Exploring the Throughput Boundaries of Randomized Schedulers in Wireless Networks

Size: px
Start display at page:

Download "Exploring the Throughput Boundaries of Randomized Schedulers in Wireless Networks"

Transcription

1 Exporing the Throughput Boundaries of Randomized Scheduers in Wireess Networks Bin Li and Atia Eryimaz Abstract Randomization is a powerfu and pervasive strategy for deveoping efficient and practica transmission scheduing agorithms in interference-imited wireess networks. Yet, despite the presence of a variety of earier works on the design and anaysis of particuar randomized scheduers, there does not exist an extensive study of the imitations of randomization on the efficient scheduing in wireess networks. In this work, we aim to fi this gap by proposing a common modeing framework and three functiona forms of randomized scheduers that utiize queueength information to probabiisticay schedue non-conficting transmissions. This framework not ony modes many existing scheduers operating under a time-scae separation assumption as specia cases, but it aso contains a much wider cass of potentia scheduers that have not been anayzed. We identify some sufficient and some necessary conditions on the network topoogy and on the functiona forms used in the randomization for throughput-optimaity. Our anaysis reveas an exponentia and a sub-exponentia cass of functions that exhibit differences in the throughput-optimaity. Aso, we observe the significance of the network s scheduing diversity for throughputoptimaity as measured by the number of maxima schedues each ink beongs to. We further vaidate our theoretica resuts through numerica studies. Index Terms Randomized scheduing, throughput-optimaity, stochastic contro, distributed agorithm, network stabiity. I. INTRODUCTION One of the greatest chaenges in the efficient communication in wireess networks is the management of interference amongst simutaneous transmissions. A commony used mode, which we aso empoy in this paper, to capture such interference effects is through the use of a confict graph whereby transmissions that wi coide with each other are indicated as conficting. These confict graphs can represent a variety of interference modes of practica importance, incuding the primary interference mode (e.g., [23], [9]), secondary interference mode (e.g., [2], [3]), or SINR threshod-based interference mode (e.g., [0]). Such confict graphs can take on extremey compex forms, especiay with growing network sizes. Thus, a fundamenta question in the design of efficient wireess network protocos is the decision of which subset of non-conficting This work was supported in part by Qatar Nationa Research Fund (QNRF) under the Nationa Research Priorities Program (NPRP) grant number NPRP , DTRA Grant HDTRA , and NSF Awards: CAREER-CNS and CCF An earier version of this paper has appeared in the Proceedings of 30th IEEE Internationa Conference on Computer Communications (INFOCOM), Shanghai, China, Apri 20 [2]. Bin Li and Atia Eryimaz ({ib,eryimaz}@ece.osu.edu) are with the Department of Eectrica and Computer Engineering at The Ohio State University, Coumbus, Ohio 4320 USA. transmissions to activate, and when - an operation commony referred to as scheduing. Of particuar interest in the cass of scheduing protocos is the set of throughput-optima scheduing strategies (e.g., [26], [8]) that achieves any throughput (subject to network stabiity) that is achievabe by any other scheduing strategy. Thus, throughput-optima scheduers are critica especiay for resource-imited wireess networks as they achieve the argest possibe throughput region that is supportabe by the network. The semina works of Tassiuas and Ephremides [26], [27] and many subsequent works (e.g., [4], [8], [24]; see [5] for an overview) have estabished the throughput-optimaity of a variety of Queue-Length-Based (QLB) Scheduing strategies, which prioritize activation of inks with the greatest backog awaiting service, aso caed Maximum Weight Scheduing (MWS). These origina throughput-optima strategies require the maximum weight schedue to be determined repeatedy as the queue-ength eves change. This cas for computationay heavy (even NP-hard in certain interference modes) and typicay centraized operations, which is impractica. Such restrictions have motivated new research efforts to deveop more practica throughput-optima scheduers with reduced compexity. One such thread ed to the deveopment of a cass of evoutionary randomized agorithms (aso named pick and compare agorithms) with throughput-optimaity characteristics (see [25], [3], [22]). Another thread ed to the deveopment of distributed but suboptima randomized/greedy strategies (see [3], [8], []). More recenty, another exciting thread of resuts have emerged that can guarantee throughput-optimaity by cevery utiizing queue-ength information in the context of carrier sense mutipe access (CSMA) (see [4], [7], [20], [9]). In paper [7], the authors proposed an agorithm that adaptivey seects the CSMA parameters under a time-scae separation assumption, i.e., the Markov Chain underying the CSMA-based agorithm converges to steady-state quicky compared with the time-scae of updating parameters of the agorithm. In paper [2], the authors showed the throughput-optimaity of a CSMAbased agorithm in which the ink weights are chosen to be of the form og og(q + e) (where q is the queue ength) without the time-scae separation assumption. Ghaderia and Srikant [6] extended these resuts by showing that the throughputoptimaity of CSMA-based agorithm wi be preserved even if the ink weights have the form og(q)/g(q), where g(q) can be a function that increases to infinity arbitrariy sowy. Yet, to the best of our knowedge, there does not exist a genera framework in which a variety of randomized scheduers can be

2 2 studied in terms of their throughput-optimaity characteristics. Thus, in this work, we aim to fi this gap by deveoping a common framework for the modeing and anaysis of queueength-based randomized scheduers, and then by estabishing necessary and sufficient conditions on the throughputoptimaity of a arge functiona cass of such scheduers under the time-scae separation assumption. Our framework is buit upon the observation that a common characteristic to most of the deveoped scheduers is their randomized seection of transmission schedues from the set of a feasibe schedues. Specificay, given the existing queue-engths of the inks, each scheduing strategy can be viewed as a particuar probabiity distribution over the set of feasibe schedues. Whie the means with which this random assignment may vary in its distributiveness or compexity, this perspective aows us to mode a arge set of existing and an even wider set of potentia randomized scheduers within a common framework. This work buids on this origina point-of-view to expore the boundaries of randomization in the throughput-optima operation of wireess networks. Such an investigation is crucia in reveaing the necessary and sufficient characteristics of randomized scheduers and the network topoogies in which throughput-optimaity can be achieved. Next, we ist our main contributions aong with references on where they appear in the text. In Section II, we highight the pressing need for deveoping new randomized scheduers, for exampe, for operation under fading conditions and for serving deay-reated appication requirements. We aso note with a specific exampe that these new scheduers may possess fundamentay different probabiistic operation than existing distributed soutions with product form mappings. This motivates us to study the performance imitations of wide cass of randomization strategies. In Section II, we introduce three functiona forms of randomized queue-ength-based scheduing strategies that incude many existing strategies as specia cases (see Definitions 3, 4 and 5). These strategies differ in the manner in which they measure the weight of schedues, and hence are used to mode fundamentay different scheduing impementations. We categorize the set of a functions used by these strategies into functions of exponentia form and of sub-exponentia form (see Definition 6), coectivey covering amost a functions of interest. These two categories capture the steepness of the functions used in the scheduers, and hep revea a critica degree of steepness necessary for throughput-optimaity in arge networks. Then, we find some sufficient (in Section IV) and some necessary (in Section V) conditions on the topoogica characteristics of the confict graph for the throughput-optimaity of these scheduers as a function of the cass of functions used in their operation. Our resuts, graphicay summarized in Section III, revea the significance of the network s scheduing diversity that is measured by the number of schedues each ink beongs to. A. Basic Definitions II. SYSTEM MODEL We consider a fixed wireess network represented by a graph G = (N, L), where N is the set of nodes and L is the set of undirected inks. We assume a time-sotted system, where a nodes transmit at the beginning of each time sot. Due to the interference-imited nature of wireess transmissions, the success or faiure of a transmission over a ink depends on whether an interfering ink is aso active in the same sot. For ease of exposition, we assume that a successfu transmission over any ink in each sot transfers one packet. We use confict graphs to capture any such coision-based interference in the wireess networks. In a confict graph CG = (L, E) of G under a given interference mode, the set of inks L in G becomes the set of nodes, and E denotes the set of edges that connects inks that interfere with each other. In each time sot, we can successfuy transmit over nodes in a subset of L that form an independent set (i.e., that are not directy connected in CG). We ca each such independent set as a feasibe schedue, and denote it as S = (S ) L, where S = if ink is active and S = 0 is ink is inactive in the schedue. We aso treat S as a set of active inks and write S if S =. We use to denote the cardinaity of the set S. We further ca a feasibe schedue as maxima if no more nodes in CG can be added without vioating the interference constraint. As maxima schedues represent extreme points in the space of feasibe schedues, we coect them in the set S. Then, we can define the capacity region Λ as the convex hu of S and L-dimensiona a-zero vector, which wi give the upper bound on the achievabe ink rates in packets per sot that can be supported by the network under stabiity for the given interference mode. Given the topoogy and the interference mode of a wireess network, we define the scheduing diversity of ink L as the number of different maxima schedues m that ink beongs to. Since each ink L beongs to at east one maxima schedue, m shoud be the integer greater than or equa to. For a network topoogy with a compete N-partite confict graph 2, we have m =, L. As another exampe, a singe-hop wireess network where a inks interfere with each other, we have m = for a. Less triviay, a 2 2 switch has 2-partite confict graph in which each maxima schedue has ony 2 inks, and m = for each. Roughy speaking, the scheduing diversity increases as the network diameter 3 increases. Such a behavior can be observed directy in a inear network with L inks under the primary interference mode: for L 3, m = for a ; for L 6, m 2 for a. In its simpest form, a scheduer determines a maxima feasibe schedue S[t] S at each time sot t. This seection The convex hu of the set V is the minima convex set containing set V. 2 In a compete N-partite confict graph, the nodes are partitioned into N sets of nodes without a ink between them such that every node in each set is connected to a the nodes outside of that set. 3 Network diameter is the maximum of the shortest hop-count between any two nodes in the graph.

3 3 may be infuenced by the earier experiences of each transmitter, and may be performed through a variety of strategies. Here, we are not interested in the means of seecting schedues, but in the eventua seection modeed as a probabiistic function of the queue-ength state of the network. Before we define the cass of randomized scheduers we consider more expicity, we need to estabish the traffic and the queueing modes. For simpicity, we assume a per-ink traffic mode 4, where A [t] arrivas occur to ink in sot t that are independenty distributed over inks and identicay distributed over time with mean λ, and A [t] K for some K < 5. Accordingy, a queue is maintained for each ink L with Q [t] denoting its queue ength at the beginning of time sot t. Reca from above that S [t] denotes the number of potentia departures at time t. Further, we et U [t] denote the unused service for the queue in sot t. If the queue is empty and is schedued, then U [t] is equa to ; otherwise, it is equa to 0. Then, the evoution of the queue is described as foows: Q [t + ] = Q [t] + A [t] S [t] + U [t], L. () We define F := set of non-negative, nondecreasing and differentiabe functions f( ) : R + R + with im f(x) =. x We say that the queue is f-stabe for a function f F if it satisfies T im sup E[f(Q [t])] <. (2) T T t=0 We note that this is an extended form of the more traditiona strong stabiity condition (see [5]) that coincide when f(x) = x. Moreover, it is easy to show that f-stabiity impies strong stabiity when f is aso a convex function. We say that the network is f-stabe if a its queues are f-stabe. Accordingy, we say that a scheduer is f-throughput-optima if it achieves f- stabiity of the network for any arriva rate vector λ = (λ ) L that ies stricty inside the capacity region Λ. Again, in the specia case of f(x) = x, the notion of f-throughput-optimaity reduces to traditiona throughput-optimaity, and when f is convex, f-throughput-optimaity impies throughput-optimaity. B. Distributed Agorithms The operation of many existing scheduers are governed by probabiistic aws (e.g., [25], [3], [4], [7], [20], [3]). This is not ony because they mode possibe errors in the scheduing process, but aso because they aow significant fexibiities in the deveopment of ow-compexity and distributed impementations. Of particuar interest in this cass of probabiistic scheduers are distributed CSMA-based agorithms (e.g., [7], [5], [9]). We give the definition of continuous time CSMA agorithm for competeness. 4 This assumption can be reaxed by utiizing backpressure type routing strategy (see, for exampe, [26]), which is avoided for unnecessary compications. 5 We note that the boundedness assumption on the arriva process simpifies the technica arguments, but can be reaxed (see, for exampe, [4]) to the ess strict assumption of E[A 2 (t)] <. Definition (CSMA Agorithm): Each ink independenty generates an exponentiay distributed random variabe with rate f(q [t]) and starts transmitting after this random duration uness it senses another transmission before. If ink senses the transmission, it suspends its backoff timer and resumes it after the competion of this transmission. The transmission time of each ink is exponentia distributed with mean. A common characteristics of these CSMA-based scheduers is the product form (see Definition 4) of the mapping of the tota queue-ength eves to the probabiity of the associated schedue. Such a mapping has been observed to cosey approximate the operation of the throughput-optima centraized MWS [26], and hence aso possesses throughput optimaity characteristics. However, these CSMA-based agorithm cannot be directy extended to operate under stochastic network dynamics or sophisticated appication requirements. As an important exampe, extending CSMA soutions to serving traffic with strict deadine constraints under wireess fading channes is difficut for two reasons: () the mixing time of the underying CSMA Markov Chain grows with the size of the network, which, for arge networks, generates unacceptabe deay for deadine-constrained traffic; (2) since the dynamic CSMA parameters are infuenced by the arriva and channe state process, the underying CSMA Markov Chain may not converge to a steady-state under strict deadine constrains and fading channe conditions. Thus, designing an optima distributed scheduing agorithm in deadine-constrained scheduing over fading channes becomes very chaenging. In a recent work [], we have found that, in some specia network topoogies, the foowing Fast carrier sensing mutipe access (FCSMA) agorithm can guarantee optima performance. Definition 2 (FCSMA Agorithm): At the beginning of each time sot t, each ink independenty generates an exponentiay distributed random variabe with rate f(q [t]), and starts transmitting after this random duration uness it senses another transmission before. The ink that captures the channe transmits its packets 6 unti the end of the sot and restarts in the next time sot. We note that FCSMA differs from CSMA in that it restarts every time sot, and hence increases the probabiity of meeting deadine requirements. Further remarks on FCSMA are shown as foows: Remarks: () Consider a compete N-partite confict graph, where each ink ony beongs to one schedue. If a queue engths are arge enough, then the ide duration in each sot wi quicky vanish, and FCSMA agorithm reaches one of the maxima schedue and stick to it for one time sot. Thus, the FCSMA agorithm serving a schedue S with probabiity P S = {S :S S} i S f(q i) j S f(q j) 6 If there are no packets awaiting in the ink, it transmits a dummy packet to occupy the channe. (3)

4 4 is f-throughput-optima, which is proven in Section IV. An interesting observation is that this scheduer does not approximate the MWS operation when queue-engths are arge, as CSMA does. For exampe, consider a 2 2 switch topoogy, where there are ony two maxima schedues S incuding two active inks and 2 and S 2 incuding two active inks 3 and 4. Suppose a queue engths are arge enough and Q + Q 2 = 0.5(Q 3 + Q 4 ), then the MWS chooses the schedue S 2 and CSMA agorithm seects the schedue S 2 with probabiity very cose to. However, FCSMA poicy chooses the schedue S 2 with probabiity cose to 2/3. This indicates the importance of understanding scheduers with fundamentay different behavior than MWS. (2) In a fuy connected network topoogy, due to its fast absorption time and quick adaptation to arriva and channe state processes, FCSMA poicy yieds significant advantages over traditiona CSMA poicies that evoves sowy to their steadystate, especiay in scheduing deadine constrained traffic over wireess fading channes. We refer the interested reader to [] for more detaied investigation of FCSMA operation. It is aso worth noting that for a given stationary distribution, it is possibe to construct a Markov Chain that converges to it by Metropois agorithm [6] or Gauber dynamics (e.g., [2], [6]). Yet, in this paper, we do not focus on the design of specific scheduing agorithms that can converge to the stationary distribution. Instead, we are interested in the throughput-optimaity characteristics of a wide cass of probabiistic mapping from the queue ength space to the feasibe schedues. In the foowing, we consider three casses of randomized scheduers which not ony mode many existing probabiistic scheduers as specia cases but aso contain a much wider casses of potentia scheduers that have not been anayzed. C. Randomized Scheduers In this subsection, we identify three casses of randomized scheduers that differ in the operation of the functiona forms used in them. Definition 3 (RSOF Scheduer): For a given f F and queue-ength vector Q at the beginning of a sot, the Ratio-of- Sum-of-Functions (RSOF) Scheduer picks a schedue S S in that sot such that i S P S (Q) := f(q i) j S f(q, for a S S. (4) j) {S :S S} Definition 4 (RMOF Scheduer): For a given f F and queue-ength vector Q at the beginning of a sot, the Ratio-of- Mutipication-of-Functions (RMOF) Scheduer picks a schedue S S in that sot such that υ S (Q) := {S :S S} i S f(q i) j S f(q, for a S S. (5) j) Definition 5 (RFOS Scheduer): For a given f F and queue-ength vector Q at the beginning of a sot, the Ratio-of- Function-of-Sums (RFOS) Scheduer picks a schedue S S in that sot such that f( i S π S (Q) := Q i) {S :S S} f( j S Q, for a S S. (6) j) Note that a the RSOF, RMOF and RFOS Scheduers are more ikey to pick a schedue with the arger queue ength, but with different distributions based on their form and the form of f F. In particuar, the steepness of the function f determines the weight given to the heaviy oaded ink in both RSOF and RMOF Scheduers and the heaviy oaded schedue in the RFOS Scheduer. Aso, note that the scheduers coincide in singe-hop network topoogies because each maxima schedue ony incudes one ink in such networks, and for the foowing choices of f: when f(x) = x, the RSOF and RFOS Scheduers coincide; when f(x) = e x, the RMOF and RFOS Scheduers coincide. These three casses cover a wide variety of scheduers incuding many of existing throughput-optima scheduers. For exampe, when f(x) = e x, the RMOS and RFOS Scheduers correspond to the throughput-optima CSMA poicy operating under time-scae separation assumption that attracted a ot of attention atey (see [7], [20], [9]); in a compete N-partite confict graph, the RSOF Scheduer corresponds to the FCSMA poicy when a the queue engths are arge enough. Yet, they aso contain a much wider set of scheduers, one for each f. The aim of this work is to identify the imitations of randomization for a wide cass of randomized dynamic scheduers that utiize functions of queue-engths to schedue transmissions. Even though randomization has significant advantage in owcompexity or distributed impementation, it causes inaccurate operation and may be hurtfu if not performed within imitations. In this work, we find that the performance of the randomized scheduers may especiay be sensitive to the topoogy of the confict graph and the functiona form used in the weighting. To see this, consider one maxima schedue S incuding three active inks, 2 and 3 in a 3 3 switch topoogy. We assume that arrivas ony happen to those 3 inks at rates λ, λ 2 and λ 3 with the constraints that λ i [0, ) for a i =, 2, 3, which ceary can be supported by a simpe poicy that aways serves the schedue S. Thus, by setting λ i arbitrariy cose to one for each i, this simpe poicy can achieve a sum rate of 3 λ i < 3. However, for a RFOS Scheduer with f(x) = x, we can easiy cacuate that 3 θ i = 2, where θ i (i =, 2, 3) is the probabiity of serving ink i. Thus, the RFOS Scheduer with f(x) = x cannot achieve fu capacity region in a 3 3 switch. Yet, in the same set up, if we use f(x) = e x instead of f(x) = x in the RFOS Scheduer, the mapping has the same probabiistic form as the CSMA poicy, and thus woud be throughput-optima. This shows the significant impact of the functiona form on the throughput performance of randomized scheduers. In addition, the RFOS Scheduer with f(x) = x is shown to be f-throughput-optima in a 2 2 switch (see Figure 3), which indicates that the network topoogy may aso affect the throughput performance of randomized scheduers.

5 5 F A x x e e x x (, 0) (0, 0) B C x,(og( x )) ( 0) Reca that since m denotes the number of different maxima schedues that ink beongs to, it may be viewed as a rough measure of the network diameter. Then, the main resuts for the RSOF and RFOS Scheduers are presented in Figures 2 and 3, respectivey. In these figures, we aso incude severa conjectures that are vaidated through simuations in Section VI. m Fig. : The reationship between casses A, B and C. Next, we identify the three casses of functions with varying forms that turn out to be crucia to our investigation. Definition 6: We consider the foowing subsets of F: (a) A := {f F : ɛ > 0, im x f(x + a) (b) B := {f F: im x f(x) f(( + ɛ)x) = 0}. =, for any a R}. f(x) (c) C := {f B: there exist K and K 2 satisfying 0 < K K 2 < such that K (f(x ) + f(x 2 )) f(x + x 2 ) K 2 (f(x ) + f(x 2 )), for a x, x 2 0}. We ca A as the cass of exponentia functions and C as the cass of sub-exponentia functions. The key exampes of functions with sets A, B, C and their interreationship are extensivey studied in Appendix A. Figure concisey demonstrates the most critica facts: that A and C are non-overapping casses; whie B has an intersection with A. Furthermore, the exampe functions are provided with a variety of forms that justify the names assigned to A and C : A contains rapidy increasing functions generay with exponentia forms; whie C contains sub-exponentiay increasing poynomia and ogarithmic functiona forms. In the study of necessary and sufficient conditions for throughputoptimaity, we sha find that most of the resuts depend on which of these three functiona casses the functions beong to. III. OVERVIEW OF MAIN RESULTS In this section, we present our main findings and resuting insights on the throughput-optimaity of the RSOF, RMOF and RFOS Scheduers (see Definitions 3, 4 and 5) with different functiona forms under different network topoogies. These resuts are rigorousy proven in Sections IV and V. To faciitate an accessibe figurative presentation, in the horizonta dimension, we conceptuay order the functions in F in increasing eve of steepness starting from f(x) = (og(x + )) α and f(x) = x α for any α > 0 that beong to C, foowed by f(x) = e xα x β for any 0 < α < and any β 0 that beongs to B A, and finishing with f(x) = e xα for any α and any x β β 0 that beongs to A. In the vertica dimension, we use the scheduing diversity (m ) L introduced in Section II to distinguish different topoogica and interference scenarios. m 2, m, unknown f-throughput-optima (og(x+)) x x x ( >0) (0< <) ( >) cass of sub-exponentia functions C non-throughput-optima unknown f-throughputoptima exp(x )/x (0< <, 0) unknown conjecture: f-throughput-optima throughput-optima (singe-hop network) exp(x )/x (, 0) cass of exponentia functions A network with high scheduing diversity network with ow scheduing diversity f Fig. 2: The throughput performance of the RSOF Scheduer. m m 2, m, non-throughput-optima unknown conjecture: f-throughput-optima f-throughput-optima (singe-hop network) (og(x+)) x x x ( >0) (0< <) ( >) cass of sub-exponentia functions C unknown Throughput-optima exp(x )/x exp(x )/x (0< <, 0) (, 0) cass of exponentia functions A network with high scheduing diversity network with ow scheduing diversity f Fig. 3: The throughput performance of the RFOS Scheduer. From Figure 2, we see that the RSOF Scheduer with the function f B is f-throughput-optima when m =, L. Aso, the RSOF Scheduer with the function f A \ B is throughput-optima in singe-hop network topoogies since the RSOF and RFOS Scheduers have the same probabiity distribution over schedues in such networks and the RFOS Scheduer with the function f A is throughput-optima (see Figure 3). However, if min L m 2, the RSOF Scheduer with any function f F cannot be throughput-optima. Thus, roughy speaking, the RSOF Scheduer is non-throughputoptima for the network with high scheduing diversity, whie the RSOF Scheduer with the function f B is f-throughputoptima for ow scheduing diversity. We note that athough the throughput performance of the RSOF Scheduer with some exponentia functions f A \ B (i.e. f(x) = x β e xα, α and β 0) is not yet expored in genera topoogies with m =, L, we conjecture that it is f-throughput-optima in this region, since the RSOF Scheduer with such functions reacts much more quicky to the queue ength difference

6 6 between schedues than that with sub-exponentia functions, especiay under asymmetric arriva patterns. We vaidate this conjecture through simuations in Section VI. Overa, the RSOF Scheduer is more sensitive to the network topoogy than the functiona form used in it. The horizonta unknown region corresponds to network topoogies where some inks have scheduing diversity and other inks have scheduing diversity at east 2. The vertica unknown region corresponds to randomized scheduers with functions that are not in the functiona casses A, B and C. In Figure 3, we observe that the RFOS Scheduer with the function f A is throughput-optima under any network topoogy. Aso, the RFOS Scheduer with the function f C is f-throughputoptima in singe-hop network topoogies, which foows from the fact that the RFOS and RSOF Scheduers have the same probabiity probabiistic forms in such networks, the resut that the RSOF Scheduer with the function f B is f-throughputoptima (see Figure 2) and the fact that C B. Aso, when the function f is inear, the RFOS Scheduer has the same probabiity form with the RSOF Scheduer and thus is f- throughput-optima when m =, L. However, the RFOS Scheduer with the function f C is not throughput-optima when min L m 2. Roughy speaking, the network with higher scheduing diversity requires much steeper functions (e.g., exponentia functions) for the throughput-optimaity of the RFOS Scheduer. Whie the throughput performance of the RFOS Scheduer with the function f C \ {inear functions} for genera network topoogies with m =, L is part of our ongoing work, we conjecture that it is f-throughput-optima in those topoogies since both RFOS and RSOF Scheduers with sub-exponentia functions have amost the same reaction speed to the queue ength difference between schedues. We aso vaidate this conjecture via simuations in Section VI. Overa, the RFOS Scheduer is more sensitive to the functiona form used in it than the network topoogy. The RMOF Scheduer with the function f satisfying og f B and f(0) is (og f)-throughput-optima under any network topoogy. This resut together with the RFOS Scheduer with the function f A extends the throughput-optimaity of CSMA scheduers (e.g. [7], [9]) to a wider cass of functiona forms. Whie this resut proves a weaker form of throughputoptimaity than f-throughput-optimaity for the RMOF Scheduer, we note that the RMOF Scheduer generay outperforms the RFOS and RSOF Scheduers in numerica investigations. Hence, we eave it to future research to strengthen this resut. Coectivey these resuts not ony highight the strengths and weaknesses of the three functiona randomized scheduers, they aso revea the interreation between the steepness of the functions and the scheduing diversity of the underying wireess networks. This extensive understanding of the imitations of randomization may motivate the network designers to use or avoid certain types of probabiistic scheduing strategies depending on the topoogica characteristics of the network. IV. SUFFICIENT CONDITIONS In this section, we study the sufficient conditions on the network s topoogica characteristics and the functions used in the RSOF, RMOF and RFOS Scheduers to achieve throughputoptimaity. A. f-throughput-optimaity of the RSOF Scheduer We study the throughput performance of the RSOF Scheduer for a network topoogy with m =, L. In such a network, each ink beongs to ony one maxima schedue. Lemma : If N λ i <, λ i > 0, and a i 0, for i =,..., N, then there exists a δ > 0 such that N a 2 i λ i ( N a i ) 2 ( + δ). (7) Proof: See Appendix B for the proof. Theorem : In a network topoogy with the scheduing diversity of each ink equa to, i.e., m =, L, the RSOF Scheduer with the function f B is f-throughput-optima. Proof: We assume that there are ony N avaiabe maxima schedues. Let S i (i =,..., N) denote the i th maxima schedue. In each maxima schedue S i, there are active inks. We use (S i, =,..., ) to denote the sequence of active inks in the maxima schedue S i. Note that we use i to index maxima schedue and to index ink. Since the schedue diversity of each ink is equa to, each ink beongs to ony one maxima schedue. Thus, we can denote the queues, arrivas, and scheduing statistics in terms of maxima schedues for easier exposition. To that end, we et Q i, λi and (i =,..., N, =,..., ) denote the queue-ength of ink S i, the average arriva rate for the ink S i and the probabiity of serving the ink S i, respectivey. In addition, A i [t], Si [t] and U i [t] denote the number of arrivas to ink S i at time sot t, the number of potentia departures of ink S i in sot t and the unused service for ink S i at time sot t, respectivey. Reca that each ink can ony beong to one maxima schedue and note that inks in different maxima schedues cannot be active at the same time. Thus, the capacity region for such network is P i C N := {λ : N λ i i <, i =,..., }. (8) Under the above notation, the RSOF Scheduer becomes : P S i = f(qi ) N k i =,..., N. (9) k= f(qk ), Note that P i = P S i, for =,...,. If λ i = 0 for some i and, then no arrivas occur in the ink S i. Thus, we don t need to consider such inks. In the rest of proof, we assume λ i > 0 (i =,..., N, =,..., ). Consider the Lyapunov function V (Q) := N h(q i ), where h (x) = f(x). By λ i using Lemma, it is shown in the Appendix C that there exist

7 7 positive constants γ and G such that V : = E [V (Q[t + ]) V (Q[t]) Q[t] = Q] γ N f(q i ) + G. (0) By using the Theorem 4. in [7], inequaity (0) impies the desired resut. B. Throughput-Optimaity of RMOF and RFOS Scheduers In this subsection, we investigate the sufficient condition for the throughput-optimaity of RMOF and RFOS Scheduers. Theorem 2: (i) The RMOF Scheduer with the function f F satisfying og f B and f(0) is (og f)-throughputoptima under any network topoogy; (ii) The RFOS Scheduer with the function f A is throughput-optima under any network topoogy. Proof: To prove this, we use a simiar approach as in [9] that uses the foowing resut from [4]: for a scheduing agorithm, given any 0 ɛ, δ <, there exists an M > 0 for which the scheduing agorithm satisfies the foowing condition: in any time sot t, with probabiity greater than δ, the scheduing agorithm chooses a schedue x[t] S that satisfies: x[t] w(q [t]) ( ɛ) max x S x[t] w(q [t]), whenever Q[t] > M, where Q[t] := (Q [t]) L, and w B. Then the scheduing agorithm is w-throughput-optima. (i) Given any ɛ and δ such that 0 ɛ, δ <. Let X := {x S : x og f(q [t]) < ( ɛ )W [t]}, () where W [t] := max x S x og f(q [t]). Then, we have υ(x ) = x υ x = f(q [t]) x X x X x S x f(q [t]) x X exp [ x og f(q [t]) ] = < x S exp [ x og f(q [t]) ] X exp [( ɛ )W [t]] x S exp [ x og f(q [t]) ]. Since x S exp [ x og f(q [t]) ] exp(w [t]), then we get υ(x ) < X exp [( ɛ )W [t]] exp(w [t]) = X exp(ɛ W (2) [t]). If some queue engths increase to infinity, then W [t] and thus we have υ(x ) 0. Hence, there exists a M > 0 such that Q[t] > M and the RMOF Scheduer with the function f F satisfying og f B and f(0) picks the schedue S[t] S \ X with probabiity δ and thus is og f-throughput-optima under any topoogy. (ii) Given any ɛ 2 and δ 2 such that 0 ɛ 2, δ 2 <. Let W 2 [t] := max x S x Q [t], and X 2 := {x S : x Q [t] < ( ɛ 2 )W 2 [t]}. Then, by using the same technique as in (i), we can prove that the RFOS Scheduer with f A is throughputoptima under any topoogy. V. NECESSARY CONDITIONS So far, we have shown that the RSOF Scheduer with the function f B is f-throughput-optima in the network topoogy with m =, L and the RFOS Scheduer with the function f A is throughput-optima under arbitrary network topoogies. However, the next resut estabishes that in network topoogies where each ink beongs to two or more schedues (i.e. when min L m 2), the RSOF Scheduer with any function f F and RFOS Scheduer with the function f C cannot be throughput-optima. Theorem 3: If the network is such that min L m 2, then (i) RSOF Scheduer is not throughput-optima for any f F; (ii) RFOS Scheduer is not throughput-optima for any f C. Proof: We prove these caims constructivey by considering an arriva process that is inside the capacity region, but is not supportabe by the randomized scheduers for the given functiona forms. To that end, et us consider any maxima schedue S 0 S and index its inks as {, 2,..., n} for convenience. We assume that arrivas ony happen to those n inks at rates λ,, λ n with the constraint that λ [0, ) for a =,, n, which is ceary supportabe by a simpe scheduing poicy that aways serves the schedue S 0. Thus, setting λ arbitrariy cose to one for each, this simpe poicy can achieve a sum rate of n λ < n. We define M = {S S : S S 0 }, K = S \ M, H = M \ {S 0 } and T = S \ {S 0 }. In the rest of the proof, we use AB to denote the intersection of A and B. Given this construction, we next prove the foowing statements for the RSOF and RFOS Scheduers respectivey: () If n λ > n 2, the RSOF Scheduer with any function f F is unstabe. (2) If n λ > n K 2K, where K 2 and K 2 are positive constants described in Appendix A, the RFOS Scheduer with the associated function f C is unstabe. Since the aforementioned simpe scheduer can stabiize the sum rate n λ < n, the RSOF Scheduer with any function f F and RFOS Scheduer with the associated function f C are not throughput-optima. We next prove these caims that compete the proof of Theorem 3. () Under the above mode, the RSOF Scheduer becomes P S = SS 0 f(q ) + \ S 0 f(0) S :S S ( S S 0 f(q ) + \ S 0 f(0)). Let P denote the probabiity that ink S 0 is served, then n n P = P S S M: SS 0 =:L {}}{ n ( f(q i ) + \ S 0 f(0)) S M: SS = 0 i SS 0. f(q ) + \ S 0 f(0) S:S S SS 0 S:S S }{{} =:L 2

8 8 S:S S Since SS 0 f(q ) = n f(q ) S M: SS 0, n S M: SS 0 \S 0 f(0) = S:S S S 0 \S 0 f(0), and n f(q i ) = f(q i ) S M: SS 0 i SS 0 S:S M SS 0 i SS 0 = n S 0 f(q i ) = f(q ) S 0, S:S M i SS 0 S M: SS 0 we can extend L and L 2 as foows: n L = f(q ) S 0 + S 0 \ S 0 f(0) S M: SS 0 S:S S n = f(q )(n + HS 0 ) + TS 0 T \ S 0 f(0), H H: HS 0 T:T T and n L 2 = f(q ) + \ S 0 f(0) S M: SS 0 S:S S n = f(q )( + ) + T \ S 0 f(0). H H: HS 0 T:T T Thus, we have n P = L L 2 = n Z Z 2, (3) where Z = n f(q ) H H: HS 0 (n HS 0 ) + T:T T (n TS 0 ) T \ S 0 f(0), and Z 2 = n f(q )( + H H: HS 0 ) + T:T T T \ S 0 f(0). Note that HS 0 n, for H H, and TS 0 n, for T T. Now, since m = S S: S 2, S 0, we have H H: HS 0, S 0. Then, we get n Z f(q ) H H: HS 0 + T:T T T \ S 0 f(0) Z 2 2 n f(q ) H H: HS T:T T T \ S 0 f(0) = 2. Thus, we have n P n 2. Hence, for topoogies where min L m 2, if n λ > n 2, in which case the tota arriva rate is greater than the tota service rate, then, the RSOF Scheduer is unstabe by foowing the Theorem 2.8 and Theorem 2.5 in [7]. Since n f( S M: SS 0 we have n P = i SS 0 Q i ) = S:S M S 0 f( S:S M S 0 f( SS 0 Q ) S:S M f( SS 0 Q ) + S:S K f(0) i SS 0 Q i ), nf( n = Q ) + H:H H HS 0 f( HS 0 Q ) f( n Q ) + H:H H f( HS 0 Q ) + S:S K f(0) H:H H =n (n HS 0 )f( HS 0 Q ) + n S:S K f(0) f( n Q ) + H:H H f( HS 0 Q ) + S:S K f(0). The fact that f C impies that there exist K and K 2 satisfying 0 < K K 2 < such that K m f(q i) f( m Q i) K 2 m f(q i), for m =,..., n, where Q i 0, i =,..., m, which foows from induction. Then, we have n P n K H:H H K 2 (n HS0 ) HS f(q ) + n 0 S:S K f(0) n f(q ) + H:H H HS f(q ) + 0 S:S K f(0) =n K K 2 n f(q ) H H: HS (n HS 0 0 ) + n S:S K f(0) n f(q ) + n f(q ) H H: HS + 0 S:S K f(0). Note that HS 0 n, for H H, and that m = S S: S 2, S 0, impies that H H: HS 0, S 0. Then, we get n P n K K 2 n f(q ) H H: HS 0 + S:S K f(0) 2 n f(q ) H H: HS S:S K f(0) n K. (5) 2K 2 Thus, by foowing the same argument as in the proof for statement (), we know that when min L m 2 and n λ > n K 2K, the RFOS Scheduer is unstabe. 2 VI. SIMULATION RESULTS In this section, we first perform numerica studies to vaidate the throughput performance of the proposed randomized scheduers with different functions in 2 2 and 3 3 switch topoogies. Then, we evauate the impact of functiona forms on the deay performance of proposed randomized scheduers in 2 2 switch topoogies. (2) With the same mode, the RFOS Scheduer becomes f( SS π S = 0 Q ) S :S M f( S S 0 Q ) + (4) S :S K f(0). Then, n P = n π s S M: SS 0 n S M: SS = 0 f( i SS 0 Q i ) S:S M f( SS 0 Q ) + S:S K f(0). A. Throughput Performance In a 2 2 switch, the scheduing diversity of each ink is and thus a proposed randomized scheduers are proven to be throughput-optima. In a 3 3 switch, the scheduing diversity of each ink is 2, for which the RFOS Scheduer needs to carefuy choose the functiona form to preserve the throughput optimaity whie the RSOF Scheduer is not f- throughput-optima with any function f F In a 2 2 switch, we consider arriva rate vector λ = ρh, where H = [H ij ] is a douby-stochastic matrix with H ij

9 9 Average Queue Length RSOF or RFOS with f(x)=x RSOF with f(x)=x 2 RSOF with f(x)=e x RFOS with f(x)=x 2 RFOS or RMOF with f(x)=e x RMOF with f(x)=x+ Average Queue Length RSOF or RFOS with f(x)=x RSOF with f(x)=x 2 RSOF with f(x)=e x RFOS with f(x)=x 2 RFOS or RMOF with f(x)=e x RMOF with f(x)=x+ Average Queue Length RSOF or RFOS with f(x)=x RSOF with f(x)=x 2 RSOF with f(x)=e x RFOS with f(x)=x 2 RMOF with f(x)=x+ RMOF or RFOS with f(x)=e x Time Step x 0 4 (a) Symmetric arrivas in a 2 2 switch Time Step x 0 4 (b) Asymmetric arrivas in a 2 2 switch Fig. 4: The throughput performance vaidation of the randomized scheduers Time Step (c) 3 3 switch Average Queue Length 0 0. RSOF with e x RSOF with x+ RSOF with og(x+e) RFOS with e x RFOS with x+ RFOS with og(x+e) RMOF with e x RMOF with x+ RMOF with og(x+e) MWS Load Factor Average Queue Length 00 0 RSOF RFOS RMOF MWS og(x+e) x Load Factor e x (a) Symmetric arrivas in a 2 2 switch (b) Asymmetric arrivas in a 2 2 switch Fig. 5: Deay performance comparison of the randomized scheduers with different functiona forms denoting the fraction of the tota rate from input port i that is destined to output port j. Then, ρ (0, ) represents the average arriva intensity, where the arger the ρ, the more heaviy oaded the switch is. We present two cases: symmetric arriva process (H = [ ; ]) and asymmetric arriva process (H 2 = [0. 0.9; ]) under high arriva intensity ρ = From Figures 4(a) and 4(b), we can observe that a randomized scheduers can stabiize the system under symmetric and asymmetric arriva traffics. So, there is a wide cass of choices under which the randomized scheduing can guarantee the throughput performance in the 2 2 switch. In addition, we can see that the RSOF Scheduer with the exponentia function and the RFOS Scheduer with the square function are aso stabe in both symmetric and asymmetric arriva processes, which support our conjecture in Section III that the RSOF Scheduer with the function f A and the RFOS Scheduer with the function f B are f-throughput optima in network topoogies with m =, L. In a 3 3 switch, we consider arriva rate vector λ = [ ; ; ], where the RSOF Scheduer with any function f F and the RFOS Scheduer with any function f C cannot stabiize. The evoution of average queue ength per ink over time for different scheduers with different functions are shown in figures 4(c). From Figure 4(c), we can observe that the average queue engths of the RSOF Scheduers with inear function, square function and even exponentia function increase very fast, which vaidates our theoretica resut that the RSOF Scheduer with any function f F cannot be throughput-optima in network topoogies with min L m 2. In addition, we can see that the average queue engths of the RFOS Scheduers with inear function and square function grow quicky whie the RFOS Scheduer with exponentia function aways keeps ow queue ength eve, which demonstrates that the steepness of functiona form needs to be high enough for the RFOS Scheduer to keep throughput optimaity in genera network topoogies. Even though our resut indicates that the RMOF Scheduer with any function

10 0 f satisfying og f B and f(0) is (og f)-throughputoptima in genera network topoogies, we can see that the RMOF Scheduer is sti stabe even with inear function. This vaidates that our conjecture that the RMOF Scheduer with any function f F can be f-throughput-optima in genera network topoogies. B. Deay Performance In this subsection, we perform numerica studies to evauate the deay performance of proposed randomized scheduers with different functions in a 2 2 switch topoogy. From Figure 5(a), we can observe that, under symmetric arriva traffic, the deay performance is highy insensitive to the choice of the randomization and the functiona form being used in it especiay under high arriva oad. So, there is a wide cass of choices under which the randomized scheduing can yied good deay performance. On the other hand, Figure 5(b) demonstrates that, under asymmetric arriva traffic, the RMOF Scheduer is more robust to the choice of functions used in it than both the RSOF and RFOS Scheduers. In particuar, it appears that the steepness of f needs to be high enough for each randomization to yied good deay performance. Generay, the RMOF Scheduer outperforms the other two randomized scheduers especiay under asymmetric arriva traffic. In a cases, the RSOF and RFOS Scheduers have simiar performance and MWS has the best deay performance. Whie these numerica studies indicate a number of interesting facts on the mean deay performance of randomized scheduers, we eave a more carefu deay performance comparison to future research. There is ceary a need for a deeper investigation of deay performance of throughput-optima scheduers. This work forms the foundation to investigate these higherorder performance metrics in our future research. () In B, if im x f(x+a) f(x) exists for any a R, then this imit shoud be equa to. Indeed, et im x f(x+a) f(x) = b for any a R, where b > 0. Then b = im x f(x+2) f(x) = f(x+2) im x f(x+) f(x+) f(x) = b 2. Thus, b =. (2) If the definition of C is not constrained by the set B, then C is not necessariy a subset of B. In fact, we can construct a f(x+a) function f C for which im x f(x) does not exist and hence f B. (3) In C, if f F, then the ower bound of f(x + x 2 ) aways exists. Aso if there exists w > 0 such that f(2x) wf(x) for any x 0, then the upper bound of f(x + x 2 ) aways exists. Indeed, since f( ) is nondecreasing, f(x + x 2 ) f(x i ), for i = or 2. Hence f(x + x 2 ) 2 (f(x ) + f(x 2 )). Thus, et K = 2, then we aways have K (f(x )+f(x 2 )) f(x +x 2 ). On the other hand, f(x + x 2 ) max{f(2x ), f(2x 2 )} f(2x ) + f(2x 2 ) w(f(x ) + f(x 2 )). Thus, et K 2 = w, we have f(x + x 2 ) K 2 (f(x ) + f(x 2 )). (4) If f C, then given n N, there exist K and K 2 satisfying 0 < K K 2 < such that K m f(x i) f( m x i) K 2 m f(x i), for m =,..., n, where x i 0, i =,..., m. This directy foows from the induction. (5) A f(2x) C =. Indeed, if f A, then im x f(x) =. Thus, for any c > 0, M > 0 such that f(2x) > cf(x) for any x > M. Hence, f C. On the other hand, if f C, then d > 0 f(2x) such that f(2x) df(x). Hence, im sup x f(x) d and thus f A. APPENDIX B PROOF FOR LEMMA VII. CONCLUSIONS We expored the imitations of randomization in the throughput-optima scheduer design in a generic framework under the time-scae separation assumption. We identified three important functiona forms of queue-ength-based scheduers that covers a vast number of dynamic scheduers of interest. These forms differ fundamentay in whether they work with the queue-ength of individua inks or whoe schedues. For a of these functiona forms, we estabished some sufficient and some necessary conditions on the network topoogy and the functiona forms for their throughput-optimaity. We aso provided numerica resuts to vaidate our theoretica resuts and conjectures, which wi be further studied in our future work. APPENDIX A PROPERTIES OF FUNCTIONAL CLASSES The foowing remarks expore more properties of casses A, B and C. Proof: If n =, because λ (0, ), by assumption, there exists a 0 < δ < λ, such that a2 λ a 2 ( + δ ). Assume that n = k, it is true. That is, if k λ i < and λ i > 0 (i =,..., k), then there exists a δ k = δ(λ,..., λ k ) > 0 such that λ a λ k a 2 k (a a k ) 2 ( + δ k ). (6) Then for n = k + and λ λ k + λ k+ <, we have a a 2 k + a 2 k+ λ λ k λ k+ = a a 2 k λ λ k + ( λ k + λ k+ a 2 k + λ k + λ k+ a 2 λ k + λ k+ λ k λ k+) k+ [ λ k + λ k+ a a k + a 2 k λ + λ k + λ k+ a 2 k+ k λ k+ ( + δ k+ ) (by assumption). (7) ] 2

11 Since λ k + λ k+ λ k a 2 k + λ k + λ k+ λ k+ a 2 k+ (a k + a k+ ) 2 = λ k+ a 2 k + λ k a 2 k+ 2a k a k+ λ k λ k+ λ k+ 2 a 2 k λ λ k a 2 k+ k λ 2a ka k+ = 0, (8) k+ hence λ k + λ k+ λ k a 2 k + λ k + λ k+ λ k+ a 2 k+ (a k + a k+ ). (9) Thus, equation (7) becomes k+ k+ a 2 i ( a i ) 2 ( + δ k+ ). λ i APPENDIX C PROOF OF INEQUALITY (0) V : = E [V (Q[t + ]) V (Q[t]) Q[t] = Q] N [ ] = E λ i (h(q i [t + ]) h(q i [t])) Q[t] = Q. By the mean-vaue theorem, we have h(q i [t+]) h(qi [t]) = f(r i[t])(qi [t + ] Qi [t]) = f(ri [t])(ai [t] Si [t] + U i[t]), where R i[t] ies between Qi [t] and Qi [t + ]. Hence, we get N [ ] V = E λ i f(r[t])(a i [t] S i [t] + U i [t]) Q[t] = Q N [ ] = E λ i f(r[t])u i i [t] Q[t] = Q + } {{ } =: V N [ E λ i f(r[t])(a i i [t] S i [t]) Q[t] = Q } {{ } =: V 2 ]. For V, if Q i [t] = Qi > 0, then U i[t] = 0. If Qi [t] = Qi = 0, then U i[t] may be equa to. But in this case, Qi [t + ] K (since A i [t] K). Hence, f(ri [t]) f(k) <. Thus, N [ ] V = E λ i f(r[t])u i i [t] Q[t] = Q {Q i =0} N N f(k) D f(k), (20) λ i where D := min{λ i } < and { } is the indicator function. Next, et s focus on V 2. We know that f(r i[t]) = f(qi [t]+ a i ) ( ai K). According to the definition of function f B, given ɛ > 0, there exists M > 0, such that for any Q i [t] = Q i > M, we have f(r i [t]) f(q i ) < ɛ, that is, ( ɛ)f(q i ) < f(r i[t]) < ( + ɛ)f(qi ). Thus, we have f(r i [t])(a i [t] S i [t]) =f(r i [t]) [ (A i [t] S i [t]) + (A i [t] S i [t]) ] ( + ɛ)f(q i )(A i [t] S i [t]) + ( ɛ)f(q i )(A i [t] S i [t]) =f(q i )(A i [t] S i [t]) + ɛf(q i ) A i [t] S i [t] f(q i )(A i [t] S i [t]) + Kɛf(Q i ), (2) where (x) + = max{x, 0}, (x) = min{x, 0}, and A i [t] S i [t] Ai [t] K. Thus, we divide V 2 into two parts: V 2 = + N N [ E f(r[t])(a i i [t] S λ i i [t]) Q[t] = Q ] {Q i >M} } {{ } =: V 3 ] [ E f(r[t])(a i i [t] S λ i i [t]) Q[t] = Q {Q i M} } {{ } =: V 4 For V 3, by using (2), we have N V 3 λ i + DKɛ f(q i )(λ i P i ) {Q i >M} N f(q i ) {Q i >M}, (22) where P i = E [ S i[t] Q[t] = Q] = et s consider the term N can be expressed as: N λ i f(q i )(λ i P i ) N N = f(q i ) ( N = Since N ( λ i f(q i ) λ i f(qi ))2 N ( f(q i ) λ i f(qi ) N k= k f(qk f(q i )(λi P i f(qi ) N k= k f(qk ). Next, ). ), which f(q i ) )( λ i f(qi )) N f(qi ). )( f(q i )) N λ i ( f(q i )) 2, where λ i = max {,..., } λ i, and by Lemma, there exists a δ > 0 such that N λ i ( N f(q i )) 2 ( f(q i )) 2 ( + δ), (23)

12 2 we have N ( Thus, we get f(q i ) λ i N λ i Hence, we have N λ i )( N f(q i )) ( f(q i )) 2 ( + δ). f(q i )(λ i P i ) δ f(q i )(λ i P i ) {Q i >M} N f(q i ). (24) N N δ f(q i ) {Q i >M} δ f(q i ) {Q i M} N λ f(q i )(λ i P i ) {Q i M} N N δ f(q i ) {Q i >M} + λ i f(q i )P i {Q i M} N N δ f(q i ) {Q i >M} + D f(m). (25) Thus, we can choose ɛ sma enough such that γ = δ DKɛ > 0, and thus we have N N V 3 γ f(q i ) {Q i >M} + D f(m) N N γ f(q i ) + (D + γ) f(m) For V 4, we have V 4 N λ i [ ] E λ i f(r[t]) A i i [t] S i [t] Q[t] = Q N N Kf(M + K) DK f(m + K). Thus, we get where G := D N K) + (D + γ) N V γ {Q i M} N f(q i ) + G, (26) f(k) + DK N f(m) <. REFERENCES f(m + [] L. Bui, A. Eryimaz, R. Srikant, and X. Wu. Joint asynchronous congestion contro and distributed scheduing for wireess networks. In Proc. IEEE Internationa Conference on Computer Communications. (INFOCOM), Barceona, Spain, Apri [2] P. Chaporkar, K. Kar, and S. Sarkar. Throughput guarantees through maxima scheduing in wireess networks. In Proc. Aerton Conference on Communication, Contro, and Computing (Aerton), Monticeo, Iinois, September [3] A. Eryimaz, A. Ozdagar, D. Shah, and E. Modiano. Distributed crossayer agorithms for the optima contro of mutihop wireess networks. IEEE/ACM Transactions on Networking, 8(2):638 65, 200. [4] A. Eryimaz, R. Srikant, and J. Perkins. Stabe scheduing poicies for fading wireess channes. IEEE/ACM Transactions on Networking, 3(2):4 424, [5] L. Georgiadis, M. Neey, and L. Tassiuas. Resource aocation and cross-ayer contro in wireess networks. Foundations and Trends in Networking, (): 44, [6] J. Ghaderi and R. Srikant. On the design of efficient csma agorithms for wireess networks, 200. Avaiabe onine at cache/ arxiv/pdf/003/ v.pdf. [7] L. Jiang and J. Warand. A csma distributed agorithm for throughput and utiity maximization in wireess networks. In Proc. Aerton Conference on Communication, Contro, and Computing (Aerton), Monticeo, Iinois, September [8] C. Joo, X. Lin, and N. Shroff. Understanding the capacity region of the greedy maxima scheduing agorithm in muti-hop wireess networks. In Proc. IEEE Internationa Conference on Computer Communications. (INFOCOM), Phoenix, Arizona, Apri [9] K. Kar, S. Sarkar, and L. Tassiuas. Achieving proportiona fairness using oca information in aoha networks. IEEE Transactions on Automatic Contro, 49(0): , [0] H. Lee, E. Modiano, and L. Le. Distributed throughput maximization in wireess networks via random power aocation. In Proc. IEEE Modeing and Optimization in Mobie, Ad Hoc, and Wireess Networks (WiOPT), Seou, Korea, June [] B. Li and A. Eryimaz. A fast-csma agorithm for deadine-constrained scheduing over wireess fading channes. In Proc. Internationa Workshop on Resource Aocation and Cooperation in Wireess Networks (RAWNET/WNC3), Princeton, New Jersey, May 20. [2] B. Li and A. Eryimaz. On the imitations of randomization for queue-ength-based scheduing in wireess networks. In Proc. IEEE Internationa Conference on Computer Communications. (INFOCOM), Shanghai, China, Apri 20. [3] X. Lin and N. Shroff. The impact of imperfect scheduing on cross-ayer rate contro in mutihop wireess networks. In Proc. IEEE Internationa Conference on Computer Communications. (INFOCOM), Miami, Forida, March [4] P. Marbach, A. Eryimaz, and A. Ozdagar. Achievabe rate region of csma scheduers in wireess networks with primary interference constraints. In Proc. IEEE Conference on Decision and Contro (CDC), New Oreans, Louisiana, December [5] P. Marbach, A. Eryimaz, and A. Ozdagar. On the throughput-optimaity of csma poicies in mutihop wireess networks, avaiabe at eryimaz/csmatechreport.pdf. [6] M. Mitzenmacher and E. Upfa. Probabiity and Computing: Randomized Agorithms and Probabiistic Anaysis. Cambridge University Press, New York, NY, [7] M. Neey. Stochastic Network Optimization with Appication to Communication and Queueing Systems. Morgan & Caypoo, 200. [8] M. Neey, E. Modiano, and C. Rohrs. Dynamic power aocation and routing for time varying wireess networks. In Proc. IEEE Internationa Conference on Computer Communications. (INFOCOM), San Francisco, Caifornia, Apri [9] J. Ni and R. Srikant. Distributed csma/ca agorithms for achieving maximum throughput in wireess networks. In Proc. IEEE Internationa Workshop on Information Theory and Appications (ITA), San Diego, Caifornia, February [20] S. Rajagopaan and D. Shah. Distributed agorithm and reversibe network. In Proc. IEEE Conference on Information Sciences and Systems (CISS), Princeton, New Jersey, March [2] S. Rajagopaan, D. Shah, and J. Shin. Network adiabatic theorem: an efficient randomized protoco for contention resoution. In Proc. ACM Internationa Conference on Measurement and Modeing of Computer Systems(SIGMETRICS), Seatte, Washington, June [22] S. Sanghavi, L. Bui, and R. Srikant. Distributed ink scheduing with constant overhead. In Proc. ACM Internationa Conference on Measure-

13 3 [23] [24] [25] [26] [27] ment and Modeing of Computer Systems. (SIGMETRICS ), San Diego, Caifornia, June G. Sasaki and B. Hajek. Link scheduing in poynomia time. IEEE Transactions on Information Theory, 34(5):90 97, 988. S. Shakkottai and A. Stoyar. Scheduing for mutipe fows sharing a time-varying channe: The exponentia rue. Transations of the AMS, Series 2, A voume in memory of F. Karpeevich, 207:85 202, L. Tassiuas. Linear compexity agorithms for maximum throughput in radio networks and input queued switches. In Proc. IEEE Internationa Conference on Computer Communications. (INFOCOM), San Francisco, Caifornia, Apri 998. L. Tassiuas and A. Ephremides. Stabiity properties of constrained queueing systems and scheduing poicies for maximum throughput in mutihop radio networks. IEEE Transactions on Automatic Contro, 36(2): , 992. L. Tassiuas and A. Ephremides. Dynamic server aocation to parae queues with randomy varying connectivity. IEEE Transactions on Information Theory, 39(2): , 993. Bin Li received his B.S. degree in Eectronic Engineering and M.S. degree in Communication Engineering, both from Xiamen University, China, in 2005 and 2008, respectivey. Between 2008 and 2009, he was with the University of Texas at Arington. He is currenty pursuing the Ph.D. degree in the Department of Eectrica and Computer Engineering at The Ohio State University. His research interests incude wireess communication and networks, optima network contro, distributed agorithms, and optimization theory. Atia Eryimaz (S 00-M 06) received his B.S. degree in Eectrica and Eectronics Engineering from Bog azic i University, Istanbu, in 999, and the M.S. and Ph.D. degrees in Eectrica and Computer Engineering from the University of Iinois at UrbanaChampaign in 200 and 2005, respectivey. Between 2005 and 2007, he worked as a Postdoctora Associate at the Laboratory for Information and Decision Systems at the Massachusetts Institute of Technoogy. He is currenty an Assistant Professor of Eectrica and Computer Engineering at The Ohio State University. Dr. Eryimaz s research interests incude design and anaysis for communication networks, optima contro of stochastic networks, optimization theory, distributed agorithms, pricing in networked systems, and information theory. He received the NSF-CAREER and the Lumey Research Awards in 200.

Optimal Distributed Scheduling under Time-varying Conditions: A Fast-CSMA Algorithm with Applications

Optimal Distributed Scheduling under Time-varying Conditions: A Fast-CSMA Algorithm with Applications Optima Distributed Scheduing under Time-varying Conditions: A Fast-CSMA Agorithm with Appications Bin Li and Atia Eryimaz Abstract Recenty, ow-compexity and distributed Carrier Sense Mutipe Access (CSMA)-based

More information

TOWARDS A FRAMEWORK FOR EFFICIENT RESOURCE ALLOCATION IN WIRELESS NETWORKS: QUALITY-OF-SERVICE AND DISTRIBUTED DESIGN

TOWARDS A FRAMEWORK FOR EFFICIENT RESOURCE ALLOCATION IN WIRELESS NETWORKS: QUALITY-OF-SERVICE AND DISTRIBUTED DESIGN TOWARDS A FRAMEWORK FOR EFFICIENT RESOURCE ALLOCATION IN WIRELESS NETWORKS: QUALITY-OF-SERVICE AND DISTRIBUTED DESIGN DISSERTATION Presented in Partia Fufiment of the Requirements for the Degree of Doctor

More information

Delay Analysis of Maximum Weight Scheduling in Wireless Ad Hoc Networks

Delay Analysis of Maximum Weight Scheduling in Wireless Ad Hoc Networks 1 Deay Anaysis o Maximum Weight Scheduing in Wireess Ad Hoc Networks ong Bao e, Krishna Jagannathan, and Eytan Modiano Abstract This paper studies deay properties o the weknown maximum weight scheduing

More information

Arbitrary Throughput Versus Complexity Tradeoffs in Wireless Networks using Graph Partitioning

Arbitrary Throughput Versus Complexity Tradeoffs in Wireless Networks using Graph Partitioning University of Pennsyvania SchoaryCommons Departmenta Papers (ESE) Department of Eectrica & Systems Engineering November 2006 Arbitrary Throughput Versus Compexity Tradeoffs in Wireess Networks using Graph

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

A Survey on Delay-Aware Resource Control. for Wireless Systems Large Deviation Theory, Stochastic Lyapunov Drift and Distributed Stochastic Learning

A Survey on Delay-Aware Resource Control. for Wireless Systems Large Deviation Theory, Stochastic Lyapunov Drift and Distributed Stochastic Learning A Survey on Deay-Aware Resource Contro 1 for Wireess Systems Large Deviation Theory, Stochastic Lyapunov Drift and Distributed Stochastic Learning arxiv:1110.4535v1 [cs.pf] 20 Oct 2011 Ying Cui Vincent

More information

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao, Vivek Raghunathan, Stephen Hany, Vinod Sharma and. R. Kumar Abstract We consider a joint power contro

More information

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay Throughput Optima Scheduing for Wireess Downinks with Reconfiguration Deay Vineeth Baa Sukumaran vineethbs@gmai.com Department of Avionics Indian Institute of Space Science and Technoogy. Abstract We consider

More information

Heavy-traffic Delay Optimality in Pull-based Load Balancing Systems: Necessary and Sufficient Conditions

Heavy-traffic Delay Optimality in Pull-based Load Balancing Systems: Necessary and Sufficient Conditions Heavy-traffic Deay Optimaity in Pu-based Load Baancing Systems: Necessary and Sufficient Conditions XINGYU ZHOU, The Ohio State University JIAN TAN, The Ohio State University NSS SHROFF, The Ohio State

More information

An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks

An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks An Adaptive Opportunistic Routing Scheme for Wireess Ad-hoc Networks A.A. Bhorkar, M. Naghshvar, T. Javidi, and B.D. Rao Department of Eectrica Engineering, University of Caifornia San Diego, CA, 9093

More information

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization Scaabe Spectrum ocation for Large Networks ased on Sparse Optimization innan Zhuang Modem R&D Lab Samsung Semiconductor, Inc. San Diego, C Dongning Guo, Ermin Wei, and Michae L. Honig Department of Eectrica

More information

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea-Time Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

Delay Asymptotics with Retransmissions and Fixed Rate Codes over Erasure Channels

Delay Asymptotics with Retransmissions and Fixed Rate Codes over Erasure Channels Deay Asymptotics with Retransmissions and Fixed Rate Codes over Erasure Channes Jian Tan, Yang Yang, Ness B. Shroff, Hesham E Gama Department of Eectrica and Computer Engineering The Ohio State University,

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea- Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process Management,

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

Age-based Scheduling: Improving Data Freshness for Wireless Real-Time Traffic

Age-based Scheduling: Improving Data Freshness for Wireless Real-Time Traffic Age-based Scheduing: Improving Data Freshness for Wireess Rea-Time Traffic Ning Lu Department of CS Thompson Rivers University amoops, BC, Canada nu@tru.ca Bo Ji Department of CIS Tempe University Phiadephia,

More information

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with?

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with? Bayesian Learning A powerfu and growing approach in machine earning We use it in our own decision making a the time You hear a which which coud equay be Thanks or Tanks, which woud you go with? Combine

More information

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract Stochastic Compement Anaysis of Muti-Server Threshod Queues with Hysteresis John C.S. Lui The Dept. of Computer Science & Engineering The Chinese University of Hong Kong Leana Goubchik Dept. of Computer

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 2, FEBRUARY

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 2, FEBRUARY IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO. 2, FEBRUARY 206 857 Optima Energy and Data Routing in Networks With Energy Cooperation Berk Gurakan, Student Member, IEEE, OmurOze,Member, IEEE,

More information

Mat 1501 lecture notes, penultimate installment

Mat 1501 lecture notes, penultimate installment Mat 1501 ecture notes, penutimate instament 1. bounded variation: functions of a singe variabe optiona) I beieve that we wi not actuay use the materia in this section the point is mainy to motivate the

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

II. PROBLEM. A. Description. For the space of audio signals

II. PROBLEM. A. Description. For the space of audio signals CS229 - Fina Report Speech Recording based Language Recognition (Natura Language) Leopod Cambier - cambier; Matan Leibovich - matane; Cindy Orozco Bohorquez - orozcocc ABSTRACT We construct a rea time

More information

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines Recursive Constructions of Parae FIFO and LIFO Queues with Switched Deay Lines Po-Kai Huang, Cheng-Shang Chang, Feow, IEEE, Jay Cheng, Member, IEEE, and Duan-Shin Lee, Senior Member, IEEE Abstract One

More information

Some Measures for Asymmetry of Distributions

Some Measures for Asymmetry of Distributions Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

CONJUGATE GRADIENT WITH SUBSPACE OPTIMIZATION

CONJUGATE GRADIENT WITH SUBSPACE OPTIMIZATION CONJUGATE GRADIENT WITH SUBSPACE OPTIMIZATION SAHAR KARIMI AND STEPHEN VAVASIS Abstract. In this paper we present a variant of the conjugate gradient (CG) agorithm in which we invoke a subspace minimization

More information

<C 2 2. λ 2 l. λ 1 l 1 < C 1

<C 2 2. λ 2 l. λ 1 l 1 < C 1 Teecommunication Network Contro and Management (EE E694) Prof. A. A. Lazar Notes for the ecture of 7/Feb/95 by Huayan Wang (this document was ast LaT E X-ed on May 9,995) Queueing Primer for Muticass Optima

More information

Reliability: Theory & Applications No.3, September 2006

Reliability: Theory & Applications No.3, September 2006 REDUNDANCY AND RENEWAL OF SERVERS IN OPENED QUEUING NETWORKS G. Sh. Tsitsiashvii M.A. Osipova Vadivosto, Russia 1 An opened queuing networ with a redundancy and a renewa of servers is considered. To cacuate

More information

A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC

A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC (January 8, 2003) A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC DAMIAN CLANCY, University of Liverpoo PHILIP K. POLLETT, University of Queensand Abstract

More information

Atomic Hierarchical Routing Games in Communication Networks

Atomic Hierarchical Routing Games in Communication Networks Atomic Hierarchica Routing Games in Communication etworks Vijay Kambe, Eitan Atman, Rachid E-Azouzi Vinod Sharma Dept. of Industria Engineering Management, IIT - Kharagpur, West Benga, India Maestro group,

More information

Maximum likelihood decoding of trellis codes in fading channels with no receiver CSI is a polynomial-complexity problem

Maximum likelihood decoding of trellis codes in fading channels with no receiver CSI is a polynomial-complexity problem 1 Maximum ikeihood decoding of treis codes in fading channes with no receiver CSI is a poynomia-compexity probem Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department

More information

Seung Jun Baek 1 and Joon-Sang Park Introduction. example, autonomous vehicles, remote surgery, and automated

Seung Jun Baek 1 and Joon-Sang Park Introduction. example, autonomous vehicles, remote surgery, and automated Hindawi Mathematica Probems in Engineering Voume 2017, Artice ID 4362652, 15 pages https://doi.org/10.1155/2017/4362652 Research Artice Deay-Optima Scheduing for Two-Hop Reay Networks with Randomy Varying

More information

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient

More information

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische

More information

Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correlated Channel Failures

Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correlated Channel Failures Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correated Channe Faiures Andrey Lyakhov Vadimir Vishnevsky Institute for Information Transmission Probems of RAS B. Karetny 19, Moscow, 127994, Russia

More information

A Statistical Framework for Real-time Event Detection in Power Systems

A Statistical Framework for Real-time Event Detection in Power Systems 1 A Statistica Framework for Rea-time Event Detection in Power Systems Noan Uhrich, Tim Christman, Phiip Swisher, and Xichen Jiang Abstract A quickest change detection (QCD) agorithm is appied to the probem

More information

ASummaryofGaussianProcesses Coryn A.L. Bailer-Jones

ASummaryofGaussianProcesses Coryn A.L. Bailer-Jones ASummaryofGaussianProcesses Coryn A.L. Baier-Jones Cavendish Laboratory University of Cambridge caj@mrao.cam.ac.uk Introduction A genera prediction probem can be posed as foows. We consider that the variabe

More information

Statistical Learning Theory: A Primer

Statistical Learning Theory: A Primer Internationa Journa of Computer Vision 38(), 9 3, 2000 c 2000 uwer Academic Pubishers. Manufactured in The Netherands. Statistica Learning Theory: A Primer THEODOROS EVGENIOU, MASSIMILIANO PONTIL AND TOMASO

More information

DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM

DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM DIGITAL FILTER DESIGN OF IIR FILTERS USING REAL VALUED GENETIC ALGORITHM MIKAEL NILSSON, MATTIAS DAHL AND INGVAR CLAESSON Bekinge Institute of Technoogy Department of Teecommunications and Signa Processing

More information

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network

More information

Problem set 6 The Perron Frobenius theorem.

Problem set 6 The Perron Frobenius theorem. Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator

More information

Multi-server queueing systems with multiple priority classes

Multi-server queueing systems with multiple priority classes Muti-server queueing systems with mutipe priority casses Mor Harcho-Bater Taayui Osogami Aan Scheer-Wof Adam Wierman Abstract We present the first near-exact anaysis of an M/PH/ queue with m > 2 preemptive-resume

More information

On the Performance of Wireless Energy Harvesting Networks in a Boolean-Poisson Model

On the Performance of Wireless Energy Harvesting Networks in a Boolean-Poisson Model On the Performance of Wireess Energy Harvesting Networks in a Booean-Poisson Mode Han-Bae Kong, Ian Fint, Dusit Niyato, and Nicoas Privaut Schoo of Computer Engineering, Nanyang Technoogica University,

More information

Formulas for Angular-Momentum Barrier Factors Version II

Formulas for Angular-Momentum Barrier Factors Version II BNL PREPRINT BNL-QGS-06-101 brfactor1.tex Formuas for Anguar-Momentum Barrier Factors Version II S. U. Chung Physics Department, Brookhaven Nationa Laboratory, Upton, NY 11973 March 19, 2015 abstract A

More information

Random maps and attractors in random Boolean networks

Random maps and attractors in random Boolean networks LU TP 04-43 Rom maps attractors in rom Booean networks Björn Samuesson Car Troein Compex Systems Division, Department of Theoretica Physics Lund University, Sövegatan 4A, S-3 6 Lund, Sweden Dated: 005-05-07)

More information

6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7

6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7 6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17 Soution 7 Probem 1: Generating Random Variabes Each part of this probem requires impementation in MATLAB. For the

More information

Centralized Coded Caching of Correlated Contents

Centralized Coded Caching of Correlated Contents Centraized Coded Caching of Correated Contents Qianqian Yang and Deniz Gündüz Information Processing and Communications Lab Department of Eectrica and Eectronic Engineering Imperia Coege London arxiv:1711.03798v1

More information

Available online at ScienceDirect. IFAC PapersOnLine 50-1 (2017)

Available online at   ScienceDirect. IFAC PapersOnLine 50-1 (2017) Avaiabe onine at www.sciencedirect.com ScienceDirect IFAC PapersOnLine 50-1 (2017 3412 3417 Stabiization of discrete-time switched inear systems: Lyapunov-Metzer inequaities versus S-procedure characterizations

More information

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver

More information

IN MODERN embedded systems, the ever-increasing complexity

IN MODERN embedded systems, the ever-increasing complexity IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 37, NO., JANUARY 208 2 Muticore Mixed-Criticaity Systems: Partitioned Scheduing and Utiization Bound Jian-Jun Han, Member,

More information

Connectivity and Aggregation in Multihop Wireless Networks

Connectivity and Aggregation in Multihop Wireless Networks Connectivity and Aggregation in Mutihop Wireess Networks Marijke H.L. Bodaender ICE-TCS Schoo of Computer Science Reykjavik University, Iceand. mbodaender@gmai.com Magnús M. Hadórsson ICE-TCS Schoo of

More information

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm 1 Asymptotic Properties of a Generaized Cross Entropy Optimization Agorithm Zijun Wu, Michae Koonko, Institute for Appied Stochastics and Operations Research, Caustha Technica University Abstract The discrete

More information

In-plane shear stiffness of bare steel deck through shell finite element models. G. Bian, B.W. Schafer. June 2017

In-plane shear stiffness of bare steel deck through shell finite element models. G. Bian, B.W. Schafer. June 2017 In-pane shear stiffness of bare stee deck through she finite eement modes G. Bian, B.W. Schafer June 7 COLD-FORMED STEEL RESEARCH CONSORTIUM REPORT SERIES CFSRC R-7- SDII Stee Diaphragm Innovation Initiative

More information

STABILITY OF A PARAMETRICALLY EXCITED DAMPED INVERTED PENDULUM 1. INTRODUCTION

STABILITY OF A PARAMETRICALLY EXCITED DAMPED INVERTED PENDULUM 1. INTRODUCTION Journa of Sound and Vibration (996) 98(5), 643 65 STABILITY OF A PARAMETRICALLY EXCITED DAMPED INVERTED PENDULUM G. ERDOS AND T. SINGH Department of Mechanica and Aerospace Engineering, SUNY at Buffao,

More information

Separation of Variables and a Spherical Shell with Surface Charge

Separation of Variables and a Spherical Shell with Surface Charge Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

The influence of temperature of photovoltaic modules on performance of solar power plant

The influence of temperature of photovoltaic modules on performance of solar power plant IOSR Journa of Engineering (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vo. 05, Issue 04 (Apri. 2015), V1 PP 09-15 www.iosrjen.org The infuence of temperature of photovotaic modues on performance

More information

Chemical Kinetics Part 2

Chemical Kinetics Part 2 Integrated Rate Laws Chemica Kinetics Part 2 The rate aw we have discussed thus far is the differentia rate aw. Let us consider the very simpe reaction: a A à products The differentia rate reates the rate

More information

Coded Caching for Files with Distinct File Sizes

Coded Caching for Files with Distinct File Sizes Coded Caching for Fies with Distinct Fie Sizes Jinbei Zhang iaojun Lin Chih-Chun Wang inbing Wang Department of Eectronic Engineering Shanghai Jiao ong University China Schoo of Eectrica and Computer Engineering

More information

Robust Sensitivity Analysis for Linear Programming with Ellipsoidal Perturbation

Robust Sensitivity Analysis for Linear Programming with Ellipsoidal Perturbation Robust Sensitivity Anaysis for Linear Programming with Eipsoida Perturbation Ruotian Gao and Wenxun Xing Department of Mathematica Sciences Tsinghua University, Beijing, China, 100084 September 27, 2017

More information

Distributed average consensus: Beyond the realm of linearity

Distributed average consensus: Beyond the realm of linearity Distributed average consensus: Beyond the ream of inearity Usman A. Khan, Soummya Kar, and José M. F. Moura Department of Eectrica and Computer Engineering Carnegie Meon University 5 Forbes Ave, Pittsburgh,

More information

c 2007 Society for Industrial and Applied Mathematics

c 2007 Society for Industrial and Applied Mathematics SIAM REVIEW Vo. 49,No. 1,pp. 111 1 c 7 Society for Industria and Appied Mathematics Domino Waves C. J. Efthimiou M. D. Johnson Abstract. Motivated by a proposa of Daykin [Probem 71-19*, SIAM Rev., 13 (1971),

More information

A simple reliability block diagram method for safety integrity verification

A simple reliability block diagram method for safety integrity verification Reiabiity Engineering and System Safety 92 (2007) 1267 1273 www.esevier.com/ocate/ress A simpe reiabiity bock diagram method for safety integrity verification Haitao Guo, Xianhui Yang epartment of Automation,

More information

Spring Gravity Compensation Using the Noncircular Pulley and Cable For the Less-Spring Design

Spring Gravity Compensation Using the Noncircular Pulley and Cable For the Less-Spring Design The 14th IFToMM Word Congress, Taipei, Taiwan, October 25-30, 2015 DOI Number: 10.6567/IFToMM.14TH.WC.PS3.010 Spring Gravity Compensation Using the Noncircuar Puey and Cabe For the Less-Spring Design M.C.

More information

Tracking Control of Multiple Mobile Robots

Tracking Control of Multiple Mobile Robots Proceedings of the 2001 IEEE Internationa Conference on Robotics & Automation Seou, Korea May 21-26, 2001 Tracking Contro of Mutipe Mobie Robots A Case Study of Inter-Robot Coision-Free Probem Jurachart

More information

Threshold-Based Admission Control Policies for Multimedia Servers

Threshold-Based Admission Control Policies for Multimedia Servers Threshod-Based Admission Contro Poicies for Mutimedia Servers ING-RAY CHEN AND CHI-MING CHEN Institute of Information Engineering, Nationa Cheng Kung University, Tainan, Taiwan, ROC Emai: irchen@iie.ncku.edu.tw

More information

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes A Fundamenta Storage-Communication Tradeoff in Distributed Computing with Stragging odes ifa Yan, Michèe Wigger LTCI, Téécom ParisTech 75013 Paris, France Emai: {qifa.yan, michee.wigger} @teecom-paristech.fr

More information

arxiv: v1 [math.ca] 6 Mar 2017

arxiv: v1 [math.ca] 6 Mar 2017 Indefinite Integras of Spherica Besse Functions MIT-CTP/487 arxiv:703.0648v [math.ca] 6 Mar 07 Joyon K. Boomfied,, Stephen H. P. Face,, and Zander Moss, Center for Theoretica Physics, Laboratory for Nucear

More information

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems Source and Reay Matrices Optimization for Mutiuser Muti-Hop MIMO Reay Systems Yue Rong Department of Eectrica and Computer Engineering, Curtin University, Bentey, WA 6102, Austraia Abstract In this paper,

More information

https://doi.org/ /epjconf/

https://doi.org/ /epjconf/ HOW TO APPLY THE OPTIMAL ESTIMATION METHOD TO YOUR LIDAR MEASUREMENTS FOR IMPROVED RETRIEVALS OF TEMPERATURE AND COMPOSITION R. J. Sica 1,2,*, A. Haefee 2,1, A. Jaai 1, S. Gamage 1 and G. Farhani 1 1 Department

More information

Algorithms to solve massively under-defined systems of multivariate quadratic equations

Algorithms to solve massively under-defined systems of multivariate quadratic equations Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations

More information

Symbolic models for nonlinear control systems using approximate bisimulation

Symbolic models for nonlinear control systems using approximate bisimulation Symboic modes for noninear contro systems using approximate bisimuation Giordano Poa, Antoine Girard and Pauo Tabuada Abstract Contro systems are usuay modeed by differentia equations describing how physica

More information

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS TONY ALLEN, EMILY GEBHARDT, AND ADAM KLUBALL 3 ADVISOR: DR. TIFFANY KOLBA 4 Abstract. The phenomenon of noise-induced stabiization occurs

More information

c 2016 Georgios Rovatsos

c 2016 Georgios Rovatsos c 2016 Georgios Rovatsos QUICKEST CHANGE DETECTION WITH APPLICATIONS TO LINE OUTAGE DETECTION BY GEORGIOS ROVATSOS THESIS Submitted in partia fufiment of the requirements for the degree of Master of Science

More information

A proposed nonparametric mixture density estimation using B-spline functions

A proposed nonparametric mixture density estimation using B-spline functions A proposed nonparametric mixture density estimation using B-spine functions Atizez Hadrich a,b, Mourad Zribi a, Afif Masmoudi b a Laboratoire d Informatique Signa et Image de a Côte d Opae (LISIC-EA 4491),

More information

Stochastic Automata Networks (SAN) - Modelling. and Evaluation. Paulo Fernandes 1. Brigitte Plateau 2. May 29, 1997

Stochastic Automata Networks (SAN) - Modelling. and Evaluation. Paulo Fernandes 1. Brigitte Plateau 2. May 29, 1997 Stochastic utomata etworks (S) - Modeing and Evauation Pauo Fernandes rigitte Pateau 2 May 29, 997 Institut ationa Poytechnique de Grenobe { IPG Ecoe ationae Superieure d'informatique et de Mathematiques

More information

Data Mining Technology for Failure Prognostic of Avionics

Data Mining Technology for Failure Prognostic of Avionics IEEE Transactions on Aerospace and Eectronic Systems. Voume 38, #, pp.388-403, 00. Data Mining Technoogy for Faiure Prognostic of Avionics V.A. Skormin, Binghamton University, Binghamton, NY, 1390, USA

More information

Melodic contour estimation with B-spline models using a MDL criterion

Melodic contour estimation with B-spline models using a MDL criterion Meodic contour estimation with B-spine modes using a MDL criterion Damien Loive, Ney Barbot, Oivier Boeffard IRISA / University of Rennes 1 - ENSSAT 6 rue de Kerampont, B.P. 80518, F-305 Lannion Cedex

More information

Improving the Accuracy of Boolean Tomography by Exploiting Path Congestion Degrees

Improving the Accuracy of Boolean Tomography by Exploiting Path Congestion Degrees Improving the Accuracy of Booean Tomography by Expoiting Path Congestion Degrees Zhiyong Zhang, Gaoei Fei, Fucai Yu, Guangmin Hu Schoo of Communication and Information Engineering, University of Eectronic

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

Fractional Power Control for Decentralized Wireless Networks

Fractional Power Control for Decentralized Wireless Networks Fractiona Power Contro for Decentraized Wireess Networks Nihar Jinda, Steven Weber, Jeffrey G. Andrews Abstract We consider a new approach to power contro in decentraized wireess networks, termed fractiona

More information

Determining The Degree of Generalization Using An Incremental Learning Algorithm

Determining The Degree of Generalization Using An Incremental Learning Algorithm Determining The Degree of Generaization Using An Incrementa Learning Agorithm Pabo Zegers Facutad de Ingeniería, Universidad de os Andes San Caros de Apoquindo 22, Las Condes, Santiago, Chie pzegers@uandes.c

More information

Nonlinear Analysis of Spatial Trusses

Nonlinear Analysis of Spatial Trusses Noninear Anaysis of Spatia Trusses João Barrigó October 14 Abstract The present work addresses the noninear behavior of space trusses A formuation for geometrica noninear anaysis is presented, which incudes

More information

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University

More information

Limited magnitude error detecting codes over Z q

Limited magnitude error detecting codes over Z q Limited magnitude error detecting codes over Z q Noha Earief choo of Eectrica Engineering and Computer cience Oregon tate University Corvais, OR 97331, UA Emai: earief@eecsorstedu Bea Bose choo of Eectrica

More information

Approximated MLC shape matrix decomposition with interleaf collision constraint

Approximated MLC shape matrix decomposition with interleaf collision constraint Approximated MLC shape matrix decomposition with intereaf coision constraint Thomas Kainowski Antje Kiese Abstract Shape matrix decomposition is a subprobem in radiation therapy panning. A given fuence

More information

Chemical Kinetics Part 2. Chapter 16

Chemical Kinetics Part 2. Chapter 16 Chemica Kinetics Part 2 Chapter 16 Integrated Rate Laws The rate aw we have discussed thus far is the differentia rate aw. Let us consider the very simpe reaction: a A à products The differentia rate reates

More information

FRST Multivariate Statistics. Multivariate Discriminant Analysis (MDA)

FRST Multivariate Statistics. Multivariate Discriminant Analysis (MDA) 1 FRST 531 -- Mutivariate Statistics Mutivariate Discriminant Anaysis (MDA) Purpose: 1. To predict which group (Y) an observation beongs to based on the characteristics of p predictor (X) variabes, using

More information

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is

More information

Componentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems

Componentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems Componentwise Determination of the Interva Hu Soution for Linear Interva Parameter Systems L. V. Koev Dept. of Theoretica Eectrotechnics, Facuty of Automatics, Technica University of Sofia, 1000 Sofia,

More information

Finite Horizon Energy-Efficient Scheduling with Energy Harvesting Transmitters over Fading Channels

Finite Horizon Energy-Efficient Scheduling with Energy Harvesting Transmitters over Fading Channels Finite Horizon Energy-Efficient Scheduing with Energy Harvesting Transmitters over Fading Channes arxiv:702.06390v [cs.it] 2 Feb 207 Baran Tan Bacinogu, Eif Uysa-Biyikogu, Can Emre Koksa METU, Ankara,

More information

The Group Structure on a Smooth Tropical Cubic

The Group Structure on a Smooth Tropical Cubic The Group Structure on a Smooth Tropica Cubic Ethan Lake Apri 20, 2015 Abstract Just as in in cassica agebraic geometry, it is possibe to define a group aw on a smooth tropica cubic curve. In this note,

More information

Best-effort networks: modeling and performance analysis via large networks asymptotics

Best-effort networks: modeling and performance analysis via large networks asymptotics IEEE INFOCOM 200 Best-effort networs: modeing and performance anaysis via arge networs asymptotics Guy Fayoe Arnaud de La Fortee Jean-Marc Lasgouttes Laurent Massouié James Roberts Abstract In this paper

More information

Probabilistic Assessment of Total Transfer Capability Using SQP and Weather Effects

Probabilistic Assessment of Total Transfer Capability Using SQP and Weather Effects J Eectr Eng Techno Vo. 9, No. 5: 52-526, 24 http://dx.doi.org/.537/jeet.24.9.5.52 ISSN(Print) 975-2 ISSN(Onine) 293-7423 Probabiistic Assessment of Tota Transfer Capabiity Using SQP and Weather Effects

More information

Control Chart For Monitoring Nonparametric Profiles With Arbitrary Design

Control Chart For Monitoring Nonparametric Profiles With Arbitrary Design Contro Chart For Monitoring Nonparametric Profies With Arbitrary Design Peihua Qiu 1 and Changiang Zou 2 1 Schoo of Statistics, University of Minnesota, USA 2 LPMC and Department of Statistics, Nankai

More information

The Binary Space Partitioning-Tree Process Supplementary Material

The Binary Space Partitioning-Tree Process Supplementary Material The inary Space Partitioning-Tree Process Suppementary Materia Xuhui Fan in Li Scott. Sisson Schoo of omputer Science Fudan University ibin@fudan.edu.cn Schoo of Mathematics and Statistics University of

More information

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Brandon Maone Department of Computer Science University of Hesini February 18, 2014 Abstract This document derives, in excrutiating

More information