Distributed Queue-Length based Algorithms for Optimal End-to-End Throughput Allocation and Stability in Multi-hop Random Access Networks

Size: px
Start display at page:

Download "Distributed Queue-Length based Algorithms for Optimal End-to-End Throughput Allocation and Stability in Multi-hop Random Access Networks"

Transcription

1 Distribute Queue-Length base Agorithms for Optima En-to-En Throughput Aocation an Stabiity in Muti-hop Ranom Access Networks Jiaping Liu Department of Eectrica Engineering Princeton University Princeton, NJ 08544, USA Aexaner L. Stoyar Be Labs, Acate-Lucent 600 Mountain Ave, 2C-322 Murray Hi, NJ 07974, USA Abstract We consier a moe of wireess network with ranom (sotte-aoha-type) access an with muti-hop fow routes. The goa is to evise istribute strategies for optima utiity-base en-to-en throughput aocation an queueing stabiity. We consier a cass of queue back-pressure ranomaccess agorithms (QBRA), where actua queue engths of the fows (in each noe s cose neighborhoo) are use to etermine noes channe access probabiities. This is in contrast to previousy propose agorithms, which are purey optimizationbase an obivious of actua queues. QBRA is aso substantiay ifferent from much stuie MaxWeight type scheuing agorithms, aso using back-pressure. For the moe with infinite backog at each fow source, we show that QBRA, combine with simpe congestion contro oca to each source, eas to optima en-to-en throughput aocation, within the network saturation throughput region achievabe by a ranom access. (No en-to-en message passing is require.) This scheme generaizes for the case of aitiona, minimum fow rate constraints. For the moe with stochastic exogenous arrivas, we show that QBRA ensures stabiity of the queues as ong as nomina oas of the noes are within the saturation throughput region. Simuation comparison of QBRA an (queue obivious) optimization-base ranom access agorithms, shows that QBRA performs better in terms of ento-en eays. I. INTRODUCTION In wireess a hoc networks, contention resoution an interference avoiance among inks are among the most important issues, which motivates the extensive stuy of wireess meium access contro (MAC) protocos. The stanar MAC protoco currenty use in IEEE [3] is the Distribute Coorination Function (DCF) with Binary Exponentia Backoff (BEB) mechanism. However, it has been concue by many researchers that DCF an BEB mechanism for contention contro can be inefficient (eg. [6]). Thus, there are significant chaenges in esigning MAC protocos that are both efficient (in terms of throughput, atency, energy consumption, etc.) an aow istribute impementation minimizing signaing (message passing) overhea. It has been shown that the maximum throughput region can be achieve by much stuie MaxWeight -type scheuing agorithms (originay propose in [8]). However, in the context of wireess networks, MaxWeight agorithms This research was in part supporte by the DARPA CBMANET proect typicay nee to be centraize. Ranom access ( Sotte- Aoha-type ) agorithms typicay provie smaer throughput regions, but are simper an more amenabe to istribute impementations. In this paper we consier a moe of ranom access with muti-hop transmissions. Ranom access moes have been wiey aopte in contemporary works [1], [2], [4], [5], [7], [9]. Informay, we can cassify them into two categories: pure optimization-base agorithms (eg. [4], [5], [9]) an ynamic, queue-ength base strategies (eg. [2], [7]). Agorithms of the former type (eg. [4], [5], [9]) sove an optimization probem that aocates network resources (e.g. effective ink throughputs) to satisfy an/or optimize traffic emans of ifferent fows; they require optimization parameters to be a priori specifie an are typicay obivious of the ynamics of actua queues in the network. The atter type agorithms ( [2], [7]), even in cases when they have same optimization obective as the former agorithms, o the optimization by aaptivey responing to actua queueing ynamics; for exampe, they o not nee a priori knowege of traffic fow input rates to achieve queueing stabiity (if such is feasibe). In this paper we propose an stuy a cass of queue backpressure ranom access (QBRA) agorithms for a mutihop network. The agorithms use fow queue ifferentias on the inks to etermine ink access probabiities. (The MaxWeight agorithms use queue ifferentias as we, but in a competey ifferent way.) Our main contributions are as foows. (i) For the probem of utiity-base en-to-en throughput aocation (in Section V), when traffic sources have infinite backog of ata to sen, we prove that QBRA combine with extremey simpe congestion controer at each fow source, soves the probem of weighte proportiona fair (sum-og utiity) en-to-en throughput aocation among the fows. We aso prove an extension of this resut for the case of aitiona minimum fow-rate constraints. (This generaizes an much strengthens the corresponing resut of [2], which appies to singe-hop fows. A further generaization - to more genera utiity functions - is aso possibe; this is subect of future work.) (ii) For the probem of queueing stabiity in a system with stochastic exogenous arrivas (in Section VI), we prove

2 that QBRA automaticay (without knowing input rates) ensures stabiity, as ong as nomina ink oas are within the network saturation throughput region. (This generaizes some of the stabiity resuts of [7], which appy to singe-hop fows.) (iii) Finay, we present simuation resuts (in Section VII) showing goo performance of QBRA in terms of en-to-en eays. II. BASIC NOTATION AND DEFINITIONS Typicay, we use bo etters x,y,... to enote vectors, as oppose to scaars x,y. We use the notations R,R + an R ++ for the set of rea, rea non-negative an rea positive numbers, respectivey. Corresponingy, -times prouct spaces are enote as R, R + an R ++. We write x y to enote scaar prouct, an x = x x for the Euciean norm, inucing stanar metric. Carinaity (i.e. the number of eements) of a finite set A is enote by A. We enote [z] + = max{z,0}. We use,,, for componentwise vector inequaities, e.g. x y means x i > y i, i. For any scaar function T : R R, T(x) = (T(x 1 ),,T(x )) an for any subset C R, T(C) = {T(v) : v C}. A. Wireess Network Moe III. SYSTEM MODEL We consier a wireess muti-hop network escribe as a irecte graph G = (N, L), where N is the set of noes an L is the set of the ogica (irecte) communication inks between pairs of noes; t an r are the transmitter an receiver noes of ink, respectivey. There is a finite number of traffic fows, inexe by r R; each fow has fixe source an estination noes, an a fixe route. (We wi use term fow an route interchangeaby, an use inex r either one.) Let L r L enote the set of inks on route r, an inex inks L r from source to estination in an ascening orer as (r,), = 1,2,3,. We aso assume each noe keeps separate queues of ata packets of ifferent fows. Let enote the queue ength of fow r packets ocate in the transmitter noe t of ink L r. To simpify notation, we often write to mean (r,), i.e. for the queue ength of fow r at -th noe in its route. The system operates in iscrete (or, sotte) time t = 0, 1, 2,... In any time sot, each noe may attempt to transmit one packet on (at most) one of its outgoing inks. A packet transmission attempt on a ink is successfu, if it is not interfere by another simutaneous (same sot) transmission; otherwise the transmission fais. The interference moe is same as in [2], [7] (an is somewhat more genera than in [9]). First, any transmission attempt to a noe wi fai if this noe is transmitting. Secon, if there are two or more simutaneous transmissions to the same noe, they a fai. Thir, for each noe n there is the set of noes N n N it interferes with, namey, a transmission to any noe in N n wi fai if noe n transmits. (Note that accoring to our interference moe, n N n an D n N n, where D n N \n is the set of noes m such that noe n has ata to sen. ) In summary, a transmission attempt on ink L is successfu if an ony if no noe in the set {n : n t,r N n } transmits. For each n et us efine S n = { L : r N n }. (This set incues inks originating at n an inks interfere by transmissions from n.) We consier the ink epenence graph as efine in [2], i.e. the irecte graph with vertices being inks L, an the ege from to another vertex L exists if an ony if S t. Throughout the paper we assume the strong connectivity of the ink epenence graph, which assumes that there exists a irecte path between any two vertices. B. Saturation Throughput Region an its Properties Suppose the network empoys a sotte-aoha-type ranom access. Reca that each noe keeps separate queues for the packets of ifferent fows. In each time sot t, noe n attempts a transmission with probabiity P n, an chooses to transmit ata from queue on ink with conitiona probabiity p (r) /P n, where p (r) 0 is efine for each pair (r,) such that n = t an L r. Thus, p (r) is the resuting probabiity of transmission of cass r packets on ink, an P n = p (r) 1, n N. (1) r: L r :n=t We efine P as the set of a feasibe vectors of ink access probabiities p = {p (r), L r, r R}. Obviousy, P = {p [0,1] : P n 1, n N }, (2) where =. Given p P, the transmission attempts by a noes are inepenent, an then the resuting average successfu transmission rate (or, average throughput) aocate to fow r on the ink L r is µ (r) (p) = p (r) n t,r N n (1 P n ). (3) We wi use notation µ(p) = {µ (r) (p), L r, r R}. Definition 1: We efine the system saturation throughput region M as the set of a possibe µ(p), aong with the vectors ominate by them, namey, M = {v [0,1] : p P, s.t. v µ(p)}. (4) We aso efine og-throughput region og M as og M = {u = og v : v M,v R ++} an its Pareto ( north-east ) bounary as [og M] ={u og M: if u u og M, then u = u } Proposition 1 ( [2]): Log-throughput region og M is stricty convex an the bounary [og M] is a smooth ( 1)-imensiona surface in R, which can be parameterize by the vectors of positive ink weights w = {w (r), L r, r R} R ++, as foows. Vector u [og M] if an ony if there exists unique (up to scaing by a positive constant) ink weights vector w R ++ such that u is the unique soution of the probem max w u s.t. u og M,

3 or an equivaent probem max w og v s.t. v M. Moreover, the unique set of access probabiities p such that u = og µ(p) is given by p (r) = w (r) i S n k:i L k w (k) i, (5) where n = t is the transmitter noe of ink. We wi enote by p(w) the function given by (5), an for future reference aopt the convention that p (r) = 0 when w (r) = 0. (This makes p(w) we efine for a w R +, an not ust w R ++, because w (r) > 0 guarantees that the enominator in (5) is positive as we.) The important feature of expression (5) is that the enominator is essentiay the sum of the weights of a inks the transmitting noe n interferes with (pus the ink originating at n itsef), an so noes can compute their access probabiities very efficienty, using imite information exchange within their oca neighborhoo. (See [2], [7] for more etais.) C. Queueing Dynamics The generic queuing ynamics in the ranom access network escribe above is as foows. (We o not iscuss here how new packets arrive in the networks an how access probabiities are set. This wi be specifie ater.) Let A (r) (t) enote the number of (exogenous) ata packet arrivas at the source noe (r,1) of fow r in time sot t, an (t), = 1,..., L r, is the queue ength of type r packets at the (transmitter noe of) ink (r, ) at time t. (Reca convention = (r,).) Then, { (t) + A (r) (t) h (r) (t), = 1 (t + 1) = (t) + h (r) (t) h(r) (t), 1 < < L r where h (r) = 1 if there is a successfu transmission of a fow r packet on ink (r,) in sot t, an h (r) = 0 otherwise. IV. DYNAMIC QUEUE-BACKPRESSURE RANDOM ACCESS In this section we introuce a ynamic istribute agorithm, cae Queue-Backpressure Ranom Access (QBRA), which is the main subect of this work. The agorithm generaizes Queue Length Base Ranom Access (QRA) scheme, introuce in [2], [7] for the specia case of our moe, where a routes have ength one. Uner QRA, noes choose their access probabiities p ynamicay, accoring at time t being a (t). In the (t). (See [2], [7] for more genera weight functions.) Uner QBRA agorithm, noes aso ynamicay choose to formua (5), with ink weights w (r) fixe function of the its current queue ength simpest form, w (r) = access probabiities p accoring to (5), with the weight w (r) of fow r on ink (r,) at time t being set to the current queue ifferentia, efine as foows: (t) = [ ] + (t) +1 (t),1 < Lr, (t), =. (6) As usua, we ientify an (r,), an enote by Q the vector of a in the network. Obviousy, uner QBRA a transmission of a fow r packet at time t on ink (r,) wi not be attempte uness (t) +1 (t) > 0. This easiy impies that if inequaity (t) +1 (t) 1, (7) hos for fow r on ink (r,) at time t = 0, it then hos for a t. In a cases consiere throughout this paper, (7) in fact hos for a fows an inks at time 0 an then for a t. V. UTILITY BASED END-TO-END THROUGHPUT ALLOCATION In this section we stuy the scenario where the sources of a ata fows are saturate, i.e. have infinite amount of ata to sen. Informay, the probem is to aocate throughputs x (r) to fows r aong their respective routes in the network (by setting access probabiities of a noes) in a way that maximizes weighte proportiona fairness obective r θ(r) og x (r), where θ (r) > 0 are fixe weights. This probem was consiere in [9], where two istribute iterative agorithms for setting access probabiities were propose an prove optima; these approaches an resuts were generaize in [4]. However, the soution approaches in [4], [9], base on the the ua an the prima agorithms in convex optimization, both nee en-to-en feeback information to upate variabes maintaine by the noes. This may inuce increase eays ue to the en-to-en signaing aong the route, especiay in arge-scae networks. Moreover, the optimization-base agorithms of [4], [9] are obivious of the actua queueing ynamics in the network, which aso may egrae performance metrics, incuing eays. The purpose of this section is to prove that the above probem can be sove by QBRA agorithm as we. The soution is very simpe. Each fow r source maintains a constant queue ength 1, proportiona to θ(r), at the fow source noe. Then, as we show, the ynamics of the network queues uner QBRA is such that the queue ength converge to the vaues that inuce access probabiities resuting in the optima en-to-en throughput aocation. Since QBRA ony uses oca message passing between neighboring noes, one can say that QBRA provies a more istribute soution to the probem, than those in [9]. The soution provie by QBRA is asymptoticay optima in the foowing sense. Queues at the source noes are maintaine equa to θ (r) /η, where η > 0 is a (sma) scaing parameter. This means that, roughy speaking, parameter η scaes up a queues in the network by arge factor 1/η. The optimaity is achieve when η becomes infinitey sma. Consequenty, our resuts concern fui imits of the queue ength process, which are (roughy) the imits of the process uner ηq(t/η) space an time scaing, as η 0. Finay, in this section we show that QBRA aso soves a more genera probem, with aitiona, minimum en-to-en throughput requirements, x (r) λ (r).

4 A. Probem Formuation The probem is to operate our ranom access network in a way such that the average en-to-en fow throughputs x (r) maximize r θ(r) og x (r), where θ (r) > 0 are fixe parameters, whie keeping a the queues in the network stabe. This in particuar means that we want x (r) to be those given (as x (r) = 1 ) by a soution of the foowing optimization probem for the average ink-fow throughputs v: max v M subect to θ (r) og 1, v(r), = 2,..., L r, r R, (8) (Here we use notationa convention = (r,), an we use simiar ones ater in the paper.) Since any optima soution to (8) must be such that v 0, probem (8) can be equivaenty written in terms of og-throughputs u = og v: max u og M subect to θ (r) u (r) 1, u (r) u(r), = 2,..., L r, r R. (9) Since region og M is stricty convex by Proposition 1, the optima soution u to (9) is unique. (An then v such that u = og v is the unique soution of (8). Moreover, again using Proposition 1 an consiering the Lagrangian for the probem (9) (given in (15) beow), it is easy to estabish the foowing facts. The optima ink throughputs aocate to each fow aong its route are a equa: u (r) 1 =... = u (r), r R; (10) the optima ua variabes, = 2,..., L r, r R, corresponing to the inequaity constraints in (9), are unique an are such that: = θ (r) > 2 >... > > 0, r R. (11) We wi put by convention 1 = θ (r), an use vector notation q = {, L r, r R}. We aso enote by q 0 the vector with components { (r) q +1, 1 <,, =. (12) Again consiering the Lagrangian for probem (9), it is easy to see that u = arg max u og M q u, which means that q is nothing ese but the (unique) vector of weights, which resuts in the optima rates v, i.e. v = µ(p( q)). B. Appication of QBRA agorithm. Fui Limit The appication of QBRA to sove probem (8) is as foows. A (sma) parameter η > 0 is fixe. Each fow r source maintains a constant queue ength 1 = θ (r) /η, at the fow source noe. (Here is the integer part of of a number.) It can aways o that, because the source has infinite amount of ata, an it can simpy a a new packet in the queue after each successfu transmission from it. Otherwise, the QBRA in the network works exacty as efine earier. Without oss of generaity, we can assume that at time t = 0, the reations (7) ho (for exampe, a queues on each route are 0, except the first queue), an so (7) hos for a t. We consier the fui imit asymptotic regime. Namey, we ook at a sequence of system, with parameter η 0. For each system we consier the space-time rescae queueing process ηq(t/η) in continuous time t 0, an then consier the process-eve imit of those, as η 0. The foowing fact, prove essentiay same way as the anaogous resut in [7], roughy speaking says that any imiting process is concentrate on the famiy of (continuous) traectories q(t), t 0, cae fui sampe paths, an escribes their basic properties. (We omit the proof here - it foows essentiay same argument as that use for anaogous resut in [7].) Proposition 2 (Fui Limit): The sequence of rescae processes ηq(t/η), t 0, can be constructe on a common probabiity space in a way such that, with probabiity 1, the sequence of reaizations has a subsequence converging (uniformy on compact sets) to a Lipschitz continuous traectory q(t), t 0, cae fui sampe path (FSP). The famiy of FSPs satisfies, in particuar, the foowing properties. For each r, θ (r) (t) 1 For each r an 1 < L r, { t q(r) (t) = (t) q(r) (t)... q(r) (t) 0. (13) [ where v(t) is such that 2 (t) v(r) (t), > 0, (t) v(r) (t)] +, = 0, v(t) arg max z M q(t) og z, (14) with the vector of queue ifferentias q(t) 0 being efine anaogousy to (12). Note that orering property (13) is the imit version of (7), an that the key property (14) foows from the fact that QBRA uses queue ifferentias as ink weights to set access probabiities via (5). We enote by D the set of a possibe FSP states q(t), i.e. those satisfying inequaities (13), an by D the subset of those q D with at east one zero component = 0. C. Asymptotic Optimaity Given the properties of optima prima an ua soutions to probem (9), u an q, respectivey, it foows immeiatey that the stationary traectory q(t) q satisfies a the FSP properties escribe in Proposition 2. Moreover, it is easy to see (anaogousy to the way it is one in [2] for a simper moe) that any stationary traectory q(t) q D, satisfying FSP properties in Proposition 2, must be such that q = q, because then q satisfies KKT conitions for probem (9). This to some egree motivates the foowing main resut of this section.

5 Theorem 1: Every FSP is such that q(t) q as t an, consequenty, v(t) v. The convergence is uniform on a FSP. Theorem 1 basicay says that, when parameter η > 0 is sma, then regaress of the initia state of the queues, the queues converge to an stay cose to the vaues which resut (via QBRA rue for access probabiity assignment) in the optima en-to-en throughput aocation. The key iea of the proof of Theorem 1 is containe in the foowing Lemma 1, which states that essentiay (up to some technica work we wi o beow) the Lagrangian of the convex optimization probem (9), L(q,u) = θ (r) u (r) L r 1 =2 ( ) u (r) u(r), (15) = q u, (16) (where, by convention, q is such that 1 = θ (r) for a r) can serve as a Lyapunov function to prove the convergence. Lemma 1: For any FSP at any time t such that q(t) D \ D, the foowing hos. The vaue of v(t), an then u(t) = og v(t), is efine by (14) uniquey, an moreover u(t) = arg max u og M q(t) u an u(t) [og M]. Consequenty, (q(t),u(t)) is a smooth function of time in a neighborhoo of t; by (16) L(q(t),u(t)) is the vaue of the convex probem ua to (9) at point q(t), an θ (r) u (r) 1 L(q(t),u(t)) 0; (17) function L(q, u) is smooth in a neighborhoo of (q(t), u(t)), an has zero partia graient on prima variabes u at (q(t),u(t)): Finay, u L(q(t),u(t)) = 0. (18) t L(q(t),u(t)) = =2 ) ( (t) ( (t) u (r) ) (t) u(r) (t) (19) 0, (20) an the inequaity in (20) is strict uness q(t) = q. Proof: If q(t) D \ D, then, by Proposition 1, in the neighborhoo of this point the epenence of v(t) on q(t) is given by the (expicit) smooth function v(p(q)). Obviousy, the epenence u = og v is smooth as we. Then, a the properties escribe in the emma easiy foow, using in particuar the smoothness of the bounary [og M]. Inequaity (20) hos because each ifference (t) (t) obviousy has same sign as u (r) (t) u(r) (t); a such ifferences cannot be simutaneousy equa to 0 uness q(t) = q, because otherwise a stationary traectory sitting at a point ifferent from q wou exist. In aition to the key Lemma 1, we nee some auxiiary resuts to prove Theorem 1. Lemma 2: For any FSP an any time t 0, there exists an arbitrariy cose to t time s > t, such that q(s) 0, i.e. q(s) D \ D. Proof: Let us ca a ink-route pair (,r) such that R a virtua ink. For a given FSP, et us ca (,r) a zero (resp. non-zero ) virtua ink at time t if = 0 (resp. > 0). Suppose there are some zero virtua inks at time t. (If not, the emma statement is trivia.) Since traectory q( ) is continuous, to prove statement of the emma it wi suffice to show that there exists time s > t, arbitrariy cose to t, such that at east one virtua ink which was zero at t becomes non-zero at s. Consier two cases. Case (a): Suppose on one of the routes r, there is a non-zero virtua ink foowe by a zero one, that is (t) > 0 an (t) = 0. (This is the situation where a transmission on the -th ink kis a simutaneous transmission on the 1- th ink.) Then, it is easiy seen from (14) that (t) = 0, (t) > 0, an both these functions are continuous in time at t. Then, by (14), has positive, boune away from 0, erivative in the interva (t,t + ǫ), with sma ǫ > 0. In the same time interva, aso by (14), the erivative of +1 is upper boune by an arbitrariy sma δ > 0, if we choose sma enough ǫ > 0. (If = L r, then +1 (t) 0 by convention.) These facts mean that (s) > 0 for a s (t,t + ǫ). We are one with case (a). Case (b) = [NOT Case (a)]: At time t, aong each route r, there is a (possiby empty) sequence of zero virtua inks at the beginning, foowe by the (efinitey non-empty) sequence of non-zero virtua inks unti the en of the route. In this case, there is at east one zero virtua ink, et it be the -th ink on route r, such that it either shares a ink with a non-zero virtua ink, or it interferes with transmissions on a non-zero virtua ink. (The atter observation uses strong connectivity of the ink epenence graph.) Either way, (t) = 0 an it is continuous at time t. For the first non-zero virtua ink on this route, say m-th with m >, v m (r) (t) > 0 an is continuous at t. Then, using (14) we easiy see that, in a sma interva (t,t + ǫ), s [q(r) +1 (s) q(r) m (s)] < C, for some C > 0 inepenent of ǫ; an in the same interva s q(r) (s) > δ, where δ > 0 can be mae arbitrariy sma by choosing sma ǫ. We concue that for any s (t,t+ǫ), we must have (s) > (s) for at east one, + 1 m, an therefore one of the virtua inks from -th to m 1-th must be non-zero at time s. Lemma 3: For any FSP, q(t) 0 for a t > 0. Proof: In view of Lemma 2, it suffices to show that if q(t) 0 for t = s > 0, then this hos for a t s as we. Suppose not, an τ, s < τ <, is the first time after s when q(t) hits set D. This means that there exists

6 a subset of virtua inks which simutaneousy become zero at time τ. However, consiering the vaues of (t) for t cose to τ, an essentiay repeating the argument in the proof of Lemma 2, we can show that for at east one of those inks, (t) must in fact be increasing for such t - a contraiction. Proof of Theorem 1. Accoring to Lemma 2, for any FSP at any time t > 0, we are in the conitions of Lemma 1. In particuar, this means that the uniform boun (17) ho. Thus, to prove the uniform convergence q(t) q it remains to show that the negative erivative tl(q(t),u(t)), given by (19), is boune away from zero as ong as q(t) is outsie of an ǫ-neighborhoo of q. This is obvious if vaues of q(t) are confine to a compact set, not intersecting with D. To show that it is sti the case within the entire set D\ D, it remains to observe the foowing. If point q approaches an arbitrary point a D, the erivative tl at q approaches, because for at east one virtua ink, the corresponing (see (19)) approaches 0 whie is not, or vice versa. (Here, again, we essentiay repeat the argument of Lemma 2.) D. Generaization: Systems with Minimum Fow Rate Requirements In practica systems, a minimum rate ower boun is often require on the en-to-en throughput to guarantee Quaity of Service of the ata transfers. Accoringy, Theorem 1 can be generaize to incue such aitiona constraints. More precisey, suppose that, aitionay, the en-to-en throughput aocate to each fow r nees to be at east λ (r) 0. Formay, the more genera optimization probem (which we wi write irecty in terms of og-throughputs u = og v, as in (9)) is max u og M subect to θ (r) u (r) 1, u (r) u(r), = 2,..., L r, r R, og λ (r) u (r) 1, r R. (21) We wi assume that probem (21) is feasibe, an moreover a inequaity constraints can be satisfie as strict inequaities. (This wi be referre to as the feasibiity conition.) Then, there exists a unique optima soution u such that (10) hos, an the optima ua soution y (r),, = 2,..., L r, r R, where y (r) are the uas corresponing to the minimum throughput constraints. The generaize version of (11) is: 1 θ (r) + y (r) > 2 >... > > 0, r R, (22) q 0 is efine as in (12), an, again, u = arg max u og M q u. Appication of QBRA in this case uses a virtua queue Y (r), maintaine by each fow r source noe. Tokens are ae to Y (r) at the average rate λ (r) (tokens/sot); one token is remove from it (if there is any) in every sot when a packet of fow r is successfuy transmitte (from source noe). As oppose to the previous situation, source noe uses not the constant vaue θ (r) /η as the queue ength 1, but rather the variabe 1 (t) = θ(r) /η +Y (r) (t). Otherwise, the QBRA in the network works exacty same way as before. An FSP now contains aitiona component y (r) (t) for each r, which is a imit of ηy (t/η), an it satisfies conition { λ (r) t y(r) 1 (t), q(r) > 0, (t) = [λ (r) 1 (t)]+, = 0, in aition to (14). If we enote, by convention, 1 (t) θ (r) + y (r) (t), then the key conition (14) etermining v(t) sti hos. The generaization of Theorem 1 is the foowing. Theorem 2: Assume the feasibiity conition. Then, uniformy on a FSP with initia states q(0) within arbitrary fixe compact set, q(t) q as t an, consequenty, v(t) v. Theorem 2 both generaizes an much strengthens a resut of [2], which appies to QBRA in a system with one-hop routes an states ony that if convergence q(t) q hos then q = q. Proof of Theorem 2 is carrie out anaogousy to that of Theorem 1. We o not provie etais here, ust the foowing key points. The Lagrangian in this case, which serves as a Lyapunov function in the proof, is: L(q,u) = θ (r) u (r) L r 1 =2 y (r) ( og λ (r) u (r) 1 ( ) u (r) u(r) = q u y (r) og λ (r), (23) where, by convention, for those fows r with λ (r) = 0, we have y (r) 0 an y (r) og λ (r) = 0. For each FSP, the bouns (17) generaize as θ (r) u (r) 1 L(q(t),u(t)) L(q(0),u(0)) y (r) (0)og λ (r). (24) As in the proof of Theorem 1, an important intermeiate step is showing that q(t) 0 for a t > 0 - this is one anaogousy to the arguments in Lemmas 2 an 3. VI. STOCHASTIC STABILITY OF A NETWORK WITH EXOGENOUS ARRIVALS We now turn to a version of our moe, where fow sources o not have an infinite suppy of ata to sen, but rather there is a ranom process of exogenous arrivas to a the first queue 1 at the fow source noe. For simpicity et us assume that each such arriva process A (r) (t), t = 1,2,... is i.i.. with the average rate λ (r) = E[A (r) (t)] > 0, an a arriva processes are inepenent. (The i.i.. an )

7 inepenence assumptions can be greaty reaxe. Aso, it is not an accient that here we use the same symbo λ (r) for the input rate as we use use for the minimum rate boun in Section V-D; the reason wi become cear shorty.) Consier such a network uner QBRA ranom access scheme. The question is uner which conitions the queueing process Q(t), t = 0,1,2,..., in the network is stabe. If we assume (for further simpicity) that P{A (r) (t) = 0} > 0 for each r, then it is cear that Q(t) is a countabe state space, irreucibe, aperioic Markov chain. By stabiity we unerstan its ergoicity. Note that, without oss of generaity we can assume that the queueing orer reations (7) ho aong each route at a times. The main resut of this section is the foowing Theorem 3: Suppose input rates λ (r) > 0, r R, satisfy the feasibiity conition, as given in Section V-D. Then the network queueing process is stabe. This theorem generaizes to the muti-hop setting one of the stabiity resuts in [7], which appy to the singe-hop system. (It shou be note that our proof, outine beow, is substantiay ifferent from that in [7], even though both use fui imits.) We wi use the fui imit technique to estabish Theorem 3. (See [7] for an appication of the technique to a ranom-access system, an references therein to a genera theory.) With this technique, we ook at the fui imit, efine anaogousy to the way escribe in Section V-B. (It is important to emphasize that the QBRA agorithm in the network oes not use parameter η in any way. This is true for the use of QBRA in Section V as we, but there traffic sources use parameter η to ecie when to sen new packets. In this section, parameter η is ony use to efine the fui imit asymptotic regime.) In our case, the FSPs turn out to satisfy the same properties as those for the FSPs in Section V-D, but speciaize to the case θ (r) = 0 for a r. (This is not an accient - it is easy to observe that if in Section V-D we were to assume that a θ (r) = 0, then the behavior of each virtua queue Y (r) there wou be anaogous to the behavior of actua queue 1 in this section setting.) Then, accoring to fui imit technique, to prove Theorem 3 it suffices to prove the foowing Theorem 4: There exists T > 0 such that, uniformy on a FSPs with q(0) = 1, we have q(t) = 0 for a t T. Proof of Theorem 4 is, again, anaogous to the proof of the convergence resuts in Theorems 1 an 2. We omit fu etais, but the key points are as foows. Since a θ (r) = 0, an consequenty y (r) (t) 1 (t), the Lagrangian in (23) speciaizes to L r ( ) L(q,u) = u (r) u(r) =2 ( ) 1 og λ (r) u (r) 1 Fow 3 1(3,1) 1 2 2(1,4) Fig. 1. 4(3,2) 3(1,3) 3 4 Fow 1 Fow 2 7(2,1) 5(3,3) 6(2,2) A 6-noe a-hoc network = q u 6 8(1,2) 9(1,1) 1 og λ (r). (25) This Lagrangian is use as Lyapunov function, an for each FSP we have the bouns 0 L(q(t),u(t)) 1 (0)og λ(r). (26) In particuar, if q(0) = 1, L(q(t),u(t)) r og λ(r). Using arguments anaogous to those in Lemmas 2 an 3, we can show that for a t > 0 a subset of components of q(t) cannot hit 0, uness a components hit 0 simutaneousy; this impies that q(t) 0 for a 0 < t < t, where t is the first, possiby finite time when q(t) = 0, an then q(t) = 0. For a 0 < t < t, we have, anaogousy to (19), t L(q(t),u(t)) = ( ) ( ) λ (r) 1 (t) og λ (r) u (r) 1 (t) L r ( ) ( ) (t) v(r) (t) u (r) (t) u(r) (t) (27). =2 Finay, we observe that the RHS of (27) not ony is nonpositive, but in fact boune away from 0 by a negative constant ǫ, uniformy on a possibe u [og M]. Thus, L(q(t),u(t)), an then q(t), must hit 0 within a uniformy boune time. The fact that q(t) cannot eave 0 after first hitting it easiy foows. VII. NUMERICAL EXAMPLE In this section we investigate performance of QBRA via a numerica exampe. We consier a simpe 6-noe, 3-route a hoc network as shown in Figure 1, which has the same network topoogy as the secon exampe in [9]. The noes are abee from 1 to 6, an the inks are abee from 1 to 9 an the route-ink pair as in the format (r,), i.e. 5(3,3) enotes the ink 5 in L which is the 3r ink of route 3. The interference moe is that each noe interferes with the reception at its 1-hop neighbors; for exampe, N 2 = {1,2,3}, N 3 = {2,3,4,5,6}. The behavior of QBRA for the optima en-to-en fow throughput aocation, with an without minimum throughput constraints is as preicte by Theorems 1 an 2 in Section V. We o not present those simuations to save space. Instea 5

8 Q (1) Q (2) Q (3) QBRA OPT λ (1) (a). Route 1: Q (1) = Q (1) 1 + Q (1) 2 + Q (1) 3 + Q (1) QBRA OPT λ (2) (b). Route 2: Q (2) = Q (2) 1 + Q (2) 2. QBRA OPT λ (3) (c). Route 3: Q (3) = Q (3) 1 + Q (3) 2 + Q (3) 3. Fig. 2. Comparison of the QBRA scheme an the optimization-base scheme on queueing performance: λ (1) = λ (2) = λ (3). we show simuation resuts for the system with exogenous arrivas, comparing queueing performance of QBRA with performance of optimization base agorithms (et s refer to them as OPT), such as that in [9]. First, we want to emphasize that, even when QBRA an OPT are appie to sove the same probem, such as (9), there are significant ifferences between them: QBRA upates network variabes base on queue-engths, whie OPT are obivious of the rea queues; QBRA can be impemente by noes exchanging queueing information within oca neighborhoos, whie OPT require en-to-en message passing aong each fow route. When we tak about proviing queueing stabiity in a system with exogenous arrivas, the ifference is even more pronounce: OPT wou require estimation of the fow input rates to be use in the appropriate optimization probem to cacuate ink access probabiities resuting in sufficient ink throughputs aong each route; QBRA nee not know or estimate input rates an ensures stabiity automaticay (when feasibe). We simuate a system with exogenous (i.i.. Poisson) arrivas with equa rates for a fows, λ (1) = λ (2) = λ (3) an scae them up to observe the changes of the queue engths. The QBRA works exacty as specifie in Section VI. An OPT agorithm that we simuate works as foows: we a priori pre-cacuate ink access probabiities so that the resuting en-to-en rates x (r) provie to the fows are maxima, subect to x (1) = x (2) = x (3). (In other wors, we preten that an optimization base agorithm is run a priori to cacuate appropriate access probabiities.) OPT is obivious of the queue engths, except if there is no packets at a ink, the ink oes not attempt transmission. We stuy the tota average queue ength of each fow r (which by Litte aw is proportiona to the en-to-en queueing eay): = Q(r). Figure 2 compares Q (1),Q (2),Q (3) uner the QBRA an OPT. It shows that the average queues uner QBRA are significanty ower than the optimization-base agorithm. An intuitive expanation of this is that QBRA better aapts to the current queue ength in the network. REFERENCES [1] N. Abramson. The ALOHA system - another aternative for computer communications. In Proceeings of AFIPS Conference, voume 37, pages , [2] P. Gupta an A. Stoyar. Optima throughput aocation in genera ranom-access networks. In Proceeings of the 38th Conference on Information Sciences an Systems, March [3] IEEE. Wireess an meium access contro (mac) an physica ayer (phy) specificationsieee stanar , June IEEE Stanar [4] J. W. Lee, M. Chiang, an R. A. Caerbank. Jointy optima congestion an contention contro in wireess a hoc networks. IEEE Communications Letters, 10(3): , [5] J. W. Lee, M. Chiang, an R. A. Caerbank. Utiity-optima ranomaccess contro. IEEE Transactions on Wireess Communications, 6(7): , Juy [6] T. Nanagopa, T.-E. Kim, X. Gao, an V. Bharghavan. Achieving mac ayer fairness in wireess packet networks. In Proceeings of ACM MobiCom, pages 87 98, [7] A. Stoyar. Dynamic istribute scheuing in ranom access networks, Submitte. [8] L. Tassiuas an A. Ephremies. Stabiity properties of constraine queueing systems an scheuing poicies for maximum throughput in mutihop raio networks. IEEE Transactions on Automatic Contro, 37: , [9] X. Wang an K. Kar. Cross-ayer rate contro for en-to-en proportiona fairness in wireess networks with ranom access. In Proceeings of MobiHoc, 2005.

Transport Cost and Optimal Number of Public Facilities

Transport Cost and Optimal Number of Public Facilities Transport Cost an Optima Number of Pubic Faciities Kazuo Yamaguchi Grauate Schoo of Economics, University of Tokyo June 14, 2006 Abstract We consier the number an ocation probem of pubic faciities without

More information

Physics 116C Helmholtz s and Laplace s Equations in Spherical Polar Coordinates: Spherical Harmonics and Spherical Bessel Functions

Physics 116C Helmholtz s and Laplace s Equations in Spherical Polar Coordinates: Spherical Harmonics and Spherical Bessel Functions Physics 116C Hemhotz s an Lapace s Equations in Spherica Poar Coorinates: Spherica Harmonics an Spherica Besse Functions Peter Young Date: October 28, 2013) I. HELMHOLTZ S EQUATION As iscusse in cass,

More information

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao, Vivek Raghunathan, Stephen Hany, Vinod Sharma and. R. Kumar Abstract We consider a joint power contro

More information

A Survey on Delay-Aware Resource Control. for Wireless Systems Large Deviation Theory, Stochastic Lyapunov Drift and Distributed Stochastic Learning

A Survey on Delay-Aware Resource Control. for Wireless Systems Large Deviation Theory, Stochastic Lyapunov Drift and Distributed Stochastic Learning A Survey on Deay-Aware Resource Contro 1 for Wireess Systems Large Deviation Theory, Stochastic Lyapunov Drift and Distributed Stochastic Learning arxiv:1110.4535v1 [cs.pf] 20 Oct 2011 Ying Cui Vincent

More information

SEMIDEFINITE PROGRAMMING FOR CHANCE CONSTRAINED OPTIMIZATION OVER SEMIALGEBRAIC SETS

SEMIDEFINITE PROGRAMMING FOR CHANCE CONSTRAINED OPTIMIZATION OVER SEMIALGEBRAIC SETS SEMIDEFINITE PROGRAMMING FOR CHANCE CONSTRAINED OPTIMIZATION OVER SEMIALGEBRAIC SETS A. M. JASOUR, N. S. AYBAT, AND C. M. LAGOA Abstract. In this paper, chance optimization probems are introuce, where

More information

Delay Analysis of Maximum Weight Scheduling in Wireless Ad Hoc Networks

Delay Analysis of Maximum Weight Scheduling in Wireless Ad Hoc Networks 1 Deay Anaysis o Maximum Weight Scheduing in Wireess Ad Hoc Networks ong Bao e, Krishna Jagannathan, and Eytan Modiano Abstract This paper studies deay properties o the weknown maximum weight scheduing

More information

Notes on Backpropagation with Cross Entropy

Notes on Backpropagation with Cross Entropy Notes on Backpropagation with Cross Entropy I-Ta ee, Dan Gowasser, Bruno Ribeiro Purue University October 3, 07. Overview This note introuces backpropagation for a common neura network muti-cass cassifier.

More information

Motion in Spherically Symmetric Potentials

Motion in Spherically Symmetric Potentials Chapter 7 Motion in Sphericay Symmetric Potentias We escribe in this section the stationary boun states of quantum mechanica partices in sphericay symmetric potentias V (r), i.e., in potentias which are

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR 1 Maximizing Sum Rate and Minimizing MSE on Mutiuser Downink: Optimaity, Fast Agorithms and Equivaence via Max-min SIR Chee Wei Tan 1,2, Mung Chiang 2 and R. Srikant 3 1 Caifornia Institute of Technoogy,

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 2, FEBRUARY

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 2, FEBRUARY IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO. 2, FEBRUARY 206 857 Optima Energy and Data Routing in Networks With Energy Cooperation Berk Gurakan, Student Member, IEEE, OmurOze,Member, IEEE,

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay Throughput Optima Scheduing for Wireess Downinks with Reconfiguration Deay Vineeth Baa Sukumaran vineethbs@gmai.com Department of Avionics Indian Institute of Space Science and Technoogy. Abstract We consider

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

In Coulomb gauge, the vector potential is then given by

In Coulomb gauge, the vector potential is then given by Physics 505 Fa 007 Homework Assignment #8 Soutions Textbook probems: Ch. 5: 5.13, 5.14, 5.15, 5.16 5.13 A sphere of raius a carries a uniform surface-charge istribution σ. The sphere is rotate about a

More information

Arbitrary Throughput Versus Complexity Tradeoffs in Wireless Networks using Graph Partitioning

Arbitrary Throughput Versus Complexity Tradeoffs in Wireless Networks using Graph Partitioning University of Pennsyvania SchoaryCommons Departmenta Papers (ESE) Department of Eectrica & Systems Engineering November 2006 Arbitrary Throughput Versus Compexity Tradeoffs in Wireess Networks using Graph

More information

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Brandon Maone Department of Computer Science University of Hesini February 18, 2014 Abstract This document derives, in excrutiating

More information

On bicyclic reflexive graphs

On bicyclic reflexive graphs Discrete Mathematics 308 (2008) 715 725 www.esevier.com/ocate/isc On bicycic refexive graphs Zoran Raosavjević, Bojana Mihaiović, Marija Rašajski Schoo of Eectrica Engineering, Buevar Kraja Aeksanra 73,

More information

Attention Allocation for Decision Making Queues

Attention Allocation for Decision Making Queues Attention Aocation for Decision Making Queues Vaibhav Srivastava a, Ruggero Cari b, Céric Langbort c, an Francesco Buo a a Center for Contro, Dynamica Systems, an Computation, University of Caifornia,

More information

Distinguishing mixed quantum states: Minimum-error discrimination versus optimum unambiguous discrimination

Distinguishing mixed quantum states: Minimum-error discrimination versus optimum unambiguous discrimination PHYSICAL REVIEW A 70, 030 (004) Distinguishing mixe quantum states: Minimum-error iscrimination versus optimum unambiguous iscrimination Urike Herzog 1, * an János A. Bergou 1 Institut für Physik, Humbot-Universität

More information

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity

More information

Coupling of LWR and phase transition models at boundary

Coupling of LWR and phase transition models at boundary Couping of LW and phase transition modes at boundary Mauro Garaveo Dipartimento di Matematica e Appicazioni, Università di Miano Bicocca, via. Cozzi 53, 20125 Miano Itay. Benedetto Piccoi Department of

More information

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is

More information

Optimal Distributed Scheduling under Time-varying Conditions: A Fast-CSMA Algorithm with Applications

Optimal Distributed Scheduling under Time-varying Conditions: A Fast-CSMA Algorithm with Applications Optima Distributed Scheduing under Time-varying Conditions: A Fast-CSMA Agorithm with Appications Bin Li and Atia Eryimaz Abstract Recenty, ow-compexity and distributed Carrier Sense Mutipe Access (CSMA)-based

More information

Tracking Control of Multiple Mobile Robots

Tracking Control of Multiple Mobile Robots Proceedings of the 2001 IEEE Internationa Conference on Robotics & Automation Seou, Korea May 21-26, 2001 Tracking Contro of Mutipe Mobie Robots A Case Study of Inter-Robot Coision-Free Probem Jurachart

More information

A NOTE ON INFINITE DIVISIBILITY OF ZETA DISTRIBUTIONS

A NOTE ON INFINITE DIVISIBILITY OF ZETA DISTRIBUTIONS A NOTE ON INFINITE DIVISIBILITY OF ZETA DISTRIBUTIONS SHINGO SAITO AND TATSUSHI TANAKA Abstract. The Riemann zeta istribution, efine as the one whose characteristic function is the normaise Riemann zeta

More information

Reliability: Theory & Applications No.3, September 2006

Reliability: Theory & Applications No.3, September 2006 REDUNDANCY AND RENEWAL OF SERVERS IN OPENED QUEUING NETWORKS G. Sh. Tsitsiashvii M.A. Osipova Vadivosto, Russia 1 An opened queuing networ with a redundancy and a renewa of servers is considered. To cacuate

More information

On the real quadratic fields with certain continued fraction expansions and fundamental units

On the real quadratic fields with certain continued fraction expansions and fundamental units Int. J. Noninear Ana. App. 8 (07) No., 97-08 ISSN: 008-68 (eectronic) http://x.oi.org/0.075/ijnaa.07.60.40 On the rea quaratic fies with certain continue fraction expansions an funamenta units Özen Özera,,

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

C. Fourier Sine Series Overview

C. Fourier Sine Series Overview 12 PHILIP D. LOEWEN C. Fourier Sine Series Overview Let some constant > be given. The symboic form of the FSS Eigenvaue probem combines an ordinary differentia equation (ODE) on the interva (, ) with a

More information

An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks

An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks An Adaptive Opportunistic Routing Scheme for Wireess Ad-hoc Networks A.A. Bhorkar, M. Naghshvar, T. Javidi, and B.D. Rao Department of Eectrica Engineering, University of Caifornia San Diego, CA, 9093

More information

Symbolic models for nonlinear control systems using approximate bisimulation

Symbolic models for nonlinear control systems using approximate bisimulation Symboic modes for noninear contro systems using approximate bisimuation Giordano Poa, Antoine Girard and Pauo Tabuada Abstract Contro systems are usuay modeed by differentia equations describing how physica

More information

u(x) s.t. px w x 0 Denote the solution to this problem by ˆx(p, x). In order to obtain ˆx we may simply solve the standard problem max x 0

u(x) s.t. px w x 0 Denote the solution to this problem by ˆx(p, x). In order to obtain ˆx we may simply solve the standard problem max x 0 Bocconi University PhD in Economics - Microeconomics I Prof M Messner Probem Set 4 - Soution Probem : If an individua has an endowment instead of a monetary income his weath depends on price eves In particuar,

More information

Uniformly Reweighted Belief Propagation: A Factor Graph Approach

Uniformly Reweighted Belief Propagation: A Factor Graph Approach Uniformy Reweighted Beief Propagation: A Factor Graph Approach Henk Wymeersch Chamers University of Technoogy Gothenburg, Sweden henkw@chamers.se Federico Penna Poitecnico di Torino Torino, Itay federico.penna@poito.it

More information

8 Digifl'.11 Cth:uits and devices

8 Digifl'.11 Cth:uits and devices 8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,

More information

Exploring the Throughput Boundaries of Randomized Schedulers in Wireless Networks

Exploring the Throughput Boundaries of Randomized Schedulers in Wireless Networks Exporing the Throughput Boundaries of Randomized Scheduers in Wireess Networks Bin Li and Atia Eryimaz Abstract Randomization is a powerfu and pervasive strategy for deveoping efficient and practica transmission

More information

A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC

A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC (January 8, 2003) A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC DAMIAN CLANCY, University of Liverpoo PHILIP K. POLLETT, University of Queensand Abstract

More information

Efficient Generation of Random Bits from Finite State Markov Chains

Efficient Generation of Random Bits from Finite State Markov Chains Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines Recursive Constructions of Parae FIFO and LIFO Queues with Switched Deay Lines Po-Kai Huang, Cheng-Shang Chang, Feow, IEEE, Jay Cheng, Member, IEEE, and Duan-Shin Lee, Senior Member, IEEE Abstract One

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea- Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process Management,

More information

A note on random projections for preserving paths on a manifold

A note on random projections for preserving paths on a manifold A note on ranom projections for preserving paths on a manifo Naku Verma CSE, UC San iego naverma@cs.ucs.eu Abstract Ranom projections are typicay use to stuy ow istortion inear embeings that approximatey

More information

Unconditional security of differential phase shift quantum key distribution

Unconditional security of differential phase shift quantum key distribution Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice

More information

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems Source and Reay Matrices Optimization for Mutiuser Muti-Hop MIMO Reay Systems Yue Rong Department of Eectrica and Computer Engineering, Curtin University, Bentey, WA 6102, Austraia Abstract In this paper,

More information

Estimating the Rumor Source with Anti-Rumor in Social Networks

Estimating the Rumor Source with Anti-Rumor in Social Networks Estimating the Rumor Source with Anti-Rumor in Socia Networks Jaeyoung Choi, Sangwoo Moon, Jinwoo Shin an Yung Yi Department of Eectrica Engineering KAIST, Repubic of Korea Emais: {jychoi4,mununum,jinwoos,yiyung}@kaist.ac.kr

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

Approximate message-passing inference algorithm

Approximate message-passing inference algorithm ITW 007, Lake Tahoe, Caifornia, September - 6, 007 Approximate message-passing inference agorithm Kyomin Jung Mathematics, MIT Cambrige, MA 09 kmjung@mit.eu Devavrat Shah EECS, MIT Cambrige, MA 09 evavrat@mit.eu

More information

Section 6: Magnetostatics

Section 6: Magnetostatics agnetic fieds in matter Section 6: agnetostatics In the previous sections we assumed that the current density J is a known function of coordinates. In the presence of matter this is not aways true. The

More information

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient

More information

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University

More information

A unified framework for design and analysis of networked and quantized control systems

A unified framework for design and analysis of networked and quantized control systems 1 A unified framework for design and anaysis of networked and quantized contro systems Dragan ešić and Danie Liberzon Abstract We generaize and unify a range of recent resuts in quantized contro systems

More information

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization Scaabe Spectrum ocation for Large Networks ased on Sparse Optimization innan Zhuang Modem R&D Lab Samsung Semiconductor, Inc. San Diego, C Dongning Guo, Ermin Wei, and Michae L. Honig Department of Eectrica

More information

Gauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law

Gauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law Gauss Law 1. Review on 1) Couomb s Law (charge and force) 2) Eectric Fied (fied and force) 2. Gauss s Law: connects charge and fied 3. Appications of Gauss s Law Couomb s Law and Eectric Fied Couomb s

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea-Time Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process

More information

<C 2 2. λ 2 l. λ 1 l 1 < C 1

<C 2 2. λ 2 l. λ 1 l 1 < C 1 Teecommunication Network Contro and Management (EE E694) Prof. A. A. Lazar Notes for the ecture of 7/Feb/95 by Huayan Wang (this document was ast LaT E X-ed on May 9,995) Queueing Primer for Muticass Optima

More information

Joint Congestion Control and Routing Optimization: An Efficient Second-Order Distributed Approach

Joint Congestion Control and Routing Optimization: An Efficient Second-Order Distributed Approach IEEE/ACM TRANSACTIONS ON NETWORKING Joint Congestion Contro and Routing Optimization: An Efficient Second-Order Distributed Approach Jia Liu, Member, IEEE, Ness B. Shroff, Feow, IEEE, Cathy H. Xia, and

More information

= 1 u 6x 2 4 2x 3 4x + 5. d dv (3v2 + 9v) = 6v v + 9 3v 2 + 9v dx = ln 3v2 + 9v + C. dy dx ay = eax.

= 1 u 6x 2 4 2x 3 4x + 5. d dv (3v2 + 9v) = 6v v + 9 3v 2 + 9v dx = ln 3v2 + 9v + C. dy dx ay = eax. Math 220- Mock Eam Soutions. Fin the erivative of n(2 3 4 + 5). To fin the erivative of n(2 3 4+5) we are going to have to use the chain rue. Let u = 2 3 4+5, then u = 62 4. (n(2 3 4 + 5) = (nu) u u (

More information

Distributed average consensus: Beyond the realm of linearity

Distributed average consensus: Beyond the realm of linearity Distributed average consensus: Beyond the ream of inearity Usman A. Khan, Soummya Kar, and José M. F. Moura Department of Eectrica and Computer Engineering Carnegie Meon University 5 Forbes Ave, Pittsburgh,

More information

4 Separation of Variables

4 Separation of Variables 4 Separation of Variabes In this chapter we describe a cassica technique for constructing forma soutions to inear boundary vaue probems. The soution of three cassica (paraboic, hyperboic and eiptic) PDE

More information

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver

More information

FRIEZE GROUPS IN R 2

FRIEZE GROUPS IN R 2 FRIEZE GROUPS IN R 2 MAXWELL STOLARSKI Abstract. Focusing on the Eucidean pane under the Pythagorean Metric, our goa is to cassify the frieze groups, discrete subgroups of the set of isometries of the

More information

PHYS 110B - HW #1 Fall 2005, Solutions by David Pace Equations referenced as Eq. # are from Griffiths Problem statements are paraphrased

PHYS 110B - HW #1 Fall 2005, Solutions by David Pace Equations referenced as Eq. # are from Griffiths Problem statements are paraphrased PHYS 110B - HW #1 Fa 2005, Soutions by David Pace Equations referenced as Eq. # are from Griffiths Probem statements are paraphrased [1.] Probem 6.8 from Griffiths A ong cyinder has radius R and a magnetization

More information

Duality, Polite Water-filling, and Optimization for MIMO B-MAC Interference Networks and itree Networks

Duality, Polite Water-filling, and Optimization for MIMO B-MAC Interference Networks and itree Networks Duaity, Poite Water-fiing, and Optimization for MIMO B-MAC Interference Networks and itree Networks 1 An Liu, Youjian Eugene) Liu, Haige Xiang, Wu Luo arxiv:1004.2484v3 [cs.it] 4 Feb 2014 Abstract This

More information

Problem set 6 The Perron Frobenius theorem.

Problem set 6 The Perron Frobenius theorem. Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator

More information

Primal and dual active-set methods for convex quadratic programming

Primal and dual active-set methods for convex quadratic programming Math. Program., Ser. A 216) 159:469 58 DOI 1.17/s117-15-966-2 FULL LENGTH PAPER Prima and dua active-set methods for convex quadratic programming Anders Forsgren 1 Phiip E. Gi 2 Eizabeth Wong 2 Received:

More information

Week 6 Lectures, Math 6451, Tanveer

Week 6 Lectures, Math 6451, Tanveer Fourier Series Week 6 Lectures, Math 645, Tanveer In the context of separation of variabe to find soutions of PDEs, we encountered or and in other cases f(x = f(x = a 0 + f(x = a 0 + b n sin nπx { a n

More information

Introduction to Simulation - Lecture 13. Convergence of Multistep Methods. Jacob White. Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy

Introduction to Simulation - Lecture 13. Convergence of Multistep Methods. Jacob White. Thanks to Deepak Ramaswamy, Michal Rewienski, and Karen Veroy Introduction to Simuation - Lecture 13 Convergence of Mutistep Methods Jacob White Thans to Deepa Ramaswamy, Micha Rewiensi, and Karen Veroy Outine Sma Timestep issues for Mutistep Methods Loca truncation

More information

arxiv:math/ v2 [math.pr] 6 Mar 2005

arxiv:math/ v2 [math.pr] 6 Mar 2005 ASYMPTOTIC BEHAVIOR OF RANDOM HEAPS arxiv:math/0407286v2 [math.pr] 6 Mar 2005 J. BEN HOUGH Abstract. We consider a random wa W n on the ocay free group or equivaenty a signed random heap) with m generators

More information

arxiv:quant-ph/ v3 6 Jan 1995

arxiv:quant-ph/ v3 6 Jan 1995 arxiv:quant-ph/9501001v3 6 Jan 1995 Critique of proposed imit to space time measurement, based on Wigner s cocks and mirrors L. Diósi and B. Lukács KFKI Research Institute for Partice and Nucear Physics

More information

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with?

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with? Bayesian Learning A powerfu and growing approach in machine earning We use it in our own decision making a the time You hear a which which coud equay be Thanks or Tanks, which woud you go with? Combine

More information

Equilibrium of Heterogeneous Congestion Control Protocols

Equilibrium of Heterogeneous Congestion Control Protocols Equiibrium of Heterogeneous Congestion Contro Protocos Ao Tang Jiantao Wang Steven H. Low EAS Division, Caifornia Institute of Technoogy Mung Chiang EE Department, Princeton University Abstract When heterogeneous

More information

Distributed Processing of Approximate Range Queries in Sensor Networks

Distributed Processing of Approximate Range Queries in Sensor Networks Internationa Journa of Eectrica Eectronics & Computer Science Engineering Specia Issue - NEWS 2016 E-ISSN : 2348-2273 P-ISSN : 2454-1222 Avaiabe Onine at www.ijeecse.com Distribute Processing of Approximate

More information

Heavy-traffic Delay Optimality in Pull-based Load Balancing Systems: Necessary and Sufficient Conditions

Heavy-traffic Delay Optimality in Pull-based Load Balancing Systems: Necessary and Sufficient Conditions Heavy-traffic Deay Optimaity in Pu-based Load Baancing Systems: Necessary and Sufficient Conditions XINGYU ZHOU, The Ohio State University JIAN TAN, The Ohio State University NSS SHROFF, The Ohio State

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

Target Location Estimation in Wireless Sensor Networks Using Binary Data

Target Location Estimation in Wireless Sensor Networks Using Binary Data Target Location stimation in Wireess Sensor Networks Using Binary Data Ruixin Niu and Pramod K. Varshney Department of ectrica ngineering and Computer Science Link Ha Syracuse University Syracuse, NY 344

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

More Scattering: the Partial Wave Expansion

More Scattering: the Partial Wave Expansion More Scattering: the Partia Wave Expansion Michae Fower /7/8 Pane Waves and Partia Waves We are considering the soution to Schrödinger s equation for scattering of an incoming pane wave in the z-direction

More information

The effects of an opposing buoyancy force on the performance of an air curtain in the doorway of a building

The effects of an opposing buoyancy force on the performance of an air curtain in the doorway of a building The effects of an opposing buoyancy force on the performance of an air curtain in the oorway of a buiing D. Frank, P. F. Linen Department of Appie Mathematics an Theoretica Physics, University of Cambrige,

More information

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai

More information

Componentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems

Componentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems Componentwise Determination of the Interva Hu Soution for Linear Interva Parameter Systems L. V. Koev Dept. of Theoretica Eectrotechnics, Facuty of Automatics, Technica University of Sofia, 1000 Sofia,

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

BASIC NOTIONS AND RESULTS IN TOPOLOGY. 1. Metric spaces. Sets with finite diameter are called bounded sets. For x X and r > 0 the set

BASIC NOTIONS AND RESULTS IN TOPOLOGY. 1. Metric spaces. Sets with finite diameter are called bounded sets. For x X and r > 0 the set BASIC NOTIONS AND RESULTS IN TOPOLOGY 1. Metric spaces A metric on a set X is a map d : X X R + with the properties: d(x, y) 0 and d(x, y) = 0 x = y, d(x, y) = d(y, x), d(x, y) d(x, z) + d(z, y), for a

More information

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract Stochastic Compement Anaysis of Muti-Server Threshod Queues with Hysteresis John C.S. Lui The Dept. of Computer Science & Engineering The Chinese University of Hong Kong Leana Goubchik Dept. of Computer

More information

The Group Structure on a Smooth Tropical Cubic

The Group Structure on a Smooth Tropical Cubic The Group Structure on a Smooth Tropica Cubic Ethan Lake Apri 20, 2015 Abstract Just as in in cassica agebraic geometry, it is possibe to define a group aw on a smooth tropica cubic curve. In this note,

More information

Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correlated Channel Failures

Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correlated Channel Failures Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correated Channe Faiures Andrey Lyakhov Vadimir Vishnevsky Institute for Information Transmission Probems of RAS B. Karetny 19, Moscow, 127994, Russia

More information

DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM

DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM MIKAEL NILSSON, MATTIAS DAHL AND INGVAR CLAESSON Bekinge Institute of Technoogy Department of Teecommunications and Signa Processing

More information

Available online at ScienceDirect. IFAC PapersOnLine 50-1 (2017)

Available online at   ScienceDirect. IFAC PapersOnLine 50-1 (2017) Avaiabe onine at www.sciencedirect.com ScienceDirect IFAC PapersOnLine 50-1 (2017 3412 3417 Stabiization of discrete-time switched inear systems: Lyapunov-Metzer inequaities versus S-procedure characterizations

More information

Separation of Variables and a Spherical Shell with Surface Charge

Separation of Variables and a Spherical Shell with Surface Charge Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation

More information

arxiv: v1 [math.co] 17 Dec 2018

arxiv: v1 [math.co] 17 Dec 2018 On the Extrema Maximum Agreement Subtree Probem arxiv:1812.06951v1 [math.o] 17 Dec 2018 Aexey Markin Department of omputer Science, Iowa State University, USA amarkin@iastate.edu Abstract Given two phyogenetic

More information

Integrating Factor Methods as Exponential Integrators

Integrating Factor Methods as Exponential Integrators Integrating Factor Methods as Exponentia Integrators Borisav V. Minchev Department of Mathematica Science, NTNU, 7491 Trondheim, Norway Borko.Minchev@ii.uib.no Abstract. Recenty a ot of effort has been

More information

SEMINAR 2. PENDULUMS. V = mgl cos θ. (2) L = T V = 1 2 ml2 θ2 + mgl cos θ, (3) d dt ml2 θ2 + mgl sin θ = 0, (4) θ + g l

SEMINAR 2. PENDULUMS. V = mgl cos θ. (2) L = T V = 1 2 ml2 θ2 + mgl cos θ, (3) d dt ml2 θ2 + mgl sin θ = 0, (4) θ + g l Probem 7. Simpe Penduum SEMINAR. PENDULUMS A simpe penduum means a mass m suspended by a string weightess rigid rod of ength so that it can swing in a pane. The y-axis is directed down, x-axis is directed

More information

Approximate Bandwidth Allocation for Fixed-Priority-Scheduled Periodic Resources (WSU-CS Technical Report Version)

Approximate Bandwidth Allocation for Fixed-Priority-Scheduled Periodic Resources (WSU-CS Technical Report Version) Approximate Bandwidth Aocation for Fixed-Priority-Schedued Periodic Resources WSU-CS Technica Report Version) Farhana Dewan Nathan Fisher Abstract Recent research in compositiona rea-time systems has focused

More information

Lyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering,

Lyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering, On the Queue-Overflow Probability of Wireless Systems : A New Approach Combining Large Deviations with Lyapunov Functions V. J. Venkataramanan an Xiaojun Lin Center for Wireless Systems an Applications

More information

Near-Optimal Stochastic Threshold Group Testing

Near-Optimal Stochastic Threshold Group Testing Near-Optima Stochastic Thresho Group Testing C. L. Chan, S. Cai, M. Bakshi, S. Jaggi, an V. Saigrama + The Chinese University of Hong Kong, Boston University + arxiv:1304.607v3 [cs.it] 4 Apr 013 Abstract

More information

Average Case Approximation: Convergence and Tractability of Gaussian Kernels

Average Case Approximation: Convergence and Tractability of Gaussian Kernels Average Case Approximation: Convergence an Tractabiity of Gaussian Kernes G. E. Fasshauer 1, F. J. Hickerne 1, an H. Woźniakowski 2 1 Department of Appie Mathematics, Iinois Institute of Technoogy, Chicago,

More information

A design methodology for delta-sigma converters based on solid-state passive filters

A design methodology for delta-sigma converters based on solid-state passive filters A esign methooogy for eta-sigma converters base on soi-state passive fiters Phiippe Benabes To cite this version: Phiippe Benabes. A esign methooogy for eta-sigma converters base on soi-state passive fiters.

More information

6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7

6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7 6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17 Soution 7 Probem 1: Generating Random Variabes Each part of this probem requires impementation in MATLAB. For the

More information

Age of Information: The Gamma Awakening

Age of Information: The Gamma Awakening Age of Information: The Gamma Awakening Eie Najm and Rajai Nasser LTHI, EPFL, Lausanne, Switzerand Emai: {eie.najm, rajai.nasser}@epf.ch arxiv:604.086v [cs.it] 5 Apr 06 Abstract Status update systems is

More information

Homework 5 Solutions

Homework 5 Solutions Stat 310B/Math 230B Theory of Probabiity Homework 5 Soutions Andrea Montanari Due on 2/19/2014 Exercise [5.3.20] 1. We caim that n 2 [ E[h F n ] = 2 n i=1 A i,n h(u)du ] I Ai,n (t). (1) Indeed, integrabiity

More information

Online Load Balancing on Related Machines

Online Load Balancing on Related Machines Onine Load Baancing on Reated Machines ABSTRACT Sungjin Im University of Caifornia at Merced Merced, CA, USA sim3@ucmerced.edu Debmaya Panigrahi Duke University Durham, NC, USA debmaya@cs.duke.edu We give

More information