Auction-Based Spectrum Sharing

Size: px
Start display at page:

Download "Auction-Based Spectrum Sharing"

Transcription

1 Aucton-Based Spectrum Sharng Janwe Huang, Randall Berry and Mchael L. Hong Department of Electrcal and Computer Engneerng Northwestern Unversty, Evanston IL 60208, USA Abstract. We study aucton-based mechansms for sharng spectrum among a group of users, subject to a constrant on the nterference temperature at collocated recevers. The users access the channel usng spread spectrum sgnalng and thus generate nterference wth each other. Each user receves a utlty that s a functon of the receved sgnal-tonterference plus nose rato. We propose two aucton mechansms for allocatng the receved power. The frst s an SINR-based aucton, whch, when combned wth logarthmc utltes, leads to a weghted max-mn far SINR allocaton. The second s a power-based aucton that maxmzes the total utlty when the bandwdth s large enough. Both aucton mechansms acheve socal optmalty n a large system lmt where bandwdth, power and the number of users are ncreased n a fxed proporton. We also gve suffcent condtons for global convergence of a dstrbuted updatng algorthm and dscuss the convergence speed. 1 Introducton There has been growng nterest n makng more effcent use of spectrum by shftng from the conventonal command-and-control spectrum usage models to more flexble Exclusve Use and Commons models (e.g., see [1]). In the Exclusve Use model, the lcensee has exclusve rghts to the spectrum, but can allow other users access as long as they keep the nterference temperature under some threshold. Here the nterference temperature s defned as the RF power avalable at the recevng antenna per unt bandwdth. In the Commons model, an unlmted number of users can share spectrum wth usage rghts governed by techncal standards, but wth no explct protecton from nterference. In ether model, a basc queston s how to share the avalable spectrum effcently and farly. In ths paper we focus on a spectrum allocaton problem for the Exclusve Use model. A group of spread spectrum users transmttng to collocated recevers want to share a fxed bandwdth. A manager (owner or regulator) must allocate the spectrum subject to a constrant on the nterference temperature at the recevers. We model ths as a constrant on the total receved power. The manager can then be vewed as allocatng the receved power to the users. Each user has a utlty, whch s a functon of the receved Sgnal-to-Interference plus Nose Rato (SINR), reflectng hs desred Qualty of Servce (QoS). The nterference a user receves s the total receved power of all other users scaled by the bandwdth. We consder aucton mechansms to allocate the receved power as a functon of bds the users submt. We model the resultng problem as a noncooperatve game [2], and characterze the Nash equlbra and related propertes for two dfferent aucton mechansms. Our approach s smlar to a share aucton (see [3 7] and the references theren), or dvsble aucton, where a perfectly dvsble good s splt among bdders whose payments depend solely on the bds. A common form of bds n a share aucton s for each user to submt hs demand curve (e.g., [3 5]),.e., the amount of goods a user desres as a functon of the prce. The auctoneer can then compute a market clearng prce based on the set of demand curves. However, n our problem, a user s utlty depends on hs SINR level, whch n turn depends on the power assgned to other users, makng the users demand curves dependent on each other. Instead, we adopt a sgnalng system smlar to [6, 7], where users submt one dmensonal bds for the resource. We assume a weghted proportonal allocaton rule n whch a user s power allocaton s proportonal to hs bd. Ths type of allocaton rule has been studed n a wde range of applcatons (e.g., see [8, 9]), ncludng network resource allocaton (e.g., [6, 7]). Gven ths allocaton, the users partcpate n a game wth the objectve of maxmzng ther own beneft. It s well known that the Nash Equlbrum (NE) of Ths work was supported by the Northwestern-Motorola Center for Communcatons, and by NSF CAREER award CCR

2 a game typcally does not maxmze the total system utlty [10]. Ths has been referred to as the prce of anarchy (e.g., [6]). In order to acheve a more desrable system operatng pont, we allow the manager to announce a unt prce (e.g., [11, 12]) ether for receved SINR or receved power. SINR prcng wth logarthmc utltes leads to a weghted max-mn far SINR allocaton. Power prcng maxmzes the total utlty for a large enough bandwdth. Both prcng schemes maxmze the total utlty n a large enough system f the total power and bandwdth are ncreased n fxed proporton to the number of users. Related work on uplnk power control for CDMA has appeared n [12 15]. A key dfference here s that there s a constrant on the total receved power at all tmes 1. Because of ths, a user s nterference depends on hs own power allocaton, whch can make the problem non-convex. Ths also allows us to vew the receved power as a dvsble good, whch leads naturally to the precedng share aucton mechansms. We assume the user populaton s statonary,.e., the users and ther correspondng utltes stay unchanged durng the tme perod of nterest. On a larger tme-scale one can vew tme dvded nto perods, durng whch the number of users and each user s utlty are fxed and the proposed aucton algorthm s used. When a new perod begns, users may jon or leave the system. Also remanng users may update ther utlty functons to reflect changes n ther QoS requrements. For example, a user wth data that must be delvered by a deadlne mght ncrease hs utlty (as a functon of SINR) as the deadlne approaches. Here we do not consder the assocated mechansms and the dynamcs of the auctons over multple perods. The remander of the paper s organzed as follows. After ntroducng the aucton mechansms n Sect. 2, we analyze the performance for a fnte system and for a lmtng large system n Sect. 3 and 4, respectvely. In Sect. 5 we gve suffcent condtons for global convergence of a myopc bd updatng algorthm and analyze the convergence speed. Numercal results are gven n Sect. 6 and conclusons n Sect. 7. Several of the man proofs are gven n the Appendx. 2 Aucton Mechansms A spectrum wth bandwdth B s to be shared among M spread spectrum users. User s valuaton of the spectrum s characterzed by a utlty functon U (θ, γ ), where γ s the user s receved SINR and θ s a user-dependent parameter. As a partcular example, we consder the logarthmc utlty U (θ, γ ) = θ ln (γ ). To smplfy the notaton, we let U (θ, γ ) = U (θ, γ ) / γ and U (θ, γ ) = 2 U (θ, γ ) / γ 2, and at tmes we omt the user ndex. Each user s utlty satsfes the followng assumpton: Assumpton 1. U (θ, γ ) s ncreasng, strctly concave and twce contnuously dfferentable n γ. For each, the SINR s gven by γ = γ (p ) = p n 0 + p /B, where n 0 s the background nose power densty, p s user s receved power allocaton, and p = M j p j. The total power allocaton must satsfy: p = p + p P. (1) Notce that the precedng constrant s on the total receved power at the collocated recevers, thus the lnk attenuatons need not be consdered n the model. However, once allocated the receved power, the users must adjust ther transmsson power to compensate for the lnk attenuaton between the transmtter and the recever. A power allocaton s Pareto optmal f no user s utlty can be ncreased wthout decreasng another user s utlty. Proposton 1. Assume for each, U (θ, γ ) s strctly ncreasng n γ. A power allocaton scheme s Pareto optmal f and only f the total power constrant s tght,.e., M p = P. Ths follows because f the power constrant s not tght, then each user can ncrease ther power by P/ M p, whch ncreases the SINR for every user. 1 We assume that any transmsson power constrant for each user s large enough so that t can be gnored.

3 Assume the manager s nterested n a socally optmal allocaton, where the total utlty over all users s maxmzed. Note that socal optmalty mples Pareto optmalty, but the reverse s not true. Thus, the manager should always allocate the receved power up to the constrant. A socally optmal soluton can be vewed as one type of far allocaton. The manager may also consder other farness objectves such as a max-mn far allocaton. We consder the followng aucton mechansms, whch operates n dscrete tme-slots n = 1, 2,... Aucton Algorthm. 1. Intalzaton (durng tme slot 0): (a) The manager announces a constant reserve bd β 0 and a postve unt prce π s (n a SINR-based aucton) or π p (n a power-based aucton). (b) User {1,..., M} submts an ntal bd b (0) Iteraton (durng tme slot n 1): (a) After observng bds b (n 1) n a SINR γ (n) wth where b (n) = β + M j b(n) j, for = 1,..., M, the manager allocates each user power p (n), resultng p (n) =. If b (n) b (n) b (n) + b (n) + b (n) P, and γ (n) = = 0, then p(n) = 0. p (n) n 0 + P p(n) B. (2) (b) In an SINR-based (power-based) aucton, user pays C = π s γ (n) (C ( = π p p (n) ). ) (c) Each user submts a bd b (n) 0 to maxmze hs surplus functon S b (n) ; b (n 1) = U (θ, γ ) C. The aucton process stops when the bds do not change n two consecutve tme slots. Ths means the system reaches a Nash Equlbrum (NE), whch s defned as a set of bds {b } 1 M such that S (b ; b ) S (ˆb ; b ) for any ˆb and any. Defne user s best response bd as the b that maxmzes S (b ; b ), assumng b s fxed. At the NE every user submts hs best response bd,.e., no one has the ncentve to devate unlaterally. The exstence and unqueness of a NE depends on the choce of β and π. If the system does not converge for gven values of β and π, the manager should change these values and restart the aucton process. We show later that the only requrement on β s that t s postve, whle the condton on π s more complex. Our aucton mechansms dffer from prevous aucton-based network resource allocaton schemes (e.g., [6, 7]) n that the bds here are not the same as the payments. Instead, the bds are sgnals of wllngness to pay, and the manager can reach the desred NE by settng the rght β and π. Ths allevates the typcal neffcency of the NE, and allows us to reach Pareto optmal or even socally optmal solutons. 3 Fnte System Analyss 3.1 SINR-based Aucton ( ) In ths case C (γ ) = π s γ = π s p / n 0 + P p B, so that each user s payment depends on the receved power, as well as the nterference he receves. Defne k = θ (P + Bn 0 ) B (π s P θ n 0 ). (3) Theorem 1. In an SINR-based aucton wth logarthmc utlty, 1. For β > 0, a unque Nash Equlbrum exsts f k > 0 for all and M Equlbrum exsts. 2. For β = 0, an nfnte number of Nash Equlbra exst f k > 0 for all and M no Nash Equlbrum exsts. k 1+k < 1, otherwse no Nash k 1+k = 1, otherwse The proof s gven n the appendx; as shown there, user s best response bd s b = k b. The bddng and power profles at the NE are: b = k 1+k 1 β and p M k l = k P for 1 M. (4) 1 + k l=1 1+k l

4 In order to have a unque Nash Equlbrum, the manager has to announce a postve reserve bd (β > 0). Otherwse, there ether exsts no NE or an nfnte number of NEs. However, snce the users bds at the NE are proportonal to β, the power allocaton p s ndependent of β. Thus, the manager only needs to announce an arbtrary postve constant at the ntal stage of the aucton. To have k > 0 requres π s > θ n 0 /P. Also, π s should be set hgh enough so that M k 1+k < 1. Note that such π s can always be found, because k 0 as π s. It may seem from Theorem 1 that the manager needs to know the utlty parameters {θ } 1 M n order to set the rght prce. However, ths requrement may be nether practcal nor necessary. It s not practcal when the utlty functons are prvate nformaton of the users. It s not necessary because the manager can adaptvely fnd the rght prce by observng the users bddng behavors: f π s n θ 0 P for any or M k 1+k 1, at least one user s bd wll quckly ncrease towards nfnty, ndcatng that the prce needs to be ncreased. An allocaton {x } 1 M s weghted max-mn far wth weghts {w } 1 M f no x can be ncreased wthout decreasng some x j such that x j /w j x /w. The SINR allocaton at the NE s γ = p n 0 + (P p )/B = θ π s, (5) and user pays C (γ ) = πs γ = θ. It follows that both the SINR allocaton and payments are weghted max-mn far wth the weghts {θ } 1 M. In [16], Kelly et al. showed that logarthmc utlty functons lead to a weghted proportonal far rate allocaton n a network rate control problem. Ther problem s convex and uncoupled across users snce there s no externalty effect (.e. nterference) among dfferent users. Here, due to the nterference among users, the problem may not be convex and the relaton between the utlty and the constraned resource (receved power) s qute dfferent from [16]. Indeed, n ths case, a socally optmal soluton s typcally not proportonal far. Nevertheless, we acheve a weghted max-mn far allocaton. The nformaton exchange durng the aucton s mnmal,.e., each user submts a bd to the manager and observes only hs own power allocaton. There s no need for the user to know the bds or power allocatons of any other users; the only nformaton a user needs to update hs bd s the summaton of all the other bds, whch can be easly calculated from hs own power allocaton and bd. Also, snce the power/sinr allocaton at the NE only depends on a user s local varable and global system varables, t s easy for the user to check that he receves the correct allocaton, whch may prevent the manager from cheatng. We call a system stable f there exsts a unque NE. In a stable system, defne the system usage effcency as η = M p P = k 1 + k. (6) For Pareto optmalty, η = 1, but the necessary condton for stablty s η < 1. Thus Pareto optmalty and stablty are conflctng objectves. We defne an ε-system as one wth parameters (P ε, B ε, M ε, n ε 0) = (P (1 ε), B, M, n 0 + εp/b), where ε (0, 1). An ε-pareto optmal allocaton s defned as a Pareto optmal soluton for the ε-system. Proposton 2. In an SINR-based aucton wth logarthmc utlty, for any ε (0, 1), there exsts a unque prce π sε, such that the system s stable and acheves an ε-pareto optmal soluton (.e., η = 1 ε n the orgnal system). Proof. From (3), t can be seen that as π s ncreases from max {θ n 0 /P } to, η = M k 1+k contnuously and monotoncally decreases from υ > 1 to 0. Thus, there must exsts a unque prce π sε (max {θ n 0 /P }, ) that acheves any η = 1 ε (0, 1). In practce, the manager can acheve a target η by adjustng π s after observng the usage effcency at the current NE: f t s too low, the prce should be decreased. Note f the prce s decreased too much, the stablty condtons n Theorem 1 may be volated. Next we consder the revenue collected by the manager. Compared wth lnear power-based prcng, where the payment for user s α p, and α s a user-dependent constant, we have the followng result: Proposton 3. As M, the revenue collected n the SINR-based aucton wth logarthmc utlty, M θ, s the maxmum revenue acheved by any power-based, user-dependent prcng scheme.

5 The proof s gven n the appendx. When there are enough users n the system, each user does not expect to affect the receved nterference by changng hs own power. Thus each user maxmzes hs surplus functon assumng that the receved nterference s fxed. In ths large populaton scenaro, the SINR-based aucton collects as much revenue as any other lnear power-based prcng scheme. 3.2 Power-based Aucton In ths case C (p ) = π p p. For users wth logarthmc utlty functons, Theorem 1 stll holds wth a more complcated expresson for k. The bddng and power profles at the NE are agan gven by (4). For a more general class of utlty functons, we show that n certan cases the power-based aucton can acheve an ε-socally optmal allocaton, whch maxmzes the total utlty of the ε-system. Theorem 2. Assume for each {1,..., M}, U (θ, γ ) satsfes Assumpton 1 and U (θ, γ ) U (θ, γ ) (γ + B) > 2, (7) for any γ [0, P/n 0 ]. Then there exsts a prce π pε such that the system s stable and the NE acheves ε-socal optmalty for any ε (0, 1). Condton (7) guarantees that U (θ, γ (p )) s concave n p, where γ (p ) s gven n (2). Ths condton wll be satsfed f the bandwdth s large enough for many utlty functons, some of whch are shown n Table 1. Table 1. Condton (7) for varous utlty functons U (θ, γ) (7) s true for any γ [0, P/n 0] f θ ln (γ) B > P/n 0 θ ln (1 + γ) B > P/n ( ) θγ α 2 (α (0, 1)) B > 1 P/n 1 α 0 1 e θγ B > 2/θ 4 Large System Analyss In ths secton we consder the asymptotc behavor as P, B, M and β go to nfnty, whle keepng P/M, P/B, M/B and β/m fxed. We assume that each user s utlty parameter θ s ndependently chosen accordng to a contnuous probablty densty f (θ) over [ θ, θ ], where 0 θ < θ <. The expected value of θ s E [θ]. Proposton 4. For the SINR-based aucton wth logarthmc utlty, a unque NE exsts n the lmtng system f and only f π s > E [θ] (n 0 + P/B) M P. (8) In ths case, the power and SINR allocatons at the NE are weghted max-mn far wth weghts {θ } 1 M, and user pays θ. Otherwse, no NE exsts. The proof s gven n the Appendx. The system usage effcency at the NE s η = E[θ](n0+P/B) π s P/M. As η 1, the prce π s converges to the rght-hand sde of (8), whch s proportonal to the system load M/P. Ths concdes wth the congeston prcng scheme proposed n [15], where the equlbrum prce reflects the congeston degree of the system. At the NE of the lmtng system, all users receve the same fxed nose plus nterference level (n 0 + P/B). Ths s because each user only gets a neglgble proporton of the total power. Ths makes the SINR-based and power-based auctons equvalent f π s = (n 0 + P/B) π p. In the lmtng system, we defne the socally optmal soluton to be the allocaton that maxmzes the average utlty per user, nstead of the users total utlty, whch s nfnte n ths case.

6 Assumpton 2. The utlty functon U (θ, γ) s asymptotcally sublnear wth respect to γ,.e., lm γ 1 U (θ, γ) = 0. γ Theorem 3. In the lmtng system, f U (θ, γ) satsfes Assumpton 1 and 2, then both the SINR- and power-based auctons can acheve ε-socal optmalty for any ε (0, 1). A sketch of the proof s gven n the appendx. Assumpton 2 s vald for common utlty functons, e.g. θ ln (γ), θ ln (1 + γ), θγ α (α (0, 1)), and any upper-bounded utlty. Under ths assumpton, even f a fnte number of users are allocated non-neglgble proportons of the total power, ther contrbutons to the average utlty becomes neglgble as the number of users ncreases. Because of ths, at the socally optmal soluton every user s allocated a fnte amount of power, and so faces the same nterference level (n 0 + P/B). 5 Myopc Bd Updatng Algorthm In ths secton, we consder how users update ther bds to reach the NE. We use the SINR-based aucton wth logarthmc utltes as an example. User can calculate the sum of other bds gven only P and hs P p own power p, by b = b p. We assume that each user updates the bd usng a myopc algorthm,.e., he submts the best response bd assumng all the other bds are fxed: b (n+1) Ths s smlar to the PUA algorthm used n [17]. = k b (n) (9) Proposton 5. In an SINR-based aucton wth logarthmc utltes, the myopc bd updatng algorthm n (9) globally and geometrcally converges to the unque NE n a stable system f max 1 M k < 1 M 1 or M k < 1. Furthermore, f all users start bddng from zero (the orgn), the bds monotoncally converge to the unque NE. The condtons n Proposton 5 wll be satsfed f the manager announces a hgh enough unt prce. Meanwhle, the prce should be set low enough to acheve a target η. Thus the manager needs to adaptvely search for the rght prce. In our smulatons, we use the followng search method: 1. Intalzaton: Set (π, π) = (0, ), and choose an arbtrary ntal prce π (0) > 0. Also, set a maxmum teraton tme T. 2. For n = 1, 2,..., (a) If the aucton does not converge wthn T teratons, then stop the process. Let π = π (n 1). Moreover, π (n) = 2π (n 1) f π =, otherwse π (n) = (π + π) /2. Restart the aucton. (b) If the aucton converges wthn T teratons at a system effcency η < η, then let π = π (n 1) and π (n) = (π + π) /2. Restart the aucton. (c) If the aucton converges wthn T teratons wth η η, then the search process termnates. Unlke the example n [17], here the sequence of the users bds does not oscllate f users start from the orgn. Ths s because the users best response bds satsfy strategc complementartes roughly, ths means when one user submts a hgher bd, the others want to do the same. Thus f all users start from the lowest bds (the orgnal), the bds monotoncally converge to the unque NE n a stable system. In ths case, takng smaller updatng steps or updatng randomly wth some probablty less than 1 (e.g., the RUA and GUA algorthms n [17]) wll not help convergence. Although we only consder SINR-based auctons wth logarthmc utltes, the myopc bd updatng algorthm also works for the power-based aucton wth logarthmc utltes, as well as some other utlty functons such as U (θ, γ) = θ log (1 + γ). However, we note that n some cases, a target η may not be achevable, due to the non-convexty of the problem.

7 6 Numercal Results In all smulatons shown here, the {θ } 1 M are ndependently and unformly dstrbuted n [1, 100]. Each graph represents one realzaton of the parameters; smlar observatons were obtaned for other realzatons and dfferent dstrbutons of the parameters. Fg. 1 shows a comparson of average utlty per user for the two auctons as well as an upper bound on the socally optmal soluton wth logarthmc utltes. In both auctons, we set the prces so that η s close to 1. From Theorem 2, the power-based aucton acheves socal optmalty for P/ (Bn 0 ) < 0 db. Fg. 1(a) shows that ths s also true for the SINR-based aucton. For P/ (Bn 0 ) > 0 db, the utlty s not concave wth power; n that case, we use a dual formulaton to upper bound the average utlty per user. Note that the two auctons stll acheve a utlty close to the maxmum n ths regme. In Fg. 1(b), we scale the system as n Sect. 4, and choose P/ (Bn 0 ) = 20dB so that the utlty s not concave n power. When M 14, the auctons do not acheve the upper bound on the maxmum average utlty. For large M, the utltes assocated wth both auctons and the socally optmal soluton converge to a constant. For ths example, the asymptotc behavor s accurate wth M 14. Fg. 2 shows the performance of the myopc bd updatng algorthm for users wth logarthmc utlty functons. In Fg. 2(a), users start bddng from the orgn and the bds monotoncally converge to the unque NE. In Fg. 2(b), the performance of the updatng algorthm as the system s scaled s shown. The target system usage effcency η s chosen to be 0.90, 0.95 and 0.98 respectvely. We can see that the number of teratons needed for convergence ncreases wth M and approaches a constant when M s large (.e., M > 20). Ths shows that the algorthm scales well wth the system sze. The fgure also shows that the number of teratons needed for convergence ncreases wth η, mplyng that fast convergence and hgh system usage effcency are generally conflctng objectves Average Utlty Per User: U tot /M SINR based Aucton Power based Aucton Socal Optmal (upperbound) Average Utlty Per User: U tot /M SINR based Aucton Power based Aucton Total Utlty Maxmzaton (upperbound) Power/Background Nose: P/Bn 0 (db) (a) Number of users: M (b) Fgure 1. Average utlty for the two auctons and the maxmum achevable utlty for the logarthmc utlty functon: (a) fnte system wth (P, M, n 0) = ( 10 2, 10, 1 ) for dfferent B; (b) system wth (P, B, n 0) = ( 10 4 M, 10 2 M, 1 ) for dfferent M. 7 Concluson We presented two aucton mechansms (SINR-based and power-based) for sharng spectrum among a group of users subject to a constrant on the nterference temperature at collocated recevers. When combned wth logarthmc utltes, the SINR-based aucton leads to a weghted max-mn far SINR allocaton. The power-based aucton maxmzes the total utlty for a large enough bandwdth. Both aucton mechansms are shown to acheve socal optmalty n a large system lmt where bandwdth and power are ncreased n fxed proporton. We also gave suffcent condtons for global convergence of a myopc bd updatng algorthm, and dscussed the convergence speed both analytcally and numercally. Ths work s prelmnary n that we only consder the nterference temperature at a sngle pont and assume that all recevers are collocated. Relaxng these assumptons s a possble drecton for future

8 Users Bds Number of teratons η * = 0.90 η * = 0.95 η * = Number of Iteratons (a) Number of users M (b) Fgure 2. Performance of the myopc bd updatng algorthm wth logarthmc utlty functons: (a) bds for each user over tme for a fnte system wth (P, B, M, n 0, β) = ( 10 2, 10 3, 10, 1, 1 ) and η = 0.95; (b) Number of teratons requred for a system wth (P, B, n 0) = ( 10 4 M, 10 2 M, 1 ) for dfferent values of M and target η. research. We are also consderng a Commons spectrum usage model, where there s no nterference temperature constrant and each user s constraned only through a techncal standard (e.g., whch mposes a constrant on transmsson power). The problem then s how to avod the tragedy of commons. Another extenson s to consder a dynamc envronment, where the number of actve users vares wth tme. References 1. Spectrum polcy task force report. Federal Communcatons Commsson, US (2002) 2. Mas-Colell, A., Whnston, M., Green, J.: Mcroeconomc Theory. Oxford Unversty Press (1995) 3. Sunnevag, K.J.: Aucton desgn for the allocaton of emsson permts. workng paper (2001) 4. Wang, J.J.D., Zender, J.F.: Auctonng dvsble goods. Economc Theory (2002) Back, K., Zender, J.F.: Auctons of dvsble goods: On the ratonale for the treasury experment. Revew of Fnancal Studes 6 (1993) Johar, R., Tstskls, J.N.: Network resource allocaton and a congeston game. to appear n Mathematcs of Operatons Research (2003) 7. Maheswaran, R., Basar, T.: Nash equlbrum and decentralzed negotaton n auctonng dvsble resources. Group Decson and Negotaton, to appear (2003) 8. Tjdeman, R.: The charman assgnment problem. Dscrete Mathematcs 32 (1980) Waldspurger, C.A., Wehl, W.E.: Strde schedulng: Determnstc proportonal share resource management. Techcal Memorandum MIT/LCS/TM-528, Laboratory for CS, MIT (1995) 10. Dubey, P.: Ineffcency of Nash equlbra. Mathematcs of Operatons Research 11 (1986) D. Famolar, N. B. Mandayam, D.G., Shah, V. In: A New Framework for Power Control n Wreless Data Networks: Games, Utlty and Prcng. Kluwer Academc Publshers (1999) Saraydar, C., Mandayam, N.B., Goodman, D.J.: Effcent power control va prcng n wreless data networks. IEEE Trans. on Communcatons 50 (2002) Alpcan, T., Basar, T., Srkant, R., Altman, E.: CDMA uplnk power control as a noncooperatve game. Wreless Networks 8 (2002) Shroff, N., Xao, M., Chong, E.: Utlty based power control n cellular rado systems. In: Proceedng Inforcom 2001, Anchorage, USA (2001) 15. Hekknen, T.M.: On congeston prcng n a wreless network. Wreless Network 8 (2002) Kelly, F.P., Maulloo, A., Tan, D.: Rate control for communcaton networks: Shadow prces, proportonal farness and stablty. Journal of Operatons Research Socety 49 (1998) Alpcan, T., Basar, T.: Dstrbuted algorthms for nash equlbra of flow control games. Annals of Dynamc Games 7 (2003) to appear. Appendx Proof of Theorem 1 Proof. Frst assume β > 0, thus b = β + M j b j > 0. Usng (2), user s surplus functon can be wrtten as: ( ) b P S (b ; b ) = θ log π s b P. (10) P P (b + b ) n 0 + b B (b + b ) n 0 + b B

9 Notce that b = 0 cannot be the best response bd, snce t leads to a surplus of regardless of b. Dfferentatng (10) wth respect to b yelds S (b ; b ) b = (θ (Bn 0 + P ) b + B (θ n 0 π s P ) b ) (Bn 0 + P ) b b ((Bn 0 + P ) b + Bn 0 b ) 2. (11) Snce b > 0 and b > 0, the sgn of (11) only depends on the sgn of the expresson θ (Bn 0 + P ) b + B (θ n 0 π s P ) b, (12) whch s monotonc n b. Settng (12) equal to 0 and solvng for b yelds b = k b, (13) where k s gven n (3). For k > 0, t can be shown that (13) s the global maxmum of (10), and so s user s best response bd. Alternatvely, f k < 0, then user s best response bd s b =, and there s no NE for the system. If the system has an NE {b } 1 M, t must satsfy the followng set of lnear equatons: b = k b = k b j + β b, and b > 0 for 1 M. (14) j=1 Solvng ths usng (2), we get the unque soluton gven n (4) f and only f M k 1+k < 1. Otherwse, these equatons have no soluton, and so no NE can exst. If β = 0, then (14) can be smplfed as ( ) ( M ) k 1 b = 0, and b = k b > 0 for 1 M. (15) 1 + k 1 + k There are an nfnte number of solutons to (15) f and only f k > 0 for all and M agan, f ths s not the case, then there are no solutons to (15) and so no NE exsts. Proof of Proposton 3 k 1+k = 1. Once Proof. User s surplus functon under a power-based, user-dependent prcng scheme s: ( ) p S (p ) = θ log α n 0 + p p. (16) B As M, each user wll maxmze hs surplus assumng p s fxed, yeldng { θ p = arg max S (p ) = α, α θ P. (17) p [0,P ] P, α < θ P The revenue collected by the manager s then Proof of Proposton 4 α p θ α = α θ. (18) Proof. We obtan (8) by takng the lmt of the condtons n Theorem (1), under the assumed scalng. Let Lm denote lm P,B,M wth P/B, P/M, β/m fxed. Thus, Lm k 1 + k = Lm θ (P/B + n 0 ) P (π s + θ /B) = 1 M M Lm Mθ (P/B + n 0 ) P π s = P/B + n 0 E [θ]. (19) P/Mπ s The frst equalty s from the defnton of k n (3). The second equalty s due to the fact that B. The thrd equalty s because of the weak law of large numbers. Condton (8) then follows drectly. The weghted max-mn far SINR allocaton and payments stay unchanged durng the lmtng process. Snce every user faces the same nose plus nterference n 0 + P/B at the NE, then p = γ (n 0 + P/B) for all. Ths leads to a weghted max-mn far power allocaton at the NE.

10 Proof of Theorem 3 Proof. Due to space consderatons we only gve a sketch of the complete proof. In the lmtng system, the maxmum average utlty per user s the soluton to: [ ( )] Max E p (θ) θ U θ, (20) p(θ) 0 n 0 + (P p (θ)) /B subject to: E θ [p (θ)] = P M The objectve s the average utlty per user n the lmtng system and the constrant corresponds to the total receved power constrant. In both cases we have used the law of large numbers to express these n terms of expectatons over θ. The optmzaton s over all power allocatons, p (θ), whch can be vewed as functons from [θ, θ] to the nonnegatve real numbers. Let U avg (P/M, B/M, n 0 ) denote the soluton to (20) for gven values of P/M, B/M, and n 0. We frst prove the followng lemma: Lemma 1. There exsts a power allocaton p (θ) that solves (20), whch s fnte everywhere,.e., p (θ) lm P P = 0, for all θ [ θ, θ ]. (21) Ths lemma mples that each user receves a neglgble fracton of the total power as the system scales. An outlne of the proof follows. If the lemma s not true, then some user must be allocated nfnte power as the system scales. The key dea s to show that because the utlty s sublnear, ths user wll contrbute a neglgble amount to the average utlty. Thus we can reallocate the user s power among the remanng users so that (21) s satsfed. Ths reallocaton can only ncrease the average utlty, whch gves a contradcton, provng the lemma. Ths lemma ensures that at a soluton to (20), each user faces the same nterference plus nose n 0 +P/B. Ths makes (20) a concave optmzaton problem. By usng calculus of varatons, we can solve for p (θ) n closed form, as well as the correspondng postve Lagrange multpler λ for the average power constrant. Lettng π p = λ or π s = (n 0 + P/B) λ, results n the same power allocaton at the NE for the power- and SINR-based auctons, respectvely.

Auction-Based Spectrum Sharing *

Auction-Based Spectrum Sharing * Moble Networks and Applcatons, 45 48, 26 C 26 Sprnger Scence + Busness Meda, LLC. Manufactured n The Netherlands. DOI:.7/s36-6-592-y Aucton-Based Spectrum Sharng * JIANWEI HUANG Department of Electrcal

More information

Pricing and Resource Allocation Game Theoretic Models

Pricing and Resource Allocation Game Theoretic Models Prcng and Resource Allocaton Game Theoretc Models Zhy Huang Changbn Lu Q Zhang Computer and Informaton Scence December 8, 2009 Z. Huang, C. Lu, and Q. Zhang (CIS) Game Theoretc Models December 8, 2009

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

Welfare Properties of General Equilibrium. What can be said about optimality properties of resource allocation implied by general equilibrium?

Welfare Properties of General Equilibrium. What can be said about optimality properties of resource allocation implied by general equilibrium? APPLIED WELFARE ECONOMICS AND POLICY ANALYSIS Welfare Propertes of General Equlbrum What can be sad about optmalty propertes of resource allocaton mpled by general equlbrum? Any crteron used to compare

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

Externalities in wireless communication: A public goods solution approach to power allocation. by Shrutivandana Sharma

Externalities in wireless communication: A public goods solution approach to power allocation. by Shrutivandana Sharma Externaltes n wreless communcaton: A publc goods soluton approach to power allocaton by Shrutvandana Sharma SI 786 Tuesday, Feb 2, 2006 Outlne Externaltes: Introducton Plannng wth externaltes Power allocaton:

More information

Economics 101. Lecture 4 - Equilibrium and Efficiency

Economics 101. Lecture 4 - Equilibrium and Efficiency Economcs 0 Lecture 4 - Equlbrum and Effcency Intro As dscussed n the prevous lecture, we wll now move from an envronment where we looed at consumers mang decsons n solaton to analyzng economes full of

More information

MMA and GCMMA two methods for nonlinear optimization

MMA and GCMMA two methods for nonlinear optimization MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons

More information

Assortment Optimization under MNL

Assortment Optimization under MNL Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.

More information

Perfect Competition and the Nash Bargaining Solution

Perfect Competition and the Nash Bargaining Solution Perfect Competton and the Nash Barganng Soluton Renhard John Department of Economcs Unversty of Bonn Adenauerallee 24-42 53113 Bonn, Germany emal: rohn@un-bonn.de May 2005 Abstract For a lnear exchange

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Portfolios with Trading Constraints and Payout Restrictions

Portfolios with Trading Constraints and Payout Restrictions Portfolos wth Tradng Constrants and Payout Restrctons John R. Brge Northwestern Unversty (ont wor wth Chrs Donohue Xaodong Xu and Gongyun Zhao) 1 General Problem (Very) long-term nvestor (eample: unversty

More information

Equilibrium with Complete Markets. Instructor: Dmytro Hryshko

Equilibrium with Complete Markets. Instructor: Dmytro Hryshko Equlbrum wth Complete Markets Instructor: Dmytro Hryshko 1 / 33 Readngs Ljungqvst and Sargent. Recursve Macroeconomc Theory. MIT Press. Chapter 8. 2 / 33 Equlbrum n pure exchange, nfnte horzon economes,

More information

Computing Correlated Equilibria in Multi-Player Games

Computing Correlated Equilibria in Multi-Player Games Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,

More information

The Second Anti-Mathima on Game Theory

The Second Anti-Mathima on Game Theory The Second Ant-Mathma on Game Theory Ath. Kehagas December 1 2006 1 Introducton In ths note we wll examne the noton of game equlbrum for three types of games 1. 2-player 2-acton zero-sum games 2. 2-player

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

(1 ) (1 ) 0 (1 ) (1 ) 0

(1 ) (1 ) 0 (1 ) (1 ) 0 Appendx A Appendx A contans proofs for resubmsson "Contractng Informaton Securty n the Presence of Double oral Hazard" Proof of Lemma 1: Assume that, to the contrary, BS efforts are achevable under a blateral

More information

Some modelling aspects for the Matlab implementation of MMA

Some modelling aspects for the Matlab implementation of MMA Some modellng aspects for the Matlab mplementaton of MMA Krster Svanberg krlle@math.kth.se Optmzaton and Systems Theory Department of Mathematcs KTH, SE 10044 Stockholm September 2004 1. Consdered optmzaton

More information

Online Appendix. t=1 (p t w)q t. Then the first order condition shows that

Online Appendix. t=1 (p t w)q t. Then the first order condition shows that Artcle forthcomng to ; manuscrpt no (Please, provde the manuscrpt number!) 1 Onlne Appendx Appendx E: Proofs Proof of Proposton 1 Frst we derve the equlbrum when the manufacturer does not vertcally ntegrate

More information

PROBLEM SET 7 GENERAL EQUILIBRIUM

PROBLEM SET 7 GENERAL EQUILIBRIUM PROBLEM SET 7 GENERAL EQUILIBRIUM Queston a Defnton: An Arrow-Debreu Compettve Equlbrum s a vector of prces {p t } and allocatons {c t, c 2 t } whch satsfes ( Gven {p t }, c t maxmzes βt ln c t subject

More information

Winter 2008 CS567 Stochastic Linear/Integer Programming Guest Lecturer: Xu, Huan

Winter 2008 CS567 Stochastic Linear/Integer Programming Guest Lecturer: Xu, Huan Wnter 2008 CS567 Stochastc Lnear/Integer Programmng Guest Lecturer: Xu, Huan Class 2: More Modelng Examples 1 Capacty Expanson Capacty expanson models optmal choces of the tmng and levels of nvestments

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

Smooth Games, Price of Anarchy and Composability of Auctions - a Quick Tutorial

Smooth Games, Price of Anarchy and Composability of Auctions - a Quick Tutorial Smooth Games, Prce of Anarchy and Composablty of Auctons - a Quck Tutoral Abhshek Snha Laboratory for Informaton and Decson Systems, Massachusetts Insttute of Technology, Cambrdge, MA 02139 Emal: snhaa@mt.edu

More information

Lecture 14: Bandits with Budget Constraints

Lecture 14: Bandits with Budget Constraints IEOR 8100-001: Learnng and Optmzaton for Sequental Decson Makng 03/07/16 Lecture 14: andts wth udget Constrants Instructor: Shpra Agrawal Scrbed by: Zhpeng Lu 1 Problem defnton In the regular Mult-armed

More information

CS286r Assign One. Answer Key

CS286r Assign One. Answer Key CS286r Assgn One Answer Key 1 Game theory 1.1 1.1.1 Let off-equlbrum strateges also be that people contnue to play n Nash equlbrum. Devatng from any Nash equlbrum s a weakly domnated strategy. That s,

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

EEL 6266 Power System Operation and Control. Chapter 3 Economic Dispatch Using Dynamic Programming

EEL 6266 Power System Operation and Control. Chapter 3 Economic Dispatch Using Dynamic Programming EEL 6266 Power System Operaton and Control Chapter 3 Economc Dspatch Usng Dynamc Programmng Pecewse Lnear Cost Functons Common practce many utltes prefer to represent ther generator cost functons as sngle-

More information

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,

More information

Lecture 10 Support Vector Machines II

Lecture 10 Support Vector Machines II Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed

More information

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017

More information

Lecture 4: November 17, Part 1 Single Buffer Management

Lecture 4: November 17, Part 1 Single Buffer Management Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input

More information

Supporting Materials for: Two Monetary Models with Alternating Markets

Supporting Materials for: Two Monetary Models with Alternating Markets Supportng Materals for: Two Monetary Models wth Alternatng Markets Gabrele Camera Chapman Unversty Unversty of Basel YL Chen Federal Reserve Bank of St. Lous 1 Optmal choces n the CIA model On date t,

More information

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling Real-Tme Systems Multprocessor schedulng Specfcaton Implementaton Verfcaton Multprocessor schedulng -- -- Global schedulng How are tasks assgned to processors? Statc assgnment The processor(s) used for

More information

Market structure and Innovation

Market structure and Innovation Market structure and Innovaton Ths presentaton s based on the paper Market structure and Innovaton authored by Glenn C. Loury, publshed n The Quarterly Journal of Economcs, Vol. 93, No.3 ( Aug 1979) I.

More information

Limited Dependent Variables

Limited Dependent Variables Lmted Dependent Varables. What f the left-hand sde varable s not a contnuous thng spread from mnus nfnty to plus nfnty? That s, gven a model = f (, β, ε, where a. s bounded below at zero, such as wages

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

k t+1 + c t A t k t, t=0

k t+1 + c t A t k t, t=0 Macro II (UC3M, MA/PhD Econ) Professor: Matthas Kredler Fnal Exam 6 May 208 You have 50 mnutes to complete the exam There are 80 ponts n total The exam has 4 pages If somethng n the queston s unclear,

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

COS 521: Advanced Algorithms Game Theory and Linear Programming

COS 521: Advanced Algorithms Game Theory and Linear Programming COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton

More information

1 Derivation of Rate Equations from Single-Cell Conductance (Hodgkin-Huxley-like) Equations

1 Derivation of Rate Equations from Single-Cell Conductance (Hodgkin-Huxley-like) Equations Physcs 171/271 -Davd Klenfeld - Fall 2005 (revsed Wnter 2011) 1 Dervaton of Rate Equatons from Sngle-Cell Conductance (Hodgkn-Huxley-lke) Equatons We consder a network of many neurons, each of whch obeys

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

10) Activity analysis

10) Activity analysis 3C3 Mathematcal Methods for Economsts (6 cr) 1) Actvty analyss Abolfazl Keshvar Ph.D. Aalto Unversty School of Busness Sldes orgnally by: Tmo Kuosmanen Updated by: Abolfazl Keshvar 1 Outlne Hstorcal development

More information

Lecture 21: Numerical methods for pricing American type derivatives

Lecture 21: Numerical methods for pricing American type derivatives Lecture 21: Numercal methods for prcng Amercan type dervatves Xaoguang Wang STAT 598W Aprl 10th, 2014 (STAT 598W) Lecture 21 1 / 26 Outlne 1 Fnte Dfference Method Explct Method Penalty Method (STAT 598W)

More information

Vickrey Auction VCG Combinatorial Auctions. Mechanism Design. Algorithms and Data Structures. Winter 2016

Vickrey Auction VCG Combinatorial Auctions. Mechanism Design. Algorithms and Data Structures. Winter 2016 Mechansm Desgn Algorthms and Data Structures Wnter 2016 1 / 39 Vckrey Aucton Vckrey-Clarke-Groves Mechansms Sngle-Mnded Combnatoral Auctons 2 / 39 Mechansm Desgn (wth Money) Set A of outcomes to choose

More information

Feature Selection: Part 1

Feature Selection: Part 1 CSE 546: Machne Learnng Lecture 5 Feature Selecton: Part 1 Instructor: Sham Kakade 1 Regresson n the hgh dmensonal settng How do we learn when the number of features d s greater than the sample sze n?

More information

Capacity Constraints Across Nests in Assortment Optimization Under the Nested Logit Model

Capacity Constraints Across Nests in Assortment Optimization Under the Nested Logit Model Capacty Constrants Across Nests n Assortment Optmzaton Under the Nested Logt Model Jacob B. Feldman School of Operatons Research and Informaton Engneerng, Cornell Unversty, Ithaca, New York 14853, USA

More information

Chapter - 2. Distribution System Power Flow Analysis

Chapter - 2. Distribution System Power Flow Analysis Chapter - 2 Dstrbuton System Power Flow Analyss CHAPTER - 2 Radal Dstrbuton System Load Flow 2.1 Introducton Load flow s an mportant tool [66] for analyzng electrcal power system network performance. Load

More information

CS294 Topics in Algorithmic Game Theory October 11, Lecture 7

CS294 Topics in Algorithmic Game Theory October 11, Lecture 7 CS294 Topcs n Algorthmc Game Theory October 11, 2011 Lecture 7 Lecturer: Chrstos Papadmtrou Scrbe: Wald Krchene, Vjay Kamble 1 Exchange economy We consder an exchange market wth m agents and n goods. Agent

More information

A Distributed Spectrum Sharing Algorithm in Cognitive Radio Networks

A Distributed Spectrum Sharing Algorithm in Cognitive Radio Networks A Dstrbuted Spectrum Sharng Algorthm n Cogntve Rado Networks We Sun, Tong Lu, Yanmn Zhu, Bo L Shangha Jao Tong Unversty Hong Kong Unversty of Scence and Technology Emal: {sunwt,lutong2569164,yzhu}@sjtu.edu.cn,

More information

Power law and dimension of the maximum value for belief distribution with the max Deng entropy

Power law and dimension of the maximum value for belief distribution with the max Deng entropy Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng

More information

Infinitely Split Nash Equilibrium Problems in Repeated Games

Infinitely Split Nash Equilibrium Problems in Repeated Games Infntely Splt ash Equlbrum Problems n Repeated Games Jnlu L Department of Mathematcs Shawnee State Unversty Portsmouth, Oho 4566 USA Abstract In ths paper, we ntroduce the concept of nfntely splt ash equlbrum

More information

Solutions to exam in SF1811 Optimization, Jan 14, 2015

Solutions to exam in SF1811 Optimization, Jan 14, 2015 Solutons to exam n SF8 Optmzaton, Jan 4, 25 3 3 O------O -4 \ / \ / The network: \/ where all lnks go from left to rght. /\ / \ / \ 6 O------O -5 2 4.(a) Let x = ( x 3, x 4, x 23, x 24 ) T, where the varable

More information

Week3, Chapter 4. Position and Displacement. Motion in Two Dimensions. Instantaneous Velocity. Average Velocity

Week3, Chapter 4. Position and Displacement. Motion in Two Dimensions. Instantaneous Velocity. Average Velocity Week3, Chapter 4 Moton n Two Dmensons Lecture Quz A partcle confned to moton along the x axs moves wth constant acceleraton from x =.0 m to x = 8.0 m durng a 1-s tme nterval. The velocty of the partcle

More information

University of California, Davis Date: June 22, 2009 Department of Agricultural and Resource Economics. PRELIMINARY EXAMINATION FOR THE Ph.D.

University of California, Davis Date: June 22, 2009 Department of Agricultural and Resource Economics. PRELIMINARY EXAMINATION FOR THE Ph.D. Unversty of Calforna, Davs Date: June 22, 29 Department of Agrcultural and Resource Economcs Department of Economcs Tme: 5 hours Mcroeconomcs Readng Tme: 2 mnutes PRELIMIARY EXAMIATIO FOR THE Ph.D. DEGREE

More information

The Geometry of Logit and Probit

The Geometry of Logit and Probit The Geometry of Logt and Probt Ths short note s meant as a supplement to Chapters and 3 of Spatal Models of Parlamentary Votng and the notaton and reference to fgures n the text below s to those two chapters.

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

Temperature. Chapter Heat Engine

Temperature. Chapter Heat Engine Chapter 3 Temperature In prevous chapters of these notes we ntroduced the Prncple of Maxmum ntropy as a technque for estmatng probablty dstrbutons consstent wth constrants. In Chapter 9 we dscussed the

More information

Explicit and Implicit Temperature Constraints in Energy Harvesting Communications

Explicit and Implicit Temperature Constraints in Energy Harvesting Communications Explct and Implct Temperature Constrants n Energy Harvestng Communcatons Abdulrahman Baknna, Omur Ozel 2, and Sennur Ulukus Department of Electrcal and Computer Engneerng, Unversty of Maryland, College

More information

Module 17: Mechanism Design & Optimal Auctions

Module 17: Mechanism Design & Optimal Auctions Module 7: Mechansm Desgn & Optmal Auctons Informaton Economcs (Ec 55) George Georgads Examples: Auctons Blateral trade Producton and dstrbuton n socety General Setup N agents Each agent has prvate nformaton

More information

Lecture 12: Discrete Laplacian

Lecture 12: Discrete Laplacian Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly

More information

On the Multicriteria Integer Network Flow Problem

On the Multicriteria Integer Network Flow Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of

More information

Estimation: Part 2. Chapter GREG estimation

Estimation: Part 2. Chapter GREG estimation Chapter 9 Estmaton: Part 2 9. GREG estmaton In Chapter 8, we have seen that the regresson estmator s an effcent estmator when there s a lnear relatonshp between y and x. In ths chapter, we generalzed the

More information

Interactive Bi-Level Multi-Objective Integer. Non-linear Programming Problem

Interactive Bi-Level Multi-Objective Integer. Non-linear Programming Problem Appled Mathematcal Scences Vol 5 0 no 65 3 33 Interactve B-Level Mult-Objectve Integer Non-lnear Programmng Problem O E Emam Department of Informaton Systems aculty of Computer Scence and nformaton Helwan

More information

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng

More information

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U)

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U) Econ 413 Exam 13 H ANSWERS Settet er nndelt 9 deloppgaver, A,B,C, som alle anbefales å telle lkt for å gøre det ltt lettere å stå. Svar er gtt . Unfortunately, there s a prntng error n the hnt of

More information

Pricing Network Services by Jun Shu, Pravin Varaiya

Pricing Network Services by Jun Shu, Pravin Varaiya Prcng Network Servces by Jun Shu, Pravn Varaya Presented by Hayden So September 25, 2003 Introducton: Two Network Problems Engneerng: A game theoretcal sound congeston control mechansm that s ncentve compatble

More information

Research Article Green s Theorem for Sign Data

Research Article Green s Theorem for Sign Data Internatonal Scholarly Research Network ISRN Appled Mathematcs Volume 2012, Artcle ID 539359, 10 pages do:10.5402/2012/539359 Research Artcle Green s Theorem for Sgn Data Lous M. Houston The Unversty of

More information

The Expectation-Maximization Algorithm

The Expectation-Maximization Algorithm The Expectaton-Maxmaton Algorthm Charles Elan elan@cs.ucsd.edu November 16, 2007 Ths chapter explans the EM algorthm at multple levels of generalty. Secton 1 gves the standard hgh-level verson of the algorthm.

More information

Supporting Information for: Two Monetary Models with Alternating Markets

Supporting Information for: Two Monetary Models with Alternating Markets Supportng Informaton for: Two Monetary Models wth Alternatng Markets Gabrele Camera Chapman Unversty & Unversty of Basel YL Chen St. Lous Fed November 2015 1 Optmal choces n the CIA model On date t, gven

More information

Endogenous timing in a mixed oligopoly consisting of a single public firm and foreign competitors. Abstract

Endogenous timing in a mixed oligopoly consisting of a single public firm and foreign competitors. Abstract Endogenous tmng n a mxed olgopoly consstng o a sngle publc rm and oregn compettors Yuanzhu Lu Chna Economcs and Management Academy, Central Unversty o Fnance and Economcs Abstract We nvestgate endogenous

More information

Technical Note: Capacity Constraints Across Nests in Assortment Optimization Under the Nested Logit Model

Technical Note: Capacity Constraints Across Nests in Assortment Optimization Under the Nested Logit Model Techncal Note: Capacty Constrants Across Nests n Assortment Optmzaton Under the Nested Logt Model Jacob B. Feldman, Huseyn Topaloglu School of Operatons Research and Informaton Engneerng, Cornell Unversty,

More information

Joint Scheduling and Resource Allocation in CDMA Systems

Joint Scheduling and Resource Allocation in CDMA Systems TECHNICAL REPORT - JUNE 2009 1 Jont Schedulng and Resource Allocaton n CDMA Systems Vjay G. Subramanan, Randall A. Berry, and Rajeev Agrawal Expanded Techncal Report: A shorter verson of ths paper wll

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Distributed Non-Autonomous Power Control through Distributed Convex Optimization

Distributed Non-Autonomous Power Control through Distributed Convex Optimization Dstrbuted Non-Autonomous Power Control through Dstrbuted Convex Optmzaton S. Sundhar Ram and V. V. Veeravall ECE Department and Coordnated Scence Lab Unversty of Illnos at Urbana-Champagn Emal: {ssrnv5,vvv}@llnos.edu

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

Joint Scheduling and Resource Allocation in CDMA Systems

Joint Scheduling and Resource Allocation in CDMA Systems TO APPEAR IEEE TRANSACTIONS ON INFORMATION THEORY Jont Schedulng and Resource Allocaton n CDMA Systems Vjay G. Subramanan, Randall A. Berry, and Rajeev Agrawal Abstract In ths paper, the schedulng and

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA 4 Analyss of Varance (ANOVA) 5 ANOVA 51 Introducton ANOVA ANOVA s a way to estmate and test the means of multple populatons We wll start wth one-way ANOVA If the populatons ncluded n the study are selected

More information

ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EQUATION

ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EQUATION Advanced Mathematcal Models & Applcatons Vol.3, No.3, 2018, pp.215-222 ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EUATION

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

Mixed Taxation and Production Efficiency

Mixed Taxation and Production Efficiency Floran Scheuer 2/23/2016 Mxed Taxaton and Producton Effcency 1 Overvew 1. Unform commodty taxaton under non-lnear ncome taxaton Atknson-Stgltz (JPubE 1976) Theorem Applcaton to captal taxaton 2. Unform

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

Competition and Efficiency in Congested Markets

Competition and Efficiency in Congested Markets Competton and Effcency n Congested Markets Daron Acemoglu Department of Economcs Massachusetts Insttute of Technology Asuman E. Ozdaglar Department of Electrcal Engneerng and Computer Scence Massachusetts

More information

Parametric fractional imputation for missing data analysis. Jae Kwang Kim Survey Working Group Seminar March 29, 2010

Parametric fractional imputation for missing data analysis. Jae Kwang Kim Survey Working Group Seminar March 29, 2010 Parametrc fractonal mputaton for mssng data analyss Jae Kwang Km Survey Workng Group Semnar March 29, 2010 1 Outlne Introducton Proposed method Fractonal mputaton Approxmaton Varance estmaton Multple mputaton

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1]

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1] DYNAMIC SHORTEST PATH SEARCH AND SYNCHRONIZED TASK SWITCHING Jay Wagenpfel, Adran Trachte 2 Outlne Shortest Communcaton Path Searchng Bellmann Ford algorthm Algorthm for dynamc case Modfcatons to our algorthm

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

An Analysis of Troubled Assets Reverse Auction

An Analysis of Troubled Assets Reverse Auction An Analyss of Troubled Assets Reverse Aucton Saeed Alae, Azarakhsh Malekan Unversty of Maryland Abstract. In ths paper we study the Nash-equlbrum and equlbrum bddng strateges of the Pooled Reverse Aucton

More information

x = , so that calculated

x = , so that calculated Stat 4, secton Sngle Factor ANOVA notes by Tm Plachowsk n chapter 8 we conducted hypothess tests n whch we compared a sngle sample s mean or proporton to some hypotheszed value Chapter 9 expanded ths to

More information

An Upper Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control

An Upper Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control An Upper Bound on SINR Threshold for Call Admsson Control n Multple-Class CDMA Systems wth Imperfect ower-control Mahmoud El-Sayes MacDonald, Dettwler and Assocates td. (MDA) Toronto, Canada melsayes@hotmal.com

More information

Lecture 3: Probability Distributions

Lecture 3: Probability Distributions Lecture 3: Probablty Dstrbutons Random Varables Let us begn by defnng a sample space as a set of outcomes from an experment. We denote ths by S. A random varable s a functon whch maps outcomes nto the

More information

Stat260: Bayesian Modeling and Inference Lecture Date: February 22, Reference Priors

Stat260: Bayesian Modeling and Inference Lecture Date: February 22, Reference Priors Stat60: Bayesan Modelng and Inference Lecture Date: February, 00 Reference Prors Lecturer: Mchael I. Jordan Scrbe: Steven Troxler and Wayne Lee In ths lecture, we assume that θ R; n hgher-dmensons, reference

More information

Revenue in Resource Allocation Games and Applications

Revenue in Resource Allocation Games and Applications Revenue n Resource Allocaton Games and Applcatons by Thanh Ten Nguyen Ths thess/dssertaton document has been electroncally approved by the followng ndvduals: Tardos,Eva (Charperson) Kozen,Dexter Campbell

More information

Economics 8105 Macroeconomic Theory Recitation 1

Economics 8105 Macroeconomic Theory Recitation 1 Economcs 8105 Macroeconomc Theory Rectaton 1 Outlne: Conor Ryan September 6th, 2016 Adapted From Anh Thu (Monca) Tran Xuan s Notes Last Updated September 20th, 2016 Dynamc Economc Envronment Arrow-Debreu

More information