Queue Dynamics of RED Gateways Under Large Number of TCP Flows
|
|
- Patricia Cain
- 5 years ago
- Views:
Transcription
1 Queue Dynamcs of RED Gateways Under Large umber of TC Flows eerapol Tnnakornsrsuphap, Armand M. Makowsk Department of ECE and and Insttute for Systems Research Unversty of Maryland, College ark, MD Abstract We consder a stochastc model of a RED gateway under competng TC-lke sources sharng the capacty. As the number of competng flows becomes large, the queue behavor of RED can be descrbed by a two-dmensonal recurson. We confrm the result by smulatons and dscuss ther mplcatons for the network dmensonng problem. I. ITRODUCTIO One of the key mechansms for the operaton of the besteffort servce Internet s the congeston-control mechansm n TC. Whle there are several varatons on the basc TC congeston-control mechansm, they all have n common the addtve ncrease/multplcatve decrease (AIMD) algorthm. The AIMD algorthm enables TC congestoncontrol to be robust under dverse condtons. However, t s well known that wth tal-drop gateways ths congestoncontrol also leads to undesrable behavor,.e., global synchronzaton. When several TC flows compete for bandwdth n a tal-drop gateway, t has been observed expermentally that packets from many flows are usually dscarded smultaneously [], resultng n a poor utlzaton of the network. Actve queue management algorthms such as Random Early Detecton (RED) [2] were ntroduced to help allevate ths problem by randomly droppng packets dependng on the queue sze, thereby avodng heavy congeston and prevent global synchronzaton. Whle there are many efforts to model TC throughput under a tal-drop assumpton [3] [4] [5] [6], only a few studes have focused on modelng the nteracton of RED gateways wth TC congeston-control. In [7], an analytcal framework for multple TC flows sharng a RED gateway s developed under several potentally unrealstc assumptons. In [8], a smple analyss has been done wth TC connectons operatng as osson processes under slow and fast rates. Fxed pont solutons to average TC wndow szes and queue occupancy are dscussed n [9]. However, a model that can provde a good analytc understandng of TC and RED s yet to be found. The dffcultes arse from the complex behavor of TC congeston-control, and are further compounded by the random drop mechansm and queue averagng. Detaled modelng of these characterstcs results n a number of states whch explodes when the number of TC flows ncrease, makng the analyss untractable. In ths paper, we present a stochastc model that captures the essental features of TC,.e., the gradual adaptve ncrease and the sudden decrease of transmsson rate, combned wth a random drop algorthm smlar to RED. We analyze ths ersatz model as the number of competng TC flows becomes large, and show that the stochastc model smplfes n the lmt to a two-dmensonal recurson. Ths result suggests that wth a large number of flows, t s easy for network operators to estmate the aggregate behavor of TC flows and to dmenson network resources accordngly. The remander of the paper s organzed as follows. Secton II descrbes the stochastc model. Secton III present the man asymptotc results for the large number of TC flows whereby the stochastc model smplfes nto a smplfed lmtng recurson. Smulaton results supportng ths behavor are shown n Secton IV. The conclusons of the paper are gven n Secton V. II. THE MODEL TC congeston-control utlzes the AIMD algorthm to provde TC flows a far bandwdth share [0] by usng feedback obtaned through acknowledgement packets (ACKs). If an ACK packet s receved (.e., a packet s successfully transmtted and acknowledged), TC ncreases ts transmsson rate by a small, conservatve amount. Otherwse, TC nterprets a lack of acknowledgement as a sgn of congeston and reduces ts transmsson rate by half. We present an algorthm smlar n sprt to the AIMD congeston-control n TC and apply t to the model de-
2 scrbed earler. A. Defntons and notaton Tme s assumed dscrete and slotted n contguous tmeslots of equal duraton normalzed to a packet transmsson tme. We consder traffc sources, all transmttng through a bottleneck RED gateway. The capacty of ths bottleneck scales wth the number of flows,.e., t has capacty C packets/slot for some postve constant C. We model the RED buffer as an nfnte queue, so that packet losses are due only to the random drop algorthm B. Dynamcs Fx =; 2;:::and t =0; ;:::. For any quantty X, we wrte X ( ) to ndcate the explct dependence of X on the number of connectons. Let Q ( ) denote the number of packets n the buffer at the begnnng of the tmeslot [t; t +). Suppose that each source (or equvalently, TC connecton) generates at most one packet n each tmeslot. So let B ( ) be a f0; g-valued rv that encodes the number of packets generated by source at the begnnng of the tmeslot [t; t+ ). The packet from source, upon arrval at the RED gateway, may be rejected by the random drop algorthm (to be specfed shortly). We represent ths possblty by the f0; g-valued rv wth the nterpretaton that = (resp. =0) f the packet s rejected (resp. accepted nto the RED buffer). Gven that sources are actve, the total number of packets whch are accepted nto the RED buffer at the begnnng of tmeslot [t; t +)s gven by A ( ) := X = (, : If Q ( ) denotes the number of packets n the buffer at the begnnng of the tmeslot [t; t + ), then Q ( ) +A ( ) packets are avalable for transmsson. Snce the outgong lnk operates at the rate of C h + packets/tmeslot, Q ( ) +A ( ), C packets wll not be transmtted durng tmeslot [t; t +],and reman n buffer, ther transmsson beng deferred to subsequent tmeslots. The number Q ( ) of packets n the buffer at the begnnng of the tmeslot [t +;t+2)s therefore gven by 2 h + Q ( ) = Q ( ), C + A ( ) : () We can account for the fnteness of the buffer by modfyng the queue dynamcs as s done n the footonote to recurson (). 2 The fnteness of the buffer n () can be replaced by Q () = C. Statstcal assumptons In order to fully specfy the model, we need to specfy the statstcs of the rvs fb ( ) ; ; = ;:::;; t =0; ;:::g for each =; 2;:::. To do so we ntroduce the collecton of..d. [0; ]- unform rvs fv (t+);u (t+); =;:::; t =0; ;:::g. For each =;:::;,wetake B ( ) =[U ( ) ] (2) where ( ) s an [0; ]-valued rv whch denotes the (condtonal) transmsson rate (to be specfed shortly) of traffc source at the begnnng of the tmeslot [t; t +). We also set =[V ( ) f ( ) (Q ( ) )] (3) where f ( ) : IR +! [0; ] denotes the drop probablty functon of the RED gateway. To select the transmsson rates we argue as follows: Suppose that source generates no packet durng tmeslot [t; t +)(.e. B ( ) =0), then the transmsson rate of source n the next tmeslot remans unchanged. If on the other hand, a packet s produced by source at the begnnng of tmeslot [t; t +), then ether the packet s successfully transmtted ( (t+) = 0), or t s dropped (t+) = ). In the former case, the transmsson rate ( of source n the next tmeslot s ncreased to ( )," s de- (wth 0 < " < ). In the latter case, ( ) creased by a factor (or ( ) = ( ) ), where 0 <<. These two stuatons attempt to emulate (under the constrant that transmsson rates are bounded to the unt nterval) the addtve ncrease and multplcatve decrease, respectvely, of the TC congeston-control. They can be summarzed nto the sngle equaton ( ) = ( )," (, + ( ) B ( ) + ( ) (, B ( ) (t + )): (4) For each t = 0; ;:::,letf t denote the -feld generated by the rvs fq ( ) (0); ( ) (0);V (s);u (s); = ;:::; s = ;:::;tg. ote the rvs Q ( ) and ( ) ( =;:::;)areallf t -measurable, so that E hb ( ) jf t = ( ) mn([q (),C + = (,R() (t + ))B () (t + )] + ;B) where B denotes the buffer sze per connecton.
3 for all =;:::;,and E h jf t = f ( ) (Q ( ) ): III. MAI RESULTS In ths secton, we analyze the model presented n Secton II as the number of traffc flows ncrease to nfnte and dscuss the mplcatons of the result. Q () / A. The asymptotcs The dscusson s carred out under the followng assumptons: There exst a contnuous functon f : IR +! [0; ] and a constant n (0; ) such that for each = 0; ;:::, (A) f ( ) (x) =f (x= ) (x 0); (A2) Q ( ) (0) = 0 and ( ) (0) = ( =;:::;). We begn wth an easy consequence of these assumptons. Lemma : Assume (A)-(A2) to hold. Then, for each t = 0; ;:::;, the rvs f ( ) ;:::; ( ) g are exchangeable for all =; 2;:::. The next proposton presents the asymptotcs for the normalzed buffer content as the number of TC sources becomes large. Theorem : Assume (A)-(A2) to hold. Then, for each t =0; ;:::, there exst a non-random constant q and a rv such that Q ( ) and for every p>0, Moreover, and! q and ( )! (5) = (( ) ) p! E [ p ] : (6) q=[q, C +(, f (q))e []] + (7) =," [V >f(q)][u ] +[V f (q)][u ] +[U > ] (8) for..d. [0; ]-unform rvs fv ;U; t = 0; ;:::g. Wth a p =E [ p ] (p >0), we readly get a p = a p +(, f (q)) a (,")p +( p f (q), ) a p+ : (9) t Fg.. The normalzed queue length of Smulaton. B. Dscusson Theorem suggests that a bottleneck queue wth random-drop algorthm, under large number of TC-lke sources, can be characterzed by a two-dmensonal recurson gvng the evoluton of the normalzed queue length q and the lmtng transmsson rate. Ths result s not a straghtforward consequence of the Law of Large umber due to the fact that () the transmsson rates of traffc sources are correlated and () they vary wth. However, as the number of sources ncreases, the dependency between any par of sources becomes weaker so that the aggregate behavor eventually becomes determnstc. Thus, as the aggregate queue behavor scales lnearly wth the number of sources, the network provder could effectvely dmenson network resources by tackng the normalzed queue behavor. The sequence f(q; ); t = 0; ;:::g n Theorem defnesanir + [0; ]-valued Markov process, and we expect that t admts a steady-state regme. Ths wll be dscussed elsewhere. IV. SIMULATIO We smulate the system descrbed earler for = 0; 00; 000 wth " = 0:, = 0:5 and C = 0:5; the ntal condtons are Q ( ) (0) = 0 and ( ) =0:5 for all =; ::;. The drop probablty s calculated through the pecewse lnear functon f :IR +! [0; ] gven by f (x) = 8 >< >: 0 x< x, 4 x<5 5 x: (0)
4 (/) Σ α = Average queue sze per user n tmeslot t Fg. 2. The average transmsson rate per user of Smulaton = tmeslot Fg. 3. The average queue sze per user of ns smulaton. The smulaton results are shown n Fgure and 2. It s clear that the fluctuaton of Q ( ) = decreases as the number of sources ncreases, and the same s true for the average transmsson rate. Wth a hundred or more flows, our analytcal result seems to hold reasonably well. Moreover, ths smulaton result also suggests the exstence of the steady-state, whch happens quckly after only around a hundred teratons. We also smulate a smlar system n ns by generatng TC Reno connectons, each of whch havng 00 ms round-trp delay, all competng to transmt through a bottleneck gateway wth lnk capacty Mbps. The TC packet sze s set to be 500 bytes. The buffer management scheme n the gateway s RED wth the followng parameters: thresh =2, maxthresh =5, p drop =when queue sze s greater than 5 and w q =0:. The tmeslot that we observed the average queue length n the bottleneck gateway s second. Fgure 3 shows the smulaton result; a trend smlar to that of Fgure s observed n that as the number of TC connecton ncreases, the fluctuaton n the average queue sze decreases. As tme passes, the range of fluctuaton settles to a certan lmted range. The prelmnary fndngs comfort our belef that our ersatz model captures some of the essental features of TC and RED and then llustrate the mportant behavor of the nteracton between these two mechansms. V. COCLUSIOS We have developed a stochastc model for a RED gateway under competng TC flows. We have shown that, as the number of flows grow large, the aggregate behavor of the queue can be descrbed by a two-dmensonal recurson. We have also dscussed the mplcatons of our results to the dmensonng of the network. Although we have yet to prove the exstence of a steadystate regme for the lmtng recurson, the lmted smulaton results () are compatble wth the exstence of such a steady-state and () suggest that the rate of convergence s fast n ether the number of sources (to acheve lmtng behavor) and the tme (to reach the steady-state). Future work on ths class of models ncludes () a proof of the exstence of a steady state for the lmtng dynamcs and ts evaluaton; () a dervaton of a CLT complement to the basc convergence result; and () the development of more accurate models (e.g., More than one packet generated per tmeslot; asynchronous updatng of the transmsson rates; non-homogeneous populaton of TC flows and contnuous-tme versons.) It s also nterestng to see how the shape of the drop functon affect the rate of convergence. Furthermore, we should be able to nvestgate the farness of the competng TC flows n ths model. And fnally, we beleve that ths model s smple enough to be extended to the scenaro where the sources are stochastc, say on-off sources. REFERECES [] L. Zhang and D. Clark, Oscllatng behavor of network traffc: A case study smulaton, Internetworkng: Research and Experence, vol., no. 2, pp. 0 2, 990. [2] S. Floyd and V. Jacobson, Random early detecton gateways for congeston avodance, IEEE/ACM Transactons on etworkng, vol., no. 4, pp , 993. [3] M. Maths, J. Semke, J. Madhav, and T. Ott, The macroscopc behavor of the tcp congeston avodance algorthm, Computer Communcaton Revew, vol. 27, no. 3, pp , 997.
5 [4] J. adhye, V. Frou, D. Towsley, and J. Kurose, Modelng tcp reno performance: A smple model and ts emprcal valdaton, IEEE/ACM Transactons on etworkng, vol. 8, no. 2, pp , [5] Th. Bonald, Comparson of TC Reno and TC Vegas va flud approxmaton, Tech. Rep. 3563, IRIA, ov [6] T. V. Lakshman and U. Madhow, The performance of TC/I for networks wth hgh bandwdth-delay products and random loss, IEEE/ACM Transactons on etworkng, June 997. [7] A. Abouzed and S. Roy, Analytc understandng of red gateways wth multple competng tcp flows, n roceedngs of Globecom 2000, [8] H. M. Alazem, A. Mokhtar, and M. Azzoglu, Stochastc modelng of random early detecton gateways n tcp networks, n roceedngs of Globecom 2000, [9] A. Msra, Dynamcs of TC Congeston Avodance wth Random Drop and Random Markng Queues, h.d. thess, Unversty of Maryland, [0] V. Jacobson, Congeston avodance and control, n roceedngs of SIGCOMM 88 Symposum, Aug. 988, pp []. Tnnakornsrsuphap and A.M. Makowsk, Queue Dynamcs of RED Gateways Under Large umber of TC Flows: Lmt Behavor and Steady-State Regme, Techncal Report, Insttute for Systems Research, Unversty of Maryland, College ark, MD [2] G. R. Grmmett and D. R. Strzaker, robablty and Random rocesses, Oxford Scence ublcatons, 992. VI. OUTLIE OF AROOF OF THEOREM A complete proof of Theorem s avalable n []. Before we outlne the key elements of ths proof, we ntroduce the followng notaton: For each t = 0; ;:::,the statements [A:t], [B:t] and [C:t] refer to the convergences [A : t] : Q ( ) [B : t] : ( )! ; [C : t] :! q wth q non, random; = [( ) ] p! a p non, random: The equalty a p =E [ p ] n [C:t] readly follows under [B:t] snce the rvs f ( ) ;:::; ( ) g are exchangeable and bounded. Snce the statements [A:t], [B:t] and [C:t] do hold for t = 0, Theorem wll be proved by nducton f the followng nducton step can be establshed. roposton : Assume (A)-(A2) to hold as n Theorem. If for some t = 0; ;:::, [A:t], [B:t] and [C:t] hold, then so do [A:t+], [B:t+] and [C:t+]. Ths proposton can be proved wth the help of a seres of lemmas. The frst two lemmas are elementary, and ther proofs are therefore omtted. Lemma 2: Let U denote a [0,] unform rv whch s ndependent of the [0; ]-valued rvs fx; X n ; n =; 2;:::g. If X n! n X,then [U X n ]! n [U X]. Lemma 3: For each = ; 2;:::, assume the rvs f ( ) ; = ;:::;g to be bounded, say j ( ) j for all =;:::;, and the rvs f ( ) ; = ;:::;g to be exchangeable and bounded, say j ( ) j for all = ;:::;.If ( )! 0,then ) = ( ( )! 0. The next lemma takes the frst step towards provng roposton. Lemma 4: Under (A), f [A:t], [B:t] and [C:t] hold for some t =0; ;:::,then[b:t+] holds wth (t+) related to by (8). roof: The contnuty of f andtheassumedconver- gence [A:t] readly lead [2, p. 326] to f ( ) (Q ( ) ) = f (Q ( ) = )! f (q); () and Lemma 2 thus yelds! [V f (q)]: (2) Also by Lemma 2, we have B ( )! [U ] (3) where the rv U s ndependent of the rv. Fnally, under [B:t], we obtan (8) drectly from (4). The next two lemmas provde the fnal steps n the proof of roposton. Lemma 5: Under (A), f [A:t], [B:t] and [C:t] hold for some t =0; ;:::,then A ( )! (, f (q))a (4) and [A:t+] holds. Lemma 6: Under (A) (A2), f [A:t], [B:t] and [C:t] hold for some t =0; ;:::,then[c:t+] holds. The proofs of Lemmas 5 and 6, whle nvolved, are not very dffcult and follow the same pattern: The rvs (,, B ( ) and, B ( ) are ndcator functons of mutually exclusve events. Hence, [ ( ) (t+)] q equals to the rghthand sde of (9) wth ( ) replaced by [ ( ) ] q.we can expand A ( ) and ) = [( (t + )] q by centerng each term by subtractng and addng back the ap- proprate condtonal mean, say [V f (q)] for and ( ) for B ( ). By repeated applcatons of Lemma 3, each centered term wll converge n probablty to zero, and the desred results follow.
COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
More informationECE559VV Project Report
ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate
More informationResource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud
Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal
More informationElsevier Editorial System(tm) for Journal of the Franklin Institute Manuscript Draft
Elsever Edtoral System(tm) for Journal of the Frankln Insttute Manuscrpt Draft Manuscrpt umber: FI-D-09-00471 Ttle: On the Asymptotc Queueng Behavor of General AQM Routers Artcle Type: Modelng & Smulaton
More informationQueueing Networks II Network Performance
Queueng Networks II Network Performance Davd Tpper Assocate Professor Graduate Telecommuncatons and Networkng Program Unversty of Pttsburgh Sldes 6 Networks of Queues Many communcaton systems must be modeled
More informationA Hybrid Variational Iteration Method for Blasius Equation
Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method
More informationCollege of Computer & Information Science Fall 2009 Northeastern University 20 October 2009
College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:
More information1 Derivation of Rate Equations from Single-Cell Conductance (Hodgkin-Huxley-like) Equations
Physcs 171/271 -Davd Klenfeld - Fall 2005 (revsed Wnter 2011) 1 Dervaton of Rate Equatons from Sngle-Cell Conductance (Hodgkn-Huxley-lke) Equatons We consder a network of many neurons, each of whch obeys
More information3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X
Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number
More information9 Derivation of Rate Equations from Single-Cell Conductance (Hodgkin-Huxley-like) Equations
Physcs 171/271 - Chapter 9R -Davd Klenfeld - Fall 2005 9 Dervaton of Rate Equatons from Sngle-Cell Conductance (Hodgkn-Huxley-lke) Equatons We consder a network of many neurons, each of whch obeys a set
More informationMore metrics on cartesian products
More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of
More informationChapter 7 Channel Capacity and Coding
Wreless Informaton Transmsson System Lab. Chapter 7 Channel Capacty and Codng Insttute of Communcatons Engneerng atonal Sun Yat-sen Unversty Contents 7. Channel models and channel capacty 7.. Channel models
More informationAsynchronous CSMA Policies in Multihop Wireless Networks with Primary Interference Constraints
Asynchronous CSMA Polces n Multhop Wreless Networks wth Prmary Interference Constrants Peter Marbach, Atlla Erylmaz, and Asu Ozdaglar Abstract We analyze Asynchronous Carrer Sense Multple Access (CSMA)
More informationSimulated Power of the Discrete Cramér-von Mises Goodness-of-Fit Tests
Smulated of the Cramér-von Mses Goodness-of-Ft Tests Steele, M., Chaselng, J. and 3 Hurst, C. School of Mathematcal and Physcal Scences, James Cook Unversty, Australan School of Envronmental Studes, Grffth
More informationLecture 4: November 17, Part 1 Single Buffer Management
Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input
More informationModule 2. Random Processes. Version 2 ECE IIT, Kharagpur
Module Random Processes Lesson 6 Functons of Random Varables After readng ths lesson, ou wll learn about cdf of functon of a random varable. Formula for determnng the pdf of a random varable. Let, X be
More informationNumerical Heat and Mass Transfer
Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and
More informationGlobal Sensitivity. Tuesday 20 th February, 2018
Global Senstvty Tuesday 2 th February, 28 ) Local Senstvty Most senstvty analyses [] are based on local estmates of senstvty, typcally by expandng the response n a Taylor seres about some specfc values
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationTransfer Functions. Convenient representation of a linear, dynamic model. A transfer function (TF) relates one input and one output: ( ) system
Transfer Functons Convenent representaton of a lnear, dynamc model. A transfer functon (TF) relates one nput and one output: x t X s y t system Y s The followng termnology s used: x y nput output forcng
More informationCSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography
CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve
More informationEcon107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)
I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes
More informationAPPENDIX A Some Linear Algebra
APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,
More informationx = , so that calculated
Stat 4, secton Sngle Factor ANOVA notes by Tm Plachowsk n chapter 8 we conducted hypothess tests n whch we compared a sngle sample s mean or proporton to some hypotheszed value Chapter 9 expanded ths to
More informationAnalysis of Discrete Time Queues (Section 4.6)
Analyss of Dscrete Tme Queues (Secton 4.6) Copyrght 2002, Sanjay K. Bose Tme axs dvded nto slots slot slot boundares Arrvals can only occur at slot boundares Servce to a job can only start at a slot boundary
More informationWinter 2008 CS567 Stochastic Linear/Integer Programming Guest Lecturer: Xu, Huan
Wnter 2008 CS567 Stochastc Lnear/Integer Programmng Guest Lecturer: Xu, Huan Class 2: More Modelng Examples 1 Capacty Expanson Capacty expanson models optmal choces of the tmng and levels of nvestments
More informationConvexity preserving interpolation by splines of arbitrary degree
Computer Scence Journal of Moldova, vol.18, no.1(52), 2010 Convexty preservng nterpolaton by splnes of arbtrary degree Igor Verlan Abstract In the present paper an algorthm of C 2 nterpolaton of dscrete
More information8 Derivation of Network Rate Equations from Single- Cell Conductance Equations
Physcs 178/278 - Davd Klenfeld - Wnter 2015 8 Dervaton of Network Rate Equatons from Sngle- Cell Conductance Equatons We consder a network of many neurons, each of whch obeys a set of conductancebased,
More informationUncertainty and auto-correlation in. Measurement
Uncertanty and auto-correlaton n arxv:1707.03276v2 [physcs.data-an] 30 Dec 2017 Measurement Markus Schebl Federal Offce of Metrology and Surveyng (BEV), 1160 Venna, Austra E-mal: markus.schebl@bev.gv.at
More informationChapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems
Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons
More informationA Lower Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control
A ower Bound on SIR Threshold for Call Admsson Control n Multple-Class CDMA Systems w Imperfect ower-control Mohamed H. Ahmed Faculty of Engneerng and Appled Scence Memoral Unversty of ewfoundland St.
More informationSupplement: Proofs and Technical Details for The Solution Path of the Generalized Lasso
Supplement: Proofs and Techncal Detals for The Soluton Path of the Generalzed Lasso Ryan J. Tbshran Jonathan Taylor In ths document we gve supplementary detals to the paper The Soluton Path of the Generalzed
More informationDifference Equations
Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1
More informationTCOM 501: Networking Theory & Fundamentals. Lecture 7 February 25, 2003 Prof. Yannis A. Korilis
TCOM 501: Networkng Theory & Fundamentals Lecture 7 February 25, 2003 Prof. Yanns A. Korls 1 7-2 Topcs Open Jackson Networks Network Flows State-Dependent Servce Rates Networks of Transmsson Lnes Klenrock
More informationConvergence of random processes
DS-GA 12 Lecture notes 6 Fall 216 Convergence of random processes 1 Introducton In these notes we study convergence of dscrete random processes. Ths allows to characterze phenomena such as the law of large
More information4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA
4 Analyss of Varance (ANOVA) 5 ANOVA 51 Introducton ANOVA ANOVA s a way to estmate and test the means of multple populatons We wll start wth one-way ANOVA If the populatons ncluded n the study are selected
More informationJoint Statistical Meetings - Biopharmaceutical Section
Iteratve Ch-Square Test for Equvalence of Multple Treatment Groups Te-Hua Ng*, U.S. Food and Drug Admnstraton 1401 Rockvlle Pke, #200S, HFM-217, Rockvlle, MD 20852-1448 Key Words: Equvalence Testng; Actve
More informationA PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS
HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,
More informationOn the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros
Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong
More informationAn Upper Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control
An Upper Bound on SINR Threshold for Call Admsson Control n Multple-Class CDMA Systems wth Imperfect ower-control Mahmoud El-Sayes MacDonald, Dettwler and Assocates td. (MDA) Toronto, Canada melsayes@hotmal.com
More informationTurbulence classification of load data by the frequency and severity of wind gusts. Oscar Moñux, DEWI GmbH Kevin Bleibler, DEWI GmbH
Turbulence classfcaton of load data by the frequency and severty of wnd gusts Introducton Oscar Moñux, DEWI GmbH Kevn Blebler, DEWI GmbH Durng the wnd turbne developng process, one of the most mportant
More informationChapter 7 Channel Capacity and Coding
Chapter 7 Channel Capacty and Codng Contents 7. Channel models and channel capacty 7.. Channel models Bnary symmetrc channel Dscrete memoryless channels Dscrete-nput, contnuous-output channel Waveform
More informationChapter 13: Multiple Regression
Chapter 13: Multple Regresson 13.1 Developng the multple-regresson Model The general model can be descrbed as: It smplfes for two ndependent varables: The sample ft parameter b 0, b 1, and b are used to
More informationProblem Set 9 Solutions
Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem
More informationAppendix B: Resampling Algorithms
407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles
More informationA Simple Inventory System
A Smple Inventory System Lawrence M. Leems and Stephen K. Park, Dscrete-Event Smulaton: A Frst Course, Prentce Hall, 2006 Hu Chen Computer Scence Vrgna State Unversty Petersburg, Vrgna February 8, 2017
More informationTemperature. Chapter Heat Engine
Chapter 3 Temperature In prevous chapters of these notes we ntroduced the Prncple of Maxmum ntropy as a technque for estmatng probablty dstrbutons consstent wth constrants. In Chapter 9 we dscussed the
More informationMarkov Chain Monte Carlo Lecture 6
where (x 1,..., x N ) X N, N s called the populaton sze, f(x) f (x) for at least one {1, 2,..., N}, and those dfferent from f(x) are called the tral dstrbutons n terms of mportance samplng. Dfferent ways
More informationTECHNICAL RESEARCH REPORT
TECHICAL RESEARCH REPORT Lmtng Model of EC/RED under a Large umber of Heterogeneous TCP Flows by Peerapol Tnnakornsrsupap, Rcard J. La CSHC TR 3-7 (ISR TR 3-3) Te Center for Satellte and Hybrd Communcaton
More informationMarkov Chain Monte Carlo (MCMC), Gibbs Sampling, Metropolis Algorithms, and Simulated Annealing Bioinformatics Course Supplement
Markov Chan Monte Carlo MCMC, Gbbs Samplng, Metropols Algorthms, and Smulated Annealng 2001 Bonformatcs Course Supplement SNU Bontellgence Lab http://bsnuackr/ Outlne! Markov Chan Monte Carlo MCMC! Metropols-Hastngs
More information20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness.
20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The frst dea s connectedness. Essentally, we want to say that a space cannot be decomposed
More informationFixed Point Analysis of Single Cell IEEE e WLANs: Uniqueness, Multistability and Throughput Differentiation
Fxed Pont Analyss of Sngle Cell IEEE 82.e WLANs: Unqueness, Multstablty and Throughput Dfferentaton Venkatesh Ramayan ECE Department Indan Insttute of Scence Bangalore, Inda rvenkat@ece.sc.ernet.n Anurag
More informationIntroduction to Vapor/Liquid Equilibrium, part 2. Raoult s Law:
CE304, Sprng 2004 Lecture 4 Introducton to Vapor/Lqud Equlbrum, part 2 Raoult s Law: The smplest model that allows us do VLE calculatons s obtaned when we assume that the vapor phase s an deal gas, and
More informationCOMPLETE BUFFER SHARING IN ATM NETWORKS UNDER BURSTY ARRIVALS
COMPLETE BUFFER SHARING WITH PUSHOUT THRESHOLDS IN ATM NETWORKS UNDER BURSTY ARRIVALS Ozgur Aras and Tugrul Dayar Abstract. Broadband Integrated Servces Dgtal Networks (B{ISDNs) are to support multple
More informationLOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin
Proceedngs of the 007 Wnter Smulaton Conference S G Henderson, B Bller, M-H Hseh, J Shortle, J D Tew, and R R Barton, eds LOW BIAS INTEGRATED PATH ESTIMATORS James M Calvn Department of Computer Scence
More informationChapter 5 Multilevel Models
Chapter 5 Multlevel Models 5.1 Cross-sectonal multlevel models 5.1.1 Two-level models 5.1.2 Multple level models 5.1.3 Multple level modelng n other felds 5.2 Longtudnal multlevel models 5.2.1 Two-level
More informationCHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE
CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng
More informationTHE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens
THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of
More informationEEE 241: Linear Systems
EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they
More informationLecture 17 : Stochastic Processes II
: Stochastc Processes II 1 Contnuous-tme stochastc process So far we have studed dscrete-tme stochastc processes. We studed the concept of Makov chans and martngales, tme seres analyss, and regresson analyss
More informationAnnexes. EC.1. Cycle-base move illustration. EC.2. Problem Instances
ec Annexes Ths Annex frst llustrates a cycle-based move n the dynamc-block generaton tabu search. It then dsplays the characterstcs of the nstance sets, followed by detaled results of the parametercalbraton
More informationDistributed Optimal TXOP Control for Throughput Requirements in IEEE e Wireless LAN
Dstrbuted Optmal TXOP Control for Throughput Requrements n IEEE 80.e Wreless LAN Ju Yong Lee, Ho Young Hwang, Jtae Shn, and Shahrokh Valaee KAIST Insttute for Informaton Technology Convergence, KAIST,
More informationLecture 4: Universal Hash Functions/Streaming Cont d
CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected
More informationarxiv:cs.cv/ Jun 2000
Correlaton over Decomposed Sgnals: A Non-Lnear Approach to Fast and Effectve Sequences Comparson Lucano da Fontoura Costa arxv:cs.cv/0006040 28 Jun 2000 Cybernetc Vson Research Group IFSC Unversty of São
More informationSection 8.3 Polar Form of Complex Numbers
80 Chapter 8 Secton 8 Polar Form of Complex Numbers From prevous classes, you may have encountered magnary numbers the square roots of negatve numbers and, more generally, complex numbers whch are the
More informationChapter 8 Indicator Variables
Chapter 8 Indcator Varables In general, e explanatory varables n any regresson analyss are assumed to be quanttatve n nature. For example, e varables lke temperature, dstance, age etc. are quanttatve n
More informationKernel Methods and SVMs Extension
Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general
More informationProbability Theory (revisited)
Probablty Theory (revsted) Summary Probablty v.s. plausblty Random varables Smulaton of Random Experments Challenge The alarm of a shop rang. Soon afterwards, a man was seen runnng n the street, persecuted
More informationIII. Econometric Methodology Regression Analysis
Page Econ07 Appled Econometrcs Topc : An Overvew of Regresson Analyss (Studenmund, Chapter ) I. The Nature and Scope of Econometrcs. Lot s of defntons of econometrcs. Nobel Prze Commttee Paul Samuelson,
More information8 Derivation of Network Rate Equations from Single- Cell Conductance Equations
Physcs 178/278 - Davd Klenfeld - Wnter 2019 8 Dervaton of Network Rate Equatons from Sngle- Cell Conductance Equatons Our goal to derve the form of the abstract quanttes n rate equatons, such as synaptc
More informationBOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS
BOUNDEDNESS OF THE IESZ TANSFOM WITH MATIX A WEIGHTS Introducton Let L = L ( n, be the functon space wth norm (ˆ f L = f(x C dx d < For a d d matrx valued functon W : wth W (x postve sem-defnte for all
More informationPsychology 282 Lecture #24 Outline Regression Diagnostics: Outliers
Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.
More informationTime-Varying Systems and Computations Lecture 6
Tme-Varyng Systems and Computatons Lecture 6 Klaus Depold 14. Januar 2014 The Kalman Flter The Kalman estmaton flter attempts to estmate the actual state of an unknown dscrete dynamcal system, gven nosy
More informationAppendix for Causal Interaction in Factorial Experiments: Application to Conjoint Analysis
A Appendx for Causal Interacton n Factoral Experments: Applcaton to Conjont Analyss Mathematcal Appendx: Proofs of Theorems A. Lemmas Below, we descrbe all the lemmas, whch are used to prove the man theorems
More informationAnalysis of Queuing Delay in Multimedia Gateway Call Routing
Analyss of Queung Delay n Multmeda ateway Call Routng Qwe Huang UTtarcom Inc, 33 Wood Ave. outh Iseln, NJ 08830, U..A Errol Lloyd Computer Informaton cences Department, Unv. of Delaware, Newark, DE 976,
More informationStat 642, Lecture notes for 01/27/ d i = 1 t. n i t nj. n j
Stat 642, Lecture notes for 01/27/05 18 Rate Standardzaton Contnued: Note that f T n t where T s the cumulatve follow-up tme and n s the number of subjects at rsk at the mdpont or nterval, and d s the
More informationInductance Calculation for Conductors of Arbitrary Shape
CRYO/02/028 Aprl 5, 2002 Inductance Calculaton for Conductors of Arbtrary Shape L. Bottura Dstrbuton: Internal Summary In ths note we descrbe a method for the numercal calculaton of nductances among conductors
More informationSTATISTICAL MECHANICAL ENSEMBLES 1 MICROSCOPIC AND MACROSCOPIC VARIABLES PHASE SPACE ENSEMBLES. CHE 524 A. Panagiotopoulos 1
CHE 54 A. Panagotopoulos STATSTCAL MECHACAL ESEMBLES MCROSCOPC AD MACROSCOPC ARABLES The central queston n Statstcal Mechancs can be phrased as follows: f partcles (atoms, molecules, electrons, nucle,
More informationDETERMINATION OF TEMPERATURE DISTRIBUTION FOR ANNULAR FINS WITH TEMPERATURE DEPENDENT THERMAL CONDUCTIVITY BY HPM
Ganj, Z. Z., et al.: Determnaton of Temperature Dstrbuton for S111 DETERMINATION OF TEMPERATURE DISTRIBUTION FOR ANNULAR FINS WITH TEMPERATURE DEPENDENT THERMAL CONDUCTIVITY BY HPM by Davood Domr GANJI
More informationStability and Convergence of TCP-like Congestion Controllers in a Many-Flows Regime
Stablty and Convergence of TCP-lke Congeston Controllers n a Many-Flows Regme Supratm Deb Coordnated Scence Lab Unversty of Illnos Urbana Illnos USA Emal: deb@uuc.edu Sanjay Shakkotta Department of Electrcal
More informationManaging Capacity Through Reward Programs. on-line companion page. Byung-Do Kim Seoul National University College of Business Administration
Managng Caacty Through eward Programs on-lne comanon age Byung-Do Km Seoul Natonal Unversty College of Busness Admnstraton Mengze Sh Unversty of Toronto otman School of Management Toronto ON M5S E6 Canada
More informationBallot Paths Avoiding Depth Zero Patterns
Ballot Paths Avodng Depth Zero Patterns Henrch Nederhausen and Shaun Sullvan Florda Atlantc Unversty, Boca Raton, Florda nederha@fauedu, ssull21@fauedu 1 Introducton In a paper by Sapounaks, Tasoulas,
More informationStanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011
Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected
More informationSupporting Information
Supportng Informaton The neural network f n Eq. 1 s gven by: f x l = ReLU W atom x l + b atom, 2 where ReLU s the element-wse rectfed lnear unt, 21.e., ReLUx = max0, x, W atom R d d s the weght matrx to
More informationBayesian predictive Configural Frequency Analysis
Psychologcal Test and Assessment Modelng, Volume 54, 2012 (3), 285-292 Bayesan predctve Confgural Frequency Analyss Eduardo Gutérrez-Peña 1 Abstract Confgural Frequency Analyss s a method for cell-wse
More informationCOEFFICIENT DIAGRAM: A NOVEL TOOL IN POLYNOMIAL CONTROLLER DESIGN
Int. J. Chem. Sc.: (4), 04, 645654 ISSN 097768X www.sadgurupublcatons.com COEFFICIENT DIAGRAM: A NOVEL TOOL IN POLYNOMIAL CONTROLLER DESIGN R. GOVINDARASU a, R. PARTHIBAN a and P. K. BHABA b* a Department
More informationComputing Correlated Equilibria in Multi-Player Games
Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,
More informationOn the correction of the h-index for career length
1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat
More informationUncertainty in measurements of power and energy on power networks
Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:
More informationUsing the estimated penetrances to determine the range of the underlying genetic model in casecontrol
Georgetown Unversty From the SelectedWorks of Mark J Meyer 8 Usng the estmated penetrances to determne the range of the underlyng genetc model n casecontrol desgn Mark J Meyer Neal Jeffres Gang Zheng Avalable
More informationNotes prepared by Prof Mrs) M.J. Gholba Class M.Sc Part(I) Information Technology
Inverse transformatons Generaton of random observatons from gven dstrbutons Assume that random numbers,,, are readly avalable, where each tself s a random varable whch s unformly dstrbuted over the range(,).
More informationUNR Joint Economics Working Paper Series Working Paper No Further Analysis of the Zipf Law: Does the Rank-Size Rule Really Exist?
UNR Jont Economcs Workng Paper Seres Workng Paper No. 08-005 Further Analyss of the Zpf Law: Does the Rank-Sze Rule Really Exst? Fungsa Nota and Shunfeng Song Department of Economcs /030 Unversty of Nevada,
More informationLecture 6: Introduction to Linear Regression
Lecture 6: Introducton to Lnear Regresson An Manchakul amancha@jhsph.edu 24 Aprl 27 Lnear regresson: man dea Lnear regresson can be used to study an outcome as a lnear functon of a predctor Example: 6
More informationStructure and Drive Paul A. Jensen Copyright July 20, 2003
Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.
More informationCOMPOSITE BEAM WITH WEAK SHEAR CONNECTION SUBJECTED TO THERMAL LOAD
COMPOSITE BEAM WITH WEAK SHEAR CONNECTION SUBJECTED TO THERMAL LOAD Ákos Jósef Lengyel, István Ecsed Assstant Lecturer, Professor of Mechancs, Insttute of Appled Mechancs, Unversty of Mskolc, Mskolc-Egyetemváros,
More informationThe optimal delay of the second test is therefore approximately 210 hours earlier than =2.
THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple
More informationLecture Note 3. Eshelby s Inclusion II
ME340B Elastcty of Mcroscopc Structures Stanford Unversty Wnter 004 Lecture Note 3. Eshelby s Incluson II Chrs Wenberger and We Ca c All rghts reserved January 6, 004 Contents 1 Incluson energy n an nfnte
More informationSUPPLEMENTARY INFORMATION
do: 0.08/nature09 I. Resonant absorpton of XUV pulses n Kr + usng the reduced densty matrx approach The quantum beats nvestgated n ths paper are the result of nterference between two exctaton paths of
More informationLeast squares cubic splines without B-splines S.K. Lucas
Least squares cubc splnes wthout B-splnes S.K. Lucas School of Mathematcs and Statstcs, Unversty of South Australa, Mawson Lakes SA 595 e-mal: stephen.lucas@unsa.edu.au Submtted to the Gazette of the Australan
More informationCONJUGACY IN THOMPSON S GROUP F. 1. Introduction
CONJUGACY IN THOMPSON S GROUP F NICK GILL AND IAN SHORT Abstract. We complete the program begun by Brn and Squer of charactersng conjugacy n Thompson s group F usng the standard acton of F as a group of
More information