An Auction Algorithm for Procuring Wireless Channel in A Heterogenous Wireless Network

Size: px
Start display at page:

Download "An Auction Algorithm for Procuring Wireless Channel in A Heterogenous Wireless Network"

Transcription

1 An Action Algorithm for Procring Wireless Channel in A Heterogenos Wireless Network N. Rama Sri Electronic Enterprises Laboratory, Department of Compter and Science and Atomation, Indian Institte of Science, Bangalore, India. nrsri@csa.iisc.ernet.in Y. Narahari Electronic Enterprises Laboratory, Department of Compter and Science and Atomation, Indian Institte of Science, Bangalore, India. hari@csa.iisc.ernet.in Abstract In this paper, we develop an action algorithm for procring wireless channel by a wireless node in a heterogeneos wireless network. We assme that the service providers of the heterogeneos wireless network are selfish and non-cooperative in the sense that they are interested in maximizing their own tilities. The wireless ser is in need of procring wireless channel to execte mltiple jobs. To solve the problem of wireless ser, we propose a reverse optimal (REVOPT) action. We characterize the expression for the expected payment by the wireless ser. Or proposed action mechanism REVOPT satisfies important game theoretic properties like Bayesian Incentive Compatibility and Individal Rationality. Keywords Heterogeneos wireless network, game theory, mechanism design, selfishness, rationality, individal rationality, Bayesian incentive compatibility, optimal action mechanisms. I. INTRODUCTION The primary goal in the wireless commnication world can be briefly smmarized as providing service for commnication anywhere, anytime, any-media and principally at high-data rates. However, this goal is in conflict with the existence of different rnning and emerging wireless systems covering almost the whole world, each one following its own architectre. The development of wireless systems evolved in an nimaginable way dring the last two decades. For example, in celllar wireless systems, the so-called First Generation (1G) is no longer in se. Crrently the dominant generations, which are nowadays attracting mch attention, are 2G, 2.5G and 3G. In Erope their representatives are GSM (Global System for Mobile Commnication), GPRS (General Packet Radio Service) and UMTS (Universal Mobile Telecommnications System) respectively and belong to the terrestrial wide area celllar systems. The circit-switched GSM provides very slow data rates ( kbps) to satisfy the brst applications, even after the appliance of High Speed Circit Switched Data (HSCSD), it does not overcome the limit of 40 kbps. Packetswitched networks, based on the access network of GSM with actal changes only in the core network (GPRS), appeared with the promise of higher bit rates (theoretically 172 kbps), bt in practice the maximm bit rate achieved is abot 45 kbps. The UMTS access network follows a different approach, in comparison to GSM and GPRS, making the achievement of higher data rates more feasible. UMTS offers data rates p to 384 kbps, even if in theory the 2 Mbps transfer rate is possible. Nevertheless, the actal performance of UMTS has still to be verified dring real operation conditions with heavy network loads. On the other hand, development in new radio access technologies and increase in ser demand for biqitos high speed access are driving the deployment of a wide array of wireless networks, ranging from wireless WAN to wireless MAN, Wireless LAN and Wireless PAN. These kind of networks provide incomparably high data rates. For example the b WLAN provides throghpt p to 5 Mbps, while the data rates in a can be p to over 25 Mbps, with the perspective to reach in the ftre the inconceivable limit of 155 Mbps. With complementary characteristics especially in terms of data rate and coverage of the varios wireless commnication technologies, the co-existence of these technologies reslts in a heterogeneos set of wireless commnications systems that can provide better commnication and service facilities to the mobile/wireless nodes. Sch heterogenos set of wireless commnication systems is called Heterogeneos Wireless Networks. There is another important reason for going towards heterogeneos wireless networks. In some type of wireless networks where there is no access point, sch as wireless ad hoc networks, protocols sffer in network performance that incldes large roting overhead, low throghpt, and large end-to-end delay. In sch networks, the isses of qality of service (QoS) are even more complicated becase of the lack of reliable methods to distribte information in the entire network. The integration of heterogeneos wireless technologies can improve the network performance, thereby meeting the demands for different qality of service (QoS). Heterogeneos wireless networks give satisfiable soltions to the problems we mentioned above. Heterogeneos wireless networks provide overlapping coverage to mobile sers. Its active components are based on different theoretical backgronds and are optimized for different

2 ranges. Heterogeneos wireless networks pose many interesting research challenges. Among which, resorce management in sch a hybrid environment is still an open problem. A. Problem Statement In this paper, we attempt to provide soltion to the following problem. We consider the sitation where a mobile/wireless ser has to perform a set of jobs, where each job is a parallel application and can be split over different wireless networks for exection. The mobile ser can access heterogeneos wireless networks provided by a set of selfish, intelligent, and noncooperative service providers. These service providers charge for allocating the wireless channel to the mobile/wireless sers. Ultimately, the problem for a mobile/wireless ser is to procre wireless channel to perform the jobs while minimizing the total amont to pay to the network service providers. So, there is a need for a mechanism that shold be optimal (i.e. in minimal sense) for the mobile ser and satisfy important game theoretic properties, say Bayesian incentive compatibility and individal rationality, so that the selfish and non-cooperative service providers participate in bidding for the time slots which are annonced by the wireless ser. B. Contribtions of the Paper As far as or knowledge is concerned, research is crrently going on developing action algorithms for wireless channel allocation in a single wireless network environment. The work presented in this paper is perhaps the earliest works in developing action based algorithms in heterogeneos wireless network environment. In this paper, we develop a noncooperative game theoretic based mechanism to solve the wireless channel procrement problem of a wireless/mobile ser having access to a heterogeneos wireless network. Or work can be organized in the following way. We first define what we call Resorce Procrement Action to explain the context of the problem. Then, we formlate Resorce Procrement Action as a mechanism design problem in a qasi-linear environment. We next design a reverse optimal (REVOPT) mechanism for Resorce Procrement Action problem. In this design, we characterize both the allocation rle and payment rle of REVOPT action mechanism. Finally, we compte an expression for the optimal (in minimal sense) total payment by the wireless/mobile ser sing or approach. C. Organization of the Paper The paper is organized in the following. Section 2 provides a review of the related literatre. In Section 3, we define Resorce Procrement Action and also formlate it as a mechanism design problem in a qasi-linear environments. We present the REVOPT action mechanism in Section 4. We conclde the paper in Section 5. II. RELATED WORK In this section, we present the related work from the literatre. As we are concerned with developing action based mechanism to the resorce procrement problem in heterogeneos wireless networks, we present the review of the literatre in two parts. In Section II(A), we present the research work in the area of heterogeneos wireless networks and resorce management. In Section II(B), we deal with the review of related literatre work on reverse actions. A. Research Work on Heterogeneos Wireless Networks Examples of integrated heterogeneos wireless networks inclde ad hoc/celllar integrated networks. W, Mkherjee, and Chan proposed mobile-assisted connection-admission (MACA) channel allocation scheme to achieve load balancing in a celllar network [1]. In MACA, some special channels are sed to connect mobile nits from different cells. When a mobile nit cannot connect to its own base station de to heavy load, it may be able to get connected to its neighboring cells base station throgh a two-hop link. A similar approach, integrated celllar and ad hoc relaying systems (icar), is proposed by W et al. in [2]. It addresses the congestion problem de to nbalanced traffic in a celllar system and provides interoperability for heterogeneos networks. The basic idea is to place a nmber of ad hoc repaying stations at strategic locations, which can be sed to relay signals between mobile hosts and base stations. In [3], Brewer, et al. present the reslts of the BAR- WAN project, which focsed on enabling trly sefl mobile networking across an extremely wide variety of real-world networks and mobile devices. The athors present the overall architectre that enables seamless roaming in a single logical overlay network composed of many heterogeneos (mostly wireless) physical networks, and provides significantly better TCP performance for these networks. It also provides complex scalable and highly available services to enable powerfl capabilities across a very wide range of mobile devices, and mechanisms for atomated discovery and configration of localized services. Topology Control in Heterogeneos Wireless Networks is addressed for the first time in [4]. This presents the possible topology control problems in these networks and provides soltions to these problems. It proposes two localized topology control algorithms for heterogeneos wireless mltihop networks with non-niform transmission ranges: Directed Relative Neighborhood Graph (DRNG) and Directed Local Minimm Spanning Tree (DLMST). In both algorithms, each node selects a set of neighbors based on the locally collected information. In [5], the athors present novel network scenarios where wired and wireless connections are melted together, a real measre of these parameters is fndamental in a planning process of new services over novel network infrastrctres. Nowadays networks are heterogeneos in terms of access network technologies (wired LAN Ethernet 10/100/1000, Wireless LAN a, b, g -, GPRS, UMTS, GSM, Bletooth,...), end-sers devices (workstation, PC desktop, Laptop/Notebook, PDA, Advanced Mobile Phone,...) and finally operating systems (Unix, Linx, Win 98/NT/2000/XP,

3 Win CE, Linx Familiar, OS Embedded,...). The athors also provide a heterogeneos network performance characterization with respect to delay and throghpt in UDP and TCP environments. Kyriazakos, et al. investigated the real-time radio resorce management in heterogeneos wireless networking environments in [6]. The athors presented a methodology and an approach for designing a hierarchical system that is agmenting the fnctionality of wireless network architectres by enforcing smooth co-operation and is capable to react when resorce shortcomings appear. Qadeer, et al. in [7] presented an approach for power management of the wireless network interfaces (WNIC) for heterogeneos wireless networks. The athors develop an integrated approach for the management of power and performance of mobile devices for these environments. Their policy decides which WNIC to employ for a given application and optimizes its sage based on the crrent power and performance needs of the system. The policy dynamically switches between WNICs dring program exection if data commnication reqirements and/or network conditions change. Sliman et al. for the first time introdced cooperative game theoretic concepts for resorce allocation in heterogeneos wireless networks in [8]. Bt, this paper does not provide the mathematical modelling of the cooperative game associated with the resorce allocation problem in which different wireless network service providers cooperate among themselves. In contrast to this approach, we consider the sitation where the service providers of the heterogeneos wireless network are selfish, intelligent, and non-cooperative in the sense that they are interested in maximizing their own tilities. We provide rigoros mathematical modelling of or model. B. Research Work on Reverse Actions Actions are concerned with the design of certain rles of interaction sing the tools of game theory and mechanism design [9], [10], for electronic transactions that will, in principle, yield some desired otcome. In the context of negotiations for procrement we reqire rles governing: (1)bidding for contracts, (2)the isses and attribtes that will be considered to determine winner(s) of the contract, (3)determination of winning sppliers, and (4)payments that will be made. English actions and Dtch actions, and sealed bid contracts are well nderstood, widely sed economic mechanisms in the context of reverse actions. Since the rles of interaction in these actions are well laid ot, they have been a natral target for atomation. A comprehensive srvey on reverse action based mechanisms appears in [11]. Other recent srveys can be fond in [12],[13]. III. RESOURCE PROCUREMENT AUCTION We consider the resorce procrement problem for a mobile ser having access to heterogeneos wireless networks provided by a set of selfish and non-cooperative service providers. We assme that the mobile ser is eqipped with mltiple network interfaces in order to access heterogeneos wireless networks. The mobile ser has a set of different jobs to be performed. The worth to the mobile ser by different jobs is also different. So, the time slots for getting access to wireless channel to perform these jobs also worth differently to the wireless/mobile ser. Withot loss of generality, we assme that the mobile ser annonces the time slots in decreasing order of the preference. It means that the vale of the mobile ser for the first time slot is more when compared to the second time slot, the vale for the second time slot is more when compared to the third time slot, so on. Once the time slots are annonced, then the service providers will sbmit bids on them. Having received the bids, the mobile ser ses a mechanism for selecting the winning bids and deciding the payment to the winning bidders. We call this action mechanism Resorce Procrement Action. The payment by the mobile ser to the winning service providers depends on the bids sbmitted by the service providers (bidders). Now, let s assme there are n service providers and N = {1, 2,..., n} represents the set of service providers. Let there are m time slots annonced by the mobile ser and M = {1, 2,..., m} represents the set of time slots to be actioned. Let θ = (θ 1, θ 2,..., θ n ) be the vector of bids received from these n service providers. Let p i (θ) be the payment to the service provider i by the mobile ser, when the vector of bids of the service providers is θ. A. Resorce Procrement Action as Mechanism Design Problem To model Resorce Procrement Action as mechanism design problem, we will make the following for assmptions. These for assmptions are treated as bench mark assmptions for the design of actions from the literatre point of view. 1) Risk Netral: The heterogeneos wireless network service providers are risk netral. 2) Independent Private Vale (IPV) Model: Each wireless network service provider knows the vale of a particlar time slot that he is going to bid and does not know the vale of the other wireless network service providers. Each service provider perceives any other service provider s valation as a draw from some probability distribtion. In the same fashion, he knows that the other service providers regard his own valation as a draw from some probability distribtion. More precisely, for service provider i, i = 1, 2,..., n, there is some probability distribtion Φ i (.) from which he draws his valation θ i for the time slot. Any service provider s valation is statistically independent from any other service provider s valation. The valation θ i can be viewed as his private vale. Let Θ i, i = 1, 2,..., n denote the set of all possible types of service provider i and assme that Θ i is a closed interval of the real line, that is Θ i = [ l, θ i ]. This implies that Φ i(.), i = 1, 2,..., n are probability distribtion fnctions of

4 the random variables Θ i, i = 1, 2,..., n. 3) Symmetry among Service Providers: The service providers are symmetric in the following sense: Θ 1 =Θ 2 =... = Θ n = Θ Φ 1 (.) = Φ 2 (.)=... = Φ n (.) = Φ(.) 4) Properties of Φ(.) and Θ: We assme that Φ(.) satisfy the following properties: Θ = [θ l, θ ] θ l > 0 φ(θ) = Φ (θ) > 0; θ l θ θ Under this setting, we can formlate the resorce procrement action as mechanism design problem. The following are the main components of the Resorce Procrement Action mechanism design problem. 1) Otcome Set X: An otcome in or mechanism design problem can be represented by a vector x = ((y ij ) i N,j M, (p i ) i N ), where y ij is the probability that service provider i is the winner for the time slot j and p i is the payment received by i th service provider. The set of all feasible alternatives is represented in the following way. X = {((y ij ) i N,j M, (p i ) i N ) y ij [0, 1], n i=1 y ij 1, m j=1 y ij 1, p i 0, i N, j M} 2) Utility Fnction of Service Providers ( i (.)): The Bernolli tility fnction of the i th service provider is given by, i (x, θ i ) = ( m j=1 y ij)(p i θ i ) 3) Social Choice Fnction (f(.)): The general strctre of the social choice fnction for this type of problems is, f(θ) = ((y ij ) i N,j M, (p i ) i N ) Note that y ij (θ) depends on allocation rle and p i (θ) depends on the payment rle. Now nder these for benchmark assmptions, a resorce procrement action can be viewed as a direct revelation mechanism Λ = ((Θ i ) i N, f(.)) in qasi linear environment, where Θ i is the type set of an service provider i and f(.) is the social choice fnction. A mechanism Λ combined with possible types of the service providers (Θ 1, Θ 2,..., Θ n ), probability density φ(.), and Bernolli tility fnctions ( 1 (.), 2 (.),..., n (.)) defines a Beyesian game of incomplete information which gets indced among the service providers after the mobile ser annonces the time slots. The indced Bayesian Game Γ b can be given in the following manner Γ b = (N, (Θ i ) i N, (Θ i ) i N, φ(.), ( i ) i N ) where i : Θ Θ R is the tility fnction of agent i and is defined in the following manner i (θ, θ) = i (f(θ ), θ i ) where Θ = i N Θ i. A strategy for the service provider i in the above game Γ b is a fnction s i : Θ i Θ i giving service provider i s contingent bidding plan of revealing his own type based on his actal type θ i. Depending on kind of mechanism the mobile ser ses, the service providers decide their bidding strategy. The strategies selected by the service providers in trn decide the payment made by the mobile ser. There comes Game theory into the sitation to analyze the existing scenario. It says that each bidder will follow the bidding strategy s i (.) sch that the strategy profile (s 1(.), s 2(.),..., s n) is a Bayesian Nash eqilibrim of the game Γ b indced by the mechanism that the mobile ser ses. Some natral qestions that arise in this context are the following. What kind of mechanism that the mobile ser imposes to procre resorces in an optimal way (i.e. minimizing the total payment)? What are the key game theoretic properties the mechanism has to satisfy? We will answer these qestions in the rest of this paper. In general, the mechanism that the mobile ser imposes shold give minimm payment (to pay to the winning service providers) and satisfy the following two important properties of a social choice fnction. Individal Rationality: The service providers participation in the action is volntary in the sense that the mobile ser shold not force them to participate in the action mechanism. As a reslt, the service provider will choose to participate in the mechanism only if he loses nothing ot of participating in the action. This is known as individal rationality constraints. So, in order to ensre the service provider i s participation in the mechanism, after he has learned his actal type as θ i, the following interim individal rationality constraints mst be satisfied U i (θ i f) = E θ i [ i (f(θ i, θ i ) θ i )] 0, θ i Θ i where U i (θ i f) is service provider i s interim expected tility nder social choice fnction f(.) when his type is θ i. Incentive Compatibility: The service providers prefer to have an action mechanism Λ for which trth telling is the eqilibrim strategy for all the service providers. The reason being for this is that some times it is very difficlt to compte the optimal strategy in closed form given the bidders are bonded rational. These constraints are called Incentive Compatibility constraints. Depending on the type of the eqilibrim concept in hand, there are two types of incentive compatibility constraints. Dominant Strategy Incentive Compatibility: The social choice fnction f(.) is said to be dominant strategy incentive compatible if the direct revelation mechanism Λ = ((Θ i ) i N, f(.)) has a dominant strategy eqilibrim s = (s 1(.), s 2(.),..., s n(.)), where s i (θ i) = θ i, θ i Θ i,, i N

5 Bayesian Incentive Compatibility: The social choice fnction f(.) is said to be Bayesian incentive compatible if the direct revelation mechanism Λ = ((Θ i ) i N, f(.)) has a Bayesian Nash eqilibrim s = (s 1(.), s 2(.),..., s n(.)), where s i (θ i) = θ i, θ i Θ i, i N In order to make the work of the service providers simpler, it is better to choose a mechanism Λ = ((Θ i ) i N, f(.)) sch that the social choice fnction f(.) is ideally dominant strategy incentive compatible. IV. REVERSE OPTIMAL MECHANISM (REVOPT) From the previos section, it is desirable for the mobile ser to have a mechanism which minimizes the expected payment along with satisfying the properties of individal rationality and Bayesian incentive compatibility. Myerson stdied sch type of action mechanisms in the context of selling (i.e. forward action settings) a single individal item [14]. Myerson called sch an action mechanism as optimal action. In this paper, we are considering the case where mltiple items (i.e. time slots) are procred (i.e. reverse action settings) by the mobile ser from the non-cooperative and selfish service providers. So, we call or proposed approach Reverse Optimal (REVOPT) action. As mentioned in Section III, we assme there are n service providers and N = {1, 2,..., n} represents the set of service providers. Let there are m time slots annonced by the mobile ser and M = {1, 2,..., m} represents the set of time slots to be actioned. Let θ = (θ 1, θ 2,..., θ n ) be the vector of bids received from these n service providers. Let p i (θ) be the payment to the service provider i by the mobile ser, when the vector of bids of the service providers is θ. The Bernolli tility fnction of service provider i is given by i (f(θ), θ i ) = ( m j=1 y ij(θ))(p i (θ) θ i ) = v i (y(θ))(p i (θ) θ i ) = t(θ i ) v i (y(θ))θ i where v i (y(θ)) = ( m j=1 y ij(θ)) is known as vale fnction of the service provider i. t i (θ) = v i (y(θ))p i (θ) denotes the payment to the service provider by the mobile ser. Now expected payment, t i (ˆθ i ), to the service provider i when he annonces his type to be ˆθ i and all the service providers j i trthflly reveal their type is given by t i (ˆθ i ) = E θ i [t i (ˆθ i, θ i )] A similar expression for the valation fnction of i th service provider is i (ˆθ i ) = E θ i [v i (y(ˆθ i, θ i ))] Now, the expected tility of i th service provider when his type θ i is given by, U i (θ i ) = t i (θ i ) i (θ i )θ i (1) A social choice fnction that the mobile ser chooses in this environment is in the form f(.) = ((y ij ) i N,j M, (t i ) i N ). We want this social choice fnction to satisfy individal rationality and Bayesian incentive compatibility, which are mentioned in the previos section. For the above mentioned social choice fnction to satisfy the interim individal rationality constraints, the following eqation mst be hold. i N, θ i Θ i U i (θ i ) = E θ i [ i (f(θ i, θ i ), θ i ) θ i ] = t i (θ i ) i (θ i )θ i 0 becase the service providers are always free to participate in the bidding of time slots. Now, we need to characterize the conditions nder which the above social choice fnction satisfies the Bayesian Incentive compatibility. The following Proposition serves the reqirement. Proposition-1: The social choice fnction, f(.) = ((y ij ) i N,j M, (t i ) i N ), chosen by the mobile ser is Bayesian incentive compatible if and only if, i N, (i) i (.) is non-increasing, (ii) U i (θ i ) = U i ( l) i l i (s)ds, θ i Θ i. Proof:(a) Necessity: Bayesian incentive compatibility implies that for each ˆθ i > θ i we have, and Ths, U i (θ i ) t i (ˆθ i ) θ i i (ˆθ i ) = U i (ˆθ i ) + (ˆθ i θ i ) i (ˆθ i ), U i (ˆθ i ) t i (θ i ) ˆθ i i (θ i ) = U i (θ i ) + (θ i ˆθ i ) i (θ i ). i (θ i ) U i(θ i ) U i (ˆθ i ) ˆθ i θ i i (ˆθ i ) This expression immediately implies that i (.) mst be nonincreasing (since we have taken ˆθ i > θ i ). In addition, letting ˆθ i θ i and sing the above expression, we have θ i and so U i (θ i) = i (θ i ) U i (θ i ) = U i ( l) i l i (s)ds, θ i Θ i. This completes the proof for the necessary conditions. (b) Sfficiency: Consider any θ i and ˆθ i and sppose withot loss of generality θ i > ˆθ i holds. If the conditions (i) and (ii) in the statement of the proposition hold, then Hence, U i (θ i ) U i (ˆθ i ) = i ˆθ i i (s)ds i ˆθ i i (ˆθ i )ds = (θ i ˆθ i ) i ( θ i ) U i (θ i ) U i (ˆθ i ) (θ i ˆθ i ) i ( θ i ) (2) = t i (ˆθ i ) θ i i (ˆθ i ) (3)

6 Similarly, we can derive the following expression for the case where ˆθ i θ i, U i (ˆθ i ) U i (θ i ) (ˆθ i θ i ) i (θ i ) (4) = t i (θ i ) ˆθ i i (θ i ) (5) Eqations (3) and (4) establish the reqired sfficiency conditions. So, f(.) is Bayesian incentive compatible. Q.E.D. A social choice fnction chosen by the mobile ser in the environment is a fnction f(.) = ((y ij ) i N,j M, (t i ) i N ) having the properties that, y ij (θ) [0, 1], i N, j M, θ Θ, j M y ij(θ) 1, i N y ij(θ) 1, and i N t i(θ) being the total payment by the mobile ser. The mobile ser s reverse optimal mechanism can be written as one of choosing fnctions (y ij ) i N,j M and (U i (.)) i N to solve i i=1 { l i (θ i )θ i + U i (θ i )} φ i (θ i )dθ i sbject to (i) (ii) (iii) (iv) i (.) is non-increasing, i N y ij (θ) [0, 1], m j=1 y ij(θ) 1, i=1 y ij(θ) 1, i N, j M, θ Θ U i (θ i ) = U i ( l) i l i (s)ds, i N, θ i Θ i U i (θ i ) 0, i N, θ i Θ i In this formlation, the objective fnction corresponds to the total expected payment by the mobile ser to all service providers. Here note that constraint (iv) is service provider s individal rationality constraints, constraint (i)&(iii) are the necessary and sfficient conditions for the social choice fnction f(θ) = ((y ij (θ)) i N,j M, (t i (θ)) i N ) to be Bayesian incentive compatible from Proposition-1. Note that if constraint (iii) is satisfied, then constraint (iv) will be satisfied if and only if (v) U i ( l) i l i (s)ds, i N So, we can replace constraint (iv) with constraint (v). Next, sbstitting for U i (θ i ) in the objective fnction from constraint (iii), we get { i i=1 l i (θ i )θ i + U i ( l) } θ i l i (s)ds φ i (θ i )dθ i Integrating by parts the above eqation, the mobile ser problem can be written as one of choosing the fnctions y ij (.) and the vales U 1 (θ1), l U 2 (θ2), l..., U n (θn) l sch that 1... n { θ1 l θn l i=1 v i(θ i )J i (θ i )} { n i=1 φ i(θ i )} dθ n... dθ 1 + i=1 U i( l) sbject to constraints (i), (ii), and (v), where J i (θ i ) = θ i 1 Φ i(θ i ) φ i (θ i ) = θ i Φ i (θ i ) φ i (θ i ). It is evident that soltion mst have U i ( l) = i l i (s)ds, i N. Hence the mobile ser s optimization problem redces to choosing fnctions y ij (.) sch that, 1... n { θ1 l θn l i=1 v i(θ i )J i (θ i )} { n i=1 φ i(θ i )} dθ n... dθ 1 + i=1 l i (s)ds sbject to (i) (ii) i (.) is non-increasing, i N y ij (θ) [0, 1], m j=1 y ij(θ) 1, i=1 y ij(θ) 1, i N, j M, θ Θ Let s ignore the constraint (i) for the moment. Then the above optimization problem indicates that y ij (.) is a soltion to this relaxed problem iff i N, we have y ij = 0 j = 1, 2,..., m : ifj i (θ i ) > 0 1 j = 1, 2,..., m < n : ifj i (θ i ) = J(j) 1 j = 1, 2,..., m n : ifj i (θ i ) = J(j) 0 : otherwise where J(j) is the j th lowest among J i (θ i ), i N. It says, if we ignore the constraint (i), then y ij is a soltion to the relaxed problem iff any the service provider for whom the vale J i (θ i ) is positive, no time slot is assigned and the rest of the service providers will be assigned to the time slots in the same order as the vales of J i (θ i ) starting from the lowest possible vale. That is, the first time slot is allocated to the service provider who has the highest negative vale for J i (θ i ), the second time slot is assigned to the service provider who has the second highest negative vale for J i (θ i ), and so on. This completes the characterization of the allocation rle of the social choice fnction chosen by the mobile ser. Now, we will characterize the payment rle in the social choice fnction. t i (θ) = t i (θ i ) = θ i i (θ i ) + U i (θ i ) = θ i i (θ i ) + U i ( l) i l i (s)ds = θ i i (θ i ) where i (θ i ) is expected vale of the i th service provider and i (θ i ) = E θ i [v i (y(θ))] = E θ i [ m j=0 y ij(θ)] This completes the analysis on the strctre of REVOPT mechanism chosen by the mobile ser. Using this action mechanism the total payment, P REV OP T, by the mobile ser for procring wireless channel is given by (nder bench mark assmptions) P REV OP T = n θ=θ l t(θ)φ(θ)dθ V. CONCLUSIONS AND FUTURE WORK In this paper, we addressed the problem of procring resorces by the wireless/mobile ser in non-cooperative heterogenos wireless networks. We have proposed a reverse optimal action (REVOPT) mechanism to solve this problem. We characterized the allocation rle and payment rle in or soltion. This proposed action mechanism satisfies important game theoretic properties like individal rationality and incentive compatibility.

7 In the above design, we assmed the service providers of heterogeneos wireless network are selfish and noncooperative. Bt in real world sitations, the service providers can collde with each other to improve their tilities rather than being individal. We are interested in looking into these aspects sing cooperative game theory. ACKNOWLEDGMENT I wold like to thank Mr. Dinesh Garg and S. Siva Sankar Reddy for their sefl discssions and comments on this work. I also wold like to thank Mr. T.S. Chandrasekhar and all other lab-mates for their continos help and cooperation. REFERENCES [1] X. W, B. Mkherjee, and G.-H. Chan, Maca: An efficient channel allocation scheme in celllar network, in IEEE GlobeCom, [2] H. W, C. Qiao, S. De, and O. Tongz, Integrated celllar and ad hoc relaying system: icar, IEEE Jornal on Selected Areas in Commnications, vol. 19, no. 10, pp , October, [3] E.A. Brewer, R.H. Katz, E. Amir, H. Balakrishnan, Y. Chawathe, A. Fox, S.D. Gribble, T. Hodes, G. Ngyen, V.N. Padmanabhan, M. Stemm, S. Seshan, and Henderson T., A network architectre for heterogeneos mobile compting, IEEE Personal Commnication, vol. 5, no. 5, pp. 8 24, [4] N. Li and Jennifer C. Ho, Topology control in heterogeneos wireless networks: problems and soltions, in IEEE INFOCOM, [5] G. Iannello1, A. Pescap e, G. Ventre, and L. Vollero, Experimental analysis of heterogeneoswireless networks, in WWIC, [6] S. Kyriazakos, G. Karetsos, F.D. Giandomenico, F. Casadeval, M. Jbera, I. Mra, N. Tselikas, and K. Vlahodimitropolos, Managing resorces in heterogeneos wireless networking environments, Tech. Rep., National Technical University of Athens, Greece, [7] W. Qadeer1, T.S. Rosing, J. Ankcorn, V. Krishnan, and G.D. Micheli1, Heterogeneos wireless network management, in PACS, [8] I. M. Sliman, C. Pomalaza-Rez, J. Lehtomki, and I. Oppermann, Radio resorce allocation in heterogeneos wireless networks sing cooperative games, in Nordic Radio Symposim 2004 / Finnish Wireless Commnications Workshop 2004, [9] Roger B. Myerson, Game Theory: Analysis of Conflict, Harvard University Press, Cambridge, Massachsetts, [10] A.S. Mas-Colell, M.D. Whinston, and J.R. Green, Microeconomic Theory, Oxford University Press, New York, [11] T.S. Chandrasekhar, Y. Narahari, C. Rosa, D. Klkarni, J.D. Tew, and P. Dayama, Action based mechanisms for electronic procrement, Tech. Rep., Indian Institte of Science, Bangalore, India, [12] W. Elmaghraby and P. Keskinocak, Combinatorial Actions in Procrement, In Practice of Spply Chain Management: Where Theory and Practice Converge, Klwer Academic Pblishers, USA, [13] M. Bichler, A. Davenport, G. Hohner, and J. Kalagnanam, Indstrial Procrement Actions, In P. Cramption, Y. Shoam, and R. Steiberg, Combinatoroal Actions. The MIT Press, Cambridge, Massachsetts, USA, [14] R.B. Myerson, Optimal action design, Mathematics of Operations Research, vol. 6, pp , 1981.

Game Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India July 2012

Game Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India July 2012 Game Theory Lecture Notes By Y. Narahari Department of Computer Science and Automation Indian Institute of Science Bangalore, India July 2012 Myerson Optimal Auction Note: This is a only a draft version,

More information

Modelling by Differential Equations from Properties of Phenomenon to its Investigation

Modelling by Differential Equations from Properties of Phenomenon to its Investigation Modelling by Differential Eqations from Properties of Phenomenon to its Investigation V. Kleiza and O. Prvinis Kanas University of Technology, Lithania Abstract The Panevezys camps of Kanas University

More information

where v ij = [v ij,1,..., v ij,v ] is the vector of resource

where v ij = [v ij,1,..., v ij,v ] is the vector of resource Echo State Transfer Learning for ata Correlation Aware Resorce Allocation in Wireless Virtal Reality Mingzhe Chen, Walid Saad, Changchan Yin, and Méroane ebbah Beijing Laboratory of Advanced Information

More information

Bayes and Naïve Bayes Classifiers CS434

Bayes and Naïve Bayes Classifiers CS434 Bayes and Naïve Bayes Classifiers CS434 In this lectre 1. Review some basic probability concepts 2. Introdce a sefl probabilistic rle - Bayes rle 3. Introdce the learning algorithm based on Bayes rle (ths

More information

Essentials of optimal control theory in ECON 4140

Essentials of optimal control theory in ECON 4140 Essentials of optimal control theory in ECON 4140 Things yo need to know (and a detail yo need not care abot). A few words abot dynamic optimization in general. Dynamic optimization can be thoght of as

More information

Performance analysis of GTS allocation in Beacon Enabled IEEE

Performance analysis of GTS allocation in Beacon Enabled IEEE 1 Performance analysis of GTS allocation in Beacon Enabled IEEE 8.15.4 Pangn Park, Carlo Fischione, Karl Henrik Johansson Abstract Time-critical applications for wireless sensor networks (WSNs) are an

More information

Network Coding for Multiple Unicasts: An Approach based on Linear Optimization

Network Coding for Multiple Unicasts: An Approach based on Linear Optimization Network Coding for Mltiple Unicasts: An Approach based on Linear Optimization Danail Traskov, Niranjan Ratnakar, Desmond S. Ln, Ralf Koetter, and Mriel Médard Abstract In this paper we consider the application

More information

On Multiobjective Duality For Variational Problems

On Multiobjective Duality For Variational Problems The Open Operational Research Jornal, 202, 6, -8 On Mltiobjective Dality For Variational Problems. Hsain *,, Bilal Ahmad 2 and Z. Jabeen 3 Open Access Department of Mathematics, Jaypee University of Engineering

More information

Formal Methods for Deriving Element Equations

Formal Methods for Deriving Element Equations Formal Methods for Deriving Element Eqations And the importance of Shape Fnctions Formal Methods In previos lectres we obtained a bar element s stiffness eqations sing the Direct Method to obtain eact

More information

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2

Lecture Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 BIJU PATNAIK UNIVERSITY OF TECHNOLOGY, ODISHA Lectre Notes On THEORY OF COMPUTATION MODULE - 2 UNIT - 2 Prepared by, Dr. Sbhend Kmar Rath, BPUT, Odisha. Tring Machine- Miscellany UNIT 2 TURING MACHINE

More information

Sensitivity Analysis in Bayesian Networks: From Single to Multiple Parameters

Sensitivity Analysis in Bayesian Networks: From Single to Multiple Parameters Sensitivity Analysis in Bayesian Networks: From Single to Mltiple Parameters Hei Chan and Adnan Darwiche Compter Science Department University of California, Los Angeles Los Angeles, CA 90095 {hei,darwiche}@cs.cla.ed

More information

Contract Complexity, Incentives, and the Value of Delegation

Contract Complexity, Incentives, and the Value of Delegation Contract Complexity, Incentives, and the Vale of Delegation NAHUM MELUMAD Gradate School of Bsiness Colmbia University New York, NY 007 DILIP MOOKHERJEE Boston University Boston, MA 05 STEFAN REICHELSTEIN

More information

Worst-case analysis of the LPT algorithm for single processor scheduling with time restrictions

Worst-case analysis of the LPT algorithm for single processor scheduling with time restrictions OR Spectrm 06 38:53 540 DOI 0.007/s009-06-043-5 REGULAR ARTICLE Worst-case analysis of the LPT algorithm for single processor schedling with time restrictions Oliver ran Fan Chng Ron Graham Received: Janary

More information

Queueing analysis of service deferrals for load management in power systems

Queueing analysis of service deferrals for load management in power systems Qeeing analysis of service deferrals for load management in power systems Andrés Ferragt and Fernando Paganini Universidad ORT Urgay Abstract With the advent of renewable sorces and Smart- Grid deployments,

More information

Game Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India July 2012

Game Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India July 2012 Game Theory Lecture Notes By Y. Narahari Department of Computer Science and Automation Indian Institute of Science Bangalore, India July 2012 The Vickrey-Clarke-Groves Mechanisms Note: This is a only a

More information

Lecture Notes: Finite Element Analysis, J.E. Akin, Rice University

Lecture Notes: Finite Element Analysis, J.E. Akin, Rice University 9. TRUSS ANALYSIS... 1 9.1 PLANAR TRUSS... 1 9. SPACE TRUSS... 11 9.3 SUMMARY... 1 9.4 EXERCISES... 15 9. Trss analysis 9.1 Planar trss: The differential eqation for the eqilibrim of an elastic bar (above)

More information

EOQ Problem Well-Posedness: an Alternative Approach Establishing Sufficient Conditions

EOQ Problem Well-Posedness: an Alternative Approach Establishing Sufficient Conditions pplied Mathematical Sciences, Vol. 4, 2, no. 25, 23-29 EOQ Problem Well-Posedness: an lternative pproach Establishing Sfficient Conditions Giovanni Mingari Scarpello via Negroli, 6, 226 Milano Italy Daniele

More information

A Theory of Markovian Time Inconsistent Stochastic Control in Discrete Time

A Theory of Markovian Time Inconsistent Stochastic Control in Discrete Time A Theory of Markovian Time Inconsistent Stochastic Control in Discrete Time Tomas Björk Department of Finance, Stockholm School of Economics tomas.bjork@hhs.se Agatha Mrgoci Department of Economics Aarhs

More information

QUANTILE ESTIMATION IN SUCCESSIVE SAMPLING

QUANTILE ESTIMATION IN SUCCESSIVE SAMPLING Jornal of the Korean Statistical Society 2007, 36: 4, pp 543 556 QUANTILE ESTIMATION IN SUCCESSIVE SAMPLING Hosila P. Singh 1, Ritesh Tailor 2, Sarjinder Singh 3 and Jong-Min Kim 4 Abstract In sccessive

More information

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance

Optimal Control of a Heterogeneous Two Server System with Consideration for Power and Performance Optimal Control of a Heterogeneos Two Server System with Consideration for Power and Performance by Jiazheng Li A thesis presented to the University of Waterloo in flfilment of the thesis reqirement for

More information

Prandl established a universal velocity profile for flow parallel to the bed given by

Prandl established a universal velocity profile for flow parallel to the bed given by EM 0--00 (Part VI) (g) The nderlayers shold be at least three thicknesses of the W 50 stone, bt never less than 0.3 m (Ahrens 98b). The thickness can be calclated sing Eqation VI-5-9 with a coefficient

More information

Universal Scheme for Optimal Search and Stop

Universal Scheme for Optimal Search and Stop Universal Scheme for Optimal Search and Stop Sirin Nitinawarat Qalcomm Technologies, Inc. 5775 Morehose Drive San Diego, CA 92121, USA Email: sirin.nitinawarat@gmail.com Vengopal V. Veeravalli Coordinated

More information

Study on the impulsive pressure of tank oscillating by force towards multiple degrees of freedom

Study on the impulsive pressure of tank oscillating by force towards multiple degrees of freedom EPJ Web of Conferences 80, 0034 (08) EFM 07 Stdy on the implsive pressre of tank oscillating by force towards mltiple degrees of freedom Shigeyki Hibi,* The ational Defense Academy, Department of Mechanical

More information

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled.

Classify by number of ports and examine the possible structures that result. Using only one-port elements, no more than two elements can be assembled. Jnction elements in network models. Classify by nmber of ports and examine the possible strctres that reslt. Using only one-port elements, no more than two elements can be assembled. Combining two two-ports

More information

Nonlinear parametric optimization using cylindrical algebraic decomposition

Nonlinear parametric optimization using cylindrical algebraic decomposition Proceedings of the 44th IEEE Conference on Decision and Control, and the Eropean Control Conference 2005 Seville, Spain, December 12-15, 2005 TC08.5 Nonlinear parametric optimization sing cylindrical algebraic

More information

Chapter 3. Preferences and Utility

Chapter 3. Preferences and Utility Chapter 3 Preferences and Utilit Microeconomics stdies how individals make choices; different individals make different choices n important factor in making choices is individal s tastes or preferences

More information

Multi-Voltage Floorplan Design with Optimal Voltage Assignment

Multi-Voltage Floorplan Design with Optimal Voltage Assignment Mlti-Voltage Floorplan Design with Optimal Voltage Assignment ABSTRACT Qian Zaichen Department of CSE The Chinese University of Hong Kong Shatin,N.T., Hong Kong zcqian@cse.chk.ed.hk In this paper, we stdy

More information

PREDICTABILITY OF SOLID STATE ZENER REFERENCES

PREDICTABILITY OF SOLID STATE ZENER REFERENCES PREDICTABILITY OF SOLID STATE ZENER REFERENCES David Deaver Flke Corporation PO Box 99 Everett, WA 986 45-446-6434 David.Deaver@Flke.com Abstract - With the advent of ISO/IEC 175 and the growth in laboratory

More information

Department of Industrial Engineering Statistical Quality Control presented by Dr. Eng. Abed Schokry

Department of Industrial Engineering Statistical Quality Control presented by Dr. Eng. Abed Schokry Department of Indstrial Engineering Statistical Qality Control presented by Dr. Eng. Abed Schokry Department of Indstrial Engineering Statistical Qality Control C and U Chart presented by Dr. Eng. Abed

More information

Discontinuous Fluctuation Distribution for Time-Dependent Problems

Discontinuous Fluctuation Distribution for Time-Dependent Problems Discontinos Flctation Distribtion for Time-Dependent Problems Matthew Hbbard School of Compting, University of Leeds, Leeds, LS2 9JT, UK meh@comp.leeds.ac.k Introdction For some years now, the flctation

More information

Section 7.4: Integration of Rational Functions by Partial Fractions

Section 7.4: Integration of Rational Functions by Partial Fractions Section 7.4: Integration of Rational Fnctions by Partial Fractions This is abot as complicated as it gets. The Method of Partial Fractions Ecept for a few very special cases, crrently we have no way to

More information

Strategic Timing of Content in Online Social Networks

Strategic Timing of Content in Online Social Networks Strategic Timing of Content in Online Social Networks Sina Modaresi Department of Indstrial Engineering, University of Pittsbrgh, Pittsbrgh PA 56, sim3@pitt.ed Jan Pablo Vielma Sloan School of Management,

More information

Joint Transfer of Energy and Information in a Two-hop Relay Channel

Joint Transfer of Energy and Information in a Two-hop Relay Channel Joint Transfer of Energy and Information in a Two-hop Relay Channel Ali H. Abdollahi Bafghi, Mahtab Mirmohseni, and Mohammad Reza Aref Information Systems and Secrity Lab (ISSL Department of Electrical

More information

Game Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India July 2012

Game Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India July 2012 Game Theory Lecture Notes By Y. Narahari Department of Computer Science and Automation Indian Institute of Science Bangalore, India July 2012 Properties of Social Choice Functions Note: This is a only

More information

Subcritical bifurcation to innitely many rotating waves. Arnd Scheel. Freie Universitat Berlin. Arnimallee Berlin, Germany

Subcritical bifurcation to innitely many rotating waves. Arnd Scheel. Freie Universitat Berlin. Arnimallee Berlin, Germany Sbcritical bifrcation to innitely many rotating waves Arnd Scheel Institt fr Mathematik I Freie Universitat Berlin Arnimallee 2-6 14195 Berlin, Germany 1 Abstract We consider the eqation 00 + 1 r 0 k2

More information

Information Source Detection in the SIR Model: A Sample Path Based Approach

Information Source Detection in the SIR Model: A Sample Path Based Approach Information Sorce Detection in the SIR Model: A Sample Path Based Approach Kai Zh and Lei Ying School of Electrical, Compter and Energy Engineering Arizona State University Tempe, AZ, United States, 85287

More information

RELIABILITY ASPECTS OF PROPORTIONAL MEAN RESIDUAL LIFE MODEL USING QUANTILE FUNC- TIONS

RELIABILITY ASPECTS OF PROPORTIONAL MEAN RESIDUAL LIFE MODEL USING QUANTILE FUNC- TIONS RELIABILITY ASPECTS OF PROPORTIONAL MEAN RESIDUAL LIFE MODEL USING QUANTILE FUNC- TIONS Athors: N.UNNIKRISHNAN NAIR Department of Statistics, Cochin University of Science Technology, Cochin, Kerala, INDIA

More information

Survivable Virtual Topology Mapping To Provide Content Connectivity Against Double-Link Failures

Survivable Virtual Topology Mapping To Provide Content Connectivity Against Double-Link Failures BONSAI Lab Srvivable Virtal Topology Mapping To Provide Content Connectivity Against Doble-Link Failres Ali Hmaity Massimo Tornatore Franceo Msmeci OUTLINE Motivations Srvivable virtal topology mapping

More information

Decision Making in Complex Environments. Lecture 2 Ratings and Introduction to Analytic Network Process

Decision Making in Complex Environments. Lecture 2 Ratings and Introduction to Analytic Network Process Decision Making in Complex Environments Lectre 2 Ratings and Introdction to Analytic Network Process Lectres Smmary Lectre 5 Lectre 1 AHP=Hierar chies Lectre 3 ANP=Networks Strctring Complex Models with

More information

Stability of Model Predictive Control using Markov Chain Monte Carlo Optimisation

Stability of Model Predictive Control using Markov Chain Monte Carlo Optimisation Stability of Model Predictive Control sing Markov Chain Monte Carlo Optimisation Elilini Siva, Pal Golart, Jan Maciejowski and Nikolas Kantas Abstract We apply stochastic Lyapnov theory to perform stability

More information

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehighed Zhiyan Yan Department of Electrical

More information

System identification of buildings equipped with closed-loop control devices

System identification of buildings equipped with closed-loop control devices System identification of bildings eqipped with closed-loop control devices Akira Mita a, Masako Kamibayashi b a Keio University, 3-14-1 Hiyoshi, Kohok-k, Yokohama 223-8522, Japan b East Japan Railway Company

More information

4.2 First-Order Logic

4.2 First-Order Logic 64 First-Order Logic and Type Theory The problem can be seen in the two qestionable rles In the existential introdction, the term a has not yet been introdced into the derivation and its se can therefore

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 7, JULY

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 7, JULY IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS VOL. 31 NO. 7 JULY 213 1 Demand Response Management via Real-time Electricity Price Control in Smart Grids Li Ping Qian Member IEEE Ying Jn (Angela Zhang

More information

A Regulator for Continuous Sedimentation in Ideal Clarifier-Thickener Units

A Regulator for Continuous Sedimentation in Ideal Clarifier-Thickener Units A Reglator for Continos Sedimentation in Ideal Clarifier-Thickener Units STEFAN DIEHL Centre for Mathematical Sciences, Lnd University, P.O. Box, SE- Lnd, Sweden e-mail: diehl@maths.lth.se) Abstract. The

More information

BIOSTATISTICAL METHODS

BIOSTATISTICAL METHODS BIOSTATISTICAL METHOS FOR TRANSLATIONAL & CLINICAL RESEARCH ROC Crve: IAGNOSTIC MEICINE iagnostic tests have been presented as alwas having dichotomos otcomes. In some cases, the reslt of the test ma be

More information

A Model-Free Adaptive Control of Pulsed GTAW

A Model-Free Adaptive Control of Pulsed GTAW A Model-Free Adaptive Control of Plsed GTAW F.L. Lv 1, S.B. Chen 1, and S.W. Dai 1 Institte of Welding Technology, Shanghai Jiao Tong University, Shanghai 00030, P.R. China Department of Atomatic Control,

More information

Designing of Virtual Experiments for the Physics Class

Designing of Virtual Experiments for the Physics Class Designing of Virtal Experiments for the Physics Class Marin Oprea, Cristina Miron Faclty of Physics, University of Bcharest, Bcharest-Magrele, Romania E-mail: opreamarin2007@yahoo.com Abstract Physics

More information

1 Differential Equations for Solid Mechanics

1 Differential Equations for Solid Mechanics 1 Differential Eqations for Solid Mechanics Simple problems involving homogeneos stress states have been considered so far, wherein the stress is the same throghot the component nder std. An eception to

More information

1. Tractable and Intractable Computational Problems So far in the course we have seen many problems that have polynomial-time solutions; that is, on

1. Tractable and Intractable Computational Problems So far in the course we have seen many problems that have polynomial-time solutions; that is, on . Tractable and Intractable Comptational Problems So far in the corse we have seen many problems that have polynomial-time soltions; that is, on a problem instance of size n, the rnning time T (n) = O(n

More information

Krauskopf, B., Lee, CM., & Osinga, HM. (2008). Codimension-one tangency bifurcations of global Poincaré maps of four-dimensional vector fields.

Krauskopf, B., Lee, CM., & Osinga, HM. (2008). Codimension-one tangency bifurcations of global Poincaré maps of four-dimensional vector fields. Kraskopf, B, Lee,, & Osinga, H (28) odimension-one tangency bifrcations of global Poincaré maps of for-dimensional vector fields Early version, also known as pre-print Link to pblication record in Explore

More information

The spreading residue harmonic balance method for nonlinear vibration of an electrostatically actuated microbeam

The spreading residue harmonic balance method for nonlinear vibration of an electrostatically actuated microbeam J.L. Pan W.Y. Zh Nonlinear Sci. Lett. Vol.8 No. pp.- September The spreading reside harmonic balance method for nonlinear vibration of an electrostatically actated microbeam J. L. Pan W. Y. Zh * College

More information

Model Discrimination of Polynomial Systems via Stochastic Inputs

Model Discrimination of Polynomial Systems via Stochastic Inputs Model Discrimination of Polynomial Systems via Stochastic Inpts D. Georgiev and E. Klavins Abstract Systems biologists are often faced with competing models for a given experimental system. Unfortnately,

More information

Decoder Error Probability of MRD Codes

Decoder Error Probability of MRD Codes Decoder Error Probability of MRD Codes Maximilien Gadolea Department of Electrical and Compter Engineering Lehigh University Bethlehem, PA 18015 USA E-mail: magc@lehigh.ed Zhiyan Yan Department of Electrical

More information

Lecture: Corporate Income Tax - Unlevered firms

Lecture: Corporate Income Tax - Unlevered firms Lectre: Corporate Income Tax - Unlevered firms Ltz Krschwitz & Andreas Löffler Disconted Cash Flow, Section 2.1, Otline 2.1 Unlevered firms Similar companies Notation 2.1.1 Valation eqation 2.1.2 Weak

More information

Mathematical Analysis of Nipah Virus Infections Using Optimal Control Theory

Mathematical Analysis of Nipah Virus Infections Using Optimal Control Theory Jornal of Applied Mathematics and Physics, 06, 4, 099- Pblished Online Jne 06 in SciRes. http://www.scirp.org/jornal/jamp http://dx.doi.org/0.436/jamp.06.464 Mathematical Analysis of Nipah Virs nfections

More information

CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK. Wassim Jouini and Christophe Moy

CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK. Wassim Jouini and Christophe Moy CHANNEL SELECTION WITH RAYLEIGH FADING: A MULTI-ARMED BANDIT FRAMEWORK Wassim Joini and Christophe Moy SUPELEC, IETR, SCEE, Avene de la Bolaie, CS 47601, 5576 Cesson Sévigné, France. INSERM U96 - IFR140-

More information

Please Lower Small Cell Antenna Heights in 5G

Please Lower Small Cell Antenna Heights in 5G Please ower Small Cell Antenna Heights in 5G Ming Ding, Data61, Astralia {MingDing@data61csiroa} David ópez Pérez, Nokia Bell abs, Irel {davidlopez-perez@nokiacom} Abstract In this paper, we present a

More information

Imprecise Continuous-Time Markov Chains

Imprecise Continuous-Time Markov Chains Imprecise Continos-Time Markov Chains Thomas Krak *, Jasper De Bock, and Arno Siebes t.e.krak@.nl, a.p.j.m.siebes@.nl Utrecht University, Department of Information and Compting Sciences, Princetonplein

More information

FOUNTAIN codes [3], [4] provide an efficient solution

FOUNTAIN codes [3], [4] provide an efficient solution Inactivation Decoding of LT and Raptor Codes: Analysis and Code Design Francisco Lázaro, Stdent Member, IEEE, Gianligi Liva, Senior Member, IEEE, Gerhard Bach, Fellow, IEEE arxiv:176.5814v1 [cs.it 19 Jn

More information

Online Budgeted Allocation with General Budgets

Online Budgeted Allocation with General Budgets Online Bdgeted Allocation with General Bdgets NATHANIEL KELL, Dke University DEBMALYA PANIGRAHI, Dke University We stdy the online bdgeted allocation (also called ADWORDS problem, where a set of impressions

More information

DEPTH CONTROL OF THE INFANTE AUV USING GAIN-SCHEDULED REDUCED-ORDER OUTPUT FEEDBACK 1. C. Silvestre A. Pascoal

DEPTH CONTROL OF THE INFANTE AUV USING GAIN-SCHEDULED REDUCED-ORDER OUTPUT FEEDBACK 1. C. Silvestre A. Pascoal DEPTH CONTROL OF THE INFANTE AUV USING GAIN-SCHEDULED REDUCED-ORDER OUTPUT FEEDBACK 1 C. Silvestre A. Pascoal Institto Sperior Técnico Institte for Systems and Robotics Torre Norte - Piso 8, Av. Rovisco

More information

Decision Oriented Bayesian Design of Experiments

Decision Oriented Bayesian Design of Experiments Decision Oriented Bayesian Design of Experiments Farminder S. Anand*, Jay H. Lee**, Matthew J. Realff*** *School of Chemical & Biomoleclar Engineering Georgia Institte of echnology, Atlanta, GA 3332 USA

More information

The Replenishment Policy for an Inventory System with a Fixed Ordering Cost and a Proportional Penalty Cost under Poisson Arrival Demands

The Replenishment Policy for an Inventory System with a Fixed Ordering Cost and a Proportional Penalty Cost under Poisson Arrival Demands Scientiae Mathematicae Japonicae Online, e-211, 161 167 161 The Replenishment Policy for an Inventory System with a Fixed Ordering Cost and a Proportional Penalty Cost nder Poisson Arrival Demands Hitoshi

More information

Lecture: Corporate Income Tax

Lecture: Corporate Income Tax Lectre: Corporate Income Tax Ltz Krschwitz & Andreas Löffler Disconted Cash Flow, Section 2.1, Otline 2.1 Unlevered firms Similar companies Notation 2.1.1 Valation eqation 2.1.2 Weak atoregressive cash

More information

Gravitational Instability of a Nonrotating Galaxy *

Gravitational Instability of a Nonrotating Galaxy * SLAC-PUB-536 October 25 Gravitational Instability of a Nonrotating Galaxy * Alexander W. Chao ;) Stanford Linear Accelerator Center Abstract Gravitational instability of the distribtion of stars in a galaxy

More information

The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks

The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks The Cryptanalysis of a New Pblic-Key Cryptosystem based on Modlar Knapsacks Yeow Meng Chee Antoine Jox National Compter Systems DMI-GRECC Center for Information Technology 45 re d Ulm 73 Science Park Drive,

More information

Please Lower Small Cell Antenna Heights in 5G

Please Lower Small Cell Antenna Heights in 5G Please ower Small Cell Antenna Heights in 5G Ming Ding, Data61, Astralia {MingDing@data61csiroa} David ópez Pérez, Nokia Bell abs, Irel {davidlopez-perez@nokiacom} arxiv:16111869v2 [csit] 26 Sep 217 Abstract

More information

Konyalioglu, Serpil. Konyalioglu, A.Cihan. Ipek, A.Sabri. Isik, Ahmet

Konyalioglu, Serpil. Konyalioglu, A.Cihan. Ipek, A.Sabri. Isik, Ahmet The Role of Visalization Approach on Stdent s Conceptal Learning Konyaliogl, Serpil Department of Secondary Science and Mathematics Edcation, K.K. Edcation Faclty, Atatürk University, 25240- Erzrm-Trkey;

More information

Curves - Foundation of Free-form Surfaces

Curves - Foundation of Free-form Surfaces Crves - Fondation of Free-form Srfaces Why Not Simply Use a Point Matrix to Represent a Crve? Storage isse and limited resoltion Comptation and transformation Difficlties in calclating the intersections

More information

Convergence analysis of ant colony learning

Convergence analysis of ant colony learning Delft University of Technology Delft Center for Systems and Control Technical report 11-012 Convergence analysis of ant colony learning J van Ast R Babška and B De Schtter If yo want to cite this report

More information

3 2D Elastostatic Problems in Cartesian Coordinates

3 2D Elastostatic Problems in Cartesian Coordinates D lastostatic Problems in Cartesian Coordinates Two dimensional elastostatic problems are discssed in this Chapter, that is, static problems of either plane stress or plane strain. Cartesian coordinates

More information

LOS Component-Based Equal Gain Combining for Ricean Links in Uplink Massive MIMO

LOS Component-Based Equal Gain Combining for Ricean Links in Uplink Massive MIMO 016 Sixth International Conference on Instrmentation & Measrement Compter Commnication and Control LOS Component-Based Eqal Gain Combining for Ricean Lins in plin Massive MIMO Dian-W Ye College of Information

More information

UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL

UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL 8th International DAAAM Baltic Conference "INDUSTRIAL ENGINEERING - 19-1 April 01, Tallinn, Estonia UNCERTAINTY FOCUSED STRENGTH ANALYSIS MODEL Põdra, P. & Laaneots, R. Abstract: Strength analysis is a

More information

Simulation and Modeling of Packet Loss on α-stable VoIP Traffic

Simulation and Modeling of Packet Loss on α-stable VoIP Traffic Simlation and Modeling of Pacet Loss on α-stable VoIP Traffic HOMERO TORAL, 2, DENI TORRES, LEOPOLDO ESTRADA Department of Electrical Engineering Centro de Investigación y Estdios Avanzados del I.P.N -

More information

Game Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India July 2012

Game Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India July 2012 Game Theory Lecture Notes By Y. Narahari Department of Computer Science and Automation Indian Institute of Science Bangalore, India July 01 Incentive Compatibility and Revelation Theorem Note: This is

More information

Full Duplex in Massive MIMO Systems: Analysis and Feasibility

Full Duplex in Massive MIMO Systems: Analysis and Feasibility Fll Dplex in Massive MIMO Systems: Analysis and Feasibility Radwa Sltan Lingyang Song Karim G. Seddik andzhan Electrical and Compter Engineering Department University of oston TX USA School of Electrical

More information

Pulses on a Struck String

Pulses on a Struck String 8.03 at ESG Spplemental Notes Plses on a Strck String These notes investigate specific eamples of transverse motion on a stretched string in cases where the string is at some time ndisplaced, bt with a

More information

Effects of Soil Spatial Variability on Bearing Capacity of Shallow Foundations

Effects of Soil Spatial Variability on Bearing Capacity of Shallow Foundations Geotechnical Safety and Risk V T. Schweckendiek et al. (Eds.) 2015 The athors and IOS Press. This article is pblished online with Open Access by IOS Press and distribted nder the terms of the Creative

More information

Computational Fluid Dynamics Simulation and Wind Tunnel Testing on Microlight Model

Computational Fluid Dynamics Simulation and Wind Tunnel Testing on Microlight Model Comptational Flid Dynamics Simlation and Wind Tnnel Testing on Microlight Model Iskandar Shah Bin Ishak Department of Aeronatics and Atomotive, Universiti Teknologi Malaysia T.M. Kit Universiti Teknologi

More information

FEA Solution Procedure

FEA Solution Procedure EA Soltion Procedre (demonstrated with a -D bar element problem) EA Procedre for Static Analysis. Prepare the E model a. discretize (mesh) the strctre b. prescribe loads c. prescribe spports. Perform calclations

More information

Study of the diffusion operator by the SPH method

Study of the diffusion operator by the SPH method IOSR Jornal of Mechanical and Civil Engineering (IOSR-JMCE) e-issn: 2278-684,p-ISSN: 2320-334X, Volme, Isse 5 Ver. I (Sep- Oct. 204), PP 96-0 Stdy of the diffsion operator by the SPH method Abdelabbar.Nait

More information

The Linear Quadratic Regulator

The Linear Quadratic Regulator 10 The Linear Qadratic Reglator 10.1 Problem formlation This chapter concerns optimal control of dynamical systems. Most of this development concerns linear models with a particlarly simple notion of optimality.

More information

Symmetric Range Assignment with Disjoint MST Constraints

Symmetric Range Assignment with Disjoint MST Constraints Symmetric Range Assignment with Disjoint MST Constraints Eric Schmtz Drexel University Philadelphia, Pa. 19104,USA Eric.Jonathan.Schmtz@drexel.ed ABSTRACT If V is a set of n points in the nit sqare [0,

More information

Cubic graphs have bounded slope parameter

Cubic graphs have bounded slope parameter Cbic graphs have bonded slope parameter B. Keszegh, J. Pach, D. Pálvölgyi, and G. Tóth Agst 25, 2009 Abstract We show that every finite connected graph G with maximm degree three and with at least one

More information

BLOOM S TAXONOMY. Following Bloom s Taxonomy to Assess Students

BLOOM S TAXONOMY. Following Bloom s Taxonomy to Assess Students BLOOM S TAXONOMY Topic Following Bloom s Taonomy to Assess Stdents Smmary A handot for stdents to eplain Bloom s taonomy that is sed for item writing and test constrction to test stdents to see if they

More information

Outline. Model Predictive Control: Current Status and Future Challenges. Separation of the control problem. Separation of the control problem

Outline. Model Predictive Control: Current Status and Future Challenges. Separation of the control problem. Separation of the control problem Otline Model Predictive Control: Crrent Stats and Ftre Challenges James B. Rawlings Department of Chemical and Biological Engineering University of Wisconsin Madison UCLA Control Symposim May, 6 Overview

More information

CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES. George P. Yanev

CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES. George P. Yanev Pliska Std. Math. Blgar. 2 (211), 233 242 STUDIA MATHEMATICA BULGARICA CHARACTERIZATIONS OF EXPONENTIAL DISTRIBUTION VIA CONDITIONAL EXPECTATIONS OF RECORD VALUES George P. Yanev We prove that the exponential

More information

Sareban: Evaluation of Three Common Algorithms for Structure Active Control

Sareban: Evaluation of Three Common Algorithms for Structure Active Control Engineering, Technology & Applied Science Research Vol. 7, No. 3, 2017, 1638-1646 1638 Evalation of Three Common Algorithms for Strctre Active Control Mohammad Sareban Department of Civil Engineering Shahrood

More information

Wireless Networks Without Edges : Dynamic Radio Resource Clustering and User Scheduling

Wireless Networks Without Edges : Dynamic Radio Resource Clustering and User Scheduling Wireless Networks Withot Edges : Dynamic Radio Resorce Clstering and User Schedling Yhan D and Gstavo de Veciana Department of Electrical and Compter Engineering, The University of Texas at Astin Email:

More information

Redistribution Mechanisms for Assignment of Heterogeneous Objects

Redistribution Mechanisms for Assignment of Heterogeneous Objects Redistribution Mechanisms for Assignment of Heterogeneous Objects Sujit Gujar Dept of Computer Science and Automation Indian Institute of Science Bangalore, India sujit@csa.iisc.ernet.in Y Narahari Dept

More information

Non-Lecture I: Linear Programming. Th extremes of glory and of shame, Like east and west, become the same.

Non-Lecture I: Linear Programming. Th extremes of glory and of shame, Like east and west, become the same. The greatest flood has the soonest ebb; the sorest tempest the most sdden calm; the hottest love the coldest end; and from the deepest desire oftentimes enses the deadliest hate. Th extremes of glory and

More information

Move Blocking Strategies in Receding Horizon Control

Move Blocking Strategies in Receding Horizon Control Move Blocking Strategies in Receding Horizon Control Raphael Cagienard, Pascal Grieder, Eric C. Kerrigan and Manfred Morari Abstract In order to deal with the comptational brden of optimal control, it

More information

Formulas for stopped diffusion processes with stopping times based on drawdowns and drawups

Formulas for stopped diffusion processes with stopping times based on drawdowns and drawups Stochastic Processes and their Applications 119 (009) 563 578 www.elsevier.com/locate/spa Formlas for stopped diffsion processes with stopping times based on drawdowns and drawps Libor Pospisil, Jan Vecer,

More information

Risk-Sensitive Control under a Class of Denial-of-Service Attack Models

Risk-Sensitive Control under a Class of Denial-of-Service Attack Models is-sensitive Control nder a Class of Denial-of-Service Attac Models echnical eport of the ISIS Grop University of Notre Dame ISIS-200-003 September, 200 Getachew K. Befead, Vijay Gpta and Panos J. Antsalis

More information

Downloaded 07/06/18 to Redistribution subject to SIAM license or copyright; see

Downloaded 07/06/18 to Redistribution subject to SIAM license or copyright; see SIAM J. SCI. COMPUT. Vol. 4, No., pp. A4 A7 c 8 Society for Indstrial and Applied Mathematics Downloaded 7/6/8 to 8.83.63.. Redistribtion sbject to SIAM license or copyright; see http://www.siam.org/jornals/ojsa.php

More information

FEA Solution Procedure

FEA Solution Procedure EA Soltion Procedre (demonstrated with a -D bar element problem) MAE 5 - inite Element Analysis Several slides from this set are adapted from B.S. Altan, Michigan Technological University EA Procedre for

More information

Chapter 4 Supervised learning:

Chapter 4 Supervised learning: Chapter 4 Spervised learning: Mltilayer Networks II Madaline Other Feedforward Networks Mltiple adalines of a sort as hidden nodes Weight change follows minimm distrbance principle Adaptive mlti-layer

More information

Prediction of Transmission Distortion for Wireless Video Communication: Analysis

Prediction of Transmission Distortion for Wireless Video Communication: Analysis Prediction of Transmission Distortion for Wireless Video Commnication: Analysis Zhifeng Chen and Dapeng W Department of Electrical and Compter Engineering, University of Florida, Gainesville, Florida 326

More information

VIBRATION MEASUREMENT UNCERTAINTY AND RELIABILITY DIAGNOSTICS RESULTS IN ROTATING SYSTEMS

VIBRATION MEASUREMENT UNCERTAINTY AND RELIABILITY DIAGNOSTICS RESULTS IN ROTATING SYSTEMS VIBRATIO MEASUREMET UCERTAITY AD RELIABILITY DIAGOSTICS RESULTS I ROTATIG SYSTEMS. Introdction M. Eidkevicite, V. Volkovas anas University of Technology, Lithania The rotating machinery technical state

More information