Optimal Spatial Reuse in Poisson Multi-hop Networks
|
|
- Maximillian Lee
- 6 years ago
- Views:
Transcription
1 Otimal Satial Reuse in Poisson Multi-ho Networks Kostas Stamatiou an Martin Haenggi Deartment of Electrical Engineering University of Notre Dame, Notre Dame, IN Abstract We consier a wireless multi-ho network with sources that are Poisson istribute an relays which are lace on the source-estination line. Given a combine TDMA/ALOHA MAC rotocol, we exlore the following question of otimal satial reuse: Increasing the number of noes that are simultaneously scheule to transmit in a route allows noes to transmit more often. At the same time, it results in an increase of intraroute an inter-route interference, which has a negative imact on the en-to-en elay an throughut. In a regime of large source-estination istances R, we fin that it is elay-otimal for either only one noe, or a number of noes that increases linearly in R, to be scheule in each slot, eening on the ALOHA robability. If the transmission robability is also otimize, we fin that maximum satial reuse is elay-otimal. Scaling laws for the en-to-en elay an throughut are erive in all cases. I. INTRODUCTION The remise of multi-ho transmission in wireless networks is the eloyment of intermeiate noes to relay ackets from the source to the estination, in scenarios where irect communication is not ossible ue to ower or interference limitations. This aer aresses the esign issue ertinent to multi-ho networks, of jointly otimizing the number of hos an intra-route satial reuse in orer to minimize the en-toen elay. The traeoff involve is that allowing more noes to simultaneously access the channel er route leas to a higher satial reuse, but, at the same time, it increases interference both within the route an in the rest of the network. Our framework, which is an extension of [1], [2], encomasses ranom noe lacement, a channel moel with faing, ath-loss an interference, an queueing elays associate with multi-ho transmission. In articular, we consier a network of Poisson istribute sources, each with its own estination, an relays lace on the source-estination line. The MAC rotocol is a combination of ALOHA an TDMA: Within each route, a grou of noes with a given satial searation, is given a TDMA token which allows them to transmit with a certain robability. In the next slot, the token is asse to the next grou of noes an so on, until all grous have been given their turn an the TDMA cycle starts again. This rotocol is selecte in light of its relative simlicity an the fact that it allows us to tune the intra-route satial reuse in a straightforwar manner. We fin that the otimal reuse eens on the transmit robability. If the latter is also otimize, then maximum reuse is otimal. Scaling laws for the en-to-en elay an throughut are erive for large source-estination istances. Previous work on Poisson networks has mostly stuie the single-ho case, e.g., [3], [4] an multi-ho extensions have focuse on throughut but not elay [5]. In [6], the issue of otimal satial reuse was aresse for line networks in terms of the achievable en-to-en rates, but only a single route was consiere. A. Network setting II. SYSTEM MODEL The network consists of an infinite number of sources at locations {x i }, which form a homogeneous PPP Ψ = {x i } R 2 of ensity λ. Each source has a estination at istance R an a ranom orientation. Packets are relaye from the source to its estination by N 1 equiistantly lace relays, N Z + (if N = 1, we have single-ho transmission). The sources are backlogge, i.e., they always have ackets to transmit. Each relay has an infinite buffer, where ackets that are receive from the revious noe in the route can be store in a first-in, first-out fashion. Time is ivie into acket slots. Within a route of N hos, a TDMA/ALOHA rotocol is observe accoring to which, at any given time, noes at a istance of hos, = 1,..., N, are allowe to transmit with a certain robability. If the noe is a source, this robability is an if it is a relay, it is r. Let us label the relays with the numbers 1 to N 1. The rotocol oeration can be escribe as follows: At slot 1, the source is allowe to transmit with robability an the relays, 2,... are each allowe to transmit 1 ineenently with robability r. At slot 2, the relays + 1, 2 + 1,... are each allowe to transmit with robability r, an so on, until grous of noes have been given their turn an it is time for the first grou to be scheule again. Note that: The number of noes er grou in the tyical route may vary, but it is at most N an, on average, N. The case = 1 corresons to maximum satial reuse an the case = N to no intra-route satial reuse. If the signal-to-interference-an-noise ratio is above a target threshol θ, a acket is successfully receive. If it is not, the transmitting noe is informe via an ieal feeback channel 1 Note that a relay which is allowe to transmit is a otential transmitter. It may not transmit as its queue might be emty.
2 an the acket remains at the hea of its queue until the noe gets another oortunity to transmit. We also assume that the noes have access to a common clock (obtaine, e.g., by GPS), i.e., the network is synchronize at the slot level. However, the TDMA scheules nee not be aligne in any way, i.e., ifferent grous of noes across routes might be scheule in the same slot. Note that N,, are esign arameters, i.e., they are otimizable accoring to the esire metric(s) for given values of R, λ, r an θ. B. Physical layer The channel between two noes at istance r inclues Rayleigh faing (with a coherence time of one slot) an athloss accoring to the law r b, where b > 2 is the ath-loss exonent. For ease of exosition, we consier an interferencelimite setting, i.e., thermal noise is assume to be negligible an all noes have the same transmit ower, normalize to one. (The analysis can be extene to inclue thermal noise.) Consier the ho/slot in the tyical route which is subject to the largest number of intra-route interferers, an let the corresoning receiving relay (RX) be locate (without loss of generality) at the origin. The signal-to-interference-ratio (SIR) is a ranom variable (r.v.) efine as SIR = where A( R N ) b z Π e zt z B z z b + (1) N n=1,n N 2 r b n e n B n A is the faing coefficient between RX an its transmitting noe, exonentially istribute with unit mean. Π is the oint rocess of inter-route noes, scheule at the given slot. e z = 1, when the noe at location z transmits a acket. If the noe is a source, then P(e z = 1) = (the resective robability for a relay follows in the next section. B z is the faing coefficient between the noe locate at z an RX, an is exonentially istribute with unit mean. n is the inex of the intra-route noe scheule to transmit in the given slot. For = 1,...,N 1, the istance of that noe from RX is r n R N N 2 = n n + 1, n = 1,..., N 2 1 N 1, n = N ,..., N (The inex N 2 corresons to the esire transmitter.) {e n, B n } are efine similarly to {e z, B z }. We enote the total intra-route an inter-route interference as I i an I o, resectively. The resective SIRs are enote as SIR i an SIR o. C. Definition of metrics The mean en-to-en elay D corresoning to the tyical route is efine as the mean total time (in slots) that it takes a acket to travel from the hea of the source queue to its P(SIRo θ) Sim., N = 2k Poisson, ens. λk Sim., N = k Poisson, ens. λk Fig. 1. Success robability vs. k taking into account only inter-route interference (R = 5 m, λ = 1 4, =.5, θ = 6 B, b = 4). estination. D is the sum of the mean service time at the source, an the service times an waiting times along the relays of the route. The service time is measure from the moment a acket reaches the hea of the queue until it is successfully receive by the next noe. The waiting time is measure starting from the moment a acket arrives at a relay s queue until it becomes the hea-of-line acket, i.e., all ackets in front of it have been successfully transmitte to the next noe. The route throughut T is efine as the execte number of ackets successfully elivere to the estination er slot. By efinition, T > 1/D, i.e., the inverse of the elay rovies a lower boun on the throughut. As a result, by minimizing D, a lower boun on the throughut is also maximize. The next two sections focus on the evaluation an otimization of D. k III. DELAY ANALYSIS In orer to make the analysis tractable, assume that acket successes across all hos on all routes are ineenent events. The assumtion is base on the observation that if the robability that a noe is a transmitter is small, then, in combination with faing, a sufficient egree of ranomization is achieve in the network 2. Moreover, consier the worst-case scenario where acket success robabilities across hos of the tyical route are all equal to the smallest one, corresoning to the receiver(s) subject to the largest number of intra-route interferers. Denote this robability by s. It is then unerstoo that a necessary conition for the relay buffers to be stable is that < r, as then the acket arrival robability to the first relay, s, is smaller than the acket earture robability from the first an all subsequent relays, r s. As formally shown in [7], acket arrivals to all relays are ii geometric with arameter s, an the robability that a relay locate at z transmits a acket is simly P(e z = 1) =. 2 In the case = 1, a relay is either allowe to transmit or receive at a given time, which creates correlation between the success robabilities. However, such a scenario arises when successive noes actually have ackets to transmit, which, as we will see in Section IV, is unlikely for sufficiently small.
3 If = N, then, since Ψ is a PPP, it follows from the islacement theorem [8] that the oint rocesses of otential inter-route interferers Π, an actual inter-route interferers Π 2 = {z : e z = 1, t z = 1}, are PPPs with ensities λ an λ resectively. By Corollary 3.2 in [9], the ho success robability is therefore s = P(SIR o θ) = e λc(r/n)2, where c = Γ(1+2/b)Γ(1 2/b)πθ 2/b is the satial contention arameter [4] an Γ(x), x >, is the gamma function. For < N, Π 2 can be well aroximate as a PPP of ensity λ = λk, where k = N/ is the average number of scheule noes er route. This is shown in Fig. 1, where we have evaluate the success robability via simulation taking into account only inter-route interference, P(SIR o θ), an comare it to the exression e λkc(r/n)2, for ifferent k, an N = k, 2k (i.e, = 1, 2). Since P(A x) = e x, s = P(SIR θ), where the SIR is efine in (1), can be written as s = Φ Ii (γ)φ Io (γ), (2) where Φ X (s) = E[e Xs ], s >, enotes the Lalace transform of the f of the r.v. X an γ ( ) R b N θ. Base on the observation of the revious aragrah, we can aroximate Φ Io (γ) by [8] Φ Io (γ) e λkc(r/n)2 = e λcr2 N. (3) Since {e n, B n } are ineenent, it is also straightforwar to show that [4] Φ Ii (γ) = ( ) r b n n /γ, (4) where n takes values as in (1). Note that, for = 1, Φ Ii (γ) inclues the term 1, which is the robability that the receiver has no ackets in its queue. Moreover, Φ Ii (γ) oes not een on the hoing istance R/N. A. Delay an throughut exressions Following the analysis in [1], the service time for the heaof-line acket at the source is H = s + 1, an, similarly, the service time for the hea-of-line acket at a relay is H r = + 1. r s Moreover, the waiting time at the queue of a relay is Q r = r 1 r s ( r ) s. The en-to-en elay of the tyical route is therefore D = H + (N 1)(H r + Q r ) = + (N 1) 1 s N( 1). (5) s ( r ) s ΦIi N =.1 =.5 Fig. 2. Success robability taking into account only intra-route interference (b = 4, θ = 6 B). Since a acket is receive by the estination every slots with robability s, the first term is the inverse of the (stable) en-to-en throughut T = s /. The secon term is ominate by the value of ( r s s ) 1, i.e., the inverse of the ifference between the acket service an acket arrival rate at the buffer of each relay. Therefore, in orer to minimize D, the en-to-en throughut an the time sent in the relay queues must be otimally trae off. Given that for small values of, 1 s 1, the simler exression D = (N 1) + N( 1) (6) s ( r ) s rovies a tight uer boun to D. IV. DELAY OPTIMIZATION In this section, we exlore the eenence of D on the arameters N,,. For convenience, we let N [1, + ) an [1, N], an set Φ Ii (γ) 1, i.e., we temorarily ignore intra-route interference. As seen in Fig. 2, Φ Ii is insensitive to N for N 1 an a given, while, for a given N, it quickly aroaches unity as increases. In the first case, we thus exect that the aroximation will yiel a constant, albeit small, erformance ga for small, while, in the latter case, this ga will ecrease with increasing. These qualitative observations are confirme by numerical examles. First, we observe that the following scaling law hols. Proosition 1 As R, D = O(R 2 ) only if N/ = Θ(R 2 ). Proof: Due to the fact that s e λcr2 N, we can see from (6) that N/ = o(r 2 ) imlies that D = ω(e R 2 ). If N/ = ω(r 2 ), then, fixing an imlies that N = ω(r 2 ), hence D = ω(r 2 ). Accoring to Proosition 1, N/ Θ(R 2 ) results in a scaling of D which is worse than quaratic. Hence, in otimizing D over N,,, we constrain the arameter set to
4 1 5 r =.5 r =.1 r =.2 8 x , fixe q 5 D (slots) Max reuse, otimal Otimal reuse, fixe, otimal Fig. 3. q - efine in (7) - vs., for ifferent values of r. satisfy N/ = Θ(R 2 ). Uner this constraint, the success robability satisfies s = e Θ(1). A. Fixe source transmission robability Suose that is fixe. The following roosition characterizes the - jointly - elay-otimal N an. Proosition 2 Denote by N o an o the values of N an that jointly minimize (6) when R + an efine q = 1 1 r. (7) If q, then N o = o = Θ(R). If q > 1, then o < N o an N o = Θ(R), o = Θ(R). Proof: From Proosition 1 an (6) we have that D = qe Θ(1) + g ( r eθ(1) g 1 1 ), (8) where q is efine in (7) an g N. The erivative with resect to is D = qeθ(1) g 2. If q, the erivative is always negative an the minimum D is achieve for the maximum ossible, i.e., o = N o. Since N o o = Θ(R 2 ), we have o = N o = Θ(R). If q > 1, then (8) is minimize for o = g < g < N qe Θ(1) o. Since g = Θ(R 2 ), we have that N o = Θ(R) an o = Θ(R). Remarks: 1) The arameter q eens on the relation of to r. If r /2, i.e., q, then allowing only one noe to transmit er route minimizes the en-to-en elay. The intuition behin this rule is that, since the traffic is heavy in the relay queues (high-traffic regime), it is referable to kee interference low at the exense of satial reuse. On the other han, if the system is oerate in a low-traffic regime, i.e., q > 1, the elay is minimize if o an N o are linear functions of R, i.e., if a constant number of noes k o = N o / o (as a function of R) is scheule to transmit in each slot. As seen Fig. 4. D - eq. (5) - vs. R, otimize over, N, for =.4, an otimize over, N, jointly. For fixe, D = Θ(R 2 ). For otimize, = 1 is otimal an D = Θ(R). The resective curves with no satial reuse are shown for comarison. (λ = 1 4 routes/m 2, r =.1, b = 4 an θ = 6 B.) λt (ac./slot/m 2 ) 1 5 Otimal reuse, inter route interf. only Otimal reuse, total interf. 1 8 Fig. 5. λt vs. R, for =.4. All curves follow the tren R 1 but satial reuse rovies a throughut gain over no satial reuse. (λ = 1 4 routes/m 2, r =.1, b = 4 an θ = 6 B.) in Fig. 3, the transition of q from negative to ositive values is very stee aroun = r /2 (hence the range q (, 1) is inconsequential). We may seak of a hase transition from no satial reuse to satial reuse, as becomes smaller than r /2. 2) From (6), we can see that, in both high an low traffic regimes, D = Θ(R 2 ) an T = Θ(R 1 ). That no imrovement in elay is achieve by allowing satial reuse is exlaine by the fact that, on the one han, noes get an oortunity to transmit more often, on the other han the interference in the network increases. The benefit of satial reuse is manifeste in terms of a throughut gain, which is of the orer of qe Θ(1). Examle 1: Consier a network with arameters λ = 1 4 routes/m 2, r =.1, =.4, b = 4 an θ = 6 B. We numerically otimize (5) over N Z + an = 1,..., N, an lot the results in Figs We observe that the results of Proosition 2 are confirme an that taking into account intra-route interference results in a larger (or smaller N an T ) than the case where only inter-route interference is taken
5 Φ Ii Otimal reuse 2 15 Max reuse, otimal Otimal reuse, fixe, fixe s.6.5 No 1, otimal Fig. 6. s vs. R, for =.4. The asymtotic value of s is aroximately.37. Φ Ii is lotte for comarison; it is very close to one for all R. (λ = 1 4 routes/m 2, r =.1, b = 4 an θ = 6 B.) Total interf. Inter route interf. Fig. 8. Otimal number of hos vs. R, corresoning to Fig. 4. When is fixe, N is quaratic in R for each ste of - see Fig. 7 - but the overall tren is Θ(R). When is otimize, = 1 is otimal an N = Θ(R). The resective curves for no satial reuse are shown for comarison. (λ = 1 4 routes/m 2, r =.1, b = 4 an θ = 6 B.) λt (ac./slot/m 2 ) 1 5 Otimal reuse, inter route interf. only Otimal reuse, total interf. 2 Fig. 7. Otimal satial reuse vs. R, for =.4. Taking into account both inter an intra-route interference results in less aggressive reuse. (λ = 1 4 routes/m 2, r =.1, b = 4 an θ = 6 B.) into account. The corresoning elay curves, however, are inistinguishable. These results illustrate that, for sufficiently small, a throughut gain is achieve comare to the case of no satial reuse. However, as seen in Fig. 8, this comes at a cost in terms of the require number of hos. For a fair comarison between the two cases in the sense of require resources, i.e., relays, we constrain the number of hos to be no larger than 5, which is the maximum value of N with no satial reuse for R = 8 m. The network throughut er unit area is lotte vs. R in Figs. 9. At R 2 m, the constraint on N takes effect, so, by Proosition 1, starts to increase quaratically with R, hence the throughut ecreases as 1/R 2, until = N. The main message of Fig. 9 is that juicious (over no) satial reuse results in a throughut gain which eens on R, given the constraint lace on N. B. Variable source transmission robability We now consier the scenario where N, an are jointly otimize. We have the following result. 1 8 Fig. 9. λt vs. R for =.4 an N 5. In contrast to Fig. 5, the throughut gain achieve with satial reuse ecreases with R, since increases quaratically with R. (λ = 1 4 routes/m 2, r =.1, b = 4 an θ = 6 B.) Proosition 3 Denote by N o, o an o the values of N, an that jointly minimize (6) when R. Then o, N o o = Θ(1) an o N 2 o = Θ(R 2 ). Proof: D, given in (8), is strictly convex in (, r ) an lim + D = lim r D = +. As a result, the otimal, o, is obtaine by setting D = or =o,= o o 2 + o o ( r o ) 2 = g r ( r o ) 2 + g ( ) 1 1. (9) e Θ(1) o We have the following cases: 1) o = Θ(1): The scaling with R on both sies is the same iff o = Θ(R 2 ). However, the constraint N o o / o = Θ(R 2 ) woul then imly that N o = Θ(1), which violates the requirement o N o. 2) o : Due to the constraint 1, it is necessary that = ω(1). Since g = Θ(R 2 ), (9) imlies that o / 2 o = Θ(R2 ).
6 λt (ac./slot/m 2 ) 1 5 Max reuse Max reuse, 1/D Max reuse 1 9 Fig. 1. λt vs. R, for otimize. With maximum reuse, the throughut scales as R 1. The inverse of D is a lower boun to T. (λ = 1 4 routes/m 2, r =.1, b = 4 an θ = 6 B.) Fig. 11. Otimal vs. R. The scaling is = Θ(R 1 ); with no reuse, = Θ(R 2/3 ) [2]. (λ = 1 4 routes/m 2, r =.1, b = 4 an θ = 6 B.) Since N o o / o = Θ(R 2 ), we have that N o o = Θ(1) an o No 2 = Θ(R2 ). Remarks: 1) Eq. (6) can be rewritten as: D = ( 1 s + N 1 ) r N + N. Since o an N o o = Θ(1), = 1, i.e., maximum satial reuse minimizes D. As a result, N o = Θ(R) an o = Θ(R 1 ). The scaling o = Θ(R 1 ) also imlies that the robability of any two consecutive relays in the tyical route transmitting a acket is of the orer N 2 = Θ(R 1 ), i.e., it goes to zero as R grows large. 2) D = Θ(R) an T = Θ(R 1 ). Note that these scaling laws are erive with no constraint on N. If N (hence ) is constraine, then, by Proosition 1, = Θ(R 2 ). Examle 2: Consier a network with the same arameters as in Examle 1, with the only ifference that is allowe to vary in (,.1). The numerically otimize D is shown in Fig. 4 an the resective throughut an otimal in Figs Given the selecte arameters, we obtaine that = 1 was otimal for the whole range of R. Moreover, we verifie that the effect of intra-route comare to inter-route interference was negligible. Figs. 4, 1-11 confirm the scaling laws erive in Proosition 3. ACKNOWLEDGMENTS The artial suort of the DARPA/IPTO IT-MANET rogram (grant W911NF ) is gratefully acknowlege. REFERENCES [1] K. Stamatiou, F. Rossetto, M. Haenggi, T. Javii, J. R. Zeiler, an M. Zorzi, A elay-minimizing routing strategy for wireless multiho networks, in Worksho on Satial Stochastic Moels for Wireless Networks (SaSWiN), Seoul, Jun. 29. [2] K. Stamatiou an M. Haenggi, The elay-otimal number of hos in Poisson multi-ho networks, in IEEE Symosium on Information Theory (ISIT 1), Austin, TX, Jun. 21. [3] S. P. Weber, X. Yang, J. G. Anrews, an G. e Veciana, Transmission caacity of wireless a hoc networks with outage constraints, IEEE Trans. Inf. Theory, vol. 51, , Dec. 25. [4] M. Haenggi, Outage, local throughut, an caacity of ranom wireless networks, IEEE Transactions on Wireless Communications, vol. 8, no. 8, , Aug. 29. [5] J. G. Anrews, S. Weber, M. Kountouris, an M. Haenggi, Ranom access transort caacity, IEEE Transactions on Wireless Communications, vol. 9, no. 6, , Jun. 21. [6] M. Sikora, J. N. Laneman, M. Haenggi, D. J. Costello, an T. Fuja, Banwith- an ower-efficient routing in linear wireless networks, Joint Secial Issue of IEEE Transactions on Information Theory an IEEE Transactions on Networking, vol. 52, , Jun. 26. [7] J. Hsu an P. P. Burke, Behavior of tanem buffers with geometric inut an Markovian outut, IEEE Transactions on Communications, vol. 24, no. 3, , Mar [8] M. Haenggi, J. G. Anrews, F. Baccelli, O. Dousse, an M. Franceschetti, Stochastic geometry an ranom grahs for the analysis an esign of wireless networks, IEEE Journal on Selecte Areas in Communications, vol. 27, no. 7, , Se. 29. [9] F. Baccelli, B. Błaszczyszyn, an P. Mühlethaler, An Aloha rotocol for multi-ho mobile wireless networks, IEEE Trans. Inf. Theory, vol. 52, , Feb. 26. V. CONCLUSIONS We roose a framework to characterize the elay-otimal number of hos an intra-route satial reuse in Poisson multiho networks. The scaling of the elay an throughut as functions of R were characterize. Our results have alications in routing algorithms for multi-ho networks where the relays are also ranomly locate, e.g., a routing rotocol can select the relays which are foun closest to the ieal locations etermine by the analysis.
Delay characterization of multi-hop transmission in a Poisson field of interference
1 Delay characterization of multi-ho transmission in a Poisson field of interference Kostas Stamatiou and Martin Haenggi, Senior Member, IEEE Abstract We evaluate the end-to-end delay of a multi-ho transmission
More informationSpatial Outage Capacity of Poisson Bipolar Networks
Satial Outage Caacity of Poisson Biolar Networks Sanket S. Kalamkar and Martin Haenggi Deartment of Electrical Engineering, University of Notre Dame, Notre Dame, IN 46556, USA E-mail: skalamka@nd.edu,
More informationLecture 6 : Dimensionality Reduction
CPS290: Algorithmic Founations of Data Science February 3, 207 Lecture 6 : Dimensionality Reuction Lecturer: Kamesh Munagala Scribe: Kamesh Munagala In this lecture, we will consier the roblem of maing
More informationConsistency and asymptotic normality
Consistency an asymtotic normality Class notes for Econ 842 Robert e Jong March 2006 1 Stochastic convergence The asymtotic theory of minimization estimators relies on various theorems from mathematical
More informationVehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications
Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Bartłomiej Błaszczyszyn Paul Muhlethaler Nadjib Achir INRIA/ENS INRIA Rocquencourt INRIA Rocquencourt
More information7. Introduction to Large Sample Theory
7. Introuction to Large Samle Theory Hayashi. 88-97/109-133 Avance Econometrics I, Autumn 2010, Large-Samle Theory 1 Introuction We looke at finite-samle roerties of the OLS estimator an its associate
More informationColin Cameron: Asymptotic Theory for OLS
Colin Cameron: Asymtotic Theory for OLS. OLS Estimator Proerties an Samling Schemes.. A Roama Consier the OLS moel with just one regressor y i = βx i + u i. The OLS estimator b β = ³ P P i= x iy i canbewrittenas
More informationTrap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks
Tra Coverage: Allowing Coverage Holes of Boune Diameter in Wireless Sensor Networks Paul Balister Zizhan Zheng Santosh Kumar Prasun Sinha University of Memhis The Ohio State University {balistr,santosh.kumar}@memhis.eu
More informationThroughput Optimal Control of Cooperative Relay Networks
hroughput Optimal Control of Cooperative Relay Networks Emun Yeh Dept. of Electrical Engineering Yale University New Haven, C 06520, USA E-mail: emun.yeh@yale.eu Ranall Berry Dept. of Electrical an Computer
More informationColin Cameron: Brief Asymptotic Theory for 240A
Colin Cameron: Brief Asymtotic Theory for 240A For 240A we o not go in to great etail. Key OLS results are in Section an 4. The theorems cite in sections 2 an 3 are those from Aenix A of Cameron an Trivei
More informationMATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK
Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment
More informationThe Effect of a Finite Measurement Volume on Power Spectra from a Burst Type LDA
The Effect of a Finite Measurement Volume on Power Sectra from a Burst Tye LDA Preben Buchhave 1,*, Clara M. Velte, an William K. George 3 1. Intarsia Otics, Birkerø, Denmark. Technical University of Denmark,
More informationConvergence Analysis of Terminal ILC in the z Domain
25 American Control Conference June 8-, 25 Portlan, OR, USA WeA63 Convergence Analysis of erminal LC in the Domain Guy Gauthier, an Benoit Boulet, Member, EEE Abstract his aer shows how we can aly -transform
More informationOn the Aloha throughput-fairness tradeoff
On the Aloha throughput-fairness traeoff 1 Nan Xie, Member, IEEE, an Steven Weber, Senior Member, IEEE Abstract arxiv:1605.01557v1 [cs.it] 5 May 2016 A well-known inner boun of the stability region of
More informationImproved Capacity Bounds for the Binary Energy Harvesting Channel
Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,
More informationThe thermal wind 1. v g
The thermal win The thermal win Introuction The geostrohic win is etermine by the graient of the isobars (on a horizontal surface) or isohyses (on a ressure surface). On a ressure surface the graient of
More information5. THERMAL CONVERSION OF SOLAR RADIATION. Content
5. Introuction 5. THEMAL CONVESION OF SOLA ADIATION Content 5. Introuction 5. Collectors without concentration 5.. Otical efficiency of the flat collector 5.. Thermal efficiency of the flat collector 5..3
More informationAn Analysis of TCP over Random Access Satellite Links
An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance
More informationShared-State Sampling
Share-State Samling Freeric Rasall, Sebastia Sallent an Jose Yufera Det. of Telematics, Technical University of Catalonia (UPC) frei@entel.uc.es, sallent@entel.uc.es, yufera@entel.uc.es ABSTRACT We resent
More informationAn Analytical Expression of the Probability of Error for Relaying with Decode-and-forward
An Analytical Expression of the Probability of Error for Relaying with Decoe-an-forwar Alexanre Graell i Amat an Ingmar Lan Department of Electronics, Institut TELECOM-TELECOM Bretagne, Brest, France Email:
More informationLenny Jones Department of Mathematics, Shippensburg University, Shippensburg, Pennsylvania Daniel White
#A10 INTEGERS 1A (01): John Selfrige Memorial Issue SIERPIŃSKI NUMBERS IN IMAGINARY QUADRATIC FIELDS Lenny Jones Deartment of Mathematics, Shiensburg University, Shiensburg, Pennsylvania lkjone@shi.eu
More informationClosed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device
Close an Open Loop Optimal Control of Buffer an Energy of a Wireless Device V. S. Borkar School of Technology an Computer Science TIFR, umbai, Inia. borkar@tifr.res.in A. A. Kherani B. J. Prabhu INRIA
More informationBivariate distributions characterized by one family of conditionals and conditional percentile or mode functions
Journal of Multivariate Analysis 99 2008) 1383 1392 www.elsevier.com/locate/jmva Bivariate istributions characterize by one family of conitionals an conitional ercentile or moe functions Barry C. Arnol
More informationarxiv: v2 [math.nt] 28 Jun 2017
GEERATIG RADOM FACTORED IDEALS I UMBER FIELDS ZACHARY CHARLES arxiv:62.06260v2 [math.t] 28 Jun 207 Abstract. We resent a ranomize olynomial-time algorithm to generate an ieal an its factorization uniformly
More informationSkiba without unstable equlibrium in a linear quadratic framework
Skiba without unstable equlibrium in a linear quaratic framework Richar F. Hartl Institute of Management, University of Vienna, Brünnerstraße 8, -0 Vienna, ustria Richar.Hartl@univie.ac.at Tel. +43--477-3809
More informationDelay-Based Connectivity of Wireless Networks
Delay-Based Connectivity of Wireless Networks Martin Haenggi Abstract Interference in wireless networks causes intricate dependencies between the formation of links. In current graph models of wireless
More informationOn the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1
On the Relationshi Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 Imad Antonios antoniosi1@southernct.edu CS Deartment MO117 Southern Connecticut State University 501 Crescent St.
More informationTime-of-Arrival Estimation in Non-Line-Of-Sight Environments
2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor
More informationSubmitted to the Journal of Hydraulic Engineering, ASCE, January, 2006 NOTE ON THE ANALYSIS OF PLUNGING OF DENSITY FLOWS
Submitte to the Journal of Hyraulic Engineering, ASCE, January, 006 NOTE ON THE ANALYSIS OF PLUNGING OF DENSITY FLOWS Gary Parker 1, Member, ASCE an Horacio Toniolo ABSTRACT This note is evote to the correction
More informationDelay Limited Capacity of Ad hoc Networks: Asymptotically Optimal Transmission and Relaying Strategy
Delay Limite Capacity of A hoc Networks: Asymptotically Optimal Transmission an Relaying Strategy Eugene Perevalov Lehigh University Bethlehem, PA 85 Email: eup2@lehigh.eu Rick Blum Lehigh University Bethlehem,
More informationAnalysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks
Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their
More informationCapacity Analysis of MIMO Systems with Unknown Channel State Information
Capacity Analysis of MIMO Systems with Unknown Channel State Information Jun Zheng an Bhaskar D. Rao Dept. of Electrical an Computer Engineering University of California at San Diego e-mail: juzheng@ucs.eu,
More informationMINIMAL MAHLER MEASURE IN REAL QUADRATIC FIELDS. 1. Introduction
INIAL AHLER EASURE IN REAL QUADRATIC FIELDS TODD COCHRANE, R.. S. DISSANAYAKE, NICHOLAS DONOHOUE,. I.. ISHAK, VINCENT PIGNO, CHRIS PINNER, AND CRAIG SPENCER Abstract. We consier uer an lower bouns on the
More informationA method of constructing the half-rate QC-LDPC codes with linear encoder, maximum column weight three and inevitable girth 26
Communications 20; 2(): 22-4 Publishe online January 1 2015 (htt://www.scienceublishinggrou.com/j/com) oi: 10.11648/j.com.20020.11 ISSN: 228-5966 (Print); ISSN: 228-592 (Online) A metho of constructing
More informationON THE AVERAGE NUMBER OF DIVISORS OF REDUCIBLE QUADRATIC POLYNOMIALS
ON THE AVERAGE NUMBER OF DIVISORS OF REDUCIBLE QUADRATIC POLYNOMIALS KOSTADINKA LAPKOVA Abstract. We give an asymtotic formula for the ivisor sum c
More informationOn Characterizing the Delay-Performance of Wireless Scheduling Algorithms
On Characterizing the Delay-Performance of Wireless Scheuling Algorithms Xiaojun Lin Center for Wireless Systems an Applications School of Electrical an Computer Engineering, Purue University West Lafayette,
More informationECE 534 Information Theory - Midterm 2
ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You
More informationDigitally delicate primes
Digitally elicate rimes Jackson Hoer Paul Pollack Deartment of Mathematics University of Georgia Athens, Georgia 30602 Tao has shown that in any fixe base, a ositive roortion of rime numbers cannot have
More informationAnalysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel
Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict
More informationOn Code Design for Simultaneous Energy and Information Transfer
On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter
More informationOn the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting
On the Role of Finite Queues in Cooerative Cognitive Radio Networks with Energy Harvesting Mohamed A. Abd-Elmagid, Tamer Elatt, and Karim G. Seddik Wireless Intelligent Networks Center (WINC), Nile University,
More informations v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4
Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work
More informationLearning Markov Graphs Up To Edit Distance
Learning Markov Grahs U To Eit Distance Abhik Das, Praneeth Netraalli, Sujay Sanghavi an Sriram Vishwanath Deartment of ECE, The University of Texas at Austin, USA Abstract This aer resents a rate istortion
More informationOn the Broadcast Capacity of Multihop Wireless Networks: Interplay of Power, Density and Interference
On the Broacast Capacity of Multihop Wireless Networks: Interplay of Power, Density an Interference Alireza Keshavarz-Haa Ruolf Riei Department of Electrical an Computer Engineering an Department of Statistics
More informationAge of Information: Whittle Index for Scheduling Stochastic Arrivals
Age of Information: Whittle Index for Scheduling Stochastic Arrivals Yu-Pin Hsu Deartment of Communication Engineering National Taiei University yuinhsu@mail.ntu.edu.tw arxiv:80.03422v2 [math.oc] 7 Ar
More informationOptimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging
1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014
More informationCapacity Allocation. Outline Two-class allocation Multiple-class allocation Demand dependence Bid prices. Based on Phillips (2005) Chapter 7.
Caacity Allocation utallas.eu/~metin Page Outline Two-class allocation Multile-class allocation Deman eenence Bi rices Base on Phillis (2005) Chater 7 Booking Limits or 2 Fare Classes utallas.eu/~metin
More informationProbabilistic Learning
Statistical Machine Learning Notes 11 Instructor: Justin Domke Probabilistic Learning Contents 1 Introuction 2 2 Maximum Likelihoo 2 3 Examles of Maximum Likelihoo 3 3.1 Binomial......................................
More informationALOHA Performs Optimal Power Control in Poisson Networks
ALOHA erforms Optimal ower Control in oisson Networks Xinchen Zhang and Martin Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556, USA {xzhang7,mhaenggi}@nd.edu
More informationStopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Codes
Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Coes Kaiann Fu an Achilleas Anastasopoulos Electrical Engineering an Computer Science Dept. University of Michigan, Ann Arbor, MI
More informationVision Graph Construction in Wireless Multimedia Sensor Networks
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Conference and Worksho Paers Comuter Science and Engineering, Deartment of 21 Vision Grah Construction in Wireless Multimedia
More informationOn the capacity of the general trapdoor channel with feedback
On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:
More informationLevy Process and Infinitely Divisible Law
Stat205B: Probability Theory (Spring 2003) Lecture: 26 Levy Process an Infinitely Divisible Law Lecturer: James W. Pitman Scribe: Bo Li boli@stat.berkeley.eu Levy Processes an Infinitely Divisible Law
More informationCOMMUNICATION BETWEEN SHAREHOLDERS 1
COMMUNICATION BTWN SHARHOLDRS 1 A B. O A : A D Lemma B.1. U to µ Z r 2 σ2 Z + σ2 X 2r ω 2 an additive constant that does not deend on a or θ, the agents ayoffs can be written as: 2r rθa ω2 + θ µ Y rcov
More informationAn M/G/1 Retrial Queue with Priority, Balking and Feedback Customers
Journal of Convergence Information Technology Volume 5 Number April 1 An M/G/1 Retrial Queue with Priority Balking an Feeback Customers Peishu Chen * 1 Yiuan Zhu 1 * 1 Faculty of Science Jiangsu University
More informationTHE ZEROS OF A QUADRATIC FORM AT SQUARE-FREE POINTS
THE ZEROS OF A QUADRATIC FORM AT SQUARE-FREE POINTS R. C. BAKER Abstract. Let F(x 1,..., x n be a nonsingular inefinite quaratic form, n = 3 or 4. Results are obtaine on the number of solutions of F(x
More informationConvex Optimization methods for Computing Channel Capacity
Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem
More informationConvergence of random variables, and the Borel-Cantelli lemmas
Stat 205A Setember, 12, 2002 Convergence of ranom variables, an the Borel-Cantelli lemmas Lecturer: James W. Pitman Scribes: Jin Kim (jin@eecs) 1 Convergence of ranom variables Recall that, given a sequence
More informationHomework Set #3 Rates definitions, Channel Coding, Source-Channel coding
Homework Set # Rates definitions, Channel Coding, Source-Channel coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits
More informationRobust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k
A Proof of Lemma 2 B Proof of Lemma 3 Proof: Since the support of LL istributions is R, two such istributions are equivalent absolutely continuous with respect to each other an the ivergence is well-efine
More informationLyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering,
On the Queue-Overflow Probability of Wireless Systems : A New Approach Combining Large Deviations with Lyapunov Functions V. J. Venkataramanan an Xiaojun Lin Center for Wireless Systems an Applications
More informationA Simple Exchange Economy with Complex Dynamics
FH-Kiel Universitf Alie Sciences Prof. Dr. Anreas Thiemer, 00 e-mail: anreas.thiemer@fh-kiel.e A Simle Exchange Economy with Comlex Dynamics (Revision: Aril 00) Summary: Mukherji (999) shows that a stanar
More informationEconometrics I. September, Part I. Department of Economics Stanford University
Econometrics I Deartment of Economics Stanfor University Setember, 2008 Part I Samling an Data Poulation an Samle. ineenent an ientical samling. (i.i..) Samling with relacement. aroximates samling without
More informationImproved Rate-Based Pull and Push Strategies in Large Distributed Networks
Improve Rate-Base Pull an Push Strategies in Large Distribute Networks Wouter Minnebo an Benny Van Hout Department of Mathematics an Computer Science University of Antwerp - imins Mielheimlaan, B-00 Antwerp,
More informationHe s Homotopy Perturbation Method for solving Linear and Non-Linear Fredholm Integro-Differential Equations
nternational Journal of Theoretical an Alie Mathematics 2017; 3(6): 174-181 htt://www.scienceublishinggrou.com/j/ijtam oi: 10.11648/j.ijtam.20170306.11 SSN: 2575-5072 (Print); SSN: 2575-5080 (Online) He
More informationShadow Computing: An Energy-Aware Fault Tolerant Computing Model
Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms
More informationConsistency and asymptotic normality
Consistency an ymtotic normality Cls notes for Econ 842 Robert e Jong Aril 2007 1 Stochtic convergence The ymtotic theory of minimization estimators relies on various theorems from mathematical statistics.
More informationCompetition in the health care market: a two-sided. approach
Cometition in the health care market: a two-sie aroach Mario Pezzino Giacomo Pignataro Abstract Two ientical hositals comete for atients an octors choosing locations (e.g. secializations) on a Hotelling
More informationLDPC codes for the Cascaded BSC-BAWGN channel
LDPC codes for the Cascaded BSC-BAWGN channel Aravind R. Iyengar, Paul H. Siegel, and Jack K. Wolf University of California, San Diego 9500 Gilman Dr. La Jolla CA 9093 email:aravind,siegel,jwolf@ucsd.edu
More informationAn Analysis of Reliable Classifiers through ROC Isometrics
An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit
More informationRobust Control of Robot Manipulators Using Difference Equations as Universal Approximator
Proceeings of the 5 th International Conference of Control, Dynamic Systems, an Robotics (CDSR'18) Niagara Falls, Canaa June 7 9, 218 Paer No. 139 DOI: 1.11159/csr18.139 Robust Control of Robot Maniulators
More informationAnytime communication over the Gilbert-Eliot channel with noiseless feedback
Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anant Sahai, Salman Avestimehr, Paolo Minero Deartment of Electrical Engineering and Comuter Sciences University of California
More informationNOTES. The Primes that Euclid Forgot
NOTES Eite by Sergei Tabachnikov The Primes that Eucli Forgot Paul Pollack an Enrique Treviño Abstract. Let q 2. Suosing that we have efine q j for all ale j ale k, let q k+ be a rime factor of + Q k j
More informationEquilibrium in Queues Under Unknown Service Times and Service Value
University of Pennsylvania ScholarlyCommons Finance Papers Wharton Faculty Research 1-2014 Equilibrium in Queues Uner Unknown Service Times an Service Value Laurens Debo Senthil K. Veeraraghavan University
More informationpage 1 This question-paper you hand in, together with your solutions. ================================================================
age EXAMINATION Jan 9 Time :5-7:5 QUEUEING THEORY EP9, HF ( 6H78), Lecturer: Armin Halilovic Instructions:. You ARE allowed to use a calculator.. You are NOT allowed to use your own tables of mathematical
More informationProbabilistic Learning
Statistical Machine Learning Notes 10 Instructor: Justin Domke Probabilistic Learning Contents 1 Introuction 2 2 Maximum Likelihoo 2 3 Examles of Maximum Likelihoo 3 3.1 Binomial......................................
More informationMod p 3 analogues of theorems of Gauss and Jacobi on binomial coefficients
ACTA ARITHMETICA 2.2 (200 Mo 3 analogues of theorems of Gauss an Jacobi on binomial coefficients by John B. Cosgrave (Dublin an Karl Dilcher (Halifax. Introuction. One of the most remarkable congruences
More informationTopic 7: Convergence of Random Variables
Topic 7: Convergence of Ranom Variables Course 003, 2016 Page 0 The Inference Problem So far, our starting point has been a given probability space (S, F, P). We now look at how to generate information
More informationSurvey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013
Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing
More informationTRACKING CONTROL OF MULTIPLE MOBILE ROBOTS: A CASE STUDY OF INTER-ROBOT COLLISION-FREE PROBLEM
265 Asian Journal of Control, Vol. 4, No. 3, pp. 265-273, September 22 TRACKING CONTROL OF MULTIPLE MOBILE ROBOTS: A CASE STUDY OF INTER-ROBOT COLLISION-FREE PROBLEM Jurachart Jongusuk an Tsutomu Mita
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More informationA secure approach for embedding message text on an elliptic curve defined over prime fields, and building 'EC-RSA-ELGamal' Cryptographic System
International Journal of Comuter Science an Information Security (IJCSIS), Vol. 5, No. 6, June 7 A secure aroach for embeing message tet on an ellitic curve efine over rime fiels, an builing 'EC-RSA-ELGamal'
More informationI. INTRODUCTION. Definition 2: (Spatial contention parameter contention is
IEEE/ACM TRANSACTIONS ON NETWORKING 1 Outage Probability of General Ad Hoc Networks in the High-Reliability Regime Riccardo Giacomelli, Radha Krishna Ganti, Member, IEEE, and Martin Haenggi, Senior Member,
More informationarxiv: v1 [math.pr] 28 Jan 2018
Submitte to the Annals of Probability WAVELET ANALYSIS OF THE BESOV REGULARITY OF LÉVY WHITE NOISES arxiv:80.09245v [math.pr] 28 Jan 208 By Shayan Azizneja, Julien Fageot an Michael Unser Ecole olytechnique
More informationA note on asymptotic formulae for one-dimensional network flow problems Carlos F. Daganzo and Karen R. Smilowitz
A note on asymptotic formulae for one-imensional network flow problems Carlos F. Daganzo an Karen R. Smilowitz (to appear in Annals of Operations Research) Abstract This note evelops asymptotic formulae
More informationAnalysis on a Localized Pruning Method for Connected Dominating Sets
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 23, 1073-1086 (2007) Analysis on a Localize Pruning Metho for Connecte Dominating Sets JOHN SUM 1, JIE WU 2 AND KEVIN HO 3 1 Department of Information Management
More informationTraining sequence optimization for frequency selective channels with MAP equalization
532 ISCCSP 2008, Malta, 12-14 March 2008 raining sequence otimization for frequency selective channels with MAP equalization Imed Hadj Kacem, Noura Sellami Laboratoire LEI ENIS, Route Sokra km 35 BP 3038
More informationNode Density and Delay in Large-Scale Wireless Networks with Unreliable Links
Noe Density an Delay in Large-Scale Wireless Networks with Unreliable Links Shizhen Zhao, Xinbing Wang Department of Electronic Engineering Shanghai Jiao Tong University, China Email: {shizhenzhao,xwang}@sjtu.eu.cn
More informationCooperative HARQ with Poisson Interference and Opportunistic Routing
Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline
More informationOn the Connectivity Analysis over Large-Scale Hybrid Wireless Networks
This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM proceeings This paper was presente as part of the main Technical
More informationApplication of Measurement System R&R Analysis in Ultrasonic Testing
17th Worl Conference on Nonestructive Testing, 5-8 Oct 8, Shanghai, China Alication of Measurement System & Analysis in Ultrasonic Testing iao-hai ZHANG, Bing-ya CHEN, Yi ZHU Deartment of Testing an Control
More informationAmin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE)
KAUST Reository Outage erformance of cognitive radio systems with Imroer Gaussian signaling Item tye Authors Erint version DOI Publisher Journal Rights Conference Paer Amin Osama; Abediseid Walid; Alouini
More informationBy completing this chapter, the reader will be able to:
hater 4. Mechanics of Particles Particle mechanics governs many rinciles of article measurement instrumentation an air cleaning technologies. Therefore, this chater rovies the funamentals of article mechanics.
More informationPower Generation and Distribution via Distributed Coordination Control
Power Generation an Distribution via Distribute Coorination Control Byeong-Yeon Kim, Kwang-Kyo Oh, an Hyo-Sung Ahn arxiv:407.4870v [math.oc] 8 Jul 204 Abstract This paper presents power coorination, power
More information4. Score normalization technical details We now discuss the technical details of the score normalization method.
SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules
More informationStability of steady states in kinetic Fokker-Planck equations for Bosons and Fermions
www.oeaw.ac.at Stability of steay states in kinetic Fokker-Planck equations for Bosons an Fermions L. Neumann, C. Sarber RICAM-Reort 2006-34 www.ricam.oeaw.ac.at STABILITY OF STEADY STATES IN KINETIC FOKKER-PLANCK
More informationSliding mode approach to congestion control in connection-oriented communication networks
JOURNAL OF APPLIED COMPUTER SCIENCE Vol. xx. No xx (200x), pp. xx-xx Sliing moe approach to congestion control in connection-oriente communication networks Anrzej Bartoszewicz, Justyna Żuk Technical University
More informationLeast-Squares Regression on Sparse Spaces
Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction
More informationOnline Nearest Neighbor Search in Hamming Space
Online Nearest Neighbor Search in Hamming Sace Seehr Eghbali, Hassan Ashtiani, Laan Tahvilari University of Waterloo, Ontario, Canaa Email: {s2eghbal, mhzokaei, laan.tahvilari}@uwaterloo.ca Abstract We
More informationA MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION
O P E R A T I O N S R E S E A R C H A N D D E C I S I O N S No. 27 DOI:.5277/ord73 Nasrullah KHAN Muhammad ASLAM 2 Kyung-Jun KIM 3 Chi-Hyuck JUN 4 A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST
More information