Statistical Multiplexing Gain of Link Scheduling Algorithms in QoS Networks (Short Version)

Size: px
Start display at page:

Download "Statistical Multiplexing Gain of Link Scheduling Algorithms in QoS Networks (Short Version)"

Transcription

1 1 Statistical Multilexing Gain of Link Scheduling Algorithms in QoS Networks (Short Version) Technical Reort: University of Virginia, CS-99-23, July 1999 Robert Boorstyn Almut Burchard Jörg Liebeherr y Chaiwat Oottamakorn Deartment of Electrical Engineering, Polytechnic University, Brooklyn, NY Deartment of Mathematics, University of Virginia, Charlottesville, VA y Deartment of Comuter Science, University of Virginia, Charlottesville, VA Abstract A statistical network service which allows a certain fraction of traffic to not meet its QoS guarantees can extract additional caacity from a network by exloiting statistical roerties of traffic. Here we consider a statistical service which assumes statistical indeendence of flows, but does not make any assumtions on the statistics of traffic sources, other than that they are regulated, e.g., by a leaky bucket. Under these conditions, we resent functions, socalled local effective enveloes and global effective enveloes, which are, with high certainty, uer bounds of multilexed traffic. We show that these enveloes can be used to obtain bounds on the amount of traffic on a link that can be rovisioned with statistical QoS. A key advantage of our bounds is that they can be alied with a variety of scheduling algorithms. In fact, we show that one can reuse existing admission control functions that are available for scheduling algorithms with a deterministic service. We resent numerical examles which comare the number of flows with statistical QoS guarantees that can be admitted with our effective enveloe aroach to those achieved with existing methods. This reort is an abbreviated version of [1]. I. INTRODUCTION Performance guarantees in QoS networks are either deterministic or statistical. A deterministic service guarantees that all ackets from a flow satisfy given worst-case end-to-end delay bounds and no ackets are droed in the network [2], [4], [8], [15]. A deterministic service rovides the highest level of QoS guarantees, however, it leaves a significant ortion of network resources on the average unused [22]. A statistical service makes robabilistic service guaran- This work is suorted in art by the National Science Foundation through grants NCR (CAREER), ANI , and DMS , and by the New York State Center for Advanced Technology in Telecommunications (CATT). tees, for examle, of the form: Pr[Delay > X] <" or Pr[Loss] <": By allowing a fraction of traffic to violate its QoS guarantees, one can imrove the statistical multilexing gain at network links and increase the achievable link utilization. The key assumtion that leads to the definition of statistical services is that traffic arrivals are viewed as random rocesses. With this assumtion a statistical service can imrove uon a deterministic service by (1) taking advantage of knowledge about the statistics of traffic sources, and (2) by taking advantage of the statistical indeendence of flows. Since it is often not feasible to obtain a reliable statistical characterization of traffic sources, recent research on statistical QoS has attemted to exloit statistical multilexing without assuming a secific source model. Starting with the seminal work in [8], researchers have investigated the statistical multilexing gain by only assuming that flows are statistically indeendent, and that traffic from each flow is constrained by a deterministic regulator, e.g., by a leaky bucket [5], [8], [7], [9], [10], [12], [16], [17], [19], [20], [21]. Henceforth, we will refer to traffic which satisfies these assumtions as regulated adversarial traffic. In this aer we attemt to rovide new insights into the roblem of determining the multilexing gain of statistically indeendent, regulated, but otherwise arbitrary traffic flows at a network link. We introduce the notion of effective enveloes, which are, with high certainty, uer bounds on the aggregate traffic of regulated flows. We use effective enveloes to devise admission control tests for a statistical service for a large class of scheduling algorithms. We show that with effective enveloes, admission control for a statistical service can be done in a similar

2 2 flow 1 flow N (unregulated) arrivals... Α 1 (τ)... Α N (τ) Regulators A 1 (t, t+ τ) A N (t, t+ τ) (regulated) arrivals Buffer with Scheduler Fig. 1. Regulators and Scheduler at a Link. fashion as with deterministic enveloes for a deterministic service [2], [4]. In fact, we show that one can reuse admission control conditions derived for various acket scheduling algorithms in the context of a deterministic service, e.g., [4], [15], [23]. Note that only few results are available on statistical multilexing of adversarial traffic, which can consider scheduling algorithms other than a simle multilexer [7], [12]. Related work to this aer are all attemts to consolidate the deterministic network calculus [4] with statistical multilexing (e.g., [2], [6], [10], [11], [12], [14]). In addition, of articular relevance to this aer are all revious results on statistical multilexing gain with adversarial regulated traffic, as cited above. We refer to [1] for a detailed discussion of related work. The results derived in this aer only aly to a single node. Since traffic from multile flows assing through the same sequence of congested nodes may become correlated, the assumtion of statistical indeendence of flows may not hold in such a setting. Only few results are currently available on end-to-end QoS guarantees for adversarial regulated traffic [7], [20], [21]. The remaining sections of this aer are structured as follows. In Section II we secify our assumtions on the traffic and define the effective enveloes. In Section III we derive sufficient schedulability conditions for a general class of acket schedulers, which can be used for a deterministic and (two tyes of) statistical QoS guarantees. In Section IV, we use large deviations results to derive bounds for effective enveloes. In Section V we comare the statistical multilexing gain attainable with the effective enveloes aroach to those obtained with other methods ([8], [12], [19]). In Section VI we resent conclusions of our work. II. TRAFFIC ARRIVALS AND ENVELOPE FUNCTIONS We consider traffic arrivals to a single link with transmission rate C. As shown in Figure 1, the arrivals from each flow are oliced by a regulator, and then inserted into a buffer. A scheduler determines the order in which traffic in the buffer is transmitted. In the following, we view traffic mainly as continuous-time fluid-flow traffic. Note, however, that our discussion alies, without restrictions, C to discrete-time or discrete-size (acketized) views of traffic arrivals. QoS guarantees for a flow j are secified in terms of a delay bound d j. A QoS violation occurs if traffic from flow j exeriences a delay exceeding d j. (We assume that delays consist only of waiting time in the buffer and transmission time.) A. Traffic Arrivals Traffic arrivals to the link come from a set of flows which is artitioned into Q classes C q, each containing N q flows. (Each flow may itself be an aggregate of the traffic from multile sessions.) The traffic arrivals from flow j in an interval [t 1 ;t 2 ) are denoted as A j (t 1 ;t 2 ). We assume that a traffic flow is characterized by a family of random variables A j (t 1 ;t 2 ) which is characterized as follows: (A1) Additivity. For any t 1 < t 2 < t 3, we have A j (t 1 ;t 2 )+A j (t 2 ;t 3 ) = A j (t 1 ;t 3 ). (A2) Subadditive Bounds. Traffic A j is regulated by a deterministic subadditive enveloe A as j A j (t; t + ) A j ( ) 8t 0; 8 0 : (1) (A3) Stationarity. The A j are stationary random variables, i.e., 8t; t 0 > 0 Pr[A j (t; t + ) x] =Pr[A j (t 0 ;t 0 + ) x] : (2) In other words, all time shifts of A j are equally robable. (A4) Indeendence. The A i and A j are stochastically indeendent for all i 6= j. (A5) Homogeneity within a Class. Flows in the same class have identical deterministic enveloes and identical delay bounds. So, A i = A and d j i = d j if i and j are in the same class. Henceforth, we denote by d q the delay bound associated with traffic from class q. By A Cq we denote the arrivals from class q, thatis,a Cq (t; t + ) = P j2c q A j (t; t + ). Remarks: We want to oint out that the above assumtions are quite general. The class of subadditive deterministic traffic enveloes is the most general class of traffic regulators [4], [2]. The assumtions on the randomness of flows are also quite general. Note that, different from [9], [10], we do not require ergodicity. The traffic regulators most commonly used in ractice are leaky buckets with a eak rate enforcer. Here, traffic on flow j is characterized by three arameters (P j ; j ; j ) with a deterministic enveloe given by A j ( ) = min fp j; j + j g 8 0 ; (3)

3 3 where P j j is the eak traffic rate, j is the average traffic rate, and j is a burst size arameter. We will use this tye of regulators in our numerical examles in Section V. A consequence of subadditivity of the A j is that the limit j := lim!1 A j ( )= exists, and that it rovides an uer bound for the longterm arrival rate for A j. We will assume without loss of generality, that for all t, A j (t; t + ) lim = j : (4)!1 B. Definition of Effective Enveloes We next define local effective enveloes and global effective enveloes which are, with high certainty, uer bounds on aggregate traffic from a given class q. The enveloes will be defined for a set of flows C with arrival functions A j and aggregate traffic A C (t; t + ) = P j2c A j(t; t + ). Definition 1: A local effective enveloe for A C (t; t+ ) is a function G C ( ; ") that satisfies for all 0 and all t Pr A C (t; t + ) G C ( ; ") 1, ": (5) In other words, a local effective enveloe rovides a bound for the aggregate arrivals A C (t; t + ) for any secific ( local ) time interval of length. Under the stationarity assumtion (A3), Eqn. (5) holds for all times t, rovided that it only holds for one value t = t o. It is easy to see that there exists a smallest local effective enveloe, since the minimum of two local effective enveloes is again such an enveloe. Note, however, that local effective enveloes are in general not subadditive in, but satisfy the weaker roerty G C ( ;" 1 + " 2 ) G C ( 1 ;" 1 )+G C ( 2 ;" 2 ) : (6) A local effective enveloe G C ( ; ") is a bound for the traffic arrivals in an arbitrary, but fixed interval of length. Global effective enveloes, to be defined next, are bounds for the arrivals in all subintervals [t; t + ) of a larger interval. For the definition of global effective enveloes, we take advantage of the notion of emirical enveloes, as used in [2], [22]. Consider a time interval I of length. The emirical enveloe E C ( ; ) of a collection C of flows is the maximum traffic in subintervals of I as follows: E C ( ; ) = su A C (t; t + ) : (7) [t;t+ )I Definition 2: A global effective enveloe for an interval I of length is a subadditive function H C ( ; ) which satisfies Pr E C ( ; ) H C ( ; ;"); 80 1, ": (8) The attribute global is justified since H C ( ; ;") is a bound for traffic for all intervals of length in I. Now, due to stationarity of the A j, Eqn. (8) holds for all intervals of length, if it holds for one secific interval I. When alied to scheduling, we will select such that it has at least the length of the longest busy eriod. 1 Assuming that one has obtained local or global effective enveloes searately for each traffic class, the following lemma hels to obtain bounds for the traffic from all classes. Lemma 1: Given a set of flows that is artitioned into Q classes C q, with arrival functions A Cq.LetG Cq and H Cq be local and global effective enveloes for class q. Then the following P inequalities hold. (a) If q G C q (;") x, then, for all t, P i Prh A q C q (t; t + ) >x <Q ". P (b) If H C q (;; ") x( ) for all,then h P i Pr 9 : E C q (;) >x( ) <Q ". The rather simle roof of the lemma can be found in [1]. Our derivations in Section IV will make it clear that for " small enough, neither G Cq nor H Cq are very sensitive with resect to ", so that the bounds for " and Q " are comarable. III. DETERMINISTIC AND STATISTICAL SCHEDULABILITY CONDITIONS In this section, we resent three schedulability conditions for a general class of work-conserving scheduling algorithms. The first condition, exressed in terms of deterministic enveloes, ensures deterministic guarantees. The second and third conditions, which use the local and global effective enveloes, resectively, yield statistical guarantees. All three schedulability conditions will be derived from the same exression for the delay of a traffic arrival in an arbitrary work-conserving scheduler (Eqn. (14) in Section III-A). In our discussions, we will not take into consideration that acket transmissions on a link cannot be reemted. This assumtion is reasonable when acket transmission times are short. For the secific scheduling algorithms considered in this aer, accounting for nonreemtiveness of ackets does not introduce rincial 1 For arrival functions A j and regulators with deterministic enveloes A j, the longest busy eriod in a work-conserving scheduler is given by: inff > 0; ( ) g. P j2c A j

4 4 difficulties, however, it requires additional notation (see [15]). Also, to kee notation minimal, we assume that the transmission rate of the link is normalized, that is C =1. A. Schedulability Suose a (tagged) arrival from a flow j in class q (j 2C q ) arrives to a work-conserving scheduler at time t. Without loss of generality we assume that the scheduler is emty at time 0. We will derive a condition that must hold so that the arrival does not violate its delay bound d q. Let us use A q;t (t 1 ;t 2 ) to denote the traffic arrivals in the time interval [t 1 ;t 2 ) which will be served before a class q arrival at time t. LetA q;t C (t 1 ;t 2 ) denote the traffic arrivals from flows in C which contribute to A q;t (t 1 ;t 2 ). Suose that t, is the last time before t when the scheduler does not contain traffic that will be transmitted before the tagged arrival from class q. Thatis, = inffx 0 j A q;t (t, x; t) xg : (9) So, in the time interval [t, ;t) the scheduler is continuously transmitting traffic which will be served before the tagged arrival. (Note that is a function of t and q. To kee notation simle, we do not make the deendence exlicit.) Given, the tagged class-q arrival at time t will leave the scheduler at time t + if > 0 is such that = inf out j A q;t (t, ;t + out ) + out : (10) Hence, the tagged class-q arrival does not violate its delay bound d q if and only if 8 9 out d q : A q;t (t, ;t + out ) + out : (11) Then, the traffic arrival does not have a deadline violation if d q is selected such that su A q;t (t, ;t + d q ), d q : (12) In general, Eqn. (12) is a sufficient condition for meeting a delay bound. For FIFO and EDF schedulers, the condition is also necessary [15]. 2 For a secific work-conserving scheduling algorithm, let (with, d q ) denote the smallest values for which A C (t, ;t+ ) A q;t C (t, ;t + d q ) : (13) 2 A FIFO scheduler transmits traffic in the order of arrival times. An EDF (Earliest-Deadline-First) scheduler tags traffic with a deadline which is set to the arrival time lus the delay bound d q, and transmits traffic in the order of deadlines. Remark: For most work-conserving schedulers one can easily find such that equality holds in Eqn. (13). For examle, for FIFO, SP, 3 and EDF schedulers, we have: 8 < : FIFO: =0, ;>q SP: = 0 ; = q d q ;<q EDF: = maxf,;d q, d g With Eqn. (13), the arrival from class q at time t does not have a violation if d q is selected such that su ( X A C (t, ;t + ), ) d q : (14) Next, we show how Eqn. (14) can be used to derive schedulability conditions for deterministic and statistical services, using deterministic enveloes, local effective enveloes, and global effective enveloes. For a deterministic service, the delay bound d q must be chosen such that Eqn. (14) is never violated. For a statistical service, d q is chosen such that a violation of Eqn. (14) is a rare event. B. Schedulability with Deterministic Enveloes Exloiting the roerty of deterministic enveloes in Eqn. (1), we can relax Eqn. (14) to su 8 < X X : 9 = A ( j + ), j2c ; d q : (15) Since, + is not deendent on t, we have obtained a sufficient schedulability condition for an arbitrary traffic arrival. We refer the reader [15] to verify that for FIFO and EDF scheduling algorithms the condition in Eqn. (15) is also necessary, in the sense that if it is violated, then there exist arrival atterns conforming with A j leading to deadline violations for class q. For SP scheduling, the condition is necessary only if the deterministic enveloes are concave functions. Next we resent bounds on the likelihood of a violation of Eqn. (14), using local and global effective enveloes. C. Schedulability with Local Effective Enveloes With Eqn. (14), the robability that the tagged arrival from time t exeriences a deadline violation is less than " 3 An SP (Static Priority) scheduler assigns each class a riority level (we assume that a lower class index indicates a higher riority), and has one FIFO queue for traffic arrivals from each class. SP always transmits traffic from the highest riority FIFO queue which has a backlog.

5 5 if d q is selected such that Pr " su ( X A C (t, ;t + ), ) d q # 1, ": (16) Let us, for the moment, make the convenient assumtion that Pr " su ( X " X su Pr ) d q # A C (t, ;t + ), # A C (t, ;t + ), d q :(17) Assuming that equality holds in Eqn. (17), we can re-write Eqn. (16) as su Pr " X A C (t, ;t + ), d q # 1, ": (18) Remark: The assumtion in Eqn. (17) requires further justification, since, in general, the right hand side is larger than the left hand side. On the other hand, several works on statistical QoS have used Eqn. (17) with equality [3], [11], [12], [13], [14], and, in several cases, have suorted the assumtion with numerical examles. Recall from the definition of the local effective enveloe that G C (;") x imlies Pr A C (t; t + ) >x < ". Then, with Lemma 1(a) and assuming that Eqn. (17) holds with equality, we have that a class-q arrival has a deadline violation with robability <"if d q is selected such that ( ) X su G C ( +; "=Q), d q : (19) With Eqn. (19) we have found an exression for the robability that an arbitrary traffic arrival results in a violation of delay bounds. This condition can be viewed as a general formulation of the schedulability conditions for statistical QoS from [11], [12], [14]. The drawback of the condition in Eqn. (19) is its deendence on the assumtion in Eqn. (17). Emirical evidence from numerical examles, including those resented in this aer, as well as numerical evidence from revious work which emloyed this assumtion [3], [12], suggests that Eqn. (19) is not overly otimistic. However, it should be noted that the bound in Eqn. (19) is not a rigorous one. D. Schedulability with Global Effective Enveloes We next use global effective enveloes to exress the robability of a deadline violation in a time interval. We will see that this bound, while more essimistic, can be made rigorous. Consider again the traffic arrival from class q which occurs at time t. The arrival time t lies in a busy eriod of the scheduler I of length at most, which starts at time t, and which ends at a time after the tagged arrival has dearted. Using the roerties of the emirical enveloe E C,as defined in Section II, we have that, for all t and + 0, E C ( + ; ) A C (t, ;t + ): (20) Thus, we can only have a deadline violation if 9 : ( X E C ( + ; ), ) d q : (21) With Lemma 1(b), the robability that an arrival from class q exeriences a deadline violation in the interval I is <",ifd q is selected such that su ( X H C ( + ; ; "=Q), ) d q : (22) Note that the nature of the statistical guarantees derived with local effective enveloes (in Subsection III-C) and with global effective enveloes (in Subsection III-D) are quite different. Local effective enveloes are (under the assumtion in Eqn. (17)) concerned with the robability that a articular traffic arrival results in a deadline violation. Global effective enveloes address the robability that a deadline violation occurs for some arrival in a certain time interval. Clearly, a service which guarantees the latter is more stringent, and will lead to more conservative admission control. Lastly, we want to oint to the structural similarities of the conditions in Eqs. (15), (19), and (22). Thus, schedulability conditions which have been derived for a deterministic service can be reused, without modification, for a statistical service if effective enveloes are available. IV. CONSTRUCTION OF EFFECTIVE ENVELOPES In this section we will construct the local and global effective enveloes G C and H C for the aggregate traffic from a set of flows as described in (A1)-(A5). Throughout this section, we will work only with flows from a single class. So, we will dro the index q ; and C and N, resectively, will denote the set of flows and the number of flows. We

6 6 denote by A ( ) the common deterministic enveloe for the flows in C, and by A C (t; t + ) the aggregate traffic. Our derivations roceed in the following stes: Ste 1. We comute bounds for the moments of the individual flows A j (t; t + ). Since the flows are indeendent, this directly leads to bounds for the moments of A C (t; t + ). 4 Ste 2. We use the Chernoff bound to determine a local effective enveloe G C directly from our bounds on the moments. Ste 3. We use a geometric argument to construct H C from any local effective enveloe G C. Secifically, we will rovide bounds of the following nature: G C ( ; ") H C ( ; ;") G C ( 0 ; " 0 ) : (23) where 0 = > 1 and " 0 =" < 1 deend on. We claim that for " sufficiently small and not too large, 0 = 1, and resulting global effective enveloe is reasonably close to the local effective enveloe. A. Moment bounds The moment generating functions of the distributions of A C and the A j are defined as follows: M C (s; ) := E[e A C (t;t+ )s ] ; (24) M j (s; ) := E[e A j (t;t+ )s ] : (25) Due to the stochastic indeendence of the flows, we can write: M C (s; ) = NY j=1 M j (s; ) : (26) Thus, to obtain a bound on M C (s; ), it is sufficient to bound the moment-generating function of a single flow A j (t; t + ). The following lemma rovides such a bound. We refer to [1] for a roof. Lemma 2: Assume that A(t; t + ) satisfies Conditions (A1), (A2), and (A3). Then, M (s; ) 1+ A ( ) e sa ( ), 1 : (27) Combining Eqn. (26) with (27) of Lemma 2 yields the bound M C (s; ) 1+ A ( ), e sa ( ), 1 N : (28) 4 Note that the moment generating function for arrival functions A j is also comuted in [2]. However, different from [2], our arrivals A j are regulated by deterministic functions A j. B. Local Effective Enveloes B.1 Using the Central Limit Theorem The bound in Eqn (28) can be strengthened to bounds for individual moments. A case of articular interest is the bound for the variance N (A ( {z ), } ) ; (29) =:~s 2 =:s 2 Var[A C (t; t + )] {z } where we have used the bound on the second moment together with the assumtion that E [A C (t; t + )] =. An alication of the Central Limit Theorem, will now yield a bound which is equivalent to Knightly s bound on the rate variance in [12]. Using first the Central Limit Theorem and then the bound on the variance in Eqn.(29), we see that for x> Pr[A C (t; t + ) Nx] Nx, N 1, ~s N x, 1, s (30) ; (31) where is the cumulative normal distribution. Here, ~s and s, resectively, are the square roots of the left hand and right hand sides of Eqn. (29). To find G C so that Pr[A C (0;) G C ( ; ")] "; (32) we set Pr[A C (t; t + ) Nx] " in Eqn. (31) and solve for Nx. This gives us an (aroximate) local effective enveloe as G C ( ; ") N + z N where z s A ( ), 1 ; (33) j log (2")j is defined by 1, (z) =". B.2 Using the Chernoff Bound While the estimate in Eqn. (33) is asymtotically correct, for finite values of N it is only an aroximation. To obtain a rigorous uer bound on Pr[A C (0;) Nx],recall the Chernoff bound for a random variable Y [18]: Pr[Y y] e,sy E[e sy ] 8s 0 : (34) In articular, for A C,thisgives Pr[A C (0;) Nx] e,nxs M C (s; ) (35) e,xs 1+, N e sa ( ) A, 1 (36) : ( )

7 7 Here, Eqn. (35) simly used the Chernoff bound, and Eqn. (36) used Eqn. (28). Since we have a choice for selecting s in Eqn. (36), we want to make the bound as small as ossible. For x<a ( ), the right hand side is minimal when s is chosen so that e sa ( ) = x A ( ), A ( ), x : (37) Substituting this value of s into Eqn. (36) yields Pr A C (0;) Nx x x A () A ( ), A ( ), x 1, x A N () (38) : Again, our goal is to find G C satisfying Eqn. (32). Using the bound in Eqn. (38) and enforcing that G C ( ; ") is never larger than NA ( ) we may set G C ( ; ") = N min(x; A ( )) ; (39) where x is set to be the smallest number satisfying the inequality x A () A ( ), 1, x A () x A " 1=N : (40) ( ), x It can be verified that for N sufficiently large, this bound matches closely the CLT bound of Eqn. (33). Remark: For deterministic enveloes with a eakrate constraint A ( ) P, both exressions for G C in Eqn. (39) and Eqn. (33) describe lines, with sloes which deend on, P, N, and". In other words, the arrivals A C (t; t + ) satisfy, with robability at least 1, ", again a rate constraint. The new rate differs from the mean rate N by an error of order N (for fixed values of, P,and "). C. From Local to Global Effective Enveloes We use the results from the revious subsection to construct a global effective enveloe H C for A C. The first ste is a geometric estimate for E C for a articular value of in terms of the local effective enveloe. The second ste fixes the value of the global effective enveloe for a finite collection of values i. Finally, we obtain the entire enveloe by extraolation. Let us define two events: B(x; t; ) = fa C (t; t + ) Nxg : (41) B (x; ) = fe C ( ; ) Nxg : (42) for an arbitrary interval I of length. The event B(x; t; ) occurs if the arrivals in the secific time interval [t; t + ] exceed Nx, while B (x; ) occurs if there τ / k Interval of length Ι β τ τ' Fig. 2. Embedding Intervals. is some interval of length in the interval I where the arrivals exceed Nx. With Eqn. (38), we have a bound for the robability of events B(x; t; ). The following bound for B (x; ) in terms of B(x; t; ) will be used to construct H C (; ;") from G C (; "). Lemma 3: Let k 2 be a ositive integer, I an interval of length, t 2 I, and 0. Then Pr[B(x; t; )] Pr[B (x; )] k Pr[B(x; t; 0 )] ; (43) with 0 = =(k +1)=k. Proof: By stationarity, we may assume that I = [0;] and t = 0. The left inequality holds by definition, since B(x; 0;) B (x; ). To see the inequality on the right, let t i = i=k (i = 0;:::;dk=e), and consider the intervals [t i ;t i+k+1 ] of length 0 = k+1 for k i = 1;:::;d(, )k=e (all but ossibly the last are subintervals of [0;].) See Figure 2 for an illustration of this construction. Clearly, every subinterval of length in I is contained in at least one of the intervals of length 0. The claim now follows with stationarity. 2 Lemma 3 rovides a bound on arrivals in all subintervals of length in I. One of its imlications is that for every value of, Pr E C ( ; ) G C, k +1 k ; " k "; (44) where E C is the emirical enveloe, and G C is any local effective enveloe. We next assign a finite number of values for H C ( ; ;"): Pick a collection of values i and k i (i = 1;:::;n) and define H C ( i ; ;") = G C ( 0 i ; "0 ) ; (45)

8 8 where 0 i = k +1 k i and " 0 = " nx i=1 k i i!,1 : (46) To justify this construction, note that by Eqn. (44) we have Pr h 9i : E C ( i ; ) G C ( 0 i;" 0 ) i nx i=1 k i i " 0 (47) ": (48) To get values for the global effective enveloe on intervals ( i,1 ; i ) and [0; 1 ), we first extraolate, using the bound A and monotonicity, and then enforce subadditivity. More recisely, we set H C ( ; ;") = Pinf i = X where f is an auxiliary function defined by f ( ) = 8 < : i f ( i ) : (49) min fh C ( i,1 ; ;")+A (, i,1 ); H C ( i ; ;")g 2 [ i,1 ; i );i =2;:::;n min fa ( ); H C ( 1 ; ;")g 2 [0; 1 ) (50) In other words, H C is the largest subadditive function which does not exceed f. Since there exists no universal best global effective enveloe, it is clearly imossible to make an otimal choice for the values of i and k i. It is, however, ossible to make good choices, which lead to global effective enveloes that aroximate the given local effective enveloe well, at least when " is sufficiently small. In our numerical results, we use k i = k; i = i o (i =1;:::;n) ; (51) where o is a small number, and we choose =1+ 1 k +1 ; k z z + N ; (52) s where z is defined by 1, (z) = " and s by Eqn. (29). The choice of the i in Eqn. (51) guarantees that, k +1 H C ( ; ;") G C ;" 0 ; (53) k for all 2 [ o ;], where, by Eqn. (46), " 0 = o(, 1) ": (54) k In [1] we rovide a justification for the choice of k and in Eqn. (52) for eak-rate constrained traffic with large burst sizes. This is done with a heuristic otimization which alies the CLT aroximation from Eqn. (33). V. EVALUATION In this section, we evaluate the effective enveloe aroach, using the schedulability conditions from Section III and the bounds derived in Section IV. The key criteria for evaluation is the amount of traffic on a link which can be rovisioned with QoS guarantees. As benchmarks for statistical QoS rovisioning we consider the following non-statistical methods: Peak Rate: Peak rate allocation, rovides deterministic QoS guarantees, but, is an inefficient method for achieving QoS. Deterministic: We use admission control tests for deterministic QoS from Eqn. (15). The admissible traffic varies with the scheduling algorithm. Average Rate: Average rate allocation only guarantees finiteness of delays and average throughut. We will evaluate the two methods for rovisioning statistical QoS which are resented in this aer. Local Effective Enveloe: Here we use Eqn. (18) to determine : admissibility. We will evaluate the quality of the following two bounds, derived in Section IV: Local Effective Enveloe (CB): Uses the bound from Eqn. (40), obtained with the Chernoff bound. Local Effective Enveloe (CLT): Uses the bound from Eqn. (33), obtained with the Central Limit Theorem. Recall from our discussion in Section IV that the local effective enveloe (CLT) results are equivalent to the ratevariance enveloe method described in [12]. Global Effective Enveloe: We use Eqn. (22) to determine admissibility. The global effective enveloe is constructed by first finding (see Footnote 1), and choosing a number o which is small comared to the delay bounds. We determine the arameters, k,and i according to (51) and (52). We then aly Eqn. (45) for each of the i,and comlete the rocess by the extraolation in Eqs. (49) and (50). (In Eqn. (45), we use the local effective enveloe (CB) rather than the corresonding CLT bound, since the latter would yield only aroximate bounds.) We comare our results with the effective bandwidth aroach for regulated adversarial traffic from the literature: Effective Bandwidth [8], [16], [19]: 5 The effective bandwidth aroach assigns to each flow a fixed caacity, the effective bandwidth, and assumes that each flow is serviced at a rate which corresonds to the effective bandwidth. The delay bounds will be indirectly derived from the buffer size. We set the delay bound d to d = B=C, whereb is 5 The cited works calculate effective bandwidth for regulated adversarial sources. The comlete literature on effective bandwidth is much more extensive.

9 9 the buffer size at the scheduler and C is the transmission rate of the link. In our examles, we include the following results on effective bandwidth: EB-EMW: This is the result from the classical aer by Elwalid/Mitra/Wentworth (Eqn. (39) in [8]). EB-RRR: We use Eqn. (9) from [19] by Rajagoal/Reisslein/Ross which resents an imrovement to the EB-EMW result. In all our exeriments, we consider traffic regulators which are obtained from eak rate controlled leaky buckets with deterministic enveloes as given in Eqn. (3). 6 In all exeriments, we consider a link with C = 45 Mbs, and we consider two traffic classes. The traffic arameters of a flow in one of the classes are as follows: Class Peak Rate Mean Rate Burst Size P (Mbs) (Mbs) (bits) To arameters are selected so as to match, at least aroximately, the examles resented in [8], [19]. We will resent three sets of examles. In the first examle, we comare the deterministic enveloes with our bounds for the local and global effective enveloes for sets of homogeneous sources. In the second examle, we comare the maximum number of admissible flows in a FIFO scheduler for a given delay bound d and delay-violation robability ". In the third examle, we investigate the case of heterogeneous traffic with different QoS requirements, and we comare the admissible regions for different scheduling algorithms (SP, EDF). A. Examle 1: Comarison of Enveloe Functions In the first examle, we study the shae of local and global effective enveloes for homogeneous sets of flows, as functions of the lengths of time intervals. The enveloes are comared to the deterministic enveloe A ( j ) = minfp j ; j + j ;g, to the eak rate function P j,and to the average rate function j. In our grahs, we lot the amount of traffic P er flow for the various enveloes (e.g., we resent j2c G j( ; ")=N). Figures 3(a) and 3(b) show the results for multilexed flows from Class 1 and Class 2, resectively. We set " = 10,6 for all enveloes. By deicting the amount of traffic er flow for different numbers of flows (N denotes the number of flows), we can observe how the statistical multilexing gain increases with the number of flows. 6 Most of the methods listed here can work with more comlex regulators. However, since eak-rate enforced leaky buckets are widely used in ractice, they serve as good benchmarks. The first observation to be made is that the local and global effective enveloes are much smaller than the deterministic enveloe or the eak rate. Another observation is that, for a fixed number of flows N, the global effective enveloe is larger than the local effective enveloes, and the local effective enveloe bound is smaller when using CLT (central limit theorem), as comared to CB (Chernoff bound). Note, however, that bounds for the enveloes with CLT are only aroximate, and may be too otimistic, esecially for small number of flows. Figure 3 also shows that local and global effective enveloes converge as the number of flows N is increased. B. Examle 2: Admissible Region for Homogeneous Flows In this examle, we investigate the number of flows admitted by various admission control methods for guaranteeing QoS at a link with a FIFO scheduler. We assume that flows are homogeneous, that is, all flows belong to a single class. Again, the robability of a violation of QoS guarantees is set to " =10,6. We comare the admissible regions of the local and global effective enveloes, to those of the effective bandwidth techniques (both EB-EMW and EB-RRR), and to a deterministic QoS guarantees. We comare the results with those obtained from a discrete event simulation. For the simulation, we take a attern which we exect, based on the simulations in [17], to be close to an adversarial traffic attern for eak-rate controlled leaky buckets. However, do not claim that the results from the simulation scenario are the worst ossible. In the simulations, the traffic for a flow with arameters given by (P; ; ), has a eriodic attern. A flow transmits at the average rate for a duration T on1 = d=2, whered is the delay bound. Then, the flow transmits at the eak rate P for a duration T on2 = =(P, ), followed by another hase of length T on1 at which the flow transmits at rate. Then, the source shuts off, waits for a duration T of f = = and then reeats the attern. The starting time of a attern of the flows are uniformly and indeendently chosen over the length of its eriod. Figures 4(a) and (b) deict the number of admitted flows as a function of the delay bound. The figures show that all methods for statistical QoS admit many more connections than a deterministic admission control test. In both Figures, the effective enveloes (both CLT and CB) are closest to the simulation results. (Once again, we oint out that the results using the local effective (CLT) bounds are identical to the rate-variance results resented in [12].) Note, however, that results obtained with local effective enveloes are aroximate and are not guaranteed to be

10 10 Amount of traffic er flow (kbits) Peak Rate Deterministic Enveloe Global Effective Enveloe Local Effective Enveloe (CB) Local Effective Enveloe (CLT) N = N = Average Rate Time interval (ms) (a) Class 1. N = 1000 Amount of traffic er flow (kbits) Peak Rate Deterministic Enveloe Global Effective Enveloe Local Effective Enveloe (CB) Local Effective Enveloe (CLT) N = N = 1000 N = Average Rate Time interval (ms) (b) Class 2. Fig. 3. Examle 1: Comarison of Enveloe Functions for 100 ms, " = 10,6, and for Number of Flows N = 100; 1000; Number of admissible connections Average Rate Fig. 4. Simulation Local Eff. Env. (CLT) Local Eff. Env. (CB) 0.75 Global Eff. Env. Bufferless MUX EB-RRR EB-EMW Deterministic Peak Rate Delay bound (ms) (a) Class Average utilization Number of admissible connections Simulation Local Eff. Env. (CLT) Local Eff. Env. (CB) Peak Rate Delay bound (ms) (b) Class 2. Global Eff. Env. EB-RRR Bufferless MUX EB-EMW Deterministic Average Rate Examle 2: Admissible Number of Connections at a FIFO Scheduler for Homogeneous Flows as a Function of Delay Bounds (" =10,6, 0 <d 100 ms) Average utilization uer bounds on the admissible regions. Comaring the results from effective enveloes to the effective bandwidth results, we observe that the effective enveloe methods admits more connections than the effective bandwidth methods if delay bounds are large. The difference of the admissible regions in Figure 4(a) to those in Figure 4(b) illustrate the high degree to which the size of the admissible region is deendent on the traffic arameters. The lower burst sizes of flows in Class 2 lead to larger admissible regions for all methods. Secifically, notice that deterministic QoS in Figure 4(b) yields similar results to the statistical methods, if the delay bounds are large. C. Examle 3: Admissible Region for Heterogeneous Traffic Here we investigate an examle with different scheduling algorithms and with heterogeneous traffic arrivals. As scheduling algorithms, we consider Static Priority (SP) and Earliest-Deadline-First (EDF). For a deterministic service, EDF is otimal, in the sense that the admissible regions with EDF scheduling is maximal [15]. To our knowledge, results for a statistical service (with adversarial traffic), have not been reorted for EDF. In this examle, we multilex a number of flows from Class 1 and from Class 2 on 45 Mbs. We fix the delay bounds, such that the delay bound for Class-1 flows is relatively long, d 1 = 100 ms, and the delay bound for Class-2 flows is relatively short, d 2 = 10 ms. For any articular method, we determine the maximum number of Class-1 and Class-2 flows that can be suorted simultaneously on the 45 Mbs link. The result are shown in Figure 5. The lot deicts the admissible region for SP and EDF scheduling, using the results for the (two tyes of) local effective enveloes, effective enveloes, and deterministic enveloes. We also include the admissible regions for the effective bandwidth aroaches (EB-EMW and EB-RRR). Note, however, that

11 11 Number of Class-1 connections Average Rate Local Eff. Env (CLT) Local Eff. Env. (CB) Global Eff. Env. Deterministic For Local and Global Eff. Env. : Thick lines = EDF scheduling Thin lines = SP scheduling 50 Bufferless MUX EB-RRR Peak Rate 0 EB-EMW Number of Class-2 connections Fig. 5. Examle 3: Admissible Region of Multilexing Class 1 and Class 2 Flows with " = 10,6 and d 1 d 2 =10 ms. = 100 ms and the shown effective bandwidth methods assume a simle multilexer (with virtual buffer artitioning) and do not account for different scheduling algorithms. The results in Figure 5 show that the difference between SP and EDF schedulers is small in all cases. The effective enveloe is, again, more conservative than the local effective enveloe method. Finally, Figure 5 illustrates that with heterogeneous flows and the effective bandwidth methods (EB-EMW, EB-RRR) may not erform as well as methods which consider scheduling algorithms. We also erformed a simulation for the EDF scheduling algorithm. For the simulations, we used a source model which was shown to be adversarial for a simle multilexer with buffer and bandwidth artitioning [19]. We do not know or claim that this source model is also adversarial for EDF scheduling. However, with this choice, the simulations give the same results as an average rate allocation. VI. CONCLUSIONS We have resented new results on evaluating the statistical multilexing gain for acket scheduling algorithms. A useful roerty of our aroach is that it searates the consideration of the service definition (deterministic, statistical), the scheduling algorithm (FIFO, SP, EDF), and the mathematical methodology (Central Limit Theorem, Chernoff Bound). Thus, our work may be useful to researchers who want to determine the statistical multilexing gain for other traffic regulators, scheduling algorithms, or large deviation results. As direction for future work, the admission control methodology resented in this aer needs to be extended to a network environment. REFERENCES [1] R. Boorstyn, A. Burchard, J. Liebeherr, and C. Oottamakorn. Statistical multilexing gain of link scheduling algorithms in QoS networks. Technical Reort CS-99-21, University of Virginia, Comuter Science Deartment, July [2] C. Chang. Stability, queue length, and delay of deterministic and stochastic queueing networks. IEEE Transactions on Automatic Control, 39(5): , May [3] J. Choe and Ness B. Shroff. A central-limit-theorem-based aroach for analyizing queue behvior in high-seed network. IEEE/ACM Transactions on Networking, 6(5): , October [4] R. Cruz. A calculus for network delay, Part I : Network elements in isolation. IEEE Transaction of Information Theory, 37(1): , [5] B. T. Doshi. Deterministic rule based traffic descritors for broadband ISDN: Worst case behavior and connection accetance control. In International Teletraffic Congress (ITC), ages , [6] N. G. Duffield and S. H. Low. The cost of quality in networks of aggregate traffic. In Proceedings of IEEE INFOCOM 98, San Francisco, March [7] A. Elwalid and D. Mitra. Design of generalized rocessor sharing schedulers which statistically multilex heterogeneous QoS classes. In Proceedings of IEEE INFOCOM 99, ages , New York, March [8] A. Elwalid, D. Mitra, and R. Wentworth. A new aroach for allocating buffers and bandwidth to heterogeneous, regulated traffic in an ATM node. IEEE Journal on Selected Areas in Communications, 13(6): , August [9] G. Kesidis and T. Konstantooulos. Extremal shae-controlled traffic atterns in high-seed networks. Technical Reort 97-14, ECE Technical Reort, University of Waterloo, December [10] G. Kesidis and T. Konstantooulos. Extremal traffic and worstcase erformance for queues with shaed arrivals. In Proceedings of Worksho on Analysis and Simulation of Communication Networks, Toronto, November [11] E. Knightly. H-BIND: A new aroach to roviding statistical erformance guarantees to VBR traffic. In Proceedings of IEEE INFOCOM 96, ages , San Francisco, CA, March [12] E. Knightly. Enforceable quality of service guarantees for bursty traffic streams. In Proceedings of IEEE INFOCOM 98, ages , San Francisco, March [13] E. W. Knightly and Ness B. Shroff. Admission control for statistical QoS: Theory and ractice. IEEE Network, 13(2):20 29, March/Aril [14] J. Kurose. On comuting er-session erformance bounds in high-seed multi-ho comuter networks. In ACM Sigmetrics 92, ages , [15] J. Liebeherr, D. Wrege, and D. Ferrari. Exact admission control for networks with bounded delay services. IEEE/ACM Transactions on Networking, 4(6): , December [16] F. LoPresti, Z. Zhang, D. Towsley, and J. Kurose. Source time scale and otimal buffer/bandwidth tradeoff for regulated traffic in an ATM node. In Proceedings of IEEE INFOCOM 97, ages , Kobe, Jaan, Aril [17] P. Oechslin. On-off sources and worst case arrival atterns of the leaky bucket. Technical reort, University College London, Setember [18] A. Paoulis. Probability, Random Variables, and Stochastic Processes. 3rd edition. McGraw Hill, 1991.

12 [19] S. Rajagoal, M. Reisslein, and K. W. Ross. Packet multilexers with adversarial regulated traffic. In Proceedings of IEEE INFO- COM 98, ages , San Francisco, March [20] M. Reisslein, K. W. Ross, and S. Rajagoal. Guaranteeing statistical QoS to regulated traffic: The multile node case. In Proceedings of 37th IEEE Conference on Decision and Control (CDC), ages , Tama, December [21] M. Reisslein, K. W. Ross, and S. Rajagoal. Guaranteeing statistical QoS to regulated traffic: The single node case. In Proceedings of IEEE INFOCOM 99, ages , New York, March [22] D. Wrege, E. Knightly, H. Zhang, and J. Liebeherr. Deterministic delay bounds for VBR video in acket-switching networks: Fundamental limits and ractical tradeoffs. IEEE/ACM Transactions on Networking, 4(3): , June [23] H. Zhang and D. Ferrari. Rate-controlled service discilines. Journal of High Seed Networks, 3(4): ,

Recent Progress on a Statistical Network Calculus

Recent Progress on a Statistical Network Calculus Recent Progress on a Statistical Network Calculus Jorg Liebeherr Deartment of Comuter Science University of Virginia Collaborators Almut Burchard Robert Boorstyn Chaiwat Oottamakorn Stehen Patek Chengzhi

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

Traffic Engineering in a Multipoint-to-Point Network

Traffic Engineering in a Multipoint-to-Point Network 1 Traffic Engineering in a Multioint-to-Point Network Guillaume Urvoy-Keller, Gérard Hébuterne, and Yves Dallery Abstract The need to guarantee Quality of Service (QoS) to multimedia alications leads to

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

A Calculus for End-to-end Statistical Service Guarantees

A Calculus for End-to-end Statistical Service Guarantees A Calculus for End-to-end Statistical Service Guarantees Almut Burchard y Jörg Liebeherr Stephen Patek y Department of Mathematics Department of Computer Science Department of Systems and Information Engineering

More information

An Analysis of TCP over Random Access Satellite Links

An Analysis of TCP over Random Access Satellite Links An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

New Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms

New Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms New Schedulability Test Conditions for Non-reemtive Scheduling on Multirocessor Platforms Technical Reort May 2008 Nan Guan 1, Wang Yi 2, Zonghua Gu 3 and Ge Yu 1 1 Northeastern University, Shenyang, China

More information

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 On the Relationshi Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 Imad Antonios antoniosi1@southernct.edu CS Deartment MO117 Southern Connecticut State University 501 Crescent St.

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

Statistical Per-Flow Service Bounds in a Network with Aggregate Provisioning

Statistical Per-Flow Service Bounds in a Network with Aggregate Provisioning Statistical Per-Flow Service Bounds in a Network with Aggregate Provisioning Technical Report: University of Virginia, S-2002-27 Jörg Liebeherr Stephen Patek Almut Burchard y y Department of Mathematics

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

A MONOTONICITY RESULT FOR A G/GI/c QUEUE WITH BALKING OR RENEGING

A MONOTONICITY RESULT FOR A G/GI/c QUEUE WITH BALKING OR RENEGING J. Al. Prob. 43, 1201 1205 (2006) Printed in Israel Alied Probability Trust 2006 A MONOTONICITY RESULT FOR A G/GI/c QUEUE WITH BALKING OR RENEGING SERHAN ZIYA, University of North Carolina HAYRIYE AYHAN

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS #A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,

More information

Periodic scheduling 05/06/

Periodic scheduling 05/06/ Periodic scheduling T T or eriodic scheduling, the best that we can do is to design an algorithm which will always find a schedule if one exists. A scheduler is defined to be otimal iff it will find a

More information

Dynamic-Priority Scheduling. CSCE 990: Real-Time Systems. Steve Goddard. Dynamic-priority Scheduling

Dynamic-Priority Scheduling. CSCE 990: Real-Time Systems. Steve Goddard. Dynamic-priority Scheduling CSCE 990: Real-Time Systems Dynamic-Priority Scheduling Steve Goddard goddard@cse.unl.edu htt://www.cse.unl.edu/~goddard/courses/realtimesystems Dynamic-riority Scheduling Real-Time Systems Dynamic-Priority

More information

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is

More information

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Asymptotically Optimal Simulation Allocation under Dependent Sampling Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee

More information

Statistical Per-Flow Service Bounds in a Network with Aggregate Provisioning

Statistical Per-Flow Service Bounds in a Network with Aggregate Provisioning 1 Statistical Per-Flow Service Bounds in a Network with Aggregate Provisioning Jörg Liebeherr, Department of omputer Science, University of Virginia Stephen D. Patek, Department of Systems and Information

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

Age of Information: Whittle Index for Scheduling Stochastic Arrivals

Age of Information: Whittle Index for Scheduling Stochastic Arrivals Age of Information: Whittle Index for Scheduling Stochastic Arrivals Yu-Pin Hsu Deartment of Communication Engineering National Taiei University yuinhsu@mail.ntu.edu.tw arxiv:80.03422v2 [math.oc] 7 Ar

More information

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting On the Role of Finite Queues in Cooerative Cognitive Radio Networks with Energy Harvesting Mohamed A. Abd-Elmagid, Tamer Elatt, and Karim G. Seddik Wireless Intelligent Networks Center (WINC), Nile University,

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

A Note on Guaranteed Sparse Recovery via l 1 -Minimization

A Note on Guaranteed Sparse Recovery via l 1 -Minimization A Note on Guaranteed Sarse Recovery via l -Minimization Simon Foucart, Université Pierre et Marie Curie Abstract It is roved that every s-sarse vector x C N can be recovered from the measurement vector

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete

More information

COMMUNICATION BETWEEN SHAREHOLDERS 1

COMMUNICATION BETWEEN SHAREHOLDERS 1 COMMUNICATION BTWN SHARHOLDRS 1 A B. O A : A D Lemma B.1. U to µ Z r 2 σ2 Z + σ2 X 2r ω 2 an additive constant that does not deend on a or θ, the agents ayoffs can be written as: 2r rθa ω2 + θ µ Y rcov

More information

End-to-End Delay Minimization in Thermally Constrained Distributed Systems

End-to-End Delay Minimization in Thermally Constrained Distributed Systems End-to-End Delay Minimization in Thermally Constrained Distributed Systems Pratyush Kumar, Lothar Thiele Comuter Engineering and Networks Laboratory (TIK) ETH Zürich, Switzerland {ratyush.kumar, lothar.thiele}@tik.ee.ethz.ch

More information

Analysis of M/M/n/K Queue with Multiple Priorities

Analysis of M/M/n/K Queue with Multiple Priorities Analysis of M/M/n/K Queue with Multile Priorities Coyright, Sanjay K. Bose For a P-riority system, class P of highest riority Indeendent, Poisson arrival rocesses for each class with i as average arrival

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

arxiv:cond-mat/ v2 25 Sep 2002

arxiv:cond-mat/ v2 25 Sep 2002 Energy fluctuations at the multicritical oint in two-dimensional sin glasses arxiv:cond-mat/0207694 v2 25 Se 2002 1. Introduction Hidetoshi Nishimori, Cyril Falvo and Yukiyasu Ozeki Deartment of Physics,

More information

A Simple Throughput Model for TCP Veno

A Simple Throughput Model for TCP Veno A Simle Throughut Model for TCP Veno Bin Zhou, Cheng Peng Fu, Dah-Ming Chiu, Chiew Tong Lau, and Lek Heng Ngoh School of Comuter Engineering, Nanyang Technological University, Singaore 639798 Email: {zhou00,

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

dn i where we have used the Gibbs equation for the Gibbs energy and the definition of chemical potential

dn i where we have used the Gibbs equation for the Gibbs energy and the definition of chemical potential Chem 467 Sulement to Lectures 33 Phase Equilibrium Chemical Potential Revisited We introduced the chemical otential as the conjugate variable to amount. Briefly reviewing, the total Gibbs energy of a system

More information

On the Chvatál-Complexity of Knapsack Problems

On the Chvatál-Complexity of Knapsack Problems R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

Chapter 7 Sampling and Sampling Distributions. Introduction. Selecting a Sample. Introduction. Sampling from a Finite Population

Chapter 7 Sampling and Sampling Distributions. Introduction. Selecting a Sample. Introduction. Sampling from a Finite Population Chater 7 and s Selecting a Samle Point Estimation Introduction to s of Proerties of Point Estimators Other Methods Introduction An element is the entity on which data are collected. A oulation is a collection

More information

Finite Mixture EFA in Mplus

Finite Mixture EFA in Mplus Finite Mixture EFA in Mlus November 16, 2007 In this document we describe the Mixture EFA model estimated in Mlus. Four tyes of deendent variables are ossible in this model: normally distributed, ordered

More information

On Doob s Maximal Inequality for Brownian Motion

On Doob s Maximal Inequality for Brownian Motion Stochastic Process. Al. Vol. 69, No., 997, (-5) Research Reort No. 337, 995, Det. Theoret. Statist. Aarhus On Doob s Maximal Inequality for Brownian Motion S. E. GRAVERSEN and G. PESKIR If B = (B t ) t

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging 1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

Signaled Queueing. Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT. Categories and Subject Descriptors. General Terms. Keywords

Signaled Queueing. Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT. Categories and Subject Descriptors. General Terms. Keywords Signaled Queueing Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT Burstiness in queues where customers arrive indeendently leads to rush eriods when wait times are long. We roose a simle signaling scheme

More information

Developing A Deterioration Probabilistic Model for Rail Wear

Developing A Deterioration Probabilistic Model for Rail Wear International Journal of Traffic and Transortation Engineering 2012, 1(2): 13-18 DOI: 10.5923/j.ijtte.20120102.02 Develoing A Deterioration Probabilistic Model for Rail Wear Jabbar-Ali Zakeri *, Shahrbanoo

More information

Efficient Approximations for Call Admission Control Performance Evaluations in Multi-Service Networks

Efficient Approximations for Call Admission Control Performance Evaluations in Multi-Service Networks Efficient Aroximations for Call Admission Control Performance Evaluations in Multi-Service Networks Emre A. Yavuz, and Victor C. M. Leung Deartment of Electrical and Comuter Engineering The University

More information

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley Elements of Asymtotic Theory James L. Powell Deartment of Economics University of California, Berkeley Objectives of Asymtotic Theory While exact results are available for, say, the distribution of the

More information

Power Aware Wireless File Downloading: A Constrained Restless Bandit Approach

Power Aware Wireless File Downloading: A Constrained Restless Bandit Approach PROC. WIOP 204 Power Aware Wireless File Downloading: A Constrained Restless Bandit Aroach Xiaohan Wei and Michael J. Neely, Senior Member, IEEE Abstract his aer treats ower-aware throughut maximization

More information

Algorithms for Air Traffic Flow Management under Stochastic Environments

Algorithms for Air Traffic Flow Management under Stochastic Environments Algorithms for Air Traffic Flow Management under Stochastic Environments Arnab Nilim and Laurent El Ghaoui Abstract A major ortion of the delay in the Air Traffic Management Systems (ATMS) in US arises

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment

More information

Approximate Dynamic Programming for Dynamic Capacity Allocation with Multiple Priority Levels

Approximate Dynamic Programming for Dynamic Capacity Allocation with Multiple Priority Levels Aroximate Dynamic Programming for Dynamic Caacity Allocation with Multile Priority Levels Alexander Erdelyi School of Oerations Research and Information Engineering, Cornell University, Ithaca, NY 14853,

More information

A Network Calculus with Effective Bandwidth

A Network Calculus with Effective Bandwidth A Network Calculus with Effective Bandwidth Technical Report: University of Virginia, CS-2003-20, November 2003 Chengzhi Li Almut Burchard Jörg Liebeherr Department of Computer Science Department of Mathematics

More information

On a Markov Game with Incomplete Information

On a Markov Game with Incomplete Information On a Markov Game with Incomlete Information Johannes Hörner, Dinah Rosenberg y, Eilon Solan z and Nicolas Vieille x{ January 24, 26 Abstract We consider an examle of a Markov game with lack of information

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

State Estimation with ARMarkov Models

State Estimation with ARMarkov Models Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,

More information

Real-Time Computing with Lock-Free Shared Objects

Real-Time Computing with Lock-Free Shared Objects Real-Time Comuting with Lock-Free Shared Objects JAMES H. ADERSO, SRIKATH RAMAMURTHY, and KEVI JEFFAY University of orth Carolina This article considers the use of lock-free shared objects within hard

More information

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION O P E R A T I O N S R E S E A R C H A N D D E C I S I O N S No. 27 DOI:.5277/ord73 Nasrullah KHAN Muhammad ASLAM 2 Kyung-Jun KIM 3 Chi-Hyuck JUN 4 A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST

More information

Plotting the Wilson distribution

Plotting the Wilson distribution , Survey of English Usage, University College London Setember 018 1 1. Introduction We have discussed the Wilson score interval at length elsewhere (Wallis 013a, b). Given an observed Binomial roortion

More information

LECTURE 7 NOTES. x n. d x if. E [g(x n )] E [g(x)]

LECTURE 7 NOTES. x n. d x if. E [g(x n )] E [g(x)] LECTURE 7 NOTES 1. Convergence of random variables. Before delving into the large samle roerties of the MLE, we review some concets from large samle theory. 1. Convergence in robability: x n x if, for

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley Elements of Asymtotic Theory James L. Powell Deartment of Economics University of California, Berkeley Objectives of Asymtotic Theory While exact results are available for, say, the distribution of the

More information

Probability Estimates for Multi-class Classification by Pairwise Coupling

Probability Estimates for Multi-class Classification by Pairwise Coupling Probability Estimates for Multi-class Classification by Pairwise Couling Ting-Fan Wu Chih-Jen Lin Deartment of Comuter Science National Taiwan University Taiei 06, Taiwan Ruby C. Weng Deartment of Statistics

More information

Brownian Motion and Random Prime Factorization

Brownian Motion and Random Prime Factorization Brownian Motion and Random Prime Factorization Kendrick Tang June 4, 202 Contents Introduction 2 2 Brownian Motion 2 2. Develoing Brownian Motion.................... 2 2.. Measure Saces and Borel Sigma-Algebras.........

More information

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)

More information

Vision Graph Construction in Wireless Multimedia Sensor Networks

Vision Graph Construction in Wireless Multimedia Sensor Networks University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Conference and Worksho Paers Comuter Science and Engineering, Deartment of 21 Vision Grah Construction in Wireless Multimedia

More information

A PEAK FACTOR FOR PREDICTING NON-GAUSSIAN PEAK RESULTANT RESPONSE OF WIND-EXCITED TALL BUILDINGS

A PEAK FACTOR FOR PREDICTING NON-GAUSSIAN PEAK RESULTANT RESPONSE OF WIND-EXCITED TALL BUILDINGS The Seventh Asia-Pacific Conference on Wind Engineering, November 8-1, 009, Taiei, Taiwan A PEAK FACTOR FOR PREDICTING NON-GAUSSIAN PEAK RESULTANT RESPONSE OF WIND-EXCITED TALL BUILDINGS M.F. Huang 1,

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Delay characterization of multi-hop transmission in a Poisson field of interference

Delay characterization of multi-hop transmission in a Poisson field of interference 1 Delay characterization of multi-ho transmission in a Poisson field of interference Kostas Stamatiou and Martin Haenggi, Senior Member, IEEE Abstract We evaluate the end-to-end delay of a multi-ho transmission

More information

How to Estimate Expected Shortfall When Probabilities Are Known with Interval or Fuzzy Uncertainty

How to Estimate Expected Shortfall When Probabilities Are Known with Interval or Fuzzy Uncertainty How to Estimate Exected Shortfall When Probabilities Are Known with Interval or Fuzzy Uncertainty Christian Servin Information Technology Deartment El Paso Community College El Paso, TX 7995, USA cservin@gmail.com

More information

t 0 Xt sup X t p c p inf t 0

t 0 Xt sup X t p c p inf t 0 SHARP MAXIMAL L -ESTIMATES FOR MARTINGALES RODRIGO BAÑUELOS AND ADAM OSȨKOWSKI ABSTRACT. Let X be a suermartingale starting from 0 which has only nonnegative jums. For each 0 < < we determine the best

More information

1 Introduction The Asynchronous Transfer Mode (ATM) network is believed to be capable of supporting various services with drastically different traffi

1 Introduction The Asynchronous Transfer Mode (ATM) network is believed to be capable of supporting various services with drastically different traffi On Efficient Bandwidth Allocation and Call Admission Control for VBR Service Using UPC Parameters Λ Dapeng Wu and H. Jonathan Chao Department of Electrical Engineering, Polytechnic University, New York,

More information

Polynomial-Time Exact Schedulability Tests for Harmonic Real-Time Tasks

Polynomial-Time Exact Schedulability Tests for Harmonic Real-Time Tasks Polynomial-Time Exact Schedulability Tests for Harmonic Real-Time Tasks Vincenzo Bonifaci, Alberto Marchetti-Saccamela, Nicole Megow, Andreas Wiese Istituto di Analisi dei Sistemi ed Informatica Antonio

More information

THE SET CHROMATIC NUMBER OF RANDOM GRAPHS

THE SET CHROMATIC NUMBER OF RANDOM GRAPHS THE SET CHROMATIC NUMBER OF RANDOM GRAPHS ANDRZEJ DUDEK, DIETER MITSCHE, AND PAWE L PRA LAT Abstract. In this aer we study the set chromatic number of a random grah G(n, ) for a wide range of = (n). We

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

Location of solutions for quasi-linear elliptic equations with general gradient dependence

Location of solutions for quasi-linear elliptic equations with general gradient dependence Electronic Journal of Qualitative Theory of Differential Equations 217, No. 87, 1 1; htts://doi.org/1.14232/ejqtde.217.1.87 www.math.u-szeged.hu/ejqtde/ Location of solutions for quasi-linear ellitic equations

More information

Sums of independent random variables

Sums of independent random variables 3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where

More information

A New Perspective on Learning Linear Separators with Large L q L p Margins

A New Perspective on Learning Linear Separators with Large L q L p Margins A New Persective on Learning Linear Searators with Large L q L Margins Maria-Florina Balcan Georgia Institute of Technology Christoher Berlind Georgia Institute of Technology Abstract We give theoretical

More information

Adaptive estimation with change detection for streaming data

Adaptive estimation with change detection for streaming data Adative estimation with change detection for streaming data A thesis resented for the degree of Doctor of Philosohy of the University of London and the Diloma of Imerial College by Dean Adam Bodenham Deartment

More information

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies Online Aendix to Accomany AComarisonof Traditional and Oen-Access Aointment Scheduling Policies Lawrence W. Robinson Johnson Graduate School of Management Cornell University Ithaca, NY 14853-6201 lwr2@cornell.edu

More information

Resource Allocation for Video Streaming in Wireless Environment

Resource Allocation for Video Streaming in Wireless Environment Resource Allocation for Video Streaming in Wireless Environment Shahrokh Valaee and Jean-Charles Gregoire Abstract This paper focuses on the development of a new resource allocation scheme for video streaming

More information

A note on the random greedy triangle-packing algorithm

A note on the random greedy triangle-packing algorithm A note on the random greedy triangle-acking algorithm Tom Bohman Alan Frieze Eyal Lubetzky Abstract The random greedy algorithm for constructing a large artial Steiner-Trile-System is defined as follows.

More information

The Value of Even Distribution for Temporal Resource Partitions

The Value of Even Distribution for Temporal Resource Partitions The Value of Even Distribution for Temoral Resource Partitions Yu Li, Albert M. K. Cheng Deartment of Comuter Science University of Houston Houston, TX, 7704, USA htt://www.cs.uh.edu Technical Reort Number

More information

CONVOLVED SUBSAMPLING ESTIMATION WITH APPLICATIONS TO BLOCK BOOTSTRAP

CONVOLVED SUBSAMPLING ESTIMATION WITH APPLICATIONS TO BLOCK BOOTSTRAP Submitted to the Annals of Statistics arxiv: arxiv:1706.07237 CONVOLVED SUBSAMPLING ESTIMATION WITH APPLICATIONS TO BLOCK BOOTSTRAP By Johannes Tewes, Dimitris N. Politis and Daniel J. Nordman Ruhr-Universität

More information

Universal Finite Memory Coding of Binary Sequences

Universal Finite Memory Coding of Binary Sequences Deartment of Electrical Engineering Systems Universal Finite Memory Coding of Binary Sequences Thesis submitted towards the degree of Master of Science in Electrical and Electronic Engineering in Tel-Aviv

More information

The Noise Power Ratio - Theory and ADC Testing

The Noise Power Ratio - Theory and ADC Testing The Noise Power Ratio - Theory and ADC Testing FH Irons, KJ Riley, and DM Hummels Abstract This aer develos theory behind the noise ower ratio (NPR) testing of ADCs. A mid-riser formulation is used for

More information

A randomized sorting algorithm on the BSP model

A randomized sorting algorithm on the BSP model A randomized sorting algorithm on the BSP model Alexandros V. Gerbessiotis a, Constantinos J. Siniolakis b a CS Deartment, New Jersey Institute of Technology, Newark, NJ 07102, USA b The American College

More information

Estimation of Separable Representations in Psychophysical Experiments

Estimation of Separable Representations in Psychophysical Experiments Estimation of Searable Reresentations in Psychohysical Exeriments Michele Bernasconi (mbernasconi@eco.uninsubria.it) Christine Choirat (cchoirat@eco.uninsubria.it) Raffaello Seri (rseri@eco.uninsubria.it)

More information

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of

More information

Decoding Linear Block Codes Using a Priority-First Search: Performance Analysis and Suboptimal Version

Decoding Linear Block Codes Using a Priority-First Search: Performance Analysis and Suboptimal Version IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 3, MAY 1998 133 Decoding Linear Block Codes Using a Priority-First Search Performance Analysis Subotimal Version Yunghsiang S. Han, Member, IEEE, Carlos

More information

A Study of Active Queue Management for Congestion Control

A Study of Active Queue Management for Congestion Control A Study of Active Queue Management for Congestion Control Victor Firoiu vfiroiu@nortelnetworks.com Nortel Networks 3 Federal St. illerica, MA 1821 USA Marty orden mborden@tollbridgetech.com Tollridge Technologies

More information