Downlink Transmission of Short Packets: Framing and Control Information Revisited

Size: px
Start display at page:

Download "Downlink Transmission of Short Packets: Framing and Control Information Revisited"

Transcription

1 1 Downin ransmission of Short Pacets: Frag and Contro Information Revisited Kasper Føe riingsgaard, Student Member, IEEE and Petar Popovsi, Feow, IEEE arxiv: v1 cs.i 6 May 2016 Abstract Ceuar wireess systems rey on frame-based transmissions. he frame design is conventionay based on heuristics, consisting of a frame header and a data part. he frame header contains contro information that provides pointers to the messages within the data part. In this paper, we revisit the principes of frame design and show the impact of the new design in scenarios that feature short data pacets which are centra to various 5G and Internet of hings appications. We treat frag for downin transmission in an AWGN broadcast channe with K users, where the sizes of the messages to the users are random variabes. Using approximations from finite bocength information theory, we estabish a framewor in which a message to a given user is not necessariy encoded as a singe pacet, but may be grouped with the messages to other users and benefit from the improved efficiency of onger codes. his requires changes in the way contro information is sent, and it requires that the users need to spend power decoding other messages, thereby increasing the average power consumption. We show that the common heuristic design is ony one point on a curve that represents the trade-off between atency and power consumption. I. INRODUCION Modern high-speed wireess networs heaviy depend on reiabe and efficient transmission of arge data pacets through the use of coding and information theory. he advent of machineto-machine M2M), vehicuar-to-vehicuar V2V), and various streag systems have spawned a renewed interest in deveoping information theoretica bounds and codes for communication of short pacets 123. Additionay, these appications often have tight reiabiity and atency constraints compared to typica wireess systems today. Communication at shorter bocengths introduces severa new chaenges which are not present when considering communication of arger data pacets. For exampe, the overhead caused by contro signas and header data is insignificant if arge data pacets are sent, and hence, this overhead is often negected in the anaysis of protocos. However, more stringent atency requirements ead to shortened bocengths for transmission such that the size of contro information may approach, or even exceed, the size of the data part in the pacet. his is especiay true for mutiuser systems such as broadcast channes, two-way channes, or mutipe access channes, where the contro information must incude information about the pacet structure, security, and user address information for identification purposes. he wor of P. Popovsi and K. F. riingsgaard was supported in part by the European Research Counci ERC Consoidator Grant Nr WILLOW) within the Horizon 2020 Program. K. riingsgaard and P. Popovsi are with the Department of Eetronic Systems, Aaborg University, 9220, Aaborg Øst, Denmar e-mai: {ft,petarp}@es.aau.d). he fundamentas of communication of short pacets have been addressed by Strassen and, recenty, Poyansiy et a. in 4 and 5. It was shown that the maximum coding rate of a -ength code with n channe uses and maximum error probabiity ε over a discrete-time AWGN point-to-point channe has an asymptotic expansion given by R n, ε) = C V n Q 1 ε) + 1 2n og 2 n + O ) 1 n as n. Here, C is the Shannon capacity, V is the channe dispersion, and Q 1 ) denotes the inverse Q-function. In addition to the asymptotic expansion in 1), 5 used nonasymptotic bounds to numericay demonstrate that R n, ε) is tighty approximated by the first three terms of 1). he approximation 1) and simiar ones are important in the design of communication systems because the specifics of code seection can be negected in the optimization of protoco parameters. For exampe, such approximations have been appied in the optimization of pacet scheduing probems 6, hybrid ARQ protocos 7, and coud radio access networs 8. In this paper, we consider downin transmission with a discrete-time AWGN broadcast channe that consists of a transmitter and K users. Downin transmissions are organized in frames, whose structure is the main topic of this paper. In each frame, there is a message from the transmitter to the -th user with a certain probabiity 1 q. If, in a given frame, there is a message for user, then this user is said to be active in that frame. he size of the message to user is denoted by D and is a random variabe itsef. Hence, the transmitter needs to convey information about which users are active, the structure of the transmission, and sizes of the messages. As a resut, the frame duration, which corresponds to the tota transmission time, and the tota power consumption at the users are aso random variabes. An important observation from 1) is that arger data pacets are encoded more efficienty. his introduces an interesting trade-off with two extremes: a) in a broadcast setting one can either encode a messages in one arge pacet, or b) one can encode each message separatey, which is the norm in modern wireess protocos. In a), the average frame duration is imized, which impies that the average atency across the users is imized. However, the downside of a) is that a users need to receive for the whoe period of transmission to be abe to decode their messages, which is undesirabe for devices that are power-constrained. he atter approach b), depicted in Fig. 1, uses codes which are ess efficient, and thus the average frame duration is arger. On the other hand, each user ony needs to decode the information intended for that user. he ey point, however, is that these design considerations enarge the 1)

2 2 space of feasibe protocos and enabe the protoco designer to see a trade-off between frame duration atency) and power consumption at the users. Despite this trade-off, practicay a wireess systems soey use the extreme approach b). Contribution: he purpose of this paper is to revisit the way a downin frame is designed when it contains short pacets. Specificay, it aims at exporing the trade-off between the average frame duration and the average power consumption at the users. Instead of using a traditiona frame structure, we enarge the design space for a frame by doing the foowing: the users are divided into groups that may depend on the reaization of the message sizes and the messages of each group are jointy encoded using optima channe codes. We anayze the probem using asymptotic expansions simiar to 1), and we find a ower bound for the trade-off curve. Next, we introduce three protocos: a) a genie-aided protoco with performance cose to the ower bound, b) protoco with a message that wors for the case in which each message has either the size 0 or α N bits, and c) a protoco with variabe message sizes, where the message sizes are distributed according to a probabiity mass function P D with finite and nonnegative integer support. he protocos b) and c) both convey enough contro information to mae them practicay usabe. Our numerica resuts demonstrate trade-offs which are particuary interesting when the message sizes are sma. Organization: Section II introduces the finite bocength approximations and bounds for optima channe codes whie the system mode is introduced in Section III. Section IV presents a ower bound for the average power at each user expressed as a function of the average frame duration. Section V provides some concrete protoco designs, which are subsequenty compared with the ower bound. Finay, numerica exampes are presented in Section VI and Section VII concudes the paper. Notation: Vectors are denoted by bodface etters e.g., x) whie their entries are denoted by roman etters e.g., x i ). We denote the n-dimensiona a-zero vector and a-one vector by 0 n and 1 n, respectivey. We denote by 0 n i x) the n-dimensiona vector with x in the i-th entry and zeroes in the rest. We et denote the concatenation of two bit string, e.g., for a {0, 1} n and b {0, 1} m, a b is the concatenated bit string. hroughout the paper, the index beongs aways to the set K {1,, K}, athough this is sometimes not expicity mentioned. We define the upper concave enveope of a function f : R + R + as ucef) inf g {g f and g is concave}. Simiary, the ower convex enveope is defined by cef) sup g {g f and g is convex}. Finay, N denotes the set of positive integers, Z + N {0}, and the symbo R indicate the set of rea numbers. II. FINIE BLOCKLENGH BOUNDS AND APPROXIMAIONS In our anaysis, we appy resuts from finite bocength information theory. For the rea) AWGN channe under a shortterm power constraint P, 4 and 5 showed that the maximum coding rate R n, ε) of a code with bocength n and error probabiity ε 0, 1) has the asymptotic expansion given contro information encoded messages Fig. 1. Conventiona approach to downin broadcasting. We denote by M 2, M 6,, M 20 the messages of varying size in bits) destined to the active users. An initia pacet contains contro information that defines the structure of the remaining part of the transmission. Each message is encoded separatey. Ch. uses/information bit N a, ε)/ N, ε)/ N, ε)/ N c, ε)/ 1/C Information bits Fig. 2. Bounds and approximations for N, ε) potted for ε = 10 3 and P = 0 db. he converse N c, ε) and achievabiity bound N a, ε) are potted using the SPECRE toobox. by 1), where the channe capacity C and the channe dispersion V are given by and V C 1 2 og 21 + P ) 2) P P + 2) 2P + 1) 2 og 2exp1)) 2 3) respectivey. One can obtain tight nonasymptotic upper and ower bounds for R n, ε) using the achievabiity and converse bounds in 5, and it was numericay demonstrated that the first three terms of the right-hand side of 1) provide a tight approximation of R n, ε). We define N, ε) {n 0 : nr n, ε) } for 1 and N 0, ε) 0 which is the smaest number of channe uses that aows the encoding of bits with error probabiity ε. We obtain the foowing asymptotic approximation of N, ε) as : N, ε) = V C + C 3 Q 1 ε) 1 2C og 2 + O1). 4) C his can be verified by setting n equa to RHS of 4) and by computing nr n, ε). hen, one finds that nr n, ε) = + O1) from which 4) foows. We define the approximation N, ε) uce C + V C 3 Q 1 ε) 1 2C og 2 C ) 5)

3 3 where uce ) stands for the upper concave enveope. It can be shown that the approximation of N, ε) inside uce ) in 5) 4C is concave for Q 1 ε) 2 V og e 2), impying that N, ε) = 2 N, ε)+o1). Additionay, in a numerica exampes in this 4C paper, we have Q 1 ε) 2 V og e 2) < 1, and hence the upper concave enveope does not affect our numerica resuts. In Fig. 2, we 2 have potted the κ-achievabiity bound N a, ε) and the metaconverse bound N c, ε) from 5 aong with the approximation 5), and N, ε) = n, where n is a soution to: nc nv Q 1 ε) og 2 n =. 6) We observe that N, ε) provides an approximation of N, ε) that matches the converse bound cosey. In the remaining part of this paper, when referring to the bocength of an optima code conveying bits with a probabiity of error not exceeding ε, we consistenty use the approximation N, ε) in pace of N, ε) in a computations and derivations. III. SYSEM MODEL We consider an AWGN broadcast channe with one transmitter and K users. In the t-th time sot, the -th user receive Y,t γ X t + Z,t. 7) where Z,t N 0, 1) and X t R is the channe input. hroughout the paper, we assume that γ = 1. he assumption of equa channe conditions can, to some extend, be justified as foows. Consider a downin broadcast scenario with many users with varying channe conditions. A viabe communication strategy is to first divide the users into severa CSI-groups such that the users assigned to a certain CSI-group have simiar channe conditions. hen, the transmitter serves each CSIgroup sequentiay, and our system mode in 7) modes a singe CSI-group. A sateite-based broadcast system with ine-ofsight to a users and predictabe channe conditions constitute a practica exampe of our system mode. If, however, CSIgrouping is not performed, then the transmitter needs to protect a pacet destined to mutipe users with a code that is strong enough to ensure that even the worst-channe user can decode. he assumption of nonfading channes is mainy introduced for simpicity, but we note that there are resuts in finite bocength information theory for fading channes 9. he message M destined to the -th user is nonempty with probabiity 1 q 0, 1), and we say that the -th user is active if there is a message destined to that user. We assume that the size of the message M in bits) is given by D Z + which is a discrete random variabe distributed independenty according to the probabiity mass function { q if d = 0 P D d) 8) 1 q)p i if d = α i for i {1,, S}. he message M is drawn uniformy randomy from the set {0, 1} D. We use α = α 1, α 2,..., α S ) to denote a S- dimensiona vector of distinct ordered positive integers α i < α s if i < s) that correspond to the possibe message sizes. he frame duration is a random variabe that depends on the message sizes {D }. he transmitter encodes the message {M } into a sequence of channe inputs using the encoder function f t ) such that X t f t {D }, {M }) 9) for t {1,, } and X t = 0 for t { + 1, }. Additionay, we require that 1 E X t P. 10) We define the ON-OFF function g,t : R {e}) t 1 {0, 1} that defines the receiver activity for user : { Y,t, g Ȳ,t,t Ȳ t 1 ) = 1, receiver is ON. 11) e, receiver is OFF he ON-OFF function repaces the t-th channe output with an erasure if the user is OFF at that time. he stopping time represents the time index of the ast nonerased channe output in the sequence Ȳ,t; after the receiver is OFF unti the end of the frame. Formay, inf { n 1 : t > n, g,t Ȳ t 1 ) = 0 } for which we require <. Considering that a user can ony use the channe outputs for which it is ON, we define the decoding function h,t Ȳ t) to estimate the message M based on Ȳ t. he ON-OFF functions are causa in the sense that the decision of whether the users are ON at time t depends on previous channe outputs, Ȳ t 1. Uness an error occurs during decoding, the stopping times are ess than or equa for any practica appications of this mode. We merey define to emphasize that is a random variabe which is not nown by the users, and hence the users need to obtain this information through the sequence Ȳ,t. In a conventiona approach to downin broadcast, as depicted in Fig. 1, contro information in the initia pacet defines the structure of the remaining transmission. Hence, after successfuy decoding the contro information in the initia pacet, the -th user nows and when to be ON and OFF to receive the message intended for that user. he average power consumption of the -th user is given by P E 1 { g,i Ȳ i 1 ) = 1 } 12) where 1{ } is the indicator function, and is detered by the ON-OFF function. Note that EP 1 = EP, for {1,, K}, since the message sizes D are distributed identicay. Finay, the active users need to decode their messages with reiabiity arger than or equa 1 ɛ such that P h, Ȳ ) M D > 0 ɛ 13) for {1,, K} and ɛ 0, 1). he above system mode provides a genera framewor for the probem of downin broadcast frag. For tractabiity, we constrain ourseves to an important and practica cass of protocos described as foows. he transmitter forms L Z + pacets which are encoded using optima codes with error probabiities { ɛ } {1,,L}. Here, L and { ɛ } are random variabes that depend ony on {D }. Let L max be a constant that denotes the maximum number of pacets that the transmitter can

4 4 send, defined as the smaest integer such that L max L for a reaizations of {D }. Let {M C) } Lmax denote the contro information that needs to be conveyed in order to describe how the data for different users is conveyed see the exampe beow). Let {D C) } Lmax denote the sizes in bits) of {M C) } Lmax, i.e., MC) {0, 1} DC) and D C) = 0 for > L. Let {U } Lmax denote disjoint random sets that depend ony on {D } such that L max U = K and such that U = for > L. he -th pacet then consists of the information bits M C) U M which are encoded by an optima code with reiabiity ɛ using N D C) + ) U D, ɛ channe uses. he encoder function f t, ) is defined by sequentiay transmitting the L encoded pacets. he frame duration is given by L N D C) + U D, ɛ ). We assume that the optima code has the foowing property: If j bits are encoded into n channe uses by an optima code with error probabiity ε, then the user needs to receive a n channe uses so as to decode any of the j bits with error probabiity ε. As an iustration, we describe how the genera framewor is instantiated to describe a conventiona downin frame from Fig. 1. Suppose S = 3 such that D {0, α 1, α 2, α 3 }. As there are four possibe engths, the contro information about {D } can be represented by at most 2K information bits which are conveyed in the first pacet, commony referred to as the header. We et D C) 1 = 2K and et M C) 1 be the bitstring of ength 2K representing {D }. Since there is a header pacet and at most K other pacets, we set L max = L = K + 1. We aso set ɛ 1 = ε 1 and ɛ = ε 2 for {2,, L max } where ε 1, ε 2 ) 0, 1 2 are such that ɛ = 1 1 ε 1 )1 ε 2 ). Since a contro information is concentrated in the frame header, we have D C) = 0 for 2. he sets {U } Lmax are defined such that the header has no user data and U 1 =, whie U = { 1} for {2,, L max }. User is ON during the transmission of the first pacet which it decodes with probabiity 1 ε 1. If user successfuy decodes the first pacet, it earns {D }, and thereby it obtains a pointer to the ocation of the +1)-th pacet, which contains the desired message M. After decoding the header, the -th user is OFF for the remaining time except when the +1)- th pacet is transmitted. he + 1)-th pacet is successfuy decoded with probabiity 1 ε 2. he overa probabiity of error for the protoco from the viewpoint of a singe user is given by 1 1 ε 1 )1 ε 2 ) = ɛ as desired. For arge message sizes α s 1 we get the ower bounds: E KED 1 14) C EP 1 ED 1 C. 15) When α s 1, the contro information becomes negigibe, and hence for the conventiona approach both E and EP 1 simutaneousy approach the ower bounds in 14) and 15). Our objective is to expore trade-offs between the competing goas of imizing E and EP 1. IV. LOWER BOUND We estabish a ower bound by assug that the users are provided with contro information from a genie, i.e., {D } are Power ch. uses ) for a > 0 22) with = ) with = ) with = Frame duration ch. uses Fig. 3. Depicts the ower bound in 22) for three different vaues of for P = 0 db, ɛ = 10 4, and α 1 = he bac curve is obtained by evauating 22) for a > 0 and by combining the resuting ower bounds. he dots correspond to five genie-aided protocos described by N 1,, N 4 ) 4, 0, 0, 0), 3, 1, 0, 0), 2, 2, 0, 0), 2, 1, 1, 0), 1, 1, 1, 1) enumerated from top-eft corner to bottom-right corner). nown at a users. In that case, the transmitter and a users can agree on a protoco that ony conveys the messages {M }, i.e., D C) = 0 for {1,, L max }. Hence, the transmitter may encode the messages {M } into at most K separate pacets such that each message is encoded in exacty one of these pacets. Each pacet may contain either no messages at a, a singe message, or mutipe concatenated messages, and they are encoded using optima codes with error probabiities that do not exceed ɛ upon decoding; reca that a users experience the same error probabiity since γ = 1. Any genie-aided protoco can be characterized using K random nonnegative integer vectors N Z S +, for {1,, K}, that depend ony on {D }. he content of the -th pacet is described by N ; the pacet encodes N,1 messages of ength α 1, it encodes N,2 messages of ength α 2, etc. Note that the integer vectors {N } do not uniquey describe which messages are encoded in which pacets. For a genie-aided protoco defined by a set of vectors {N }, we compute the frame duration and average power as foows 1 K = K Nα N, ɛ) 16) K P i = 1 K =1 K 1 S N Nα N, ɛ). 17) Here, and 1 K K =1 P i are random variabes that depend ony on the reaization of {D }. We aim to ower bound E + EP 1 for any > 0 and thereby obtain a ower bound on the average power consumption EP 1 as a function of average frame duration E. Before stating the ower bound, we introduce the technique through an exampe. Suppose K = 4, q = 0, S = 1 such that D 1 = = D 4 = α 1 and the frame duration and average power are deteristic. Since the users now {D } 4 =1 and

5 5 each of the four messages beongs to one encoded pacet, any genie-aided protoco can be described through the four nonnegative integers N 1, N 2, N 3, and N 4 satisfying N 1 + +N 4 = 4. hese integers represent the number of messages encoded in the first, second, third, and fourth pacet, respectivey. For > 0, our objective is to imize P with respect to N 1,, N 4 {0,, 4} subject to N N 4 = 4. For this particuar exampe, one can easiy sove the resuting integer optimization probem. However, we can aso find a ower bound on P through the foowing steps + 4 P 4 = 4 Nα 1 N, ɛ) + 4 n 1,,n 4 {0,,4}: n 1+ +n 4=4 n 1,,n 4 {0,,4}: n 1+ +n 4=4 n 1,,n 4 {0,,4}: n 1+ +n 4=4 4 N Nα 1 N, ɛ) 18) 4 Φ n ) 19) 4 Φ n ) 20) 4 Φ 4 n 4 ) 21) = 4 Φ 1). 22) Here, 19) foows by defining Φ x) Nα 1 x, ɛ) 1 + x ), 23) 4 and by a imization with respect to n 1,, n 4, 20) foows by defining Φ ) as the ower convex enveope of Φ ), and 21) is by convexity of the ower convex enveope of Φ ). Interestingy, the bound in 22) is fairy tight and simpe to compute. We iustrate the bound 22) in Fig. 3, confirg the intuition that when S = 1, one shoud attempt to have an equa number of non-empty messages in each pacet, which for this exampe is 1, 2, or 4 messages in each pacet. For the genera setting with arbitrary S 1 and K, we appy the above ideas in the foowing proposition which enabes us to compute a ower bound on EP 1 for certain E. Proposition 1: For every > 0, we have E + EP 1 E 1 S L 1:S φ L1:S 1 S L 1:S ) 24) where L Z S+1 + is mutinomia distributed with S + 1 categories, K trias, and event probabiities 1 q)p 1,, 1 q)p S, q, L 1:S denotes the first S entries of L, and φ : R S + R + is the ower convex enveope of the function φ x) N α x, ɛ ) S x K ) 25) defined for x R S +. Proof: Fix > 0. he users K can be decomposed into S + 1 disjoint subsets {U s) } s {0,,S} such that U s) { K : D = α s } for s {0,, S}, where we et α 0 0 for notationa convenience. We denote the random) set of active users by U = S U s). Fix a genie-aided protoco. hen, since we assume that the users are provided with contro information by a genie, the protoco must decompose the set of active users U into at most K possiby empty) disjoint subsets {U } {1,,K}. Note that these subsets are random, depend ony on {D }, and are induced by the protoco. Define the random integer vectors N Z S +, for {1,, K} and s {1,, S}, as foows: N,s K 1{ U and D = α s }. 26) he average frame duration and the average power for the genieaided protoco in terms of {N i } are now given by K E = E Nα N, ɛ) 27) 1 K EP 1 = E 1 S N Nα N, ɛ). 28) K Now, we compute a ower bound on E + EP 1 based on 27) and 28): E + EP 1 K = E Nα N, ɛ) + K K = E φ N ) E n 1,,n Z S + : n,s= U s) K 1 S N Nα N, ɛ) 29) 30) φ n ) 31) where 30) is by the definition of φ ) in 25). In 31), the expectation is ony with respect to the random variabes U 1),, U S) and. Next, 31) is ower-bounded by using the ower convex enveope of φ ) and its convexity: E + EP 1 E E = E n 1,,n Z S + : n,s= U s) n 1,,n Z S + : n,s= U s) φ U 1),, U S) φ n i ) 32) ) φ 1 n 33) ). 34) Here, 32) foows because the ower convex enveope φ ) of φ ) is smaer than or equa φ ) and 33) foows from convexity of φ ). he resut foows by noting that the random vector U 1),, U S), U 0) is mutinomia distributed with S + 1 categories, K trias, and event probabiities 1 q)p 1,, 1 q)p S, q. he foowing emma shows that we can use the concavity of N, ɛ) to simpify the computation of φ ).

6 6 Lemma 2: For every > 0, we have φ x) = where we have defined ζ R S : 1 S ζ=1 s:ζ s>0 S ζ s φs) x s/ζ s ) 35) φ s) x) Nα sx, ɛ)1 + x/k) 36) for x 0 and s {1,, S}. Additionay, the optimization probem in 35) is convex. Proof: See Appendix I For the case with message sizes, i.e., when S = 1, Proposition 1 reduces to the foowing coroary. Coroary 3: For every 0, we have E + EP 1 1 q)k 1) φ 1) 37) where φ 1) ) is defined in 36). his readiy foows from L 1:S /1 S L 1:S ) = 1 and because 1 S L 1:S is Binomia distributed with parameters K and 1 q, and hence 1 S L 1:S = 1 q)k. A. Genie-aided protoco We put forth a genie-aided protoco that uses the intuition obtained through Proposition 1 and Lemma 2. Here, genie-aided refers to the fact that the protoco assumes that the nowedge about {D } is avaiabe at a users. Lemma 2 suggests that one shoud group messages of the same sizes together rather than grouping messages of mixed message sizes. he purpose of introducing a genie-aided protoco is to show that it achieves a trade-off cose to that of the ower bound. Moreover, we can compare the non-genie-aided protocos, introduced in Section V, to the genie-aided protoco to show the impact of contro information. Such comparisons are provided in Section VI. First, for a set of users Ū K, V N, and ε 0, 1), we define a Ū, V, ε)-protoco as foows. he users Ū are divided into G Ū /V disjoint sets {Ū} {1,,G} such that { Ū /G + 1, {1,, mod Ū, G)} Ū Ū /G, otherwise. 38) G One can verify that Ū = Ū. Sequentiay, for {1,, G}, the transmitter encodes and conveys a pacet containing M with error probabiity ε using Ū N D, ε) channe uses. Here, denotes the concatenation of messages. Whie the number of channe uses spend at Ū the transmitter is given by G N D, ɛ ), each user ony needs to receive and decode one of the Ūi G pacets. We aso note that a Ū, V, ε)-protoco assumes contro information at a the users Ū, i.e., the users needs to now Ū, {D } Ū, V, and ε. For our genie-aided protoco, we define U s) { K : D = α s }, for s {0,, S}, and fix a vector V K S. Now, sequentiay for each s {1,, S}, the transmitter deivers the messages of the users U s) using a U s), V s, ɛ)-protoco. We denote the average frame duration E and the average power EP 1 by V,ɛ) genie and V,ɛ) genie, respectivey. he vector V is eft to be specified. We can trace of optima trade-off between average frame duration and average power by soving the integer optimization probem for a 0: V,ɛ) V,ɛ) V K S genie + genie 39) V. PROOCOL DESIGN In the foowing, we devise actua protocos that trade-off between average frame duration and average power consumption at the users. In contrast to the genie-aided protoco in Section IV-A, these protocos need to convey contro information. A. Fixed message size We initiate our discussion of protoco design with the case of message size, i.e., S = 1. In this case, the contro information ony consists of which users are active. We divide the set of users K into B K/W disjoint subsets K 1,, K B such that B K i = K and such that { K/B + 1, i {1,, modk, B)} K i = 40) K/B, otherwise. Here, W N is a protoco parameter to be set. he subsets {K i } of K are termed user groups UG). he transmitter forms a pacet that contains ony the number of active users in each UG, i.e., the pacet encodes the vector U K 1, U K 2,, U K B. his vector constitutes a first ayer of contro information and can be uniquey represented by at most 1 = K/W og 2 W bits. We encode the contro information by an optima channe code with error probabiity not exceeding ɛ 1 0, 1) which can be achieved by approximatey N 1, ɛ 1 ) channe uses. After successfuy decoding the first pacet, the users now the number of users in each UG, and thereby the structure of the remaining part of the transmission. he second ayer encodes contro information and messages associated with each UG. Specificay, for the i-th UG, the transmitter needs to inform the users of the i-th UG about which U K i users of K i are active. Hence, the contro information for the i-th UG, can be represented by 2,i og Ki 2 U K i ) bits and is conveyed by using an optima code with error probabiity not exceeding ɛ 2 0, 1), which requires approximatey N 2,i, ɛ 2 ) channe uses. Now, the messages of the active users in the i-th UG U i U K i are conveyed with error probabiity not exceeding ɛ 3 0, 1) using an U i, V, ɛ 3 )-protoco, where V K is another protoco parameter to be set. We emphasize that we can use an U i, V, ɛ 3 )-protoco because the set of active users U i nows U i from the the contro information provided that the first two pacets are successfuy decoded. Based on the description of the protoco above, one can compute E and EP 1 which V,W,ɛ) V,W,ɛ) we denote by and, respectivey. Here, ɛ is the vector ɛ 1, ɛ 2, ɛ 3. he parameters V, W, and ɛ are eft to be specified. We can trace the optima achievabe trade-off of the proposed protoco by soving the foowing optimization probem for a 0: ɛ 0,1 3 : V,W ) K 2 3 =1 1 ɛ )1 ɛ V,W,ɛ) + V,W,ɛ). 41)

7 7 ptr 2 ptr 3 ptr 4 message sizes UG 1 UG 2 UG 3 messages with messages with UG 4 Fig. 4. An exampe of the protoco in Section V-B with S = 2, K = 40, W = 10, and V = 3, 2. Pacets surrounded by bac separators corresponds to an encoded pacet. Grey separators means encoded jointy, e.g., the messages M 12 and M 15 are jointy encoded in one pacet. he red shaded parts of the protoco depicts the pacets that the users 12 and 15 needs to decode. Whie the outer imization is an integer optimization probem which can ony be soved using exhaustive search, the inner imization is convex and can be soved using standard convex optimization agorithms. his is shown in the foowing emma. Lemma 4: he inner optimization probem in 41) is convex in ɛ. Proof: Note that, for V and W, the objective function in 41) depends ony on ɛ through a nonnegative inear combination of Q-functions of ɛ 1, ɛ 2, and ɛ 3, i.e., there exist nonnegative constants a 1, a 2, and a 3 such that V,W,ɛ) + V,W,ɛ) = a 1 Q 1 ɛ 1 ) + a 2 Q 1 ɛ 2 ) + a 3 Q 1 ɛ 3 ). 42) V,W,ɛ) V,W,ɛ) his is because and are evauated using N, ε). o show convexity of the optimization probem 41), we use the substitution ɛ i = 1 expu i ) for u i 0 and i {1, 2, 3}, which yieds the equivaent constraint u 1 +u 2 +u 3 = 3 ) og =1 1 ɛ ) og1 ɛ) which is inear. Consequenty, it is sufficient to show that Q 1 1 expu i )) is convex for i {1, 2, 3}. his foows because the ogarithm of the cumuative distribution function of the Gaussian distribution fx) og1 Qx)) is concave and increasing. hus, its inverse function f 1 x) = Q 1 1 expx)) is convex and increasing. At this point, we have not discussed the possibiity of undetected errors. Approximations ie 1) do not give any guarentee for the probabiity of detecting an error. Using CRCs, the probabiity of undetected error can be made arbitrariy sma, but it is aways positive and ess than or equa ɛ. Suppose that decoding of the first pacet, containing contro information, fais for the - th user. In this case, the subsequent behavior is random, and the -th user wi with high probabiity) not correcty decode the foowing pacets. However, since the pacet sizes are imited by α S, we can compute the worst-case power consumption at the users, say P worst. We then cope with the probem of undetected errors simpy by adding, to the power consumption at each user, the term ɛp worst, which corresponds to the worst-case contribution to the power consumption. B. Variabe message size Next, we consider the case S 2. he users are grouped into B K/W UGs in the same way as for the message size protoco. he UGs are encoded sequentiay after the contro information of the first ayer. he contro information of the first ayer consists of pointers to the time indices of the beginning of each UG. hus, based on the contro information of the first ayer, each user can identify the ocation of its UG. Note that we need ony B 1 pointer because the first UG is transmitted immediatey after the contro information. Each pointer is encoded separatey in a pacet using an optima code with an error probabiity not exceeding ɛ 1. Observe that one can compute the maximum ength in channe uses) of each UG and thereby the number of bits required for each pointer. he contro information of the second ayer for the i-th UG consists of {D } Ki, represented by K i og 2 S + 1) bits. hese bits are transmitted using an optima code with error probabiity not exceeding ɛ 2. Finay, sequentiay for each s {1,, S}, the transmitter encodes the messages of the users U s) i using an U s) i, V s, ɛ 3 )-protoco, where V = V 1,, V S are protoco parameters to be specified. he protoco is iustrated in Fig. 4. V,W,ɛ) variabe V,W,ɛ) variabe We denote E and EP 1 by and, respectivey, and optimize the parameters of the protoco using the optimization probem ɛ 0,1 3 : V,W ) K S+1 3 =1 1 ɛ )1 ɛ V,W,ɛ) variabe + V,W,ɛ) variabe. 43) As for the message size protoco, the inner imization is convex. VI. NUMERICAL RESULS In this section, we pot the ower bound aong with the optima achievabe trade-offs for the proposed protocos. A resuts are for ɛ = 10 4, P = 0 db, q = 0.5. We first present resuts for the case with message size. Fig. 5 and Fig. 6 show the trade-offs for α 1 = 100 and S = 1 for K = 16 and K = 128, respectivey. We pot the ower bound given by Proposition 1 and the trade-offs achievabe by the genie-aided protoco and the message size protoco. For the message size protoco, we aso pot the trade-off for the case where the inner imization in 41) is not performed and ɛ 1, ɛ 2, ɛ 3 are set equay to 1 1 ɛ) 1/3. For the protocos, we pot the ower convex enveopes and note that any point on them can be achieved by time-sharing between two sets of protoco parameters. We observe, as expected, that differences between the genie-aided protocos and the ower bounds are negigibe. Optimizing over ɛ aso improves the trade-off sighty. his happens because the contro information which is destined to many users needs better protection compared to a group of messages destined ony to a group of users. Finay, we observe a significant gap between the genie-aided protoco and the message size protoco which refects the significance of contro information for broadcast of sma messages. Fig. 7 and Fig. 8 shows the trade-offs for α = In this case, we see that the gap between the genie-aided protoco and the message size protoco becomes ess significant. Finay, in Fig. 9 and Fig. 10, we depict the trade-offs for K = 16, p = 0.5, 0.5 and with α = 50, 150 and α = 500, 1500, respectivey. Our observations are simiar to those for the message size protoco.

8 8 Average power ch. uses Protoco no ɛ opt.) Protoco Genie-aided protoco Average power ch. uses Protoco no ɛ opt.) Protoco Genie-aided protoco Average frame duration ch. uses Average frame duration ch. uses 10 4 Fig. 5. rade-off between average transmission time and average power consumption for the case K = 16, P = 1, q = 0.5, α = 100, S = 1, and ɛ = Here, Protoco refers to the message size protoco, whie Protoco no ɛ opt.) refers to the message size protoco with ɛ 1 = ɛ 2 = ɛ 3 = 1 1 ɛ) 1/3 ). Fig. 7. rade-off between average transmission time and average power consumption for the case K = 16, P = 1, q = 0.5, α = 1000, S = 1, and ɛ = Here, Protoco refers to the message size protoco, whie Protoco no ɛ opt.) refers to the message size protoco with ɛ 1 = ɛ 2 = ɛ 3 = 1 1 ɛ) 1/3 ). Average power ch. uses Protoco no ɛ opt.) Protoco Genie-aided protoco Average power ch. uses Protoco no ɛ opt.) Protoco Genie-aided protoco Average frame duration ch. uses Average frame duration ch. uses 10 5 Fig. 6. rade-off between average transmission time and average power consumption for the case K = 128, P = 1, q = 0.5, α = 100, S = 1, and ɛ = Here, Protoco refers to the message size protoco, whie Protoco no ɛ opt.) refers to the message size protoco with ɛ 1 = ɛ 2 = ɛ 3 = 1 1 ɛ) 1/3 ). Fig. 8. rade-off between average transmission time and average power consumption for the case K = 128, P = 1, q = 0.5, α = 1000, S = 1, and ɛ = Here, Protoco refers to the message size protoco, whie Protoco no ɛ opt.) refers to the message size protoco with ɛ 1 = ɛ 2 = ɛ 3 = 1 1 ɛ) 1/3 ). VII. CONCLUSION In this paper, we considered the AWGN broadcast channe with K users with symmetric channe conditions. he downin transmission is organized in frames. In each frame, a message of random size in bits) is destined to each of the users in such a way that the message sizes are unnown to the users. he message can aso be of size zero, which means the user shoud not receive data in that frame. A user, however, sti needs to decode a certain amount of information from the frame in order to earn that there is no data destined to her in this particuar frame. Hence, in addition to the messages, a protoco needs to convey contro information that describes the structure of the transmission and the sizes of the messages. We used approximations of the maximum coding rate for the AWGN channe from finite bocength information theory to show that jointy encoding different groupings of the messages enabe the protoco designer to trade-off between average frame duration and the average power consumption at the users. Specificay, we derived a ower bound for the trade-off curve which assumed that contro information was avaiabe at the users, a genie-aided protoco, and two practica protocos. Our numerica resuts showed that the genie-aided protoco achieved a trade-off curve

9 9 Average power ch. uses Protoco S 2) Genie-aided protoco Average frame duration ch. uses Fig. 9. rade-off between average transmission time and average power consumption for the case K = 16, P = 1, q = 0.5, p = 0.5, 0.5, α = 50, 150, S = 2, and ɛ = Average power ch. uses Protoco S 2) Genie-aided protoco S a i,s 1 φ 0 S ) ) s ) S a i,s = 1 φ s) ) 1. 48) 2000 In 46), 0 S s x) denotes an S-dimensiona vector with x in the s-th entry and zeroes in the rest, 47) foows by Jensen s inequaity concave) appied to φ x) on the simpex A 1, and ) is by the definition of φ s) ) in 36). bwe can now owerbound 44) as Average frame duration ch. uses 10 4 S I ν i a i,s Fig. 10. rade-off between average transmission time and average power φ x) consumption for the case K = 16, P = 1, q = 0.5, p = 0.5, 0.5, 1 φ s) ) 1 49) α = 500, 1500, S = 2, and ɛ = S I ν i a i,s ) 1 φs) 1 50) that cosey matched the ower bound. For both of our practica protocos, the contro information ed to a significanty worse trade-off curves when the messages were sma and when compared to the genie-aided protoco. here are severa directions for future research: 1) In Section III, we significanty restricted our genera system mode to a space of practica and tractabe protocos. A rigorous information-theoretic treatment of our genera system mode might ead to improved protocos and ower bounds. 2) he system mode has two obvious extensions: one can extend the system mode to incude fading, and one can introduce asymmetric channe conditions using resuts from 9. 3) Whie we are abe to quantify the suboptimaity of our protocos by comparison to the ower bound, our protocos are sti heuristic. One interesting idea for future research is to systematicay investigate the design of good protocos that incude contro information. APPENDIX I PROOF OF LEMMA 2 By definition of the ower convex enveope, for every x R S +, there exists a vector ν R S + with 1 S ν = 1 and I points a i R S +, for i {1,, I}, such that and such that φ x) = x = I ν i φ a i ) 44) I ν i a i. 45) Since Nn, ɛ) is concave in n, we have that φ x) is concave on the simpex A κ {x R S + : 1 S x = κ} for every κ R +. Consequenty, for i {1,, I}, we have = φ a i ) = φ S S I ) ν i a i,s 1 S a i,s 0 S ) ) 1 s 1 46) φ s) I ν ia i,s 1 1 S ai I ν ia i,s 1 S ai 51) ζ s φs) x s/ζ s ). 52) Here, 49) is by 44) and 48), 50) is by φ s) s) x) φ x) for x 0, 51) foows by Jensen s inequaity convex) appied to φ s) ), and 52) foows by setting ζ s I ν ia i,s and by 1 S ai using I ν ia i,s = x s by 45). hus, we have shown that the LHS of 35) is arger than or equa the RHS of 35). Next, we estabish the equaity in 35). Suppose, on the contrary, that there exists a positive vector ζ R S such that

10 10 1 S ζ = 1 and such that φ x) > S impies a contradiction: φ x) > = S ζ φs) s x s/ ζ s ). his ζ s φs) x s/ ζ s ) 53) S ζ s φ 0 S s x s /ζ s )) 54) φ x). 55) Here, 55) foows by Jensen s inequaity convex) appied to φ ). We concude that 35) must be satisfied with equaity. Note that it is sufficient to write imum instead of infimum in 35) because we have shown the existence of a feasibe point in 35) that attains the imum. o show convexity of the optimization probem in 35), it is sufficient to show that the function x φ s) y/x) is convex in x > 0 for a constant y > 0 and s {1,, S}, i.e., for every x 1 > x 2 > 0 and α 0, 1, we need to show that 6 S. Xu,.-H. Chang, S.-C. Lin, C. Shen, and G. Zhu, Energy-efficient pacet scheduing with finite bocength codes: Convexity anaysis and efficient agorithms, arxiv, pp. 1 30, Mar Onine. Avaiabe: 7 B. Mai,. Svensson, and M. Zorzi, Finite boc-ength anaysis of the incrementa redundancy harq, IEEE Wireess Commun. Letters., vo. 3, no. 5, pp , S. Khaii and O. Simeone, Upin harq for distributed and coud ran via separation of contro and data panes, arxiv, pp. 1 27, Dec Onine. Avaiabe: 9 W. Yang, G. Durisi,. Koch, and Y. Poyansiy, Quasi-static mutipeantenna fading channes at finite bocength, IEEE rans. Inf. heory, vo. 60, no. 7, pp , αx 1 φs) y/x 1 ) + 1 α)x 2 φs) y/x 2 ) αx α)x 2 ) φ s) y/αx α)x 2 )).56) Fix, without oss of generaity, arbitrary x 1 > x 2 > 0, α 0, 1, and s {1,, S}. Define the function y ) x gx) = 2 x y y x 2 y φs) + x y ) x 1 y y x 1 x 1 x 2 y φs). 57) x 1 x 2 Note that xgy/x) and gx) are affine functions in x > 0 and that gy/x 1 ) = φ s) y/x 1 ) and gy/x 2 ) = φ s) y/x 2 ). hus, since φ s) ) is convex, we have gx) φ s) x) for x y/x 1, y/x 2. o verify 56), we write αx 1 φs) y/x 1 ) + 1 α)x 2 φs) y/x 2 ) = αx α)x 2 )gy/αx α)x 2 )) 58) αx α)x 2 ) φ s) y/αx α)x 2 )) 59) his estabishes the convexity of the optimization probem in 35) because we can redo the above argument for a x 2 > x 1 > 0 and α 0, 1. REFERENCES 1 P. Popovsi, Utra-reiabe communication in 5G wireess systems, in IEEE Int. Conf. 5G for Ubiquitous Connectivity, Levi, Finand, Nov. 2014, pp G. Durisi,. Koch, and P. Popovsi, owards massive, utra-reiabe, and ow-atency wireess: he art of sending short pacets, Proc. IEEE, 2016, to appear. 3 F. Boccardi, R. W. Heath, A. Lozano,. L. Marzetta, and P. Popovsi, Five disruptive technoogy directions for 5G, IEEE Commun. Mag., vo. 52, no. 2, pp , V. Strassen, Asymptotische abschätzungen in Shannon s informationstheorie, in rans. 3rd Prague Conf. Int. heory, Prague, Czech Repubic, 1962, pp Y. Poyansiy, H. V. Poor, and S. Verdú, Channe coding rate in the finite bocength regime, IEEE rans. Inf. heory, vo. 56, no. 5, pp , 2010.

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

Centralized Coded Caching of Correlated Contents

Centralized Coded Caching of Correlated Contents Centraized Coded Caching of Correated Contents Qianqian Yang and Deniz Gündüz Information Processing and Communications Lab Department of Eectrica and Eectronic Engineering Imperia Coege London arxiv:1711.03798v1

More information

Coded Caching for Files with Distinct File Sizes

Coded Caching for Files with Distinct File Sizes Coded Caching for Fies with Distinct Fie Sizes Jinbei Zhang iaojun Lin Chih-Chun Wang inbing Wang Department of Eectronic Engineering Shanghai Jiao ong University China Schoo of Eectrica and Computer Engineering

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes A Fundamenta Storage-Communication Tradeoff in Distributed Computing with Stragging odes ifa Yan, Michèe Wigger LTCI, Téécom ParisTech 75013 Paris, France Emai: {qifa.yan, michee.wigger} @teecom-paristech.fr

More information

Limited magnitude error detecting codes over Z q

Limited magnitude error detecting codes over Z q Limited magnitude error detecting codes over Z q Noha Earief choo of Eectrica Engineering and Computer cience Oregon tate University Corvais, OR 97331, UA Emai: earief@eecsorstedu Bea Bose choo of Eectrica

More information

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver

More information

Rate-Distortion Theory of Finite Point Processes

Rate-Distortion Theory of Finite Point Processes Rate-Distortion Theory of Finite Point Processes Günther Koiander, Dominic Schuhmacher, and Franz Hawatsch, Feow, IEEE Abstract We study the compression of data in the case where the usefu information

More information

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR 1 Maximizing Sum Rate and Minimizing MSE on Mutiuser Downink: Optimaity, Fast Agorithms and Equivaence via Max-min SIR Chee Wei Tan 1,2, Mung Chiang 2 and R. Srikant 3 1 Caifornia Institute of Technoogy,

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient

More information

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems Source and Reay Matrices Optimization for Mutiuser Muti-Hop MIMO Reay Systems Yue Rong Department of Eectrica and Computer Engineering, Curtin University, Bentey, WA 6102, Austraia Abstract In this paper,

More information

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 2, FEBRUARY

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 2, FEBRUARY IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO. 2, FEBRUARY 206 857 Optima Energy and Data Routing in Networks With Energy Cooperation Berk Gurakan, Student Member, IEEE, OmurOze,Member, IEEE,

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University

More information

Multicasting Energy and Information Simultaneously

Multicasting Energy and Information Simultaneously Muticasting Energy and Information Simutaneousy Ting-Yi Wu, Anshoo Tandon, Lav R. Varshney, and Mehu Motani Sun Yat-Sen University, wutingyi@mai.sysu.edu.cn Nationa University of Singapore, {anshoo.tandon@gmai.com,

More information

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay Throughput Optima Scheduing for Wireess Downinks with Reconfiguration Deay Vineeth Baa Sukumaran vineethbs@gmai.com Department of Avionics Indian Institute of Space Science and Technoogy. Abstract We consider

More information

The Streaming-DMT of Fading Channels

The Streaming-DMT of Fading Channels The Streaming-DMT of Fading Channes Ashish Khisti Member, IEEE, and Star C. Draper Member, IEEE arxiv:30.80v3 cs.it] Aug 04 Abstract We consider the sequentia transmission of a stream of messages over

More information

Transmit Antenna Selection for Physical-Layer Network Coding Based on Euclidean Distance

Transmit Antenna Selection for Physical-Layer Network Coding Based on Euclidean Distance Transmit ntenna Seection for Physica-Layer Networ Coding ased on Eucidean Distance 1 arxiv:179.445v1 [cs.it] 13 Sep 17 Vaibhav Kumar, arry Cardiff, and Mar F. Fanagan Schoo of Eectrica and Eectronic Engineering,

More information

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao, Vivek Raghunathan, Stephen Hany, Vinod Sharma and. R. Kumar Abstract We consider a joint power contro

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

Arbitrary Throughput Versus Complexity Tradeoffs in Wireless Networks using Graph Partitioning

Arbitrary Throughput Versus Complexity Tradeoffs in Wireless Networks using Graph Partitioning University of Pennsyvania SchoaryCommons Departmenta Papers (ESE) Department of Eectrica & Systems Engineering November 2006 Arbitrary Throughput Versus Compexity Tradeoffs in Wireess Networks using Graph

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

Reliability: Theory & Applications No.3, September 2006

Reliability: Theory & Applications No.3, September 2006 REDUNDANCY AND RENEWAL OF SERVERS IN OPENED QUEUING NETWORKS G. Sh. Tsitsiashvii M.A. Osipova Vadivosto, Russia 1 An opened queuing networ with a redundancy and a renewa of servers is considered. To cacuate

More information

NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION

NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION Hsiao-Chang Chen Dept. of Systems Engineering University of Pennsyvania Phiadephia, PA 904-635, U.S.A. Chun-Hung Chen

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

Componentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems

Componentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems Componentwise Determination of the Interva Hu Soution for Linear Interva Parameter Systems L. V. Koev Dept. of Theoretica Eectrotechnics, Facuty of Automatics, Technica University of Sofia, 1000 Sofia,

More information

arxiv:math/ v2 [math.pr] 6 Mar 2005

arxiv:math/ v2 [math.pr] 6 Mar 2005 ASYMPTOTIC BEHAVIOR OF RANDOM HEAPS arxiv:math/0407286v2 [math.pr] 6 Mar 2005 J. BEN HOUGH Abstract. We consider a random wa W n on the ocay free group or equivaenty a signed random heap) with m generators

More information

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai

More information

A Statistical Framework for Real-time Event Detection in Power Systems

A Statistical Framework for Real-time Event Detection in Power Systems 1 A Statistica Framework for Rea-time Event Detection in Power Systems Noan Uhrich, Tim Christman, Phiip Swisher, and Xichen Jiang Abstract A quickest change detection (QCD) agorithm is appied to the probem

More information

AALBORG UNIVERSITY. The distribution of communication cost for a mobile service scenario. Jesper Møller and Man Lung Yiu. R June 2009

AALBORG UNIVERSITY. The distribution of communication cost for a mobile service scenario. Jesper Møller and Man Lung Yiu. R June 2009 AALBORG UNIVERSITY The distribution of communication cost for a mobie service scenario by Jesper Møer and Man Lung Yiu R-29-11 June 29 Department of Mathematica Sciences Aaborg University Fredrik Bajers

More information

BICM Performance Improvement via Online LLR Optimization

BICM Performance Improvement via Online LLR Optimization BICM Performance Improvement via Onine LLR Optimization Jinhong Wu, Mostafa E-Khamy, Jungwon Lee and Inyup Kang Samsung Mobie Soutions Lab San Diego, USA 92121 Emai: {Jinhong.W, Mostafa.E, Jungwon2.Lee,

More information

Bourgain s Theorem. Computational and Metric Geometry. Instructor: Yury Makarychev. d(s 1, s 2 ).

Bourgain s Theorem. Computational and Metric Geometry. Instructor: Yury Makarychev. d(s 1, s 2 ). Bourgain s Theorem Computationa and Metric Geometry Instructor: Yury Makarychev 1 Notation Given a metric space (X, d) and S X, the distance from x X to S equas d(x, S) = inf d(x, s). s S The distance

More information

Power-Availability-Aware Cell Association for Energy-Harvesting Small-Cell Base Stations

Power-Availability-Aware Cell Association for Energy-Harvesting Small-Cell Base Stations 1 Power-Avaiabiity-Aware Ce Association for Energy-Harvesting Sma-Ce ase Stations Fanny Parzysz, Member, IEEE, Marco Di Renzo, Senior Member, IEEE, and Christos Veriouis, Senior Member, IEEE arxiv:1607.02317v2

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea-Time Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process

More information

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES ANDRZEJ DUDEK AND ANDRZEJ RUCIŃSKI Abstract. For positive integers k and, a k-uniform hypergraph is caed a oose path of ength, and denoted by

More information

Melodic contour estimation with B-spline models using a MDL criterion

Melodic contour estimation with B-spline models using a MDL criterion Meodic contour estimation with B-spine modes using a MDL criterion Damien Loive, Ney Barbot, Oivier Boeffard IRISA / University of Rennes 1 - ENSSAT 6 rue de Kerampont, B.P. 80518, F-305 Lannion Cedex

More information

Fractional Power Control for Decentralized Wireless Networks

Fractional Power Control for Decentralized Wireless Networks Fractiona Power Contro for Decentraized Wireess Networks Nihar Jinda, Steven Weber, Jeffrey G. Andrews Abstract We consider a new approach to power contro in decentraized wireess networks, termed fractiona

More information

Nearly Optimal Constructions of PIR and Batch Codes

Nearly Optimal Constructions of PIR and Batch Codes arxiv:700706v [csit] 5 Jun 07 Neary Optima Constructions of PIR and Batch Codes Hia Asi Technion - Israe Institute of Technoogy Haifa 3000, Israe shea@cstechnionaci Abstract In this work we study two famiies

More information

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems Convergence Property of the Iri-Imai Agorithm for Some Smooth Convex Programming Probems S. Zhang Communicated by Z.Q. Luo Assistant Professor, Department of Econometrics, University of Groningen, Groningen,

More information

An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks

An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks An Adaptive Opportunistic Routing Scheme for Wireess Ad-hoc Networks A.A. Bhorkar, M. Naghshvar, T. Javidi, and B.D. Rao Department of Eectrica Engineering, University of Caifornia San Diego, CA, 9093

More information

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network

More information

Approximated MLC shape matrix decomposition with interleaf collision constraint

Approximated MLC shape matrix decomposition with interleaf collision constraint Agorithmic Operations Research Vo.4 (29) 49 57 Approximated MLC shape matrix decomposition with intereaf coision constraint Antje Kiese and Thomas Kainowski Institut für Mathematik, Universität Rostock,

More information

Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rules 1

Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rules 1 Steepest Descent Adaptation of Min-Max Fuzzy If-Then Rues 1 R.J. Marks II, S. Oh, P. Arabshahi Λ, T.P. Caude, J.J. Choi, B.G. Song Λ Λ Dept. of Eectrica Engineering Boeing Computer Services University

More information

u(x) s.t. px w x 0 Denote the solution to this problem by ˆx(p, x). In order to obtain ˆx we may simply solve the standard problem max x 0

u(x) s.t. px w x 0 Denote the solution to this problem by ˆx(p, x). In order to obtain ˆx we may simply solve the standard problem max x 0 Bocconi University PhD in Economics - Microeconomics I Prof M Messner Probem Set 4 - Soution Probem : If an individua has an endowment instead of a monetary income his weath depends on price eves In particuar,

More information

Efficient Generation of Random Bits from Finite State Markov Chains

Efficient Generation of Random Bits from Finite State Markov Chains Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

Competitive Diffusion in Social Networks: Quality or Seeding?

Competitive Diffusion in Social Networks: Quality or Seeding? Competitive Diffusion in Socia Networks: Quaity or Seeding? Arastoo Fazei Amir Ajorou Ai Jadbabaie arxiv:1503.01220v1 [cs.gt] 4 Mar 2015 Abstract In this paper, we study a strategic mode of marketing and

More information

Approximated MLC shape matrix decomposition with interleaf collision constraint

Approximated MLC shape matrix decomposition with interleaf collision constraint Approximated MLC shape matrix decomposition with intereaf coision constraint Thomas Kainowski Antje Kiese Abstract Shape matrix decomposition is a subprobem in radiation therapy panning. A given fuence

More information

SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS

SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS ISEE 1 SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS By Yingying Fan and Jinchi Lv University of Southern Caifornia This Suppementary Materia

More information

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Brandon Maone Department of Computer Science University of Hesini February 18, 2014 Abstract This document derives, in excrutiating

More information

Statistical Learning Theory: A Primer

Statistical Learning Theory: A Primer Internationa Journa of Computer Vision 38(), 9 3, 2000 c 2000 uwer Academic Pubishers. Manufactured in The Netherands. Statistica Learning Theory: A Primer THEODOROS EVGENIOU, MASSIMILIANO PONTIL AND TOMASO

More information

On the Performance of Mismatched Data Detection in Large MIMO Systems

On the Performance of Mismatched Data Detection in Large MIMO Systems On the Performance of Mismatched Data Detection in Large MIMO Systems Chares Jeon, Arian Maei, and Christoph Studer arxiv:1605.034v [cs.it] Jun 016 Abstract We investigate the performance of mismatched

More information

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS TONY ALLEN, EMILY GEBHARDT, AND ADAM KLUBALL 3 ADVISOR: DR. TIFFANY KOLBA 4 Abstract. The phenomenon of noise-induced stabiization occurs

More information

arxiv: v1 [math.co] 17 Dec 2018

arxiv: v1 [math.co] 17 Dec 2018 On the Extrema Maximum Agreement Subtree Probem arxiv:1812.06951v1 [math.o] 17 Dec 2018 Aexey Markin Department of omputer Science, Iowa State University, USA amarkin@iastate.edu Abstract Given two phyogenetic

More information

Fast Blind Recognition of Channel Codes

Fast Blind Recognition of Channel Codes Fast Bind Recognition of Channe Codes Reza Moosavi and Erik G. Larsson Linköping University Post Print N.B.: When citing this work, cite the origina artice. 213 IEEE. Persona use of this materia is permitted.

More information

Algorithms to solve massively under-defined systems of multivariate quadratic equations

Algorithms to solve massively under-defined systems of multivariate quadratic equations Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations

More information

Delay Asymptotics with Retransmissions and Fixed Rate Codes over Erasure Channels

Delay Asymptotics with Retransmissions and Fixed Rate Codes over Erasure Channels Deay Asymptotics with Retransmissions and Fixed Rate Codes over Erasure Channes Jian Tan, Yang Yang, Ness B. Shroff, Hesham E Gama Department of Eectrica and Computer Engineering The Ohio State University,

More information

Do Schools Matter for High Math Achievement? Evidence from the American Mathematics Competitions Glenn Ellison and Ashley Swanson Online Appendix

Do Schools Matter for High Math Achievement? Evidence from the American Mathematics Competitions Glenn Ellison and Ashley Swanson Online Appendix VOL. NO. DO SCHOOLS MATTER FOR HIGH MATH ACHIEVEMENT? 43 Do Schoos Matter for High Math Achievement? Evidence from the American Mathematics Competitions Genn Eison and Ashey Swanson Onine Appendix Appendix

More information

Maximum likelihood decoding of trellis codes in fading channels with no receiver CSI is a polynomial-complexity problem

Maximum likelihood decoding of trellis codes in fading channels with no receiver CSI is a polynomial-complexity problem 1 Maximum ikeihood decoding of treis codes in fading channes with no receiver CSI is a poynomia-compexity probem Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department

More information

Separation of Variables and a Spherical Shell with Surface Charge

Separation of Variables and a Spherical Shell with Surface Charge Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation

More information

Optimality of Gaussian Fronthaul Compression for Uplink MIMO Cloud Radio Access Networks

Optimality of Gaussian Fronthaul Compression for Uplink MIMO Cloud Radio Access Networks Optimaity of Gaussian Fronthau Compression for Upink MMO Coud Radio Access etworks Yuhan Zhou, Yinfei Xu, Jun Chen, and Wei Yu Department of Eectrica and Computer Engineering, University of oronto, Canada

More information

Pricing Multiple Products with the Multinomial Logit and Nested Logit Models: Concavity and Implications

Pricing Multiple Products with the Multinomial Logit and Nested Logit Models: Concavity and Implications Pricing Mutipe Products with the Mutinomia Logit and Nested Logit Modes: Concavity and Impications Hongmin Li Woonghee Tim Huh WP Carey Schoo of Business Arizona State University Tempe Arizona 85287 USA

More information

4 1-D Boundary Value Problems Heat Equation

4 1-D Boundary Value Problems Heat Equation 4 -D Boundary Vaue Probems Heat Equation The main purpose of this chapter is to study boundary vaue probems for the heat equation on a finite rod a x b. u t (x, t = ku xx (x, t, a < x < b, t > u(x, = ϕ(x

More information

Improved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization

Improved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization Improved Min-Sum Decoding of LDPC Codes sing -Dimensiona Normaization Juntan Zhang and Marc Fossorier Department of Eectrica Engineering niversity of Hawaii at Manoa Honouu, HI 968 Emai: juntan, marc@spectra.eng.hawaii.edu

More information

Optimal Control of Assembly Systems with Multiple Stages and Multiple Demand Classes 1

Optimal Control of Assembly Systems with Multiple Stages and Multiple Demand Classes 1 Optima Contro of Assemby Systems with Mutipe Stages and Mutipe Demand Casses Saif Benjaafar Mohsen EHafsi 2 Chung-Yee Lee 3 Weihua Zhou 3 Industria & Systems Engineering, Department of Mechanica Engineering,

More information

Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity

Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity Error-free Muti-vaued Broadcast and Byzantine Agreement with Optima Communication Compexity Arpita Patra Department of Computer Science Aarhus University, Denmark. arpita@cs.au.dk Abstract In this paper

More information

FRIEZE GROUPS IN R 2

FRIEZE GROUPS IN R 2 FRIEZE GROUPS IN R 2 MAXWELL STOLARSKI Abstract. Focusing on the Eucidean pane under the Pythagorean Metric, our goa is to cassify the frieze groups, discrete subgroups of the set of isometries of the

More information

CONSISTENT LABELING OF ROTATING MAPS

CONSISTENT LABELING OF ROTATING MAPS CONSISTENT LABELING OF ROTATING MAPS Andreas Gemsa, Martin Nöenburg, Ignaz Rutter Abstract. Dynamic maps that aow continuous map rotations, for exampe, on mobie devices, encounter new geometric abeing

More information

Coordination and Antenna Domain Formation in Cloud-RAN systems

Coordination and Antenna Domain Formation in Cloud-RAN systems Coordination and ntenna Domain Formation in Coud-RN systems Hadi Ghauch, Muhammad Mahboob Ur Rahman, Sahar Imtiaz, James Gross, Schoo of Eectrica Engineering and the CCESS Linnaeus Center, Roya Institute

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea- Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process Management,

More information

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization Scaabe Spectrum ocation for Large Networks ased on Sparse Optimization innan Zhuang Modem R&D Lab Samsung Semiconductor, Inc. San Diego, C Dongning Guo, Ermin Wei, and Michae L. Honig Department of Eectrica

More information

Some Measures for Asymmetry of Distributions

Some Measures for Asymmetry of Distributions Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester

More information

Manipulation in Financial Markets and the Implications for Debt Financing

Manipulation in Financial Markets and the Implications for Debt Financing Manipuation in Financia Markets and the Impications for Debt Financing Leonid Spesivtsev This paper studies the situation when the firm is in financia distress and faces bankruptcy or debt restructuring.

More information

Akaike Information Criterion for ANOVA Model with a Simple Order Restriction

Akaike Information Criterion for ANOVA Model with a Simple Order Restriction Akaike Information Criterion for ANOVA Mode with a Simpe Order Restriction Yu Inatsu * Department of Mathematics, Graduate Schoo of Science, Hiroshima University ABSTRACT In this paper, we consider Akaike

More information

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines Recursive Constructions of Parae FIFO and LIFO Queues with Switched Deay Lines Po-Kai Huang, Cheng-Shang Chang, Feow, IEEE, Jay Cheng, Member, IEEE, and Duan-Shin Lee, Senior Member, IEEE Abstract One

More information

Unconditional security of differential phase shift quantum key distribution

Unconditional security of differential phase shift quantum key distribution Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice

More information

Homogeneity properties of subadditive functions

Homogeneity properties of subadditive functions Annaes Mathematicae et Informaticae 32 2005 pp. 89 20. Homogeneity properties of subadditive functions Pá Burai and Árpád Száz Institute of Mathematics, University of Debrecen e-mai: buraip@math.kte.hu

More information

Discrete Techniques. Chapter Introduction

Discrete Techniques. Chapter Introduction Chapter 3 Discrete Techniques 3. Introduction In the previous two chapters we introduced Fourier transforms of continuous functions of the periodic and non-periodic (finite energy) type, as we as various

More information

Primal and dual active-set methods for convex quadratic programming

Primal and dual active-set methods for convex quadratic programming Math. Program., Ser. A 216) 159:469 58 DOI 1.17/s117-15-966-2 FULL LENGTH PAPER Prima and dua active-set methods for convex quadratic programming Anders Forsgren 1 Phiip E. Gi 2 Eizabeth Wong 2 Received:

More information

Limits on Support Recovery with Probabilistic Models: An Information-Theoretic Framework

Limits on Support Recovery with Probabilistic Models: An Information-Theoretic Framework Limits on Support Recovery with Probabiistic Modes: An Information-Theoretic Framewor Jonathan Scarett and Voan Cevher arxiv:5.744v3 cs.it 3 Aug 6 Abstract The support recovery probem consists of determining

More information

On the Performance of Wireless Energy Harvesting Networks in a Boolean-Poisson Model

On the Performance of Wireless Energy Harvesting Networks in a Boolean-Poisson Model On the Performance of Wireess Energy Harvesting Networks in a Booean-Poisson Mode Han-Bae Kong, Ian Fint, Dusit Niyato, and Nicoas Privaut Schoo of Computer Engineering, Nanyang Technoogica University,

More information

Robust Sensitivity Analysis for Linear Programming with Ellipsoidal Perturbation

Robust Sensitivity Analysis for Linear Programming with Ellipsoidal Perturbation Robust Sensitivity Anaysis for Linear Programming with Eipsoida Perturbation Ruotian Gao and Wenxun Xing Department of Mathematica Sciences Tsinghua University, Beijing, China, 100084 September 27, 2017

More information

6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7

6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7 6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17 Soution 7 Probem 1: Generating Random Variabes Each part of this probem requires impementation in MATLAB. For the

More information

The Group Structure on a Smooth Tropical Cubic

The Group Structure on a Smooth Tropical Cubic The Group Structure on a Smooth Tropica Cubic Ethan Lake Apri 20, 2015 Abstract Just as in in cassica agebraic geometry, it is possibe to define a group aw on a smooth tropica cubic curve. In this note,

More information

$, (2.1) n="# #. (2.2)

$, (2.1) n=# #. (2.2) Chapter. Eectrostatic II Notes: Most of the materia presented in this chapter is taken from Jackson, Chap.,, and 4, and Di Bartoo, Chap... Mathematica Considerations.. The Fourier series and the Fourier

More information

VALIDATED CONTINUATION FOR EQUILIBRIA OF PDES

VALIDATED CONTINUATION FOR EQUILIBRIA OF PDES VALIDATED CONTINUATION FOR EQUILIBRIA OF PDES SARAH DAY, JEAN-PHILIPPE LESSARD, AND KONSTANTIN MISCHAIKOW Abstract. One of the most efficient methods for determining the equiibria of a continuous parameterized

More information

DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM

DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM MIKAEL NILSSON, MATTIAS DAHL AND INGVAR CLAESSON Bekinge Institute of Technoogy Department of Teecommunications and Signa Processing

More information

Partial permutation decoding for MacDonald codes

Partial permutation decoding for MacDonald codes Partia permutation decoding for MacDonad codes J.D. Key Department of Mathematics and Appied Mathematics University of the Western Cape 7535 Bevie, South Africa P. Seneviratne Department of Mathematics

More information

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm 1 Asymptotic Properties of a Generaized Cross Entropy Optimization Agorithm Zijun Wu, Michae Koonko, Institute for Appied Stochastics and Operations Research, Caustha Technica University Abstract The discrete

More information

Linear Network Coding for Multiple Groupcast Sessions: An Interference Alignment Approach

Linear Network Coding for Multiple Groupcast Sessions: An Interference Alignment Approach Linear Network Coding for Mutipe Groupcast Sessions: An Interference Aignment Approach Abhik Kumar Das, Siddhartha Banerjee and Sriram Vishwanath Dept. of ECE, The University of Texas at Austin, TX, USA

More information

Precoding for the Sparsely Spread MC-CDMA Downlink with Discrete-Alphabet Inputs

Precoding for the Sparsely Spread MC-CDMA Downlink with Discrete-Alphabet Inputs IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.*, NO.*, MONTH 2016 1 Precoding for the Sparsey Spread MC-CDMA Downin with Discrete-Aphabet Inputs Min Li, Member, IEEE, Chunshan Liu, Member, IEEE, and Stephen

More information

Forty-Seventh Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 30 - October 2, 2009

Forty-Seventh Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 30 - October 2, 2009 Forty-Seventh Annua Aerton Conference Aerton House, UIUC, Iinois, USA September 30 - October 2, 2009 On systematic design of universay capacity approaching rate-compatibe sequences of LDPC code ensembes

More information

Nearest Neighbor Decoding and Pilot-Aided Channel Estimation for Fading Channels

Nearest Neighbor Decoding and Pilot-Aided Channel Estimation for Fading Channels Nearest Neighbor Decoding and Piot-Aided Channe Estimation for Fading Channes A. Taufiq Asyhari, Tobias Koch and Abert Guién i Fàbregas arxiv:30.223v2 [cs.it] 8 Apr 204 Abstract We study the information

More information

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is

More information

Control with Minimum Communication Cost per Symbol

Control with Minimum Communication Cost per Symbol Contro with Minimum Communication Cost per ymbo Justin Pearson, João P. Hespanha, Danie Liberzon Abstract We address the probem of stabiizing a continuous-time inear time-invariant process under communication

More information

Approximate Bandwidth Allocation for Fixed-Priority-Scheduled Periodic Resources (WSU-CS Technical Report Version)

Approximate Bandwidth Allocation for Fixed-Priority-Scheduled Periodic Resources (WSU-CS Technical Report Version) Approximate Bandwidth Aocation for Fixed-Priority-Schedued Periodic Resources WSU-CS Technica Report Version) Farhana Dewan Nathan Fisher Abstract Recent research in compositiona rea-time systems has focused

More information

Adaptive Joint Self-Interference Cancellation and Equalization for Space-Time Coded Bi-Directional Relaying Networks

Adaptive Joint Self-Interference Cancellation and Equalization for Space-Time Coded Bi-Directional Relaying Networks 1 Adaptive Joint Sef-Interference Canceation and Equaization for Space-Time Coded Bi-Directiona Reaying Networs Jeong-Min Choi, Jae-Shin Han, and Jong-Soo Seo Department of Eectrica and Eectronic Engineering,

More information