Fast and Secure Rendezvous Protocols for Mitigating Control Channel DoS Attacks
|
|
- Blake Boone
- 6 years ago
- Views:
Transcription
1 Fast and Secure Rendezvous Protocos for Mitigating Contro Channe DoS Attacks Mohammad J. Abde-Rahman, Hanif Rahbari, and Marwan Krunz Det. of Eectrica and Comuter Engineering, University of Arizona, Tucson, USA Phiie Nain INRIA, Sohia Antiois, France Abstract The oeration of a wireess network reies extensivey on exchanging messages over a universay known channe, referred to as the contro channe. The network erformance can be severey degraded if a jammer aunches a denia-ofservice (DoS) attack on such a channe. In this aer, we design quorum-based frequency hoing (FH) agorithms that mitigate DoS attacks on the contro channe of an asynchronous ad hoc network. Our agorithms can estabish unicast as we as muticast communications under DoS attacks. They are fuy distributed, do not incur any additiona message exchange overhead, and can work in the absence of node synchronization. Furthermore, the muticast agorithms maintain the muticast grou consistency. The efficiency of our agorithms is shown by anaysis and simuations. I. INTRODUCTION Wireess communications are vunerabe to intentiona interference attacks, tyicay referred to as jamming. The erformance of a wireess network can be severey degraded if a jammer aunches a denia-of-service (DoS) attack on the contro channe. Conventiona anti-jamming techniques often rey on sread sectrum communications, incuding frequency hoing (FH). FH has been used in the iterature for estabishing unicast communications in dynamic sectrum access (DSA) networks, where a common contro channe does not aways exist. However, most existing FH designs are based on ad hoc aroaches that do not rovide any erformance guarantees. One way to construct FH sequences in a systematic manner is to use quorum systems 3]. Quorum-based FH designs are advantageous in ad hoc networks because of their robustness to synchronization errors 4]. However, revious quorum-based FH designs, such as 3], do not suort muticast rendezvous, where a the nodes in a muticast grou are required to meet in the same time sot. The authors in 6] roosed an FH-based jamming-resistant broadcast communication scheme. In their scheme, the broadcast oeration is imemented as a series of unicast transmissions, which can ead to muticast inconsistency. For exame, a grou of nodes may share a grou key that is used to encode/decode common secure communication messages. For security uroses, this key may have to be udated eriodicay 7]. However, the change in the grou key has to This research was suorted in art by NSF (under grants CNS-6943 and CNS-9468, IIP , IIP-2343), Raytheon, and the Connection One center. Any oinions, findings, concusions, or recommendations exressed in this aer are those of the author(s) and do not necessariy refect the views of the Nationa Science Foundation. be consistent among a nodes in the grou. Even with the jamming resiiency, such consistency cannot be guaranteed if changes in the grou key are conveyed sequentiay. Instead of designing different FH sequences that overa at common sots, the muticast rendezvous in 5] is estabished after a series of airwise rendezvous oerations that resut in tuning a nodes in the muticast grou to a common FH sequence. The effectiveness of this aroach cannot be maintained under node comromise (if one node is comromised, then the FH sequences of a nodes are exosed). The authors in ] were the first to consider muticast rendezvous in fast-varying DSA networks, using different FH sequences whie maintaining muticast consistency. In this aer, we resent three FH agorithms to maintain contro communications under a DoS attack on the contro channe. More secificay, we roose a nove nested grid quorum-based FH agorithm, caed NUDoS, for estabishing unicast communications in a hostie environment with mutie jammers. NUDoS is faster than reviousy roosed airwise rendezvous agorithms, robust to node comromise, and can function in the absence of synchronization. Next, to estabish muticast communications whie guaranteeing muticast consistency, we customize the two muticast rendezvous agorithms (AMQFH and nested-cmqfh) roosed in ]. We ca the modified agorithms KMDoS and NCMDoS, resectivey. KMDoS and NCMDoS rovide different tradeoffs between seed and robustness to node comromise. Our agorithms are distributed and do not incur any additiona message overhead. The rest of this aer is organized as foows. Section II introduces our modes, defines our metrics, and states our robem. The NUDoS agorithm is resented in Section III. Section IV briefy introduces the KMDoS and NCMDoS agorithms. We evauate our agorithms in Section V, and concude the aer in Section VI. II. MODES, METRICS, AND PROBEM STATEMENT A. System Mode We consider a wireess ad hoc network with k nodes and channes, denoted by f,f 2,...,f. Without oss of generaity, we assume that FH occurs on a er-sot basis, where the sot duration is T seconds. A acket can be exchanged between two or more nodes if they ho onto the same channe in the same time sot. We assume that one time sot is sufficient to exchange one message. If mutie grous haen
2 to meet on the same channe in the same time sot, they use a CSMA/CA-stye rocedure to resove contention. For j =,...,k, each node j has its unique FH sequence w (j). The channe used in the ith sot of FH sequence w (j) is denoted by w (j) i,w (j) i {f,...,f }. Channe f j is caed a rendezvous frequency for the FH sequences w (),..., w (k) if there exists a rendezvous sot i such that w (m) i = f j, m {,...,k}. In our setu, each FH sequence consists of severa frames. Each frame consists of a bock of time-frequency hos. B. Attack Mode We consider two tyes of attacks: an insider attack in which an attacker can comromise a egitimate node and extracts its FH sequence, and a Markovian jamming attack where a jammer foows a two-state discrete-time Markov rocess. When the jammer is in state it does not transmit; otherwise, it transmits a jamming signa. et ρ (m) be the robabiity that channe m is in state, and et T (m) be the exected time (in sots) that channe m sends in state before returning to state. Then, the transition robabiities from state to state ( (m) ) and from state to state (q (m) ) can be exressed as: (m) = ρ(m), q (m) =. () ρ (m) C. Evauation Metrics T (m) T (m) Our agorithms are evauated according to two metrics: exected evasion deay (ED) and exected Hamming distance (HD). ED is defined as the time between the successfu jamming of the contro channe and the re-estabishment of a new one. The exected ED is considered because of the existence of a randomy assigned art in our FH sequences. The exected HD for two FH sequences x = (x...x n ) and y = (y...y n ) is defined as E ( n {x i y i}) /n], where { } is the indicator function and n is the frame ength. In addition to robustness to node comromise, FH sequences with higher HD wi have a ower coision robabiity. A coision occurs when two or more neighboring grous meet on the same channe in the same time sot. D. Probem Statement The FH construction robem is stated as foows: Given f,...,f, k, and n, determine the vaues of w (j) i, i n, j k, that resut in the minimum ED, and achieve a minimum HD of d. This robem is formuated as foows: minimize {w (j) i : i n, j k} Subject to. w (i) = w (j), i,j {,...,k},i j (2) n r= s () i w (i) ] =, i {,...,k} (3) (i) {w nd, i,j {,...,k},i j (4) r w r (j) } where s (r) i f x ] {,} is the state of frequency f x {f,...,f } in the rth time sot, as seen by node i. Assume that s (r) i f x ],i {,...,k},r {,...,n},x {,...,} are given. Then, the soution to Probem gives the minimum ED, denoted by ED, and the rendezvous frequency, denoted by f u. ED and u are given by: { ( k )} s (r) i f u ] == (5) ED = min u u = argmin u { min r n min r n ( k s (r) i f u ] == )} where denotes the ogica OR oeration. Reaxing the assumtion of knowing the future states of the channes, next we roose a centraized agorithm that soves the above robem in O(kn) time, assuming that ony the channe s transition robabiities are known. The centraized agorithm, which reies on redicting the future states of the channes given the current states, can be summarized by the foowing stes: ) For each sot j =,...,n, comute j and j as foow: { k } j = max () n e+j (s(e) i f ],) (7) j = argmax { k () n e+j (s(e) i f ],) where e is the index of the sot in the current frame when channe f has been recenty sensed and () n e+j (s(e) i f ],) is the (n e + j)-ste transition robabiity of f form state s (e) i f ] to state. In genera, the v-ste transition robabiity of channe m from state s to state can be exressed as: ] s ] v q (m) + (m) q(m) (m) q (m) (m) v (s,) = (m). (m) +q (m) (9) 2) Sort sots ascendingy according to their j vaues. 3) Seect the to n nd = n( d) sots in the ist, and assign frequency f j to sot j in a FH sequences. 4) For the remaining nd sots, assign different frequencies for different FH sequences. Next, we exoit some roerties of quorum systems in designing distributed FH rendezvous agorithms. III. UNICAST COMMUNICATIONS Before describing NUDoS for unicast communications, we first give a few basic definitions. A. Preiminaries Definition. Given a set Z n = {,,...,n }, a quorum system Q under Z n is a coection of non-emty subsets of Z n, each caed a quorum, such that: G,H Q : G H. Definition 2. Given a non-negative integer i and a quorum G in a quorum system Q under Z n, we define rotate(g,i) = } (6) (8)
3 {(x+i) mod n,x G} to denote a cycic rotation of quorum G by i. Definition 3. A quorum system Q under Z n is said to satisfy the rotation k-cosure roerty for some k 2 if G,...,G k Q and i,...,i k Z n, k j= rotate(g j,i j ). Quorum systems that enjoy the above rotation k-cosure roerty can be exoited to achieve asynchronous communications. One such quorum system that satisfies the rotation 2-cosure roerty is the grid quorum system 4]. Definition 4. A grid quorum system 4] arranges the eements of the set Z n as a n n array. In this case, a quorum is formed from the eements of any coumn us any row of the grid. Figure iustrates the rotation cosure roerty for two quorums G and H in a grid quorum system Q under Z 6. One quorum s coumn must intersect with the other quorum s row, and vice versa. Hence, the two quorums have at east two intersections (abeed I in Figure ). In Figure, G = rotate(g,) and H = rotate(h,2) intersect at the two eements abeed asi. Hence, the grid quorum system satisfies the rotation 2-cosure roerty. Fig. : Rotation 2-cosure roerty of grid quorum systems. B. NUDoS Agorithm In NUDoS, every frame of every FH sequence uses n rendezvous frequencies, where n is the frame ength in sots. The foowing exame exains the oeration of the NUDoS agorithm forn = 6 (hence, each frame of every FH sequence contains n = 3 rendezvous frequencies). ) Construct a grid quorum system Q under Z 6. Q consists of 6 different quorums, each of 2 6 = 7 eements. 2) Construct an FH sequence w as foows: Seect the outer-most quorum G () from the quorum system Q (e.g., G () = {,,2,3,4,8,2}, where each entry reresents the index of a time sot in a 6-sot frame). Assign a rendezvous frequency h () {f,...,f } to the FH sots that corresond to G (). Deete quorum G () from the origina 4 4 grid and seect the next outer-most quorum G () 2 from the resuting 3 3 grid (e.g., G () 2 = {6,9,,,4}). Then, assign another rendezvous frequency h () 2 to the FH sots that corresond to G () 2. Deete quorum G () 2 from the 3 3 grid, and seect the next outer-most quorum G () 3 from the resuting 2 2 grid (e.g., G () 3 = {7,3,5}). Then, assign a third rendezvous frequency h () 3 to the FH sots that corresond to G () 3. Assign a random frequency h () x {f,...,f } \ {h (),h() 2,h() 3 } to each of the unassigned sots. Reeat the above stes for the other frames in w. 3) Reeat ste 2 for other FH sequences. Throughout this aer, h (j) i and G (j) i, i {,..., n }, denote the ith quorum-assigned frequency that is assigned to the ( n i+) ( n i+) quorum G (j) i in the jth frame. C. Features of the NUDoS Agorithm NUDoS has two main features. First, because of the nested generation of quorums, the overa ratio between two FH sequences (number of rendezvous sots in a frame divided by the frame ength) is significanty higher than the overa ratio for a non-nested grid quorum-based FH agorithm (herein denoted by UDoS). In UDoS, an FH sequence consists of ony one rendezvous frequency, assigned to a n n quorum. FH systems with a higher overa ratio work more efficienty in hostie environments, where a jammer may suddeny aear on a rendezvous channe. Besides having a higher overa ratio, NUDoS invoves mutie rendezvous frequencies er frame, which increases the ikeihood of rendezvousing. The advantage of a nested grid quorum with mutie rendezvous frequencies can be formaized by deriving the exected overa ratio for UDoS and NUDoS, denoted byv UDoS and V NUDoS, resectivey. V UDoS is comosed of the sum of two arts; the exected overa ratio between the quorumbased assigned arts of the FH sequences, denoted by V Q UDoS, and the exected overa ratio between the randomy assigned arts, denoted by VUDoS R. Simiary, V NUDoS is comosed of V Q NUDoS and VR NUDoS. For a given n, VQ UDoS and VQ NUDoS can be determined numericay. After some maniuations, VUDoS R and VR NUDoS can be exressed as foows: VUDoS(,n) R = ( n ) 2 {2 ( n ) 2 } () n VNUDoS(,n) R = {2 n } 2. () Potting V UDoS and V NUDoS vs. n, one can see that V NUDoS is arger than V UDoS, and both decrease with n. The second attractive feature of NUDoS is its robustness to node comromise. Because the quorum-based assigned art of the FH sequence is the art that is intended to suort the rendezvous caabiity, if this art is comromised, the rendezvous caabiity may be eiminated or reduced significanty. NUDoS sequences are comosed of n nested quorums that are generay different for different frames in a given FH sequence, and aso different for different FH sequences. Hence, if a node is comromised and its FH sequence is exosed, ess information wi be eaked about other FH sequences, comared with UDoS sequences. The number of different channe assignments for a given n (K n ) is given by: K n = n 2 ( n j) 2. (2) j=
4 IV. MUTICAST COMMUNICATIONS The muticast rendezvous agorithms, AMQFH and CMQFH, roosed in ] are customized for maintaining muticast communications under a DoS attack on the contro channe. The resuted agorithms are caed KMDoS and CM- DoS, resectivey. These agorithms have two main attractive features. First, they aow a node to construct its sequence by ony knowing the number of nodes in its muticast grou. Hence, they can be executed in a fuy distributed way. Second, these agorithms can sti function in the absence of node synchronization. Due to sace imitations, the detais of these agorithms are not mentioned here, but can be found in 2]. We evauate KMDoS and CMDoS based on the exected ED and HD. KMDoS and CMDoS are imemented in a distributed way as foows. First, the source node uses a series of airwise rendezvous to communicate the number of nodes in the muticast grou to the target muticast grou. Then, each receiving node constructs its own muticast FH sequence. A. Exected ED The exected ED of KMDoS and CMDoS, denoted by E k and E c, resectivey, can be exressed as foows: Resut. E k is given by: ] n i E k = iγ(γ i+ ) ( Γ(γ j )) (3) j= where Γ(γ i ) is the robabiity that sot i is a rendezvous sot and γ i is the robabiity that sot i is a quorum sot (i.e., assigned a rendezvous frequency).γ(γ i ) andγ i,i =,...,n, are given by (k is the muticast grou size minus one for KMDoS): k (k ) ( ) ] i + Γ(γ j ) = γ k+ i γj j kn k+ i= i+2 i + γ i = n Resut 2. E c is given by: ( + i n ) (4) k ( γ j ) k+ i+3 n i+. (5) kn k+ n E c = Θ i( Θ) i (6) where Θ is the robabiity that a given sot is a rendezvous sot. Θ is given by (k is the muticast grou size for CMDoS): k ( ) i k j=k i+ Θ = (e ] j )/e j e i=...e k i {e,...,e k i } {,..., k } (7) ( ) k k e +. e Potting E k and E c, one can see that for > 3, E c E k. Both, E c and E k increases with the muticast grou size. = B. Exected HD { } Resut 3. et φ def kn = n k+ +. Then, the exected HD of KMDoS, denoted by H k, and its uer bound vaue, denoted by H k,best, are given by: H k = { (ϕ )(φ+) + φ } (8) n ϕ ϕ H k,best = φ+ (9) n where H k,best corresonds to the case when different nodes seect different sequences, and nodes cannot rendezvous during the randomy assigned sots. H k reresents the case when nodes can seect different sequences or the same sequence. Resut 4. The exected HD of CMDoS, denoted by H c, and its uer bound vaue, denoted by H c,best, are given by: H c = k k ( 2k 2 ) (2) j= i j k k ( H c,best = 2 ( ) ) (2) k 2 i j j= j i where H c,best is defined simiar to H k,best. Note that as the muticast grou size increases, H c increases but H k decreases, and hence the ga between H c and H k increases with the increase in the size of the muticast grou. CMDoS is robust against node comromise but it is sow. To reduce the ED of CMDoS, we augment it with a nesting design simiar to the NUDoS agorithm, as discussed 2]. The nested version of CMDoS is caed NCMDoS. Remark. FH sequences constructed according to NUDoS, KMDoS, and NCMDoS can estabish asynchronous communications if each FH sequence continues to use the same outer-most quorum and channe in a frames of the FH sequence. This condition is sufficient but not necessary. Thus, FH sequences can sti rendezvous even if the outer-most quorum is changed in some frames, rovided that this change does not occur very frequenty. Remark 2. In Section V, channes and quorums are seected based on the forecasted avaiabiity of the channes at different quorums, as derived from the jamming mode described in Section II-B. A channe is considered avaiabe at a future sot if it is redicted to be avaiabe at that sot with robabiity greater than th. The detais of the channe and quorum seection rocedures are omitted due to sace imitation. V. PERFORMANCE EVAUATION We now resent simuation resuts for the NUDoS, KMDoS, and NCMDoS agorithms, and comare them with the centraized agorithm. The roosed agorithms are studied under different jamming robabiities (ρ (m) ), as we as different frame engths and grou sizes for unicast and muticast, resectivey. Our evauation metrics are the ED and the HD. Our agorithms are simuated under a reaistic setting of no synchronization (the misaignment between FH sequences is
5 Evasion Deay (sots) NUDoS, ρ (m) =.3 NUDoS, ρ (m) =.5 C,d =.65 C,d = n (sots) Hamming Distance (HD) n (sots) Fig. 2: ED for NUDoS ( th =.5,T (m) = 8). Fig. 3: HD for NUDoS ( th =.5,T (m) = 8) NUDoS, ρ (m) =.3 NUDoS, ρ (m) =.5 C,d =.65 C,d =.5 Evasion Deay (sots) KMDoS, ρ (m) =.3 KMDoS, ρ (m) =.5 C,d =.65 C,d = Muticast Grou Size Fig. 4: ED for KMDoS ( th =.5,T (m) = 8). randomy seected in each exeriment). The 95% confidence intervas are indicated. To achieve a minimum HD of d in the centraized agorithm, the actua HD (i.e., nd /n) might be different for different frame engths. A. Unicast Communications (NUDoS) Figure 2 deicts the ED of NUDoS, and comare it with the centraized agorithm (denoted by C). The ED for both agorithms (NUDoS and C) increases with n because of the reduction in the overa ratio. The ED aso increases with ρ (m). Whie achieving a cose HD to the centraized agorithm for sma to moderate vaues of ρ (m), the seed of NUDoS is comarabe to the centraized agorithm. Increasing d in (4) increases the ED of the centraized agorithm. The HD for NUDoS and C is otted in Figure 3. The HD of NUDoS increases with n because of the reduction in the overa ratio. It aso increases with ρ (m) because of the increase in the number of unassigned sots (in our simuations, each unassigned sot increments the HD by /n). B. Muticast Communications (KMDoS and NCMDoS) Figure 4 shows the ED of KMDoS and the centraized agorithm. The ED of KMDoS increases with the grou size for arge vaues of ρ (m). Figure 5 deicts the ED of NCMDoS vs. ρ (m) for a grou of size 3. NCMDoS is much sower than both KMDoS and the centraized agorithm. As shown in Figure 6, the HD of NCMDoS is arger than that of KMDoS, and the ga increases with the increase in the grou size. The HD increases with ρ (m) because of the increase in the number of unassigned sots. Evasion Deay (sots) NCMDoS C,d=.73 C,d= ρ (m) Fig. 5: ED for NCMDoS (grou size = 3, th =.5,T (m) = 8). Hamming Distance (HD) KMDoS, ρ (m) =.2 KMDoS, ρ (m) =.5 NCMDoS, ρ (m) =.2 NCMDoS, ρ (m) = Muticast Grou Size Fig. 6: HD for KMDoS and NCMDoS ( th =.5,T (m) = 4). VI. CONCUSIONS In this aer, we designed three FH agorithms for estabishing unicast (NUDoS) and muticast (KMDoS and NCM- DoS) communications in the resence of a contro channe DoS attack. KMDoS and NCMDoS maintain the muticast consistency, and rovide different tradeoffs between seed and robustness to node comromise. Our agorithms are distributed, do not incur additiona message exchange overhead, and work in the absence of synchronization. We simuated our agorithms under a reaistic setting of no synchronization. REFERENCES ] M. J. Abde-Rahman, H. Rahbari, and M. Krunz, Adative frequency hoing agorithms for muticast rendezvous in DSA networks, in Proc. of the IEEE DySPAN Conf., Oct. 22, ] M. J. Abde-Rahman, H. Rahbari, M. Krunz, and P. Nain, Fast and secure rendezvous rotocos for mitigating contro channe DoS attacks, University of Arizona, Tech. Re. TR-UA-ECE-22-4, Jan. 23. Onine]. Avaiabe: htt://www2.engr.arizona.edu/ mjabderahman. 3] K. Bian, J. M. Park, and R. Chen, A quorum-based framework for estabishing contro channes in dynamic sectrum access networks, in Proc. of the ACM MobiCom Conf., 29, ] J.-R. Jiang, Y.-C. Tseng, C.-S. Hsu, and T.-H. ai, Quorum-based asynchronous ower-saving rotocos for IEEE 82. ad-hoc networks, Mobie Networks and Aications, vo.,. 69 8, Feb ] Z. in, H. iu, X. Chu, and Y.-W. eung, Jum-stay based channehoing agorithm with guaranteed rendezvous for cognitive radio networks, in Proc. of the IEEE INFOCOM Conf., 2, ] S. iu,. azos, and M. Krunz, Thwarting inside jamming attacks on wireess broadcast communications, in Proc. of the ACM WiSec Conf., 2. 7] D. R. Stinson, Crytograhy: Theory and Practice. Chaman and Ha/CRC, Tayor and Francis Grou, 26.
Diversity Gain Region for MIMO Fading Broadcast Channels
ITW4, San Antonio, Texas, October 4 9, 4 Diversity Gain Region for MIMO Fading Broadcast Channes Lihua Weng, Achieas Anastasoouos, and S. Sandee Pradhan Eectrica Engineering and Comuter Science Det. University
More informationCORE: A Combinatorial Game-theoretic Framework for COexistence REndezvous in DSA Networks
CORE: A Combinatorial Game-theoretic Framework for COexistence REndezvous in DSA Networks Mohammad J. Abdel-Rahman and Marwan Krunz Department of Electrical and Computer Engineering, University of Arizona,
More informationA novel Parameter Estimation method based on FRFT in Bistatic MIMO Radar System. Li Li1, a
6th Internationa Conference on Mechatronics Materias Biotechnoogy and Environment (ICMMBE 6 A nove Parameter Estimation method based on FRF in Bistatic MIMO Radar System i i a Information Engineering Coege
More informationUnitary Space-Time Pulse Position Modulation for Differential Unipolar MIMO IR-UWB Communications
1 Unitary Sace-Time Puse Position Moduation for Differentia Unioar MIMO IR-UWB Communications Chadi Abou-Rjeiy, Senior Member IEEE Abstract In this aer, we resent a genera technique for constructing minima-deay
More informationCentralized Coded Caching of Correlated Contents
Centraized Coded Caching of Correated Contents Qianqian Yang and Deniz Gündüz Information Processing and Communications Lab Department of Eectrica and Eectronic Engineering Imperia Coege London arxiv:1711.03798v1
More information7. CREST-TO-TROUGH WAVE HEIGHT DISTRIBUTION
7. CREST-TO-TROUGH WAVE HEIGHT DISTRIBUTION 7.1. Introduction In Chater 5, it has been mentioned that, in the wide sectrum case, the assumtion of H η does not hod even in the narrow case (considering that
More informationFractional Power Control for Decentralized Wireless Networks
Fractiona Power Contro for Decentraized Wireess Networks Nihar Jinda, Steven Weber, Jeffrey G. Andrews Abstract We roose and anayze a new aradigm for ower contro in decentraized wireess networks, termed
More informationTarget Location Estimation in Wireless Sensor Networks Using Binary Data
Target Location stimation in Wireess Sensor Networks Using Binary Data Ruixin Niu and Pramod K. Varshney Department of ectrica ngineering and Computer Science Link Ha Syracuse University Syracuse, NY 344
More information(This is a sample cover image for this issue. The actual cover is not yet available at this time.)
(This is a sampe cover image for this issue The actua cover is not yet avaiabe at this time) This artice appeared in a journa pubished by Esevier The attached copy is furnished to the author for interna
More informationArbitrary Throughput Versus Complexity Tradeoffs in Wireless Networks using Graph Partitioning
University of Pennsyvania SchoaryCommons Departmenta Papers (ESE) Department of Eectrica & Systems Engineering November 2006 Arbitrary Throughput Versus Compexity Tradeoffs in Wireess Networks using Graph
More informationResearch Article SVM-Based Spectrum Mobility Prediction Scheme in Mobile Cognitive Radio Networks
e Scientific Word Journa, Artice ID 395212, 11 ages htt://dx.doi.org/10.1155/2014/395212 Research Artice SVM-Based Sectrum Mobiity Prediction Scheme in Mobie Cognitive Radio Networks Yao Wang, 1,2 Zhongzhao
More informationIEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. X, NO. Y, MONTH
IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. X, NO. Y, MONTH 24 Dynamic On-Chi Therma Sensor Caibration Using Performance Counters Shiting (Justin) Lu, Russe Tessier,
More informationPower Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks
ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao, Vivek Raghunathan, Stephen Hany, Vinod Sharma and. R. Kumar Abstract We consider a joint power contro
More informationProblem set 6 The Perron Frobenius theorem.
Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator
More informationA Variance Minimization Criterion to Active Learning on Graphs
A Variance inimization Criterion to Active Learning on Grahs ing Ji Deartment of Comuter Science University of Iinois at Urbana-Chamaign Jiawei Han Deartment of Comuter Science University of Iinois at
More informationIterative Decoding Performance Bounds for LDPC Codes on Noisy Channels
Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University
More informationON CERTAIN SUMS INVOLVING THE LEGENDRE SYMBOL. Borislav Karaivanov Sigma Space Inc., Lanham, Maryland
#A14 INTEGERS 16 (2016) ON CERTAIN SUMS INVOLVING THE LEGENDRE SYMBOL Borisav Karaivanov Sigma Sace Inc., Lanham, Maryand borisav.karaivanov@sigmasace.com Tzvetain S. Vassiev Deartment of Comuter Science
More informationTHE APPENDIX FOR THE PAPER: INCENTIVE-AWARE JOB ALLOCATION FOR ONLINE SOCIAL CLOUDS. Appendix A 1
TE APPENDIX FOR TE PAPER: INCENTIVE-AWARE JO ALLOCATION FOR ONLINE SOCIAL CLOUDS Yu Zhang, Mihaea van der Schaar Aendix A 1 1) Proof of Proosition 1 Given the SCP, each suier s decision robem can be formuated
More informationESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK
ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK Aexander Arkhipov, Michae Schne German Aerospace Center DLR) Institute of Communications and Navigation Oberpfaffenhofen, 8224 Wessing, Germany
More informationExpressing Priorities and External Probabilities in Process Algebra via Mixed Open/Closed Systems
Reace this fie with rentcsmacro.sty for your meeting, or with entcsmacro.sty for your meeting. Both can be found at the ENTCS Macro Home age. Exressing riorities and Externa robabiities in rocess Agebra
More informationA Brief Introduction to Markov Chains and Hidden Markov Models
A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,
More informationAsynchronous Control for Coupled Markov Decision Systems
INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of
More informationCollaborative Calibration of On-Chip Thermal Sensors Using Performance Counters
Coaborative Caibration of On-Chi Therma s Using Performance Counters Shiting (Justin) Lu, Russe Tessier, and Wayne Bureson University of Massachusetts Deartment of Eectrica and Comuter Engineering Amherst,
More informationAn Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks
An Adaptive Opportunistic Routing Scheme for Wireess Ad-hoc Networks A.A. Bhorkar, M. Naghshvar, T. Javidi, and B.D. Rao Department of Eectrica Engineering, University of Caifornia San Diego, CA, 9093
More informationShort course A vademecum of statistical pattern recognition techniques with applications to image and video analysis. Agenda
Short course A vademecum of statistica attern recognition techniques with aications to image and video anaysis Lecture 3 Density estimation Massimo Piccardi University of Technoogy, Sydney, Austraia Massimo
More informationIn-plane shear stiffness of bare steel deck through shell finite element models. G. Bian, B.W. Schafer. June 2017
In-pane shear stiffness of bare stee deck through she finite eement modes G. Bian, B.W. Schafer June 7 COLD-FORMED STEEL RESEARCH CONSORTIUM REPORT SERIES CFSRC R-7- SDII Stee Diaphragm Innovation Initiative
More informationTransmit Antenna Selection for Physical-Layer Network Coding Based on Euclidean Distance
Transmit ntenna Seection for Physica-Layer Networ Coding ased on Eucidean Distance 1 arxiv:179.445v1 [cs.it] 13 Sep 17 Vaibhav Kumar, arry Cardiff, and Mar F. Fanagan Schoo of Eectrica and Eectronic Engineering,
More informationTime-Aware Congestion-Free Routing Reconfiguration
Time-Aware Congestion-Free Routing Reconfiguration Shih-Hao Tseng, Chiun Lin Lim, Ning Wu, and Ao Tang Schoo of Eectrica and Comuter Engineering, Corne University, Ithaca, New York 4853, U.S.A. Emai: {st688,
More informationDistributed average consensus: Beyond the realm of linearity
Distributed average consensus: Beyond the ream of inearity Usman A. Khan, Soummya Kar, and José M. F. Moura Department of Eectrica and Computer Engineering Carnegie Meon University 5 Forbes Ave, Pittsburgh,
More informationMC-CDMA CDMA Systems. Introduction. Ivan Cosovic. Stefan Kaiser. IEEE Communication Theory Workshop 2005 Park City, USA, June 15, 2005
On the Adaptivity in Down- and Upink MC- Systems Ivan Cosovic German Aerospace Center (DLR) Institute of Comm. and Navigation Oberpfaffenhofen, Germany Stefan Kaiser DoCoMo Euro-Labs Wireess Soution Laboratory
More informationDistributed Optimization With Local Domains: Applications in MPC and Network Flows
Distributed Optimization With Loca Domains: Appications in MPC and Network Fows João F. C. Mota, João M. F. Xavier, Pedro M. Q. Aguiar, and Markus Püsche Abstract In this paper we consider a network with
More informationA Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c)
A Simpe Efficient Agorithm of 3-D Singe-Source Locaization with Uniform Cross Array Bing Xue a * Guangyou Fang b Yicai Ji c Key Laboratory of Eectromagnetic Radiation Sensing Technoogy, Institute of Eectronics,
More informationSequential Decoding of Polar Codes with Arbitrary Binary Kernel
Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient
More informationUnconditional security of differential phase shift quantum key distribution
Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice
More informationA Statistical Framework for Real-time Event Detection in Power Systems
1 A Statistica Framework for Rea-time Event Detection in Power Systems Noan Uhrich, Tim Christman, Phiip Swisher, and Xichen Jiang Abstract A quickest change detection (QCD) agorithm is appied to the probem
More informationExistence Results for a Four-Point Impulsive Boundary Value Problem Involving Fractional Differential Equation
Progr. Fract. Differ. A., No. 3, 2-222 (205) 2 Progress in Fractiona Differentiation and Aications An Internationa Journa htt://dx.doi.org/0.2785/fda/00306 Existence Resuts for a Four-Point Imusive Boundary
More informationPattern selection and control via localized feedback
PHYSICAL REVIEW E 72, 066208 2005 Pattern seection and contro via ocaized feedback Andreas Hande Deartment of Bioogy, Emory University, Atanta, Georgia 30322, USA Roman O. Grigoriev Schoo of Physics, Georgia
More informationAlgorithms to solve massively under-defined systems of multivariate quadratic equations
Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations
More informationAnalysis of Emerson s Multiple Model Interpolation Estimation Algorithms: The MIMO Case
Technica Report PC-04-00 Anaysis of Emerson s Mutipe Mode Interpoation Estimation Agorithms: The MIMO Case João P. Hespanha Dae E. Seborg University of Caifornia, Santa Barbara February 0, 004 Anaysis
More informationarxiv: v1 [cs.lg] 31 Oct 2017
ACCELERATED SPARSE SUBSPACE CLUSTERING Abofaz Hashemi and Haris Vikao Department of Eectrica and Computer Engineering, University of Texas at Austin, Austin, TX, USA arxiv:7.26v [cs.lg] 3 Oct 27 ABSTRACT
More informationAn Algorithm for Pruning Redundant Modules in Min-Max Modular Network
An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai
More informationGalois covers of type (p,, p), vanishing cycles formula, and the existence of torsor structures.
Gaois covers of tye,, ), vanishing cyces formua, and the existence of torsor structures. Mohamed Saïdi & Nichoas Wiiams Abstract In this artice we rove a oca Riemman-Hurwitz formua which comares the dimensions
More informationSource and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems
Source and Reay Matrices Optimization for Mutiuser Muti-Hop MIMO Reay Systems Yue Rong Department of Eectrica and Computer Engineering, Curtin University, Bentey, WA 6102, Austraia Abstract In this paper,
More informationCryptanalysis of PKP: A New Approach
Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in
More informationON THE INVARIANCE OF NONINFORMATIVE PRIORS. BY GAURI SANKAR DATTA 1 AND MALAY GHOSH 2 University of Georgia and University of Florida
he Annas of Statistics 1996, Vo 4, No 1, 141159 ON HE INVARIANCE OF NONINFORMAIVE PRIORS BY GAURI SANKAR DAA 1 AND MALAY GHOSH University of Georgia and University of Forida Jeffreys rior, one of the widey
More informationNEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION
NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION Hsiao-Chang Chen Dept. of Systems Engineering University of Pennsyvania Phiadephia, PA 904-635, U.S.A. Chun-Hung Chen
More informationMULTI-PERIOD MODEL FOR PART FAMILY/MACHINE CELL FORMATION. Objectives included in the multi-period formulation
ationa Institute of Technoogy aicut Department of echanica Engineering ULTI-PERIOD ODEL FOR PART FAILY/AHIE ELL FORATIO Given a set of parts, processing requirements, and avaiabe resources The objective
More informationDistributed Enforcement of Phase-Cohesiveness for Frequency Control of Islanded Inverter-Based Microgrids
Distributed Enforcement of hase-cohesiveness for Frequency Contro of Isanded Inverter-Based Microgrids Madi Zhobaryssov, Student Member, IEEE, Aejandro D. Domínguez-García, Member, IEEE Abstract In this
More informationCombining reaction kinetics to the multi-phase Gibbs energy calculation
7 th European Symposium on Computer Aided Process Engineering ESCAPE7 V. Pesu and P.S. Agachi (Editors) 2007 Esevier B.V. A rights reserved. Combining reaction inetics to the muti-phase Gibbs energy cacuation
More informationThe Application of MIMO to Non-Orthogonal Multiple Access Zhiguo Ding, Member, IEEE, Fumiyuki Adachi, Fellow, IEEE, and H. Vincent Poor, Fellow, IEEE
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL 5, NO, JANUARY 06 537 The Aication of MIMO to Non-Orthogona Mutie Access Zhiguo Ding, Member, IEEE, Fumiyui Adachi, Feow, IEEE, and H Vincent Poor, Feow,
More informationTurbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University
Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver
More informationAvailability-Aware Cell Association for Hybrid Power Supply Networks with Adaptive Bias
Avaiabiity-Aware Ce Association for Hybrid Power Suppy Networks with Adaptive Bias Fanny Parzysz, Member, IEEE, and Christos Verikoukis, Senior Member, IEEE 1 ariv:1609.08182v2 [cs.it] 12 Ju 2017 Abstract
More informationPHASE retrieval aims at recovering a complex-valued signal
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 65, NO., NOVEMBER 15, 017 5957 Undersamed Sarse Phase Retrieva via Majorization Minimization Tianyu Qiu and Danie P. Paomar, Feow, IEEE Abstract In the undersamed
More informationWe are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors
We are IntechOen, the word s eading ubisher of Oen Access books Buit by scientists, for scientists 4,100 116,000 10M Oen access books avaiabe Internationa authors and editors Downoads Our authors are among
More informationSchedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness
1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea-Time Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process
More informationImproving the Accuracy of Boolean Tomography by Exploiting Path Congestion Degrees
Improving the Accuracy of Booean Tomography by Expoiting Path Congestion Degrees Zhiyong Zhang, Gaoei Fei, Fucai Yu, Guangmin Hu Schoo of Communication and Information Engineering, University of Eectronic
More informationDecentralized Event-Driven Algorithms for Multi-Agent Persistent Monitoring Tasks
2017 IEEE 56th Annua Conference on Decision and Contro (CDC) December 12-15, 2017, Mebourne, Austraia Decentraized Event-Driven Agorithms for Muti-Agent Persistent Monitoring Tasks Nan Zhou 1, Christos
More informationOn the use of block-effective macrodispersion for numerical simulations of transport in heterogeneous formations
WATER RESOURCES RESEARCH, VOL. 39, NO. 9, 4, doi:.9/wr77, 3 On the use of bock-ective macrodisersion for numerica simuations of transort in heterogeneous formations Yoram Rubin Deartment of Civi and Environmenta
More informationAvailable online at ScienceDirect. IFAC PapersOnLine 50-1 (2017)
Avaiabe onine at www.sciencedirect.com ScienceDirect IFAC PapersOnLine 50-1 (2017 3412 3417 Stabiization of discrete-time switched inear systems: Lyapunov-Metzer inequaities versus S-procedure characterizations
More informationResearch of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance
Send Orders for Reprints to reprints@benthamscience.ae 340 The Open Cybernetics & Systemics Journa, 015, 9, 340-344 Open Access Research of Data Fusion Method of Muti-Sensor Based on Correation Coefficient
More informationThroughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay
Throughput Optima Scheduing for Wireess Downinks with Reconfiguration Deay Vineeth Baa Sukumaran vineethbs@gmai.com Department of Avionics Indian Institute of Space Science and Technoogy. Abstract We consider
More informationA. Distribution of the test statistic
A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch
More informationScalable Spectrum Allocation for Large Networks Based on Sparse Optimization
Scaabe Spectrum ocation for Large Networks ased on Sparse Optimization innan Zhuang Modem R&D Lab Samsung Semiconductor, Inc. San Diego, C Dongning Guo, Ermin Wei, and Michae L. Honig Department of Eectrica
More informationFast Blind Recognition of Channel Codes
Fast Bind Recognition of Channe Codes Reza Moosavi and Erik G. Larsson Linköping University Post Print N.B.: When citing this work, cite the origina artice. 213 IEEE. Persona use of this materia is permitted.
More informationSupporting Information for Suppressing Klein tunneling in graphene using a one-dimensional array of localized scatterers
Supporting Information for Suppressing Kein tunneing in graphene using a one-dimensiona array of ocaized scatterers Jamie D Was, and Danie Hadad Department of Chemistry, University of Miami, Cora Gabes,
More informationLIFE PREDICTION OF SATELLITE LITHIUM BATTERY BASED ON MULTI TIME-SCALE EXTENDED KALMAN FILTER (EKF) ALGORITHM
U.P.B. Sci. Bu., Series C, Vo. 80, Iss. 4, 2018 ISSN 2286-3540 LIFE PREDICION OF SAELLIE LIHIUM BAERY BASED ON MULI IME-SCALE EXENDED KALMAN FILER (EKF) ALGORIHM Qian-Qian LIU 1, Bing CHEN 2, Jingyuan
More informationError-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity
Error-free Muti-vaued Broadcast and Byzantine Agreement with Optima Communication Compexity Arpita Patra Department of Computer Science Aarhus University, Denmark. arpita@cs.au.dk Abstract In this paper
More informationFREQUENCY modulated differential chaos shift key (FM-
Accepted in IEEE 83rd Vehicuar Technoogy Conference VTC, 16 1 SNR Estimation for FM-DCS System over Mutipath Rayeigh Fading Channes Guofa Cai, in Wang, ong ong, Georges addoum Dept. of Communication Engineering,
More informationA Branch and Cut Algorithm to Design. LDPC Codes without Small Cycles in. Communication Systems
A Branch and Cut Agorithm to Design LDPC Codes without Sma Cyces in Communication Systems arxiv:1709.09936v1 [cs.it] 28 Sep 2017 Banu Kabakuak 1, Z. Caner Taşkın 1, and Ai Emre Pusane 2 1 Department of
More informationT.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA
ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network
More informationUniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete
Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity
More informationElliptic Curves and Cryptography
Ellitic Curves and Crytograhy Background in Ellitic Curves We'll now turn to the fascinating theory of ellitic curves. For simlicity, we'll restrict our discussion to ellitic curves over Z, where is a
More informationMODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL
Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management
More informationMelodic contour estimation with B-spline models using a MDL criterion
Meodic contour estimation with B-spine modes using a MDL criterion Damien Loive, Ney Barbot, Oivier Boeffard IRISA / University of Rennes 1 - ENSSAT 6 rue de Kerampont, B.P. 80518, F-305 Lannion Cedex
More informationTwo-sample inference for normal mean vectors based on monotone missing data
Journa of Mutivariate Anaysis 97 (006 6 76 wwweseviercom/ocate/jmva Two-sampe inference for norma mean vectors based on monotone missing data Jianqi Yu a, K Krishnamoorthy a,, Maruthy K Pannaa b a Department
More informationPacket Fragmentation in Wi-Fi Ad Hoc Networks with Correlated Channel Failures
Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correated Channe Faiures Andrey Lyakhov Vadimir Vishnevsky Institute for Information Transmission Probems of RAS B. Karetny 19, Moscow, 127994, Russia
More informationCoded Caching for Files with Distinct File Sizes
Coded Caching for Fies with Distinct Fie Sizes Jinbei Zhang iaojun Lin Chih-Chun Wang inbing Wang Department of Eectronic Engineering Shanghai Jiao ong University China Schoo of Eectrica and Computer Engineering
More informationRate Adaptation Games in Wireless LANs: Nash Equilibrium and Price of Anarchy
Rate Adaptation Games in Wireess LANs: Nash Equiibrium and Price of Anarchy Prasanna Chaporkar, Aexandre Proutiere, and Božidar Radunović Technica Report MSR-TR-2008-137 Microsoft Research Microsoft Corporation
More informationA simple reliability block diagram method for safety integrity verification
Reiabiity Engineering and System Safety 92 (2007) 1267 1273 www.esevier.com/ocate/ress A simpe reiabiity bock diagram method for safety integrity verification Haitao Guo, Xianhui Yang epartment of Automation,
More informationLower Bounds for the Relative Greedy Algorithm for Approximating Steiner Trees
This paper appeared in: Networks 47:2 (2006), -5 Lower Bounds for the Reative Greed Agorithm for Approimating Steiner Trees Stefan Hougard Stefan Kirchner Humbodt-Universität zu Berin Institut für Informatik
More informationEfficient Visual-Inertial Navigation using a Rolling-Shutter Camera with Inaccurate Timestamps
Efficient Visua-Inertia Navigation using a Roing-Shutter Camera with Inaccurate Timestamps Chao X. Guo, Dimitrios G. Kottas, Ryan C. DuToit Ahmed Ahmed, Ruipeng Li and Stergios I. Roumeiotis Mutipe Autonomous
More informationON SEQUENCES WITHOUT GEOMETRIC PROGRESSIONS
MATHEMATICS OF COMPUTATION VOLUME 00, NUMBER 00 Xxxx 19xx, PAGES 000 000 ON SEQUENCES WITHOUT GEOMETRIC PROGRESSIONS BRIENNE E. BROWN AND DANIEL M. GORDON Abstract. Severa aers have investigated sequences
More informationPower-Availability-Aware Cell Association for Energy-Harvesting Small-Cell Base Stations
1 Power-Avaiabiity-Aware Ce Association for Energy-Harvesting Sma-Ce ase Stations Fanny Parzysz, Member, IEEE, Marco Di Renzo, Senior Member, IEEE, and Christos Veriouis, Senior Member, IEEE arxiv:1607.02317v2
More informationTHINKING IN PYRAMIDS
ECS 178 Course Notes THINKING IN PYRAMIDS Kenneth I. Joy Institute for Data Anaysis and Visuaization Department of Computer Science University of Caifornia, Davis Overview It is frequenty usefu to think
More informationDeveloping a Master Production Schedule Using Fuzzy Mixed Integer Linear Programming
Proceedings of the 203 Internationa Conference on Aied Mathematics and Comutationa Methods Deveoing a Master Production Schedue Using Fuzzy Mixed Integer inear Programming Mohamed. Omar a, Muzana Mohd-Jusoh
More informationSTABILITY OF A PARAMETRICALLY EXCITED DAMPED INVERTED PENDULUM 1. INTRODUCTION
Journa of Sound and Vibration (996) 98(5), 643 65 STABILITY OF A PARAMETRICALLY EXCITED DAMPED INVERTED PENDULUM G. ERDOS AND T. SINGH Department of Mechanica and Aerospace Engineering, SUNY at Buffao,
More informationThe influence of temperature of photovoltaic modules on performance of solar power plant
IOSR Journa of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vo. 05, Issue 04 (Apri. 2015), V1 PP 09-15 www.iosrjen.org The infuence of temperature of photovotaic modues on performance
More informationFirst-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries
c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische
More informationPrimal and dual active-set methods for convex quadratic programming
Math. Program., Ser. A 216) 159:469 58 DOI 1.17/s117-15-966-2 FULL LENGTH PAPER Prima and dua active-set methods for convex quadratic programming Anders Forsgren 1 Phiip E. Gi 2 Eizabeth Wong 2 Received:
More informationA Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes
A Fundamenta Storage-Communication Tradeoff in Distributed Computing with Stragging odes ifa Yan, Michèe Wigger LTCI, Téécom ParisTech 75013 Paris, France Emai: {qifa.yan, michee.wigger} @teecom-paristech.fr
More informationSome Measures for Asymmetry of Distributions
Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester
More informationRate-Distortion Theory of Finite Point Processes
Rate-Distortion Theory of Finite Point Processes Günther Koiander, Dominic Schuhmacher, and Franz Hawatsch, Feow, IEEE Abstract We study the compression of data in the case where the usefu information
More informationASummaryofGaussianProcesses Coryn A.L. Bailer-Jones
ASummaryofGaussianProcesses Coryn A.L. Baier-Jones Cavendish Laboratory University of Cambridge caj@mrao.cam.ac.uk Introduction A genera prediction probem can be posed as foows. We consider that the variabe
More informationBiometrics Unit, 337 Warren Hall Cornell University, Ithaca, NY and. B. L. Raktoe
NONISCMORPHIC CCMPLETE SETS OF ORTHOGONAL F-SQ.UARES, HADAMARD MATRICES, AND DECCMPOSITIONS OF A 2 4 DESIGN S. J. Schwager and w. T. Federer Biometrics Unit, 337 Warren Ha Corne University, Ithaca, NY
More informationINTELLIGENT PI CONTROLLER AND ITS APPLICATION
Journa of Automation, Mobie Robotics & Inteigent Systems VOLUME, N 00 INELLIGEN PI CONROLLER AND IS APPLICAION O DISSOLVED OXYGEN RACKING PROBLEM rd th Received Setember 009; acceted 7 Ari 00. omasz Zubowicz,
More informationGauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law
Gauss Law 1. Review on 1) Couomb s Law (charge and force) 2) Eectric Fied (fied and force) 2. Gauss s Law: connects charge and fied 3. Appications of Gauss s Law Couomb s Law and Eectric Fied Couomb s
More informationALGORITHMIC SUMMATION OF RECIPROCALS OF PRODUCTS OF FIBONACCI NUMBERS. F. = I j. ^ = 1 ^ -, and K w = ^. 0) n=l r n «=1 -*/!
ALGORITHMIC SUMMATIO OF RECIPROCALS OF PRODUCTS OF FIBOACCI UMBERS Staney Rabinowitz MathPro Press, 2 Vine Brook Road, Westford, MA 0886 staney@tiac.net (Submitted May 997). ITRODUCTIO There is no known
More informationsensors Beamforming Based Full-Duplex for Millimeter-Wave Communication Article
sensors Artice Beamforming Based Fu-Dupex for Miimeter-Wave Communication Xiao Liu 1,2,3, Zhenyu Xiao 1,2,3, *, Lin Bai 1,2,3, Jinho Choi 4, Pengfei Xia 5 and Xiang-Gen Xia 6 1 Schoo of Eectronic and Information
More informationBesicovitch and other generalizations of Bohr s almost periodic functions
Besicovitch and other generaizations of Bohr s amost eriodic functions Kevin Nowand We discuss severa casses of amost eriodic functions which generaize the uniformy continuous amost eriodic (a..) functions
More informationOptimization Based Bidding Strategies in the Deregulated Market
Optimization ased idding Strategies in the Dereguated arket Daoyuan Zhang Ascend Communications, nc 866 North ain Street, Waingford, C 0649 Abstract With the dereguation of eectric power systems, market
More information