Flow Control for Cost-Efficient Peer-to-Peer Streaming

Size: px
Start display at page:

Download "Flow Control for Cost-Efficient Peer-to-Peer Streaming"

Transcription

1 This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 21 proceeings This paper was presente as part of the main Technical Program at IEEE INFOCOM 21. Flow Control for Cost-Efficient Peer-to-Peer Streaming Dan-Cristian Tomozei Thomson Paris Research Lab Laurent Massoulié Thomson Paris Research Lab Abstract In this paper we aress the issue of network cost efficiency for live streaming peer-to-peer systems. We formalize this as an optimization problem, which features a generic cost function. The latter is appropriate to capture not only ISPspecific link weights, but also non-linear, congestion-epenent costs. Our main contribution is the introuction of the Implicit- Primal-Dual scheme for flow control in live streaming peer-topeer systems. It is fully istribute in that it relies only on local state variable exchanges. Moreover, we show that at a flui scale, combine with ranom linear network coing, it amits the cost optimal operating point as a fixe point. We also prove asymptotic bouneness of flui trajectories for particular cost functions. We finally show via experiments that these optimality properties are resilient to operational constraints such as finite generation size an finite fiel size. I. INTRODUCTION Peer-to-peer systems for live streaming, such as TVAnts an Sopcast, have recently met consierable success. As testimony for this, PPLive, which enjoys over 1 million users, has obtaine in 28 a license from the Chinese government to broacast meia content. Despite this growth an evolution to mainstream usage (as oppose to unergroun, illegal usage), peer-to-peer systems have recently been facing strong criticisms from ISPs. Inee, such systems generate massive amounts of traffic on sensitive physical links, both in the access an in the core networks. One solution to the problem, use by ISPs, consists in throttling peer-to-peer traffic at such critical parts of the network, using harware eicate to this task. Another approach, uner iscussion at the P4P working group, consists in letting the ISPs provie information to the peer-to-peer system trackers about their network costs. The hope is that the peer-to-peer system will then be able to aapt its traffic flows to reuce congestion at hot spots within the network, without sacrificing user experience. This strategy is more appealing than the previous one, in that it coul lea to a win-win outcome for network operators an en users, rather than an arms race. It is however challenging to implement. Most prominently, it requires from the peer-to-peer system esign the ability to exploit information about the unerlying network costs an regulate ata flows accoringly between large numbers of peers. The scale of such systems clearly manates lightweight, istribute solutions. Our aim in the present paper is to propose such solutions. To aress the problem, we take the following approach. We first propose a formulation in terms of an optimization problem, featuring a cost function to be minimize, given some feasibility conitions relate to cut constraints. Inspire by a primal-ual algorithmic solution to this problem, we evelop our so-calle Implicit-Primal-Dual (IPD) control scheme. The latter is fully istribute, in that neighbor peers ajust their ata rates base only on local information exchanges. It relies on the use of specific quantities of backlogge information as implicit multipliers for the cut constraints at han. We then illustrate how it might fall short of achieving a global optimum through a flui scale analysis of a particular scheuling strategy for packet transmission among peers. This motivates its combination with Ranom Linear Network Coing instea of pure store an forwar for ata exchanges. Our main result is then a proof that uner such Ranom Linear Coing, IPD amits the global system optimum as a stationary point, in a flui regime. A byprouct is a moeling an flui level escription of networks uner Ranom Linear Coing. We complement this result by a proof of asymptotic stability when the cost function is of so-calle separable type. We finally provie experimental evience that IPD, combine with Ranom Linear Coing, inee achieves close to optimal performance even in non-flui regimes. In particular we show that performance is resilient to changes in parameters essential in network coing, namely generation an fiel size. The outline of the paper is as follows: In Section III we give the problem statement an introuce Implicit-Primal-Dual. In Section IV we analyze its performance when combine with the Ranom Useful (RU) packet selection strategy. In Section V we analyze IPD in combination with Ranom Linear Coing (RLC). We prove that over coe packet networks the global optimum is an equilibrium point for IPD. In Section VI we provie numerical results. We conclue in Section VII. II. RELATED WORK In [1] the authors wish to maximize a utility function in a similar setting to the one escribe in this paper. They present a solution involving packing a polynomial number of epth-1 an -2 Steiner trees for multisource multicast. The scalability of their approach is limite as it requires all peers to maintain ata exchanges with all other peers /1/$ IEEE

2 This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 21 proceeings This paper was presente as part of the main Technical Program at IEEE INFOCOM 21. In [2] the authors consier the slightly ifferent problem of multicast over coe wire an wireless networks with no require rate at the receivers. A message passing scheme is use to implement a maximum flow algorithm. The scalability of this approach is limite ue to the fact that messages relative to each receiver nee to be passe throughout the network. Thus the number of state variables to be maintaine at each noe scales linearly with the number of receivers. In [3], the authors propose the so-calle UESSM selfish routing algorithm in a similar setting to [2]. It is shown that UESSM converges to the min-cost flow allocation for a particular type of cost function. This approach has the same scalability limitations as [2]. To our knowlege, there have not been any propose scalable istribute algorithms achieving minimum cost multicast. III. EXPLICIT AND IMPLICIT PRIMAL-DUAL Consier a peer-to-peer network escribe by a graph G =({s} V, L) with an achievable capacity region C R L + (i.e. only rate allocations c Care feasible). The source s wishes to convey information (a stream of bytes) at a rate λ to the set of receivers V. We efine c ij as the rate at which information is transferre along ege (i, j) L.Also consier an increasing strictly convex ifferentiable function Γ( c) escribing the global cost incurre from transferring information on eges at rates given by c R L +.Wewish to minimize cost while still achieving a transfer rate of λ at each of the receivers in V. More formally, enote by T s = {{s} S : S V} the set of non-trivial cuts containing the source noe an by c(s, S) for S T s the transmission rate through cut S, namely i,j:i c Sj ij. The notation i S j signifies i S, j S an (i, j) L(i.e. cut S separates noe i from noe j or, equivalently, link (i, j) crosses cut S) an will be use frequently in the remainer of the paper. We state the following optimization problem which escribes our goal: minimize Γ( c) over c (1) subject to c(s, S) λ, S T s. (2) The cut constraint (2) is clearly necessary. It is also sufficient when network coing is allowe, in view of the founing result in network coing, ientifying feasible multicast rates with the min-min-cut [4]. In the present context where all noes are receivers, the feasible broacast rate is again given by the minmin-cut conition, as follows from Emons theorem [5]. We suppose the capacity constraints are inclue in the cost function. Thus, a further conition the cost function must satisfy is Γ( c) =+ for c / C. Denote the marginal cost of a link l by p l ( c) = Γ c l ( c). We will also refer to this marginal cost as the price of link l. For example take a network with R physical links an L overlay links. The unerlay routing can be expresse as a routing matrix H {, 1} R L,forwhich { 1 if overlay link l uses physical link r, H rl = otherwise. Denote by σ r ( c) =C r H r, c the spare capacity on link r. A possible choice of cost function is network congestion, i.e. setting link prices equal to the observe packet elay. Such prices can be moele as p l ( c) = 1 σ r ( c). (3) r:h rl =1 Furthermore, ISPs wishing to avoi overloaing sensitive links can efine physical link weights w r which increase aitively the price of an overlay link: p ISP l ( c) = r:h rl =1 ( w r + 1 ). σ r ( c) The corresponing global cost function writes as: Γ ISP ( c) = R w r H R r, c log σ r( c). C r r=1 r=1 Let us now characterize the optimum rates minimizing some generic Γ. For problem (1 2) the Lagrangian is: L( c, μ) =Γ( c)+ S T s μ S ( λ c(s, S) ), (4) where the {μ S } S Ts are Lagrange multipliers associate with the cut constraints (2). Taking the partial erivative with respect to c ij for some (i, j) L, we obtain that the optimum values ( c, μ ) satisfy p ij ( c )= μ S, (5) S:i Sj where the Lagrange multipliers μ S satisfy the KKT conitions: μ S, (6) μ S(λ c (S, S)) =. (7) We are intereste in solving this problem in a fully istribute fashion. A classic solution for solving constraine optimization problems is the Primal-Dual metho. This approach consists of letting the primal an ual variables evolve simultaneously towars the sale point of (4). Srikant [6] applies this metho to the fiel of optimal resource allocation an congestion control algorithms. In the case of our problem, the Primal-Dual algorithm takes the form of the following autonomous ifferential system: ċ ij (t) + μ S (t) p ij ( c(t)), (i, j) L (8) S:i Sj μ S (t) λ i Sj Above we use a convenient notation: c ij(t) c ij (t), S T s. (9) (a) + b = { a if b>, max{a, } if b =. Proofs of asymptotic stability an optimality of the Primal- Dual algorithm (8-9) can be foun in [6](pp ). Note that

3 This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 21 proceeings This paper was presente as part of the main Technical Program at IEEE INFOCOM 21. a violation of the constraint (2) for some cut S will inuce an increase in the associate quantity μ S by (9), which will in turn inuce an increase in the transmission rate through cut S by (8). This rate increase will continue until the sai cut constraint is satisfie. Despite the nice convergence an stability properties of this scheme, it is not easily implementable in practice. Since there exists an exponential number of ual variables, a irect implementation of the Primal-Dual algorithm woul require maintenance of an exponential number of state variables, which is prohibitive. In most peer-to-peer protocols ata is ivie into small pieces calle chunks. A chunk constitutes the basic ata transfer unit in such a network. For the rest of this paper we shall refer to such chunks as packets. Assume noe i has a set P i (t) of packets at time t. For all sets of noes S, enote by Z S (t) the number of packets which are foun at every noe in S an nowhere outsie of S at time t (i.e. the backlog at S). More formally, Z S (t) = i S P i(t) \ j S P j(t). Define X +i j (t) = P i (t)\p j (t). These quantities escribe the number of packets present at noe i an absent at noe j at time t. By elementary methos it can be shown that X +i j (t) = Z S (t). (1) S:i Sj We notice a strong similarity between (1) an the contribution S:i Sj μ S(t) of the ual variables to the rate aaptation rule (8) in the Primal-Dual algorithm. Furthermore, the X +i j can be compute locally to link (i, j) without specific knowlege of quantities Z S. This observation makes the backlog sizes Z S excellent caniates for approximating the ual variables μ S an eliminates the nee for transferring exponentially many control messages for computing upate rate values. Furthermore, backlog sizes evolve implicitly an their specific evolution epens on the employe packet scheuling strategy. We o not nee to keep track of them in an explicit fashion. Motivate by the previous remarks, we propose Implicit- Primal-Dual (IPD), a istribute rate control algorithm, for which we use a continuous rate aaptation metho, the Implicit-Primal rule (as oppose to the Explicit-Primal (8)): ċ ij (t) =κ [αx +i j (t) p ij ( c(t))] + c ij(t), (11) for all (i, j) L.Hereκ is a gain factor an α is a conversion factor (it can be consiere as price per useful packet). Further intuition behin this rule is as follows: the more a noe i has to offer to its neighbor j, the more it will increase the rate c ij ; at the same time, the higher the price of the link, the lower the rate c ij will become. As we previously stresse, the Implicit-Dual equations escribe the backlog size evolution an follow implicitly from the packet transfer strategy. In the next Sections we consier a classic packet forwaring network implementing the Ranom Useful (RU) scheme an a coe packet network implementing Ranom Linear Coing (RLC). We use a flui scaling of the system to euce the governing Implicit Dual rule for both cases. We fin that IPD eviates from the optimum operation point uner RU ue to reunant transmissions over congeste links. We show that RLC solves this problem an that the global optimum is a stationary point for IPD in this setting. IV. A FIRST APPROACH Consier the case in which the source generates a sequence of packets it wishes to eliver to the receivers in V at rate λ. We use the notations P i,z S,X +i j introuce in the previous Section III. Noes are assume to have the knowlege of which packets are present at their one-hop neighbors. Consier the following transmission strategy: For each link (i, j) L, with rate c ij (t) noe i picks a packet uniformly at ranom from the set P i (t) \ P j (t) of packets useful for j an sens it along the link. Such a transmission occurs if an only if X +i j (t) = P i (t) \ P j (t) >. This strategy is calle the Ranom Useful strategy. In [7] the authors prove that Ranom Useful (RU) is rate-optimal for a fixe rate allocation c. That is, when using RU if the value of the min-min-cut of the egecapacitate graph (G, c ) with source noe s is greater than λ, then rate λ is attaine at each receiver. Starting from this rate optimal strategy, we wish to characterize the behavior of the propose IPD rate control scheme (11). We moel the system as follows: We assume for simplicity that packets are generate at the source at instants of a Poisson process of rate λ. We also assume that packet transfers on links l Lare triggere at instants of Poisson processes of timevarying rates c l (t). The process pair ((c l (t)) l L, (Z S (t)) S Ts ) is jointly Markovian with a continuous an a iscrete component. Packet generation at the source increments Z {s} (at rate λ). Along any ege (i, j) Lthere are X +i j packets available for transfer from noe i to noe j. From (1) it follows that for every packet selecte for transfer along ege (i, j) (accoring to the RU strategy) there exists a unique set S T s with i S j, such that the selecte packet belongs to the backlog at S. Such a packet transfer will ecrement the corresponing Z S an increment Z S j simultaneously, an Z will occur with probability S X +i j. Moreover, since the process ictating transfers is Poisson with rate c ij, the simultaneous Z S X +i j, upates for Z S an Z S j will be performe at rate c ij provie that X +i j >. In what follows we escribe the behavior of the system at a flui time scale. Base on this scaling, we show on an example that IPD is suboptimal. We analyze the reason for which IPD eviates from the optimum point an we propose a coing-base approach. A. Flui Limits We examine a scaling of (11) for which both α an κ are small. Consier the sequence of processes (c N,Z N ) N = ((c N l (t)) l L, (ZS N (t)) S T s ) N evolving accoring to ynamics introuce above, such that the N th process follows IPD rule (11) with α = 1 N an κ = g N, for some positive constant gain g. Assume initial conitions (c N (),Z N ()) N such that lim N cn l () = c l, lim N 1 N ZN S () = z S.

4 This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 21 proceeings This paper was presente as part of the main Technical Program at IEEE INFOCOM 21. s y {s} r 1 y {s,n2} l 1 l 2 y {s,n1} l 3 n 1 r 2 r 3 l 4 Fig. 1: A counterexample illustrating the suboptimality of the Ranom Useful scheme. We efine S(c, y), for c R L + an y R Ts +, the set of flui trajectories with initial conitions c l () = c l an y S () = y S := T S z T as absolutely continuous functions c l,y S : R + R +, such that: t c ij(t) = g [y +i j (t) p ij ( c(t))], (12) t y {s}(t) = λ c sj (t) y {s}(t) y +s j (t), j s (13) t y S(t) = λ c ij (t) y S(t) y S i (t), (14) y +i j (t) i,j:i Sj almost everywhere, for all links (i, j) L an all cuts S T s \{s}, where y +i j (t) :=y {j} (t) y {i,j} (t). Introuce the rescale processes ĉ N (t) = c N (Nt) an YS N(t) = T S ZN T (Nt) N for all cuts S T s. Similarly to [7] it can be shown that the processes (ĉ N,Y N ) N converge in probability for the topology of uniform convergence on finite intervals to the set of flui trajectories S(c, y) as N. B. Suboptimality Let us show that, in the case of Ranom Useful, the global optimum is not always a fixe point of IPD. We present a simple counterexample. Take the network in Figure 1 an consier the following cost function: Γ( c) = log(λ+2ɛ c s1 c s2 ) log(λ c 12 ) log(λ c 21 ). This means that we suppose a maximum rate of λ +2ɛ on physical link r 1 an a maximum rate of λ on physical links r 2 an r 3. Assume ɛ< λ 4. Computing the optimum yiels n 2 c s1 = c s2 = c 12 = c 21 = λ 2, μ s1 = μ s2 = 2 λ,μ s = 1 2ɛ 2 λ. We search a symmetrical equilibrium point of IPD such that c s1 = c s2 = δ an c 12 = c 21 = λ δ, where <δ<λ. Shoul an equilibrium point be asymmetrical, clearly it woul eviate from the symmetrical optimal point. Then (13 12) give the following equations (an their symmetric versions which we o not write here) from which we wish to etermine δ at the equilibrium: ċ s1 = 1 y s2, λ +2ɛ c s1 c s2 ċ 12 = 1 y s1 y s, λ c 12 ẏ s = λ c s1 y s y s2 c s2 y s y s1, y s1 y s1 y s ẏ s1 = λ c s2 c 12. y s1 y s1 y s We obtain that δ = λ 2 + 2ɛ 3. We have shown that the IPD scheme is suboptimal when Ranom Useful is use for the topology in Figure 1. The intuition behin suboptimal performance on this simple topology is as follows: The source will always sen useful packets to both n 1 an n 2. However it oes not perform any coorination on which packets it sens to one or the other. Thus packet sets at n 1 an at n 2 are not as ifferent as they coul be. This causes a lower number of transmission opportunities for links l 3 an l 4. In turn, this causes an increase in traffic on the congeste physical link r 1 an in global cost an thus a eviation from the global optimum. In the next section we solve this problem by using Ranom Linear Network Coing. While we o not characterize formally the eviation from the global optimum, we observe by numerical evaluation provie in Section VI that IPD has reasonably goo performance in the RU setting. As we previously stresse, it has a major avantage over a Primal-Dual scheme: its implementation only requires aing the local rate control rule to an alreay implemente Ranom Useful live streaming protocol. V. IPD WITH RANDOM LINEAR CODING We now consier the combination of IPD with ata transfers base on Ranom Linear Coing (RLC) [4] rather than RU packet forwaring. We first escribe the system mechanisms an a corresponing stochastic moel. We then characterize flui limits for this moel. Finally, we establish that for general convex cost functions, the optimal operating point is a stationary point of these flui limits. We further show stability of these limits in the case of separable convex cost functions. A. System Mechanisms an Moel As in the previous section, the source generates packets, which we call native packets. However it sens out linear combinations of the native packets it has generate so far, rather than native packets. Receiver noes accumulate linearly inepenent combinations of native packets. An incoming packet is kept only when it is eeme innovative, that is when it is linearly inepenent of those previously receive. At each noe, packets sent are linear combinations of the innovative packets available at this particular noe. Noes are able to ecoe a given set of K native packets as soon as they have receive K linear combinations of these packets that are linearly inepenent.

5 This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 21 proceeings This paper was presente as part of the main Technical Program at IEEE INFOCOM 21. Implementations of network coing for live-streaming rely on the so-calle generation approach. There the stream is ivie into generations of K consecutive native packets. Encoing an recoing operations are performe only among packets relative to the same generation. Users are then able to play content within a generation as soon as they have receive K linearly inepenent combinations of packets within this generation. This approach has also been consiere for Vieoon-Deman applications in [8]. In the sequel we ignore the impact of finite generations, an assume instea that each packet transmitte is a ranom linear combination of all innovative packets previously receive by the sening noe. This assumption is mae for the sake of analysis, as it greatly simplifies moeling of the system. The impact of finite generations on performance will be assesse experimentally in Section VI. We also assume that the linear coefficients use in the construction of an encoe packet are taken uniformly at ranom in the finite fiel F over which linear operations are performe. Let us now introuce some notation. The i th native packet is associate with the i th unit vector in F N. Any ata packet is associate with the vector of coefficients in F N characterizing its combination in terms of native packets. For any user i, we enote by V i the subspace of F N spanne by the packets it owns. Note that the vector space V i evolves with time as new packets reach noe i. For any set S of noes, we shall also enote by V S the vector space spanne by the packets owne by all noes in S: V S = i S V i. (15) We further efine the quantity X S as the number of innovative packets that noes in S coul provie to noes in S, that can be written as X S =im(v s ) im(v S ). (16) Inee, the valiity of this expression can be reaily checke by remarking that V S V s for all sets S, an V S = V s when s S. Finally, we let X +i j enote the number of innovative packets that i coul sen to j, which can be written as X +i j := im(v i + V j ) im(v j )=X {j} X {i,j}. (17) In the present context, the Implicit-Primal-Dual aaptation rule of the transmission rates c ij is again efine by (11), base on the above efinition (17) of X +i j. To complete our formal moel, we make the following statistical assumptions. Native packets are create at the source s at the instants of a Poisson process with rate λ>. For each link (i, j) L, packets are transmitte from i to j at the instants of a Poisson process with time-varying rate c ij. Such packets correspon to a uniform ranom linear combination of the innovative packets receive by noe i at the time of the transition. Thus at rate λ, the vector space V s increases its imension by 1, an hence quantities X S simultaneously increase by 1 for all S T s. Also, at rate c ij,forsetss T s with i S, j/ S, quantities X S ecrease by 1 provie the ranom linear combination forme at i oes not belong to V S. With the above assumptions, the pair of processes ((c l (t)) l L, (V i (t)) i {s} V ) is jointly Markovian, with both a continuous an a iscrete component. Note that a uniform ranom selection of a vector in V i will belong to V S with probability r(s i, S) := V i V S V i = ( ) XS X 1 S i. (18) F The probability that such a transmission leas to a ecrease in X S thus reas 1 r(s i, S). It shoul be note that for two istinct sets S, T both containing i an not containing j, the occurrences of increase in X S an X T are not inepenent, their joint probability epening in an intricate fashion on the sizes of the spaces V i, V S, V T an of their intersections. These correlations will however not play any role in the behavior of the system in the flui limit, which we now characterize. B. System Dynamics in the Flui Limit We shall again consier the system in the limit where both the scale parameter α an the gain parameter κ appearing in (11) are small. The limiting ynamics will be relate to the flui trajectories that we now efine: Definition 1: The functions c ij,v S : R + R +, for (i, j) L, S T s are calle flui trajectories of the RLC streaming system if they are absolutely continuous, an amit the following erivatives almost everywhere: t c ij(t)=g [v +i j (t) p ij ( c(t))], (i, j) L, (19) λ i S,j S c ij(t)+ t v i S,j S c ij(t)a S i,s (t), S T s \{s}, S(t)= λ (2) j s c sj(t)+ j s c sj(t)a s (t), S = {s}, where g is some positive gain, v +i j (t) :=v {j} (t) v {i,j} (t), an the functions a S i,s (t),a s (t) verify a S i,s (t),a s (t), a S i,s (t)[v S (t) v S i (t)], a s v {s} (t) =. (21) In aition, the non-negative functions v S are require to verify S T v S v T, S, T T s, (22) as well as the supermoularity conition: v S + v T v S T + v S T, S, T T s. (23) For any c R L + an v R Ts +, we shall further enote by S(c, v) the set of all such flui trajectories with initial conitions c() = c, v() = v.

6 This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 21 proceeings This paper was presente as part of the main Technical Program at IEEE INFOCOM 21. We then have the following: Theorem 1: Consier a sequence of processes (c N,V N ) each with the previous ynamics, where the N th process follows IPD rate aaptation rule (11) with scale parameter α =1/N an gain parameter κ = g/n. Denoting by XS N (t) the corresponing process (efine via (16)), assume that the initial conitions amit limits lim N cn l () = c l, lim N 1 N XN S () = v S for all l Lan S T s. Then the rescale processes ĉ N l (t) = c N l (Nt), l L, Y N S (t) := 1 N XN S (Nt), S T s, converge in probability, for the topology of uniform convergence on finite intervals, as N, to the set of flui trajectories S(c, v). We now provie the key steps of the proofs, the etails being omitte for brevity. Proof: Fix some S T s. One can construct the process YS N from unit rate Poisson processes P, P S,ij, i S, j S such that YS N (t) =YS N ()+ 1 N P (λnt) 1 P S,ij (Nf N N S,ij(t)), i S,j S ( ) where fs,ij N (t) := t ĉn ij (u) 1 F N(Y N S (u) Y N S i (u)) u. The uniform law of large numbers for Poisson processes enables to rewrite the previous equation as YS N (t) =YS N () + λt fs,ij(t)+ɛ N N S (t), (24) i S,j S where the error term ɛ N S (t) goes to zero with N uniformly in t on any finite interval [,T]. Using bouneness of capacities c ij suffices to establish that the sequence of processes (YS N ) is tight for the topology of uniform convergence on any finite interval [,T] (etaile arguments woul parallel closely those in [7], pp.7-1). Moreover, for any (i, j) L, it hols that ĉ N ij (t) =ĉ N ij () + t [ g v+i j(u) N p ij ( ] ĉ N (u)) u, (25) where v+i j N N (u) :=Y (u). Equation (25) together {j} {i,j} with continuity of p ij entails that the sequence of processes ĉ N is also tight. The limiting process v S of YS N verifies (22) as well as the supermoularity conition (23) by efinition (16). The latter follows from the fact that the inequality im(v S T ) im(v S V T ) hols for any S, T T s. Finally, by Equations (24 25), for any subsequence along which all processes ĉ N,Y N converge, the limiting process v S must further verify t v S (t) =v S + λt ĉ ij (u)(1 a S i,s (u))u, i S,j S where the process a S i,s must satisfy (21), as a limit of process u (1/ F ) N(Y N S (u) Y N S i (u)). Taking limits in Equation (25), expression (19) for the erivative of the limiting process of rates c ij irectly follows. C. Stationarity of the Optimal State for IPD with RLC We now establish that an optimal operating point is a fixe point of the flui trajectories (2 21). To state the result, we will use the following notation. We let (c ij, (i, j) L,μ S,S T s) enote optimal primal an ual variables of the optimization problem (1 2). We also let v S := T S μ T,S T s. (26) We then have the following: Theorem 2: Any flui trajectory (c, v) satisfying conitions (2 21) an with initial conitions c() = c an v() = v is stationary, in that: t c l() =, l L, t v (27) S() =, S T s. Before we turn to its proof, let us comment on the meaning of the result. It inicates that the IPD with RLC system, when initialize with contents at noes such that the corresponing quantities X S as efine by (16) are close to α 1 vs, an with capacities c ij close to the optimal values c ij, will not eviate from this optimal operating point, at which network cost is minimal. We believe that a stronger result hols, namely that from any initial conitions, the ynamics of IPD with RLC (at the flui level) converge to this optimal operating point. While a proof of this conjecture is currently missing, we provie a stability result in the next subsection, an experimental evience in Section VI, which support the conjecture. We now provie auxiliary results neee to establish Theorem 2. Lemma 1: Let τ be a tree roote at s, spanning all noes in V. LetA 1, A 2 be two cuts in T s that satisfy the following criticality property: there is a unique ege of τ that crosses from A i to A i, i =1, 2. Then the cut A 1 A 2 is also critical, provie its complementary set A 1 A 2 is non-empty. The proof of this Lemma is available in the companion technical report [9]. Corollary 1: Consier capacities (c l,l L) that are sufficient for streaming at rate λ, i.e. conition (2) hols. Assume further that they are minimal, in the sense that if there exist capacities c l that are also sufficient for streaming at rate λ, an that verify c l c l, l L, then necessarily c l c l. Given any two cuts A 1, A 2 T s that are c-critical, i.e. inequality (2) hols with equality, then their union A 1 A 2 is c-critical whenever A 1 A 2 is non empty. Proof: Emons s theorem [5] establishes the following result. The capacities (c l,l L) are sufficient for streaming at rate λ if an only if there exists a collection of spanning trees τ, an associate capacities λ τ >, such that these trees can be packe into link capacities c l, i.e. c l τ λ τ 1 {l τ},l L. (28)

7 This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 21 proceeings This paper was presente as part of the main Technical Program at IEEE INFOCOM 21. It is then easy to see that the capacities c l are both sufficient an minimal if inequalities (28) hol with equality. Let A 1, A 2 be critical cuts in T s such that A 1 A 2 is nonempty. For any tree τ with λ τ >, criticality of A i entails that there is a single ege of τ crossing from A i to A i,fori =1, 2. Therefore, in view of Lemma 1, there is also a single ege of τ crossing from A 1 A 2 into its complement. Since this hols for all spanning trees τ with λ τ >, it easily follows that A 1 A 2 is also critical. The ingreients for the proof of Theorem 2 are now in place. Proof: (of Theorem 2). Consier first the erivative of c ij. In view of (19) an of the choice of initial conitions (26) an c() = c, it reas t c ij() = g [ v+i j p ij ( c ) ]. However, v+i j coincies with S:i S,j / S μ S. Thus the optimality of ( c, μ ) implies that the above time erivative equals zero. Consier now the erivative of v S. Let us first consier the case where the associate multiplier μ S is strictly positive. Then, by the complementary slackness conition (7), necessarily c (S, S) =λ. In aition, for all i S, vs v S i μ S >. Thus, the corresponing term a S i,s in Equation (2) is necessarily zero, in view of (21). This establishes that the time erivative of v S is inee zero. We then consier the case where the multiplier μ S equals zero. We shall procee by inuction on the size S of S T s to show that the time erivative of v S must be zero. To start the inuction, consier first the smallest cut in T s, that is S = {s}. Assume that μ {s} =(the other case being alreay treate). The erivative of v {s} is necessarily non-negative, for otherwise, with initial conition v {s} () =, process v {s} woul take on negative values, which contraicts the properties of the flui limits. It cannot be strictly positive, for otherwise, for small enough t>, one woul have v {s} (t) >, an hence a s (t) =in (21), in which case this erivative woul rea, for small enough t, t v {s}(t) =λ c sj (t) =λ c sj + o(t) o(t), j s j s a contraiction with the assumption that this erivative is positive at t =. Consier now S T s \{s}. The inuction hypothesis is that for all T S, T S, t v T () =. Distinguish two cases. First assume that i S, v S v S i >. (29) Thus necessarily, the terms a S i,s must be zero, for all i S. In aition, (29) entails that for all i S, there exists a subset T i S such that i T i an μ T i >. In turn, this implies that each such cut T i must be c -critical, in the sense of Corollary 1. Thus, applying inuctively the result of the corollary, it follows that i S T i is also c -critical. However, since i T i, the set i S T i coincies with S, which is then c -critical. Combine with the fact that a S i,s =,this implies the esire result that t v S() =. The last case to consier is when for some i S, Conition (29) is violate, that is vs i = v S. By the inuction hypothesis, for all such i, v S i (t) =vs i + o(t). Thus the erivative of v S at zero cannot be negative, for otherwise it woul violate inequality (22): v S v S i. Assume then that it is positive. It then follows by the inuction hypothesis that, for small enough t, a S i,s (t) must be zero for all i S. Thus the erivative of v S (t) for small t reas λ c ij (t) =λ c (S, S)+o(t) o(t), i S,j / S a contraiction with the assumption that t v S() is positive. D. Stability of IPD-RLC for Separable Costs So far we establishe that at the flui scale, IPD-RLC oes not eviate from the optimal operating point once it has reache it. This begs the question of whether it is attracte to this optimal operating point, from arbitrary initial configurations. Lacking an answer at this stage, we consier instea the weaker property of convergence to a boune set containing the optimal state. We establish that this inee hols, for specific separable cost functions. For this result we consier a ifferent scaling than the one we presente in Subsection V-B. We suppose that the X(t) vary slowly an that the rates c ij (t) are compute on a more rapi time scale. This woul correspon to the flui trajectories obtaine in the limit of small scale parameters α, but with fixe, non-vanishing gain parameters κ in (11). We thus consier flui trajectories as in Definition 1, with the exception that Equation (19) is replace by the conition [v +i j (t) p ij ( c(t))] + c ij(t) =, (i, j) L. (3) Furthermore, we assume that the cost function is separable, i.e. it can be explicitly written as Γ( c) = l L Γ l (c l ), where the iniviual cost functions Γ l are assume convex an ifferentiable in the omain [, c l ), with c l >, where they are finite. With such separable costs, the above conition (3) simplifies to c ij (t) = ( Γ ij) 1 (v+i j (t)). (31) We finally assume that streaming is feasible at rate λ + ɛ for some positive ɛ, which in the present context is equivalent to the following property: There exist capacities ĉ ij, (i, j) Lfor which streaming at rate λ + ɛ is feasible, an a positive value v min > such that l L, v v min (Γ l) 1 (v) ĉ l. (32) We are now in a position to establish the following

8 This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 21 proceeings This paper was presente as part of the main Technical Program at IEEE INFOCOM 21. s r 1 l 1 l 2 n 1 n 2 r 2 l 3 l 4 n 3 n 4 l 5 Fig. 2: A network with share physical links. Theorem 3: Consier separable cost functions as above. Then any flui trajectories with fast rate aaptation as escribe by (31) are asymptotically boune, i.e. there exists a constant A > such that the quantities v S (t) verify lim sup t v S (t) A. Before proving the Theorem, we nee the following Lemma 2: Let r (, 1) an v R Ts + such that the supermoularity property (23) is verifie. Denoting v +i j = v {j} v {i,j}, then for all S T s,alli S, j S, the following inequality hols: v +i j <rv S (1 r) S 1 v S i > (1 r) S v S. (33) Proof: Note that by efinition of v +i j an by writing (23) for cuts S an {i, j}, one has v S v S i + v +i j. Using the assumption v +i j < rv S,itfollowsthatv S < v S i + rv S, an the conclusion easily follows. Proof: (of Theorem 3). Fix some r (, 1). Consier the following Lyapunov function: L(v) = sup(1 r) S v S. S T s If we enote by S the cut in T s achieving the maximum in the efinition of L at a certain point in time, then for all i S, j/ S,wehavev +i j rv S. Inee, if this i not hol, by Lemma 2 the cut S = S i woul satisfy (1 r) S v S > (1 r) S v S, a contraiction of S s maximality. Moreover, for all i S, necessarily v S (1 r) 1 v S i >v S i, since r<1. Thus the quantities a S i,s in the erivative (2) are zero. Finally, whenever rv S is larger than v min, necessarily v +i j v min, an thus by the stability assumption (32), it follows that t v S λ i S,j / S ĉ ij ɛ. We have thus establishe that L(v) strictly ecreases whenever rv S v min. A fortiori, it ecreases whenever L(v) r 1 v min. It therefore follows that asymptotically, L(v) must be below r 1 v min. Thus for each S T s, one has lim sup t (1 r) S v S (t) r 1 v min, an the result of the Theorem follows by taking the constant A equal to r 1 (1 r) V v min. VI. NUMERICAL EVALUATIONS In this section we present numerical evaluations for IPD an we escribe the influence of various implementation parameters on the algorithm s performance. For our simulations we consier the network epicte in Figure 2. For this network share physical links r 1,r 2 an r 3 have a maximum physical rate of 11. The source s generates content at rate λ = 5. We wish to minimize congestion. We use r 3 a cost function which sets overlay link prices to the sum of quantities inversely proportional to the spare capacities on the physical links use. This price function (3) has been iscusse in Section III. The optimal rate allocation in this case is c s1 = c s2 = c 24 = c 43 =5 an c 13 =. Noe 3 can receive all of its content from noe 4. Any other strategy woul have a higher global cost, ue to the strict convexity of the cost function. Intuitively, instea of imposing a high loa on physical link r 2, it is globally better to make use of the free resource r 3. We test IPD uner the following scenarios: a) Iealize Coing: We simulate explicitly the evolution of quantities X S (t) escribe in Section V. These simulations are a best case scenario for the achievable performance of Ranom Linear Coing. The simulation is feasible, since there are only =16variables associate with the backlogs. It is an iealize case in the sense that we use an infinite coing fiel size. Thus the only limitation is the content bottleneck (i.e. for every link (i, j) such that X +i j > an every S T s such that i S j, we consier r(s, S i) =1 {XS=X S i} instea of (18) from Section V). Furthermore, noes nee to receive all the ata from the estination to be able to ecoe the content (an start playing it). b) Generation Coing: We use a iscrete packet-level simulator for which we implement Ranom Linear Coing using generations of a fixe size K. In this setting noes nee to receive K linearly inepenent combinations within a generation to be able to ecoe it an start playing. For all links (i, j), noes i select a useful generation for j at ranom, compute a ranom linear combination within this generation an then forwar it to noe j. This is a realistic setting. We consier several generation sizes, as well as two finite fiels: F 2 an F 2 8 for evaluating the performance of our scheme. c) Ranom Useful: Finally, we implement Ranom Useful in our packet-level simulator. In our simulations receivers become active at t = 3 time units. By this time, the source generates about 15 packets, a elay from which the receivers will want to recover. We simulate several scenarios with three generation sizes an two finite fiels use. Define the Relative Mean Error (RME) of an execution as the relative error of the mean global cost observe γ with respect to the optimal value γ, namely γ γ γ. In Figure 3 we consier the Iealize Coing case for two values of α (we use κ =.6). We plot the receiver elays with respect to the source (X +s j ) an the rates at which overlay links are being use for the two cases. The curve converging to the lowest value correspons to noe n 3 for the elay plots an to link l 3 =(1, 3) for the rate plots. The cost function we are consiering is not separable (as it was assume in the proof of Theorem 3). Nevertheless, we notice that our system stabilizes after roughly 5, time units. This observation reinforces our conjecture that IPD is stable for more general cost functions. Furthermore, we observe that the instance using a lower α is closer to the optimum in two ways: First, link l 3 is less utilize than in the case of the instance

9 This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 21 proceeings This paper was presente as part of the main Technical Program at IEEE INFOCOM Delay 2 Delay 15 noe 3 15 noe Reception rates 8 Reception rates link 3 link link 3 link (a) α =1/1, relative mean error = % (b) α =1/6, relative mean error =.5295% Fig. 3: Influence of α elay of noe n 3 an rate usage of links l 3 =(1, 3) an l 5 =(4, 3) are inicate. using a higher α. Secon, the relative error is almost 1 times smaller in this case. However, the price we pay for approaching the optimum is a ifference in elays at receiver noes of almost an orer of magnitue between the two instances. Since in a real implementation low elays are esirable, for the next part of this Section we choose the higher value of α =.1. Let us now observe performance of the Generation Coing scheme versus the Ranom Useful scheme. As previously state, we use α =.1 an κ =.6 in (11). In Table I we Scheme Fiel size Generation size RME Iealize Coing 5.95% Generation Coing % % % % % % Ranom Useful 12.94% TABLE I: Relative Mean Error give the Relative Mean Error of an execution instance for each of the cases, for a time span of 2, time units. We notice that in this setting, when ruling out the Iealize Coing case, the best performance is obtaine by performing coing over F 2 8. The generation size parameter has the anticipate impact on performance: the higher the generation size, the closer we are to the optimum. It is surprising that IPD in a Ranom Useful setting, while proven suboptimal in Section IV, gives similar performance to IPD in a Generation Coing setting for F 2 8 an outperforms it when the fiel size is equal to 2. Inee, while for F 2 8 virtually all transfers are linearly inepenent combinations, for F 2 the number of transfere linearly epenent combinations becomes non-negligible. VII. CONCLUSION In this paper we propose a fully istribute cost-efficient rate control scheme for live streaming peer-to-peer systems. We formulate our goal as an optimization problem having a convex cost function. Using the backlog sizes as approximations for the ual variables we introuce Implicit-Primal- Dual, our rate control scheme. We manage to show the avantage of using Network Coing over a classic Ranom Useful approach. Namely, while the two have the same feasible capacity region in the consiere setting, we prove that for Ranom Linear Coing IPD has a fixe point at the global optimum while this oes not hol in the Ranom Useful setting. Our numerical evaluations showe that IPD still performs reasonably well for Ranom Useful packet networks. REFERENCES [1] Minghua Chen, Miroslav Ponec, Suipta Sengupta, Jin Li, an Philip A. Chou. Utility maximization in peer-to-peer systems. In SIGMETRICS 8: Proceeings of the 28 ACM SIGMETRICS international conference on Measurement an moeling of computer systems, pages , New York, NY, USA, 28. ACM. [2] Desmon S. Lun, Niranjan Ratnakar, Muriel Méar, Ralf Koetter, Davi R. Karger, Tracey Ho, Eba Ahme, an Fang Zhao. Minimumcost multicast over coe packet networks. IEEE/ACM Trans. Netw., 14(SI): , 26. [3] S. Bhara, S. Shakkottai, an P. Gupta. Min-cost selfish multicast with network coing. Information Theory, IEEE Transactions on, 52(11): , 26. [4] Raymon W. Yeung, Shuo-Yen Robert Li, Ning Cai, an Zhen Zhang. Network coing theory: single sources. Commun. Inf. Theory, 2(4): , 25. [5] Jack Emons. Ege-isjoint branchings. R. Rustin (E.), Combinatorial Algorithms, Algorithmics press, pages 21 31, [6] Rayaurgam Srikant. The Mathematics of Internet Congestion Control (Systems an Control: Founations an Applications). SpringerVerlag, 24. [7] Laurent Massoulié an Anrew Twigg. Rate-optimal schemes for peerto-peer live streaming. Perform. Eval., 65(11-12):84 822, 28. [8] Sihartha Annapurey, Saikat Guha, Christos Gkantsiis, Dinan Gunawarena, an Pablo Roriguez. Exploring VoD in P2P Swarming Systems. In Proceeings of the 26th Annual IEEE Conference on Computer Communications Mini Symposiums (INFOCOM 7 Mini Symposium), Anchorage, Alaska, May 27. [9] Dan-Cristian Tomozei an Laurent Massoulié. Flow control for cost efficient peer-to-peer streaming. Technical report, Thomson, 29. Available as antom/pub/nc-rate.pf.

Rate-optimal schemes for Peer-to-Peer live streaming

Rate-optimal schemes for Peer-to-Peer live streaming Rate-optimal schemes for Peer-to-Peer live streaming Laurent Massoulié an Any Twigg Thomson, Corporate Research Abstract In this paper we consier the problem of sening ata in real time from information

More information

Introduction to the Vlasov-Poisson system

Introduction to the Vlasov-Poisson system Introuction to the Vlasov-Poisson system Simone Calogero 1 The Vlasov equation Consier a particle with mass m > 0. Let x(t) R 3 enote the position of the particle at time t R an v(t) = ẋ(t) = x(t)/t its

More information

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5

More information

On Characterizing the Delay-Performance of Wireless Scheduling Algorithms

On Characterizing the Delay-Performance of Wireless Scheduling Algorithms On Characterizing the Delay-Performance of Wireless Scheuling Algorithms Xiaojun Lin Center for Wireless Systems an Applications School of Electrical an Computer Engineering, Purue University West Lafayette,

More information

Slide10 Haykin Chapter 14: Neurodynamics (3rd Ed. Chapter 13)

Slide10 Haykin Chapter 14: Neurodynamics (3rd Ed. Chapter 13) Slie10 Haykin Chapter 14: Neuroynamics (3r E. Chapter 13) CPSC 636-600 Instructor: Yoonsuck Choe Spring 2012 Neural Networks with Temporal Behavior Inclusion of feeback gives temporal characteristics to

More information

Math 342 Partial Differential Equations «Viktor Grigoryan

Math 342 Partial Differential Equations «Viktor Grigoryan Math 342 Partial Differential Equations «Viktor Grigoryan 6 Wave equation: solution In this lecture we will solve the wave equation on the entire real line x R. This correspons to a string of infinite

More information

Lyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering,

Lyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering, On the Queue-Overflow Probability of Wireless Systems : A New Approach Combining Large Deviations with Lyapunov Functions V. J. Venkataramanan an Xiaojun Lin Center for Wireless Systems an Applications

More information

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors

Math Notes on differentials, the Chain Rule, gradients, directional derivative, and normal vectors Math 18.02 Notes on ifferentials, the Chain Rule, graients, irectional erivative, an normal vectors Tangent plane an linear approximation We efine the partial erivatives of f( xy, ) as follows: f f( x+

More information

6 General properties of an autonomous system of two first order ODE

6 General properties of an autonomous system of two first order ODE 6 General properties of an autonomous system of two first orer ODE Here we embark on stuying the autonomous system of two first orer ifferential equations of the form ẋ 1 = f 1 (, x 2 ), ẋ 2 = f 2 (, x

More information

A PAC-Bayesian Approach to Spectrally-Normalized Margin Bounds for Neural Networks

A PAC-Bayesian Approach to Spectrally-Normalized Margin Bounds for Neural Networks A PAC-Bayesian Approach to Spectrally-Normalize Margin Bouns for Neural Networks Behnam Neyshabur, Srinah Bhojanapalli, Davi McAllester, Nathan Srebro Toyota Technological Institute at Chicago {bneyshabur,

More information

The total derivative. Chapter Lagrangian and Eulerian approaches

The total derivative. Chapter Lagrangian and Eulerian approaches Chapter 5 The total erivative 51 Lagrangian an Eulerian approaches The representation of a flui through scalar or vector fiels means that each physical quantity uner consieration is escribe as a function

More information

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Ashish Goel Michael Kapralov Sanjeev Khanna Abstract We consier the well-stuie problem of fining a perfect matching in -regular bipartite

More information

Convergence of Random Walks

Convergence of Random Walks Chapter 16 Convergence of Ranom Walks This lecture examines the convergence of ranom walks to the Wiener process. This is very important both physically an statistically, an illustrates the utility of

More information

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k A Proof of Lemma 2 B Proof of Lemma 3 Proof: Since the support of LL istributions is R, two such istributions are equivalent absolutely continuous with respect to each other an the ivergence is well-efine

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

Lower Bounds for the Smoothed Number of Pareto optimal Solutions

Lower Bounds for the Smoothed Number of Pareto optimal Solutions Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.

More information

u!i = a T u = 0. Then S satisfies

u!i = a T u = 0. Then S satisfies Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace

More information

Lecture 5. Symmetric Shearer s Lemma

Lecture 5. Symmetric Shearer s Lemma Stanfor University Spring 208 Math 233: Non-constructive methos in combinatorics Instructor: Jan Vonrák Lecture ate: January 23, 208 Original scribe: Erik Bates Lecture 5 Symmetric Shearer s Lemma Here

More information

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device Close an Open Loop Optimal Control of Buffer an Energy of a Wireless Device V. S. Borkar School of Technology an Computer Science TIFR, umbai, Inia. borkar@tifr.res.in A. A. Kherani B. J. Prabhu INRIA

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

Separation of Variables

Separation of Variables Physics 342 Lecture 1 Separation of Variables Lecture 1 Physics 342 Quantum Mechanics I Monay, January 25th, 2010 There are three basic mathematical tools we nee, an then we can begin working on the physical

More information

Lower bounds on Locality Sensitive Hashing

Lower bounds on Locality Sensitive Hashing Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,

More information

7.1 Support Vector Machine

7.1 Support Vector Machine 67577 Intro. to Machine Learning Fall semester, 006/7 Lecture 7: Support Vector Machines an Kernel Functions II Lecturer: Amnon Shashua Scribe: Amnon Shashua 7. Support Vector Machine We return now to

More information

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012 CS-6 Theory Gems November 8, 0 Lecture Lecturer: Alesaner Mąry Scribes: Alhussein Fawzi, Dorina Thanou Introuction Toay, we will briefly iscuss an important technique in probability theory measure concentration

More information

A Weak First Digit Law for a Class of Sequences

A Weak First Digit Law for a Class of Sequences International Mathematical Forum, Vol. 11, 2016, no. 15, 67-702 HIKARI Lt, www.m-hikari.com http://x.oi.org/10.1288/imf.2016.6562 A Weak First Digit Law for a Class of Sequences M. A. Nyblom School of

More information

The Principle of Least Action

The Principle of Least Action Chapter 7. The Principle of Least Action 7.1 Force Methos vs. Energy Methos We have so far stuie two istinct ways of analyzing physics problems: force methos, basically consisting of the application of

More information

Improved Rate-Based Pull and Push Strategies in Large Distributed Networks

Improved Rate-Based Pull and Push Strategies in Large Distributed Networks Improve Rate-Base Pull an Push Strategies in Large Distribute Networks Wouter Minnebo an Benny Van Hout Department of Mathematics an Computer Science University of Antwerp - imins Mielheimlaan, B-00 Antwerp,

More information

Chapter 6: Energy-Momentum Tensors

Chapter 6: Energy-Momentum Tensors 49 Chapter 6: Energy-Momentum Tensors This chapter outlines the general theory of energy an momentum conservation in terms of energy-momentum tensors, then applies these ieas to the case of Bohm's moel.

More information

Throughput Optimal Control of Cooperative Relay Networks

Throughput Optimal Control of Cooperative Relay Networks hroughput Optimal Control of Cooperative Relay Networks Emun Yeh Dept. of Electrical Engineering Yale University New Haven, C 06520, USA E-mail: emun.yeh@yale.eu Ranall Berry Dept. of Electrical an Computer

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

Ramsey numbers of some bipartite graphs versus complete graphs

Ramsey numbers of some bipartite graphs versus complete graphs Ramsey numbers of some bipartite graphs versus complete graphs Tao Jiang, Michael Salerno Miami University, Oxfor, OH 45056, USA Abstract. The Ramsey number r(h, K n ) is the smallest positive integer

More information

Switching Time Optimization in Discretized Hybrid Dynamical Systems

Switching Time Optimization in Discretized Hybrid Dynamical Systems Switching Time Optimization in Discretize Hybri Dynamical Systems Kathrin Flaßkamp, To Murphey, an Sina Ober-Blöbaum Abstract Switching time optimization (STO) arises in systems that have a finite set

More information

Conservation Laws. Chapter Conservation of Energy

Conservation Laws. Chapter Conservation of Energy 20 Chapter 3 Conservation Laws In orer to check the physical consistency of the above set of equations governing Maxwell-Lorentz electroynamics [(2.10) an (2.12) or (1.65) an (1.68)], we examine the action

More information

Permanent vs. Determinant

Permanent vs. Determinant Permanent vs. Determinant Frank Ban Introuction A major problem in theoretical computer science is the Permanent vs. Determinant problem. It asks: given an n by n matrix of ineterminates A = (a i,j ) an

More information

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Backorders Under the (R,r) Policy

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Backorders Under the (R,r) Policy IPA Derivatives for Make-to-Stock Prouction-Inventory Systems With Backorers Uner the (Rr) Policy Yihong Fan a Benamin Melame b Yao Zhao c Yorai Wari Abstract This paper aresses Infinitesimal Perturbation

More information

Lecture XII. where Φ is called the potential function. Let us introduce spherical coordinates defined through the relations

Lecture XII. where Φ is called the potential function. Let us introduce spherical coordinates defined through the relations Lecture XII Abstract We introuce the Laplace equation in spherical coorinates an apply the metho of separation of variables to solve it. This will generate three linear orinary secon orer ifferential equations:

More information

Sliding mode approach to congestion control in connection-oriented communication networks

Sliding mode approach to congestion control in connection-oriented communication networks JOURNAL OF APPLIED COMPUTER SCIENCE Vol. xx. No xx (200x), pp. xx-xx Sliing moe approach to congestion control in connection-oriente communication networks Anrzej Bartoszewicz, Justyna Żuk Technical University

More information

On the enumeration of partitions with summands in arithmetic progression

On the enumeration of partitions with summands in arithmetic progression AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 8 (003), Pages 149 159 On the enumeration of partitions with summans in arithmetic progression M. A. Nyblom C. Evans Department of Mathematics an Statistics

More information

Calculus of Variations

Calculus of Variations 16.323 Lecture 5 Calculus of Variations Calculus of Variations Most books cover this material well, but Kirk Chapter 4 oes a particularly nice job. x(t) x* x*+ αδx (1) x*- αδx (1) αδx (1) αδx (1) t f t

More information

A Sketch of Menshikov s Theorem

A Sketch of Menshikov s Theorem A Sketch of Menshikov s Theorem Thomas Bao March 14, 2010 Abstract Let Λ be an infinite, locally finite oriente multi-graph with C Λ finite an strongly connecte, an let p

More information

On the Aloha throughput-fairness tradeoff

On the Aloha throughput-fairness tradeoff On the Aloha throughput-fairness traeoff 1 Nan Xie, Member, IEEE, an Steven Weber, Senior Member, IEEE Abstract arxiv:1605.01557v1 [cs.it] 5 May 2016 A well-known inner boun of the stability region of

More information

Schrödinger s equation.

Schrödinger s equation. Physics 342 Lecture 5 Schröinger s Equation Lecture 5 Physics 342 Quantum Mechanics I Wenesay, February 3r, 2010 Toay we iscuss Schröinger s equation an show that it supports the basic interpretation of

More information

θ x = f ( x,t) could be written as

θ x = f ( x,t) could be written as 9. Higher orer PDEs as systems of first-orer PDEs. Hyperbolic systems. For PDEs, as for ODEs, we may reuce the orer by efining new epenent variables. For example, in the case of the wave equation, (1)

More information

CMSC 858F: Algorithmic Game Theory Fall 2010 BGP and Interdomain Routing

CMSC 858F: Algorithmic Game Theory Fall 2010 BGP and Interdomain Routing CMSC 858F: Algorithmic Game Theory Fall 2010 BGP an Interomain Routing Instructor: Mohamma T. Hajiaghayi Scribe: Yuk Hei Chan November 3, 2010 1 Overview In this lecture, we cover BGP (Borer Gateway Protocol)

More information

TMA 4195 Matematisk modellering Exam Tuesday December 16, :00 13:00 Problems and solution with additional comments

TMA 4195 Matematisk modellering Exam Tuesday December 16, :00 13:00 Problems and solution with additional comments Problem F U L W D g m 3 2 s 2 0 0 0 0 2 kg 0 0 0 0 0 0 Table : Dimension matrix TMA 495 Matematisk moellering Exam Tuesay December 6, 2008 09:00 3:00 Problems an solution with aitional comments The necessary

More information

All s Well That Ends Well: Supplementary Proofs

All s Well That Ends Well: Supplementary Proofs All s Well That Ens Well: Guarantee Resolution of Simultaneous Rigi Boy Impact 1:1 All s Well That Ens Well: Supplementary Proofs This ocument complements the paper All s Well That Ens Well: Guarantee

More information

Nonlinear Adaptive Ship Course Tracking Control Based on Backstepping and Nussbaum Gain

Nonlinear Adaptive Ship Course Tracking Control Based on Backstepping and Nussbaum Gain Nonlinear Aaptive Ship Course Tracking Control Base on Backstepping an Nussbaum Gain Jialu Du, Chen Guo Abstract A nonlinear aaptive controller combining aaptive Backstepping algorithm with Nussbaum gain

More information

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control 19 Eigenvalues, Eigenvectors, Orinary Differential Equations, an Control This section introuces eigenvalues an eigenvectors of a matrix, an iscusses the role of the eigenvalues in etermining the behavior

More information

Power Generation and Distribution via Distributed Coordination Control

Power Generation and Distribution via Distributed Coordination Control Power Generation an Distribution via Distribute Coorination Control Byeong-Yeon Kim, Kwang-Kyo Oh, an Hyo-Sung Ahn arxiv:407.4870v [math.oc] 8 Jul 204 Abstract This paper presents power coorination, power

More information

Delay Limited Capacity of Ad hoc Networks: Asymptotically Optimal Transmission and Relaying Strategy

Delay Limited Capacity of Ad hoc Networks: Asymptotically Optimal Transmission and Relaying Strategy Delay Limite Capacity of A hoc Networks: Asymptotically Optimal Transmission an Relaying Strategy Eugene Perevalov Lehigh University Bethlehem, PA 85 Email: eup2@lehigh.eu Rick Blum Lehigh University Bethlehem,

More information

II. First variation of functionals

II. First variation of functionals II. First variation of functionals The erivative of a function being zero is a necessary conition for the etremum of that function in orinary calculus. Let us now tackle the question of the equivalent

More information

How to Minimize Maximum Regret in Repeated Decision-Making

How to Minimize Maximum Regret in Repeated Decision-Making How to Minimize Maximum Regret in Repeate Decision-Making Karl H. Schlag July 3 2003 Economics Department, European University Institute, Via ella Piazzuola 43, 033 Florence, Italy, Tel: 0039-0-4689, email:

More information

Lecture 6: Calculus. In Song Kim. September 7, 2011

Lecture 6: Calculus. In Song Kim. September 7, 2011 Lecture 6: Calculus In Song Kim September 7, 20 Introuction to Differential Calculus In our previous lecture we came up with several ways to analyze functions. We saw previously that the slope of a linear

More information

Calculus and optimization

Calculus and optimization Calculus an optimization These notes essentially correspon to mathematical appenix 2 in the text. 1 Functions of a single variable Now that we have e ne functions we turn our attention to calculus. A function

More information

d dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1

d dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1 Lecture 5 Some ifferentiation rules Trigonometric functions (Relevant section from Stewart, Seventh Eition: Section 3.3) You all know that sin = cos cos = sin. () But have you ever seen a erivation of

More information

Laplacian Cooperative Attitude Control of Multiple Rigid Bodies

Laplacian Cooperative Attitude Control of Multiple Rigid Bodies Laplacian Cooperative Attitue Control of Multiple Rigi Boies Dimos V. Dimarogonas, Panagiotis Tsiotras an Kostas J. Kyriakopoulos Abstract Motivate by the fact that linear controllers can stabilize the

More information

Discrete Mathematics

Discrete Mathematics Discrete Mathematics 309 (009) 86 869 Contents lists available at ScienceDirect Discrete Mathematics journal homepage: wwwelseviercom/locate/isc Profile vectors in the lattice of subspaces Dániel Gerbner

More information

Nested Saturation with Guaranteed Real Poles 1

Nested Saturation with Guaranteed Real Poles 1 Neste Saturation with Guarantee Real Poles Eric N Johnson 2 an Suresh K Kannan 3 School of Aerospace Engineering Georgia Institute of Technology, Atlanta, GA 3332 Abstract The global stabilization of asymptotically

More information

An Analytical Expression of the Probability of Error for Relaying with Decode-and-forward

An Analytical Expression of the Probability of Error for Relaying with Decode-and-forward An Analytical Expression of the Probability of Error for Relaying with Decoe-an-forwar Alexanre Graell i Amat an Ingmar Lan Department of Electronics, Institut TELECOM-TELECOM Bretagne, Brest, France Email:

More information

Lecture 2 Lagrangian formulation of classical mechanics Mechanics

Lecture 2 Lagrangian formulation of classical mechanics Mechanics Lecture Lagrangian formulation of classical mechanics 70.00 Mechanics Principle of stationary action MATH-GA To specify a motion uniquely in classical mechanics, it suffices to give, at some time t 0,

More information

Distributed coordination control for multi-robot networks using Lyapunov-like barrier functions

Distributed coordination control for multi-robot networks using Lyapunov-like barrier functions IEEE TRANSACTIONS ON 1 Distribute coorination control for multi-robot networks using Lyapunov-like barrier functions Dimitra Panagou, Dušan M. Stipanović an Petros G. Voulgaris Abstract This paper aresses

More information

Capacity Analysis of MIMO Systems with Unknown Channel State Information

Capacity Analysis of MIMO Systems with Unknown Channel State Information Capacity Analysis of MIMO Systems with Unknown Channel State Information Jun Zheng an Bhaskar D. Rao Dept. of Electrical an Computer Engineering University of California at San Diego e-mail: juzheng@ucs.eu,

More information

Perturbation Analysis and Optimization of Stochastic Flow Networks

Perturbation Analysis and Optimization of Stochastic Flow Networks IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. XX, NO. Y, MMM 2004 1 Perturbation Analysis an Optimization of Stochastic Flow Networks Gang Sun, Christos G. Cassanras, Yorai Wari, Christos G. Panayiotou,

More information

Acute sets in Euclidean spaces

Acute sets in Euclidean spaces Acute sets in Eucliean spaces Viktor Harangi April, 011 Abstract A finite set H in R is calle an acute set if any angle etermine by three points of H is acute. We examine the maximal carinality α() of

More information

1 dx. where is a large constant, i.e., 1, (7.6) and Px is of the order of unity. Indeed, if px is given by (7.5), the inequality (7.

1 dx. where is a large constant, i.e., 1, (7.6) and Px is of the order of unity. Indeed, if px is given by (7.5), the inequality (7. Lectures Nine an Ten The WKB Approximation The WKB metho is a powerful tool to obtain solutions for many physical problems It is generally applicable to problems of wave propagation in which the frequency

More information

An M/G/1 Retrial Queue with Priority, Balking and Feedback Customers

An M/G/1 Retrial Queue with Priority, Balking and Feedback Customers Journal of Convergence Information Technology Volume 5 Number April 1 An M/G/1 Retrial Queue with Priority Balking an Feeback Customers Peishu Chen * 1 Yiuan Zhu 1 * 1 Faculty of Science Jiangsu University

More information

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Proceeings of the 4th East-European Conference on Avances in Databases an Information Systems ADBIS) 200 Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Eleftherios Tiakas, Apostolos.

More information

Applications of First Order Equations

Applications of First Order Equations Applications of First Orer Equations Viscous Friction Consier a small mass that has been roppe into a thin vertical tube of viscous flui lie oil. The mass falls, ue to the force of gravity, but falls more

More information

Fluid model for a data network with α-fair bandwidth sharing and general document size distributions: two examples of stability

Fluid model for a data network with α-fair bandwidth sharing and general document size distributions: two examples of stability IMS Lecture Notes Monograph Series??? Vol. 0 (0000) 1 c Institute of Mathematical Statistics, 0000 Flui moel for a ata network with α-fair banwith sharing an general ocument size istributions: two examples

More information

The derivative of a function f(x) is another function, defined in terms of a limiting expression: f(x + δx) f(x)

The derivative of a function f(x) is another function, defined in terms of a limiting expression: f(x + δx) f(x) Y. D. Chong (2016) MH2801: Complex Methos for the Sciences 1. Derivatives The erivative of a function f(x) is another function, efine in terms of a limiting expression: f (x) f (x) lim x δx 0 f(x + δx)

More information

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes Leaving Ranomness to Nature: -Dimensional Prouct Coes through the lens of Generalize-LDPC coes Tavor Baharav, Kannan Ramchanran Dept. of Electrical Engineering an Computer Sciences, U.C. Berkeley {tavorb,

More information

New bounds on Simonyi s conjecture

New bounds on Simonyi s conjecture New bouns on Simonyi s conjecture Daniel Soltész soltesz@math.bme.hu Department of Computer Science an Information Theory, Buapest University of Technology an Economics arxiv:1510.07597v1 [math.co] 6 Oct

More information

1 Heisenberg Representation

1 Heisenberg Representation 1 Heisenberg Representation What we have been ealing with so far is calle the Schröinger representation. In this representation, operators are constants an all the time epenence is carrie by the states.

More information

A study on ant colony systems with fuzzy pheromone dispersion

A study on ant colony systems with fuzzy pheromone dispersion A stuy on ant colony systems with fuzzy pheromone ispersion Louis Gacogne LIP6 104, Av. Kenney, 75016 Paris, France gacogne@lip6.fr Sanra Sanri IIIA/CSIC Campus UAB, 08193 Bellaterra, Spain sanri@iiia.csic.es

More information

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations Diophantine Approximations: Examining the Farey Process an its Metho on Proucing Best Approximations Kelly Bowen Introuction When a person hears the phrase irrational number, one oes not think of anything

More information

3 The variational formulation of elliptic PDEs

3 The variational formulation of elliptic PDEs Chapter 3 The variational formulation of elliptic PDEs We now begin the theoretical stuy of elliptic partial ifferential equations an bounary value problems. We will focus on one approach, which is calle

More information

Homework 2 Solutions EM, Mixture Models, PCA, Dualitys

Homework 2 Solutions EM, Mixture Models, PCA, Dualitys Homewor Solutions EM, Mixture Moels, PCA, Dualitys CMU 0-75: Machine Learning Fall 05 http://www.cs.cmu.eu/~bapoczos/classes/ml075_05fall/ OUT: Oct 5, 05 DUE: Oct 9, 05, 0:0 AM An EM algorithm for a Mixture

More information

Agmon Kolmogorov Inequalities on l 2 (Z d )

Agmon Kolmogorov Inequalities on l 2 (Z d ) Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,

More information

Learning Automata in Games with Memory with Application to Circuit-Switched Routing

Learning Automata in Games with Memory with Application to Circuit-Switched Routing Learning Automata in Games with Memory with Application to Circuit-Switche Routing Murat Alanyali Abstract A general setting is consiere in which autonomous users interact by means of a finite-state controlle

More information

Multi-agent Systems Reaching Optimal Consensus with Time-varying Communication Graphs

Multi-agent Systems Reaching Optimal Consensus with Time-varying Communication Graphs Preprints of the 8th IFAC Worl Congress Multi-agent Systems Reaching Optimal Consensus with Time-varying Communication Graphs Guoong Shi ACCESS Linnaeus Centre, School of Electrical Engineering, Royal

More information

A. Incorrect! The letter t does not appear in the expression of the given integral

A. Incorrect! The letter t does not appear in the expression of the given integral AP Physics C - Problem Drill 1: The Funamental Theorem of Calculus Question No. 1 of 1 Instruction: (1) Rea the problem statement an answer choices carefully () Work the problems on paper as neee (3) Question

More information

Markov Chains in Continuous Time

Markov Chains in Continuous Time Chapter 23 Markov Chains in Continuous Time Previously we looke at Markov chains, where the transitions betweenstatesoccurreatspecifietime- steps. That it, we mae time (a continuous variable) avance in

More information

Robustness and Perturbations of Minimal Bases

Robustness and Perturbations of Minimal Bases Robustness an Perturbations of Minimal Bases Paul Van Dooren an Froilán M Dopico December 9, 2016 Abstract Polynomial minimal bases of rational vector subspaces are a classical concept that plays an important

More information

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy,

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy, NOTES ON EULER-BOOLE SUMMATION JONATHAN M BORWEIN, NEIL J CALKIN, AND DANTE MANNA Abstract We stuy a connection between Euler-MacLaurin Summation an Boole Summation suggeste in an AMM note from 196, which

More information

Implicit Differentiation

Implicit Differentiation Implicit Differentiation Thus far, the functions we have been concerne with have been efine explicitly. A function is efine explicitly if the output is given irectly in terms of the input. For instance,

More information

Sturm-Liouville Theory

Sturm-Liouville Theory LECTURE 5 Sturm-Liouville Theory In the three preceing lectures I emonstrate the utility of Fourier series in solving PDE/BVPs. As we ll now see, Fourier series are just the tip of the iceberg of the theory

More information

Transmission Line Matrix (TLM) network analogues of reversible trapping processes Part B: scaling and consistency

Transmission Line Matrix (TLM) network analogues of reversible trapping processes Part B: scaling and consistency Transmission Line Matrix (TLM network analogues of reversible trapping processes Part B: scaling an consistency Donar e Cogan * ANC Eucation, 308-310.A. De Mel Mawatha, Colombo 3, Sri Lanka * onarecogan@gmail.com

More information

A Review of Multiple Try MCMC algorithms for Signal Processing

A Review of Multiple Try MCMC algorithms for Signal Processing A Review of Multiple Try MCMC algorithms for Signal Processing Luca Martino Image Processing Lab., Universitat e València (Spain) Universia Carlos III e Mari, Leganes (Spain) Abstract Many applications

More information

arxiv: v1 [physics.flu-dyn] 8 May 2014

arxiv: v1 [physics.flu-dyn] 8 May 2014 Energetics of a flui uner the Boussinesq approximation arxiv:1405.1921v1 [physics.flu-yn] 8 May 2014 Kiyoshi Maruyama Department of Earth an Ocean Sciences, National Defense Acaemy, Yokosuka, Kanagawa

More information

The Exact Form and General Integrating Factors

The Exact Form and General Integrating Factors 7 The Exact Form an General Integrating Factors In the previous chapters, we ve seen how separable an linear ifferential equations can be solve using methos for converting them to forms that can be easily

More information

Exponential Tracking Control of Nonlinear Systems with Actuator Nonlinearity

Exponential Tracking Control of Nonlinear Systems with Actuator Nonlinearity Preprints of the 9th Worl Congress The International Feeration of Automatic Control Cape Town, South Africa. August -9, Exponential Tracking Control of Nonlinear Systems with Actuator Nonlinearity Zhengqiang

More information

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an

More information

Polynomial Inclusion Functions

Polynomial Inclusion Functions Polynomial Inclusion Functions E. e Weert, E. van Kampen, Q. P. Chu, an J. A. Muler Delft University of Technology, Faculty of Aerospace Engineering, Control an Simulation Division E.eWeert@TUDelft.nl

More information

A simple model for the small-strain behaviour of soils

A simple model for the small-strain behaviour of soils A simple moel for the small-strain behaviour of soils José Jorge Naer Department of Structural an Geotechnical ngineering, Polytechnic School, University of São Paulo 05508-900, São Paulo, Brazil, e-mail:

More information

Make graph of g by adding c to the y-values. on the graph of f by c. multiplying the y-values. even-degree polynomial. graph goes up on both sides

Make graph of g by adding c to the y-values. on the graph of f by c. multiplying the y-values. even-degree polynomial. graph goes up on both sides Reference 1: Transformations of Graphs an En Behavior of Polynomial Graphs Transformations of graphs aitive constant constant on the outsie g(x) = + c Make graph of g by aing c to the y-values on the graph

More information

A New Minimum Description Length

A New Minimum Description Length A New Minimum Description Length Soosan Beheshti, Munther A. Dahleh Laboratory for Information an Decision Systems Massachusetts Institute of Technology soosan@mit.eu,ahleh@lis.mit.eu Abstract The minimum

More information

BEYOND THE CONSTRUCTION OF OPTIMAL SWITCHING SURFACES FOR AUTONOMOUS HYBRID SYSTEMS. Mauro Boccadoro Magnus Egerstedt Paolo Valigi Yorai Wardi

BEYOND THE CONSTRUCTION OF OPTIMAL SWITCHING SURFACES FOR AUTONOMOUS HYBRID SYSTEMS. Mauro Boccadoro Magnus Egerstedt Paolo Valigi Yorai Wardi BEYOND THE CONSTRUCTION OF OPTIMAL SWITCHING SURFACES FOR AUTONOMOUS HYBRID SYSTEMS Mauro Boccaoro Magnus Egerstet Paolo Valigi Yorai Wari {boccaoro,valigi}@iei.unipg.it Dipartimento i Ingegneria Elettronica

More information

Iterated Point-Line Configurations Grow Doubly-Exponentially

Iterated Point-Line Configurations Grow Doubly-Exponentially Iterate Point-Line Configurations Grow Doubly-Exponentially Joshua Cooper an Mark Walters July 9, 008 Abstract Begin with a set of four points in the real plane in general position. A to this collection

More information

The canonical controllers and regular interconnection

The canonical controllers and regular interconnection Systems & Control Letters ( www.elsevier.com/locate/sysconle The canonical controllers an regular interconnection A.A. Julius a,, J.C. Willems b, M.N. Belur c, H.L. Trentelman a Department of Applie Mathematics,

More information