Optimal Spatial Reuse in Poisson Multi-hop Networks

Size: px
Start display at page:

Download "Optimal Spatial Reuse in Poisson Multi-hop Networks"

Transcription

1 Otimal Satial Reuse in Poisson Multi-ho Networks Kostas Stamatiou an Martin Haenggi Deartment of Electrical Engineering University of Notre Dame, Notre Dame, IN Abstract We consier a wireless multi-ho network with sources that are Poisson istribute an relays which are lace on the source-estination line. Given a combine TDMA/ALOHA MAC rotocol, we exlore the following question of otimal satial reuse: Increasing the number of noes that are simultaneously scheule to transmit in a route allows noes to transmit more often. At the same time, it results in an increase of intraroute an inter-route interference, which has a negative imact on the en-to-en elay an throughut. In a regime of large source-estination istances R, we fin that it is elay-otimal for either only one noe, or a number of noes that increases linearly in R, to be scheule in each slot, eening on the ALOHA robability. If the transmission robability is also otimize, we fin that maximum satial reuse is elay-otimal. Scaling laws for the en-to-en elay an throughut are erive in all cases. I. INTRODUCTION The remise of multi-ho transmission in wireless networks is the eloyment of intermeiate noes to relay ackets from the source to the estination, in scenarios where irect communication is not ossible ue to ower or interference limitations. This aer aresses the esign issue ertinent to multi-ho networks, of jointly otimizing the number of hos an intra-route satial reuse in orer to minimize the en-toen elay. The traeoff involve is that allowing more noes to simultaneously access the channel er route leas to a higher satial reuse, but, at the same time, it increases interference both within the route an in the rest of the network. Our framework, which is an extension of [1], [2], encomasses ranom noe lacement, a channel moel with faing, ath-loss an interference, an queueing elays associate with multi-ho transmission. In articular, we consier a network of Poisson istribute sources, each with its own estination, an relays lace on the source-estination line. The MAC rotocol is a combination of ALOHA an TDMA: Within each route, a grou of noes with a given satial searation, is given a TDMA token which allows them to transmit with a certain robability. In the next slot, the token is asse to the next grou of noes an so on, until all grous have been given their turn an the TDMA cycle starts again. This rotocol is selecte in light of its relative simlicity an the fact that it allows us to tune the intra-route satial reuse in a straightforwar manner. We fin that the otimal reuse eens on the transmit robability. If the latter is also otimize, then maximum reuse is otimal. Scaling laws for the en-to-en elay an throughut are erive for large source-estination istances. Previous work on Poisson networks has mostly stuie the single-ho case, e.g., [3], [4] an multi-ho extensions have focuse on throughut but not elay [5]. In [6], the issue of otimal satial reuse was aresse for line networks in terms of the achievable en-to-en rates, but only a single route was consiere. A. Network setting II. SYSTEM MODEL The network consists of an infinite number of sources at locations {x i }, which form a homogeneous PPP Ψ = {x i } R 2 of ensity λ. Each source has a estination at istance R an a ranom orientation. Packets are relaye from the source to its estination by N 1 equiistantly lace relays, N Z + (if N = 1, we have single-ho transmission). The sources are backlogge, i.e., they always have ackets to transmit. Each relay has an infinite buffer, where ackets that are receive from the revious noe in the route can be store in a first-in, first-out fashion. Time is ivie into acket slots. Within a route of N hos, a TDMA/ALOHA rotocol is observe accoring to which, at any given time, noes at a istance of hos, = 1,..., N, are allowe to transmit with a certain robability. If the noe is a source, this robability is an if it is a relay, it is r. Let us label the relays with the numbers 1 to N 1. The rotocol oeration can be escribe as follows: At slot 1, the source is allowe to transmit with robability an the relays, 2,... are each allowe to transmit 1 ineenently with robability r. At slot 2, the relays + 1, 2 + 1,... are each allowe to transmit with robability r, an so on, until grous of noes have been given their turn an it is time for the first grou to be scheule again. Note that: The number of noes er grou in the tyical route may vary, but it is at most N an, on average, N. The case = 1 corresons to maximum satial reuse an the case = N to no intra-route satial reuse. If the signal-to-interference-an-noise ratio is above a target threshol θ, a acket is successfully receive. If it is not, the transmitting noe is informe via an ieal feeback channel 1 Note that a relay which is allowe to transmit is a otential transmitter. It may not transmit as its queue might be emty.

2 an the acket remains at the hea of its queue until the noe gets another oortunity to transmit. We also assume that the noes have access to a common clock (obtaine, e.g., by GPS), i.e., the network is synchronize at the slot level. However, the TDMA scheules nee not be aligne in any way, i.e., ifferent grous of noes across routes might be scheule in the same slot. Note that N,, are esign arameters, i.e., they are otimizable accoring to the esire metric(s) for given values of R, λ, r an θ. B. Physical layer The channel between two noes at istance r inclues Rayleigh faing (with a coherence time of one slot) an athloss accoring to the law r b, where b > 2 is the ath-loss exonent. For ease of exosition, we consier an interferencelimite setting, i.e., thermal noise is assume to be negligible an all noes have the same transmit ower, normalize to one. (The analysis can be extene to inclue thermal noise.) Consier the ho/slot in the tyical route which is subject to the largest number of intra-route interferers, an let the corresoning receiving relay (RX) be locate (without loss of generality) at the origin. The signal-to-interference-ratio (SIR) is a ranom variable (r.v.) efine as SIR = where A( R N ) b z Π e zt z B z z b + (1) N n=1,n N 2 r b n e n B n A is the faing coefficient between RX an its transmitting noe, exonentially istribute with unit mean. Π is the oint rocess of inter-route noes, scheule at the given slot. e z = 1, when the noe at location z transmits a acket. If the noe is a source, then P(e z = 1) = (the resective robability for a relay follows in the next section. B z is the faing coefficient between the noe locate at z an RX, an is exonentially istribute with unit mean. n is the inex of the intra-route noe scheule to transmit in the given slot. For = 1,...,N 1, the istance of that noe from RX is r n R N N 2 = n n + 1, n = 1,..., N 2 1 N 1, n = N ,..., N (The inex N 2 corresons to the esire transmitter.) {e n, B n } are efine similarly to {e z, B z }. We enote the total intra-route an inter-route interference as I i an I o, resectively. The resective SIRs are enote as SIR i an SIR o. C. Definition of metrics The mean en-to-en elay D corresoning to the tyical route is efine as the mean total time (in slots) that it takes a acket to travel from the hea of the source queue to its P(SIRo θ) Sim., N = 2k Poisson, ens. λk Sim., N = k Poisson, ens. λk Fig. 1. Success robability vs. k taking into account only inter-route interference (R = 5 m, λ = 1 4, =.5, θ = 6 B, b = 4). estination. D is the sum of the mean service time at the source, an the service times an waiting times along the relays of the route. The service time is measure from the moment a acket reaches the hea of the queue until it is successfully receive by the next noe. The waiting time is measure starting from the moment a acket arrives at a relay s queue until it becomes the hea-of-line acket, i.e., all ackets in front of it have been successfully transmitte to the next noe. The route throughut T is efine as the execte number of ackets successfully elivere to the estination er slot. By efinition, T > 1/D, i.e., the inverse of the elay rovies a lower boun on the throughut. As a result, by minimizing D, a lower boun on the throughut is also maximize. The next two sections focus on the evaluation an otimization of D. k III. DELAY ANALYSIS In orer to make the analysis tractable, assume that acket successes across all hos on all routes are ineenent events. The assumtion is base on the observation that if the robability that a noe is a transmitter is small, then, in combination with faing, a sufficient egree of ranomization is achieve in the network 2. Moreover, consier the worst-case scenario where acket success robabilities across hos of the tyical route are all equal to the smallest one, corresoning to the receiver(s) subject to the largest number of intra-route interferers. Denote this robability by s. It is then unerstoo that a necessary conition for the relay buffers to be stable is that < r, as then the acket arrival robability to the first relay, s, is smaller than the acket earture robability from the first an all subsequent relays, r s. As formally shown in [7], acket arrivals to all relays are ii geometric with arameter s, an the robability that a relay locate at z transmits a acket is simly P(e z = 1) =. 2 In the case = 1, a relay is either allowe to transmit or receive at a given time, which creates correlation between the success robabilities. However, such a scenario arises when successive noes actually have ackets to transmit, which, as we will see in Section IV, is unlikely for sufficiently small.

3 If = N, then, since Ψ is a PPP, it follows from the islacement theorem [8] that the oint rocesses of otential inter-route interferers Π, an actual inter-route interferers Π 2 = {z : e z = 1, t z = 1}, are PPPs with ensities λ an λ resectively. By Corollary 3.2 in [9], the ho success robability is therefore s = P(SIR o θ) = e λc(r/n)2, where c = Γ(1+2/b)Γ(1 2/b)πθ 2/b is the satial contention arameter [4] an Γ(x), x >, is the gamma function. For < N, Π 2 can be well aroximate as a PPP of ensity λ = λk, where k = N/ is the average number of scheule noes er route. This is shown in Fig. 1, where we have evaluate the success robability via simulation taking into account only inter-route interference, P(SIR o θ), an comare it to the exression e λkc(r/n)2, for ifferent k, an N = k, 2k (i.e, = 1, 2). Since P(A x) = e x, s = P(SIR θ), where the SIR is efine in (1), can be written as s = Φ Ii (γ)φ Io (γ), (2) where Φ X (s) = E[e Xs ], s >, enotes the Lalace transform of the f of the r.v. X an γ ( ) R b N θ. Base on the observation of the revious aragrah, we can aroximate Φ Io (γ) by [8] Φ Io (γ) e λkc(r/n)2 = e λcr2 N. (3) Since {e n, B n } are ineenent, it is also straightforwar to show that [4] Φ Ii (γ) = ( ) r b n n /γ, (4) where n takes values as in (1). Note that, for = 1, Φ Ii (γ) inclues the term 1, which is the robability that the receiver has no ackets in its queue. Moreover, Φ Ii (γ) oes not een on the hoing istance R/N. A. Delay an throughut exressions Following the analysis in [1], the service time for the heaof-line acket at the source is H = s + 1, an, similarly, the service time for the hea-of-line acket at a relay is H r = + 1. r s Moreover, the waiting time at the queue of a relay is Q r = r 1 r s ( r ) s. The en-to-en elay of the tyical route is therefore D = H + (N 1)(H r + Q r ) = + (N 1) 1 s N( 1). (5) s ( r ) s ΦIi N =.1 =.5 Fig. 2. Success robability taking into account only intra-route interference (b = 4, θ = 6 B). Since a acket is receive by the estination every slots with robability s, the first term is the inverse of the (stable) en-to-en throughut T = s /. The secon term is ominate by the value of ( r s s ) 1, i.e., the inverse of the ifference between the acket service an acket arrival rate at the buffer of each relay. Therefore, in orer to minimize D, the en-to-en throughut an the time sent in the relay queues must be otimally trae off. Given that for small values of, 1 s 1, the simler exression D = (N 1) + N( 1) (6) s ( r ) s rovies a tight uer boun to D. IV. DELAY OPTIMIZATION In this section, we exlore the eenence of D on the arameters N,,. For convenience, we let N [1, + ) an [1, N], an set Φ Ii (γ) 1, i.e., we temorarily ignore intra-route interference. As seen in Fig. 2, Φ Ii is insensitive to N for N 1 an a given, while, for a given N, it quickly aroaches unity as increases. In the first case, we thus exect that the aroximation will yiel a constant, albeit small, erformance ga for small, while, in the latter case, this ga will ecrease with increasing. These qualitative observations are confirme by numerical examles. First, we observe that the following scaling law hols. Proosition 1 As R, D = O(R 2 ) only if N/ = Θ(R 2 ). Proof: Due to the fact that s e λcr2 N, we can see from (6) that N/ = o(r 2 ) imlies that D = ω(e R 2 ). If N/ = ω(r 2 ), then, fixing an imlies that N = ω(r 2 ), hence D = ω(r 2 ). Accoring to Proosition 1, N/ Θ(R 2 ) results in a scaling of D which is worse than quaratic. Hence, in otimizing D over N,,, we constrain the arameter set to

4 1 5 r =.5 r =.1 r =.2 8 x , fixe q 5 D (slots) Max reuse, otimal Otimal reuse, fixe, otimal Fig. 3. q - efine in (7) - vs., for ifferent values of r. satisfy N/ = Θ(R 2 ). Uner this constraint, the success robability satisfies s = e Θ(1). A. Fixe source transmission robability Suose that is fixe. The following roosition characterizes the - jointly - elay-otimal N an. Proosition 2 Denote by N o an o the values of N an that jointly minimize (6) when R + an efine q = 1 1 r. (7) If q, then N o = o = Θ(R). If q > 1, then o < N o an N o = Θ(R), o = Θ(R). Proof: From Proosition 1 an (6) we have that D = qe Θ(1) + g ( r eθ(1) g 1 1 ), (8) where q is efine in (7) an g N. The erivative with resect to is D = qeθ(1) g 2. If q, the erivative is always negative an the minimum D is achieve for the maximum ossible, i.e., o = N o. Since N o o = Θ(R 2 ), we have o = N o = Θ(R). If q > 1, then (8) is minimize for o = g < g < N qe Θ(1) o. Since g = Θ(R 2 ), we have that N o = Θ(R) an o = Θ(R). Remarks: 1) The arameter q eens on the relation of to r. If r /2, i.e., q, then allowing only one noe to transmit er route minimizes the en-to-en elay. The intuition behin this rule is that, since the traffic is heavy in the relay queues (high-traffic regime), it is referable to kee interference low at the exense of satial reuse. On the other han, if the system is oerate in a low-traffic regime, i.e., q > 1, the elay is minimize if o an N o are linear functions of R, i.e., if a constant number of noes k o = N o / o (as a function of R) is scheule to transmit in each slot. As seen Fig. 4. D - eq. (5) - vs. R, otimize over, N, for =.4, an otimize over, N, jointly. For fixe, D = Θ(R 2 ). For otimize, = 1 is otimal an D = Θ(R). The resective curves with no satial reuse are shown for comarison. (λ = 1 4 routes/m 2, r =.1, b = 4 an θ = 6 B.) λt (ac./slot/m 2 ) 1 5 Otimal reuse, inter route interf. only Otimal reuse, total interf. 1 8 Fig. 5. λt vs. R, for =.4. All curves follow the tren R 1 but satial reuse rovies a throughut gain over no satial reuse. (λ = 1 4 routes/m 2, r =.1, b = 4 an θ = 6 B.) in Fig. 3, the transition of q from negative to ositive values is very stee aroun = r /2 (hence the range q (, 1) is inconsequential). We may seak of a hase transition from no satial reuse to satial reuse, as becomes smaller than r /2. 2) From (6), we can see that, in both high an low traffic regimes, D = Θ(R 2 ) an T = Θ(R 1 ). That no imrovement in elay is achieve by allowing satial reuse is exlaine by the fact that, on the one han, noes get an oortunity to transmit more often, on the other han the interference in the network increases. The benefit of satial reuse is manifeste in terms of a throughut gain, which is of the orer of qe Θ(1). Examle 1: Consier a network with arameters λ = 1 4 routes/m 2, r =.1, =.4, b = 4 an θ = 6 B. We numerically otimize (5) over N Z + an = 1,..., N, an lot the results in Figs We observe that the results of Proosition 2 are confirme an that taking into account intra-route interference results in a larger (or smaller N an T ) than the case where only inter-route interference is taken

5 Φ Ii Otimal reuse 2 15 Max reuse, otimal Otimal reuse, fixe, fixe s.6.5 No 1, otimal Fig. 6. s vs. R, for =.4. The asymtotic value of s is aroximately.37. Φ Ii is lotte for comarison; it is very close to one for all R. (λ = 1 4 routes/m 2, r =.1, b = 4 an θ = 6 B.) Total interf. Inter route interf. Fig. 8. Otimal number of hos vs. R, corresoning to Fig. 4. When is fixe, N is quaratic in R for each ste of - see Fig. 7 - but the overall tren is Θ(R). When is otimize, = 1 is otimal an N = Θ(R). The resective curves for no satial reuse are shown for comarison. (λ = 1 4 routes/m 2, r =.1, b = 4 an θ = 6 B.) λt (ac./slot/m 2 ) 1 5 Otimal reuse, inter route interf. only Otimal reuse, total interf. 2 Fig. 7. Otimal satial reuse vs. R, for =.4. Taking into account both inter an intra-route interference results in less aggressive reuse. (λ = 1 4 routes/m 2, r =.1, b = 4 an θ = 6 B.) into account. The corresoning elay curves, however, are inistinguishable. These results illustrate that, for sufficiently small, a throughut gain is achieve comare to the case of no satial reuse. However, as seen in Fig. 8, this comes at a cost in terms of the require number of hos. For a fair comarison between the two cases in the sense of require resources, i.e., relays, we constrain the number of hos to be no larger than 5, which is the maximum value of N with no satial reuse for R = 8 m. The network throughut er unit area is lotte vs. R in Figs. 9. At R 2 m, the constraint on N takes effect, so, by Proosition 1, starts to increase quaratically with R, hence the throughut ecreases as 1/R 2, until = N. The main message of Fig. 9 is that juicious (over no) satial reuse results in a throughut gain which eens on R, given the constraint lace on N. B. Variable source transmission robability We now consier the scenario where N, an are jointly otimize. We have the following result. 1 8 Fig. 9. λt vs. R for =.4 an N 5. In contrast to Fig. 5, the throughut gain achieve with satial reuse ecreases with R, since increases quaratically with R. (λ = 1 4 routes/m 2, r =.1, b = 4 an θ = 6 B.) Proosition 3 Denote by N o, o an o the values of N, an that jointly minimize (6) when R. Then o, N o o = Θ(1) an o N 2 o = Θ(R 2 ). Proof: D, given in (8), is strictly convex in (, r ) an lim + D = lim r D = +. As a result, the otimal, o, is obtaine by setting D = or =o,= o o 2 + o o ( r o ) 2 = g r ( r o ) 2 + g ( ) 1 1. (9) e Θ(1) o We have the following cases: 1) o = Θ(1): The scaling with R on both sies is the same iff o = Θ(R 2 ). However, the constraint N o o / o = Θ(R 2 ) woul then imly that N o = Θ(1), which violates the requirement o N o. 2) o : Due to the constraint 1, it is necessary that = ω(1). Since g = Θ(R 2 ), (9) imlies that o / 2 o = Θ(R2 ).

6 λt (ac./slot/m 2 ) 1 5 Max reuse Max reuse, 1/D Max reuse 1 9 Fig. 1. λt vs. R, for otimize. With maximum reuse, the throughut scales as R 1. The inverse of D is a lower boun to T. (λ = 1 4 routes/m 2, r =.1, b = 4 an θ = 6 B.) Fig. 11. Otimal vs. R. The scaling is = Θ(R 1 ); with no reuse, = Θ(R 2/3 ) [2]. (λ = 1 4 routes/m 2, r =.1, b = 4 an θ = 6 B.) Since N o o / o = Θ(R 2 ), we have that N o o = Θ(1) an o No 2 = Θ(R2 ). Remarks: 1) Eq. (6) can be rewritten as: D = ( 1 s + N 1 ) r N + N. Since o an N o o = Θ(1), = 1, i.e., maximum satial reuse minimizes D. As a result, N o = Θ(R) an o = Θ(R 1 ). The scaling o = Θ(R 1 ) also imlies that the robability of any two consecutive relays in the tyical route transmitting a acket is of the orer N 2 = Θ(R 1 ), i.e., it goes to zero as R grows large. 2) D = Θ(R) an T = Θ(R 1 ). Note that these scaling laws are erive with no constraint on N. If N (hence ) is constraine, then, by Proosition 1, = Θ(R 2 ). Examle 2: Consier a network with the same arameters as in Examle 1, with the only ifference that is allowe to vary in (,.1). The numerically otimize D is shown in Fig. 4 an the resective throughut an otimal in Figs Given the selecte arameters, we obtaine that = 1 was otimal for the whole range of R. Moreover, we verifie that the effect of intra-route comare to inter-route interference was negligible. Figs. 4, 1-11 confirm the scaling laws erive in Proosition 3. ACKNOWLEDGMENTS The artial suort of the DARPA/IPTO IT-MANET rogram (grant W911NF ) is gratefully acknowlege. REFERENCES [1] K. Stamatiou, F. Rossetto, M. Haenggi, T. Javii, J. R. Zeiler, an M. Zorzi, A elay-minimizing routing strategy for wireless multiho networks, in Worksho on Satial Stochastic Moels for Wireless Networks (SaSWiN), Seoul, Jun. 29. [2] K. Stamatiou an M. Haenggi, The elay-otimal number of hos in Poisson multi-ho networks, in IEEE Symosium on Information Theory (ISIT 1), Austin, TX, Jun. 21. [3] S. P. Weber, X. Yang, J. G. Anrews, an G. e Veciana, Transmission caacity of wireless a hoc networks with outage constraints, IEEE Trans. Inf. Theory, vol. 51, , Dec. 25. [4] M. Haenggi, Outage, local throughut, an caacity of ranom wireless networks, IEEE Transactions on Wireless Communications, vol. 8, no. 8, , Aug. 29. [5] J. G. Anrews, S. Weber, M. Kountouris, an M. Haenggi, Ranom access transort caacity, IEEE Transactions on Wireless Communications, vol. 9, no. 6, , Jun. 21. [6] M. Sikora, J. N. Laneman, M. Haenggi, D. J. Costello, an T. Fuja, Banwith- an ower-efficient routing in linear wireless networks, Joint Secial Issue of IEEE Transactions on Information Theory an IEEE Transactions on Networking, vol. 52, , Jun. 26. [7] J. Hsu an P. P. Burke, Behavior of tanem buffers with geometric inut an Markovian outut, IEEE Transactions on Communications, vol. 24, no. 3, , Mar [8] M. Haenggi, J. G. Anrews, F. Baccelli, O. Dousse, an M. Franceschetti, Stochastic geometry an ranom grahs for the analysis an esign of wireless networks, IEEE Journal on Selecte Areas in Communications, vol. 27, no. 7, , Se. 29. [9] F. Baccelli, B. Błaszczyszyn, an P. Mühlethaler, An Aloha rotocol for multi-ho mobile wireless networks, IEEE Trans. Inf. Theory, vol. 52, , Feb. 26. V. CONCLUSIONS We roose a framework to characterize the elay-otimal number of hos an intra-route satial reuse in Poisson multiho networks. The scaling of the elay an throughut as functions of R were characterize. Our results have alications in routing algorithms for multi-ho networks where the relays are also ranomly locate, e.g., a routing rotocol can select the relays which are foun closest to the ieal locations etermine by the analysis.

Delay characterization of multi-hop transmission in a Poisson field of interference

Delay characterization of multi-hop transmission in a Poisson field of interference 1 Delay characterization of multi-ho transmission in a Poisson field of interference Kostas Stamatiou and Martin Haenggi, Senior Member, IEEE Abstract We evaluate the end-to-end delay of a multi-ho transmission

More information

Spatial Outage Capacity of Poisson Bipolar Networks

Spatial Outage Capacity of Poisson Bipolar Networks Satial Outage Caacity of Poisson Biolar Networks Sanket S. Kalamkar and Martin Haenggi Deartment of Electrical Engineering, University of Notre Dame, Notre Dame, IN 46556, USA E-mail: skalamka@nd.edu,

More information

Lecture 6 : Dimensionality Reduction

Lecture 6 : Dimensionality Reduction CPS290: Algorithmic Founations of Data Science February 3, 207 Lecture 6 : Dimensionality Reuction Lecturer: Kamesh Munagala Scribe: Kamesh Munagala In this lecture, we will consier the roblem of maing

More information

Consistency and asymptotic normality

Consistency and asymptotic normality Consistency an asymtotic normality Class notes for Econ 842 Robert e Jong March 2006 1 Stochastic convergence The asymtotic theory of minimization estimators relies on various theorems from mathematical

More information

Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications

Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Bartłomiej Błaszczyszyn Paul Muhlethaler Nadjib Achir INRIA/ENS INRIA Rocquencourt INRIA Rocquencourt

More information

7. Introduction to Large Sample Theory

7. Introduction to Large Sample Theory 7. Introuction to Large Samle Theory Hayashi. 88-97/109-133 Avance Econometrics I, Autumn 2010, Large-Samle Theory 1 Introuction We looke at finite-samle roerties of the OLS estimator an its associate

More information

Colin Cameron: Asymptotic Theory for OLS

Colin Cameron: Asymptotic Theory for OLS Colin Cameron: Asymtotic Theory for OLS. OLS Estimator Proerties an Samling Schemes.. A Roama Consier the OLS moel with just one regressor y i = βx i + u i. The OLS estimator b β = ³ P P i= x iy i canbewrittenas

More information

Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks

Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks Tra Coverage: Allowing Coverage Holes of Boune Diameter in Wireless Sensor Networks Paul Balister Zizhan Zheng Santosh Kumar Prasun Sinha University of Memhis The Ohio State University {balistr,santosh.kumar}@memhis.eu

More information

Throughput Optimal Control of Cooperative Relay Networks

Throughput Optimal Control of Cooperative Relay Networks hroughput Optimal Control of Cooperative Relay Networks Emun Yeh Dept. of Electrical Engineering Yale University New Haven, C 06520, USA E-mail: emun.yeh@yale.eu Ranall Berry Dept. of Electrical an Computer

More information

Colin Cameron: Brief Asymptotic Theory for 240A

Colin Cameron: Brief Asymptotic Theory for 240A Colin Cameron: Brief Asymtotic Theory for 240A For 240A we o not go in to great etail. Key OLS results are in Section an 4. The theorems cite in sections 2 an 3 are those from Aenix A of Cameron an Trivei

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

The Effect of a Finite Measurement Volume on Power Spectra from a Burst Type LDA

The Effect of a Finite Measurement Volume on Power Spectra from a Burst Type LDA The Effect of a Finite Measurement Volume on Power Sectra from a Burst Tye LDA Preben Buchhave 1,*, Clara M. Velte, an William K. George 3 1. Intarsia Otics, Birkerø, Denmark. Technical University of Denmark,

More information

Convergence Analysis of Terminal ILC in the z Domain

Convergence Analysis of Terminal ILC in the z Domain 25 American Control Conference June 8-, 25 Portlan, OR, USA WeA63 Convergence Analysis of erminal LC in the Domain Guy Gauthier, an Benoit Boulet, Member, EEE Abstract his aer shows how we can aly -transform

More information

On the Aloha throughput-fairness tradeoff

On the Aloha throughput-fairness tradeoff On the Aloha throughput-fairness traeoff 1 Nan Xie, Member, IEEE, an Steven Weber, Senior Member, IEEE Abstract arxiv:1605.01557v1 [cs.it] 5 May 2016 A well-known inner boun of the stability region of

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

The thermal wind 1. v g

The thermal wind 1. v g The thermal win The thermal win Introuction The geostrohic win is etermine by the graient of the isobars (on a horizontal surface) or isohyses (on a ressure surface). On a ressure surface the graient of

More information

5. THERMAL CONVERSION OF SOLAR RADIATION. Content

5. THERMAL CONVERSION OF SOLAR RADIATION. Content 5. Introuction 5. THEMAL CONVESION OF SOLA ADIATION Content 5. Introuction 5. Collectors without concentration 5.. Otical efficiency of the flat collector 5.. Thermal efficiency of the flat collector 5..3

More information

An Analysis of TCP over Random Access Satellite Links

An Analysis of TCP over Random Access Satellite Links An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance

More information

Shared-State Sampling

Shared-State Sampling Share-State Samling Freeric Rasall, Sebastia Sallent an Jose Yufera Det. of Telematics, Technical University of Catalonia (UPC) frei@entel.uc.es, sallent@entel.uc.es, yufera@entel.uc.es ABSTRACT We resent

More information

An Analytical Expression of the Probability of Error for Relaying with Decode-and-forward

An Analytical Expression of the Probability of Error for Relaying with Decode-and-forward An Analytical Expression of the Probability of Error for Relaying with Decoe-an-forwar Alexanre Graell i Amat an Ingmar Lan Department of Electronics, Institut TELECOM-TELECOM Bretagne, Brest, France Email:

More information

Lenny Jones Department of Mathematics, Shippensburg University, Shippensburg, Pennsylvania Daniel White

Lenny Jones Department of Mathematics, Shippensburg University, Shippensburg, Pennsylvania Daniel White #A10 INTEGERS 1A (01): John Selfrige Memorial Issue SIERPIŃSKI NUMBERS IN IMAGINARY QUADRATIC FIELDS Lenny Jones Deartment of Mathematics, Shiensburg University, Shiensburg, Pennsylvania lkjone@shi.eu

More information

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device Close an Open Loop Optimal Control of Buffer an Energy of a Wireless Device V. S. Borkar School of Technology an Computer Science TIFR, umbai, Inia. borkar@tifr.res.in A. A. Kherani B. J. Prabhu INRIA

More information

Bivariate distributions characterized by one family of conditionals and conditional percentile or mode functions

Bivariate distributions characterized by one family of conditionals and conditional percentile or mode functions Journal of Multivariate Analysis 99 2008) 1383 1392 www.elsevier.com/locate/jmva Bivariate istributions characterize by one family of conitionals an conitional ercentile or moe functions Barry C. Arnol

More information

arxiv: v2 [math.nt] 28 Jun 2017

arxiv: v2 [math.nt] 28 Jun 2017 GEERATIG RADOM FACTORED IDEALS I UMBER FIELDS ZACHARY CHARLES arxiv:62.06260v2 [math.t] 28 Jun 207 Abstract. We resent a ranomize olynomial-time algorithm to generate an ieal an its factorization uniformly

More information

Skiba without unstable equlibrium in a linear quadratic framework

Skiba without unstable equlibrium in a linear quadratic framework Skiba without unstable equlibrium in a linear quaratic framework Richar F. Hartl Institute of Management, University of Vienna, Brünnerstraße 8, -0 Vienna, ustria Richar.Hartl@univie.ac.at Tel. +43--477-3809

More information

Delay-Based Connectivity of Wireless Networks

Delay-Based Connectivity of Wireless Networks Delay-Based Connectivity of Wireless Networks Martin Haenggi Abstract Interference in wireless networks causes intricate dependencies between the formation of links. In current graph models of wireless

More information

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 On the Relationshi Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 Imad Antonios antoniosi1@southernct.edu CS Deartment MO117 Southern Connecticut State University 501 Crescent St.

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

Submitted to the Journal of Hydraulic Engineering, ASCE, January, 2006 NOTE ON THE ANALYSIS OF PLUNGING OF DENSITY FLOWS

Submitted to the Journal of Hydraulic Engineering, ASCE, January, 2006 NOTE ON THE ANALYSIS OF PLUNGING OF DENSITY FLOWS Submitte to the Journal of Hyraulic Engineering, ASCE, January, 006 NOTE ON THE ANALYSIS OF PLUNGING OF DENSITY FLOWS Gary Parker 1, Member, ASCE an Horacio Toniolo ABSTRACT This note is evote to the correction

More information

Delay Limited Capacity of Ad hoc Networks: Asymptotically Optimal Transmission and Relaying Strategy

Delay Limited Capacity of Ad hoc Networks: Asymptotically Optimal Transmission and Relaying Strategy Delay Limite Capacity of A hoc Networks: Asymptotically Optimal Transmission an Relaying Strategy Eugene Perevalov Lehigh University Bethlehem, PA 85 Email: eup2@lehigh.eu Rick Blum Lehigh University Bethlehem,

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

Capacity Analysis of MIMO Systems with Unknown Channel State Information

Capacity Analysis of MIMO Systems with Unknown Channel State Information Capacity Analysis of MIMO Systems with Unknown Channel State Information Jun Zheng an Bhaskar D. Rao Dept. of Electrical an Computer Engineering University of California at San Diego e-mail: juzheng@ucs.eu,

More information

MINIMAL MAHLER MEASURE IN REAL QUADRATIC FIELDS. 1. Introduction

MINIMAL MAHLER MEASURE IN REAL QUADRATIC FIELDS. 1. Introduction INIAL AHLER EASURE IN REAL QUADRATIC FIELDS TODD COCHRANE, R.. S. DISSANAYAKE, NICHOLAS DONOHOUE,. I.. ISHAK, VINCENT PIGNO, CHRIS PINNER, AND CRAIG SPENCER Abstract. We consier uer an lower bouns on the

More information

A method of constructing the half-rate QC-LDPC codes with linear encoder, maximum column weight three and inevitable girth 26

A method of constructing the half-rate QC-LDPC codes with linear encoder, maximum column weight three and inevitable girth 26 Communications 20; 2(): 22-4 Publishe online January 1 2015 (htt://www.scienceublishinggrou.com/j/com) oi: 10.11648/j.com.20020.11 ISSN: 228-5966 (Print); ISSN: 228-592 (Online) A metho of constructing

More information

ON THE AVERAGE NUMBER OF DIVISORS OF REDUCIBLE QUADRATIC POLYNOMIALS

ON THE AVERAGE NUMBER OF DIVISORS OF REDUCIBLE QUADRATIC POLYNOMIALS ON THE AVERAGE NUMBER OF DIVISORS OF REDUCIBLE QUADRATIC POLYNOMIALS KOSTADINKA LAPKOVA Abstract. We give an asymtotic formula for the ivisor sum c

More information

On Characterizing the Delay-Performance of Wireless Scheduling Algorithms

On Characterizing the Delay-Performance of Wireless Scheduling Algorithms On Characterizing the Delay-Performance of Wireless Scheuling Algorithms Xiaojun Lin Center for Wireless Systems an Applications School of Electrical an Computer Engineering, Purue University West Lafayette,

More information

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

Digitally delicate primes

Digitally delicate primes Digitally elicate rimes Jackson Hoer Paul Pollack Deartment of Mathematics University of Georgia Athens, Georgia 30602 Tao has shown that in any fixe base, a ositive roortion of rime numbers cannot have

More information

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict

More information

On Code Design for Simultaneous Energy and Information Transfer

On Code Design for Simultaneous Energy and Information Transfer On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter

More information

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting On the Role of Finite Queues in Cooerative Cognitive Radio Networks with Energy Harvesting Mohamed A. Abd-Elmagid, Tamer Elatt, and Karim G. Seddik Wireless Intelligent Networks Center (WINC), Nile University,

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

Learning Markov Graphs Up To Edit Distance

Learning Markov Graphs Up To Edit Distance Learning Markov Grahs U To Eit Distance Abhik Das, Praneeth Netraalli, Sujay Sanghavi an Sriram Vishwanath Deartment of ECE, The University of Texas at Austin, USA Abstract This aer resents a rate istortion

More information

On the Broadcast Capacity of Multihop Wireless Networks: Interplay of Power, Density and Interference

On the Broadcast Capacity of Multihop Wireless Networks: Interplay of Power, Density and Interference On the Broacast Capacity of Multihop Wireless Networks: Interplay of Power, Density an Interference Alireza Keshavarz-Haa Ruolf Riei Department of Electrical an Computer Engineering an Department of Statistics

More information

Age of Information: Whittle Index for Scheduling Stochastic Arrivals

Age of Information: Whittle Index for Scheduling Stochastic Arrivals Age of Information: Whittle Index for Scheduling Stochastic Arrivals Yu-Pin Hsu Deartment of Communication Engineering National Taiei University yuinhsu@mail.ntu.edu.tw arxiv:80.03422v2 [math.oc] 7 Ar

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging 1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014

More information

Capacity Allocation. Outline Two-class allocation Multiple-class allocation Demand dependence Bid prices. Based on Phillips (2005) Chapter 7.

Capacity Allocation. Outline Two-class allocation Multiple-class allocation Demand dependence Bid prices. Based on Phillips (2005) Chapter 7. Caacity Allocation utallas.eu/~metin Page Outline Two-class allocation Multile-class allocation Deman eenence Bi rices Base on Phillis (2005) Chater 7 Booking Limits or 2 Fare Classes utallas.eu/~metin

More information

Probabilistic Learning

Probabilistic Learning Statistical Machine Learning Notes 11 Instructor: Justin Domke Probabilistic Learning Contents 1 Introuction 2 2 Maximum Likelihoo 2 3 Examles of Maximum Likelihoo 3 3.1 Binomial......................................

More information

ALOHA Performs Optimal Power Control in Poisson Networks

ALOHA Performs Optimal Power Control in Poisson Networks ALOHA erforms Optimal ower Control in oisson Networks Xinchen Zhang and Martin Haenggi Department of Electrical Engineering University of Notre Dame Notre Dame, IN 46556, USA {xzhang7,mhaenggi}@nd.edu

More information

Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Codes

Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Codes Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Coes Kaiann Fu an Achilleas Anastasopoulos Electrical Engineering an Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

Vision Graph Construction in Wireless Multimedia Sensor Networks

Vision Graph Construction in Wireless Multimedia Sensor Networks University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Conference and Worksho Paers Comuter Science and Engineering, Deartment of 21 Vision Grah Construction in Wireless Multimedia

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

Levy Process and Infinitely Divisible Law

Levy Process and Infinitely Divisible Law Stat205B: Probability Theory (Spring 2003) Lecture: 26 Levy Process an Infinitely Divisible Law Lecturer: James W. Pitman Scribe: Bo Li boli@stat.berkeley.eu Levy Processes an Infinitely Divisible Law

More information

COMMUNICATION BETWEEN SHAREHOLDERS 1

COMMUNICATION BETWEEN SHAREHOLDERS 1 COMMUNICATION BTWN SHARHOLDRS 1 A B. O A : A D Lemma B.1. U to µ Z r 2 σ2 Z + σ2 X 2r ω 2 an additive constant that does not deend on a or θ, the agents ayoffs can be written as: 2r rθa ω2 + θ µ Y rcov

More information

An M/G/1 Retrial Queue with Priority, Balking and Feedback Customers

An M/G/1 Retrial Queue with Priority, Balking and Feedback Customers Journal of Convergence Information Technology Volume 5 Number April 1 An M/G/1 Retrial Queue with Priority Balking an Feeback Customers Peishu Chen * 1 Yiuan Zhu 1 * 1 Faculty of Science Jiangsu University

More information

THE ZEROS OF A QUADRATIC FORM AT SQUARE-FREE POINTS

THE ZEROS OF A QUADRATIC FORM AT SQUARE-FREE POINTS THE ZEROS OF A QUADRATIC FORM AT SQUARE-FREE POINTS R. C. BAKER Abstract. Let F(x 1,..., x n be a nonsingular inefinite quaratic form, n = 3 or 4. Results are obtaine on the number of solutions of F(x

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

Convergence of random variables, and the Borel-Cantelli lemmas

Convergence of random variables, and the Borel-Cantelli lemmas Stat 205A Setember, 12, 2002 Convergence of ranom variables, an the Borel-Cantelli lemmas Lecturer: James W. Pitman Scribes: Jin Kim (jin@eecs) 1 Convergence of ranom variables Recall that, given a sequence

More information

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding

Homework Set #3 Rates definitions, Channel Coding, Source-Channel coding Homework Set # Rates definitions, Channel Coding, Source-Channel coding. Rates (a) Channels coding Rate: Assuming you are sending 4 different messages using usages of a channel. What is the rate (in bits

More information

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k A Proof of Lemma 2 B Proof of Lemma 3 Proof: Since the support of LL istributions is R, two such istributions are equivalent absolutely continuous with respect to each other an the ivergence is well-efine

More information

Lyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering,

Lyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering, On the Queue-Overflow Probability of Wireless Systems : A New Approach Combining Large Deviations with Lyapunov Functions V. J. Venkataramanan an Xiaojun Lin Center for Wireless Systems an Applications

More information

A Simple Exchange Economy with Complex Dynamics

A Simple Exchange Economy with Complex Dynamics FH-Kiel Universitf Alie Sciences Prof. Dr. Anreas Thiemer, 00 e-mail: anreas.thiemer@fh-kiel.e A Simle Exchange Economy with Comlex Dynamics (Revision: Aril 00) Summary: Mukherji (999) shows that a stanar

More information

Econometrics I. September, Part I. Department of Economics Stanford University

Econometrics I. September, Part I. Department of Economics Stanford University Econometrics I Deartment of Economics Stanfor University Setember, 2008 Part I Samling an Data Poulation an Samle. ineenent an ientical samling. (i.i..) Samling with relacement. aroximates samling without

More information

Improved Rate-Based Pull and Push Strategies in Large Distributed Networks

Improved Rate-Based Pull and Push Strategies in Large Distributed Networks Improve Rate-Base Pull an Push Strategies in Large Distribute Networks Wouter Minnebo an Benny Van Hout Department of Mathematics an Computer Science University of Antwerp - imins Mielheimlaan, B-00 Antwerp,

More information

He s Homotopy Perturbation Method for solving Linear and Non-Linear Fredholm Integro-Differential Equations

He s Homotopy Perturbation Method for solving Linear and Non-Linear Fredholm Integro-Differential Equations nternational Journal of Theoretical an Alie Mathematics 2017; 3(6): 174-181 htt://www.scienceublishinggrou.com/j/ijtam oi: 10.11648/j.ijtam.20170306.11 SSN: 2575-5072 (Print); SSN: 2575-5080 (Online) He

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

Consistency and asymptotic normality

Consistency and asymptotic normality Consistency an ymtotic normality Cls notes for Econ 842 Robert e Jong Aril 2007 1 Stochtic convergence The ymtotic theory of minimization estimators relies on various theorems from mathematical statistics.

More information

Competition in the health care market: a two-sided. approach

Competition in the health care market: a two-sided. approach Cometition in the health care market: a two-sie aroach Mario Pezzino Giacomo Pignataro Abstract Two ientical hositals comete for atients an octors choosing locations (e.g. secializations) on a Hotelling

More information

LDPC codes for the Cascaded BSC-BAWGN channel

LDPC codes for the Cascaded BSC-BAWGN channel LDPC codes for the Cascaded BSC-BAWGN channel Aravind R. Iyengar, Paul H. Siegel, and Jack K. Wolf University of California, San Diego 9500 Gilman Dr. La Jolla CA 9093 email:aravind,siegel,jwolf@ucsd.edu

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

Robust Control of Robot Manipulators Using Difference Equations as Universal Approximator

Robust Control of Robot Manipulators Using Difference Equations as Universal Approximator Proceeings of the 5 th International Conference of Control, Dynamic Systems, an Robotics (CDSR'18) Niagara Falls, Canaa June 7 9, 218 Paer No. 139 DOI: 1.11159/csr18.139 Robust Control of Robot Maniulators

More information

Anytime communication over the Gilbert-Eliot channel with noiseless feedback

Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anant Sahai, Salman Avestimehr, Paolo Minero Deartment of Electrical Engineering and Comuter Sciences University of California

More information

NOTES. The Primes that Euclid Forgot

NOTES. The Primes that Euclid Forgot NOTES Eite by Sergei Tabachnikov The Primes that Eucli Forgot Paul Pollack an Enrique Treviño Abstract. Let q 2. Suosing that we have efine q j for all ale j ale k, let q k+ be a rime factor of + Q k j

More information

Equilibrium in Queues Under Unknown Service Times and Service Value

Equilibrium in Queues Under Unknown Service Times and Service Value University of Pennsylvania ScholarlyCommons Finance Papers Wharton Faculty Research 1-2014 Equilibrium in Queues Uner Unknown Service Times an Service Value Laurens Debo Senthil K. Veeraraghavan University

More information

page 1 This question-paper you hand in, together with your solutions. ================================================================

page 1 This question-paper you hand in, together with your solutions. ================================================================ age EXAMINATION Jan 9 Time :5-7:5 QUEUEING THEORY EP9, HF ( 6H78), Lecturer: Armin Halilovic Instructions:. You ARE allowed to use a calculator.. You are NOT allowed to use your own tables of mathematical

More information

Probabilistic Learning

Probabilistic Learning Statistical Machine Learning Notes 10 Instructor: Justin Domke Probabilistic Learning Contents 1 Introuction 2 2 Maximum Likelihoo 2 3 Examles of Maximum Likelihoo 3 3.1 Binomial......................................

More information

Mod p 3 analogues of theorems of Gauss and Jacobi on binomial coefficients

Mod p 3 analogues of theorems of Gauss and Jacobi on binomial coefficients ACTA ARITHMETICA 2.2 (200 Mo 3 analogues of theorems of Gauss an Jacobi on binomial coefficients by John B. Cosgrave (Dublin an Karl Dilcher (Halifax. Introuction. One of the most remarkable congruences

More information

Topic 7: Convergence of Random Variables

Topic 7: Convergence of Random Variables Topic 7: Convergence of Ranom Variables Course 003, 2016 Page 0 The Inference Problem So far, our starting point has been a given probability space (S, F, P). We now look at how to generate information

More information

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

TRACKING CONTROL OF MULTIPLE MOBILE ROBOTS: A CASE STUDY OF INTER-ROBOT COLLISION-FREE PROBLEM

TRACKING CONTROL OF MULTIPLE MOBILE ROBOTS: A CASE STUDY OF INTER-ROBOT COLLISION-FREE PROBLEM 265 Asian Journal of Control, Vol. 4, No. 3, pp. 265-273, September 22 TRACKING CONTROL OF MULTIPLE MOBILE ROBOTS: A CASE STUDY OF INTER-ROBOT COLLISION-FREE PROBLEM Jurachart Jongusuk an Tsutomu Mita

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

A secure approach for embedding message text on an elliptic curve defined over prime fields, and building 'EC-RSA-ELGamal' Cryptographic System

A secure approach for embedding message text on an elliptic curve defined over prime fields, and building 'EC-RSA-ELGamal' Cryptographic System International Journal of Comuter Science an Information Security (IJCSIS), Vol. 5, No. 6, June 7 A secure aroach for embeing message tet on an ellitic curve efine over rime fiels, an builing 'EC-RSA-ELGamal'

More information

I. INTRODUCTION. Definition 2: (Spatial contention parameter contention is

I. INTRODUCTION. Definition 2: (Spatial contention parameter contention is IEEE/ACM TRANSACTIONS ON NETWORKING 1 Outage Probability of General Ad Hoc Networks in the High-Reliability Regime Riccardo Giacomelli, Radha Krishna Ganti, Member, IEEE, and Martin Haenggi, Senior Member,

More information

arxiv: v1 [math.pr] 28 Jan 2018

arxiv: v1 [math.pr] 28 Jan 2018 Submitte to the Annals of Probability WAVELET ANALYSIS OF THE BESOV REGULARITY OF LÉVY WHITE NOISES arxiv:80.09245v [math.pr] 28 Jan 208 By Shayan Azizneja, Julien Fageot an Michael Unser Ecole olytechnique

More information

A note on asymptotic formulae for one-dimensional network flow problems Carlos F. Daganzo and Karen R. Smilowitz

A note on asymptotic formulae for one-dimensional network flow problems Carlos F. Daganzo and Karen R. Smilowitz A note on asymptotic formulae for one-imensional network flow problems Carlos F. Daganzo an Karen R. Smilowitz (to appear in Annals of Operations Research) Abstract This note evelops asymptotic formulae

More information

Analysis on a Localized Pruning Method for Connected Dominating Sets

Analysis on a Localized Pruning Method for Connected Dominating Sets JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 23, 1073-1086 (2007) Analysis on a Localize Pruning Metho for Connecte Dominating Sets JOHN SUM 1, JIE WU 2 AND KEVIN HO 3 1 Department of Information Management

More information

Training sequence optimization for frequency selective channels with MAP equalization

Training sequence optimization for frequency selective channels with MAP equalization 532 ISCCSP 2008, Malta, 12-14 March 2008 raining sequence otimization for frequency selective channels with MAP equalization Imed Hadj Kacem, Noura Sellami Laboratoire LEI ENIS, Route Sokra km 35 BP 3038

More information

Node Density and Delay in Large-Scale Wireless Networks with Unreliable Links

Node Density and Delay in Large-Scale Wireless Networks with Unreliable Links Noe Density an Delay in Large-Scale Wireless Networks with Unreliable Links Shizhen Zhao, Xinbing Wang Department of Electronic Engineering Shanghai Jiao Tong University, China Email: {shizhenzhao,xwang}@sjtu.eu.cn

More information

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Cooperative HARQ with Poisson Interference and Opportunistic Routing Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline

More information

On the Connectivity Analysis over Large-Scale Hybrid Wireless Networks

On the Connectivity Analysis over Large-Scale Hybrid Wireless Networks This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM proceeings This paper was presente as part of the main Technical

More information

Application of Measurement System R&R Analysis in Ultrasonic Testing

Application of Measurement System R&R Analysis in Ultrasonic Testing 17th Worl Conference on Nonestructive Testing, 5-8 Oct 8, Shanghai, China Alication of Measurement System & Analysis in Ultrasonic Testing iao-hai ZHANG, Bing-ya CHEN, Yi ZHU Deartment of Testing an Control

More information

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE)

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE) KAUST Reository Outage erformance of cognitive radio systems with Imroer Gaussian signaling Item tye Authors Erint version DOI Publisher Journal Rights Conference Paer Amin Osama; Abediseid Walid; Alouini

More information

By completing this chapter, the reader will be able to:

By completing this chapter, the reader will be able to: hater 4. Mechanics of Particles Particle mechanics governs many rinciles of article measurement instrumentation an air cleaning technologies. Therefore, this chater rovies the funamentals of article mechanics.

More information

Power Generation and Distribution via Distributed Coordination Control

Power Generation and Distribution via Distributed Coordination Control Power Generation an Distribution via Distribute Coorination Control Byeong-Yeon Kim, Kwang-Kyo Oh, an Hyo-Sung Ahn arxiv:407.4870v [math.oc] 8 Jul 204 Abstract This paper presents power coorination, power

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

Stability of steady states in kinetic Fokker-Planck equations for Bosons and Fermions

Stability of steady states in kinetic Fokker-Planck equations for Bosons and Fermions www.oeaw.ac.at Stability of steay states in kinetic Fokker-Planck equations for Bosons an Fermions L. Neumann, C. Sarber RICAM-Reort 2006-34 www.ricam.oeaw.ac.at STABILITY OF STEADY STATES IN KINETIC FOKKER-PLANCK

More information

Sliding mode approach to congestion control in connection-oriented communication networks

Sliding mode approach to congestion control in connection-oriented communication networks JOURNAL OF APPLIED COMPUTER SCIENCE Vol. xx. No xx (200x), pp. xx-xx Sliing moe approach to congestion control in connection-oriente communication networks Anrzej Bartoszewicz, Justyna Żuk Technical University

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

Online Nearest Neighbor Search in Hamming Space

Online Nearest Neighbor Search in Hamming Space Online Nearest Neighbor Search in Hamming Sace Seehr Eghbali, Hassan Ashtiani, Laan Tahvilari University of Waterloo, Ontario, Canaa Email: {s2eghbal, mhzokaei, laan.tahvilari}@uwaterloo.ca Abstract We

More information

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION O P E R A T I O N S R E S E A R C H A N D D E C I S I O N S No. 27 DOI:.5277/ord73 Nasrullah KHAN Muhammad ASLAM 2 Kyung-Jun KIM 3 Chi-Hyuck JUN 4 A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST

More information