A Fast-CSMA Algorithm for Deadline-Constrained Scheduling over Wireless Fading Channels

Size: px
Start display at page:

Download "A Fast-CSMA Algorithm for Deadline-Constrained Scheduling over Wireless Fading Channels"

Transcription

1 A Fst-CSMA Algorithm for Dedline-Constrined Scheduling over Wireless Fding Chnnels Bin Li nd Atill Eryilmz Abstrct Recently, low-complexity nd distributed Crrier Sense Multiple Access (CSMA)-bsed scheduling lgorithms hve ttrcted extensive interest due to their throughput-optiml chrcteristics in generl network topologies. However, these lgorithms re not well-suited for serving rel-time trffic under timevrying chnnel conditions for two resons: () the mixing time of the underlying CSMA Mrkov Chin grows with the size of the network, which, for lrge networks, genertes uncceptble dely for dedline-constrined trffic; (2) since the dynmic CSMA prmeters re influenced by the rrivl nd chnnel stte processes, the underlying CSMA Mrkov Chin my not converge to stedy-stte under strict dedline constrints nd fding chnnel conditions. In this pper, we ttck the problem of distributed scheduling for serving rel-time type trffic over time-vrying chnnels. Specificlly, we consider fully-connected topologies with independently fding chnnels (which cn model cellulr networks) in which flows with short-term dedline constrints nd longterm drop rte requirements re served. To tht end, we first chrcterize the mximl set of stisfible rrivl processes for this system nd, then, propose Fst-CSMA (FCSMA) policy tht is shown to be optiml in supporting ny rel-time trffic tht is within the mximl stisfible set. These theoreticl results re further vlidted through simultions to demonstrte the reltive efficiency of the FCSMA policy compred to some of the existing CSMA-bsed lgorithms. I. ITRODUCTIO Wireless networks re expected to serve rel-time trffic, such s video or voice pplictions, generted by lrge number of users over potentilly fding chnnels. These constrints nd requirements, together with the limited nture of shred resources, generte strong need for distributed lgorithms tht cn efficiently utilize the vilble resources while mintining high qulity-of-service gurntees for the rel-time pplictions. Yet, the strict short-term dedline constrints nd long-term drop rte requirements ssocited with most reltime pplictions complicte the development of provbly good distributed solutions. In the recent yers, there hs been n incresing understnding on the modeling nd service of such rel-time trffic in wireless networks (e.g., [4], [5], [6], [2]). However, existing works in this domin ssume centrlized controllers, nd hence re not suitble for distributed opertion in lrge-scle networks. In seprte line of work, it hs lso been shown tht CSMA-bsed distributed scheduling (e.g., [7], [2], [3], Bin Li nd Atill Eryilmz ({lib,eryilmz}@ece.osu.edu) re with the Deprtment of Electricl nd Computer Engineering t The Ohio Stte University, Columbus, Ohio 4320 USA. This reserch work is funded by Qtr tionl Reserch Fund (QRF) under the tionl Reserch Priorities Progrm (PRP) grnt number PRP [3]) cn mximize long-term verge throughput for generl wireless topologies. However, these results lso do not pply to strictly dedline-constrined trffic tht we trget, since their throughput-optimlity relies: (i) on the convergence time of the underlying Mrkov Chin to its stedy-stte, which grows with the size of the network; nd (ii) on reltively sttionry conditions in which the CSMA prmeters do not chnge significntly over time so tht the instntneous service rte distribution cn sty close to the sttionry distribution. Both of these conditions re violted in our context: (i) pckets of dedline constrined trffic re likely to be dropped before the CSMA-bsed lgorithm converges to its stedy-stte; nd (ii) the time-vrying fding cretes significnt vritions on the CSMA prmeters, in which cse the instntneous service rte distribution cnnot closely trck the sttionry distribution. While chieving low dely vi distributed scheduling in generl topologies is difficult tsk (see [4]), in relted work [9] tht focuses on grid topologies, the uthors hve designed n Unlocking CSMA (UCSMA) lgorithm with both mximum throughput nd order optiml verge dely performnce, which shows promise for distributed scheduling in specil topologies. However, UCSMA lso does not directly pply to dedlineconstrined trffic since its mesure of dely is on verge. Moveover, it is not cler how existing CSMA or UCSMA implementtions will perform under fding chnnel conditions. With this motivtion, in this work, we ddress the problem of distributed scheduling in fully connected networks (e.g., Cellulr network, WLA) for serving rel-time trffic over independently fding chnnels. Our contributions re: In Section III-A, we chrcterize the mximl set of stisfible rel-time trffic chrcteristics s function of their drop rte requirements nd chnnel sttistics. In Section III-B, we propose n FCSMA lgorithm tht differs from existing CSMA policies in its design principle: rther thn evolving over the set of schedules to rech fvorble stedy-stte distribution, the FCSMA policy ims to quickly rech one of set of fvorble schedules nd stick to it for durtion relted to the ppliction dedline constrints. While the performnce of the former strtegy is tied to the mixing-time of Mrkov Chin, the performnce of our strtegy is tied to the bsorption time, nd hence, yields significnt dvntge for strictly dedline-constrined flows. In Theorem, we prove tht the FCSMA policy is optiml in the sense tht it cn stisfy the dedline nd drop rte requirements ny rel-time trffic within the chrcterized mximl stisfible set. In Section IV, we compre the performnce of FCSMA

2 2 with some of the existing CSMA policies under different scenrios, both to vlidte the theoreticl clims, nd to demonstrte the performnce gins due to our proposed strtegy. II. SYSTEM MODEL We consider fully-connected wireless network topology where users contend for dt trnsmission over single chnnel tht is independently block fding for ech user. We ssume tht the time scle of block fding is the sme s the durtion of the dedline constrint, nd thus uniformly clled s slot. We lso ssume tht ll links strt trnsmission t the beginning of ech time slot. We cpture the chnnel fding over link l vi C l [t], which mesures the mximum mount of service vilble over it in slot t, if scheduled. We ssume tht C[t] = (C l [t]) re independently distributed rndom vribles over links nd identiclly distributed over time. Yet, due to interference constrints, t most one link cn be scheduled for service in ech slot. We use binry vrible S l [t] to denote whether the link l is served t slot t, where S l [t] = if the link l cn be served t slot t nd S l [t] = 0, otherwise. Ech pcket hs dely bound of time slot, which mens tht if pcket cnnot be served during the slot it rrives, it will be dropped. In this context of fully-connected network, we ssocite ech rel-time flow with link, nd hence use these two terms interchngebly. Let A l [t] denote the number of pckets rriving t link l in slot t tht re independently distributed over links nd identiclly distributed over time with men λ l, nd A l [t] A mx for some A mx <. Ech link hs mximum llowble drop rte ρ l λ l, where ρ l (0, ) is the mximum frction of pckets tht cn be dropped t link l. For exmple, ρ l = 0. mens tht t most 0% of pckets cn be dropped t link l on verge. Under bove setup, we define our stochstic control problem (SCP) s follows: Definition : (SCP) where Mximize () {S[t]} t Subject to S l [t]c l [t] A l [t], l, t (2) λ l = limsup T µ l = liminf T λ l ( ρ l ) µ l, l (3) S l [t] (4) l S l [t] {0, }, l, t (5) T T T E[A l [t]] (6) t= T E[S l [t]c l [t]] (7) t= In the bove mximiztion problem: (2) indictes tht the number of served pckets cnnot be greter thn the number of rrivls for ech slot; (3) indictes tht the provided verge service rtes stisfy the drop rte requirements of the rel-time trffic; (4) indictes tht t most one link cn be served t ech slot t. ormlly, it is difficult to solve SCP directly. Insted, we use the technique in [] to introduce virtul queue X l [t] for ech link l to trck the number of dropped pckets t slot t. Specificlly, the number of pckets rriving t virtul queue l t the end of slot t is denoted s R l [t], which is equl to A l [t] min{s l [t]c l [t], A l [t]}. We use I l [t] to denote the service for virtul queue l t the end of the slot t with men ρ l λ l, nd I l [t] I mx for some I mx <. Further, we let U l [t] denote the unused service for queue l t the end of slot t, which is upper-bounded by I mx. Then, the evolution of virtul queue is s follows: X l [t + ] = X l [t] + R l [t] I l [t] + U l [t], l =,,. In the rest of the pper, we consider the clss of sttionry policies G tht select S[t] s function of (X[t], A[t], C[t]), which, then, forms Mrkov Chin. If this Mrkov Chin is positive recurrent, then the verge drop rte will meet the required constrint utomticlly (see []). Accordingly, we cll n lgorithm optiml if it cn mke this Mrkov Chin positive recurrent for ny rrivl rte vector within the mximl stisfible region tht we will chrcterize in the next section. III. FCMSA ALGORITHM FOR THROUGHPUT OPTIMALITY In this section, we first study the mximl stisfible region given the drop rte nd chnnel sttistics. Then, we propose n optiml FCSMA lgorithm. A. Mximl Stisfible Region Consider the clss G of sttionry policies tht bse on their scheduling decision on the observed vector (X[t], A[t], C[t]) t slot t. The next lemm estblishes condition tht is necessry for stbilizing the system. Lemm : If there is policy G 0 G tht cn stbilize the virtul queue X[t], then there exist non-negtive numbers α(, c; s) such tht α(, c; s) = (8) s S P A () P C (c) α(, c; s) min{s c, } > λ ( ρ) (9) c s S where (A B) i = A i B i denotes Hdmrd product, P A () = P (A[t] = ) nd P C (c) = P (C[t] = c). The proof is lmost the sme s [5] nd hence is omitted here. ote tht the left hnd side of inequlity (9) is the totl verge service provided for ech link during one time slot; while λ ( ρ) is the totl verge mount of dt pckets t ech link tht need to be served within one slot. Thus, to the meet the constrint of drop rte, (9) should be stisfied. We define mximl stisfible region Λ(ρ) s follows: Λ(ρ) = {A : α(, c; s) 0, such tht both (8) nd (9)stisfy}

3 3 B. FCSMA lgorithm Before we present nd nlyze our proposed FCSMA lgorithm, we define set of functions (lso see [8]) tht llows some flexibility in the design nd implementtion of the lgorithm. F := set of non-negtive, nondecresing nd differentible functions f( ) : R + R + with lim f(x) =. x f(x + ) B := {f F: lim =, for ny R}. x f(x) The exmples of functions tht re in clss B re f(x) = (log x) α, f(x) = x α (α > 0) or f(x) = e x. ote tht the exponentil function f(x) = e x is not in clss B. Definition 2 (FCSMA Algorithm): At the beginning of ech time slot t, ech link l independently genertes n exponentilly distributed rndom vrible with men f(x l [t]) min(c l[t],a l [t]), nd strts trnsmitting fter this rndom durtion unless it senses nother trnsmission before. The link tht grbs the chnnel trnsmits its pckets until the end of the slot. It is esy to show tht the convergence time of FCMSA is nd the probbility tht link l successfully grbs j= H j H the chnnel is l. If we cn choose H = (H l ) j= Hj lrge enough, then the convergence time of FCSMA cn be rbitrrily smll. Follows, we consider FCSMA with H l = f(x l [t]) min{c l[t],a l [t]} for link l. The frction of serving the link l is: π l = f(x l[t]) min{c l[t],a l [t]} ( Z Z ) (0) where Z = j= f(x j[t]) min{c j[t],a j [t]}. Let W [t] = mx l log f(x l [t]) min{c l [t], A l [t]}. The following lemm estblishes the fct tht FCSMA policy picks link with the weight close to mximum weight with high probbility when the mximum weight W [t] is lrge enough. Lemm 2: Given ɛ > 0 nd ζ > 0, W <, such tht if W [t] > W, then FCSMA policy picks link k stisfying which lso implies P {W k [t] ( ɛ)w [t]} ζ E[W k [t] {W [t] W } A[t], C[t], X[t]] ( ɛ)( ζ)w [t] {W [t] W } () where W k [t] = log f(x k [t]) min{c k [t], A k [t]}. Proof: Define X = {l : log f(x l [t]) min{c l [t], Q l [t]} < ( ɛ)w [t]} If there re no pckets witing in the link l, it trnsmits dummy pcket to occupy the chnnel. Then, π(x ) := l X π l exp(log f(x l [t]) min{c l [t], Q l [t]}) n l X j= exp(log f(x j[t]) min{c j [t], Q j [t]}) X exp(( ɛ)w [t]) < n j= exp(log f(x j[t]) min{c j [t], Q j [t]}) exp(( ɛ)w [t]) exp(w [t]) = exp(ɛw [t]) (2) The first inequlity in (2) follows the fct tht Z. Thus, W < such tht W [t] > W implies π(x ) < δ. Since t most one link cn be ctivted t ech slot in single-hop network topologies, we cn lso write W k [t] = W l F [t], where Wl F [t] = log f(x l [t]) min{c l [t]sl F [t], A l[t]} nd S F [t] denotes the schedule chosen by FCSMA with Sk F [t] =. In the rest of the pper, we lso write W [t] = W l [t], where Wl [t] = log f(x l[t]) min{c l [t]sl [t], A l[t]} nd S [t] = rg mx S S W l [t]. Under certin conditions for the function f, we cn estblish the throughput-optimlity of FCSMA lgorithm. Theorem : FCSMA with R l = f(x l [t]) min{c l[t],a l [t]} for ech link l t every time slot t is optiml when log f B nd f(0). Proof: Let g(x) = log f(x). Consider the Lypunov function V (X) := h(x l), where h (x) = g(x). Then V : = E [V (X[t + ]) V (X[t]) = E [(h(x l [t + ]) h(x l [t])) By the men-vlue theorem, we hve h(x l [t+]) h(x l [t]) = g(x l )(X l[t + ] X l [t]) = g(x l )(R l[t] I l [t] + U l [t]), where X l lies between X l[t] nd X l [t + ]. Hence, we get V = = E [g(x l)(r l [t] I l [t] + U l [t]) E [g(x l)u l [t] =: V + E [g(x l)(r l [t] I l [t]) =: V 2 For V, if X l [t] = X l I mx, then U l [t] = 0. If X l [t] = X l < I mx, then U l [t] I mx. But in this cse, X l [t + ] (I mx +A mx ) (since R l [t] A mx ). Hence, g(x l ) g(i mx+

4 4 A mx ) <. Thus, V = E [ g(r l )U l [t] {Xl <I mx} X[t] = X ] I mx g(i mx + A mx ) (3) where { } is the indictor function. ext, let s focus on V 2. We know tht g(x l ) = g(x l[t] + l ) ( l A mx ). According to the definition of function g B, given β > 0, there exists M > 0, such tht for ny X l [t] = X l > M, we hve g(x l ) g(x l ) < β, tht is, Thus, we hve ( β)g(x l ) < g(x l) < ( + β)g(x l ) (4) g(x l)(r l [t] I l [t]) =g(x l) [(R l [t] I l [t]) + (R l [t] I l [t]) ] <( + β)g(x l )(R l [t] I l [t]) + ( β)g(x l )(R l [t] I l [t]) =g(x l )(R l [t] I l [t]) + βg(x l ) R l [t] I l [t] g(x l )(R l [t] I l [t]) + βa mx g(x l ) (5) where (x) + = mx{x, 0}, (x) = min{x, 0} nd R l [t] I l [t] A l [t] A mx. Thus, we divide V 2 into two prts: V 2 = + E [ g(x l)(r l [t] I l [t]) {Xl >M} X[k] = X ] =: V 3 E [ g(x l)(r l [t] I l [t]) {Xl M} X[t] = X ] =: V 4 For V 3, by using (5), we hve V 3 = E [ g(x l )(R l [t] I l [t]) {Xl >M} X[t] = X ] + βa mx g(x l ) {Xl >M} E[g(X l )(A l [t] I l [t]) {Xl >M} =:L E[ W F l [t] {Xl >M} X[t]] + =:L 2 βa mx g(x l ) {Xl >M} ext, let s focus on L. By Lemm, there exist non-negtive numbers α(, c; s) stisfying (8) nd for δ > 0 smll enough, we hve P A () P C (c) α(, c; s) min{s l c l, l } c s S λ l ( ρ l ) + δ (6) Let W l = g(x l ) min{s l c l, l }. By using (6), we hve L = g(x l )λ l ( ρ l ) {Xl >M} P A () P C (c) α(, c; s) W l {Xl >M} c s S δ g(x l ) {Xl >M} = P A () P C (c) α(, c; s) W l {Xl >M,W [t]>w } c s S + P A () P C (c) α(, c; s) W l {Xl >M,W [t] W } c s S δ g(x l ) {Xl >M} P A () P C (c) α(, c; s) W l {Xl >M,W [t]>w } c s S + W δ g(x l ) {Xl >M} (7) ext, let s consider L 2. Since ( ɛ)( ζ)e[ Wl [t] {Xl >M,W [t]>w } ( ɛ)( ζ)e[ Wl [t] {W [t]>w } E[ Wl F [t] {W [t]>w } (by Lemm 2) = E[ Wl F [t] {Xl >M,W [t]>w } + E[ Wl F [t] {Xl M,W [t]>w } E[ Wl F [t] {Xl >M,W [t]>w } + A mxg(m)

5 5 L 2 becomes L 2 E[ Wl F [t] {Xl >M,W [t]>w } X[t]] ( ɛ)( ζ)e[ Wl [t] {Xl >M,W [t]>w } X[t]] A mx g(m) Thus, by using (7) nd (8), V 3 becomes V 3 P A () P C (c) α(, c; s) W l {Xl >M,W [t]>w } c s S E[ Wl [t] {Xl >M,W [t]>w } X[t]] + (ɛ + ζ ɛζ)e[ Wl [t] {Xl >M,W [t]>w } X[t]] + W + A mx g(m) δ g(x l ) {Xl >M} + βa mx g(x l ) {Xl >M} (8) Since P A () P C (c) α(, c; s) c s S E[ Wl [t] = P A () c P A () c P C (c) s S α(, c; s) P C (c) s S α(, c; s) W l W l W l 0 (9) Thus, we hve P A () P C (c) α(, c; s) W l {Xl >M,W [t]>w } c s S P A () P C (c) α(, c; s) W l c s S E[ Wl [t](by using (9)) = E[ Wl [t] {Xl >M} X[t]] + E[ E[ Wl [t] {Xl >M,W [t]>w } W l [t] {Xl M} X[t]] + E[ Wl [t] {Xl >M,W [t] W } + A mxg(m) E[ Wl [t] {Xl >M,W [t]>w } X[t]] + W + A mxg(m) In ddition, we hve E[ Wl [t] {Xl >M,W [t]>w } E[ Wl [t] A mx g(x l ) = A mx g(x l ) {Xl >M} + A mx A mx g(x l ) {Xl M} (20) g(x l ) {Xl >M} + A mx g(m) (2) then, by using (20) nd (2), we hve V 3 γ g(x l ) {Xl >M} + D (22) where D = 2W + (2 + ɛ + ζ ɛζ)a mx g(m) nd γ = δ βa mx A mx (ɛ + ζ ɛζ). We cn choose β, ɛ, ζ smll enough such tht γ > 0. For V 4, we hve V 4 E [g(x l)r l [t] {Xl M} E [g(x l)a l [t] {Xl M} A mx g(m + A mx )

6 6 Thus, we get V < γ γ g(x l ) {Xl >M} + D g(x l ) + E (23) where D := I mx g(i mx + A mx ) + D + A mx g(m + A mx ) < nd E := D + γg(m). Hence, by the Lypunov Drift theorem [], we hve T t=0 E[g(X l[t])] E γ <, which lim sup T T implies stbility-in-the men nd thus the Mrkov Chin is positive recurrent [0]. IV. SIMULATIO RESULTS In this section, we perform simultions to vlidte the throughput-optimlity of the proposed FCSMA policy with dedline constrint time slot in both fding nd non-fding chnnels. In the simultion, there re = 0 links. All links require tht the mximum frction of dropping pckets cnnot exceed ρ = 0.2. The number of rrivls in ech slot follows Bernoulli distribution. For the simultions of fding chnnel, ll links suffer from the O-OFF chnnel fding independently with probbility p = 0.9 tht the chnnel is vilble in ech time slot. Under this setup, we cn use the sme technique in pper [6] to get the cpcity region: Γ = {λ : ( ρ)λ < ( pλ) }. Through numericl clcultion, we cn get λ < 0.05 in non-fding chnnel nd λ < 0.03 in fding chnnel. We compre FCSMA with H l = exp(x l [t] min{c l [t], A l [t]}) with discrete time version of the clssicl CSMA lgorithm with the weight 2 X l [t] min{c l [t], A l [t]} [2]. To tht end, we divide ech time slot into M mini-slots. In FCSMA policy, if the link contends for the chnnel successfully, it will occupy tht chnnel in the rest of time slot; while in clssicl CSMA policy, ech link contends for the chnnel nd trnsmit the dt in mini-slot. Here, we don t consider the overhed tht the clssicl CSMA policy needs to contends for the chnnel. From Figure nd 2, we cn observe tht the verge virtul queue length grows very fst under the clssicl CSMA policy with M = while the verge queue length of FCSMA lwys keeps in low level. The reson for the poor performnce of clssicl CSMA scheme in dedline-constrined scheduling ppliction is tht the underlying Mrkov chin is controlled by the rrivl process. If the running time of CSMA policy hs the sme time scle with the dedline of the pcket, this Mrkov chin cnnot converge to the stedy stte. However, FCMSA policy cn quickly lock into one stte nd exhibits good performnce, which is shown to be throughput-optiml if we crefully choose the prmeters. In ddition, s M increses, the performnce of clssicl CSMA improves. The reson is tht the underlying Mrkov chin hs enough time to 2 In our setup, clssicl CSMA lgorithm with the weight log log(x l [t] min{c l [t], A l [t]} + e) hs much worse performnce thn tht with X l [t] min{c l [t], A l [t]}. converge to the stedy stte nd thus yields better performnce. Furthermore, we cn see tht FCSMA policy hs lmost the sme performnce s tht in stedy stte. Recll tht FCSMA policy wits for rndom time before ccessing the chnnel, this rndom time cn be rbitrrily smll when the number of links increses nd the virtul queue length is high. Averge Queue Length Averge Queue Length FCSMA in Stedy Stte FCSMA CSMA with M= CSMA with M=0 3 CSMA with M= Arrivl Rte Fig.. on-fding chnnel FCSMA in Stedy Stte FCSMA CSMA with M= CSMA with M=0 3 CSMA with M= Arrivl Rte Fig. 2. Fding chnnel V. COCLUSIOS In this pper, we first chrcterized the stisfible rte region given the drop rte nd chnnel sttistics nd then proposed n optiml distributed FCSMA policy for scheduling rel-time trffic over fding chnnel. We vlidted the performnce of FCSMA policy by compring it with existing CSMA policies

7 7 in simultions. We ssumed tht the dedline of pcket nd the fding of chnnel hve the sme time scle, which is not lwys the cse in relity. We will relx this ssumption in our future work. REFERECES [] J. Di. A fluid-limit model criterion for instbility of multiclss queueing networks. Annls of Applied Probbility, 6:75 757, 996. [2] H. Gngmmnvr nd A. Eryilmz. Dynmic coding nd rte-control for serving dedline-constrined trffic over fding chnnels. In Proc. IEEE Interntionl Symposium on Informtion Theory. (ISIT), Austin, TX, June 200. [3] J. Ghderi nd R. Sriknt. On the design of efficient csm lgorithms for wireless networks. In Proc. IEEE Interntionl Conference on Decision nd Control. (CDC), Atlnt, GA, December 200. [4] I. Hou, V. Borkr, nd P. R. Kumr. A theory of qos for wireless. In Proc. IEEE Interntionl Conference on Computer Communictions. (IFOCOM), Rio de Jneiro, Brzil, April [5] I. Hou nd P. R. Kumr. Scheduling heterogeneous rel-time trffic over fding wireless chnnels. In Proc. IEEE Interntionl Conference on Computer Communictions. (IFOCOM), Sn Diego, CA, Mrch 200. [6] J. Jrmillo nd R. Sriknt. Optiml scheduling for fir resource lloction in d hoc networks with elstic nd inelstic trffic. In Proc. IEEE Interntionl Conference on Computer Communictions. (IFOCOM), Sn Diego, CA, Mrch 200. [7] L. Jing nd J. Wlrnd. A csm distributed lgorithm for throughput nd utility mximiztion in wireless networks. In Proc. Allerton Conference on Communiction, Control, nd Computing (Allerton 2008), Monticello, Illinois, September [8] B. Li nd A. Eryilmz. On the limittion of rndomiztion for queue-length-bsed scheduling in wireless networks. In Proc. IEEE Interntionl Conference on Computer Communictions. (IFOCOM), Shnghi, Chin, April 20. [9] M. Lotfinezhd nd P. Mrbch. Throughput-optiml rndom ccess with order-optiml dely. Submitted to IEEE IFOCOM 20. [0] S. Meyn nd R. Tweedie. Criteri for stbility of mrkovin processes i: Discrete time chins. Advnces in Applied Probbility, 24: , 992. [] M. eely. Stochstic etwork Optimiztion with Appliction to Communiction nd Queueing Systems. Morgn & Clypool, 200. [2] J. i nd R. Sriknt. Distributed csm/c lgorithms for chieving mximum throughput in wireless networks. In Proc. IEEE Interntionl Workshop on Informtion Theory nd Applictions (ITA 2009), Sn Diego, Cliforni, Februry [3] S. Rjgopln, D. Shh, nd J. Shin. etwork dibtic theorem: n efficient rndomized protocol for contention resolution. In Proc. IEEE Interntionl Joint Conference on Mesurement nd Modeling of Computer Systems. (SIGMETRICS), Settle, WA, June [4] D. Shh, D. Tse, nd J. Tsitsiklis. Hrdness of low dely network scheduling. Submitted to IEEE Trnsctions on Informtion Theory, [5] L. Tssiuls. Scheduling nd performnce limits of networks with constntly vrying topology. IEEE Trnsctions on Informtion Theory, 43: , My 997. [6] L. Tssiuls nd A. Ephremides. Dynmic server lloction to prllel queues with rndomly vrying connectivity. IEEE Trnsctions on Informtion Theory, 39(2): , 993.

Online Supplements to Performance-Based Contracts for Outpatient Medical Services

Online Supplements to Performance-Based Contracts for Outpatient Medical Services Jing, Png nd Svin: Performnce-bsed Contrcts Article submitted to Mnufcturing & Service Opertions Mngement; mnuscript no. MSOM-11-270.R2 1 Online Supplements to Performnce-Bsed Contrcts for Outptient Medicl

More information

p-adic Egyptian Fractions

p-adic Egyptian Fractions p-adic Egyptin Frctions Contents 1 Introduction 1 2 Trditionl Egyptin Frctions nd Greedy Algorithm 2 3 Set-up 3 4 p-greedy Algorithm 5 5 p-egyptin Trditionl 10 6 Conclusion 1 Introduction An Egyptin frction

More information

Reinforcement learning II

Reinforcement learning II CS 1675 Introduction to Mchine Lerning Lecture 26 Reinforcement lerning II Milos Huskrecht milos@cs.pitt.edu 5329 Sennott Squre Reinforcement lerning Bsics: Input x Lerner Output Reinforcement r Critic

More information

Research Article Moment Inequalities and Complete Moment Convergence

Research Article Moment Inequalities and Complete Moment Convergence Hindwi Publishing Corportion Journl of Inequlities nd Applictions Volume 2009, Article ID 271265, 14 pges doi:10.1155/2009/271265 Reserch Article Moment Inequlities nd Complete Moment Convergence Soo Hk

More information

Tutorial 4. b a. h(f) = a b a ln 1. b a dx = ln(b a) nats = log(b a) bits. = ln λ + 1 nats. = log e λ bits. = ln 1 2 ln λ + 1. nats. = ln 2e. bits.

Tutorial 4. b a. h(f) = a b a ln 1. b a dx = ln(b a) nats = log(b a) bits. = ln λ + 1 nats. = log e λ bits. = ln 1 2 ln λ + 1. nats. = ln 2e. bits. Tutoril 4 Exercises on Differentil Entropy. Evlute the differentil entropy h(x) f ln f for the following: () The uniform distribution, f(x) b. (b) The exponentil density, f(x) λe λx, x 0. (c) The Lplce

More information

Fig. 1. Open-Loop and Closed-Loop Systems with Plant Variations

Fig. 1. Open-Loop and Closed-Loop Systems with Plant Variations ME 3600 Control ystems Chrcteristics of Open-Loop nd Closed-Loop ystems Importnt Control ystem Chrcteristics o ensitivity of system response to prmetric vritions cn be reduced o rnsient nd stedy-stte responses

More information

Continuous Random Variables

Continuous Random Variables STAT/MATH 395 A - PROBABILITY II UW Winter Qurter 217 Néhémy Lim Continuous Rndom Vribles Nottion. The indictor function of set S is rel-vlued function defined by : { 1 if x S 1 S (x) if x S Suppose tht

More information

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS.

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS. THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS RADON ROSBOROUGH https://intuitiveexplntionscom/picrd-lindelof-theorem/ This document is proof of the existence-uniqueness theorem

More information

W. We shall do so one by one, starting with I 1, and we shall do it greedily, trying

W. We shall do so one by one, starting with I 1, and we shall do it greedily, trying Vitli covers 1 Definition. A Vitli cover of set E R is set V of closed intervls with positive length so tht, for every δ > 0 nd every x E, there is some I V with λ(i ) < δ nd x I. 2 Lemm (Vitli covering)

More information

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below.

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below. Dulity #. Second itertion for HW problem Recll our LP emple problem we hve been working on, in equlity form, is given below.,,,, 8 m F which, when written in slightly different form, is 8 F Recll tht we

More information

A SHORT NOTE ON THE MONOTONICITY OF THE ERLANG C FORMULA IN THE HALFIN-WHITT REGIME. Bernardo D Auria 1

A SHORT NOTE ON THE MONOTONICITY OF THE ERLANG C FORMULA IN THE HALFIN-WHITT REGIME. Bernardo D Auria 1 Working Pper 11-42 (31) Sttistics nd Econometrics Series December, 2011 Deprtmento de Estdístic Universidd Crlos III de Mdrid Clle Mdrid, 126 28903 Getfe (Spin) Fx (34) 91 624-98-49 A SHORT NOTE ON THE

More information

Power Optimal Routing in Wireless Networks

Power Optimal Routing in Wireless Networks Power Optiml Routing in Wireless Networks Rjit Mnohr nd Ann Scglione ECE, Cornell University Abstrct Reducing power consumption nd incresing bttery life of nodes in n d-hoc network requires n integrted

More information

1 Online Learning and Regret Minimization

1 Online Learning and Regret Minimization 2.997 Decision-Mking in Lrge-Scle Systems My 10 MIT, Spring 2004 Hndout #29 Lecture Note 24 1 Online Lerning nd Regret Minimiztion In this lecture, we consider the problem of sequentil decision mking in

More information

Advanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004

Advanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004 Advnced Clculus: MATH 410 Notes on Integrls nd Integrbility Professor Dvid Levermore 17 October 2004 1. Definite Integrls In this section we revisit the definite integrl tht you were introduced to when

More information

Review of Calculus, cont d

Review of Calculus, cont d Jim Lmbers MAT 460 Fll Semester 2009-10 Lecture 3 Notes These notes correspond to Section 1.1 in the text. Review of Clculus, cont d Riemnn Sums nd the Definite Integrl There re mny cses in which some

More information

Chapter 5 : Continuous Random Variables

Chapter 5 : Continuous Random Variables STAT/MATH 395 A - PROBABILITY II UW Winter Qurter 216 Néhémy Lim Chpter 5 : Continuous Rndom Vribles Nottions. N {, 1, 2,...}, set of nturl numbers (i.e. ll nonnegtive integers); N {1, 2,...}, set of ll

More information

Recitation 3: More Applications of the Derivative

Recitation 3: More Applications of the Derivative Mth 1c TA: Pdric Brtlett Recittion 3: More Applictions of the Derivtive Week 3 Cltech 2012 1 Rndom Question Question 1 A grph consists of the following: A set V of vertices. A set E of edges where ech

More information

Solution for Assignment 1 : Intro to Probability and Statistics, PAC learning

Solution for Assignment 1 : Intro to Probability and Statistics, PAC learning Solution for Assignment 1 : Intro to Probbility nd Sttistics, PAC lerning 10-701/15-781: Mchine Lerning (Fll 004) Due: Sept. 30th 004, Thursdy, Strt of clss Question 1. Bsic Probbility ( 18 pts) 1.1 (

More information

Section 5.1 #7, 10, 16, 21, 25; Section 5.2 #8, 9, 15, 20, 27, 30; Section 5.3 #4, 6, 9, 13, 16, 28, 31; Section 5.4 #7, 18, 21, 23, 25, 29, 40

Section 5.1 #7, 10, 16, 21, 25; Section 5.2 #8, 9, 15, 20, 27, 30; Section 5.3 #4, 6, 9, 13, 16, 28, 31; Section 5.4 #7, 18, 21, 23, 25, 29, 40 Mth B Prof. Audrey Terrs HW # Solutions by Alex Eustis Due Tuesdy, Oct. 9 Section 5. #7,, 6,, 5; Section 5. #8, 9, 5,, 7, 3; Section 5.3 #4, 6, 9, 3, 6, 8, 3; Section 5.4 #7, 8,, 3, 5, 9, 4 5..7 Since

More information

INVESTIGATION OF MATHEMATICAL MODEL OF COMMUNICATION NETWORK WITH UNSTEADY FLOW OF REQUESTS

INVESTIGATION OF MATHEMATICAL MODEL OF COMMUNICATION NETWORK WITH UNSTEADY FLOW OF REQUESTS Trnsport nd Telecommuniction Vol No 4 9 Trnsport nd Telecommuniction 9 Volume No 4 8 34 Trnsport nd Telecommuniction Institute Lomonosov Rig LV-9 Ltvi INVESTIGATION OF MATHEMATICAL MODEL OF COMMUNICATION

More information

Generalized Fano and non-fano networks

Generalized Fano and non-fano networks Generlized Fno nd non-fno networks Nildri Ds nd Brijesh Kumr Ri Deprtment of Electronics nd Electricl Engineering Indin Institute of Technology Guwhti, Guwhti, Assm, Indi Emil: {d.nildri, bkri}@iitg.ernet.in

More information

New data structures to reduce data size and search time

New data structures to reduce data size and search time New dt structures to reduce dt size nd serch time Tsuneo Kuwbr Deprtment of Informtion Sciences, Fculty of Science, Kngw University, Hirtsuk-shi, Jpn FIT2018 1D-1, No2, pp1-4 Copyright (c)2018 by The Institute

More information

Power Constrained DTNs: Risk MDP-LP Approach

Power Constrained DTNs: Risk MDP-LP Approach Power Constrined DTNs: Risk MDP-LP Approch Atul Kumr tulkr.in@gmil.com IEOR, IIT Bomby, Indi Veerrun Kvith vkvith@iitb.c.in, IEOR, IIT Bomby, Indi N Hemchndr nh@iitb.c.in, IEOR, IIT Bomby, Indi. Abstrct

More information

Analysis of PDCCH performance for M2M traffic in LTE

Analysis of PDCCH performance for M2M traffic in LTE 1 Anlysis of PDCCH performnce for M2M trffic in LTE Prjwl Osti, Psi Lssil, Smuli Alto, Ann Lrmo, Tuoms Tirronen Abstrct As LTE is strting to get widely deployed, the volume of M2M trffic is incresing very

More information

Tests for the Ratio of Two Poisson Rates

Tests for the Ratio of Two Poisson Rates Chpter 437 Tests for the Rtio of Two Poisson Rtes Introduction The Poisson probbility lw gives the probbility distribution of the number of events occurring in specified intervl of time or spce. The Poisson

More information

Driving Cycle Construction of City Road for Hybrid Bus Based on Markov Process Deng Pan1, a, Fengchun Sun1,b*, Hongwen He1, c, Jiankun Peng1, d

Driving Cycle Construction of City Road for Hybrid Bus Based on Markov Process Deng Pan1, a, Fengchun Sun1,b*, Hongwen He1, c, Jiankun Peng1, d Interntionl Industril Informtics nd Computer Engineering Conference (IIICEC 15) Driving Cycle Construction of City Rod for Hybrid Bus Bsed on Mrkov Process Deng Pn1,, Fengchun Sun1,b*, Hongwen He1, c,

More information

Non-Linear & Logistic Regression

Non-Linear & Logistic Regression Non-Liner & Logistic Regression If the sttistics re boring, then you've got the wrong numbers. Edwrd R. Tufte (Sttistics Professor, Yle University) Regression Anlyses When do we use these? PART 1: find

More information

Acceptance Sampling by Attributes

Acceptance Sampling by Attributes Introduction Acceptnce Smpling by Attributes Acceptnce smpling is concerned with inspection nd decision mking regrding products. Three spects of smpling re importnt: o Involves rndom smpling of n entire

More information

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives Block #6: Properties of Integrls, Indefinite Integrls Gols: Definition of the Definite Integrl Integrl Clcultions using Antiderivtives Properties of Integrls The Indefinite Integrl 1 Riemnn Sums - 1 Riemnn

More information

New Expansion and Infinite Series

New Expansion and Infinite Series Interntionl Mthemticl Forum, Vol. 9, 204, no. 22, 06-073 HIKARI Ltd, www.m-hikri.com http://dx.doi.org/0.2988/imf.204.4502 New Expnsion nd Infinite Series Diyun Zhng College of Computer Nnjing University

More information

Lecture 3 ( ) (translated and slightly adapted from lecture notes by Martin Klazar)

Lecture 3 ( ) (translated and slightly adapted from lecture notes by Martin Klazar) Lecture 3 (5.3.2018) (trnslted nd slightly dpted from lecture notes by Mrtin Klzr) Riemnn integrl Now we define precisely the concept of the re, in prticulr, the re of figure U(, b, f) under the grph of

More information

N 0 completions on partial matrices

N 0 completions on partial matrices N 0 completions on prtil mtrices C. Jordán C. Mendes Arújo Jun R. Torregros Instituto de Mtemátic Multidisciplinr / Centro de Mtemátic Universidd Politécnic de Vlenci / Universidde do Minho Cmino de Ver

More information

Lecture 1: Introduction to integration theory and bounded variation

Lecture 1: Introduction to integration theory and bounded variation Lecture 1: Introduction to integrtion theory nd bounded vrition Wht is this course bout? Integrtion theory. The first question you might hve is why there is nything you need to lern bout integrtion. You

More information

UNIFORM CONVERGENCE. Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3

UNIFORM CONVERGENCE. Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3 UNIFORM CONVERGENCE Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3 Suppose f n : Ω R or f n : Ω C is sequence of rel or complex functions, nd f n f s n in some sense. Furthermore,

More information

Review of Probability Distributions. CS1538: Introduction to Simulations

Review of Probability Distributions. CS1538: Introduction to Simulations Review of Proility Distriutions CS1538: Introduction to Simultions Some Well-Known Proility Distriutions Bernoulli Binomil Geometric Negtive Binomil Poisson Uniform Exponentil Gmm Erlng Gussin/Norml Relevnce

More information

A Criterion on Existence and Uniqueness of Behavior in Electric Circuit

A Criterion on Existence and Uniqueness of Behavior in Electric Circuit Institute Institute of of Advnced Advnced Engineering Engineering nd nd Science Science Interntionl Journl of Electricl nd Computer Engineering (IJECE) Vol 6, No 4, August 2016, pp 1529 1533 ISSN: 2088-8708,

More information

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams Chpter 4 Contrvrince, Covrince, nd Spcetime Digrms 4. The Components of Vector in Skewed Coordintes We hve seen in Chpter 3; figure 3.9, tht in order to show inertil motion tht is consistent with the Lorentz

More information

1 Probability Density Functions

1 Probability Density Functions Lis Yn CS 9 Continuous Distributions Lecture Notes #9 July 6, 28 Bsed on chpter by Chris Piech So fr, ll rndom vribles we hve seen hve been discrete. In ll the cses we hve seen in CS 9, this ment tht our

More information

X Z Y Table 1: Possibles values for Y = XZ. 1, p

X Z Y Table 1: Possibles values for Y = XZ. 1, p ECE 534: Elements of Informtion Theory, Fll 00 Homework 7 Solutions ll by Kenneth Plcio Bus October 4, 00. Problem 7.3. Binry multiplier chnnel () Consider the chnnel Y = XZ, where X nd Z re independent

More information

arxiv: v1 [cs.sy] 27 May 2012

arxiv: v1 [cs.sy] 27 May 2012 Distributed Trffic Signl Control for Mximum Network Throughput Tichkorn Wongpiromsrn, Twit Uthichroenpong, Yu Wng, Emilio Frzzoli nd Dnwei Wng rxiv:125.5938v1 [cs.sy] 27 My 212 Abstrct We propose distributed

More information

Physics 201 Lab 3: Measurement of Earth s local gravitational field I Data Acquisition and Preliminary Analysis Dr. Timothy C. Black Summer I, 2018

Physics 201 Lab 3: Measurement of Earth s local gravitational field I Data Acquisition and Preliminary Analysis Dr. Timothy C. Black Summer I, 2018 Physics 201 Lb 3: Mesurement of Erth s locl grvittionl field I Dt Acquisition nd Preliminry Anlysis Dr. Timothy C. Blck Summer I, 2018 Theoreticl Discussion Grvity is one of the four known fundmentl forces.

More information

Reversals of Signal-Posterior Monotonicity for Any Bounded Prior

Reversals of Signal-Posterior Monotonicity for Any Bounded Prior Reversls of Signl-Posterior Monotonicity for Any Bounded Prior Christopher P. Chmbers Pul J. Hely Abstrct Pul Milgrom (The Bell Journl of Economics, 12(2): 380 391) showed tht if the strict monotone likelihood

More information

Introduction to the Calculus of Variations

Introduction to the Calculus of Variations Introduction to the Clculus of Vritions Jim Fischer Mrch 20, 1999 Abstrct This is self-contined pper which introduces fundmentl problem in the clculus of vritions, the problem of finding extreme vlues

More information

TANDEM QUEUE WITH THREE MULTISERVER UNITS AND BULK SERVICE WITH ACCESSIBLE AND NON ACCESSBLE BATCH IN UNIT III WITH VACATION

TANDEM QUEUE WITH THREE MULTISERVER UNITS AND BULK SERVICE WITH ACCESSIBLE AND NON ACCESSBLE BATCH IN UNIT III WITH VACATION Indin Journl of Mthemtics nd Mthemticl Sciences Vol. 7, No., (June ) : 9-38 TANDEM QUEUE WITH THREE MULTISERVER UNITS AND BULK SERVICE WITH ACCESSIBLE AND NON ACCESSBLE BATCH IN UNIT III WITH VACATION

More information

Presentation Problems 5

Presentation Problems 5 Presenttion Problems 5 21-355 A For these problems, ssume ll sets re subsets of R unless otherwise specified. 1. Let P nd Q be prtitions of [, b] such tht P Q. Then U(f, P ) U(f, Q) nd L(f, P ) L(f, Q).

More information

Lecture 1. Functional series. Pointwise and uniform convergence.

Lecture 1. Functional series. Pointwise and uniform convergence. 1 Introduction. Lecture 1. Functionl series. Pointwise nd uniform convergence. In this course we study mongst other things Fourier series. The Fourier series for periodic function f(x) with period 2π is

More information

Estimation of Binomial Distribution in the Light of Future Data

Estimation of Binomial Distribution in the Light of Future Data British Journl of Mthemtics & Computer Science 102: 1-7, 2015, Article no.bjmcs.19191 ISSN: 2231-0851 SCIENCEDOMAIN interntionl www.sciencedomin.org Estimtion of Binomil Distribution in the Light of Future

More information

Optimal Operating Point for MIMO Multiple Access Channel with Bursty Traffic

Optimal Operating Point for MIMO Multiple Access Channel with Bursty Traffic Optiml Operting Point for MIMO Multiple Access Chnnel with Bursty Trffic Somsk Kittipiykul nd Tr Jvidi Abstrct Multiple ntenns t the trnsmitters nd receivers in multiple ccess chnnel (MAC) cn provide simultneous

More information

Finite Horizon Risk Sensitive MDP and Linear Programming

Finite Horizon Risk Sensitive MDP and Linear Programming Finite Horizon Risk Sensitive MDP nd Liner Progrmming Atul Kumr, Veerrun Kvith nd N. Hemchndr IEOR, Indin Institute of Technology Bomby, Indi Abstrct In the context of stndrd Mrkov decision processes (MDPs),

More information

Distributed Throughput Maximization in Wireless Networks via Random Power Allocation

Distributed Throughput Maximization in Wireless Networks via Random Power Allocation 1 Distriuted Throughput Mximiztion in Wireless Networks vi Rndom Power Alloction Hyng-Won Lee, Memer, IEEE, Eytn Modino, Senior Memer, IEEE, Long Bo Le, Memer, IEEE Astrct We develop distriuted throughput-optiml

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Lerning Tom Mitchell, Mchine Lerning, chpter 13 Outline Introduction Comprison with inductive lerning Mrkov Decision Processes: the model Optiml policy: The tsk Q Lerning: Q function Algorithm

More information

University of Texas MD Anderson Cancer Center Department of Biostatistics. Inequality Calculator, Version 3.0 November 25, 2013 User s Guide

University of Texas MD Anderson Cancer Center Department of Biostatistics. Inequality Calculator, Version 3.0 November 25, 2013 User s Guide University of Texs MD Anderson Cncer Center Deprtment of Biosttistics Inequlity Clcultor, Version 3.0 November 5, 013 User s Guide 0. Overview The purpose of the softwre is to clculte the probbility tht

More information

Frobenius numbers of generalized Fibonacci semigroups

Frobenius numbers of generalized Fibonacci semigroups Frobenius numbers of generlized Fiboncci semigroups Gretchen L. Mtthews 1 Deprtment of Mthemticl Sciences, Clemson University, Clemson, SC 29634-0975, USA gmtthe@clemson.edu Received:, Accepted:, Published:

More information

Convergence of Fourier Series and Fejer s Theorem. Lee Ricketson

Convergence of Fourier Series and Fejer s Theorem. Lee Ricketson Convergence of Fourier Series nd Fejer s Theorem Lee Ricketson My, 006 Abstrct This pper will ddress the Fourier Series of functions with rbitrry period. We will derive forms of the Dirichlet nd Fejer

More information

Review of basic calculus

Review of basic calculus Review of bsic clculus This brief review reclls some of the most importnt concepts, definitions, nd theorems from bsic clculus. It is not intended to tech bsic clculus from scrtch. If ny of the items below

More information

Math 1B, lecture 4: Error bounds for numerical methods

Math 1B, lecture 4: Error bounds for numerical methods Mth B, lecture 4: Error bounds for numericl methods Nthn Pflueger 4 September 0 Introduction The five numericl methods descried in the previous lecture ll operte by the sme principle: they pproximte the

More information

CS 188: Artificial Intelligence Spring 2007

CS 188: Artificial Intelligence Spring 2007 CS 188: Artificil Intelligence Spring 2007 Lecture 3: Queue-Bsed Serch 1/23/2007 Srini Nrynn UC Berkeley Mny slides over the course dpted from Dn Klein, Sturt Russell or Andrew Moore Announcements Assignment

More information

A REVIEW OF CALCULUS CONCEPTS FOR JDEP 384H. Thomas Shores Department of Mathematics University of Nebraska Spring 2007

A REVIEW OF CALCULUS CONCEPTS FOR JDEP 384H. Thomas Shores Department of Mathematics University of Nebraska Spring 2007 A REVIEW OF CALCULUS CONCEPTS FOR JDEP 384H Thoms Shores Deprtment of Mthemtics University of Nebrsk Spring 2007 Contents Rtes of Chnge nd Derivtives 1 Dierentils 4 Are nd Integrls 5 Multivrite Clculus

More information

Chapters 4 & 5 Integrals & Applications

Chapters 4 & 5 Integrals & Applications Contents Chpters 4 & 5 Integrls & Applictions Motivtion to Chpters 4 & 5 2 Chpter 4 3 Ares nd Distnces 3. VIDEO - Ares Under Functions............................................ 3.2 VIDEO - Applictions

More information

Credibility Hypothesis Testing of Fuzzy Triangular Distributions

Credibility Hypothesis Testing of Fuzzy Triangular Distributions 666663 Journl of Uncertin Systems Vol.9, No., pp.6-74, 5 Online t: www.jus.org.uk Credibility Hypothesis Testing of Fuzzy Tringulr Distributions S. Smpth, B. Rmy Received April 3; Revised 4 April 4 Abstrct

More information

Deteriorating Inventory Model for Waiting. Time Partial Backlogging

Deteriorating Inventory Model for Waiting. Time Partial Backlogging Applied Mthemticl Sciences, Vol. 3, 2009, no. 9, 42-428 Deteriorting Inventory Model for Witing Time Prtil Bcklogging Nit H. Shh nd 2 Kunl T. Shukl Deprtment of Mthemtics, Gujrt university, Ahmedbd. 2

More information

1.9 C 2 inner variations

1.9 C 2 inner variations 46 CHAPTER 1. INDIRECT METHODS 1.9 C 2 inner vritions So fr, we hve restricted ttention to liner vritions. These re vritions of the form vx; ǫ = ux + ǫφx where φ is in some liner perturbtion clss P, for

More information

Chapter 0. What is the Lebesgue integral about?

Chapter 0. What is the Lebesgue integral about? Chpter 0. Wht is the Lebesgue integrl bout? The pln is to hve tutoril sheet ech week, most often on Fridy, (to be done during the clss) where you will try to get used to the ides introduced in the previous

More information

Section 14.3 Arc Length and Curvature

Section 14.3 Arc Length and Curvature Section 4.3 Arc Length nd Curvture Clculus on Curves in Spce In this section, we ly the foundtions for describing the movement of n object in spce.. Vector Function Bsics In Clc, formul for rc length in

More information

Riemann Sums and Riemann Integrals

Riemann Sums and Riemann Integrals Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 203 Outline Riemnn Sums Riemnn Integrls Properties Abstrct

More information

8 Laplace s Method and Local Limit Theorems

8 Laplace s Method and Local Limit Theorems 8 Lplce s Method nd Locl Limit Theorems 8. Fourier Anlysis in Higher DImensions Most of the theorems of Fourier nlysis tht we hve proved hve nturl generliztions to higher dimensions, nd these cn be proved

More information

Extended nonlocal games from quantum-classical games

Extended nonlocal games from quantum-classical games Extended nonlocl gmes from quntum-clssicl gmes Theory Seminr incent Russo niversity of Wterloo October 17, 2016 Outline Extended nonlocl gmes nd quntum-clssicl gmes Entngled vlues nd the dimension of entnglement

More information

Optimal Resource Allocation for Time-Reservation Systems

Optimal Resource Allocation for Time-Reservation Systems Optiml Resource Alloction for Time-Reservtion Systems Rn Yng,b, Sndji Bhuli,b,RobvnderMei b,, Frnk Seinstr VU University Amsterdm, Fculty of Sciences, De Boeleln 1081, 1081 HV Amsterdm, The Netherlnds

More information

LECTURE NOTE #12 PROF. ALAN YUILLE

LECTURE NOTE #12 PROF. ALAN YUILLE LECTURE NOTE #12 PROF. ALAN YUILLE 1. Clustering, K-mens, nd EM Tsk: set of unlbeled dt D = {x 1,..., x n } Decompose into clsses w 1,..., w M where M is unknown. Lern clss models p(x w)) Discovery of

More information

Binary Rate Distortion With Side Information: The Asymmetric Correlation Channel Case

Binary Rate Distortion With Side Information: The Asymmetric Correlation Channel Case Binry Rte Dtortion With Side Informtion: The Asymmetric Correltion Chnnel Cse Andrei Sechele, Smuel Cheng, Adrin Muntenu, nd Nikos Deliginn Deprtment of Electronics nd Informtics, Vrije Universiteit Brussel,

More information

The Regulated and Riemann Integrals

The Regulated and Riemann Integrals Chpter 1 The Regulted nd Riemnn Integrls 1.1 Introduction We will consider severl different pproches to defining the definite integrl f(x) dx of function f(x). These definitions will ll ssign the sme vlue

More information

Riemann Sums and Riemann Integrals

Riemann Sums and Riemann Integrals Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 2013 Outline 1 Riemnn Sums 2 Riemnn Integrls 3 Properties

More information

Overview of Calculus I

Overview of Calculus I Overview of Clculus I Prof. Jim Swift Northern Arizon University There re three key concepts in clculus: The limit, the derivtive, nd the integrl. You need to understnd the definitions of these three things,

More information

Administrivia CSE 190: Reinforcement Learning: An Introduction

Administrivia CSE 190: Reinforcement Learning: An Introduction Administrivi CSE 190: Reinforcement Lerning: An Introduction Any emil sent to me bout the course should hve CSE 190 in the subject line! Chpter 4: Dynmic Progrmming Acknowledgment: A good number of these

More information

19 Optimal behavior: Game theory

19 Optimal behavior: Game theory Intro. to Artificil Intelligence: Dle Schuurmns, Relu Ptrscu 1 19 Optiml behvior: Gme theory Adversril stte dynmics hve to ccount for worst cse Compute policy π : S A tht mximizes minimum rewrd Let S (,

More information

Math 113 Fall Final Exam Review. 2. Applications of Integration Chapter 6 including sections and section 6.8

Math 113 Fall Final Exam Review. 2. Applications of Integration Chapter 6 including sections and section 6.8 Mth 3 Fll 0 The scope of the finl exm will include: Finl Exm Review. Integrls Chpter 5 including sections 5. 5.7, 5.0. Applictions of Integrtion Chpter 6 including sections 6. 6.5 nd section 6.8 3. Infinite

More information

LYAPUNOV-TYPE INEQUALITIES FOR NONLINEAR SYSTEMS INVOLVING THE (p 1, p 2,..., p n )-LAPLACIAN

LYAPUNOV-TYPE INEQUALITIES FOR NONLINEAR SYSTEMS INVOLVING THE (p 1, p 2,..., p n )-LAPLACIAN Electronic Journl of Differentil Equtions, Vol. 203 (203), No. 28, pp. 0. ISSN: 072-669. URL: http://ejde.mth.txstte.edu or http://ejde.mth.unt.edu ftp ejde.mth.txstte.edu LYAPUNOV-TYPE INEQUALITIES FOR

More information

Realistic Method for Solving Fully Intuitionistic Fuzzy. Transportation Problems

Realistic Method for Solving Fully Intuitionistic Fuzzy. Transportation Problems Applied Mthemticl Sciences, Vol 8, 201, no 11, 6-69 HKAR Ltd, wwwm-hikricom http://dxdoiorg/10988/ms20176 Relistic Method for Solving Fully ntuitionistic Fuzzy Trnsporttion Problems P Pndin Deprtment of

More information

Math 135, Spring 2012: HW 7

Math 135, Spring 2012: HW 7 Mth 3, Spring : HW 7 Problem (p. 34 #). SOLUTION. Let N the number of risins per cookie. If N is Poisson rndom vrible with prmeter λ, then nd for this to be t lest.99, we need P (N ) P (N ) ep( λ) λ ln(.)

More information

Time Optimal Control of the Brockett Integrator

Time Optimal Control of the Brockett Integrator Milno (Itly) August 8 - September, 011 Time Optiml Control of the Brockett Integrtor S. Sinh Deprtment of Mthemtics, IIT Bomby, Mumbi, Indi (emil : sunnysphs4891@gmil.com) Abstrct: The Brockett integrtor

More information

The Henstock-Kurzweil integral

The Henstock-Kurzweil integral fculteit Wiskunde en Ntuurwetenschppen The Henstock-Kurzweil integrl Bchelorthesis Mthemtics June 2014 Student: E. vn Dijk First supervisor: Dr. A.E. Sterk Second supervisor: Prof. dr. A. vn der Schft

More information

Hybrid Group Acceptance Sampling Plan Based on Size Biased Lomax Model

Hybrid Group Acceptance Sampling Plan Based on Size Biased Lomax Model Mthemtics nd Sttistics 2(3): 137-141, 2014 DOI: 10.13189/ms.2014.020305 http://www.hrpub.org Hybrid Group Acceptnce Smpling Pln Bsed on Size Bised Lomx Model R. Subb Ro 1,*, A. Ng Durgmmb 2, R.R.L. Kntm

More information

Advanced Calculus: MATH 410 Uniform Convergence of Functions Professor David Levermore 11 December 2015

Advanced Calculus: MATH 410 Uniform Convergence of Functions Professor David Levermore 11 December 2015 Advnced Clculus: MATH 410 Uniform Convergence of Functions Professor Dvid Levermore 11 December 2015 12. Sequences of Functions We now explore two notions of wht it mens for sequence of functions {f n

More information

CBE 291b - Computation And Optimization For Engineers

CBE 291b - Computation And Optimization For Engineers The University of Western Ontrio Fculty of Engineering Science Deprtment of Chemicl nd Biochemicl Engineering CBE 9b - Computtion And Optimiztion For Engineers Mtlb Project Introduction Prof. A. Jutn Jn

More information

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite Unit #8 : The Integrl Gols: Determine how to clculte the re described by function. Define the definite integrl. Eplore the reltionship between the definite integrl nd re. Eplore wys to estimte the definite

More information

Student Activity 3: Single Factor ANOVA

Student Activity 3: Single Factor ANOVA MATH 40 Student Activity 3: Single Fctor ANOVA Some Bsic Concepts In designed experiment, two or more tretments, or combintions of tretments, is pplied to experimentl units The number of tretments, whether

More information

QUADRATURE is an old-fashioned word that refers to

QUADRATURE is an old-fashioned word that refers to World Acdemy of Science Engineering nd Technology Interntionl Journl of Mthemticl nd Computtionl Sciences Vol:5 No:7 011 A New Qudrture Rule Derived from Spline Interpoltion with Error Anlysis Hdi Tghvfrd

More information

CS 188 Introduction to Artificial Intelligence Fall 2018 Note 7

CS 188 Introduction to Artificial Intelligence Fall 2018 Note 7 CS 188 Introduction to Artificil Intelligence Fll 2018 Note 7 These lecture notes re hevily bsed on notes originlly written by Nikhil Shrm. Decision Networks In the third note, we lerned bout gme trees

More information

Tech. Rpt. # UMIACS-TR-99-31, Institute for Advanced Computer Studies, University of Maryland, College Park, MD 20742, June 3, 1999.

Tech. Rpt. # UMIACS-TR-99-31, Institute for Advanced Computer Studies, University of Maryland, College Park, MD 20742, June 3, 1999. Tech. Rpt. # UMIACS-TR-99-3, Institute for Advnced Computer Studies, University of Mrylnd, College Prk, MD 20742, June 3, 999. Approximtion Algorithms nd Heuristics for the Dynmic Storge Alloction Problem

More information

Module 6: LINEAR TRANSFORMATIONS

Module 6: LINEAR TRANSFORMATIONS Module 6: LINEAR TRANSFORMATIONS. Trnsformtions nd mtrices Trnsformtions re generliztions of functions. A vector x in some set S n is mpped into m nother vector y T( x). A trnsformtion is liner if, for

More information

An approximation to the arithmetic-geometric mean. G.J.O. Jameson, Math. Gazette 98 (2014), 85 95

An approximation to the arithmetic-geometric mean. G.J.O. Jameson, Math. Gazette 98 (2014), 85 95 An pproximtion to the rithmetic-geometric men G.J.O. Jmeson, Mth. Gzette 98 (4), 85 95 Given positive numbers > b, consider the itertion given by =, b = b nd n+ = ( n + b n ), b n+ = ( n b n ) /. At ech

More information

Local orthogonality: a multipartite principle for (quantum) correlations

Local orthogonality: a multipartite principle for (quantum) correlations Locl orthogonlity: multiprtite principle for (quntum) correltions Antonio Acín ICREA Professor t ICFO-Institut de Ciencies Fotoniques, Brcelon Cusl Structure in Quntum Theory, Bensque, Spin, June 2013

More information

Research Article On Existence and Uniqueness of Solutions of a Nonlinear Integral Equation

Research Article On Existence and Uniqueness of Solutions of a Nonlinear Integral Equation Journl of Applied Mthemtics Volume 2011, Article ID 743923, 7 pges doi:10.1155/2011/743923 Reserch Article On Existence nd Uniqueness of Solutions of Nonliner Integrl Eqution M. Eshghi Gordji, 1 H. Bghni,

More information

f(x)dx . Show that there 1, 0 < x 1 does not exist a differentiable function g : [ 1, 1] R such that g (x) = f(x) for all

f(x)dx . Show that there 1, 0 < x 1 does not exist a differentiable function g : [ 1, 1] R such that g (x) = f(x) for all 3 Definite Integrl 3.1 Introduction In school one comes cross the definition of the integrl of rel vlued function defined on closed nd bounded intervl [, b] between the limits nd b, i.e., f(x)dx s the

More information

Multi-Armed Bandits: Non-adaptive and Adaptive Sampling

Multi-Armed Bandits: Non-adaptive and Adaptive Sampling CSE 547/Stt 548: Mchine Lerning for Big Dt Lecture Multi-Armed Bndits: Non-dptive nd Adptive Smpling Instructor: Shm Kkde 1 The (stochstic) multi-rmed bndit problem The bsic prdigm is s follows: K Independent

More information

Monte Carlo method in solving numerical integration and differential equation

Monte Carlo method in solving numerical integration and differential equation Monte Crlo method in solving numericl integrtion nd differentil eqution Ye Jin Chemistry Deprtment Duke University yj66@duke.edu Abstrct: Monte Crlo method is commonly used in rel physics problem. The

More information

Properties of the Riemann Integral

Properties of the Riemann Integral Properties of the Riemnn Integrl Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University Februry 15, 2018 Outline 1 Some Infimum nd Supremum Properties 2

More information

Improved Results on Stability of Time-delay Systems using Wirtinger-based Inequality

Improved Results on Stability of Time-delay Systems using Wirtinger-based Inequality Preprints of the 9th World Congress he Interntionl Federtion of Automtic Control Improved Results on Stbility of ime-dely Systems using Wirtinger-bsed Inequlity e H. Lee Ju H. Prk H.Y. Jung O.M. Kwon S.M.

More information

Homework 4. (1) If f R[a, b], show that f 3 R[a, b]. If f + (x) = max{f(x), 0}, is f + R[a, b]? Justify your answer.

Homework 4. (1) If f R[a, b], show that f 3 R[a, b]. If f + (x) = max{f(x), 0}, is f + R[a, b]? Justify your answer. Homework 4 (1) If f R[, b], show tht f 3 R[, b]. If f + (x) = mx{f(x), 0}, is f + R[, b]? Justify your nswer. (2) Let f be continuous function on [, b] tht is strictly positive except finitely mny points

More information

MATH SS124 Sec 39 Concepts summary with examples

MATH SS124 Sec 39 Concepts summary with examples This note is mde for students in MTH124 Section 39 to review most(not ll) topics I think we covered in this semester, nd there s exmples fter these concepts, go over this note nd try to solve those exmples

More information