A Simple Throughput Model for TCP Veno
|
|
- Bethanie Hart
- 6 years ago
- Views:
Transcription
1 A Simle Throughut Model for TCP Veno Bin Zhou, Cheng Peng Fu, Dah-Ming Chiu, Chiew Tong Lau, and Lek Heng Ngoh School of Comuter Engineering, Nanyang Technological University, Singaore {zhou00, ascfu, Deartment of Information Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong Networking Deartment, Institute for Infocomm Research, Singaore Abstract TCP Veno was roosed to eliminate TCP erformance suffering from wireless links Real network measurements and live Internet results have validated TCP Veno s significant throughut imrovement in wireless networks and its harmonious co-existence with TCP Reno connections in wired networks In this aer, we develo a simle analytic aroach to characterize TCP Veno behavior in both wire and wireless situations Being different from the equation of TCP Reno, a more general close formula is derived, taking into account of the refined multilicative decrease algorithm in Veno, to model the throughut for a bulk transfer of TCP Veno flow Our simulation and exerimental results demonstrate that such an equation is able to accurately redict TCP Veno throughut over different network scenarios, ranging from very low lossy links to very heavy lossy links I INTRODUCTION TCP Reno [1] is the dominating version of TCP Over last decade, many efforts have been made to model its throughut in a bulk transfer TCP flow Among those work, a equation derived by [] hereinafter, called Reno equation has been widely used today, eg, in the TCP-Friendly Rate Control TFRC rotocol [3] Recently, wireless communication technology has been making significant rogress and will be laying a more and more imortant role in the future Such evolution brings new challenges to TCP Reno For examle, Reno assumes acket loss is always induced by congestion, which can lead to significant erformance degradation in wireless networks, where random loss is ramant due to environmental noise To deal with random loss effectively, a novel end-to-end congestion control mechanism called TCP Veno [4][7][9][1][13] was roosed The key innovation in Veno is the enhancement of Reno congestion control algorithm by making use of the estimated state of a connection based on Vegas [5] This scheme significantly reduces blind reduction of TCP window regardless of the cause of acket loss Thus Veno is suitable for any heterogeneous networks, articularly when wireless links form art of such networks [6][8][][11] In this aer, we develo a simle analytic aroach to characterize TCP Veno behavior in both wire and wireless situations Being different from the equation of TCP Reno, a more general closed form equation hereinafter, called Veno equation is derived, taking into account of the refined multilicative decrease algorithm in Veno, to model the throughut for a bulk transfer of TCP Veno flow The remainder of the aer is organized as follows In Section, we describe TCP Veno mechanism in detail Then Section 3 gives the derivation of Veno equation A validation of this equation on NS- [14] simulation and wireless LAN exeriments is resented in Section 4 Finally, Section 5 concludes our work and gives the future directions II BASIC MECHANISM OF VENO TCP Veno makes use of the state distinguishing scheme from TCP Vegas, and integrates it into congestion window evolution scheme of TCP Reno In Vegas, the sender measures the so-called Exected and Actual rates: Exected = BaseRTT Actual = where, is the current congestion window size, BaseRTT is the minimum of measured round-tri time, and is the smoothed round-tri time measured The difference of the rate is: Diff = Exected Actual When > Base, there is a bottleneck link where the ackets of the connection accumulate Let the backlog at the queue be denoted by N Wehave: = BaseRTT N Actual That is, we attribute the extra delay to the bottleneck link in the second term of the right side above Rearranging, we have: N = Actual BaseRTT = Diff BaseRTT = BaseRTT BaseRTT The main idea of Veno is to use the measurement of N as an indication of whether the network is in congestive state or non-congestive state At any time, if N β, Veno deduces the link is in congestive state and considers the acket loss is congestion loss Otherwise if N<β, the link
2 is in non-congestive state and the acket loss is random loss Here β is normally set to be 3 Based on the differentiated state, Veno alies different algorithms to Reno s additive increase AI and multilicative decrease MD hases, thus makes congestion window evolution more efficient: In AI hase, IF N <β THEN set = 1 for every new ACK ELSE IF N β THEN set = 1 for every other new ACK In MD hase, 1Retransmit the missing acket, and IF N <β THEN set ssthresh = 4 5 ELSE IF N β THEN set ssthresh = 1, and set = ssthresh 3 Each time another du ACK arrives, increment by one acket 3When the next ACK acknowledging new data arrives, set to ssthresh value in ste 1 Note that, Veno only refines the AIMD mechanism of Reno All other arts of Reno, including initial slow start, fast retransmit, fast recovery, comutation of the retransmission timeout, and the backoff algorithm remain intact III DERIVATION OF VENO EQUATION From the mathematical view, we simlify the above AIMD mechanism as follows: in AI hase, { 1 =, for every new ACK N<β 1, for every other new ACK N β and in MD hase, { 4 = 5 N<β 1 N β As shown in Figure 1, although new AI hase in Veno brings certain imrovement in throughut, the most enhancement of Veno is contributed by the MD hases at random losses ie, cutting down 1 5 rather than 1 of To simlify the roblem, we ignore the different AI hases of Veno and Reno in the following derivation As a result, Veno acts quite similarly as Reno, and the only difference between Veno and Reno is how much value should be cut down when losses occur: Reno always cuts down 1 and, while Veno sometimes cuts down 1 congestion loss, and sometimes cuts down 1 5 random loss In this case, we introduce a random variable λ to reresent the roortion of value after cut down, instead of a 1 constant Hereλ can be 1 or 4 5 with certain robability This is a new arameter introduced by Veno s MD hase characteristic The following derivation is divided into three stes: firstly we only consider the situation where acket losses W Fig 1 1/ 1/5 Congestion Loss Random Loss Random Loss X 1 X X 3 1/5 X 4 Veno Reno Congestion window evolution of Veno and Reno No of rounds is indicated by the trile dulicated ACKs We call these losses trile-dulicated TD losses; then we include acket losses indicated by time outs, which are called time-out TO losses; finally we extend our model to include the imact of advertisement window limitation A Veno Equation for Only TD Losses According to equation 7 in [] we have: W i = λ i W i 1 X i 1 b where, W i 1, W i are value before the revious TD loss and the next TD loss resectively, X i is the number of round between these two losses, and b is the number of ackets that are acknowledged by a received ACK Note that all these arameters have the same meanings as those in [] In addition, λ i is the roortion of value 1 or 4 5 after the revious TD loss Then the ackets transmitted between these two TD losses are: Y i = X i/b 1 k=0 λ i W i 1 kb β i = λ i W i 1 X i X i X i b 1 β i = X i λ iw i 1 W i 1 1 β i using1 where β i is the number of ackets sent in the last round, as seen in [] As same in [], β i is considered as a uniformly distributed variable between 1 and W i From above equation 1, and equation 5 in aer [], we have: 1 1 E[λ]E[W ]= E[X] b 3 E[W ]= E[X] 1 E[λ]E[W ] 1 E[β] 4 where, E[β] = E[W ], and is the robability that a acket is lost, given that either it is the first acket in its round or the receding acket in its round is not lost Note that includes both congestion and random losses
3 Let γ = E[λ], and from 3 and 4 we can get: b1 γ1 b1 γ1 E[W ]= b1 γ 1 b1 γ b 1 γ 5 Then from above equation 3 and equation 6 in aer [], it follows: E[X] = b1 γ1 1 γ and, E[A] = b1 γ1 1γ b1 γ1 1 γ b1 γ 1γ b1 γ1 1 γ 6 b1 γ1 1γ 1 7 Finally, substitute E[A] and E[W ] into equation 1 and 5 in aer [] we have: B = = E[W ] E[A] b1 γ1 b1 γ b1 γ1 1γ b1 γ1 b1 γ b 1 γ b1 γ1 b1 γ 1γ 1γ 1 8 For small values of, it can be aroximated by: B 1 1 γ 9 b1 γ B Veno Equation for Both TD and TO Losses So far equation 9 gives Veno equation when only TD losses occur Actually there are many TO losses over real communications, and they must be included in the model According to equation 1 in [], with TO losses the throughut can be written as follows: E[Y ]Q E[R] B = E[A]Q E[Z TO ] where, E[Y ] and E[A] have been derived in the revious section Q is the robability that a loss indication ending a TD eriod is a TO, E[R] is the mean number of ackets sent during TO eriods, and E[Z TO ] denotes the mean duration of TO eriods As we have ointed out before, Veno does not change Reno s algorithms on dealing with TO losses, such as the comutation of the timeout, and the backoff algorithm We can easily derive the equation following the same routine described in [], because the exressions of Q, E[R], and E[Z TO ] are same in both Veno and Reno Therefore, we have: B = E[W ] ˆQE[W ] 1 E[X]1 ˆQE[W ]T 0 f 11 where, E[W ] and E[X] have been given in the revious section Note that, both E[W ] and E[X] now include a new arameter γ here T 0 denotes the eriod the sender will wait for to retransmit non-acknowledged acket, ˆQw = min1, w w 1 and, f = For small values of, equation 11 can be aroximated by: B 1 b1 γ T 1γ 0 min 1,3 b1 γ 13 C Veno Equation with Imact of window limitation 14 Finally, we consider the Veno equation with the imact of the advertisement window limitation In such scenario, the congestion window will start increase after the revious loss, and will kee constant when it reaches the advertisement window limitation Let W max denote the advertisement window limitation, U i denote the number of rounds where the congestion window increases, and V i denote the number of rounds where the congestion window kees constant Due to the new MD hase in Veno, W max has following equation, according to []: W max = λ i W max U i 15 b where, λ i is the roortion of value after the revious TD loss 1 or 4 5, as defined in Section A We assume E[U] = bw max, same as that in [] Then considering the number of ackets sent in the ith TD eriod, we have: and then, Y i = U i λ iw max W max V i W max 16 E[Y ] = 1γ W max E[U]W max E[V ] b1 γ = Wmax W max E[V ] 17 4 After getting E[Y ], we can easily derive the final throughut equation when the advertisement window is limited, following the stes of []: B = W max ˆQW max 1 b1 γ 4 W max W max ˆQW max T 0 f 18 Combine equation 11 and 18 we can get the final aroximated result for small values of, according to equation 31 in aer []: B min Wmax, 1 b1 γ T 1γ 0 min 1,3 b1 γ 13 19
4 D Exression of γ Now we need to determine the value of γ From our definition: γ = E[λ] = 4 5 P N <β1 P N β = 4 5 P N <β1 1 P N <β = 1 03 P N <β 0 Recall: N = W BaseRTT W BaseRTT BaseRTT = W 1 For simlicity, we assume the value of congestion window at losses including congestion and random losses, W, is uniformly distributed between 0 and W max, where W max is the maximum congestion window size during the transmission Then we have: P N <β = P W <β BaseRTT β = min 1, BaseRTT W max From 0 and we have: 4 γ = min 5, 1 03 β BaseRTT W max 3 Equation 19 with 3 is the derived Veno equation E Discussion Being different from the Reno equation, the Veno equation uses a variable γ [ 1, 4 5 ] to relace the original constant 1 Here we call it Veno arameter To verify the boundary of this arameter, consider two extreme scenarios: 1 if all losses are estimated to be congestion losses during transmission, then Veno erforms same as Reno by halving the congestion window every time, and the result leads to γ = 1 in the equation; if all losses are estimated to be random losses, then Veno erforms as suer Reno by cutting down only 1 5 of the congestion window every time The result leads to γ = 4 5 in the equation Because Veno equation is a none-decreasing function of γ, for a normal Veno flow γ should be a value between 1 and 4 5 To determine an accurate exression for γ is still an ongoing work We assumes W value is uniformly distributed The validation on NS- simulation and wireless LAN exeriments shows that, our assumtion can aroximate the exeriment results quite well Moreover, we assume that the refined AI hase in Veno has negligible imrovement in TCP throughut as comared to the refined MD hase This has been illustrated at the beginning of this section Some other simlifying assumtions have also been made during our derivation: 1 our model does not include the slow start and fast recovery algorithm of Veno We believe the imacts of both hases are small, and can be ignored in the model; we assume that acket losses within a round are correlated This is caused by the dro-tail olicy of intermediate routers: if one acket is droed by the full buffer, it is likely the following ackets in the round will be droed too; 3 we assume losses in one round are indeendent of losses in another round, because acket in different rounds are searated by one RTT and more, and thus they are likely to encounter different buffer states; 4 we assume the round tri time is indeendent of the window size Note that, all the above assumtions are the same as those in [] IV VALIDATION OF VENO EQUATION The validation of Veno equation is divided into two arts: the simulation results on NS- and the exerimental results on a wireless LAN A Simulation Results The toology of our exeriment on NS- [14] is shown in Figure N connections TCP Veno Fig W l = Mbs Delay l = 1 ms Packet W b Delay b W l = Mbs Delay l = 1 ms Toology of NS- exeriments TCP Sink The left side network has wired links with bandwidth of Mbs, delay of 1ms and acket buffer size of 50 The right side network has wireless links with bandwidth of Mbs, delay of 1ms and acket buffer size of 50 Random losses in wireless links follow exonential distribution and the acket loss rate ranges from to 01 The bottleneck link between these two networks is a wired link Its bandwidth W b and delay Delay b will be changed during our exeriments Its acket buffer size is set to be 0 TCP ackets are transferred from the wired network to the wireless network Packet size is Byte 1 Single Flow: At first a single TCP Veno connection is established The bandwidth of the bottleneck link is set to be Mbs and the delay is 80ms Figure 3 shows the validation result under different acket loss rates from to 01 We also lot the minimum and maximum boundaries curves when γ = 1 and γ = 4 5 resectively Note that during exeriments, we collect the dynamic values of and BaseRTT at every TD loss, to calculate the Veno arameter γ i using equation 3 Finally we use the average of γ i to calculate the throughut using equation 19 As shown in Figure 3, most exeriment results fall between the maximum and minimum boundaries, and they can be accurately redicted by our Veno equation At the same time, we study whether the
5 Throughut acket/s Maximum Exeriment Minimum Value of Veno Parameter Exeriment Fig 3 Single flow, W b =Mbs, Delay b =80ms Fig 4 Single flow, comarison of γ and γ e Throughut acket/s 40ms Exeriment40ms 80ms Exeriment80ms 160ms Exeriment160ms 30ms Exeriment30ms Throughut acket/s 50K Exeriment50K 500K Exeriment500K 750K Exeriment750K 1M Exeriment1M Fig 5 Single flow, validation under different bottleneck link delays Delay b Fig Single flow, validation under different background traffic Throughut acket/s 4 Exeriment4 8 Exeriment8 16 Exeriment16 3 Exeriment3 Throughut acket/s 4 Exeriment4 8 Exeriment8 16 Exeriment16 3 Exeriment3 Fig Multile flows, W b =1Mbs, Delay b =80ms Fig Mix flows of Veno and Sack, W b =1Mbs, Delay b =80ms Veno arameter γ estimated by equation 3 can accurately redict the real one The real Veno arameter γ e can be calculated in the exeriments as follows: γ e = N 4 5 M 1 4 N M where, N and M are the times of congestion window being cut down 1 5 or 1 resectively during transmission Figure 4 shows these two values are close, regardless of different acket loss rates Figure 5 demonstrates the validation under different bottleneck link delays from 40ms to 30ms, and Figure 6 is the result under different bottleneck link background traffic Noted that, to simulate the background traffic, we set u two UDP connections with areto distribution [15] over the bottleneck link The acket size of UDP is 51Byte The burst time and idle time are both ms The rate of each connection is set to be from 50Kbs to 1Mbs As we see in these figures, the theoretical results and the simulation results match quite well, regardless of different loss rates Multile Flows: To further verify the correction of Veno equation in comlicated scenarios, we test multile TCP connections ranging from 4 connections to 3 connections Firstly, we let all connections are TCP Veno flows, and thereafter, we relace half of them with TCP Sack flows The bandwidth of the bottleneck link is changed to be 1Mbs and the delay is 80ms The results are observed in Figure 7 and 8 resectively Seeing these two figures, our equation continues to kee high match with the simulation results either for multile connections or for mix connections B Wireless LAN Exeriments Figure 9 deicts the environments of our wireless LAN exeriments In wireless side, the client is a Comaq lato
6 with W00D wireless card The wireless Access Point is Cisco Linksys WRT54G They are searately laced at two corners and the distance between them is about 8m The bandwidth of the wireless network is 11Mbs and the frequency is 4GHz In the wired side, the server is a PC with FreeBSD 43, where TCP Veno is imlemented The gateway between wireless and wired networks is installed with FreeBSD 49 Number of Packets 1e09 1e08 1e07 1e06 Normal case Maximum Exeriment Minimum x x a Comaq lato with W00D wireless card Fig 9 Cisco Linksys WRT54G Gateway & NAT Dummynet FreeBSD 49 Toology of the wireless LAN TCP Veno FreeBSD 43 To verify our Veno equation, we use the method similar to that in [] One object Veno flow runs from the server to the client for 1hr The other four Veno flows run in the same direction for 800s, 000s, s, and 400s sequentially, which are regarded as the background traffic The 1hr flow trace is divided into 36 consecutive s intervals, and we count the number of ackets transmitted,, BaseRTT, and the acket loss rate in every interval Note that is given as the total number of loss indications TD and TO divided by the number of ackets transmitted Then, we ut the average values of and BaseRTT into the Veno equation to calculate the theoretical result Note that the acket size transmitted is 51Byte Two scenarios are studied here: 1 with Dummynet [16] configured at the gateway; without Dummynet configured at the gateway When Dummynet is set, it shaes the wired link bandwidth to Mbs, the delay to 80ms and the buffer to 0 ackets Because the general trends of the results in each exeriment are similar, we only give one samle in each case for the length limitation In each figure, three curves reresent the maximum boundary when γ = 4 5, the minimum boundary when γ = 1, and the actual results of Veno equation resectively, and the oints reresent the exeriment results As shown in Figure, the Veno equation can model TCP Veno s throughuts fairly well in each case V CONCLUSION AND FUTURE WORK In this aer, a simle throughut equation for TCP Veno is derived We introduce a Veno arameter γ into revious work on Reno [] Such arameter accurately characterizes the refined MD hase of Veno Our extensive exeriments on both simulation and wireless LAN have validated the correctness of the equation In the future work, further efforts are needed to refine the simle assumtion about the uniformly distributed W in the deduction, and a more accurate exression of the Veno arameter γ will be studied Furthermore, we will aly such derived closed form equation of TCP Veno into TFRC rotocol Number of Packets 1e09 1e08 1e07 1e06 Dummynet case Maximum Exeriment Minimum b Fig Exeriment results on the wireless LAN in a normal case and b Dummynet case REFERENCES [1] Van Jacobson Congestion Avoidance and Control SIGCOMM 88, ACM, Aug 1988 [] J Padhye, V Firoiu, D Towsley, and J Kurose Modeling TCP Throughut: A Simle Model and its Emirical Validation SIGCOMM 98, ACM, 1998 [3] Sally Floyd, Mark Handley, Jitendra Padhye, and Joerg Widmer Equation-Based Congestion Control for Unicast Alications SIG- COMM 000, ACM, August 000 [4] Cheng Peng Fu, Soung C Liew TCP Veno: TCP Enhancement for Transmission over Wireless Access Networks IEEE Journal of Selected Areas in Communications, Feb 003 [5] L Brakmo, S O Malley, and L Peterson TCP Vegas: New techniques for congestion detection and avoidance SIGCOMM 94, ACM, 1994 [6] C L Zhang, CPFu, MTYa, CHFoh et al Dynamics Comarison of TCP Reno and Veno IEEE Globecom, 004 [7] C P Fu, W Lu, B S Lee TCP Veno Revisited IEEE Globecom, 003 [8] Q X Pan, S C Liew, C P Fu, W Wang Performance Study of TCP Veno over wireless LAN and RED router IEEE Globecom, 003 [9] Z X Zou, C P Fu et al A Modification for Imroving TCP Veno Performance with Bursty Congestion IEEE Globecom, 005 [] Z X Zou, B S Lee, C P Fu Packet Loss and Congestion State in TCP Veno IEEE ICON, 004 [11] C B Fu, J L Wang, C P Fu, K Zhang Performance Study of TCP Veno in Wireless/Asymmetric Links International conference on cyberworlds, Jaan 004 [1] Ling-chi Chung, C P Fu, Song C Liew Imrovements Achieved by SAK Emloying TCP Veno Equilibrium-Oriented Mechanism over Lossy Networks IEEE EUROCOM, 001 [13] Y Liu, C P Fu et al An Enhancement of Multicast Congestion Control over Hybrid Wired/Wireless Networks IEEE WCNC, 004 [14] S Bajij, L Breslau, D Estrin, K Fall et al Imroving simulation for network research Univ Southern California, Los Angeles, Tech Re 99-70b, 1999 [15] htt://wwwisiedu/nsnam/ns/doc/ns docdf [16] htt://infoietuniiit/ luigi/i dummynet
An Analysis of TCP over Random Access Satellite Links
An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance
More informationA Study of Active Queue Management for Congestion Control
A Study of Active Queue Management for Congestion Control Victor Firoiu vfiroiu@nortelnetworks.com Nortel Networks 3 Federal St. illerica, MA 1821 USA Marty orden mborden@tollbridgetech.com Tollridge Technologies
More informationOn the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1
On the Relationshi Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 Imad Antonios antoniosi1@southernct.edu CS Deartment MO117 Southern Connecticut State University 501 Crescent St.
More informationcs/ee/ids 143 Communication Networks
cs/ee/ids 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Agenda Internetworking n Routing across LANs, layer2-layer3 n DHCP n NAT Transport layer
More informationMATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK
Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment
More informationModelling TCP with a Discrete Time Markov Chain
Modelling TCP with a Discrete Time Markov Chain José L Gil Motorola josegil@motorola.com ABSTRACT TCP is the most widely used transport protocol in the Internet. The end-to-end performance of most Internet
More informationFairness comparison of FAST TCP and TCP Vegas
Fairness comparison of FAST TCP and TCP Vegas Lachlan L. H. Andrew, Liansheng Tan, Tony Cui, and Moshe Zukerman ARC Special Research Centre for Ultra-Broadband Information Networks (CUBIN), an affiliated
More informationAn Investigation on the Numerical Ill-conditioning of Hybrid State Estimators
An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical
More information4. Score normalization technical details We now discuss the technical details of the score normalization method.
SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules
More informationShadow Computing: An Energy-Aware Fault Tolerant Computing Model
Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms
More informationOn split sample and randomized confidence intervals for binomial proportions
On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have
More informationdn i where we have used the Gibbs equation for the Gibbs energy and the definition of chemical potential
Chem 467 Sulement to Lectures 33 Phase Equilibrium Chemical Potential Revisited We introduced the chemical otential as the conjugate variable to amount. Briefly reviewing, the total Gibbs energy of a system
More informationJohn Weatherwax. Analysis of Parallel Depth First Search Algorithms
Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel
More informationCharacterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations
Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of
More informationTCP-friendly SIMD Congestion Control and Its Convergence Behavior
Boston University OpenBU Computer Science http://open.bu.edu CAS: Computer Science: Technical Reports 1-5-8 TCP-friendly SIMD Congestion Control and Its Convergence Behavior Jin, Shudong Boston University
More informationMODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL
Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management
More informationDistributed Rule-Based Inference in the Presence of Redundant Information
istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced
More informationSignaled Queueing. Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT. Categories and Subject Descriptors. General Terms. Keywords
Signaled Queueing Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT Burstiness in queues where customers arrive indeendently leads to rush eriods when wait times are long. We roose a simle signaling scheme
More informationCS276 Homework 1: ns-2
CS276 Homework 1: ns-2 Erik Peterson October 28, 2006 1 Part 1 - Fairness between TCP variants 1.1 Method After learning ns-2, I wrote a script (Listing 3) that runs a simulation of one or two tcp flows
More informationAnalysis of M/M/n/K Queue with Multiple Priorities
Analysis of M/M/n/K Queue with Multile Priorities Coyright, Sanjay K. Bose For a P-riority system, class P of highest riority Indeendent, Poisson arrival rocesses for each class with i as average arrival
More informationInformation collection on a graph
Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements
More informationStatistical Multiplexing Gain of Link Scheduling Algorithms in QoS Networks (Short Version)
1 Statistical Multilexing Gain of Link Scheduling Algorithms in QoS Networks (Short Version) Technical Reort: University of Virginia, CS-99-23, July 1999 Robert Boorstyn Almut Burchard Jörg Liebeherr y
More informationCombining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)
Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment
More informationComparative study on different walking load models
Comarative study on different walking load models *Jining Wang 1) and Jun Chen ) 1), ) Deartment of Structural Engineering, Tongji University, Shanghai, China 1) 1510157@tongji.edu.cn ABSTRACT Since the
More informationThe Noise Power Ratio - Theory and ADC Testing
The Noise Power Ratio - Theory and ADC Testing FH Irons, KJ Riley, and DM Hummels Abstract This aer develos theory behind the noise ower ratio (NPR) testing of ADCs. A mid-riser formulation is used for
More informationOn the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting
On the Role of Finite Queues in Cooerative Cognitive Radio Networks with Energy Harvesting Mohamed A. Abd-Elmagid, Tamer Elatt, and Karim G. Seddik Wireless Intelligent Networks Center (WINC), Nile University,
More informationVehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications
Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Bartłomiej Błaszczyszyn Paul Muhlethaler Nadjib Achir INRIA/ENS INRIA Rocquencourt INRIA Rocquencourt
More informationTowards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK
Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)
More informationAn Adaptive Three-bus Power System Equivalent for Estimating Voltage Stability Margin from Synchronized Phasor Measurements
An Adative Three-bus Power System Equivalent for Estimating oltage Stability argin from Synchronized Phasor easurements Fengkai Hu, Kai Sun University of Tennessee Knoxville, TN, USA fengkaihu@utk.edu
More informationInformation collection on a graph
Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements
More informationA PEAK FACTOR FOR PREDICTING NON-GAUSSIAN PEAK RESULTANT RESPONSE OF WIND-EXCITED TALL BUILDINGS
The Seventh Asia-Pacific Conference on Wind Engineering, November 8-1, 009, Taiei, Taiwan A PEAK FACTOR FOR PREDICTING NON-GAUSSIAN PEAK RESULTANT RESPONSE OF WIND-EXCITED TALL BUILDINGS M.F. Huang 1,
More informationA MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION
O P E R A T I O N S R E S E A R C H A N D D E C I S I O N S No. 27 DOI:.5277/ord73 Nasrullah KHAN Muhammad ASLAM 2 Kyung-Jun KIM 3 Chi-Hyuck JUN 4 A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST
More informationA Stochastic Model for TCP with Stationary Random Losses
A Stochastic Model for TCP with Stationary Random Losses Eitan Altman, Kostya Avrachenkov Chadi Barakat INRIA Sophia Antipolis - France ACM SIGCOMM August 31, 2000 Stockholm, Sweden Introduction Outline
More informationLower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data
Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment
More informationModeling and Estimation of Full-Chip Leakage Current Considering Within-Die Correlation
6.3 Modeling and Estimation of Full-Chi Leaage Current Considering Within-Die Correlation Khaled R. eloue, Navid Azizi, Farid N. Najm Deartment of ECE, University of Toronto,Toronto, Ontario, Canada {haled,nazizi,najm}@eecg.utoronto.ca
More informationRobust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System
Vol.7, No.7 (4),.37-38 htt://dx.doi.org/.457/ica.4.7.7.3 Robust Predictive Control of Inut Constraints and Interference Suression for Semi-Trailer System Zhao, Yang Electronic and Information Technology
More information#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS
#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS Ramy F. Taki ElDin Physics and Engineering Mathematics Deartment, Faculty of Engineering, Ain Shams University, Cairo, Egyt
More informationOptimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging
1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014
More informationImpact of Cross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis
Impact of ross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis Rebecca Lovewell and Jasleen Kaur Technical Report # TR11-007 Department of omputer Science University of North arolina
More informationComputer arithmetic. Intensive Computation. Annalisa Massini 2017/2018
Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3
More informationMonte Carlo Studies. Monte Carlo Studies. Sampling Distribution
Monte Carlo Studies Do not let yourself be intimidated by the material in this lecture This lecture involves more theory but is meant to imrove your understanding of: Samling distributions and tests of
More informationSymbolic Dynamical Model of Average Queue Size of Random Early Detection Algorithm
Symbolic Dynamical odel of Average Queue Size of Rom Early Detection Algorithm Charlotte Yuk-Fan Ho Telehone: 44 () 788 5555 ext. 4333 Fax: 44 () 788 7997 Email: c.ho@mul.ac.uk School of athematical Sciences
More informationVision Graph Construction in Wireless Multimedia Sensor Networks
University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Conference and Worksho Paers Comuter Science and Engineering, Deartment of 21 Vision Grah Construction in Wireless Multimedia
More informationOptimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging
Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie Wireless Intelligent Networks Center WINC, Nile University,
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More informationA Quadratic Cumulative Production Model for the Material Balance of Abnormally-Pressured Gas Reservoirs
A Quadratic Cumulative Production Model for the Material Balance of Abnormally-Pressured as Reservoirs F.E. onale, M.S. Thesis Defense 7 October 2003 Deartment of Petroleum Engineering Texas A&M University
More informationFisher Information in Flow Size Distribution Estimation
1 Fisher Information in Flow Size Distribution Estimation Paul Tune, Member, IEEE, and Darryl Veitch, Fellow, IEEE Abstract The flow size distribution is a useful metric for traffic modeling and management
More informationPublished: 14 October 2013
Electronic Journal of Alied Statistical Analysis EJASA, Electron. J. A. Stat. Anal. htt://siba-ese.unisalento.it/index.h/ejasa/index e-issn: 27-5948 DOI: 1.1285/i275948v6n213 Estimation of Parameters of
More informationDelay Performance of Threshold Policies for Dynamic Spectrum Access
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO. 7, JULY 83 Delay Performance of Threshold Policies for Dynamic Sectrum Access Rong-Rong Chen and Xin Liu Abstract In this aer, we analyze the delay
More informationCapturing Network Traffic Dynamics Small Scales. Rolf Riedi
Capturing Network Traffic Dynamics Small Scales Rolf Riedi Dept of Statistics Stochastic Systems and Modelling in Networking and Finance Part II Dependable Adaptive Systems and Mathematical Modeling Kaiserslautern,
More informationDelay characterization of multi-hop transmission in a Poisson field of interference
1 Delay characterization of multi-ho transmission in a Poisson field of interference Kostas Stamatiou and Martin Haenggi, Senior Member, IEEE Abstract We evaluate the end-to-end delay of a multi-ho transmission
More informationModeling Residual-Geometric Flow Sampling
Modeling Residual-Geometric Flow Samling Xiaoming Wang Amazon.com Seattle, WA 98101 USA Email: xmwang@gmail.com Xiaoyong Li Texas A&M University College Station, TX 77843 USA Email: xiaoyong@cse.tamu.edu
More informationA Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression
Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi
More informationDeveloping A Deterioration Probabilistic Model for Rail Wear
International Journal of Traffic and Transortation Engineering 2012, 1(2): 13-18 DOI: 10.5923/j.ijtte.20120102.02 Develoing A Deterioration Probabilistic Model for Rail Wear Jabbar-Ali Zakeri *, Shahrbanoo
More informationOnline Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies
Online Aendix to Accomany AComarisonof Traditional and Oen-Access Aointment Scheduling Policies Lawrence W. Robinson Johnson Graduate School of Management Cornell University Ithaca, NY 14853-6201 lwr2@cornell.edu
More informationAge of Information: Whittle Index for Scheduling Stochastic Arrivals
Age of Information: Whittle Index for Scheduling Stochastic Arrivals Yu-Pin Hsu Deartment of Communication Engineering National Taiei University yuinhsu@mail.ntu.edu.tw arxiv:80.03422v2 [math.oc] 7 Ar
More informationHomogeneous and Inhomogeneous Model for Flow and Heat Transfer in Porous Materials as High Temperature Solar Air Receivers
Excert from the roceedings of the COMSOL Conference 1 aris Homogeneous and Inhomogeneous Model for Flow and Heat ransfer in orous Materials as High emerature Solar Air Receivers Olena Smirnova 1 *, homas
More informationPlotting the Wilson distribution
, Survey of English Usage, University College London Setember 018 1 1. Introduction We have discussed the Wilson score interval at length elsewhere (Wallis 013a, b). Given an observed Binomial roortion
More informationCHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules
CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is
More informationWireless Internet Exercises
Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC
More informationEstimation of the large covariance matrix with two-step monotone missing data
Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo
More informationModeling Residual-Geometric Flow Sampling
1 Modeling Residual-Geometric Flow Samling Xiaoming Wang, Xiaoyong Li, and Dmitri Loguinov Abstract Traffic monitoring and estimation of flow arameters in high seed routers have recently become challenging
More informationNumerical Methods for Particle Tracing in Vector Fields
On-Line Visualization Notes Numerical Methods for Particle Tracing in Vector Fields Kenneth I. Joy Visualization and Grahics Research Laboratory Deartment of Comuter Science University of California, Davis
More informationExtreme Value FEC for Reliable Broadcasting in Wireless Networks
Extreme Value FEC for Reliable Broadcasting in Wireless Networks Weiyao Xiao and David Starobinski Deartment of Electrical and Comuter Engineering Boston University, Boston, MA 225 Email:{weiyao, staro}@bu.edu
More informationOn Wrapping of Exponentiated Inverted Weibull Distribution
IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 11 Aril 217 ISSN (online): 2349-61 On Wraing of Exonentiated Inverted Weibull Distribution P.Srinivasa Subrahmanyam
More informationAnalysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks
Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their
More informationEfficient Approximations for Call Admission Control Performance Evaluations in Multi-Service Networks
Efficient Aroximations for Call Admission Control Performance Evaluations in Multi-Service Networks Emre A. Yavuz, and Victor C. M. Leung Deartment of Electrical and Comuter Engineering The University
More informationECE 6960: Adv. Random Processes & Applications Lecture Notes, Fall 2010
ECE 6960: Adv. Random Processes & Alications Lecture Notes, Fall 2010 Lecture 16 Today: (1) Markov Processes, (2) Markov Chains, (3) State Classification Intro Please turn in H 6 today. Read Chater 11,
More informationAnalysis of TCP Westwood+ in high speed networks
Analysis of TCP Westwood+ in high speed networks 1 E. Altman, C. Barakat, S. Mascolo, N. Möller and J. Sun Abstract TCP Westwood+ is modelled and analyzed using stochastic recursive equations. It is shown
More informationOn Fractional Predictive PID Controller Design Method Emmanuel Edet*. Reza Katebi.**
On Fractional Predictive PID Controller Design Method Emmanuel Edet*. Reza Katebi.** * echnology and Innovation Centre, Level 4, Deartment of Electronic and Electrical Engineering, University of Strathclyde,
More informationGIVEN an input sequence x 0,..., x n 1 and the
1 Running Max/Min Filters using 1 + o(1) Comarisons er Samle Hao Yuan, Member, IEEE, and Mikhail J. Atallah, Fellow, IEEE Abstract A running max (or min) filter asks for the maximum or (minimum) elements
More informationStability Analysis of TCP/RED Communication Algorithms
Stability Analysis of TCP/RED Communication Algorithms Ljiljana Trajković Simon Fraser University, Vancouver, Canada ljilja@cs.sfu.ca http://www.ensc.sfu.ca/~ljilja Collaborators Mingjian Liu and Hui Zhang
More informationOSCILLATION AND PERIOD DOUBLING IN TCP/RED SYSTEM: ANALYSIS AND VERIFICATION
International Journal of Bifurcation and Chaos, Vol. 18, No. 5 (28) 1459 1475 c World Scientific Publishing Company OSCILLATION AND PERIOD DOUBLING IN TCP/RED SYSTEM: ANALYSIS AND VERIFICATION XI CHEN,
More informationImproved Capacity Bounds for the Binary Energy Harvesting Channel
Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,
More informationcommunication networks
Positive matrices associated with synchronised communication networks Abraham Berman Department of Mathematics Robert Shorten Hamilton Institute Douglas Leith Hamilton Instiute The Technion NUI Maynooth
More informationThe Binomial Approach for Probability of Detection
Vol. No. (Mar 5) - The e-journal of Nondestructive Testing - ISSN 45-494 www.ndt.net/?id=7498 The Binomial Aroach for of Detection Carlos Correia Gruo Endalloy C.A. - Caracas - Venezuela www.endalloy.net
More informationFlexible Pipes in Trenches with Stiff Clay Walls
Flexible Pies in Trenches with Stiff Clay Walls D. A. Cameron University of South Australia, South Australia, Australia J. P. Carter University of Sydney, New South Wales, Australia Keywords: flexible
More informations v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4
Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work
More informationSupplementary Materials for Robust Estimation of the False Discovery Rate
Sulementary Materials for Robust Estimation of the False Discovery Rate Stan Pounds and Cheng Cheng This sulemental contains roofs regarding theoretical roerties of the roosed method (Section S1), rovides
More informationYixi Shi. Jose Blanchet. IEOR Department Columbia University New York, NY 10027, USA. IEOR Department Columbia University New York, NY 10027, USA
Proceedings of the 2011 Winter Simulation Conference S. Jain, R. R. Creasey, J. Himmelsach, K. P. White, and M. Fu, eds. EFFICIENT RARE EVENT SIMULATION FOR HEAVY-TAILED SYSTEMS VIA CROSS ENTROPY Jose
More informationApproximate Dynamic Programming for Dynamic Capacity Allocation with Multiple Priority Levels
Aroximate Dynamic Programming for Dynamic Caacity Allocation with Multile Priority Levels Alexander Erdelyi School of Oerations Research and Information Engineering, Cornell University, Ithaca, NY 14853,
More informationStability Analysis of TCP/RED Communication Algorithms
Stability Analysis of TCP/RED Communication Algorithms Ljiljana Trajković Simon Fraser University, Vancouver, Canada ljilja@cs.sfu.ca http://www.ensc.sfu.ca/~ljilja Collaborators Mingjian Liu and Hui Zhang
More informationThe Value of Even Distribution for Temporal Resource Partitions
The Value of Even Distribution for Temoral Resource Partitions Yu Li, Albert M. K. Cheng Deartment of Comuter Science University of Houston Houston, TX, 7704, USA htt://www.cs.uh.edu Technical Reort Number
More informationProcessor Sharing Flows in the Internet
STANFORD HPNG TECHNICAL REPORT TR4-HPNG4 Processor Sharing Flows in the Internet Nandita Dukkipati, Nick McKeown Computer Systems Laboratory Stanford University Stanford, CA 9434-93, USA nanditad, nickm
More informationDesign Constraint for Fine Grain Supply Voltage Control LSI
ASP-DAC 211 Designer s Forum Session 8D-3: State-of-The-Art SoCs and Design Methodologies Design Constraint for Fine Grain Suly Voltage Control LSI January 28, 211 Atsuki Inoue Platform Technologies Laboratories
More informationAnalyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems
Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Hsiao-Lan Chiang, Tobias Kadur, and Gerhard Fettweis Vodafone Chair for Mobile Communications Technische Universität
More informationNotes on Instrumental Variables Methods
Notes on Instrumental Variables Methods Michele Pellizzari IGIER-Bocconi, IZA and frdb 1 The Instrumental Variable Estimator Instrumental variable estimation is the classical solution to the roblem of
More informationAnalytic Performance Evaluation of the RED Algorithm
Prof. Dr. P. Tran-Gia Analytic Performance Evaluation of the RED Algorithm Stefan Köhler, Michael Menth, Norbert Vicari TCP Model RED Model TCP over RED Results TCP > Reliable transmission > Closed loop
More informationMaximum Entropy and the Stress Distribution in Soft Disk Packings Above Jamming
Maximum Entroy and the Stress Distribution in Soft Disk Packings Above Jamming Yegang Wu and S. Teitel Deartment of Physics and Astronomy, University of ochester, ochester, New York 467, USA (Dated: August
More informationThe decision-feedback equalizer optimization for Gaussian noise
Journal of Theoretical and Alied Comuter Science Vol. 8 No. 4 4. 5- ISSN 99-634 (rinted 3-5653 (online htt://www.jtacs.org The decision-feedback eualizer otimization for Gaussian noise Arkadiusz Grzbowski
More informationDesign of Isolated Bridges from the Viewpoint of Collapse under Extreme Earthquakes
Design of Isolated Bridges from the Viewoint of Collase under Extreme Earthquakes D.W. Chang, Y.T. Lin, C.H. Peng, C.Y. Liou CECI Engineering Consultants, Inc., Taiwan T.Y. Lee National Central University,
More informationMinimax Design of Nonnegative Finite Impulse Response Filters
Minimax Design of Nonnegative Finite Imulse Resonse Filters Xiaoing Lai, Anke Xue Institute of Information and Control Hangzhou Dianzi University Hangzhou, 3118 China e-mail: laix@hdu.edu.cn; akxue@hdu.edu.cn
More informationEffective conductivity in a lattice model for binary disordered media with complex distributions of grain sizes
hys. stat. sol. b 36, 65-633 003 Effective conductivity in a lattice model for binary disordered media with comlex distributions of grain sizes R. PIASECKI Institute of Chemistry, University of Oole, Oleska
More informationarxiv:cond-mat/ v2 25 Sep 2002
Energy fluctuations at the multicritical oint in two-dimensional sin glasses arxiv:cond-mat/0207694 v2 25 Se 2002 1. Introduction Hidetoshi Nishimori, Cyril Falvo and Yukiyasu Ozeki Deartment of Physics,
More informationPower Aware Wireless File Downloading: A Constrained Restless Bandit Approach
PROC. WIOP 204 Power Aware Wireless File Downloading: A Constrained Restless Bandit Aroach Xiaohan Wei and Michael J. Neely, Senior Member, IEEE Abstract his aer treats ower-aware throughut maximization
More information3312 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 5, MAY 2016
3312 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 5, MAY 2016 L -Problem-Based Transmission Rate Allocation With Packet Loss and Power Metrics Over Satellite Networks Igor Bisio, Senior Member,
More informationTransient Behaviors of TCP-friendly Congestion Control Protocols
Abbreviated version in Proceedings of IEEE INFOCOM 21, April 21. Transient Behaviors of -friendly Congestion Control Protocols Y. Richard Yang, Min Sik Kim, Simon S. Lam Department of Computer Sciences
More informationProbability Estimates for Multi-class Classification by Pairwise Coupling
Probability Estimates for Multi-class Classification by Pairwise Couling Ting-Fan Wu Chih-Jen Lin Deartment of Comuter Science National Taiwan University Taiei 06, Taiwan Ruby C. Weng Deartment of Statistics
More informationDeriving Indicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V.
Deriving ndicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V. Deutsch Centre for Comutational Geostatistics Deartment of Civil &
More informationFor q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i
Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:
More information