method is a fast and accurate monochromatic

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

STA 216 Project: Spline Approach to Discrete Survival Analysis

STA 216 Project: Spline Approach to Discrete Survival Analysis : Spine Approach to Discrete Surviva Anaysis November 4, 005 1 Introduction Athough continuous surviva anaysis differs much from the discrete surviva anaysis, there is certain ink between the two modeing

More information

SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS

SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS ISEE 1 SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS By Yingying Fan and Jinchi Lv University of Southern Caifornia This Suppementary Materia

More information

A Statistical Framework for Real-time Event Detection in Power Systems

A Statistical Framework for Real-time Event Detection in Power Systems 1 A Statistica Framework for Rea-time Event Detection in Power Systems Noan Uhrich, Tim Christman, Phiip Swisher, and Xichen Jiang Abstract A quickest change detection (QCD) agorithm is appied to the probem

More information

8 Digifl'.11 Cth:uits and devices

8 Digifl'.11 Cth:uits and devices 8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,

More information

Fitting Algorithms for MMPP ATM Traffic Models

Fitting Algorithms for MMPP ATM Traffic Models Fitting Agorithms for PP AT Traffic odes A. Nogueira, P. Savador, R. Vaadas University of Aveiro / Institute of Teecommunications, 38-93 Aveiro, Portuga; e-mai: (nogueira, savador, rv)@av.it.pt ABSTRACT

More information

(This is a sample cover image for this issue. The actual cover is not yet available at this time.)

(This is a sample cover image for this issue. The actual cover is not yet available at this time.) (This is a sampe cover image for this issue The actua cover is not yet avaiabe at this time) This artice appeared in a journa pubished by Esevier The attached copy is furnished to the author for interna

More information

Partial permutation decoding for MacDonald codes

Partial permutation decoding for MacDonald codes Partia permutation decoding for MacDonad codes J.D. Key Department of Mathematics and Appied Mathematics University of the Western Cape 7535 Bevie, South Africa P. Seneviratne Department of Mathematics

More information

SVM-based Supervised and Unsupervised Classification Schemes

SVM-based Supervised and Unsupervised Classification Schemes SVM-based Supervised and Unsupervised Cassification Schemes LUMINITA STATE University of Pitesti Facuty of Mathematics and Computer Science 1 Targu din Vae St., Pitesti 110040 ROMANIA state@cicknet.ro

More information

Unconditional security of differential phase shift quantum key distribution

Unconditional security of differential phase shift quantum key distribution Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice

More information

NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION

NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION Hsiao-Chang Chen Dept. of Systems Engineering University of Pennsyvania Phiadephia, PA 904-635, U.S.A. Chun-Hung Chen

More information

Active Learning & Experimental Design

Active Learning & Experimental Design Active Learning & Experimenta Design Danie Ting Heaviy modified, of course, by Lye Ungar Origina Sides by Barbara Engehardt and Aex Shyr Lye Ungar, University of Pennsyvania Motivation u Data coection

More information

6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7

6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7 6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17 Soution 7 Probem 1: Generating Random Variabes Each part of this probem requires impementation in MATLAB. For the

More information

High-order approximations to the Mie series for electromagnetic scattering in three dimensions

High-order approximations to the Mie series for electromagnetic scattering in three dimensions Proceedings of the 9th WSEAS Internationa Conference on Appied Mathematics Istanbu Turkey May 27-29 2006 (pp199-204) High-order approximations to the Mie series for eectromagnetic scattering in three dimensions

More information

Inductive Bias: How to generalize on novel data. CS Inductive Bias 1

Inductive Bias: How to generalize on novel data. CS Inductive Bias 1 Inductive Bias: How to generaize on nove data CS 478 - Inductive Bias 1 Overfitting Noise vs. Exceptions CS 478 - Inductive Bias 2 Non-Linear Tasks Linear Regression wi not generaize we to the task beow

More information

Copyright information to be inserted by the Publishers. Unsplitting BGK-type Schemes for the Shallow. Water Equations KUN XU

Copyright information to be inserted by the Publishers. Unsplitting BGK-type Schemes for the Shallow. Water Equations KUN XU Copyright information to be inserted by the Pubishers Unspitting BGK-type Schemes for the Shaow Water Equations KUN XU Mathematics Department, Hong Kong University of Science and Technoogy, Cear Water

More information

Algorithms to solve massively under-defined systems of multivariate quadratic equations

Algorithms to solve massively under-defined systems of multivariate quadratic equations Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations

More information

arxiv: v1 [math.co] 17 Dec 2018

arxiv: v1 [math.co] 17 Dec 2018 On the Extrema Maximum Agreement Subtree Probem arxiv:1812.06951v1 [math.o] 17 Dec 2018 Aexey Markin Department of omputer Science, Iowa State University, USA amarkin@iastate.edu Abstract Given two phyogenetic

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

arxiv: v1 [cs.lg] 31 Oct 2017

arxiv: v1 [cs.lg] 31 Oct 2017 ACCELERATED SPARSE SUBSPACE CLUSTERING Abofaz Hashemi and Haris Vikao Department of Eectrica and Computer Engineering, University of Texas at Austin, Austin, TX, USA arxiv:7.26v [cs.lg] 3 Oct 27 ABSTRACT

More information

Problem set 6 The Perron Frobenius theorem.

Problem set 6 The Perron Frobenius theorem. Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator

More information

From Margins to Probabilities in Multiclass Learning Problems

From Margins to Probabilities in Multiclass Learning Problems From Margins to Probabiities in Muticass Learning Probems Andrea Passerini and Massimiiano Ponti 2 and Paoo Frasconi 3 Abstract. We study the probem of muticass cassification within the framework of error

More information

The basic equation for the production of turbulent kinetic energy in clouds is. dz + g w

The basic equation for the production of turbulent kinetic energy in clouds is. dz + g w Turbuence in couds The basic equation for the production of turbuent kinetic energy in couds is de TKE dt = u 0 w 0 du v 0 w 0 dv + g w q 0 q 0 e The first two terms on the RHS are associated with shear

More information

$, (2.1) n="# #. (2.2)

$, (2.1) n=# #. (2.2) Chapter. Eectrostatic II Notes: Most of the materia presented in this chapter is taken from Jackson, Chap.,, and 4, and Di Bartoo, Chap... Mathematica Considerations.. The Fourier series and the Fourier

More information

Approximation and Fast Calculation of Non-local Boundary Conditions for the Time-dependent Schrödinger Equation

Approximation and Fast Calculation of Non-local Boundary Conditions for the Time-dependent Schrödinger Equation Approximation and Fast Cacuation of Non-oca Boundary Conditions for the Time-dependent Schrödinger Equation Anton Arnod, Matthias Ehrhardt 2, and Ivan Sofronov 3 Universität Münster, Institut für Numerische

More information

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University

More information

Formulas for Angular-Momentum Barrier Factors Version II

Formulas for Angular-Momentum Barrier Factors Version II BNL PREPRINT BNL-QGS-06-101 brfactor1.tex Formuas for Anguar-Momentum Barrier Factors Version II S. U. Chung Physics Department, Brookhaven Nationa Laboratory, Upton, NY 11973 March 19, 2015 abstract A

More information

Componentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems

Componentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems Componentwise Determination of the Interva Hu Soution for Linear Interva Parameter Systems L. V. Koev Dept. of Theoretica Eectrotechnics, Facuty of Automatics, Technica University of Sofia, 1000 Sofia,

More information

arxiv: v2 [cond-mat.stat-mech] 14 Nov 2008

arxiv: v2 [cond-mat.stat-mech] 14 Nov 2008 Random Booean Networks Barbara Drosse Institute of Condensed Matter Physics, Darmstadt University of Technoogy, Hochschustraße 6, 64289 Darmstadt, Germany (Dated: June 27) arxiv:76.335v2 [cond-mat.stat-mech]

More information

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems Convergence Property of the Iri-Imai Agorithm for Some Smooth Convex Programming Probems S. Zhang Communicated by Z.Q. Luo Assistant Professor, Department of Econometrics, University of Groningen, Groningen,

More information

Statistical Learning Theory: a Primer

Statistical Learning Theory: a Primer ??,??, 1 6 (??) c?? Kuwer Academic Pubishers, Boston. Manufactured in The Netherands. Statistica Learning Theory: a Primer THEODOROS EVGENIOU AND MASSIMILIANO PONTIL Center for Bioogica and Computationa

More information

BDD-Based Analysis of Gapped q-gram Filters

BDD-Based Analysis of Gapped q-gram Filters BDD-Based Anaysis of Gapped q-gram Fiters Marc Fontaine, Stefan Burkhardt 2 and Juha Kärkkäinen 2 Max-Panck-Institut für Informatik Stuhsatzenhausweg 85, 6623 Saarbrücken, Germany e-mai: stburk@mpi-sb.mpg.de

More information

Structural Control of Probabilistic Boolean Networks and Its Application to Design of Real-Time Pricing Systems

Structural Control of Probabilistic Boolean Networks and Its Application to Design of Real-Time Pricing Systems Preprints of the 9th Word Congress The Internationa Federation of Automatic Contro Structura Contro of Probabiistic Booean Networks and Its Appication to Design of Rea-Time Pricing Systems Koichi Kobayashi

More information

AST 418/518 Instrumentation and Statistics

AST 418/518 Instrumentation and Statistics AST 418/518 Instrumentation and Statistics Cass Website: http://ircamera.as.arizona.edu/astr_518 Cass Texts: Practica Statistics for Astronomers, J.V. Wa, and C.R. Jenkins, Second Edition. Measuring the

More information

Timing Attacks on Cognitive Authentication Schemes

Timing Attacks on Cognitive Authentication Schemes Timing Attacks on Cognitive Authentication Schemes Mario Čagaj, Toni Perković, Member, IEEE, Marin Bugarić Department of Eectrica Engineering, FESB, University of Spit, Croatia {mcagaj, toperkov, mbugaric}@fesb.hr

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

Combining reaction kinetics to the multi-phase Gibbs energy calculation

Combining reaction kinetics to the multi-phase Gibbs energy calculation 7 th European Symposium on Computer Aided Process Engineering ESCAPE7 V. Pesu and P.S. Agachi (Editors) 2007 Esevier B.V. A rights reserved. Combining reaction inetics to the muti-phase Gibbs energy cacuation

More information

Nonlinear Gaussian Filtering via Radial Basis Function Approximation

Nonlinear Gaussian Filtering via Radial Basis Function Approximation 51st IEEE Conference on Decision and Contro December 10-13 01 Maui Hawaii USA Noninear Gaussian Fitering via Radia Basis Function Approximation Huazhen Fang Jia Wang and Raymond A de Caafon Abstract This

More information

ASummaryofGaussianProcesses Coryn A.L. Bailer-Jones

ASummaryofGaussianProcesses Coryn A.L. Bailer-Jones ASummaryofGaussianProcesses Coryn A.L. Baier-Jones Cavendish Laboratory University of Cambridge caj@mrao.cam.ac.uk Introduction A genera prediction probem can be posed as foows. We consider that the variabe

More information

c 2016 Georgios Rovatsos

c 2016 Georgios Rovatsos c 2016 Georgios Rovatsos QUICKEST CHANGE DETECTION WITH APPLICATIONS TO LINE OUTAGE DETECTION BY GEORGIOS ROVATSOS THESIS Submitted in partia fufiment of the requirements for the degree of Master of Science

More information

Integrating Factor Methods as Exponential Integrators

Integrating Factor Methods as Exponential Integrators Integrating Factor Methods as Exponentia Integrators Borisav V. Minchev Department of Mathematica Science, NTNU, 7491 Trondheim, Norway Borko.Minchev@ii.uib.no Abstract. Recenty a ot of effort has been

More information

C. Fourier Sine Series Overview

C. Fourier Sine Series Overview 12 PHILIP D. LOEWEN C. Fourier Sine Series Overview Let some constant > be given. The symboic form of the FSS Eigenvaue probem combines an ordinary differentia equation (ODE) on the interva (, ) with a

More information

Multilayer Kerceptron

Multilayer Kerceptron Mutiayer Kerceptron Zotán Szabó, András Lőrincz Department of Information Systems, Facuty of Informatics Eötvös Loránd University Pázmány Péter sétány 1/C H-1117, Budapest, Hungary e-mai: szzoi@csetehu,

More information

Rate-Distortion Theory of Finite Point Processes

Rate-Distortion Theory of Finite Point Processes Rate-Distortion Theory of Finite Point Processes Günther Koiander, Dominic Schuhmacher, and Franz Hawatsch, Feow, IEEE Abstract We study the compression of data in the case where the usefu information

More information

Control Chart For Monitoring Nonparametric Profiles With Arbitrary Design

Control Chart For Monitoring Nonparametric Profiles With Arbitrary Design Contro Chart For Monitoring Nonparametric Profies With Arbitrary Design Peihua Qiu 1 and Changiang Zou 2 1 Schoo of Statistics, University of Minnesota, USA 2 LPMC and Department of Statistics, Nankai

More information

STABILITY OF A PARAMETRICALLY EXCITED DAMPED INVERTED PENDULUM 1. INTRODUCTION

STABILITY OF A PARAMETRICALLY EXCITED DAMPED INVERTED PENDULUM 1. INTRODUCTION Journa of Sound and Vibration (996) 98(5), 643 65 STABILITY OF A PARAMETRICALLY EXCITED DAMPED INVERTED PENDULUM G. ERDOS AND T. SINGH Department of Mechanica and Aerospace Engineering, SUNY at Buffao,

More information

Approach to Identifying Raindrop Vibration Signal Detected by Optical Fiber

Approach to Identifying Raindrop Vibration Signal Detected by Optical Fiber Sensors & Transducers, o. 6, Issue, December 3, pp. 85-9 Sensors & Transducers 3 by IFSA http://www.sensorsporta.com Approach to Identifying Raindrop ibration Signa Detected by Optica Fiber ongquan QU,

More information

On the evaluation of saving-consumption plans

On the evaluation of saving-consumption plans On the evauation of saving-consumption pans Steven Vanduffe Jan Dhaene Marc Goovaerts Juy 13, 2004 Abstract Knowedge of the distribution function of the stochasticay compounded vaue of a series of future

More information

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient

More information

VALIDATED CONTINUATION FOR EQUILIBRIA OF PDES

VALIDATED CONTINUATION FOR EQUILIBRIA OF PDES VALIDATED CONTINUATION FOR EQUILIBRIA OF PDES SARAH DAY, JEAN-PHILIPPE LESSARD, AND KONSTANTIN MISCHAIKOW Abstract. One of the most efficient methods for determining the equiibria of a continuous parameterized

More information

17 Lecture 17: Recombination and Dark Matter Production

17 Lecture 17: Recombination and Dark Matter Production PYS 652: Astrophysics 88 17 Lecture 17: Recombination and Dark Matter Production New ideas pass through three periods: It can t be done. It probaby can be done, but it s not worth doing. I knew it was

More information

II. PROBLEM. A. Description. For the space of audio signals

II. PROBLEM. A. Description. For the space of audio signals CS229 - Fina Report Speech Recording based Language Recognition (Natura Language) Leopod Cambier - cambier; Matan Leibovich - matane; Cindy Orozco Bohorquez - orozcocc ABSTRACT We construct a rea time

More information

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver

More information

Optimality of Inference in Hierarchical Coding for Distributed Object-Based Representations

Optimality of Inference in Hierarchical Coding for Distributed Object-Based Representations Optimaity of Inference in Hierarchica Coding for Distributed Object-Based Representations Simon Brodeur, Jean Rouat NECOTIS, Département génie éectrique et génie informatique, Université de Sherbrooke,

More information

DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM

DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM MIKAEL NILSSON, MATTIAS DAHL AND INGVAR CLAESSON Bekinge Institute of Technoogy Department of Teecommunications and Signa Processing

More information

Bourgain s Theorem. Computational and Metric Geometry. Instructor: Yury Makarychev. d(s 1, s 2 ).

Bourgain s Theorem. Computational and Metric Geometry. Instructor: Yury Makarychev. d(s 1, s 2 ). Bourgain s Theorem Computationa and Metric Geometry Instructor: Yury Makarychev 1 Notation Given a metric space (X, d) and S X, the distance from x X to S equas d(x, S) = inf d(x, s). s S The distance

More information

The Binary Space Partitioning-Tree Process Supplementary Material

The Binary Space Partitioning-Tree Process Supplementary Material The inary Space Partitioning-Tree Process Suppementary Materia Xuhui Fan in Li Scott. Sisson Schoo of omputer Science Fudan University ibin@fudan.edu.cn Schoo of Mathematics and Statistics University of

More information

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract Stochastic Compement Anaysis of Muti-Server Threshod Queues with Hysteresis John C.S. Lui The Dept. of Computer Science & Engineering The Chinese University of Hong Kong Leana Goubchik Dept. of Computer

More information

Target Location Estimation in Wireless Sensor Networks Using Binary Data

Target Location Estimation in Wireless Sensor Networks Using Binary Data Target Location stimation in Wireess Sensor Networks Using Binary Data Ruixin Niu and Pramod K. Varshney Department of ectrica ngineering and Computer Science Link Ha Syracuse University Syracuse, NY 344

More information

Interactive Fuzzy Programming for Two-level Nonlinear Integer Programming Problems through Genetic Algorithms

Interactive Fuzzy Programming for Two-level Nonlinear Integer Programming Problems through Genetic Algorithms Md. Abu Kaam Azad et a./asia Paciic Management Review (5) (), 7-77 Interactive Fuzzy Programming or Two-eve Noninear Integer Programming Probems through Genetic Agorithms Abstract Md. Abu Kaam Azad a,*,

More information

Fast Blind Recognition of Channel Codes

Fast Blind Recognition of Channel Codes Fast Bind Recognition of Channe Codes Reza Moosavi and Erik G. Larsson Linköping University Post Print N.B.: When citing this work, cite the origina artice. 213 IEEE. Persona use of this materia is permitted.

More information

arxiv: v1 [cs.db] 1 Aug 2012

arxiv: v1 [cs.db] 1 Aug 2012 Functiona Mechanism: Regression Anaysis under Differentia Privacy arxiv:208.029v [cs.db] Aug 202 Jun Zhang Zhenjie Zhang 2 Xiaokui Xiao Yin Yang 2 Marianne Winsett 2,3 ABSTRACT Schoo of Computer Engineering

More information

A MODEL FOR ESTIMATING THE LATERAL OVERLAP PROBABILITY OF AIRCRAFT WITH RNP ALERTING CAPABILITY IN PARALLEL RNAV ROUTES

A MODEL FOR ESTIMATING THE LATERAL OVERLAP PROBABILITY OF AIRCRAFT WITH RNP ALERTING CAPABILITY IN PARALLEL RNAV ROUTES 6 TH INTERNATIONAL CONGRESS OF THE AERONAUTICAL SCIENCES A MODEL FOR ESTIMATING THE LATERAL OVERLAP PROBABILITY OF AIRCRAFT WITH RNP ALERTING CAPABILITY IN PARALLEL RNAV ROUTES Sakae NAGAOKA* *Eectronic

More information

Appendix A: MATLAB commands for neural networks

Appendix A: MATLAB commands for neural networks Appendix A: MATLAB commands for neura networks 132 Appendix A: MATLAB commands for neura networks p=importdata('pn.xs'); t=importdata('tn.xs'); [pn,meanp,stdp,tn,meant,stdt]=prestd(p,t); for m=1:10 net=newff(minmax(pn),[m,1],{'tansig','purein'},'trainm');

More information

Paragraph Topic Classification

Paragraph Topic Classification Paragraph Topic Cassification Eugene Nho Graduate Schoo of Business Stanford University Stanford, CA 94305 enho@stanford.edu Edward Ng Department of Eectrica Engineering Stanford University Stanford, CA

More information

A proposed nonparametric mixture density estimation using B-spline functions

A proposed nonparametric mixture density estimation using B-spline functions A proposed nonparametric mixture density estimation using B-spine functions Atizez Hadrich a,b, Mourad Zribi a, Afif Masmoudi b a Laboratoire d Informatique Signa et Image de a Côte d Opae (LISIC-EA 4491),

More information

Approximate Bandwidth Allocation for Fixed-Priority-Scheduled Periodic Resources (WSU-CS Technical Report Version)

Approximate Bandwidth Allocation for Fixed-Priority-Scheduled Periodic Resources (WSU-CS Technical Report Version) Approximate Bandwidth Aocation for Fixed-Priority-Schedued Periodic Resources WSU-CS Technica Report Version) Farhana Dewan Nathan Fisher Abstract Recent research in compositiona rea-time systems has focused

More information

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao, Vivek Raghunathan, Stephen Hany, Vinod Sharma and. R. Kumar Abstract We consider a joint power contro

More information

Construction of Supersaturated Design with Large Number of Factors by the Complementary Design Method

Construction of Supersaturated Design with Large Number of Factors by the Complementary Design Method Acta Mathematicae Appicatae Sinica, Engish Series Vo. 29, No. 2 (2013) 253 262 DOI: 10.1007/s10255-013-0214-6 http://www.appmath.com.cn & www.springerlink.com Acta Mathema cae Appicatae Sinica, Engish

More information