Mobility-Induced Service Migration in Mobile. Micro-Clouds

Size: px
Start display at page:

Download "Mobility-Induced Service Migration in Mobile. Micro-Clouds"

Transcription

1 arxiv:503054v [csdc] 7 Mar 205 Mobility-Induced Service Migration in Mobile Micro-Clouds Shiiang Wang, Rahul Urgaonkar, Ting He, Murtaza Zafer, Kevin Chan, and Kin K LeungTime Oerating after ossible Deartment of Electrical and Electronic Engineering, Imerial College London, at time United t Kingdom IBM T J Watson Research Center, Yorktown Heights, NY, United s Samsung Research America, San Jose, CA, United s Army Research Laboratory, Adelhi, MD, United s shiiangwang, kinleung}@imerialacuk, M M rurgaon, the}@usibmcom, murtazazaferus@ieeeorg, kevinschanciv@mailmil -- Abstract Mobile micro-cloud is an emerging technology in distributed comuting, which is aimed at roviding seamless comuting/data access to the edge of the network when a centralized service may suffer from oor connectivity and long latency Different from the traditional cloud, a mobile micro-cloud is smaller and deloyed closer to users, tyically attached to a cellular basestation or wireless network access oint Due to the relatively small coverage area of each basestation or access oint, when a user moves across areas covered by different basestations or access oints which are attached to different micro-clouds, issues of service erformance and service become imortant In this aer, we consider such issues We model the general roblem as a Markov decision rocess (MDP), and show that, in the secial case where the mobile user follows a one-dimensional asymmetric random walk mobility model, the otimal olicy for service is a threshold olicy We obtain the analytical solution for the cost resulting from arbitrary thresholds, and then roose an algorithm for finding the otimal thresholds The roosed algorithm is more efficient than standard mechanisms for solving MDPs Index Terms Cloud comuting, Markov decision rocess (MDP), mobile micro-cloud, mobility, service, wireless networks I INTRODUCTION Cloud technologies have been develoing successfully in the ast decade, which enable the centralization of comuting and data resources so that they can be accessed in an on-demand basis by different end users Traditionally, clouds are centralized, in the sense that services are rovided by large data-centers that may be located far away from the user A user may suffer from oor connectivity and long latency when it connects to such a centralized service In recent years, efforts have been made to distribute the cloud closer to users, to rovide faster access and higher reliability to end users in a articular geograhical area A notable concet in this regard is the mobile micro-cloud, where a small cloud consisting of a small set of servers is Contributions of the author to this work are not related to his current emloyment at Samsung Research America 204 IEEE Personal use of this material is ermitted Permission from IEEE must be obtained for all other uses, in any current or future media, including rerinting/reublishing this material for advertising or romotional uroses, creating new collective works, for resale or redistribution to servers or lists, or reuse of any coyrighted comonent of this work in other works Area Figure t t+ Backhaul network 2 Area N- N i Area i Alication scenario with mobile micro-cloud attached directly to the wireless communication infrastructure (eg, a cellular basestation or wireless access oint) to rovide service to users within its coverage Alications of the mobile micro-cloud include data and comutation offloading for mobile devices [], [2], which is a comlement for the relatively low comutational and data storage caacity of mobile users It is also beneficial for scenarios reuiring high robustness or high data-rocessing caability closer to the user, such as in hostile environments [3] or for vehicular networks [4] There are a few other concets which are similar to that of the mobile microcloud, including edge comuting [5], Cloudlet [3], and Follow Me Cloud [6] We use the term mobile micro-cloud throughout this aer A significant issue in the mobile micro-cloud is service caused by the mobility of users Because different micro-clouds are attached to different basestations or access oints, a decision needs to be made on whether and where to migrate the service, when a user moves outside the service area of a micro-cloud that is roviding its service Consider the scenario as shown in Fig, which resembles the case where a micro-cloud is connected to a basestation that covers a articular area, and these micro-clouds are also interconnected with each other via a backhaul network When a mobile user moves from one area to another area, we can either continue to run the service on the micro-cloud for the revious area, and transmit data to/from the user via the backhaul network, or we can migrate the service to the micro-cloud resonsible for the new area In both cases, a cost is incurred; there is a data transmission cost for the first case, and a cost for the second case

2 In the literature, only a few aers have studied the imact of mobility and its relationshi to service for mobile micro-clouds In [7], analytical results on various erformance factors of the mobile micro-cloud are studied, by assuming a symmetric 2-dimensional (2-D) random walk mobility model A service rocedure based on Markov decision rocess (MDP) for -D random walk is studied in [8] It mainly focuses on formulating the roblem with MDP, which can then be solved with standard techniues for solving MDPs In this aer, similarly to [8], we consider an MDP formulation of the roblem In contrast to [8], we roose an otimal threshold olicy to solve for the otimal action of the MDP, which is more efficient than standard solution techniues A threshold olicy means that we always migrate the service for a user from one micro-cloud to another when the user is in states bounded by a articular set of thresholds, and not migrate otherwise We first rove the existence of an otimal threshold olicy and then roose an algorithm with olynomial time-comlexity for finding the otimal thresholds The analysis in this aer can also hel us gain new insights into the roblem, which set the foundation for more comlicated scenarios for further study in the future The remainder of this aer is organized as follows In Section II, we describe the roblem formulation Section III shows that an otimal threshold olicy exists and rooses an algorithm to obtain the otimal thresholds Simulation results are shown in Section IV Section V draws conclusions II PROBLEM FORMULATION We consider a -D region artitioned into a discrete set of areas, each of which is served by a micro-cloud, as shown in Fig Such a scenario models user mobility on roads, for instance A time-slotted system (Fig 2) is considered, which can be viewed as a samled version of a continuous-time system, where the samling can either be eually saced over time or occur right after a handoff instance Mobile users are assumed to follow a -D asymmetric random walk mobility model In every new timeslot, a node moves with robability (or ) to the area that is on the right (or left) of its revious area, it stays in the same area with robability If the system is samled at handoff instances, then = 0, but we consider the general case with 0 Obviously, this mobility model can be described as a Markov chain We only focus on a single mobile user in our analysis; euivalently, we assume that there is no correlation in the service or mobility among different users The state of the user is defined as the offset between the mobile user location and the location of the micro-cloud running the service at the beginning of a slot, before ossible service, ie, the state in slot t is defined as s t = u t h t, where u t is the location (index of area) of the mobile user, and h t the location of the micro-cloud hosting the service Note that s t can be zero, ositive, or negative At the beginning of each timeslot, the current state is observed, and the decision t Oerating after ossible t+ at time t Figure 2 Timing of the roosed mechanism Time on whether to migrate the service is made If is necessary, it haens right after the state, ie, at the beginning of the timeslot We assume that the time taken M M N- N for is negligible comared --with the length of a slot We study whether and where to migrate the service when the mobile user has moved from one area to another The cost in a single timeslot C a (s) is defined as the cost under state s when erforming action a, where a reresents a decision for the service such Backhaul as no network or to a secified micro-cloud The goal is to minimize the discounted sum cost over time Micro- finda olicy πcloud that 2mas each ossible cloud state i s to an Secifically, Micro- under the current state Micro- s 0, we would like tocloud action a = π(s) such that the exected long-term discounted Area Area 2 Area i sum cost is minimized, ie, [ ] V (s 0 ) = min E γ t C π(st) (s t ) π s 0 () t=0 where E [ ] denotes the conditional exectation, and 0 < γ < is a discount factor Because we consider a scenario where all micro-clouds are connected via the backhaul (as shown in Fig ), and the backhaul is regarded as a central entity (which resembles the case for cellular networks, for examle), we consider the following one-timeslot cost function for taking action a in state s in this aer: 0, if no or data transmission, if only data transmission C a (s) =, if only +, if both and data transmission (2) Euation (2) is exlained as follows If the action a under state s causes no or data transmission (eg, if the node and the micro-cloud hosting the service are in the same location, ie, s = 0, and we do not migrate the service to another location), we do not need to communicate via the backhaul network, and the cost is zero A non-zero cost is incurred when the node and the micro-cloud hosting the service are in different locations In this case, if we do not migrate to the current node location at the beginning of the timeslot, the data between the micro-cloud and mobile user need to be transmitted via the backhaul network This data transmission incurs a cost of When we erform, we need resources to suort The cost is assumed to be, ie, the cost C a (s) is normalized by the cost Finally, if both and data transmission occur, in which case we migrate to a location that is different from the current node

3 location, the total cost is + Lemma Migrating to locations other than the current location of the mobile user is not otimal Proof: We consider an arbitrary trajectory of the mobile user Denote t u as the first timeslot (starting from the current timeslot) that the mobile user is in the location indexed u Assume that the user is currently in location u 0, then the current timeslot is t u0 Case migrating to location u u 0 at t u0 : This incurs a cost of + at timeslot t u0, because t u > t u0 as a node cannot be in two different locations at the same time Define a variable t m [t u0 +, t u ] being the largest timeslot index such that we do not erform further at timeslots within the interval [t u0 +, t m ], which means that either we erform at t m or we have t m = t u Then, we have a cost of at each of the timeslots t [t u0 +, t m ] Case 2 no at t u0 : In this case, the cost at each timeslot t [t u0, t m ] is either (if s t = u t h t 0) or zero (if s t = 0) For the timeslot t m, we construct the following olicy If t m < t u, we migrate to the same location as in Case, which means that the cost at t m cannot be larger than that in Case If t m = t u, we migrate to u, which can increase the cost at t m by at most one unit comared with the cost in Case With the above olicy, the costs at timeslots t > t m in Cases and 2 are the same The cost at t u0 in Case is one unit larger than that in Case 2, and the cost at t m in Case is at most one unit smaller than that in Case 2 Because 0 < γ <, Case 2 brings lower discounted sum cost than Case Therefore, there exists a better olicy than migrating to u u 0 at t u0 This holds for any movement attern of the mobile user, and it ensures that the cost in any timeslot is either 0,, or From Lemma, we only have two candidate actions, which are migrating to the current user location or not migrating This simlifies the action sace to two actions: a action, denoted as a = ; and a no- action, denoted as a = 0 In ractice, there is usually a limit on the maximum allowable distance between the mobile user and the microcloud hosting its service for the service to remain usable We model this limitation by a maximum negative offset M and a maximum ositive offset N (where M < 0, N > 0), such that the service must be migrated (a ) when the node enters state M or N This imlies that, although the node can move in an unbounded sace, the state sace of our MDP for service control is finite The overall transition diagram of the resulting MDP is illustrated in Fig 3 Note that because each state transition is the concatenated effect of (ossible) and node movement, and the states are defined as the offset between node and host location, the next state after taking a action is either, 0, or With the above considerations, the cost function in (2) can be modified to the following: 0, if s = 0 C a (s) =, if s 0, M < s < N, a = 0, if s 0, M s N, a = With the one-timeslot cost defined as in (3), we obtain the following Bellman s euations for the discounted sum cost when resectively taking action a = 0 and a = : γ j= 0jV (j), if s = 0 V (s a = 0) = V (s) = + γ s+ j=s sjv (j), γ (3) if s 0, M<s<N (4) j= V (s a = ) = 0jV (j), if s = 0 + γ j= 0jV (j), if s 0, M s N (5) where ij denotes the (one-ste) transition robability from state i to state j, their secific values are related to arameters and as defined earlier The otimal cost V (s) is minv (s a = 0), V (s a = )}, if M <s<n V (s a = ), III OPTIMAL THRESHOLD POLICY A Existence of Otimal Threshold Policy if s=m or s=n (6) We first show that there exists a threshold olicy which is otimal for the MDP in Fig 3 Proosition There exists a threshold olicy (k, k 2 ), where M < k 0 and 0 k 2 < N, such that when k s k 2, the otimal action for state s is a (s) = 0, and when s < k or s > k 2, a (s) = Proof: It is obvious that different actions for state zero a(0) = 0 and a(0) = are essentially the same, because the mobile user and the micro-cloud hosting its service are in the same location under state zero, either action does not incur cost and we always have C a(0) (0) = 0 Therefore, we can conveniently choose a (0) = 0 In the following, we show that, if it is otimal to migrate at s = k and s = k 2 +, then it is otimal to migrate at all states s with M s k or k 2 + s N We relax the restriction that we always migrate at states M and N for now, and later discuss that the results also hold for the unrelaxed case We only focus on k 2 + s N, because the case for M s k is similar If it is otimal to migrate at s = k 2 +, we have V (k 2 + a = ) γ t = (7) γ t=0 where the right hand-side of (7) is the discounted sum cost of a never-migrate olicy suosing that the user never returns back to state zero when starting from state s = k 2 + This cost is an uer bound of the cost incurred from any ossible statetransition ath without, and cannot bring

4 at time t M M N- N -- Figure 3 MDP model for service The solid lines denote transition under action a = 0 and the dotted lines denote transition under action a = When taking action a = from any state, the next state is s = with robability, s = 0 with robability, or s = with robability higher cost than this because otherwise it contradicts with the resumtion that it is otimal to migrate at s = k 2 + Suose we do not migrate at state Backhaul s where k 2 + network < s N, then we have a (one-timeslot) cost of in each timeslot until the user reaches a state (ie, a state at which we erform ) From (5), we know that V (s a = ) is constant for t Area m 2 s 0 Therefore, any state-transition ath L starting from state s has a discounted sum cost of V L (s ) = t=0 Area 2 γ t + γ tm V (k 2 + a = ) where t m > 0 is a arameter reresenting the first timeslot that the user is in a state after reaching state s (assuming that we reach state s at t = 0), which is deendent on the statetransition ath L We have V L (s ) V (k 2 + a = ) = ( ) γtm ( γ tm) V (k 2 + a = ) γ = ( γ tm) ( ) γ V (k 2 + a = ) 0 where the last ineuality follows from (7) It follows that, for any ossible state-transition ath L, V L (s ) V (k 2 + a = ) Hence, it is always otimal to migrate at state s, which brings cost V (s a = ) = V (k 2 + a = ) The result also holds with the restriction that we always migrate at states M and N, because no matter what thresholds (k, k 2 ) we have for the relaxed roblem, migrating at states M and N always yield a threshold olicy Proosition shows the existence of an otimal threshold olicy The otimal threshold olicy exists for arbitrary values of M, N,, and B Simlifying the Cost Calculation The existence of the otimal threshold olicy allows us simlify the cost calculation, which hels us develo an algorithm that has lower comlexity than standard MDP solution algorithms When the thresholds are given as (k, k 2 ), the value udating function (6) is changed to the following: V (s a = 0), if k s k 2 V (s) = (8) V (s a = ), otherwise From (4) and (5), we know that, for a given olicy with thresholds (k, k 2 ), we only need to comute V (s) with k s k 2 +, because the values of V (s) with s k are identical, and the values of V (s) with s k 2 are also identical Note that we always have k M and k 2 + N, because k > M and k 2 < N as we always i migrate when at states M and N Define Area i v (k,k 2) = [V (k ) V (k ) V (0) V (k 2 ) V (k 2 + )] T c (k,k 2) = [ 0 }} k elements }} k 2 elements ] T 0,k 00 0,k2+ k,k k,0 k,k 2+ P (k =,k 2) 0,k 00 0,k2+ k2,k k2,0 k2,k 2+ 0,k 00 0,k2+ where suerscrit T denotes the transose of the matrix Then, (4) and (5) can be rewritten as (9) (0) () v (k,k 2) = c (k,k 2) + γp (k,k 2) v (k,k 2) (2) The value vector v (k,k 2) can be obtained by ( v (k,k 2) = I γp (k,k 2)) c(k,k 2) (3) ( ) The matrix I γp (k,k 2) is invertible for 0 < γ <, because in this case there exists a uniue solution for v (k,k 2) from (2) Euation (3) can be comuted ( using Gaussian elimination that has a comlexity of O ( M + N) 3) However, noticing that P (k is a sarse matrix (because,k 2) ij = 0 for j i > ), there can exist more efficient algorithms to comute (3) C Algorithm for Finding the Otimal Thresholds To find the otimal thresholds, we can erform a search on values of (k, k 2 ) Further, because an increase/decrease in V (s) for some s increases/decreases each element in the cost vector v due to cost roagation following balance euations

5 Algorithm Modified olicy iteration algorithm for finding the otimal thresholds : Initialize k 0, k2 0 2: reeat 3: k k, k 2 k2 //record revious thresholds 4: Construct c (k,k2) and P according to (0) and (k,k 2) () 5: Evaluate v (k,k from (3) 2) 6: Extend v (k,k to obtain V (s) for all M s N 2) 7: for i =, 2 do 8: if i = then 9: if + γ j= 0jV (j) < V (k) then 0: dir, loovec [k +, k + 2,, 0] : k k + 2: else 3: dir 0, loovec [k, k 2,, M + ] 4: end if 5: else if i = 2 then 6: if + γ j= 0jV (j) < V (k2) then 7: dir, loovec [k2, k2 2,, 0] 8: k2 k2 9: else 20: dir 0, loovec [k2 +, k2 + 2,, N ] 2: end if 22: end if 23: for k i = each value in loovec do 24: if dir = 0 then 25: if + γ k i+ j=k i k i,jv (j) < V (k i ) then 26: ki k i 27: else if + γ k i+ j=k i k i,jv (j)>v (k i ) then 28: exit for 29: end if 30: else if dir = then 3: if + γ j= 0jV (j) < V (k i ) then 32: ki k i sign(k i ) 33: else if + γ j= 0jV (j) > V (k i ) then 34: exit for 35: end if 36: end if 37: end for 38: end for 39: until k = k and k2 = k 2 40: return k, k2 (4) and (5), we only need to minimize V (s) for a secific state s We roose an algorithm for finding the otimal thresholds, as shown in Algorithm, which is a modified version of the standard olicy iteration mechanism [9, Ch 3] Algorithm is exlained as follows We kee iterating until the thresholds no longer change, which imlies that the otimal thresholds have been found The thresholds (k, k 2) are those obtained from each iteration Lines 4 6 comute V (s) for all s under the given thresholds (k, k 2) Then, Lines 8 22 determine the search direction for k and k 2 Because V (s) in each iteration is comuted using the current thresholds (k, k 2), we have actions a(k ) = a(k 2) = 0, and (4) is automatically satisfied when relacing its left hand-side with V (k ) or V (k 2) Lines 9 and 6 check whether iterating according to (5) can yield lower cost If it does, it means that migrating is a better action at state k (or k 2), which also imlies that we should migrate at states s with M s k (or k 2 s N) according to Proosition In this case, k (or k 2) should be set closer to zero, and we search through those thresholds that are closer to zero than k (or k 2) If Line 9 (or Line 6) is not satisfied, according to Proosition, it is good not to migrate at states s with k s 0 (or 0 s k 2), so we search k (or k 2 ) to the direction aroaching M (or N), to see whether it is good not to migrate under those states Lines adjust the thresholds If we are searching toward state M or N and Line 25 is satisfied, it means that it is better not to migrate under this state (k i ), and we udate the threshold to k i When Line 27 is satisfied, it means that it is better to migrate at state k i According to Proosition, we should also migrate at any state closer to M or N than state k i, thus we exit the loo If we are searching toward state zero and Line 3 is satisfied, it is good to migrate under this state (k i ), therefore the threshold is set to one state closer to zero (k i sign(k i )) When Line 33 is satisfied, we should not migrate at state k i According to Proosition, we should also not migrate at any state closer to zero than state k i, and we exit the loo Proosition 2 The threshold-air (k, k 2) is different in every iteration of the loo starting at Line 2, otherwise the loo terminates Proof: The loo starting at Line 2 changes k and k 2 in every iteration so that V (s) for all s become smaller It is therefore imossible that k and k 2 are the same as in one of the revious iterations and at the same time reduce the value of V (s), because V (s) comuted from (3) is the stationary cost value for thresholds (k, k 2) The only case when (k, k 2) are the same as in the revious iteration (which does not change V (s)) terminates the loo Corollary The number of iterations in Algorithm is O( M N) Proof: According to Proosition 2, there can be at most M N + iterations in the loo starting at Line 2 If we use Gaussian elimination ( to comute (3), the timecomlexity of Algorithm is O M N ( M + N) 3) IV SIMULATION RESULTS We comare the roosed threshold method with the standard value iteration and olicy iteration methods [9, Ch 3] Simulations are run on MATLAB, on a comuter with 64-bit Windows 7, Intel Core i CPU, and 8GB memory The value iteration terminates according to an error bound of ɛ = 0 in the discounted sum cost Note that the roosed method and the standard olicy iteration method always roduce the otimal cost The number of states M = N = 0 The transition

6 Running time (s) Proosed Policy iteration Value iteration Running time (s) Proosed Policy iteration Value iteration Running time (s) Proosed Policy iteration Value iteration Discounted sum cost Otimal Never migrate Always migrate Discounted sum cost Otimal Never migrate Always migrate Discounted sum cost Otimal Never migrate Always migrate 0 (a) 0 (b) 0 (c) Figure 4 Performance under different : (a) γ = 05, (b) γ = 09, (c) γ = 099 robabilities and are randomly generated Simulations are run with 000 different random seeds in each setting to obtain the average erformance The running time and the discounted sum costs under different values of are shown in Fig 4 The results show that the roosed method always has lowest running time, and the running time of the standard olicy iteration method is 2 to 5 times larger than that of the roosed algorithm, while the value iteration aroach consumes longer time This is because the roosed algorithm simlifies the solution search rocedure comared with standard mechanisms The results also show that the roosed method can rovide the otimal cost comared with a never-migrate (excet for states M and N) or always-migrate olicy It is also interesting to observe that the otimal cost aroaches the cost of a nevermigrate olicy when is small, and it aroaches the cost of an always-migrate olicy when is large Such a result is intuitive, because a small imlies a small data transmission cost, and when is small enough, then it is not really necessary to migrate; when is large, the data transmission cost is so large so that it is always good to migrate to avoid data communication via the backhaul network V CONCLUSION AND FUTURE WORK In this aer, we have roosed a threshold olicy-based mechanism for service in mobile micro-clouds We have shown the existence of otimal threshold olicy and roosed an algorithm for finding the otimal thresholds The roosed algorithm has olynomial time-comlexity which is indeendent of the discount factor γ This is romising because the time-comlexity of standard algorithms for solving MDPs, such as value iteration or olicy iteration, are generally deendent on the discount factor, and they can only be shown to have olynomial time-comlexity when the discount factor is regarded as a constant [0] Although the analysis in this aer is based on -D random walk of mobile users, it can serve as a theoretical basis for more comlicated scenarios, such as 2-D user-mobility, in the future ACKNOWLEDGMENT This research was artly sonsored by the US Army Research Laboratory and the UK Ministry of Defence and was accomlished under Agreement Number W9NF The views and conclusions contained in this document are those of the author(s) and should not be interreted as reresenting the official olicies, either exressed or imlied, of the US Army Research Laboratory, the US Government, the UK Ministry of Defence or the UK Government The US and UK Governments are authorized to reroduce and distribute rerints for Government uroses notwithstanding any coyright notation hereon REFERENCES [] Y Abe, R Geambasu, K Joshi, H A Lagar-Cavilla, and M Satyanarayanan, vtube: efficient streaming of virtual aliances over last-mile networks, in Proc of the 4th annual Symosium on Cloud Comuting ACM, 203 [2] K Ha, Z Chen, W Hu, W Richter, P Pillai, and M Satyanarayanan, Towards wearable cognitive assistance, in Proc of ACM MobiSys, 204 This is unless the MDP is deterministic, which is not the case in this aer

7 [3] M Satyanarayanan, G Lewis, E Morris, S Simanta, J Boleng, and K Ha, The role of cloudlets in hostile environments, IEEE Pervasive Comuting, vol 2, no 4, 40 49, Oct 203 [4] S Wang, L Le, N Zahariev, and K K Leung, Centralized rate control mechanism for cellular-based vehicular networks, in Proc of IEEE GLOBECOM 203, 203 [5] S Davy, J Famaey, J Serrat-Fernandez, J Gorricho, A Miron, M Dramitinos, P Neves, S Latre, and E Goshen, Challenges to suort edge-as-a-service, IEEE Communications Magazine, vol 52, no, 32 39, Jan 204 [6] T Taleb and A Ksentini, Follow me cloud: interworking federated clouds and distributed mobile networks, IEEE Network, vol 27, no 5, 2 9, Set 203 [7], An analytical model for follow me cloud, in Proc of IEEE GLOBECOM 203, 203 [8] A Ksentini, T Taleb, and M Chen, A Markov decision rocess-based service rocedure for follow me cloud, in Proc of IEEE ICC 204, 204 [9] W B Powell, Aroximate Dynamic Programming: Solving the curses of dimensionality John Wiley & Sons, 2007 [0] I Post and Y Ye, The simlex method is strongly olynomial for deterministic markov decision rocesses in Proc of ACM-SIAM Symosium on Discrete Algorithms (SODA), 203,

Figure 1. Application scenario of mobile micro-clouds (MMCs).

Figure 1. Application scenario of mobile micro-clouds (MMCs). Mobility-Driven Service Migration in Mobile Micro-Clouds Shiqiang Wang, Rahul Urgaonkar, Murtaza Zafer, Kevin Chan, Ting He, and Kin K. Leung Imperial College London, Email: shiqiang.wang11, kin.leung}@imperial.ac.uk

More information

Dynamic Service Placement for Mobile Micro-Clouds with Predicted Future Costs

Dynamic Service Placement for Mobile Micro-Clouds with Predicted Future Costs Dynamic Service Placement for Mobile Micro-Clouds with Predicted Future Costs Shiqiang Wang, Rahul Urgaonkar, Kevin Chan, ing He, Murtaza Zafer, and Kin K. Leung Department of Electrical and Electronic

More information

Age of Information: Whittle Index for Scheduling Stochastic Arrivals

Age of Information: Whittle Index for Scheduling Stochastic Arrivals Age of Information: Whittle Index for Scheduling Stochastic Arrivals Yu-Pin Hsu Deartment of Communication Engineering National Taiei University yuinhsu@mail.ntu.edu.tw arxiv:80.03422v2 [math.oc] 7 Ar

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

Extension of Minimax to Infinite Matrices

Extension of Minimax to Infinite Matrices Extension of Minimax to Infinite Matrices Chris Calabro June 21, 2004 Abstract Von Neumann s minimax theorem is tyically alied to a finite ayoff matrix A R m n. Here we show that (i) if m, n are both inite,

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

arxiv: v1 [physics.data-an] 26 Oct 2012

arxiv: v1 [physics.data-an] 26 Oct 2012 Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

Network Configuration Control Via Connectivity Graph Processes

Network Configuration Control Via Connectivity Graph Processes Network Configuration Control Via Connectivity Grah Processes Abubakr Muhammad Deartment of Electrical and Systems Engineering University of Pennsylvania Philadelhia, PA 90 abubakr@seas.uenn.edu Magnus

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

State Estimation with ARMarkov Models

State Estimation with ARMarkov Models Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,

More information

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies Online Aendix to Accomany AComarisonof Traditional and Oen-Access Aointment Scheduling Policies Lawrence W. Robinson Johnson Graduate School of Management Cornell University Ithaca, NY 14853-6201 lwr2@cornell.edu

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete

More information

6 Stationary Distributions

6 Stationary Distributions 6 Stationary Distributions 6. Definition and Examles Definition 6.. Let {X n } be a Markov chain on S with transition robability matrix P. A distribution π on S is called stationary (or invariant) if π

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

Anytime communication over the Gilbert-Eliot channel with noiseless feedback

Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anant Sahai, Salman Avestimehr, Paolo Minero Deartment of Electrical Engineering and Comuter Sciences University of California

More information

arxiv: v1 [cs.ro] 24 May 2017

arxiv: v1 [cs.ro] 24 May 2017 A Near-Otimal Searation Princile for Nonlinear Stochastic Systems Arising in Robotic Path Planning and Control Mohammadhussein Rafieisakhaei 1, Suman Chakravorty 2 and P. R. Kumar 1 arxiv:1705.08566v1

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

Robust Solutions to Markov Decision Problems

Robust Solutions to Markov Decision Problems Robust Solutions to Markov Decision Problems Arnab Nilim and Laurent El Ghaoui Deartment of Electrical Engineering and Comuter Sciences University of California, Berkeley, CA 94720 nilim@eecs.berkeley.edu,

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

Use of Transformations and the Repeated Statement in PROC GLM in SAS Ed Stanek

Use of Transformations and the Repeated Statement in PROC GLM in SAS Ed Stanek Use of Transformations and the Reeated Statement in PROC GLM in SAS Ed Stanek Introduction We describe how the Reeated Statement in PROC GLM in SAS transforms the data to rovide tests of hyotheses of interest.

More information

LINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL

LINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL LINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL Mohammad Bozorg Deatment of Mechanical Engineering University of Yazd P. O. Box 89195-741 Yazd Iran Fax: +98-351-750110

More information

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment

More information

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting On the Role of Finite Queues in Cooerative Cognitive Radio Networks with Energy Harvesting Mohamed A. Abd-Elmagid, Tamer Elatt, and Karim G. Seddik Wireless Intelligent Networks Center (WINC), Nile University,

More information

Statics and dynamics: some elementary concepts

Statics and dynamics: some elementary concepts 1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and

More information

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm Gabriel Noriega, José Restreo, Víctor Guzmán, Maribel Giménez and José Aller Universidad Simón Bolívar Valle de Sartenejas,

More information

Recursive Estimation of the Preisach Density function for a Smart Actuator

Recursive Estimation of the Preisach Density function for a Smart Actuator Recursive Estimation of the Preisach Density function for a Smart Actuator Ram V. Iyer Deartment of Mathematics and Statistics, Texas Tech University, Lubbock, TX 7949-142. ABSTRACT The Preisach oerator

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

q-ary Symmetric Channel for Large q

q-ary Symmetric Channel for Large q List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu

More information

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

Construction of High-Girth QC-LDPC Codes

Construction of High-Girth QC-LDPC Codes MITSUBISHI ELECTRIC RESEARCH LABORATORIES htt://wwwmerlcom Construction of High-Girth QC-LDPC Codes Yige Wang, Jonathan Yedidia, Stark Draer TR2008-061 Setember 2008 Abstract We describe a hill-climbing

More information

An Analysis of TCP over Random Access Satellite Links

An Analysis of TCP over Random Access Satellite Links An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance

More information

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

The Knuth-Yao Quadrangle-Inequality Speedup is a Consequence of Total-Monotonicity

The Knuth-Yao Quadrangle-Inequality Speedup is a Consequence of Total-Monotonicity The Knuth-Yao Quadrangle-Ineuality Seedu is a Conseuence of Total-Monotonicity Wolfgang W. Bein Mordecai J. Golin Lawrence L. Larmore Yan Zhang Abstract There exist several general techniues in the literature

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Brownian Motion and Random Prime Factorization

Brownian Motion and Random Prime Factorization Brownian Motion and Random Prime Factorization Kendrick Tang June 4, 202 Contents Introduction 2 2 Brownian Motion 2 2. Develoing Brownian Motion.................... 2 2.. Measure Saces and Borel Sigma-Algebras.........

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

BOUNDS FOR THE COUPLING TIME IN QUEUEING NETWORKS PERFECT SIMULATION

BOUNDS FOR THE COUPLING TIME IN QUEUEING NETWORKS PERFECT SIMULATION BOUNDS FOR THE COUPLING TIME IN QUEUEING NETWORKS PERFECT SIMULATION JANTIEN G. DOPPER, BRUNO GAUJAL AND JEAN-MARC VINCENT Abstract. In this aer, the duration of erfect simulations for Markovian finite

More information

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Asymptotically Optimal Simulation Allocation under Dependent Sampling Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee

More information

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi

More information

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict

More information

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino

More information

SIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING. Ruhul SARKER. Xin YAO

SIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING. Ruhul SARKER. Xin YAO Yugoslav Journal of Oerations Research 13 (003), Number, 45-59 SIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING Ruhul SARKER School of Comuter Science, The University of New South Wales, ADFA,

More information

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu

More information

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE)

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE) KAUST Reository Outage erformance of cognitive radio systems with Imroer Gaussian signaling Item tye Authors Erint version DOI Publisher Journal Rights Conference Paer Amin Osama; Abediseid Walid; Alouini

More information

Parallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720

Parallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720 Parallelism and Locality in Priority Queues A. Ranade S. Cheng E. Derit J. Jones S. Shih Comuter Science Division University of California Berkeley, CA 94720 Abstract We exlore two ways of incororating

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

On a Markov Game with Incomplete Information

On a Markov Game with Incomplete Information On a Markov Game with Incomlete Information Johannes Hörner, Dinah Rosenberg y, Eilon Solan z and Nicolas Vieille x{ January 24, 26 Abstract We consider an examle of a Markov game with lack of information

More information

Sampling and Distortion Tradeoffs for Bandlimited Periodic Signals

Sampling and Distortion Tradeoffs for Bandlimited Periodic Signals Samling and Distortion radeoffs for Bandlimited Periodic Signals Elaheh ohammadi and Farokh arvasti Advanced Communications Research Institute ACRI Deartment of Electrical Engineering Sharif University

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

Efficient Approximations for Call Admission Control Performance Evaluations in Multi-Service Networks

Efficient Approximations for Call Admission Control Performance Evaluations in Multi-Service Networks Efficient Aroximations for Call Admission Control Performance Evaluations in Multi-Service Networks Emre A. Yavuz, and Victor C. M. Leung Deartment of Electrical and Comuter Engineering The University

More information

Convexification of Generalized Network Flow Problem with Application to Power Systems

Convexification of Generalized Network Flow Problem with Application to Power Systems 1 Convexification of Generalized Network Flow Problem with Alication to Power Systems Somayeh Sojoudi and Javad Lavaei + Deartment of Comuting and Mathematical Sciences, California Institute of Technology

More information

The Value of Even Distribution for Temporal Resource Partitions

The Value of Even Distribution for Temporal Resource Partitions The Value of Even Distribution for Temoral Resource Partitions Yu Li, Albert M. K. Cheng Deartment of Comuter Science University of Houston Houston, TX, 7704, USA htt://www.cs.uh.edu Technical Reort Number

More information

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System Vol.7, No.7 (4),.37-38 htt://dx.doi.org/.457/ica.4.7.7.3 Robust Predictive Control of Inut Constraints and Interference Suression for Semi-Trailer System Zhao, Yang Electronic and Information Technology

More information

Finding a sparse vector in a subspace: linear sparsity using alternating directions

Finding a sparse vector in a subspace: linear sparsity using alternating directions IEEE TRANSACTION ON INFORMATION THEORY VOL XX NO XX 06 Finding a sarse vector in a subsace: linear sarsity using alternating directions Qing Qu Student Member IEEE Ju Sun Student Member IEEE and John Wright

More information

Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications

Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Bartłomiej Błaszczyszyn Paul Muhlethaler Nadjib Achir INRIA/ENS INRIA Rocquencourt INRIA Rocquencourt

More information

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

Research of PMU Optimal Placement in Power Systems

Research of PMU Optimal Placement in Power Systems Proceedings of the 5th WSEAS/IASME Int. Conf. on SYSTEMS THEORY and SCIENTIFIC COMPUTATION, Malta, Setember 15-17, 2005 (38-43) Research of PMU Otimal Placement in Power Systems TIAN-TIAN CAI, QIAN AI

More information

FAST AND EFFICIENT SIDE INFORMATION GENERATION IN DISTRIBUTED VIDEO CODING BY USING DENSE MOTION REPRESENTATIONS

FAST AND EFFICIENT SIDE INFORMATION GENERATION IN DISTRIBUTED VIDEO CODING BY USING DENSE MOTION REPRESENTATIONS 18th Euroean Signal Processing Conference (EUSIPCO-2010) Aalborg, Denmark, August 23-27, 2010 FAST AND EFFICIENT SIDE INFORMATION GENERATION IN DISTRIBUTED VIDEO CODING BY USING DENSE MOTION REPRESENTATIONS

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Modeling Residual-Geometric Flow Sampling

Modeling Residual-Geometric Flow Sampling Modeling Residual-Geometric Flow Samling Xiaoming Wang Amazon.com Seattle, WA 98101 USA Email: xmwang@gmail.com Xiaoyong Li Texas A&M University College Station, TX 77843 USA Email: xiaoyong@cse.tamu.edu

More information

Power Aware Wireless File Downloading: A Constrained Restless Bandit Approach

Power Aware Wireless File Downloading: A Constrained Restless Bandit Approach PROC. WIOP 204 Power Aware Wireless File Downloading: A Constrained Restless Bandit Aroach Xiaohan Wei and Michael J. Neely, Senior Member, IEEE Abstract his aer treats ower-aware throughut maximization

More information

Matching Partition a Linked List and Its Optimization

Matching Partition a Linked List and Its Optimization Matching Partition a Linked List and Its Otimization Yijie Han Deartment of Comuter Science University of Kentucky Lexington, KY 40506 ABSTRACT We show the curve O( n log i + log (i) n + log i) for the

More information

On the Chvatál-Complexity of Knapsack Problems

On the Chvatál-Complexity of Knapsack Problems R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew

More information

Detection Algorithm of Particle Contamination in Reticle Images with Continuous Wavelet Transform

Detection Algorithm of Particle Contamination in Reticle Images with Continuous Wavelet Transform Detection Algorithm of Particle Contamination in Reticle Images with Continuous Wavelet Transform Chaoquan Chen and Guoing Qiu School of Comuter Science and IT Jubilee Camus, University of Nottingham Nottingham

More information

Scaling Multiple Point Statistics for Non-Stationary Geostatistical Modeling

Scaling Multiple Point Statistics for Non-Stationary Geostatistical Modeling Scaling Multile Point Statistics or Non-Stationary Geostatistical Modeling Julián M. Ortiz, Steven Lyster and Clayton V. Deutsch Centre or Comutational Geostatistics Deartment o Civil & Environmental Engineering

More information

Minimax Design of Nonnegative Finite Impulse Response Filters

Minimax Design of Nonnegative Finite Impulse Response Filters Minimax Design of Nonnegative Finite Imulse Resonse Filters Xiaoing Lai, Anke Xue Institute of Information and Control Hangzhou Dianzi University Hangzhou, 3118 China e-mail: laix@hdu.edu.cn; akxue@hdu.edu.cn

More information

STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS. A Dissertation JAMES ROBERT FISHER

STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS. A Dissertation JAMES ROBERT FISHER STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS A Dissertation by JAMES ROBERT FISHER Submitted to the Office of Graduate Studies of Texas A&M University in artial fulfillment

More information

Probability Estimates for Multi-class Classification by Pairwise Coupling

Probability Estimates for Multi-class Classification by Pairwise Coupling Probability Estimates for Multi-class Classification by Pairwise Couling Ting-Fan Wu Chih-Jen Lin Deartment of Comuter Science National Taiwan University Taiei 06, Taiwan Ruby C. Weng Deartment of Statistics

More information

A Recursive Block Incomplete Factorization. Preconditioner for Adaptive Filtering Problem

A Recursive Block Incomplete Factorization. Preconditioner for Adaptive Filtering Problem Alied Mathematical Sciences, Vol. 7, 03, no. 63, 3-3 HIKARI Ltd, www.m-hiari.com A Recursive Bloc Incomlete Factorization Preconditioner for Adative Filtering Problem Shazia Javed School of Mathematical

More information

DETC2003/DAC AN EFFICIENT ALGORITHM FOR CONSTRUCTING OPTIMAL DESIGN OF COMPUTER EXPERIMENTS

DETC2003/DAC AN EFFICIENT ALGORITHM FOR CONSTRUCTING OPTIMAL DESIGN OF COMPUTER EXPERIMENTS Proceedings of DETC 03 ASME 003 Design Engineering Technical Conferences and Comuters and Information in Engineering Conference Chicago, Illinois USA, Setember -6, 003 DETC003/DAC-48760 AN EFFICIENT ALGORITHM

More information

Online homotopy algorithm for a generalization of the LASSO

Online homotopy algorithm for a generalization of the LASSO This article has been acceted for ublication in a future issue of this journal, but has not been fully edited. Content may change rior to final ublication. Online homotoy algorithm for a generalization

More information

Approximate Dynamic Programming for Dynamic Capacity Allocation with Multiple Priority Levels

Approximate Dynamic Programming for Dynamic Capacity Allocation with Multiple Priority Levels Aroximate Dynamic Programming for Dynamic Caacity Allocation with Multile Priority Levels Alexander Erdelyi School of Oerations Research and Information Engineering, Cornell University, Ithaca, NY 14853,

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

Chapter 7 Rational and Irrational Numbers

Chapter 7 Rational and Irrational Numbers Chater 7 Rational and Irrational Numbers In this chater we first review the real line model for numbers, as discussed in Chater 2 of seventh grade, by recalling how the integers and then the rational numbers

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

Optimal Learning Policies for the Newsvendor Problem with Censored Demand and Unobservable Lost Sales

Optimal Learning Policies for the Newsvendor Problem with Censored Demand and Unobservable Lost Sales Otimal Learning Policies for the Newsvendor Problem with Censored Demand and Unobservable Lost Sales Diana Negoescu Peter Frazier Warren Powell Abstract In this aer, we consider a version of the newsvendor

More information

A Closed-Form Solution to the Minimum V 2

A Closed-Form Solution to the Minimum V 2 Celestial Mechanics and Dynamical Astronomy manuscrit No. (will be inserted by the editor) Martín Avendaño Daniele Mortari A Closed-Form Solution to the Minimum V tot Lambert s Problem Received: Month

More information

Logistics Optimization Using Hybrid Metaheuristic Approach under Very Realistic Conditions

Logistics Optimization Using Hybrid Metaheuristic Approach under Very Realistic Conditions 17 th Euroean Symosium on Comuter Aided Process Engineering ESCAPE17 V. Plesu and P.S. Agachi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Logistics Otimization Using Hybrid Metaheuristic Aroach

More information

CONVOLVED SUBSAMPLING ESTIMATION WITH APPLICATIONS TO BLOCK BOOTSTRAP

CONVOLVED SUBSAMPLING ESTIMATION WITH APPLICATIONS TO BLOCK BOOTSTRAP Submitted to the Annals of Statistics arxiv: arxiv:1706.07237 CONVOLVED SUBSAMPLING ESTIMATION WITH APPLICATIONS TO BLOCK BOOTSTRAP By Johannes Tewes, Dimitris N. Politis and Daniel J. Nordman Ruhr-Universität

More information

1 Gambler s Ruin Problem

1 Gambler s Ruin Problem Coyright c 2017 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins

More information

General Linear Model Introduction, Classes of Linear models and Estimation

General Linear Model Introduction, Classes of Linear models and Estimation Stat 740 General Linear Model Introduction, Classes of Linear models and Estimation An aim of scientific enquiry: To describe or to discover relationshis among events (variables) in the controlled (laboratory)

More information

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation Paer C Exact Volume Balance Versus Exact Mass Balance in Comositional Reservoir Simulation Submitted to Comutational Geosciences, December 2005. Exact Volume Balance Versus Exact Mass Balance in Comositional

More information

arxiv: v1 [cs.lg] 31 Jul 2014

arxiv: v1 [cs.lg] 31 Jul 2014 Learning Nash Equilibria in Congestion Games Walid Krichene Benjamin Drighès Alexandre M. Bayen arxiv:408.007v [cs.lg] 3 Jul 204 Abstract We study the reeated congestion game, in which multile oulations

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S.

2-D Analysis for Iterative Learning Controller for Discrete-Time Systems With Variable Initial Conditions Yong FANG 1, and Tommy W. S. -D Analysis for Iterative Learning Controller for Discrete-ime Systems With Variable Initial Conditions Yong FANG, and ommy W. S. Chow Abstract In this aer, an iterative learning controller alying to linear

More information

Rotations in Curved Trajectories for Unconstrained Minimization

Rotations in Curved Trajectories for Unconstrained Minimization Rotations in Curved rajectories for Unconstrained Minimization Alberto J Jimenez Mathematics Deartment, California Polytechnic University, San Luis Obiso, CA, USA 9407 Abstract Curved rajectories Algorithm

More information

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is

More information

Algorithms for Air Traffic Flow Management under Stochastic Environments

Algorithms for Air Traffic Flow Management under Stochastic Environments Algorithms for Air Traffic Flow Management under Stochastic Environments Arnab Nilim and Laurent El Ghaoui Abstract A major ortion of the delay in the Air Traffic Management Systems (ATMS) in US arises

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

A New Perspective on Learning Linear Separators with Large L q L p Margins

A New Perspective on Learning Linear Separators with Large L q L p Margins A New Persective on Learning Linear Searators with Large L q L Margins Maria-Florina Balcan Georgia Institute of Technology Christoher Berlind Georgia Institute of Technology Abstract We give theoretical

More information

Universal Finite Memory Coding of Binary Sequences

Universal Finite Memory Coding of Binary Sequences Deartment of Electrical Engineering Systems Universal Finite Memory Coding of Binary Sequences Thesis submitted towards the degree of Master of Science in Electrical and Electronic Engineering in Tel-Aviv

More information