An Optimization Framework for Practical Multipath Routing in Wireless Mesh Networks
|
|
- Roland Hodges
- 6 years ago
- Views:
Transcription
1 An Optimization Framework for Pratial Multipath Routing in Wireless Mesh Networks Božidar Radunović 1, Christos Gkantsidis 1, Peter Key 1, Pablo Rodriguez 2, and Wenjun Hu 3 1 Mirosoft Researh 2 Telefonia Researh 3 Cambridge University Cambridge, UK Barelona, Spain Cambridge, UK {bozidar,hrisgk,peter.key}@mirosoft.om pablorr@tid.es wenjun.hu@l.am.a.uk June 2007 Tehnial Report MSR-TR Mirosoft Researh Mirosoft Corporation One Mirosoft Way Redmond, WA
2 1 Abstrat We onsider wireless mesh networks, and exploit the inherent broadast nature of wireless by making use of multipath routing. We present an optimization framework that enables us to derive optimal flow ontrol, routing, sheduling, and rate adaptation shemes, where we use network oding to ease the routing problem. We prove optimality and derive a primal-dual algorithm that lays the basis for a pratial protool. Optimal MAC sheduling is diffiult to implement, and we use random sheduling rather than optimal for omparisons. Under random sheduling, our protool beomes fully deentralised. We use simulation to show on realisti topologies that we an ahieve % throughput improvement ompared to single path routing, and several times ompared to a reent related opportunisti protool (MORE). 1 Introdution One of the main hallenges in building wireless mesh networks ([1, 2, 3]) is to guarantee high performane. The diffiulty is mainly aused by the unpreditable and highly-variable nature of the wireless hannel. However, the use of wireless hannels presents some unique opportunities that an be used to improve the performane. For example, the broadast nature of the medium an be used to provide opportunisti transmissions as suggested in [4]. Also, in wireless mesh networks, there are typially multiple paths onneting eah soure destination pair; using some of these paths in parallel an improve performane [5, 6]. The optimal use of multiple paths and of opportunisti transmissions is the main fous of this work. We use network oding [7] to simplify the problem of sheduling paket transmissions aross multiple paths, similarly to [5, 6, 8]. We propose a network optimization framework that optimizes the rate of paket transmissions between soure and destination pairs. In order to use the resoures of the wireless mesh network effiiently, the system needs to take into aount: (a) the existene of multiple paths, (b) the unreliable nature of the links, () the existene of multiple transmission powers and rates (whih in turn affets the probability of orret paket reeption), (d) the broadast nature of the hannel, (e) the ompetition among many flows, (f) fairness and effiieny. Observe that optimizing aross all these parameters results in optimizing aross multiple layers of the networking stak; for example, the hoie of transmission power and rate is typially done at the physial layer, whereas oordination among different flows is typially done at the network layer. As we shall see, it is important to optimize all these parameters simultaneously to ahieve optimal performane. We use an optimization framework to design a distributed maximization algorithm. We aount for transport layer ontrols and address questions of fairness by maximizing the aggregate utility of the end-to-end flows, where we assoiate a utility funtion U( ) with a flow. Beause we use network oding, our optimization framework borrows heavily from [9, 8]. Our algorithm is a primal-dual algorithm [10]. The primal formulation expresses the optimization problem as a funtion of the rates of the various flows in the network; the dual formulation uses as variables the queue lengths (per flow and per node). The main advantage of using the dual formulation of the optimization problem is that the dual variables (also referred as shadow pries) relate to queue lengths and an be diretly used by bak-pressure algorithms for flow ontrol [11, 12]. As a simple example, a large number of queued pakets for a partiular flow at an internal node an be interpreted that the path going through that node is ongested and should be avoided. The main advantage of using the primal-dual formulation is that it adapts the primal variables (i.e. flow rates) more slowly, hene, allows TCP-like window-based rate ontrol modeling (as originally mentioned by Erylimaz et al. [11]). We propose a novel algorithm for ross-layer optimization and prove, using Lyapunov funtions, that it onverges to the optimal rate alloation. The proposed optimization framework is diffiult to implement; indeed, the joint sheduling, rate and power ontrol problem is NP-hard [13]. Additionally, urrent wireless MAC protools use unontrolled randomized hannel sheduling. We propose a distributed heuristi based on the optimal algorithm. We show that, even in the absene of optimal hannel sheduling, the other aspets of the optimization problem (i.e. flow seletion and transmission rate seletion) still give performane advantages. Hene, our heuristi an be implemented in pratial systems. The fundamental idea of our algorithm (and, of the distributed implementation) is to assign redits to nodes,
3 2 transfer redits between nodes, and shedule on the basis of redits (see Se. 3 for more details). The main ontributions of our paper are as follows: We propose a network wide optimization algorithm that maximizes rate-based global network performane, and extends previous work by inorporating broadast (opportunisti routing), multi-path routing, and fairness/rate ontrol (Setions 2 and 3). We introdue a notion of virtual pakets, alled redits, that enable us to deouple routing and flow ontrol from atual paket transmissions. We prove the optimality of the algorithm. Based on the optimization algorithm, we give a distributed implementation of routing, rate adaptation, and flow ontrol for networks with random sheduling (Setion 3.3) that outperforms existing algorithms. We prove that our algorithms extends and outperforms MORE [5]. The distributed algorithm an be used with the urrent MAC, and indeed is MAC independent. We also show how it an be used with pratial network oding shemes with finite generation sizes (Setion 4.1). We demonstrate that rate seletion is important for optimizing performane in a networks (Setion 4.2). We onfirm the findings from [5] that suh optimizations are not neessary for b networks. Using simulation on realisti topologies, we show we an ahieve % throughput improvement with our distributed implementation ompared to single path routing, and % ompared to MORE [5] (Setion 5). 1 2 Model In this setion we introdue the notation used in the paper. We extend the model of wireless erasure network developed in [14] to inlude multiple flows. Vetors are denoted in bold. 2.1 PHY and MAC Charateristis We onsider a network omprising of a set of nodes N, N = N. Whenever a node transmits a paket, several 1 Observe that MORE optimizes the number of transmitted pakets for flows in isolation, and may perform worse than single path, w.r.t. rates, when multiple flows are ative. 1 p12 p p24 p34 4 y 12 C 12 C 1{2,3} Figure 1: A network with 4 nodes is given on the left. For example, an ativation profile {(1, 2), (3, 4)} depits a profile where nodes 1 and 3 are transmitting, nodes 2 is reeiving a paket from node 1, while node 4 is reeiving from node 3. Profile {(1, {2, 3})} depits node 1 transmitting and nodes 2 and 3 reeiving (the same) paket from node 1. Feasible rate region for (y 12, y 13 ) is given on the right, desribe by inequalities: j J y 1j C 1J for all J {2, 3}. nodes may reeive it. We model paket transmission from node i to a set of nodes J N with a hyperar (i, J). We define an ativation profile S = {S l } to be a set of hyperars ative at the same time. There may be several onstraints on feasible ativation profiles. For example, a node may be limited to reeive from but one node, or transmit to only one node at a time. The only ondition we shall impose is that a node an be the soure of only one hyperar in one ativation profile. We denote by S the set of feasible ativation profiles and let SRC(S) = {i N J N, (i, J) S} be the set of transmitters in ativation profile S. Eah transmission has two assoiated parameters, power P P and rate R R, where P is the set of allowed transmission powers (e.g. P [0, P M ], where P M is given by regulations) and R is sets of available PHY transmission rates, defined by supported spreading, oding, and modulations. Consider an ativation profile S in whih node i transmits to set of nodes J, and suppose node i is transmitting with power P i and rate R i. We an assoiate power vetor P = (P i ) i N rate vetor P = (P i ) i N to these transmissions. Let T ij = 1 if a paket is suessfully transmitted from i to j J. We define p ij (P, R i, S) = Prob(T ij (P, R i, S) = 1) to be the probability that node j J will suessfully reeive the paket from i, given the above onditions. We also assume that T ij and T lk are independent for i l or j k, whih is justified C 13 y 13
4 3 by measurements (.f. [15]). By onvention, we assume p ij (P, R i, S) = 0 if j J, for (i, J) S. We an now alulate C ik (P, R i, S) the average number of pakets per unit time onveyed from node i to any of the nodes in K N. We have C ik (P, R i, S) = R i 1 (1 p ij (P, R i, S)). j K (1) Note that C ik (P, R i, S) = 0 if K J =, for (i, J) S. 2.2 Traffi, Routing and Flow Sheduling There is a set of uniast end-to-end flows C in the network, and eah flow C has a soure and a destination node Sr(), Dst() N respetively. Eah flows may take an arbitrary route from a soure to a destination, subjet to onstraints imposed by the set of ativation profiles. We denote by f the rate of flow C. One flow may take multiple routes to the destination. We assume routing is done at eah hop. Eah relay will deide how muh traffi from a flow it will forward to other nodes. This deision is made through redit assignment, as desribed next in Setion 2.4. Whenever a node is ative, it needs to deide whih flow it will transmit. This is defined through a flowsheduling profile matrix A. If node i transmits a paket from flow we set A i = 1, otherwise A i = 0. We say that a flow sheduling profile is valid if for eah i N there exists only one C suh that A i = 1. Let A be the set of all valid flow sheduling profiles. To illustrate the use of flow sheduling profile, onsider the example in Figure 1 having two flows C = {1, 2}, both from 1 to 4. The number of pakets for flow sent by node 1 and reeived by node 2 equals A 1 (C 12 (P, R i, S) + C 1{2,3} (P, R i, S)) and it depends not only on how often (1, 2) is sheduled, but also on how often (1, {2, 3}) is sheduled. This is why the flow sheduling deision is assigned to a node, instead to a link as in [16, 17, 11]. 2.3 Network Coding We assume network oding per flow is used [14, 5]. The main benefit of network oding is that it failitates sheduling. If the same paket is reeived by several nodes, a mehanism is needed to prevent two or more nodes forward the same pakets [4]. To eliminate this problem, eah relay forwards a random linear ombination of all previously reeived pakets from the same flow. Ideally, network oding should be performed at the sale of the whole flow. However, this is not pratial. Instead, pakets are divided in generations and only pakets from the same generation are ombined. For more details see [14, 5]. In Setion 3 we analyze networks with very large generation sizes (as in [14]) and we address the finite generation sizes in Setion Credits Whenever a paket is transmitted, it may be reeived by several nodes, and it is important to deide whih should forward pakets, to avoid redundant transmissions (as explained in [18, 5]). We will use a onept of redits, whih is similar to the ontrol deision variable of Neely [18]. Credits are reated for eah paket at the soure node, and identified with a generation, not a speifi paket. They are interpreted as the number of pakets of a speifi flow to be transferred by the node. Credits are onserved until they arrive at the flow s destination. The main advantage of the redit sheme is that it simplifies sheduling. Credits are delarations of intent. The atual paket transmissions may our at arbitrary time instants. Due to the use of network oding, we only need to ensure that the total number of pakets per generation transmitted between eah two nodes orresponds to the number of redits. Thus, sheduling is done at a generation level and not at the paket level, inuring signifiantly smaller overhead (espeially when the generation size is large). In pratie, redits an be piggybaked with paket transmissions. The reeiving node only updates its redits when a suessful paket transmission atually ours. In this work we assume there is an ideal (no loss and no delay) signaling plane that transmits redits and feedbaks. Our results an be extended to onsider imperfet signaling (f. [12]). As eah redit delegates one paket to a node, we may express all the rates in the system in terms of redits. For example, yij is the rate of redits of flow passed from node i to node j. Theorem 1 shows that the rate of in-
5 4 dependent pakets reeived at a destination of eah flow will orrespond to the number of redits delivered, when the generation size is large. 2.5 Dynamis and Stability We further assume the system is slotted in time. In eah slot t = 0, 1,... a medium aess protool assigns an ativation profile S(t) and a flow-sheduling profile A(t), and to eah transmitter i SRC(S(t)) we assign transmit power P i (t) and rate R i (t). We further denote by yij (t) the number of redits for flow transmitted from node i to node j during slot t, and with x ij (t) the number of pakets of flow atually transmitted from i to any of the nodes in J during slot t. Let f (t) be the number of fresh pakets/redits generated at the soure of flow. Note that, beause eah paket transmission is always assoiated to a redit transmissions, we look at redit queues. Let qi (t) be the amount of redits of flow queued at node i. The system is stable if every queue size is bounded. We will define stability more formally in Setion Optimal Flow Control For Fairness In this Setion we introdue the optimization problem (Se. 3.2), propose an algorithm for solving it (Se. 3.3), and prove that the algorithm onverges (Se. 3.4). Se.3.1 introdues some further notation that is needed for the desription of the optimization problem. Finally, in Se. 3.5 we ompare it theoretially with the MORE algorithm proposed in [5]. 3.1 Feasible Rate Set Assume an assignment of end-to-end rates f, for eah flow, and denote the rate vetor by f = (f ) C. The vetor of rates is valid under the following three onditions. First, by onservation of the flow of redits at eah node i Dst(): yji + f 1 i=sr() yij (2) j i j i Also, y ij 0. Seond, due to the onstraints of the broadast regions (see also Fig. 1): yij x ij (3) j J Assume now that variables α S,R,P,A define a shedule and denote a fration of time network uses sheduling profile S, routing profile A and power and rate alloations R, P. By definition, α S,R,P,A 0 and S,R,P,A α S,R,P,A 1. The third ondition omes from sheduling onstraints: x ij S,A,R,P α S,R,P,A A i C ij (P, R i, S) (4) Note that (as explained in Setion 2.2), although (4) implies { x ij } i,j belongs to Hull({C ij (P, R i, S)} i,j ), the onverse is not true. We will use the following haraterization of feasible rates from [8]: Definition 1. Vetor f is said to be feasible if eah flow an transport information from Sr() to Dst() at rate f. Theorem 1. Let F be the set of end-to-end rate vetor f = (f ) C suh that there exists vetors y = (y ij ) i,j N, C, x = (x ij ) i N,J N, C, and α = (α S,R,P,A ) S S,R RN,P P N,A A that satisfy (2), (3), and (4) subjet to α S,R,P,A 0 and S,R,P,A α S,R,P,A 1. The vetor f is feasible when oding generation size goes to infinity if and only if it belongs to F. Moreover, the set of feasible end-to-end rates F is onvex. Proof. Follows diretly from [8]. 3.2 Utility Maximization For eah flow C we define a utility funtion U ( ) to be a stritly onave, inreasing funtion of end-to-end flow rate f. The utility of flow is then U (f ). For example, U (f ) = log(f ) represents proportional fairness [19] and U (f ) 1/f approximates TCP s utility [10]. The goal of utility maximization is to ahieve trade-off between effiieny and fairness. A typial example of suh approah is proportional fairness [19].
6 5 We an write the network-wide optimization problem as max C U (f ) (5) s.t. f F. Sine set F is onvex and the objetive is stritly onave, there exists a unique solution f to the maximization problem. Corresponding y, x also exist but are not neessarily unique. Let us denote with µ i and ξ ij the Lagrangian multipliers assoiated with inequalities (2) and (3), respetively. To simplify the notation we will also define µ Dst() = 0. We an write the KKT onditions at the optimal point µ i yij yji f 1 i=sr() = 0, (6) j i j i f ξ ij x ij j J yij ( ) U (f ) µ Sr() = 0, (7) = 0, (8) We see that µ i an be positive only if more traffi of flow omes into node i than leaves it. Hene intuitively we an relate µ i to qi (t), the number of redits for flow queued at i. Similarly we an relate ξij to the number of pakets queued for broadasting at i. In Setion 3.3 we will express this relationship more formally. We will also use (8) to develop a flow ontrol algorithm. As a onsequene of KKT, using some elementary algebra one an derive 0 µ i µ j J N j J CiJ = argmax C ij {C ij (P,R i,s)} i ξ ij, (9) max J ξ ij C ij (10) Notably we will use (10) in Setion 3.3 to derive the optimal sheduling. 3.3 Maximization Algorithm We next present an algorithm that onverges to the optimal value of (5). In the following we assume that the feedbak is ideal, hene that the aknowledgments and redits are transmitted instantaneously and without errors. We leave the analysis of signaling with losses and delays for future work. Node and Transport Credits : Reall that qi (t) is the amount of redits of ommodity queued at node i. We all these redits node redits. In addition, let wij (t) be the number of redits of ommodity queued at i and orresponding to the pakets that have to be delivered to any of the nodes in J (as previously deided by the redit transmission sheme). We all these redit transport redits. When a redit for flow is passed from node i to node j, we derease qi, we inrease q j, and we inrease w ij for all J j (all of them by one unit). We derease wij when a paket from flow is atually transmitted from i to any of the nodes in J. Routing protool: Node redits represent intentions of paket transmissions and a routing protool desribes when and how are node redits transferred. Let yij (t) be the number of node redits for flow transferred from node i to node j at time t and let us define wij (t) = X N j X w ix (t). A bak-pressure between nodes i and j is defined as z ij(t) = q i (t) w ij(t) q j(t), the differene between the exess redits queued of flow at node i not destined for node j (qi w ij ) and the node redits at node j (qj ). A redit is routed from i to j only if the bak-pressure is positive: y ij(t) = M 1 {z ij (t)>0}, (11) where 1 {x>0} is 1 if x > 0 or 0 otherwise. In Setion 3.4 we will derive onditions on M to guarantee onvergene of the algorithm. Sheduling, rate and power ontrol: The optimal sheduling, rate and power ontrol algorithm is the tuple (S(t), P (t), R(t), A(t)) that solves the following op-
7 6 timization problem w i (t, P, R i, S) = max (S(t), P(t), R(t)) = argmax S,P,R J wij(t)c ij (P, R i,(12) S), i N w i (t, P, R i, S), (13) C ij (t) = C ij (P(t), R i (t), S(t)), (14) i (t) = argmax wik(t)c ik (t),(15) A i (t) = 1 {= i (t)}, (16) x ij(t) = A i C ij (t) (17) Equations (12)-(17) represent a joint sheduling, rate, and power ontrol problem. We find the optimal sheduling, power and rate ontrol (S(t), P (t), R(t)) by solving (13). Then, equation (15) is used to selet whih flow will be transmitted by eah node in slot t. Note that, as explained in Setion 2.2, we annot deouple the flow seletion proess A(t) and routing/sheduling/rate/power ontrol as it was done in similar approahes that do not use opportunisti routing (e.g. [16, 17, 11]). Also, unlike in [16, 17, 11, 18], we do not expliitly use bak-pressure information for sheduling in (12)-(17); instead we use transmission redits wij (t). Observe that all equations exept (13) use loal information only. Hene, with the exeption of (13) (assuming that we ould somehow ompute the values C ij (t)), the problem ould have been solved with a distributed algorithm. Reall from Se. 2.1 that C ij (t) relate to hannel sheduling. If hannel sheduling was determined by the MAC protool, as is typial in most urrent wireless tehnologies (where nodes randomly ompete for the wireless hannel), then the quantities C ij (t) are expliitly known and the rest of the optimization problem an be omputing using loal omputations. Of ourse, with random sheduling it is not possible to ahieve optimal performane, but, on the other hand, we an implement the optimization framework with a distributed algorithm and still observe performane benefits (as we shall see in Se. 5). Flow ontrol: The optimal flow rate at the soure, f (t) an be alulated using a primal-dual approah, as in [11] f (t + 1) = K [ ( )] + f (t) + γ U (f (t)) qsr() (t), (18) where [x] + = max{x, 0}. Eah flow adapts its rate based on the previous rate and urrent number of redits queing for transmission at the soure node for that flow (q Sr() ). The primal-dual approah well desribes additive-inrease multipliative-derease transport protools, like TCP [10]. 3.4 Convergene Of The Algorithm We now onsider a fluid model of the system, and show that it onverges to the optimal point. Analysis of a disrete-time model an be derived from our fluid-model analysis, using a similar approah to [11]. We assume that time is ontinuous and that queue evolutions are governed by following differential equations q i (t) = ẇ ij(t) = f (t)1 i=sr() + yji(t) j j j J y ij(t) x ij(t) yij(t) (19) q i (t) 0 wij (t) 0 (20) where (x) y>z equals x is y > z or 0 otherwise. Similarly, flow rate evolution in the fluid-model is given by f (t) = γ ( U (f (t)) q Sr() )f (t) 0. (21) We next prove that the algorithm presented in Setion 3.3 stabilizes the system with flow rates that maximize the optimization problem (5). Let us first define an ative link Definition 2. We say that link (i, j) is ative for flow if there exist a finite number T suh that for eah t that satisfies y ij (t) > 0, there exists t, t < t < t + T suh that y ij (t ) > 0. Intuitively, if a node is ompletely disonneted from the rest of the network, or in any way not used by a flow, redits will neither arrive to nor will leave the node. Thus tehnially, we annot guarantee that an arbitrary initial number of redits at this node will onverge to any partiular value. Instead, we onsider only ative links (and the orresponding nodes) whose average traffi is at least M/T. We then have:
8 7 Theorem 2. If M > max f then, starting from any vetors f(0), q(0), w(0), the rate vetor f(t) onverges to f as t goes to infinity. Furthermore, queue sizes qi (t), q j (t) and wij (t) on all ative links (i, j) for flow are bounded, and ξ ij re- and onverge to the shadow pries µ i spetively., µ j Proof. The proof uses a Lyapunov funtion with stability defined on the set of ative link, and we show that on all ative links that arry a positive amount of traffi, the delays are bounded hene the system is stable. The details are given in the appendix. 3.5 Comparison with MORE In this setion we ompare the performane of our algorithm with the MORE algorithm presented in [5, 20]. Our algorithm onverges to the optimal solution of the optimization problem (5) (as shown in Theorem 2), hene MORE at best is as good as our algorithm. We first show under what onditions MORE is guaranteed to give the optimal solution. We then also illustrate by two examples that MORE an yield stritly suboptimal rate alloations. Theorem 3. If there is only one flow in the system, if transmission rates and powers of all nodes are fixed and if only one node an transmit at a time (that is SRC(S) = 1 for all S S),MORE and our algorithm give the same performane. Proof. Sine only one node an transmit at a time, we have S = N. Furthermore, transmission powers and rates are fixed, hene (3) and (4) reads as j J y ij α i C ij. We also omit as there is only one flow in the system. We start with the MORE optimization problem, as given in [20], and we introdue f = 1/ ( i N z i), y ij = f x ij and α i = f z i. The optimization from [20, Eq.(1)-(4)] is then equivalent to min 1/f (22) s.t. y ij y ji = f1 {i=sr} (23) j N j N α i C ij y ij, (24) j J α i = 1, (25) i N 1 p 12 p p 24 p 35 y 1 y 3 Wall y 2 Figure 2: A network with 6 nodes. Due to a wall in between, nodes 2 and 4 do not interfere with nodes 3 and 5. The set of ativation profiles is S = {{(1, {2, 3})}, {(2, 3)}, {(3, 5)}, {(4, 6)}, {(5, 6)}, {(2, 4), (3, 5)}, {(2, 4), (5, 6)}, {(3, 5), (4, 6)}}. There are two flows in the system, flow f 1 = y 1 + y 2 whih is assigned 2 routes (y 1 = y and y 2 = y ) and flow f 2 = y 3 whih is assigned a single route (y 3 = y 2 4 ). 4 5 p 46 p 56 whih is exatly the optimization problem (5). We next give two examples where the performane of MORE is stritly suboptimal. Consider a hexagonal network depited in Figure 2. Let us first onsider a ase with a single flow f 1, (f 2 = 0), and in whih p 12 = p 24 = p 46 = 0.8 and p 13 = p 35 = p 56 = 0.2. Sine not all links interfere, the onditions of Theorem 3 are learly not satisfied. The optimal rate alloation that maximizes (5) is f = with y = and y = However, MORE will transmit all pakets over the path , hene the total rate will be f MORE = 0.267, some 15% less than the optimal. Intuitively, the reason why MORE is suboptimal is that it does not onsider possibility that links 3 5 and 5 6 transmit in parallel with 4 6 and 2 4. (Reall that MORE s goal is to minimize the number of transmissions and not to maximize the flow rate.) It will then onlude that forwarding any paket to 3 is largely suboptimal, sine links 3 5 and 5 6 are of a bad quality. Thus, if p 35 and p 56 are suffiiently smaller than p 12, p 24 and p 46, as in this example, MORE will not use route at all. In the seond example we again onsider the same hexagonal network but with both flows ative. Sine MORE algorithm does not take into onsideration ontention among flows, it will again assign all traffi to the path This traffi will ontend with 6
9 8 the traffi from flow 2, and feasible end-to-end rate alloations have to satisfy 3f 1 + f 2 = p. Note that the routing sheme is fixed by MORE and does not depend on flow ontrol applied by transport layer. If for example transport layer on the top of MORE is designed to maximize log utility, the optimal rates will be f1 MORE = p 12 /6 = 0.133, f2 MORE = p 12 /2 = 0.4. On the ontrary, our distributed algorithm will adapt routing to ontentions among flows, and it will assign y 1 = 0.12, y 2 = 0.03, f 1 = 0.15 and f 2 = y 3 = 0.4. As we an see, our algorithm balaned flow 1 by dereasing y 1 and inreasing y 2. As a result, the rate of flow f 2 stayed the same while the rate of f 1 inreased. 4 Pratial Issues In this setion we onsider two pratial issues that onern implementation of the protool proposed in Setion 3 in a mesh network: finite oding generation size and rate adaptation for randomized sheduling. We leave other pratial issues, suh as the effet of delayed feedbak, for future work. 4.1 Finite Generation Size Previous results assume that generation size used for network oding tends to infinity (see Theorem 1). Pratial reasons, suh as omplexity and performane of deoding, and header overhead for storing the oeffiient vetor, require us to limit the size of the header; some pratial systems limit the size to 32 pakets [5, 6]. We next modify our optimization framework to inlude finite generation size. Let G be the set of generations. Let us define qi (t, g) and wij (t, g) be the number of redits and transmission redits for generation g G of flow queued at i. Similarly, we define f (t, g), yij (t, g), x ij (t, g) as before, only onstrained on generation g (thus we have for example yij (t) = g G y ij (t, g), and by analogy for the other variables). The enoding proesses f (t, g) are defined at the soure. For example, if the size of eah generation is G, we have t f (t, g)dt = G for all g G. Extending the distributed maximization algorithm from Setion 3.3 to this setting is not straightforward. For example, a naive way to modify sheduling rule (17) would be to shedule the oldest generation available g i (, t) = min{g ( J)w ij(t, g) > 0}, (26) that is x ij (t, g) = C ij(t), if = i (t) and g = gi ( i (t), t). However, this rule may yield poor rates. To see why, onsider the example of a network with nodes {1, 2, 3} and a single flow, going from 1 to 3 (diretly or via node 2). Furthermore, suppose p 12 = p 23 = 1 and p 13 is lose to 0. Due to the nature of the bakpressure algorithm, queue w 13 will be filled with redits, to prevent 1 assigning more redits to y 13. Suppose that the oldest generation that has a redit in w 13 is generation g 13 = min{g w13(t, 1 g) > 0}. Sine p 13 is lose to 0, queue w 13 will take long time to get rid of redits from generation g 13. At the same time, sine p 12 = 1 queues w 12 and w 1{2,3} will quikly get rid of all generations older or equal to g 13. Thus, whenever node 1 is seleted to transmit, it will transmit a paket from generation g1(t) = g 13, aording to (26). Sine w 12 (t, g 13 ) = w 1{2,3} (t, g 13 ) = 0, node 2 doesn t need more pakets from generation g 13 and the paket it reeives will be useless. Indeed, it will almost never be reeived by node 3, yielding end-to-end rate f 0. Nevertheless, we still want to keep link 1-3 ative beause a few pakets transmitted over that link still improve overall performane. Finding a jointly optimal oding and sheduling strategy that maximizes system utility for finite generation sizes is a diffiult problem. In addition to the previously mentioned sheduling issue, when the generation size beomes finite, the results from [14] do not hold either. This implies that pakets reeived at the destination will not neessarily be linearly independent and Theorem 1 does not hold. Instead, we propose a heuristi inspired by the proof of Theorem 2, whih minimizes the drift Ẇ (f(t), q(t), w(t)). It onsists of modifying rules (11) and (17) to y ij(t, g) = g i (, t) = argmin g x ij(t, g) = { M, q i (t, g) qj (t, g) + w ij (t, g), 0, qi (t, g) > q j (t, g) + w ij (t, g) (27), wij(t)x ij(t) 1 {w ij (t,g)<0} (28) J { CiJ (t), = i (t), g = g i (, t), 0, otherwise (29) An explanation how this poliy is derived is given in the
10 9 Appendix. We demonstrate its performane, for finite generation sizes, by simulations in Setion Rate Adaptation For ompatible Sheduling Rates [Mbps] As shown in [13], finding the optimal sheduling rule (13) is an NP-hard entralized optimization problem. Some reent works [21, 13, 22] explore deentralized implementations of similar problems. Applying these ideas to our setting is out of sope of this paper, and left for future work. Instead, we will onsider a more realisti, suboptimal sheduling proess and we will show how our algorithm an be applied as a distributed heuristi. Like in most existing wireless mesh networks deployment, we will assume that nodes always transmit paket at the full power P i (t) = {0, P MAX }. We all a set of feasible ativation profiles S ompatible if for all S S and for all (i 1, J 1 ) S there is no (i 2, J 2 ) S suh that p i1,i 2 > 0, ( j J 2 )p i1,j > 0 or ( j J 1 )p i2,j > 0. Intuitively, this orresponds to like protool with RTS/CTS mehanism. When node i 1 establishes ommuniation with nodes J 1, all nodes involved in ommuniation send an RTS/CTS. All nodes that hear the RTS/CTS (p > 0) will be prevented from transmission or reeption during the same slot. Furthermore, we will assume that the underlying sheduling proess is not under our ontrol. At every time t, sheduling proess will selet a set of noninterfering nodes I(t) N to transmit (i.e. for eah i, j I(t), p ij = 0). Eah node i I(t) has a set of possible destinations J i (t) = {j N p ij > 0, ( k I(t), k i), p kj = 0}, whih in turns define a shedule S(t) = {i, J i } i I(t). A set of ativation profiles S = {{i, J i } i I I P(N )} is learly ompatible. Assuming previously defined shedule S(t), the (12) - (17) simplifies to ( i (t), R i (t)) = argmax,r i K J i w ik(t)c ik (R i ), (30) whih an be easily solved in a distributed manner, separately at eah node. We note that, for an arbitrary sheduling proess {S(t)} t, the distributed routing (11) and rate adaptation 0 Single path Multi path MORE Figure 3: End-to-end rate alloation example: eight flows among randomly seleted soure-destination pairs. On the y axis we give rates. Small bars denote rates per flow. Large bars denote total rate. Blak line gives utilities with an arbitrary saling (to fit the figure). Absolute improvement in utility (b) Run Relative improvement in total rate (a) Run Figure 5: Cumulative performane improvement of our algorithm over MORE: (a) Improvement in utility ( log(f m ) log(f s )); (b) Improvement in total rate ( f m / f s ). In all ases we run 100 experiments and we sort them by performane improvement. (30) algorithm does not neessarily minimize the optimization problem (5). The optimal algorithm will depend on the harateristis of {S(t)} t and it is diffiult to haraterize. We present (11) and (30) as a heuristi that an be used as a pratial implementations of opportunisti multi-path routing in networks with ompatible sheduling. We illustrate by simulations in Setion 5 that in the ase of random, ompatible sheduling, the heuristi (30) outperforms a onventional, single-path routing approah.
11 10 (b) (a) () Absolute improvement in utility Run Relative improvement in total rate Run Relative effiieny for total rate Run Figure 4: Cumulative performane improvement of multi-path over single-path: (a) Absolute improvement in utility ( log(f m ) log(f s )); (b) Relative improvement in total rate ( f m / f s ); () Relative effiieny for total rate ( f finite / f infinite ) for multi-path routing due to finite generation size of G = 32. In all ases we run 100 experiments and we sort them by performane improvement. In many ases, for single-path routing, some flow had zero rates for the duration of the simulation, due to slow onvergene. Sine this would yield to inifinite utility differene, we don t plot these runs. Fration of time Nodes 54.00Mbps 18.00Mbps 12.00Mbps 9.00Mbps 6.00Mbps Figure 6: Optimal distribution of PHY rates for roofnet network with a ards, for one random seletion of 8 soure-destination pairs. In ase of b ards, almost all nodes are assigned the highest, 11 Mbps rate. 5 Simulation Results We now present simulation results whih quantify the performane advantages of the opportunisti routing, sheduling and flow ontrol algorithms defined in the previous setions. We are primarily interested in pratial algorithms that an be applied in like mesh networks, where sheduling algorithm is not under our ontrol. Hene in our simulations we used an ompatible shedule {S(t)} t, as defined in Setion 4.2, assuming I(t) is randomly seleted among baklogged nodes. We ompared our algorithm with a onventional, single path routing algorithm, and with the MORE algorithm [5]. To make the omparison fair, we assumed that the single-path routing algorithm used the same kind of jointly-optimal routing and flow-ontrol approah as our sheme, whih boils down to [11]. In ontrast, MORE does not integrate flow ontrol or flow sheduling with the routing algorithm. When simulating the MORE algorithm, defined in [5, 20], we assumed that eah soure had a large baklog of pakets to transmit, and that eah relay performed FIFO sheduling among pakets from different flows. We used the roofnet network topology based on b ards, given in [4], for our simulations. Transmission probabilities between eah pair of nodes for different transmission rates are given in [1]. We used U ( ) = log( ), hene the rate alloation that maximizes (5) is the proportionally fair rate alloation [19]. We looked at two performane metris. The first one is the improvement in total utility U(f ) U(f ). Alloation f is better than f if the sum is positive. The proportional fair rate maximizes the optimization problem (5) hene has the highest utility. 2 The seond metri 2 Sine in the simulations we use random and not the optimal shedul-
12 11 is the total rate improvement f / f. Alloation f is better than f if the quotient is larger than 1. The proportionally fair alloation does not always have highest total rate. We developed a disrete-event simulator that implements the three routing, flow and rate ontrol algorithms. We ran simulations to obtain end-to-end rate alloations. Figure 3 illustrates the optimal rate alloations, obtained by our algorithm, for 8 randomly seleted souredestination pairs on one example. In this ase, we an see both utility and total rate inrease if we use multiple paths instead of a single one, where we benefit from broadast and multi-path diversity. We then ran the previous experiment with 100 random traffi matries and ompared the performanes of the different algorithms with respet to the two performane metris. Single vs. Multiple Paths We start by illustrating the benefits of the multi-path routing over the single-path routing in Figure 4. We first look at the network utility. The rate alloation obtained by the optimal algorithm (Setion 3.3) always maximizes the utility. However, this is not the ase for the distributed heuristi (Setion 4.2). In our simulations we saw that in about 90% of the runs, the distributed heuristi for multi-path routing ahieves higher utility than does single-path routing. In only about 10% of ases is the utility for single-path routing higher. Also, in more than 80% of runs, our deentralized heuristi ahieved higher total rate than the onventional, single-path algorithm. In more than half of the runs, the total rate has inreased by 20%, and in some ases by over 100%. From these results we see that there is a signifiant advantage in using our multi-path routing algorithm over the single-path one. We see that the advantage is signifiant even in number of flows is large (see next paragraph for explanation). Deentralized Heuristi vs. MORE We next ompare our deentralized heuristis with MORE. The results are depited in Figure 5. Network utility is inreased in about 90% of the runs. Total rate is inreased in almost all of the runs, sometimes up to a fator of 4. ing, the resulting rate alloation does not neessarily have the highest utility. From these results we an see that in many ases MORE behaves worse then the single-path routing. This resonates with the findings of [5] where the benefits of multi-path derease as the number of flows inrease (for an explanation, see Setion 3.5). In addition, MORE is only a routing protool whereas our single-path routing algorithm also inludes more intelligent flow ontrol and flow sheduling. Effets of Finite Generation Size Figure 4, () illustrates the impat of a finite generation size. The performane drop is due to imperfet sheduling (Setion 4.1) and oasional linear dependeny of reeived pakets. We an see that in most of the ases the effiieny loss is less than 5%. 3 The Optimal PHY Rate Seletion Finally, we onsider the optimal PHY rate seletion at different nodes. We analyze how frequently eah node uses eah PHY rate. In the ase of roofnet topology with b ards we find that in almost all ases it is optimal to use the highest rate of 11 Mbps, whih onfirms the findings from [5]. Furthermore, we use the SNR data from roofnet topology and measurements from [23] to analyze the approximatively optimal performane in the same network topology with a ards. The results are depited in Figure 6. As expeted, the optimal PHY rate seletion is no longer uniform, due to the large number of available rates. This demonstrates a need for an intelligent PHY rate seletion algorithm in this framework. 6 Related Work One of the first uses of opportunisti routing for uniast sessions in wireless mesh networks is presented in [4]. It has been extended in [5] to inlude network oding to failitate sheduling. However, in [5] the authors do not expliitly onsider multiple flows, fairness, nor sheduling, and in fat show that the performane benefit drops as number of flows inreases. An optimization framework for opportunisti routing that minimizes power onsumption is presented in [18], and shows signifiant benefits 3 Note that an additional performane drop for finite generation size may our due to imperfet signaling, but we do not onsider it in our model.
13 12 over [4]. Nevertheless, [18] does not onsider network oding, rate maximization, nor the TCP-like primal-dual rate adaptation. Cross-layer design for network oding with uniast or multi-ast sessions is onsidered in [8]; however, [8] onsiders only stability and not any form of rate maximization. Several theoretial analysis of linear network oding algorithms for uniast sessions have been performed [14, 9]. Network oding for uniast sessions is used also in COPE [24]. Compared to COPE, we perform enoding operations only between pakets of the same flow; in that respet our approah is orthogonal to COPE. Our work is an example of ross-layer optimization. Cross-layer design in wireless is a widely researh topis (see [12, 25] and referenes therein). Optimizing network performane in terms of network utility is originally proposed in [19]; see [10] for an overview. Our primal-dual approah is similar to [10], where it is shown that it an apture different versions of TCP. 7 Conlusions This paper proposes an optimization framework for addressing questions of multi-path routing in wireless mesh networks. We have extended previous work by inorporating the broadast nature of wireless and simultaneously addressing fairness issues. Impliit in our approah is the use of network oding, whih enables us to define notions of redits that are assoiated with number of pakets in a generation, rather than speifi pakets. Using our framework we show that our algorithm signifiantly outperforms single-path routing and MORE [5]. In the ase when sheduling is determined by a MAC, suh as by random sheduling or like sheduling, we have shown how our approah leads to a distributed heuristi, whih still outperforms existing approahes. Using a simulation results on a realisti topology, we found for our examples that for b, using maximal rate is optimal, but for a this was not the ase. We have addressed some of the pratial issues assoiated with having a finite generation size for network odes. Our primal-dual rate adaptation an be used to model window-based flow ontrol shemes, suh as TCP. The performane of appliations that run on top of our system and use TCP is an interesting open problem. Another interesting diretion is to analyze the performane of our protool with more realisti signaling shemes. Referenes [1] MIT roofnet - publiations and trae data, [2] J. Eriksson, S. Agarwal, P. Bahl, and J. Padhye, Feasibility study of mesh networks for all-wireless offies, in ACM/Usenix MobiSys, [3] M. Caesar, M. Castro, E. Nightingale, G. O Shea, and A. Rowstron, Virtual ring routing: Network routing inspired by DHTs, in ACM SigComm, [4] S. Biswas and R. Morris, ExOR: opportunisti multi-hop routing for wireless networks, in ACM SIGCOMM, [5] S. Chahulski, M. Jennings, S. Katti, and D. Katabi, Trading struture for randomness in wireless opportunisti routing, in ACM SigComm, [6] B. Radunovi, C. Gkantsidis, P. Key, S. Gheorgiu, W. Hu, and P. Rodriguez, Multipath ode asting for wireless mesh networks, in MSR-TR , Marh [7] R. Ahlswede, N. Cai, S. R. Li, and R. W. Yeung, Network information flow, IEEE Transations on Information Theory, [8] T. Ho and H. Viswanathan, Dynami algorithms for multiast with intra-session network oding, in 43rd Allerton Annual Conferene on Communiation, Control, and Computing, [9] D. Lun, M. Medard, and R. Koetter, Network oding for effiient wireless uniast, in IEEE International Zurih Seminar on Communiations, February [10] R. Srikant, The Mathematis of Internet Congestion Control. Birkhauser, 2003.
14 13 [11] A. Eryilmaz and R. Srikant, Joint ongestion ontrol, routing and ma for stability and fairness in wireless networks, IEEE Journal on Seleted Areas in Communiations, vol. 24, no. 8, pp , August [12] L. Georgiadis, M. J. Neely, and L. Tassiulas, Resoure alloation and ross-layer ontrol in wireless networks, Foundations and Trends in Networking, vol. 1, no. 1, pp , [13] G. Sharma, R. Mazumdar, and N. Shroff, On the omplexity of sheduling in wireless networks, in Pro. MOBICOM, [14] D. Lun, M. Medard, and M. Effros, On oding for reliable ommuniation over paket networks, in Pro. 42nd Allerton Conferene, [15] A. K. Miu, H. Balakrishnan, and C. E. Koksal, Improving Loss Resiliene with Multi-Radio Diversity in Wireless Networks, in 11th ACM MOBICOM Conferene, Cologne, Germany, September [16] L. Tassiulas and A. Ephremides, Stability properties of onstrained queueing systems and sheduling poliies for maximum throughput in multihop radio networks, IEEE Trans. on Automati Control, vol. 37, no. 12, [17] M. Neely, E. Modiano, and C. Rohrs, Dynami power alloation and routing for time-varying wireless networks, IEEE Journal on Seleted Areas in Communiations, vol. 23, no. 1, pp , January [18] M. Neely, Optimal bakpressure routing for wireless networks with multi-reeiver diversity, in Conferene on Information Siene and Systems, Marh [19] F. P. Kelly, A. Maulloo, and D. Tan, Rate ontrol in ommuniation networks: shadow pries, proportional fairness and stability, Journal of the Operational Researh Soiety, vol. 49, pp , [20] S. Chahulski, M. Jennings, S. Katti, and D. Katabi, MORE: A network oding approah to opportunisti routing, in MIT-CSAIL-TR , [21] P. Chaporkar, K. Kar, and S. Sarkar, Throughput guarantees through maximal sheduling in wireless networks, in Pro. Allerton, [22] E. Modiano, D. Shah, and G. Zussman, Maximizing throughput in wireless networks via gossiping, in Pro. ACM SIGMETRICS / IFIP Performane 06, June [23] L. Huang, B. Johnson, D. Tadas, and M. Stoler, a performane over various hannels, in IEEE / k, [24] S. Katti, H. Rahul, W. Hu, D. Katabi, M. Medard, and J. Crowroft, XORs in the air: Pratial wireless network oding, in ACM SigComm, [25] X. Lin, N. B. Shroff, and R. Srikant, A tutorial on ross-layer optimization in wireless networks, IEEE J. on Seleted Areas in Comm., vol. 24, no. 8, Aug Appendix Before proving Theorem 2 we first introdue the following lemma Lemma 1. The following equalities and inequalities hold i,j N C yij (µ i µ j ) = f µ i, (31) C i N,J P(N ) C i N,J P(N ) C i,j N, C ξij x ij = ξij ξ ij x ij ξ ij x ij j J y ij, (32) i N,J P(N ) C i,j N, C ξij x(33) ij, ξ ij y ij, (34) y ij (q i (t) q j(t)) = C f q Sr(), (35) wij i N,J P(N ) j J i N,J P(N ) C wij(t)x ij(t) yij = wijy ij, (36) i,j N i,j N, C w ij(t)y ij (37)
15 14 Proof. Equalities (31) and (32) follow diretly from (6) and (7). From (4) we further have C x ij = C ij. Together with (10) we an derive i,j, ξ ij x ij i,j, i,j, = i,j, ( J ( J ξij x ij ξ ij C ij ) ξ ij C ij whih proves (33). From (32) and (33) we derive (34). Sine by definition qdst() (t) = 0 we have i,j N, C y ij (t)(q i (t) q j(t)) = C,j N ) y Sr()j q Sr() from whih we derive (35). Equality (36) follows from the definition of wij. Also, by definition of sheduling (12)-(17), we have i,j, w ij(t)x ij(t) i i,j, max J wij(t)c ij ( C(38) ij ) w ij(t)x ij (39) is Ẇ (f(t), q(t), w(t)) (41) = + i, (f (t) f )(U (f (t)) q Sr() (t)) f (t) 0 (q i (t) µ i ) f i (t) + j yji(t) k + (wij(t) ξij ) yij(t) x ij(t) i,j, j J yik(t) wij (t) 0. As in (10)-(13) from [11] we have that, when qi (t) < 0 the derivative q i (t) is by definition positive; also µ i 0. The same holds for wij (t) and f (t) and we an upperbound q i (t) 0 Ẇ (f(t), q(t), w(t)) (f (t) f )(U (f (t)) qsr() (t)) + i, (q i (t) µ i ) f i (t) + j yji(t) k yik(t) + (wij(t) ξij ) yij(t) x ij(t) (42) i,j, j J Let us further add and substrat U (f ) = µ [11], to obtain Sr(), as in whih yields (37). Proof of Theorem 2: We will follow the idea of the proof of Theorem 2 from [11]. First, let us define Lyapunov funtion W (f, q, w) = 1 2γ (f f ) C i N,J P(N ) C i N, C (q i µ i ) 2 (wij ξij ) 2. (40) Ẇ (f(t), q(t), w(t)) + i, + i, µ i k qi (t) j y ik(t) j (f (t) f )(U (f (t)) U (f )) yji(t) k y ji(t) f i y ik(t) + f i + (wij(t) ξij ) yij(t) x ij(t). i,j, j J We want to show that the derivative Ẇ 0. For brevity, we define fi (t) = f (t)1 {i=sr()}. The derivative of W Due to onavity of U we have (f (t) f )(U (f (t)) U (f )) 0. Next, let us pik any set of link rates {yij } i,j, that orrespond to the optimal flow alloation
16 15 {f }. We expand f using (31) and (35) to obtain Ẇ (f(t), q(t), w(t)) i,j, (µ i + (qi qj )(yij yij(t)) i,j, µ j )(y ij(t) y ij ) + (wij(t) ξij ) yij(t) x ij(t) i,j, j J Let us denote with zij (34), (36) and (37) we have = µ i µ j ξij. Then, from Ẇ (f(t), q(t), w(t)) (yij(t) yij ) (43) i,j, [ (µ i µ j ξij ) (qi (t) qj(t) wij(t)) (44) ] = (yij(t) yij )(zij zij(t)) (45) i,j, (a) = yij(t)z ij (yij(t) yij )zij(t) (46) i,j, (b) (yij(t) yij )zij(t) () 0. (47) i,j, where (a) follows from KKT and the fat that yij z ij = 0, (b) from (9) and () from the fat that when zij (t) > 0 then yij (t) = M > max f max i,j, yij. Hene we have that Ẇ (f(t), q(t), w(t)) 0 for all f(t) > 0, q(t) 0, w(t) 0. Let us define Q(t) = (q, w) (yij(t) yij )(zij zij(t)) i,j, (48) Let us define E = {(f, q, w) Ẇ (f, q, w) = 0}. It is easy to see from (45) that E Q. We an further apply LaSalle s invariane priniple as in [11] to show that f(t) onverges to f and (q(t), w(t)) onverges to Q(t). However, set Q(t) is not bounded in general. If link (i, j) is ative for flow then for every t, yij (t) > 0 we have qj (t) + w ij (t) = q i (t) z ij. If the maximum node degree in a network is D, we have that qj (t) + w ij (t) qi (t) z ij + 2DT. Sine q Sr() onverges to U (f ) we see that queues qi (t), q j (t) and w ij (t) are bounded for all ative links (i, j) of eah flow. Derivation of (27)-(29): Let us write modified queue evolution equations q i (t, g) = (f i (t, g) + j y ji (t, g) ) j y ij (t, g) q i (t,g) 0 and ẇ ij (t, g) = ( j J y ij (t, g) x ij (t, g) )w ij (t,g) 0. Note that (19) and (20) do not hold anymore. Consequently, we annot laim that (42) follows from (41) and the proof of Theorem 2 annot be applied. We first onsider q i (t, g). We see from (27) that yik (t, g) > 0 only if q i (t, g) > 0. Thus, the exat queue evolution desribed with q i (t, g) = f i (t, g)+ j y ji (t) k y ik (t). Next, let us look at the evolution of w ij (t, g). We have that ẇij (t, g) = 0 only if w ij (t, g) = 0 and x ij (t, g) > 0, thus if g = g (, t). Therefore, we an write ẇ ij(t, g) j J ẇ ij(t) j J and from (41) we an write y ij(t) x ij(t, g) 1 {w ij (t,g) 0}, y ij(t) x ij(t) 1 {w ij (t,g (,t)) 0}. Ẇ (f(t), q(t), w(t)) (49) + i, (f (t) f )(U (f (t)) qsr() (t)) (50) (q i (t) µ i ) f i (t) + j yji(t) k yik(t) (51) + (wij(t) ξij ) yij(t) x ij(t) (52) i,j, j J + i,j, w ij(t)x ij(t) 1 {w ij (t,g (,t))<0}. (53) Intuitively (53) means that if we deide to transmit generation g (, t), we will not remove any redit from queues for whih there is no suh generation queued (that is wij (t, g (, t)) < 0). Note that this annot happen with infinite generation sizes as wij (t, g (, t)) < 0 implies wij (t) < 0. Sine we have already proven in Theorem 2 that (50) + (51) + (52) 0, we want to minimize (53), whih is indeed done in (28) and (29). It is also easy to see from (53) that the naive poliy (26) may yield an unbounded drift.
Nonreversibility of Multiple Unicast Networks
Nonreversibility of Multiple Uniast Networks Randall Dougherty and Kenneth Zeger September 27, 2005 Abstrat We prove that for any finite direted ayli network, there exists a orresponding multiple uniast
More informationA Queueing Model for Call Blending in Call Centers
A Queueing Model for Call Blending in Call Centers Sandjai Bhulai and Ger Koole Vrije Universiteit Amsterdam Faulty of Sienes De Boelelaan 1081a 1081 HV Amsterdam The Netherlands E-mail: {sbhulai, koole}@s.vu.nl
More informationMaximum Entropy and Exponential Families
Maximum Entropy and Exponential Families April 9, 209 Abstrat The goal of this note is to derive the exponential form of probability distribution from more basi onsiderations, in partiular Entropy. It
More informationAssessing the Performance of a BCI: A Task-Oriented Approach
Assessing the Performane of a BCI: A Task-Oriented Approah B. Dal Seno, L. Mainardi 2, M. Matteui Department of Eletronis and Information, IIT-Unit, Politenio di Milano, Italy 2 Department of Bioengineering,
More informationHankel Optimal Model Order Reduction 1
Massahusetts Institute of Tehnology Department of Eletrial Engineering and Computer Siene 6.245: MULTIVARIABLE CONTROL SYSTEMS by A. Megretski Hankel Optimal Model Order Redution 1 This leture overs both
More informationLightpath routing for maximum reliability in optical mesh networks
Vol. 7, No. 5 / May 2008 / JOURNAL OF OPTICAL NETWORKING 449 Lightpath routing for maximum reliability in optial mesh networks Shengli Yuan, 1, * Saket Varma, 2 and Jason P. Jue 2 1 Department of Computer
More informationSimplification of Network Dynamics in Large Systems
Simplifiation of Network Dynamis in Large Systems Xiaojun Lin and Ness B. Shroff Shool of Eletrial and Computer Engineering Purdue University, West Lafayette, IN 47906, U.S.A. Email: {linx, shroff}@en.purdue.edu
More informationMillennium Relativity Acceleration Composition. The Relativistic Relationship between Acceleration and Uniform Motion
Millennium Relativity Aeleration Composition he Relativisti Relationship between Aeleration and niform Motion Copyright 003 Joseph A. Rybzyk Abstrat he relativisti priniples developed throughout the six
More informationmax min z i i=1 x j k s.t. j=1 x j j:i T j
AM 221: Advaned Optimization Spring 2016 Prof. Yaron Singer Leture 22 April 18th 1 Overview In this leture, we will study the pipage rounding tehnique whih is a deterministi rounding proedure that an be
More informationComplexity of Regularization RBF Networks
Complexity of Regularization RBF Networks Mark A Kon Department of Mathematis and Statistis Boston University Boston, MA 02215 mkon@buedu Leszek Plaskota Institute of Applied Mathematis University of Warsaw
More informationAverage Rate Speed Scaling
Average Rate Speed Saling Nikhil Bansal David P. Bunde Ho-Leung Chan Kirk Pruhs May 2, 2008 Abstrat Speed saling is a power management tehnique that involves dynamially hanging the speed of a proessor.
More informationControl Theory association of mathematics and engineering
Control Theory assoiation of mathematis and engineering Wojieh Mitkowski Krzysztof Oprzedkiewiz Department of Automatis AGH Univ. of Siene & Tehnology, Craow, Poland, Abstrat In this paper a methodology
More informationCase I: 2 users In case of 2 users, the probability of error for user 1 was earlier derived to be 2 A1
MUTLIUSER DETECTION (Letures 9 and 0) 6:33:546 Wireless Communiations Tehnologies Instrutor: Dr. Narayan Mandayam Summary By Shweta Shrivastava (shwetash@winlab.rutgers.edu) bstrat This artile ontinues
More informationEnergy Efficient Low Complexity Joint Scheduling and Routing for Wireless Networks
Energy Effiient Low Complexity Joint Sheduling and Routing for Wireless Networks Satya Kumar V, Lava Kumar and Vinod Sharma Department of Eletrial Communiations Engineering, Indian Institute of Siene,
More informationFrequency hopping does not increase anti-jamming resilience of wireless channels
Frequeny hopping does not inrease anti-jamming resiliene of wireless hannels Moritz Wiese and Panos Papadimitratos Networed Systems Seurity Group KTH Royal Institute of Tehnology, Stoholm, Sweden {moritzw,
More informationResearch Collection. Mismatched decoding for the relay channel. Conference Paper. ETH Library. Author(s): Hucher, Charlotte; Sadeghi, Parastoo
Researh Colletion Conferene Paper Mismathed deoding for the relay hannel Author(s): Huher, Charlotte; Sadeghi, Parastoo Publiation Date: 2010 Permanent Link: https://doi.org/10.3929/ethz-a-005997152 Rights
More informationDynamic Rate and Channel Selection in Cognitive Radio Systems
1 Dynami Rate and Channel Seletion in Cognitive Radio Systems R. Combes and A. Proutiere KTH, The Royal Institute of Tehnology arxiv:1402.5666v2 [s.it] 12 May 2014 Abstrat In this paper, we investigate
More informationIMPEDANCE EFFECTS OF LEFT TURNERS FROM THE MAJOR STREET AT A TWSC INTERSECTION
09-1289 Citation: Brilon, W. (2009): Impedane Effets of Left Turners from the Major Street at A TWSC Intersetion. Transportation Researh Reord Nr. 2130, pp. 2-8 IMPEDANCE EFFECTS OF LEFT TURNERS FROM THE
More informationSensitivity Analysis in Markov Networks
Sensitivity Analysis in Markov Networks Hei Chan and Adnan Darwihe Computer Siene Department University of California, Los Angeles Los Angeles, CA 90095 {hei,darwihe}@s.ula.edu Abstrat This paper explores
More informationA Spatiotemporal Approach to Passive Sound Source Localization
A Spatiotemporal Approah Passive Sound Soure Loalization Pasi Pertilä, Mikko Parviainen, Teemu Korhonen and Ari Visa Institute of Signal Proessing Tampere University of Tehnology, P.O.Box 553, FIN-330,
More informationA NETWORK SIMPLEX ALGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM
NETWORK SIMPLEX LGORITHM FOR THE MINIMUM COST-BENEFIT NETWORK FLOW PROBLEM Cen Çalışan, Utah Valley University, 800 W. University Parway, Orem, UT 84058, 801-863-6487, en.alisan@uvu.edu BSTRCT The minimum
More information23.1 Tuning controllers, in the large view Quoting from Section 16.7:
Lesson 23. Tuning a real ontroller - modeling, proess identifiation, fine tuning 23.0 Context We have learned to view proesses as dynami systems, taking are to identify their input, intermediate, and output
More informationParallel disrete-event simulation is an attempt to speed-up the simulation proess through the use of multiple proessors. In some sense parallel disret
Exploiting intra-objet dependenies in parallel simulation Franeso Quaglia a;1 Roberto Baldoni a;2 a Dipartimento di Informatia e Sistemistia Universita \La Sapienza" Via Salaria 113, 198 Roma, Italy Abstrat
More informationNormative and descriptive approaches to multiattribute decision making
De. 009, Volume 8, No. (Serial No.78) China-USA Business Review, ISSN 57-54, USA Normative and desriptive approahes to multiattribute deision making Milan Terek (Department of Statistis, University of
More informationSubject: Introduction to Component Matching and Off-Design Operation % % ( (1) R T % (
16.50 Leture 0 Subjet: Introdution to Component Mathing and Off-Design Operation At this point it is well to reflet on whih of the many parameters we have introdued (like M, τ, τ t, ϑ t, f, et.) are free
More informationProduct Policy in Markets with Word-of-Mouth Communication. Technical Appendix
rodut oliy in Markets with Word-of-Mouth Communiation Tehnial Appendix August 05 Miro-Model for Inreasing Awareness In the paper, we make the assumption that awareness is inreasing in ustomer type. I.e.,
More information3 Tidal systems modelling: ASMITA model
3 Tidal systems modelling: ASMITA model 3.1 Introdution For many pratial appliations, simulation and predition of oastal behaviour (morphologial development of shorefae, beahes and dunes) at a ertain level
More informationScalable Positivity Preserving Model Reduction Using Linear Energy Functions
Salable Positivity Preserving Model Redution Using Linear Energy Funtions Sootla, Aivar; Rantzer, Anders Published in: IEEE 51st Annual Conferene on Deision and Control (CDC), 2012 DOI: 10.1109/CDC.2012.6427032
More informationBroadcast Channels with Cooperating Decoders
To appear in the IEEE Transations on Information Theory, Deember 2006. 1 Broadast Channels with Cooperating Deoders Ron Dabora Sergio D. Servetto arxiv:s/0505032v3 [s.it] 1 Nov 2006 Abstrat We onsider
More informationWord of Mass: The Relationship between Mass Media and Word-of-Mouth
Word of Mass: The Relationship between Mass Media and Word-of-Mouth Roman Chuhay Preliminary version Marh 6, 015 Abstrat This paper studies the optimal priing and advertising strategies of a firm in the
More informationMethods of evaluating tests
Methods of evaluating tests Let X,, 1 Xn be i.i.d. Bernoulli( p ). Then 5 j= 1 j ( 5, ) T = X Binomial p. We test 1 H : p vs. 1 1 H : p>. We saw that a LRT is 1 if t k* φ ( x ) =. otherwise (t is the observed
More informationSINCE Zadeh s compositional rule of fuzzy inference
IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 14, NO. 6, DECEMBER 2006 709 Error Estimation of Perturbations Under CRI Guosheng Cheng Yuxi Fu Abstrat The analysis of stability robustness of fuzzy reasoning
More information7 Max-Flow Problems. Business Computing and Operations Research 608
7 Max-Flow Problems Business Computing and Operations Researh 68 7. Max-Flow Problems In what follows, we onsider a somewhat modified problem onstellation Instead of osts of transmission, vetor now indiates
More informationOptimization of Statistical Decisions for Age Replacement Problems via a New Pivotal Quantity Averaging Approach
Amerian Journal of heoretial and Applied tatistis 6; 5(-): -8 Published online January 7, 6 (http://www.sienepublishinggroup.om/j/ajtas) doi:.648/j.ajtas.s.65.4 IN: 36-8999 (Print); IN: 36-96 (Online)
More informationOn the Bit Error Probability of Noisy Channel Networks With Intermediate Node Encoding I. INTRODUCTION
5188 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 11, NOVEMBER 2008 [8] A. P. Dempster, N. M. Laird, and D. B. Rubin, Maximum likelihood estimation from inomplete data via the EM algorithm, J.
More informationThe Hanging Chain. John McCuan. January 19, 2006
The Hanging Chain John MCuan January 19, 2006 1 Introdution We onsider a hain of length L attahed to two points (a, u a and (b, u b in the plane. It is assumed that the hain hangs in the plane under a
More informationA Functional Representation of Fuzzy Preferences
Theoretial Eonomis Letters, 017, 7, 13- http://wwwsirporg/journal/tel ISSN Online: 16-086 ISSN Print: 16-078 A Funtional Representation of Fuzzy Preferenes Susheng Wang Department of Eonomis, Hong Kong
More informationEstimating the probability law of the codelength as a function of the approximation error in image compression
Estimating the probability law of the odelength as a funtion of the approximation error in image ompression François Malgouyres Marh 7, 2007 Abstrat After some reolletions on ompression of images using
More informationDIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS
CHAPTER 4 DIGITAL DISTANCE RELAYING SCHEME FOR PARALLEL TRANSMISSION LINES DURING INTER-CIRCUIT FAULTS 4.1 INTRODUCTION Around the world, environmental and ost onsiousness are foring utilities to install
More informationThe Effectiveness of the Linear Hull Effect
The Effetiveness of the Linear Hull Effet S. Murphy Tehnial Report RHUL MA 009 9 6 Otober 009 Department of Mathematis Royal Holloway, University of London Egham, Surrey TW0 0EX, England http://www.rhul.a.uk/mathematis/tehreports
More informationPhysical Laws, Absolutes, Relative Absolutes and Relativistic Time Phenomena
Page 1 of 10 Physial Laws, Absolutes, Relative Absolutes and Relativisti Time Phenomena Antonio Ruggeri modexp@iafria.om Sine in the field of knowledge we deal with absolutes, there are absolute laws that
More informationComplementarities in Spectrum Markets
Complementarities in Spetrum Markets Hang Zhou, Randall A. Berry, Mihael L. Honig and Rakesh Vohra EECS Department Northwestern University, Evanston, IL 6008 {hang.zhou, rberry, mh}@ees.northwestern.edu
More informationGlobal Stability with Time-Delay in Network Congestion Control
Global Stability with Time-Delay in Network Congestion Control Zhikui Wang and Fernando Paganini 1 Abstrat This paper onerns the global stability of reently proposed laws for network ongestion ontrol In
More informationThe universal model of error of active power measuring channel
7 th Symposium EKO TC 4 3 rd Symposium EKO TC 9 and 5 th WADC Workshop nstrumentation for the CT Era Sept. 8-2 Kosie Slovakia The universal model of error of ative power measuring hannel Boris Stogny Evgeny
More informationONLINE APPENDICES for Cost-Effective Quality Assurance in Crowd Labeling
ONLINE APPENDICES for Cost-Effetive Quality Assurane in Crowd Labeling Jing Wang Shool of Business and Management Hong Kong University of Siene and Tehnology Clear Water Bay Kowloon Hong Kong jwang@usthk
More informationNon-Orthogonal Random Access for 5G Mobile Communication Systems
This artile has been aepted for publiation in a future issue of this journal, but has not been fully edited. Content may hange prior to final publiation. Citation information: DOI.9/TVT.8.86, IEEE Non-Orthogonal
More informationExploring the feasibility of on-site earthquake early warning using close-in records of the 2007 Noto Hanto earthquake
Exploring the feasibility of on-site earthquake early warning using lose-in reords of the 2007 Noto Hanto earthquake Yih-Min Wu 1 and Hiroo Kanamori 2 1. Department of Geosienes, National Taiwan University,
More informationA two storage inventory model with variable demand and time dependent deterioration rate and with partial backlogging
Malaya Journal of Matematik, Vol. S, No., 35-40, 08 https://doi.org/0.37/mjm0s0/07 A two storage inventory model with variable demand and time dependent deterioration rate and with partial baklogging Rihi
More informationA NONLILEAR CONTROLLER FOR SHIP AUTOPILOTS
Vietnam Journal of Mehanis, VAST, Vol. 4, No. (), pp. A NONLILEAR CONTROLLER FOR SHIP AUTOPILOTS Le Thanh Tung Hanoi University of Siene and Tehnology, Vietnam Abstrat. Conventional ship autopilots are
More informationOptimizing the IEEE b Performance using Slow Congestion Window Decrease
Optimizing the IEEE 802.b Performane using Slow Congestion Window Derease Jérôme Galtier Frane Teleom R&D 905 rue Albert Einstein F-0692 Sophia Antipolis edex, Frane e-mail: Jerome.Galtier@franeteleom.om
More informationModeling of Threading Dislocation Density Reduction in Heteroepitaxial Layers
A. E. Romanov et al.: Threading Disloation Density Redution in Layers (II) 33 phys. stat. sol. (b) 99, 33 (997) Subjet lassifiation: 6.72.C; 68.55.Ln; S5.; S5.2; S7.; S7.2 Modeling of Threading Disloation
More informationA Characterization of Wavelet Convergence in Sobolev Spaces
A Charaterization of Wavelet Convergene in Sobolev Spaes Mark A. Kon 1 oston University Louise Arakelian Raphael Howard University Dediated to Prof. Robert Carroll on the oasion of his 70th birthday. Abstrat
More informationConvergence of reinforcement learning with general function approximators
Convergene of reinforement learning with general funtion approximators assilis A. Papavassiliou and Stuart Russell Computer Siene Division, U. of California, Berkeley, CA 94720-1776 fvassilis,russellg@s.berkeley.edu
More informationReliability Guaranteed Energy-Aware Frame-Based Task Set Execution Strategy for Hard Real-Time Systems
Reliability Guaranteed Energy-Aware Frame-Based ask Set Exeution Strategy for Hard Real-ime Systems Zheng Li a, Li Wang a, Shuhui Li a, Shangping Ren a, Gang Quan b a Illinois Institute of ehnology, Chiago,
More informationTaste for variety and optimum product diversity in an open economy
Taste for variety and optimum produt diversity in an open eonomy Javier Coto-Martínez City University Paul Levine University of Surrey Otober 0, 005 María D.C. Garía-Alonso University of Kent Abstrat We
More informationDeveloping Excel Macros for Solving Heat Diffusion Problems
Session 50 Developing Exel Maros for Solving Heat Diffusion Problems N. N. Sarker and M. A. Ketkar Department of Engineering Tehnology Prairie View A&M University Prairie View, TX 77446 Abstrat This paper
More informationIOT devices are expected to drive many useful applications
1 Energy Effiient Barring Fator Enabled Extended Aess Barring for IoT Devies in LTE-Advaned Prashant K.Wali and Debabrata Das, Senior Member, IEEE arxiv:1611.292v1 [s.ni] 9 Nov 216 Abstrat Synhronized
More informationCapacity-achieving Input Covariance for Correlated Multi-Antenna Channels
Capaity-ahieving Input Covariane for Correlated Multi-Antenna Channels Antonia M. Tulino Universita Degli Studi di Napoli Federio II 85 Napoli, Italy atulino@ee.prineton.edu Angel Lozano Bell Labs (Luent
More informationFair Integrated Scheduling of Soft Real-time Tardiness Classes on Multiprocessors
Fair Integrated Sheduling of Soft Real-time Tardiness Classes on Multiproessors UmaMaheswari C. Devi and James H. Anderson Department of Computer Siene, The University of North Carolina, Chapel Hill, NC
More informationLikelihood-confidence intervals for quantiles in Extreme Value Distributions
Likelihood-onfidene intervals for quantiles in Extreme Value Distributions A. Bolívar, E. Díaz-Franés, J. Ortega, and E. Vilhis. Centro de Investigaión en Matemátias; A.P. 42, Guanajuato, Gto. 36; Méxio
More informationAdvanced Computational Fluid Dynamics AA215A Lecture 4
Advaned Computational Fluid Dynamis AA5A Leture 4 Antony Jameson Winter Quarter,, Stanford, CA Abstrat Leture 4 overs analysis of the equations of gas dynamis Contents Analysis of the equations of gas
More informationSensor management for PRF selection in the track-before-detect context
Sensor management for PRF seletion in the tra-before-detet ontext Fotios Katsilieris, Yvo Boers, and Hans Driessen Thales Nederland B.V. Haasbergerstraat 49, 7554 PA Hengelo, the Netherlands Email: {Fotios.Katsilieris,
More informationThe Laws of Acceleration
The Laws of Aeleration The Relationships between Time, Veloity, and Rate of Aeleration Copyright 2001 Joseph A. Rybzyk Abstrat Presented is a theory in fundamental theoretial physis that establishes the
More informationRESEARCH ON RANDOM FOURIER WAVE-NUMBER SPECTRUM OF FLUCTUATING WIND SPEED
The Seventh Asia-Paifi Conferene on Wind Engineering, November 8-1, 9, Taipei, Taiwan RESEARCH ON RANDOM FORIER WAVE-NMBER SPECTRM OF FLCTATING WIND SPEED Qi Yan 1, Jie Li 1 Ph D. andidate, Department
More informationSensitivity analysis for linear optimization problem with fuzzy data in the objective function
Sensitivity analysis for linear optimization problem with fuzzy data in the objetive funtion Stephan Dempe, Tatiana Starostina May 5, 2004 Abstrat Linear programming problems with fuzzy oeffiients in the
More informationA model for measurement of the states in a coupled-dot qubit
A model for measurement of the states in a oupled-dot qubit H B Sun and H M Wiseman Centre for Quantum Computer Tehnology Centre for Quantum Dynamis Griffith University Brisbane 4 QLD Australia E-mail:
More informationThe transition between quasi-static and fully dynamic for interfaces
Physia D 198 (24) 136 147 The transition between quasi-stati and fully dynami for interfaes G. Caginalp, H. Merdan Department of Mathematis, University of Pittsburgh, Pittsburgh, PA 1526, USA Reeived 6
More informationPredicting the confirmation time of Bitcoin transactions
Prediting the onfirmation time of Bitoin transations D.T. Koops Korteweg-de Vries Institute, University of Amsterdam arxiv:189.1596v1 [s.dc] 21 Sep 218 September 28, 218 Abstrat We study the probabilisti
More informationCapacity Pooling and Cost Sharing among Independent Firms in the Presence of Congestion
Capaity Pooling and Cost Sharing among Independent Firms in the Presene of Congestion Yimin Yu Saif Benjaafar Graduate Program in Industrial and Systems Engineering Department of Mehanial Engineering University
More informationDirectional Coupler. 4-port Network
Diretional Coupler 4-port Network 3 4 A diretional oupler is a 4-port network exhibiting: All ports mathed on the referene load (i.e. S =S =S 33 =S 44 =0) Two pair of ports unoupled (i.e. the orresponding
More informationRemark 4.1 Unlike Lyapunov theorems, LaSalle s theorem does not require the function V ( x ) to be positive definite.
Leture Remark 4.1 Unlike Lyapunov theorems, LaSalle s theorem does not require the funtion V ( x ) to be positive definite. ost often, our interest will be to show that x( t) as t. For that we will need
More informationINTERNATIONAL JOURNAL OF CIVIL AND STRUCTURAL ENGINEERING Volume 2, No 4, 2012
INTERNATIONAL JOURNAL OF CIVIL AND STRUCTURAL ENGINEERING Volume, No 4, 01 Copyright 010 All rights reserved Integrated Publishing servies Researh artile ISSN 0976 4399 Strutural Modelling of Stability
More informationWhere as discussed previously we interpret solutions to this partial differential equation in the weak sense: b
Consider the pure initial value problem for a homogeneous system of onservation laws with no soure terms in one spae dimension: Where as disussed previously we interpret solutions to this partial differential
More informationAn Integrated Architecture of Adaptive Neural Network Control for Dynamic Systems
An Integrated Arhiteture of Adaptive Neural Network Control for Dynami Systems Robert L. Tokar 2 Brian D.MVey2 'Center for Nonlinear Studies, 2Applied Theoretial Physis Division Los Alamos National Laboratory,
More informationSufficient Conditions for a Flexible Manufacturing System to be Deadlocked
Paper 0, INT 0 Suffiient Conditions for a Flexile Manufaturing System to e Deadloked Paul E Deering, PhD Department of Engineering Tehnology and Management Ohio University deering@ohioedu Astrat In reent
More informationWave Propagation through Random Media
Chapter 3. Wave Propagation through Random Media 3. Charateristis of Wave Behavior Sound propagation through random media is the entral part of this investigation. This hapter presents a frame of referene
More informationVolume 29, Issue 3. On the definition of nonessentiality. Udo Ebert University of Oldenburg
Volume 9, Issue 3 On the definition of nonessentiality Udo Ebert University of Oldenburg Abstrat Nonessentiality of a good is often used in welfare eonomis, ost-benefit analysis and applied work. Various
More informationRobust Recovery of Signals From a Structured Union of Subspaces
Robust Reovery of Signals From a Strutured Union of Subspaes 1 Yonina C. Eldar, Senior Member, IEEE and Moshe Mishali, Student Member, IEEE arxiv:87.4581v2 [nlin.cg] 3 Mar 29 Abstrat Traditional sampling
More informationDESIGN FOR DIGITAL COMMUNICATION SYSTEMS VIA SAMPLED-DATA H CONTROL
DESIG FOR DIGITAL COMMUICATIO SYSTEMS VIA SAMPLED-DATA H COTROL M agahara 1 Y Yamamoto 2 Department of Applied Analysis and Complex Dynamial Systems Graduate Shool of Informatis Kyoto University Kyoto
More informationDesign and Development of Three Stages Mixed Sampling Plans for Variable Attribute Variable Quality Characteristics
International Journal of Statistis and Systems ISSN 0973-2675 Volume 12, Number 4 (2017), pp. 763-772 Researh India Publiations http://www.ripubliation.om Design and Development of Three Stages Mixed Sampling
More informationAdvances in Radio Science
Advanes in adio Siene 2003) 1: 99 104 Copernius GmbH 2003 Advanes in adio Siene A hybrid method ombining the FDTD and a time domain boundary-integral equation marhing-on-in-time algorithm A Beker and V
More informationEECS 120 Signals & Systems University of California, Berkeley: Fall 2005 Gastpar November 16, Solutions to Exam 2
EECS 0 Signals & Systems University of California, Berkeley: Fall 005 Gastpar November 6, 005 Solutions to Exam Last name First name SID You have hour and 45 minutes to omplete this exam. he exam is losed-book
More informationOn Industry Structure and Firm Conduct in Long Run Equilibrium
www.siedu.a/jms Journal of Management and Strategy Vol., No. ; Deember On Industry Struture and Firm Condut in Long Run Equilibrium Prof. Jean-Paul Chavas Department of Agriultural and Applied Eonomis
More informationA Differential Equation for Specific Catchment Area
Proeedings of Geomorphometry 2009. Zurih, Sitzerland, 3 ugust - 2 September, 2009 Differential Equation for Speifi Cathment rea J. C. Gallant, M. F. Huthinson 2 CSIRO Land and Water, GPO Box 666, Canberra
More informationOrchestrating Massively Distributed CDNs
Orhestrating Massively Distributed CDNs Joe Wenjie Jiang Prineton University Prineton, NJ wenjiej@s. prineton.edu Stratis Ioannidis Tehniolor Palo Alto, CA stratis.ioannidis@ tehniolor.om Laurent Massoulié
More informationOrdered fields and the ultrafilter theorem
F U N D A M E N T A MATHEMATICAE 59 (999) Ordered fields and the ultrafilter theorem by R. B e r r (Dortmund), F. D e l o n (Paris) and J. S h m i d (Dortmund) Abstrat. We prove that on the basis of ZF
More informationEvaluation of effect of blade internal modes on sensitivity of Advanced LIGO
Evaluation of effet of blade internal modes on sensitivity of Advaned LIGO T0074-00-R Norna A Robertson 5 th Otober 00. Introdution The urrent model used to estimate the isolation ahieved by the quadruple
More informationCooperative Resource Management in Cognitive WiMAX with Femto Cells
Cooperative Resoure Management in Cognitive WiMAX with Femto Cells Abstrat WiMAX with femto ells is a ost-effetive nextgeneration broadband wireless ommuniation system. Cognitive Radio (CR) has reently
More informationSensitivity of Spectrum Sensing Techniques to RF impairments
Sensitivity of Spetrum Sensing Tehniques to RF impairments Jonathan Verlant-Chenet Julien Renard Jean-Mihel Driot Philippe De Donker François Horlin Université Libre de Bruelles - OPERA Dpt., Avenue F.D.
More informationDanielle Maddix AA238 Final Project December 9, 2016
Struture and Parameter Learning in Bayesian Networks with Appliations to Prediting Breast Caner Tumor Malignany in a Lower Dimension Feature Spae Danielle Maddix AA238 Final Projet Deember 9, 2016 Abstrat
More informationLecture 7: Sampling/Projections for Least-squares Approximation, Cont. 7 Sampling/Projections for Least-squares Approximation, Cont.
Stat60/CS94: Randomized Algorithms for Matries and Data Leture 7-09/5/013 Leture 7: Sampling/Projetions for Least-squares Approximation, Cont. Leturer: Mihael Mahoney Sribe: Mihael Mahoney Warning: these
More informationConnectivity and Blockage Effects in Millimeter-Wave Air-To-Everything Networks
1 Connetivity and Blokage Effets in Millimeter-Wave Air-To-Everything Networks Kaifeng Han, Kaibin Huang and Robert W. Heath Jr. arxiv:1808.00144v1 [s.it] 1 Aug 2018 Abstrat Millimeter-wave (mmwave) offers
More informationCombined Electric and Magnetic Dipoles for Mesoband Radiation, Part 2
Sensor and Simulation Notes Note 53 3 May 8 Combined Eletri and Magneti Dipoles for Mesoband Radiation, Part Carl E. Baum University of New Mexio Department of Eletrial and Computer Engineering Albuquerque
More informationVariation Based Online Travel Time Prediction Using Clustered Neural Networks
Variation Based Online Travel Time Predition Using lustered Neural Networks Jie Yu, Gang-Len hang, H.W. Ho and Yue Liu Abstrat-This paper proposes a variation-based online travel time predition approah
More informationDetermination of the reaction order
5/7/07 A quote of the wee (or amel of the wee): Apply yourself. Get all the eduation you an, but then... do something. Don't just stand there, mae it happen. Lee Iaoa Physial Chemistry GTM/5 reation order
More informationEinstein s Road Not Taken
Einstein s Road Not Taken Robert D. Bok R-DEX Systems, In. May 25, 2017 Abstrat When onfronted with the hallenge of defining distant simultaneity Einstein looked down two roads that seemingly diverged.
More informationUPPER-TRUNCATED POWER LAW DISTRIBUTIONS
Fratals, Vol. 9, No. (00) 09 World Sientifi Publishing Company UPPER-TRUNCATED POWER LAW DISTRIBUTIONS STEPHEN M. BURROUGHS and SARAH F. TEBBENS College of Marine Siene, University of South Florida, St.
More informationOptimal Control of Air Pollution
Punjab University Journal of Mathematis (ISSN 1016-2526) Vol. 49(1)(2017) pp. 139-148 Optimal Control of Air Pollution Y. O. Aderinto and O. M. Bamigbola Mathematis Department, University of Ilorin, Ilorin,
More informationDesign and evaluation of a connection management mechanism for an ATM-based connectionless service
Distributed Systems Engineering Design and evaluation of a onnetion management mehanism for an ATM-based onnetionless servie To ite this artile: Geert Heijenk and Boudewijn R Haverkort 1996 Distrib Syst
More informationModeling and Analysis of Resistive Type Superconducting Fault Current Limiters for Coordinated Microgrid Protection
Modeling and Analysis of Resistive Type Superonduting Fault Current Limiters for Coordinated Mirogrid Protetion R. Haider, M. S. Zaman, S. B. A. Bukhari, Y. S. Oh, G. J. Cho, M. S. Kim, J. S. Kim, and
More information