A Simple Throughput Model for TCP Veno

Size: px
Start display at page:

Download "A Simple Throughput Model for TCP Veno"

Transcription

1 A Simle Throughut Model for TCP Veno Bin Zhou, Cheng Peng Fu, Dah-Ming Chiu, Chiew Tong Lau, and Lek Heng Ngoh School of Comuter Engineering, Nanyang Technological University, Singaore {zhou00, ascfu, Deartment of Information Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong Networking Deartment, Institute for Infocomm Research, Singaore Abstract TCP Veno was roosed to eliminate TCP erformance suffering from wireless links Real network measurements and live Internet results have validated TCP Veno s significant throughut imrovement in wireless networks and its harmonious co-existence with TCP Reno connections in wired networks In this aer, we develo a simle analytic aroach to characterize TCP Veno behavior in both wire and wireless situations Being different from the equation of TCP Reno, a more general close formula is derived, taking into account of the refined multilicative decrease algorithm in Veno, to model the throughut for a bulk transfer of TCP Veno flow Our simulation and exerimental results demonstrate that such an equation is able to accurately redict TCP Veno throughut over different network scenarios, ranging from very low lossy links to very heavy lossy links I INTRODUCTION TCP Reno [1] is the dominating version of TCP Over last decade, many efforts have been made to model its throughut in a bulk transfer TCP flow Among those work, a equation derived by [] hereinafter, called Reno equation has been widely used today, eg, in the TCP-Friendly Rate Control TFRC rotocol [3] Recently, wireless communication technology has been making significant rogress and will be laying a more and more imortant role in the future Such evolution brings new challenges to TCP Reno For examle, Reno assumes acket loss is always induced by congestion, which can lead to significant erformance degradation in wireless networks, where random loss is ramant due to environmental noise To deal with random loss effectively, a novel end-to-end congestion control mechanism called TCP Veno [4][7][9][1][13] was roosed The key innovation in Veno is the enhancement of Reno congestion control algorithm by making use of the estimated state of a connection based on Vegas [5] This scheme significantly reduces blind reduction of TCP window regardless of the cause of acket loss Thus Veno is suitable for any heterogeneous networks, articularly when wireless links form art of such networks [6][8][][11] In this aer, we develo a simle analytic aroach to characterize TCP Veno behavior in both wire and wireless situations Being different from the equation of TCP Reno, a more general closed form equation hereinafter, called Veno equation is derived, taking into account of the refined multilicative decrease algorithm in Veno, to model the throughut for a bulk transfer of TCP Veno flow The remainder of the aer is organized as follows In Section, we describe TCP Veno mechanism in detail Then Section 3 gives the derivation of Veno equation A validation of this equation on NS- [14] simulation and wireless LAN exeriments is resented in Section 4 Finally, Section 5 concludes our work and gives the future directions II BASIC MECHANISM OF VENO TCP Veno makes use of the state distinguishing scheme from TCP Vegas, and integrates it into congestion window evolution scheme of TCP Reno In Vegas, the sender measures the so-called Exected and Actual rates: Exected = BaseRTT Actual = where, is the current congestion window size, BaseRTT is the minimum of measured round-tri time, and is the smoothed round-tri time measured The difference of the rate is: Diff = Exected Actual When > Base, there is a bottleneck link where the ackets of the connection accumulate Let the backlog at the queue be denoted by N Wehave: = BaseRTT N Actual That is, we attribute the extra delay to the bottleneck link in the second term of the right side above Rearranging, we have: N = Actual BaseRTT = Diff BaseRTT = BaseRTT BaseRTT The main idea of Veno is to use the measurement of N as an indication of whether the network is in congestive state or non-congestive state At any time, if N β, Veno deduces the link is in congestive state and considers the acket loss is congestion loss Otherwise if N<β, the link

2 is in non-congestive state and the acket loss is random loss Here β is normally set to be 3 Based on the differentiated state, Veno alies different algorithms to Reno s additive increase AI and multilicative decrease MD hases, thus makes congestion window evolution more efficient: In AI hase, IF N <β THEN set = 1 for every new ACK ELSE IF N β THEN set = 1 for every other new ACK In MD hase, 1Retransmit the missing acket, and IF N <β THEN set ssthresh = 4 5 ELSE IF N β THEN set ssthresh = 1, and set = ssthresh 3 Each time another du ACK arrives, increment by one acket 3When the next ACK acknowledging new data arrives, set to ssthresh value in ste 1 Note that, Veno only refines the AIMD mechanism of Reno All other arts of Reno, including initial slow start, fast retransmit, fast recovery, comutation of the retransmission timeout, and the backoff algorithm remain intact III DERIVATION OF VENO EQUATION From the mathematical view, we simlify the above AIMD mechanism as follows: in AI hase, { 1 =, for every new ACK N<β 1, for every other new ACK N β and in MD hase, { 4 = 5 N<β 1 N β As shown in Figure 1, although new AI hase in Veno brings certain imrovement in throughut, the most enhancement of Veno is contributed by the MD hases at random losses ie, cutting down 1 5 rather than 1 of To simlify the roblem, we ignore the different AI hases of Veno and Reno in the following derivation As a result, Veno acts quite similarly as Reno, and the only difference between Veno and Reno is how much value should be cut down when losses occur: Reno always cuts down 1 and, while Veno sometimes cuts down 1 congestion loss, and sometimes cuts down 1 5 random loss In this case, we introduce a random variable λ to reresent the roortion of value after cut down, instead of a 1 constant Hereλ can be 1 or 4 5 with certain robability This is a new arameter introduced by Veno s MD hase characteristic The following derivation is divided into three stes: firstly we only consider the situation where acket losses W Fig 1 1/ 1/5 Congestion Loss Random Loss Random Loss X 1 X X 3 1/5 X 4 Veno Reno Congestion window evolution of Veno and Reno No of rounds is indicated by the trile dulicated ACKs We call these losses trile-dulicated TD losses; then we include acket losses indicated by time outs, which are called time-out TO losses; finally we extend our model to include the imact of advertisement window limitation A Veno Equation for Only TD Losses According to equation 7 in [] we have: W i = λ i W i 1 X i 1 b where, W i 1, W i are value before the revious TD loss and the next TD loss resectively, X i is the number of round between these two losses, and b is the number of ackets that are acknowledged by a received ACK Note that all these arameters have the same meanings as those in [] In addition, λ i is the roortion of value 1 or 4 5 after the revious TD loss Then the ackets transmitted between these two TD losses are: Y i = X i/b 1 k=0 λ i W i 1 kb β i = λ i W i 1 X i X i X i b 1 β i = X i λ iw i 1 W i 1 1 β i using1 where β i is the number of ackets sent in the last round, as seen in [] As same in [], β i is considered as a uniformly distributed variable between 1 and W i From above equation 1, and equation 5 in aer [], we have: 1 1 E[λ]E[W ]= E[X] b 3 E[W ]= E[X] 1 E[λ]E[W ] 1 E[β] 4 where, E[β] = E[W ], and is the robability that a acket is lost, given that either it is the first acket in its round or the receding acket in its round is not lost Note that includes both congestion and random losses

3 Let γ = E[λ], and from 3 and 4 we can get: b1 γ1 b1 γ1 E[W ]= b1 γ 1 b1 γ b 1 γ 5 Then from above equation 3 and equation 6 in aer [], it follows: E[X] = b1 γ1 1 γ and, E[A] = b1 γ1 1γ b1 γ1 1 γ b1 γ 1γ b1 γ1 1 γ 6 b1 γ1 1γ 1 7 Finally, substitute E[A] and E[W ] into equation 1 and 5 in aer [] we have: B = = E[W ] E[A] b1 γ1 b1 γ b1 γ1 1γ b1 γ1 b1 γ b 1 γ b1 γ1 b1 γ 1γ 1γ 1 8 For small values of, it can be aroximated by: B 1 1 γ 9 b1 γ B Veno Equation for Both TD and TO Losses So far equation 9 gives Veno equation when only TD losses occur Actually there are many TO losses over real communications, and they must be included in the model According to equation 1 in [], with TO losses the throughut can be written as follows: E[Y ]Q E[R] B = E[A]Q E[Z TO ] where, E[Y ] and E[A] have been derived in the revious section Q is the robability that a loss indication ending a TD eriod is a TO, E[R] is the mean number of ackets sent during TO eriods, and E[Z TO ] denotes the mean duration of TO eriods As we have ointed out before, Veno does not change Reno s algorithms on dealing with TO losses, such as the comutation of the timeout, and the backoff algorithm We can easily derive the equation following the same routine described in [], because the exressions of Q, E[R], and E[Z TO ] are same in both Veno and Reno Therefore, we have: B = E[W ] ˆQE[W ] 1 E[X]1 ˆQE[W ]T 0 f 11 where, E[W ] and E[X] have been given in the revious section Note that, both E[W ] and E[X] now include a new arameter γ here T 0 denotes the eriod the sender will wait for to retransmit non-acknowledged acket, ˆQw = min1, w w 1 and, f = For small values of, equation 11 can be aroximated by: B 1 b1 γ T 1γ 0 min 1,3 b1 γ 13 C Veno Equation with Imact of window limitation 14 Finally, we consider the Veno equation with the imact of the advertisement window limitation In such scenario, the congestion window will start increase after the revious loss, and will kee constant when it reaches the advertisement window limitation Let W max denote the advertisement window limitation, U i denote the number of rounds where the congestion window increases, and V i denote the number of rounds where the congestion window kees constant Due to the new MD hase in Veno, W max has following equation, according to []: W max = λ i W max U i 15 b where, λ i is the roortion of value after the revious TD loss 1 or 4 5, as defined in Section A We assume E[U] = bw max, same as that in [] Then considering the number of ackets sent in the ith TD eriod, we have: and then, Y i = U i λ iw max W max V i W max 16 E[Y ] = 1γ W max E[U]W max E[V ] b1 γ = Wmax W max E[V ] 17 4 After getting E[Y ], we can easily derive the final throughut equation when the advertisement window is limited, following the stes of []: B = W max ˆQW max 1 b1 γ 4 W max W max ˆQW max T 0 f 18 Combine equation 11 and 18 we can get the final aroximated result for small values of, according to equation 31 in aer []: B min Wmax, 1 b1 γ T 1γ 0 min 1,3 b1 γ 13 19

4 D Exression of γ Now we need to determine the value of γ From our definition: γ = E[λ] = 4 5 P N <β1 P N β = 4 5 P N <β1 1 P N <β = 1 03 P N <β 0 Recall: N = W BaseRTT W BaseRTT BaseRTT = W 1 For simlicity, we assume the value of congestion window at losses including congestion and random losses, W, is uniformly distributed between 0 and W max, where W max is the maximum congestion window size during the transmission Then we have: P N <β = P W <β BaseRTT β = min 1, BaseRTT W max From 0 and we have: 4 γ = min 5, 1 03 β BaseRTT W max 3 Equation 19 with 3 is the derived Veno equation E Discussion Being different from the Reno equation, the Veno equation uses a variable γ [ 1, 4 5 ] to relace the original constant 1 Here we call it Veno arameter To verify the boundary of this arameter, consider two extreme scenarios: 1 if all losses are estimated to be congestion losses during transmission, then Veno erforms same as Reno by halving the congestion window every time, and the result leads to γ = 1 in the equation; if all losses are estimated to be random losses, then Veno erforms as suer Reno by cutting down only 1 5 of the congestion window every time The result leads to γ = 4 5 in the equation Because Veno equation is a none-decreasing function of γ, for a normal Veno flow γ should be a value between 1 and 4 5 To determine an accurate exression for γ is still an ongoing work We assumes W value is uniformly distributed The validation on NS- simulation and wireless LAN exeriments shows that, our assumtion can aroximate the exeriment results quite well Moreover, we assume that the refined AI hase in Veno has negligible imrovement in TCP throughut as comared to the refined MD hase This has been illustrated at the beginning of this section Some other simlifying assumtions have also been made during our derivation: 1 our model does not include the slow start and fast recovery algorithm of Veno We believe the imacts of both hases are small, and can be ignored in the model; we assume that acket losses within a round are correlated This is caused by the dro-tail olicy of intermediate routers: if one acket is droed by the full buffer, it is likely the following ackets in the round will be droed too; 3 we assume losses in one round are indeendent of losses in another round, because acket in different rounds are searated by one RTT and more, and thus they are likely to encounter different buffer states; 4 we assume the round tri time is indeendent of the window size Note that, all the above assumtions are the same as those in [] IV VALIDATION OF VENO EQUATION The validation of Veno equation is divided into two arts: the simulation results on NS- and the exerimental results on a wireless LAN A Simulation Results The toology of our exeriment on NS- [14] is shown in Figure N connections TCP Veno Fig W l = Mbs Delay l = 1 ms Packet W b Delay b W l = Mbs Delay l = 1 ms Toology of NS- exeriments TCP Sink The left side network has wired links with bandwidth of Mbs, delay of 1ms and acket buffer size of 50 The right side network has wireless links with bandwidth of Mbs, delay of 1ms and acket buffer size of 50 Random losses in wireless links follow exonential distribution and the acket loss rate ranges from to 01 The bottleneck link between these two networks is a wired link Its bandwidth W b and delay Delay b will be changed during our exeriments Its acket buffer size is set to be 0 TCP ackets are transferred from the wired network to the wireless network Packet size is Byte 1 Single Flow: At first a single TCP Veno connection is established The bandwidth of the bottleneck link is set to be Mbs and the delay is 80ms Figure 3 shows the validation result under different acket loss rates from to 01 We also lot the minimum and maximum boundaries curves when γ = 1 and γ = 4 5 resectively Note that during exeriments, we collect the dynamic values of and BaseRTT at every TD loss, to calculate the Veno arameter γ i using equation 3 Finally we use the average of γ i to calculate the throughut using equation 19 As shown in Figure 3, most exeriment results fall between the maximum and minimum boundaries, and they can be accurately redicted by our Veno equation At the same time, we study whether the

5 Throughut acket/s Maximum Exeriment Minimum Value of Veno Parameter Exeriment Fig 3 Single flow, W b =Mbs, Delay b =80ms Fig 4 Single flow, comarison of γ and γ e Throughut acket/s 40ms Exeriment40ms 80ms Exeriment80ms 160ms Exeriment160ms 30ms Exeriment30ms Throughut acket/s 50K Exeriment50K 500K Exeriment500K 750K Exeriment750K 1M Exeriment1M Fig 5 Single flow, validation under different bottleneck link delays Delay b Fig Single flow, validation under different background traffic Throughut acket/s 4 Exeriment4 8 Exeriment8 16 Exeriment16 3 Exeriment3 Throughut acket/s 4 Exeriment4 8 Exeriment8 16 Exeriment16 3 Exeriment3 Fig Multile flows, W b =1Mbs, Delay b =80ms Fig Mix flows of Veno and Sack, W b =1Mbs, Delay b =80ms Veno arameter γ estimated by equation 3 can accurately redict the real one The real Veno arameter γ e can be calculated in the exeriments as follows: γ e = N 4 5 M 1 4 N M where, N and M are the times of congestion window being cut down 1 5 or 1 resectively during transmission Figure 4 shows these two values are close, regardless of different acket loss rates Figure 5 demonstrates the validation under different bottleneck link delays from 40ms to 30ms, and Figure 6 is the result under different bottleneck link background traffic Noted that, to simulate the background traffic, we set u two UDP connections with areto distribution [15] over the bottleneck link The acket size of UDP is 51Byte The burst time and idle time are both ms The rate of each connection is set to be from 50Kbs to 1Mbs As we see in these figures, the theoretical results and the simulation results match quite well, regardless of different loss rates Multile Flows: To further verify the correction of Veno equation in comlicated scenarios, we test multile TCP connections ranging from 4 connections to 3 connections Firstly, we let all connections are TCP Veno flows, and thereafter, we relace half of them with TCP Sack flows The bandwidth of the bottleneck link is changed to be 1Mbs and the delay is 80ms The results are observed in Figure 7 and 8 resectively Seeing these two figures, our equation continues to kee high match with the simulation results either for multile connections or for mix connections B Wireless LAN Exeriments Figure 9 deicts the environments of our wireless LAN exeriments In wireless side, the client is a Comaq lato

6 with W00D wireless card The wireless Access Point is Cisco Linksys WRT54G They are searately laced at two corners and the distance between them is about 8m The bandwidth of the wireless network is 11Mbs and the frequency is 4GHz In the wired side, the server is a PC with FreeBSD 43, where TCP Veno is imlemented The gateway between wireless and wired networks is installed with FreeBSD 49 Number of Packets 1e09 1e08 1e07 1e06 Normal case Maximum Exeriment Minimum x x a Comaq lato with W00D wireless card Fig 9 Cisco Linksys WRT54G Gateway & NAT Dummynet FreeBSD 49 Toology of the wireless LAN TCP Veno FreeBSD 43 To verify our Veno equation, we use the method similar to that in [] One object Veno flow runs from the server to the client for 1hr The other four Veno flows run in the same direction for 800s, 000s, s, and 400s sequentially, which are regarded as the background traffic The 1hr flow trace is divided into 36 consecutive s intervals, and we count the number of ackets transmitted,, BaseRTT, and the acket loss rate in every interval Note that is given as the total number of loss indications TD and TO divided by the number of ackets transmitted Then, we ut the average values of and BaseRTT into the Veno equation to calculate the theoretical result Note that the acket size transmitted is 51Byte Two scenarios are studied here: 1 with Dummynet [16] configured at the gateway; without Dummynet configured at the gateway When Dummynet is set, it shaes the wired link bandwidth to Mbs, the delay to 80ms and the buffer to 0 ackets Because the general trends of the results in each exeriment are similar, we only give one samle in each case for the length limitation In each figure, three curves reresent the maximum boundary when γ = 4 5, the minimum boundary when γ = 1, and the actual results of Veno equation resectively, and the oints reresent the exeriment results As shown in Figure, the Veno equation can model TCP Veno s throughuts fairly well in each case V CONCLUSION AND FUTURE WORK In this aer, a simle throughut equation for TCP Veno is derived We introduce a Veno arameter γ into revious work on Reno [] Such arameter accurately characterizes the refined MD hase of Veno Our extensive exeriments on both simulation and wireless LAN have validated the correctness of the equation In the future work, further efforts are needed to refine the simle assumtion about the uniformly distributed W in the deduction, and a more accurate exression of the Veno arameter γ will be studied Furthermore, we will aly such derived closed form equation of TCP Veno into TFRC rotocol Number of Packets 1e09 1e08 1e07 1e06 Dummynet case Maximum Exeriment Minimum b Fig Exeriment results on the wireless LAN in a normal case and b Dummynet case REFERENCES [1] Van Jacobson Congestion Avoidance and Control SIGCOMM 88, ACM, Aug 1988 [] J Padhye, V Firoiu, D Towsley, and J Kurose Modeling TCP Throughut: A Simle Model and its Emirical Validation SIGCOMM 98, ACM, 1998 [3] Sally Floyd, Mark Handley, Jitendra Padhye, and Joerg Widmer Equation-Based Congestion Control for Unicast Alications SIG- COMM 000, ACM, August 000 [4] Cheng Peng Fu, Soung C Liew TCP Veno: TCP Enhancement for Transmission over Wireless Access Networks IEEE Journal of Selected Areas in Communications, Feb 003 [5] L Brakmo, S O Malley, and L Peterson TCP Vegas: New techniques for congestion detection and avoidance SIGCOMM 94, ACM, 1994 [6] C L Zhang, CPFu, MTYa, CHFoh et al Dynamics Comarison of TCP Reno and Veno IEEE Globecom, 004 [7] C P Fu, W Lu, B S Lee TCP Veno Revisited IEEE Globecom, 003 [8] Q X Pan, S C Liew, C P Fu, W Wang Performance Study of TCP Veno over wireless LAN and RED router IEEE Globecom, 003 [9] Z X Zou, C P Fu et al A Modification for Imroving TCP Veno Performance with Bursty Congestion IEEE Globecom, 005 [] Z X Zou, B S Lee, C P Fu Packet Loss and Congestion State in TCP Veno IEEE ICON, 004 [11] C B Fu, J L Wang, C P Fu, K Zhang Performance Study of TCP Veno in Wireless/Asymmetric Links International conference on cyberworlds, Jaan 004 [1] Ling-chi Chung, C P Fu, Song C Liew Imrovements Achieved by SAK Emloying TCP Veno Equilibrium-Oriented Mechanism over Lossy Networks IEEE EUROCOM, 001 [13] Y Liu, C P Fu et al An Enhancement of Multicast Congestion Control over Hybrid Wired/Wireless Networks IEEE WCNC, 004 [14] S Bajij, L Breslau, D Estrin, K Fall et al Imroving simulation for network research Univ Southern California, Los Angeles, Tech Re 99-70b, 1999 [15] htt://wwwisiedu/nsnam/ns/doc/ns docdf [16] htt://infoietuniiit/ luigi/i dummynet

An Analysis of TCP over Random Access Satellite Links

An Analysis of TCP over Random Access Satellite Links An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance

More information

A Study of Active Queue Management for Congestion Control

A Study of Active Queue Management for Congestion Control A Study of Active Queue Management for Congestion Control Victor Firoiu vfiroiu@nortelnetworks.com Nortel Networks 3 Federal St. illerica, MA 1821 USA Marty orden mborden@tollbridgetech.com Tollridge Technologies

More information

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 On the Relationshi Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 Imad Antonios antoniosi1@southernct.edu CS Deartment MO117 Southern Connecticut State University 501 Crescent St.

More information

cs/ee/ids 143 Communication Networks

cs/ee/ids 143 Communication Networks cs/ee/ids 143 Communication Networks Chapter 4 Transport Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Agenda Internetworking n Routing across LANs, layer2-layer3 n DHCP n NAT Transport layer

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

Modelling TCP with a Discrete Time Markov Chain

Modelling TCP with a Discrete Time Markov Chain Modelling TCP with a Discrete Time Markov Chain José L Gil Motorola josegil@motorola.com ABSTRACT TCP is the most widely used transport protocol in the Internet. The end-to-end performance of most Internet

More information

Fairness comparison of FAST TCP and TCP Vegas

Fairness comparison of FAST TCP and TCP Vegas Fairness comparison of FAST TCP and TCP Vegas Lachlan L. H. Andrew, Liansheng Tan, Tony Cui, and Moshe Zukerman ARC Special Research Centre for Ultra-Broadband Information Networks (CUBIN), an affiliated

More information

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

dn i where we have used the Gibbs equation for the Gibbs energy and the definition of chemical potential

dn i where we have used the Gibbs equation for the Gibbs energy and the definition of chemical potential Chem 467 Sulement to Lectures 33 Phase Equilibrium Chemical Potential Revisited We introduced the chemical otential as the conjugate variable to amount. Briefly reviewing, the total Gibbs energy of a system

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of

More information

TCP-friendly SIMD Congestion Control and Its Convergence Behavior

TCP-friendly SIMD Congestion Control and Its Convergence Behavior Boston University OpenBU Computer Science http://open.bu.edu CAS: Computer Science: Technical Reports 1-5-8 TCP-friendly SIMD Congestion Control and Its Convergence Behavior Jin, Shudong Boston University

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

Signaled Queueing. Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT. Categories and Subject Descriptors. General Terms. Keywords

Signaled Queueing. Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT. Categories and Subject Descriptors. General Terms. Keywords Signaled Queueing Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT Burstiness in queues where customers arrive indeendently leads to rush eriods when wait times are long. We roose a simle signaling scheme

More information

CS276 Homework 1: ns-2

CS276 Homework 1: ns-2 CS276 Homework 1: ns-2 Erik Peterson October 28, 2006 1 Part 1 - Fairness between TCP variants 1.1 Method After learning ns-2, I wrote a script (Listing 3) that runs a simulation of one or two tcp flows

More information

Analysis of M/M/n/K Queue with Multiple Priorities

Analysis of M/M/n/K Queue with Multiple Priorities Analysis of M/M/n/K Queue with Multile Priorities Coyright, Sanjay K. Bose For a P-riority system, class P of highest riority Indeendent, Poisson arrival rocesses for each class with i as average arrival

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Statistical Multiplexing Gain of Link Scheduling Algorithms in QoS Networks (Short Version)

Statistical Multiplexing Gain of Link Scheduling Algorithms in QoS Networks (Short Version) 1 Statistical Multilexing Gain of Link Scheduling Algorithms in QoS Networks (Short Version) Technical Reort: University of Virginia, CS-99-23, July 1999 Robert Boorstyn Almut Burchard Jörg Liebeherr y

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

Comparative study on different walking load models

Comparative study on different walking load models Comarative study on different walking load models *Jining Wang 1) and Jun Chen ) 1), ) Deartment of Structural Engineering, Tongji University, Shanghai, China 1) 1510157@tongji.edu.cn ABSTRACT Since the

More information

The Noise Power Ratio - Theory and ADC Testing

The Noise Power Ratio - Theory and ADC Testing The Noise Power Ratio - Theory and ADC Testing FH Irons, KJ Riley, and DM Hummels Abstract This aer develos theory behind the noise ower ratio (NPR) testing of ADCs. A mid-riser formulation is used for

More information

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting On the Role of Finite Queues in Cooerative Cognitive Radio Networks with Energy Harvesting Mohamed A. Abd-Elmagid, Tamer Elatt, and Karim G. Seddik Wireless Intelligent Networks Center (WINC), Nile University,

More information

Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications

Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Bartłomiej Błaszczyszyn Paul Muhlethaler Nadjib Achir INRIA/ENS INRIA Rocquencourt INRIA Rocquencourt

More information

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)

More information

An Adaptive Three-bus Power System Equivalent for Estimating Voltage Stability Margin from Synchronized Phasor Measurements

An Adaptive Three-bus Power System Equivalent for Estimating Voltage Stability Margin from Synchronized Phasor Measurements An Adative Three-bus Power System Equivalent for Estimating oltage Stability argin from Synchronized Phasor easurements Fengkai Hu, Kai Sun University of Tennessee Knoxville, TN, USA fengkaihu@utk.edu

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

A PEAK FACTOR FOR PREDICTING NON-GAUSSIAN PEAK RESULTANT RESPONSE OF WIND-EXCITED TALL BUILDINGS

A PEAK FACTOR FOR PREDICTING NON-GAUSSIAN PEAK RESULTANT RESPONSE OF WIND-EXCITED TALL BUILDINGS The Seventh Asia-Pacific Conference on Wind Engineering, November 8-1, 009, Taiei, Taiwan A PEAK FACTOR FOR PREDICTING NON-GAUSSIAN PEAK RESULTANT RESPONSE OF WIND-EXCITED TALL BUILDINGS M.F. Huang 1,

More information

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION O P E R A T I O N S R E S E A R C H A N D D E C I S I O N S No. 27 DOI:.5277/ord73 Nasrullah KHAN Muhammad ASLAM 2 Kyung-Jun KIM 3 Chi-Hyuck JUN 4 A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST

More information

A Stochastic Model for TCP with Stationary Random Losses

A Stochastic Model for TCP with Stationary Random Losses A Stochastic Model for TCP with Stationary Random Losses Eitan Altman, Kostya Avrachenkov Chadi Barakat INRIA Sophia Antipolis - France ACM SIGCOMM August 31, 2000 Stockholm, Sweden Introduction Outline

More information

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment

More information

Modeling and Estimation of Full-Chip Leakage Current Considering Within-Die Correlation

Modeling and Estimation of Full-Chip Leakage Current Considering Within-Die Correlation 6.3 Modeling and Estimation of Full-Chi Leaage Current Considering Within-Die Correlation Khaled R. eloue, Navid Azizi, Farid N. Najm Deartment of ECE, University of Toronto,Toronto, Ontario, Canada {haled,nazizi,najm}@eecg.utoronto.ca

More information

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System Vol.7, No.7 (4),.37-38 htt://dx.doi.org/.457/ica.4.7.7.3 Robust Predictive Control of Inut Constraints and Interference Suression for Semi-Trailer System Zhao, Yang Electronic and Information Technology

More information

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS

#A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS #A64 INTEGERS 18 (2018) APPLYING MODULAR ARITHMETIC TO DIOPHANTINE EQUATIONS Ramy F. Taki ElDin Physics and Engineering Mathematics Deartment, Faculty of Engineering, Ain Shams University, Cairo, Egyt

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging 1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014

More information

Impact of Cross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis

Impact of Cross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis Impact of ross Traffic Burstiness on the Packet-scale Paradigm An Extended Analysis Rebecca Lovewell and Jasleen Kaur Technical Report # TR11-007 Department of omputer Science University of North arolina

More information

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018 Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3

More information

Monte Carlo Studies. Monte Carlo Studies. Sampling Distribution

Monte Carlo Studies. Monte Carlo Studies. Sampling Distribution Monte Carlo Studies Do not let yourself be intimidated by the material in this lecture This lecture involves more theory but is meant to imrove your understanding of: Samling distributions and tests of

More information

Symbolic Dynamical Model of Average Queue Size of Random Early Detection Algorithm

Symbolic Dynamical Model of Average Queue Size of Random Early Detection Algorithm Symbolic Dynamical odel of Average Queue Size of Rom Early Detection Algorithm Charlotte Yuk-Fan Ho Telehone: 44 () 788 5555 ext. 4333 Fax: 44 () 788 7997 Email: c.ho@mul.ac.uk School of athematical Sciences

More information

Vision Graph Construction in Wireless Multimedia Sensor Networks

Vision Graph Construction in Wireless Multimedia Sensor Networks University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Conference and Worksho Paers Comuter Science and Engineering, Deartment of 21 Vision Grah Construction in Wireless Multimedia

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie Wireless Intelligent Networks Center WINC, Nile University,

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

A Quadratic Cumulative Production Model for the Material Balance of Abnormally-Pressured Gas Reservoirs

A Quadratic Cumulative Production Model for the Material Balance of Abnormally-Pressured Gas Reservoirs A Quadratic Cumulative Production Model for the Material Balance of Abnormally-Pressured as Reservoirs F.E. onale, M.S. Thesis Defense 7 October 2003 Deartment of Petroleum Engineering Texas A&M University

More information

Fisher Information in Flow Size Distribution Estimation

Fisher Information in Flow Size Distribution Estimation 1 Fisher Information in Flow Size Distribution Estimation Paul Tune, Member, IEEE, and Darryl Veitch, Fellow, IEEE Abstract The flow size distribution is a useful metric for traffic modeling and management

More information

Published: 14 October 2013

Published: 14 October 2013 Electronic Journal of Alied Statistical Analysis EJASA, Electron. J. A. Stat. Anal. htt://siba-ese.unisalento.it/index.h/ejasa/index e-issn: 27-5948 DOI: 1.1285/i275948v6n213 Estimation of Parameters of

More information

Delay Performance of Threshold Policies for Dynamic Spectrum Access

Delay Performance of Threshold Policies for Dynamic Spectrum Access IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO. 7, JULY 83 Delay Performance of Threshold Policies for Dynamic Sectrum Access Rong-Rong Chen and Xin Liu Abstract In this aer, we analyze the delay

More information

Capturing Network Traffic Dynamics Small Scales. Rolf Riedi

Capturing Network Traffic Dynamics Small Scales. Rolf Riedi Capturing Network Traffic Dynamics Small Scales Rolf Riedi Dept of Statistics Stochastic Systems and Modelling in Networking and Finance Part II Dependable Adaptive Systems and Mathematical Modeling Kaiserslautern,

More information

Delay characterization of multi-hop transmission in a Poisson field of interference

Delay characterization of multi-hop transmission in a Poisson field of interference 1 Delay characterization of multi-ho transmission in a Poisson field of interference Kostas Stamatiou and Martin Haenggi, Senior Member, IEEE Abstract We evaluate the end-to-end delay of a multi-ho transmission

More information

Modeling Residual-Geometric Flow Sampling

Modeling Residual-Geometric Flow Sampling Modeling Residual-Geometric Flow Samling Xiaoming Wang Amazon.com Seattle, WA 98101 USA Email: xmwang@gmail.com Xiaoyong Li Texas A&M University College Station, TX 77843 USA Email: xiaoyong@cse.tamu.edu

More information

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi

More information

Developing A Deterioration Probabilistic Model for Rail Wear

Developing A Deterioration Probabilistic Model for Rail Wear International Journal of Traffic and Transortation Engineering 2012, 1(2): 13-18 DOI: 10.5923/j.ijtte.20120102.02 Develoing A Deterioration Probabilistic Model for Rail Wear Jabbar-Ali Zakeri *, Shahrbanoo

More information

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies Online Aendix to Accomany AComarisonof Traditional and Oen-Access Aointment Scheduling Policies Lawrence W. Robinson Johnson Graduate School of Management Cornell University Ithaca, NY 14853-6201 lwr2@cornell.edu

More information

Age of Information: Whittle Index for Scheduling Stochastic Arrivals

Age of Information: Whittle Index for Scheduling Stochastic Arrivals Age of Information: Whittle Index for Scheduling Stochastic Arrivals Yu-Pin Hsu Deartment of Communication Engineering National Taiei University yuinhsu@mail.ntu.edu.tw arxiv:80.03422v2 [math.oc] 7 Ar

More information

Homogeneous and Inhomogeneous Model for Flow and Heat Transfer in Porous Materials as High Temperature Solar Air Receivers

Homogeneous and Inhomogeneous Model for Flow and Heat Transfer in Porous Materials as High Temperature Solar Air Receivers Excert from the roceedings of the COMSOL Conference 1 aris Homogeneous and Inhomogeneous Model for Flow and Heat ransfer in orous Materials as High emerature Solar Air Receivers Olena Smirnova 1 *, homas

More information

Plotting the Wilson distribution

Plotting the Wilson distribution , Survey of English Usage, University College London Setember 018 1 1. Introduction We have discussed the Wilson score interval at length elsewhere (Wallis 013a, b). Given an observed Binomial roortion

More information

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is

More information

Wireless Internet Exercises

Wireless Internet Exercises Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Modeling Residual-Geometric Flow Sampling

Modeling Residual-Geometric Flow Sampling 1 Modeling Residual-Geometric Flow Samling Xiaoming Wang, Xiaoyong Li, and Dmitri Loguinov Abstract Traffic monitoring and estimation of flow arameters in high seed routers have recently become challenging

More information

Numerical Methods for Particle Tracing in Vector Fields

Numerical Methods for Particle Tracing in Vector Fields On-Line Visualization Notes Numerical Methods for Particle Tracing in Vector Fields Kenneth I. Joy Visualization and Grahics Research Laboratory Deartment of Comuter Science University of California, Davis

More information

Extreme Value FEC for Reliable Broadcasting in Wireless Networks

Extreme Value FEC for Reliable Broadcasting in Wireless Networks Extreme Value FEC for Reliable Broadcasting in Wireless Networks Weiyao Xiao and David Starobinski Deartment of Electrical and Comuter Engineering Boston University, Boston, MA 225 Email:{weiyao, staro}@bu.edu

More information

On Wrapping of Exponentiated Inverted Weibull Distribution

On Wrapping of Exponentiated Inverted Weibull Distribution IJIRST International Journal for Innovative Research in Science & Technology Volume 3 Issue 11 Aril 217 ISSN (online): 2349-61 On Wraing of Exonentiated Inverted Weibull Distribution P.Srinivasa Subrahmanyam

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

Efficient Approximations for Call Admission Control Performance Evaluations in Multi-Service Networks

Efficient Approximations for Call Admission Control Performance Evaluations in Multi-Service Networks Efficient Aroximations for Call Admission Control Performance Evaluations in Multi-Service Networks Emre A. Yavuz, and Victor C. M. Leung Deartment of Electrical and Comuter Engineering The University

More information

ECE 6960: Adv. Random Processes & Applications Lecture Notes, Fall 2010

ECE 6960: Adv. Random Processes & Applications Lecture Notes, Fall 2010 ECE 6960: Adv. Random Processes & Alications Lecture Notes, Fall 2010 Lecture 16 Today: (1) Markov Processes, (2) Markov Chains, (3) State Classification Intro Please turn in H 6 today. Read Chater 11,

More information

Analysis of TCP Westwood+ in high speed networks

Analysis of TCP Westwood+ in high speed networks Analysis of TCP Westwood+ in high speed networks 1 E. Altman, C. Barakat, S. Mascolo, N. Möller and J. Sun Abstract TCP Westwood+ is modelled and analyzed using stochastic recursive equations. It is shown

More information

On Fractional Predictive PID Controller Design Method Emmanuel Edet*. Reza Katebi.**

On Fractional Predictive PID Controller Design Method Emmanuel Edet*. Reza Katebi.** On Fractional Predictive PID Controller Design Method Emmanuel Edet*. Reza Katebi.** * echnology and Innovation Centre, Level 4, Deartment of Electronic and Electrical Engineering, University of Strathclyde,

More information

GIVEN an input sequence x 0,..., x n 1 and the

GIVEN an input sequence x 0,..., x n 1 and the 1 Running Max/Min Filters using 1 + o(1) Comarisons er Samle Hao Yuan, Member, IEEE, and Mikhail J. Atallah, Fellow, IEEE Abstract A running max (or min) filter asks for the maximum or (minimum) elements

More information

Stability Analysis of TCP/RED Communication Algorithms

Stability Analysis of TCP/RED Communication Algorithms Stability Analysis of TCP/RED Communication Algorithms Ljiljana Trajković Simon Fraser University, Vancouver, Canada ljilja@cs.sfu.ca http://www.ensc.sfu.ca/~ljilja Collaborators Mingjian Liu and Hui Zhang

More information

OSCILLATION AND PERIOD DOUBLING IN TCP/RED SYSTEM: ANALYSIS AND VERIFICATION

OSCILLATION AND PERIOD DOUBLING IN TCP/RED SYSTEM: ANALYSIS AND VERIFICATION International Journal of Bifurcation and Chaos, Vol. 18, No. 5 (28) 1459 1475 c World Scientific Publishing Company OSCILLATION AND PERIOD DOUBLING IN TCP/RED SYSTEM: ANALYSIS AND VERIFICATION XI CHEN,

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

communication networks

communication networks Positive matrices associated with synchronised communication networks Abraham Berman Department of Mathematics Robert Shorten Hamilton Institute Douglas Leith Hamilton Instiute The Technion NUI Maynooth

More information

The Binomial Approach for Probability of Detection

The Binomial Approach for Probability of Detection Vol. No. (Mar 5) - The e-journal of Nondestructive Testing - ISSN 45-494 www.ndt.net/?id=7498 The Binomial Aroach for of Detection Carlos Correia Gruo Endalloy C.A. - Caracas - Venezuela www.endalloy.net

More information

Flexible Pipes in Trenches with Stiff Clay Walls

Flexible Pipes in Trenches with Stiff Clay Walls Flexible Pies in Trenches with Stiff Clay Walls D. A. Cameron University of South Australia, South Australia, Australia J. P. Carter University of Sydney, New South Wales, Australia Keywords: flexible

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

Supplementary Materials for Robust Estimation of the False Discovery Rate

Supplementary Materials for Robust Estimation of the False Discovery Rate Sulementary Materials for Robust Estimation of the False Discovery Rate Stan Pounds and Cheng Cheng This sulemental contains roofs regarding theoretical roerties of the roosed method (Section S1), rovides

More information

Yixi Shi. Jose Blanchet. IEOR Department Columbia University New York, NY 10027, USA. IEOR Department Columbia University New York, NY 10027, USA

Yixi Shi. Jose Blanchet. IEOR Department Columbia University New York, NY 10027, USA. IEOR Department Columbia University New York, NY 10027, USA Proceedings of the 2011 Winter Simulation Conference S. Jain, R. R. Creasey, J. Himmelsach, K. P. White, and M. Fu, eds. EFFICIENT RARE EVENT SIMULATION FOR HEAVY-TAILED SYSTEMS VIA CROSS ENTROPY Jose

More information

Approximate Dynamic Programming for Dynamic Capacity Allocation with Multiple Priority Levels

Approximate Dynamic Programming for Dynamic Capacity Allocation with Multiple Priority Levels Aroximate Dynamic Programming for Dynamic Caacity Allocation with Multile Priority Levels Alexander Erdelyi School of Oerations Research and Information Engineering, Cornell University, Ithaca, NY 14853,

More information

Stability Analysis of TCP/RED Communication Algorithms

Stability Analysis of TCP/RED Communication Algorithms Stability Analysis of TCP/RED Communication Algorithms Ljiljana Trajković Simon Fraser University, Vancouver, Canada ljilja@cs.sfu.ca http://www.ensc.sfu.ca/~ljilja Collaborators Mingjian Liu and Hui Zhang

More information

The Value of Even Distribution for Temporal Resource Partitions

The Value of Even Distribution for Temporal Resource Partitions The Value of Even Distribution for Temoral Resource Partitions Yu Li, Albert M. K. Cheng Deartment of Comuter Science University of Houston Houston, TX, 7704, USA htt://www.cs.uh.edu Technical Reort Number

More information

Processor Sharing Flows in the Internet

Processor Sharing Flows in the Internet STANFORD HPNG TECHNICAL REPORT TR4-HPNG4 Processor Sharing Flows in the Internet Nandita Dukkipati, Nick McKeown Computer Systems Laboratory Stanford University Stanford, CA 9434-93, USA nanditad, nickm

More information

Design Constraint for Fine Grain Supply Voltage Control LSI

Design Constraint for Fine Grain Supply Voltage Control LSI ASP-DAC 211 Designer s Forum Session 8D-3: State-of-The-Art SoCs and Design Methodologies Design Constraint for Fine Grain Suly Voltage Control LSI January 28, 211 Atsuki Inoue Platform Technologies Laboratories

More information

Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems

Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Hsiao-Lan Chiang, Tobias Kadur, and Gerhard Fettweis Vodafone Chair for Mobile Communications Technische Universität

More information

Notes on Instrumental Variables Methods

Notes on Instrumental Variables Methods Notes on Instrumental Variables Methods Michele Pellizzari IGIER-Bocconi, IZA and frdb 1 The Instrumental Variable Estimator Instrumental variable estimation is the classical solution to the roblem of

More information

Analytic Performance Evaluation of the RED Algorithm

Analytic Performance Evaluation of the RED Algorithm Prof. Dr. P. Tran-Gia Analytic Performance Evaluation of the RED Algorithm Stefan Köhler, Michael Menth, Norbert Vicari TCP Model RED Model TCP over RED Results TCP > Reliable transmission > Closed loop

More information

Maximum Entropy and the Stress Distribution in Soft Disk Packings Above Jamming

Maximum Entropy and the Stress Distribution in Soft Disk Packings Above Jamming Maximum Entroy and the Stress Distribution in Soft Disk Packings Above Jamming Yegang Wu and S. Teitel Deartment of Physics and Astronomy, University of ochester, ochester, New York 467, USA (Dated: August

More information

The decision-feedback equalizer optimization for Gaussian noise

The decision-feedback equalizer optimization for Gaussian noise Journal of Theoretical and Alied Comuter Science Vol. 8 No. 4 4. 5- ISSN 99-634 (rinted 3-5653 (online htt://www.jtacs.org The decision-feedback eualizer otimization for Gaussian noise Arkadiusz Grzbowski

More information

Design of Isolated Bridges from the Viewpoint of Collapse under Extreme Earthquakes

Design of Isolated Bridges from the Viewpoint of Collapse under Extreme Earthquakes Design of Isolated Bridges from the Viewoint of Collase under Extreme Earthquakes D.W. Chang, Y.T. Lin, C.H. Peng, C.Y. Liou CECI Engineering Consultants, Inc., Taiwan T.Y. Lee National Central University,

More information

Minimax Design of Nonnegative Finite Impulse Response Filters

Minimax Design of Nonnegative Finite Impulse Response Filters Minimax Design of Nonnegative Finite Imulse Resonse Filters Xiaoing Lai, Anke Xue Institute of Information and Control Hangzhou Dianzi University Hangzhou, 3118 China e-mail: laix@hdu.edu.cn; akxue@hdu.edu.cn

More information

Effective conductivity in a lattice model for binary disordered media with complex distributions of grain sizes

Effective conductivity in a lattice model for binary disordered media with complex distributions of grain sizes hys. stat. sol. b 36, 65-633 003 Effective conductivity in a lattice model for binary disordered media with comlex distributions of grain sizes R. PIASECKI Institute of Chemistry, University of Oole, Oleska

More information

arxiv:cond-mat/ v2 25 Sep 2002

arxiv:cond-mat/ v2 25 Sep 2002 Energy fluctuations at the multicritical oint in two-dimensional sin glasses arxiv:cond-mat/0207694 v2 25 Se 2002 1. Introduction Hidetoshi Nishimori, Cyril Falvo and Yukiyasu Ozeki Deartment of Physics,

More information

Power Aware Wireless File Downloading: A Constrained Restless Bandit Approach

Power Aware Wireless File Downloading: A Constrained Restless Bandit Approach PROC. WIOP 204 Power Aware Wireless File Downloading: A Constrained Restless Bandit Aroach Xiaohan Wei and Michael J. Neely, Senior Member, IEEE Abstract his aer treats ower-aware throughut maximization

More information

3312 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 5, MAY 2016

3312 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 5, MAY 2016 3312 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 5, MAY 2016 L -Problem-Based Transmission Rate Allocation With Packet Loss and Power Metrics Over Satellite Networks Igor Bisio, Senior Member,

More information

Transient Behaviors of TCP-friendly Congestion Control Protocols

Transient Behaviors of TCP-friendly Congestion Control Protocols Abbreviated version in Proceedings of IEEE INFOCOM 21, April 21. Transient Behaviors of -friendly Congestion Control Protocols Y. Richard Yang, Min Sik Kim, Simon S. Lam Department of Computer Sciences

More information

Probability Estimates for Multi-class Classification by Pairwise Coupling

Probability Estimates for Multi-class Classification by Pairwise Coupling Probability Estimates for Multi-class Classification by Pairwise Couling Ting-Fan Wu Chih-Jen Lin Deartment of Comuter Science National Taiwan University Taiei 06, Taiwan Ruby C. Weng Deartment of Statistics

More information

Deriving Indicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V.

Deriving Indicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V. Deriving ndicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V. Deutsch Centre for Comutational Geostatistics Deartment of Civil &

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information