Diverse Routing in Networks with Probabilistic Failures

Size: px
Start display at page:

Download "Diverse Routing in Networks with Probabilistic Failures"

Transcription

1 Diverse Routing in Networks with Probabilistic Failures Hyang-Won Lee, Member, IEEE, Eytan Modiano, Senior Member, IEEE, Kayi Lee, Member, IEEE Abstract We develo diverse routing schemes for dealing with multile, ossibly correlated, failures. While disjoint ath rotection can effectively deal with isolated single link failures, recovering from multile failures is not guaranteed. In articular, events such as natural disasters or intentional attacks can lead to multile correlated failures, for which recovery mechanisms are not well understood. We take a robabilistic view of network failures where multile failure events can occur simultaneously, and develo algorithms for finding diverse routes with imum joint failure robability. Moreover, we develo a novel Probabilistic Shared Risk Link Grou (PSRLG) framework for modeling correlated failures. In this context, we formulate the roblem of finding two aths with imum joint failure robability as an Integer Non-Linear Program (INLP), and develo aroximations and linear relaxations that can find nearly otimal solutions in most cases. Index Terms Path rotection, disjoint aths, random link failures, correlated failures, robabilistic SRLG I. INTRODUCTION This aer deals with rotection in communication networks with correlated robabilistic link failures. The objective of rotection is to rovide reliable communication in the event of failure of network comonents such as nodes or links. Such rotection mechanisms are classified as link rotection and ath rotection. Link rotection recomutes an alternate detour for each link, and recovers from a link failure by rerouting the traffic along its redetered detour. In contrast, ath rotection assigns two aths, a rimary and a backu, to each connection, and the traffic is switched onto the backu ath in case of a rimary ath failure. Therefore, the rimary and backu aths need to be disjoint, since otherwise the two aths will fail simultaneously if a link or node shared by the two aths fails. In this aer, we focus on ath rotection. The disjoint-ath based rotection effectively addresses the case of a single oint failure, but if more than one failure occur at the same time, rotection is not guaranteed since both aths may fail simultaneously. There are several factors that can cause multile failures. First, modern communication networks are deloyed over an otical fiber network, and so multile communication links can share the same fiber in the otical layer. Consequently, any fiber cut can lead to the failure of all the (uer-layer) communication links sharing that fiber. The authors are with the Massachusetts Institute of Technology, Cambridge, MA ( {hwlee, modiano, kylee}@mit.edu) This work was suorted by NSF grants CNS and CNS and by DTRA grant number HDTRA Hyang-Won Lee was artially suorted by the Korea Research Foundation Grant funded by the Korean Government(MOEHRD).(KRF D0064) This work was resented in art at the IEEE INFOCOM conference, Aril Second, multile link failures can occur if the second link fails before the first was reaired. Third, natural disasters or attacks can destroy several links (which do not necessarily share a fiber) in the vicinity of such events. The concet of Shared Risk Link Grou (SRLG) has been roosed in order to address multile correlated link failures systematically []. An SRLG is a set of links sharing a common hysical resource (cable, conduit, etc.) and thus a risk of failure. In this context, Bhandari first studied so called Physically Disjoint Paths (PDP) roblem in [2], and roosed a shortest PDP algorithm for articular toologies. Since this ioneering work, there has been a large body of work [3] [4] dealing with multile failures in the context of SRLGs. In [5], Hu showed the NP-comleteness of the SRLG-Disjoint Paths Problem (SDPP) where SRLG-disjoint aths are two aths touching no common SRLG. All of the revious SRLG works assume that once an SRLG failure event occurs, all of its associated links fail simultaneously. Here, we generalize the notion of an SRLG to account for robabilistic link failures. This generalized notion allows us to model correlated failures that may result from a natural or man-made disaster. For examle, in the event of a natural disaster, some, but not necessarily all, of the links in the vicinity of the disaster may be affected. Such failures cannot be described using a deteristic failure model, and this raises the need for a systematic aroach to dealing with correlated robabilistic link failures. We address this issue by modeling SRLG events robabilistically so that uon an SRLG failure event, links belonging to that SRLG fail with some robability (not necessarily one). Our robabilistic SRLG model is alicable to a number of real-world failure scenarios. Some examles include: (i) WDM Networks where the lightaths traversing a fiber form an SRLG and fail (with robability ) in the event of a fiber cut, (ii) Satellite/wireless communication links where links are outage in the event of bad weather. In this case, the satellite links affected by the weather event form an SRLG, and may fail with some robability, (iii) ElectroMagnetic Pulse (EMP) attack: EMP is an intense energy field that can instantly overload or disrut numerous electrical circuits at a distance [6]. In the event of an EMP attack, the fiber links in the vicinity of the attack may have a high robability of failure and those distant from the attack would fail with low robability due to signal attenuation, and (iv) Natural/man-made disasters such as earthquakes or floods where communication links in the vicinity of the disaster may fail. For examle, an undersea cable was cut during the Taiwan earthquake of 2006 [7], disruting most communications out of Taiwan. Similarly,

2 2 during the Baltimore tunnel fire in 200 [8], the fire melted away the fiber along the tunnel, leading again to a large number of correlated failures. There are a number of aers dealing with robabilistic link failures [9] [2]. Tyically, they consider the availability (i.e., robability) that a connection is in the oerating state, and seek to find a ath air satisfying imum availability requirement [9], [20] or a ath air with maximum availability [2]. While the above works assume indeendent link failures, there have been efforts to deal with correlated failures. In [22] [24], the link failure robability is extended and defined as a function of SRLG arameters to account for correlated failures. In articular, in [24], the ath failure robability is defined as the ratio of the number of touched SRLGs to the total number of SRLGs. Under this model, [24] considers the roblem of finding a air of rimary and backu aths that satisfy joint reliability requirement. This model generalizes the traditional concet of SRLG-disjointness; such that if the joint reliability of rimary and backu aths is q, then it means they are disjoint with resect to q fraction of SRLGs. However, under this model, link failures are deteristic, given an SRLG failure. Hence, this model cannot be directly alied to the case of correlated failures with uncertainty that may occur due to disasters and attacks. In [25], a rimary/backu ath allocation roblem is defined to find a air of aths having imum joint failure robability. They adot a correlated link failure robability model where the correlation between the links is reresented by their joint failure robability. This correlation model requires exonential number of conditional robabilities in general, rohibiting a simle formulation. Due to this difficulty, they take into account only the first order correlation, i.e., the correlation between airs of links. In this aer, we consider finding a air of aths with imum joint failure robability in a network where the link failures occur randomly and are ossibly correlated. We roose an alternative model that enables a simle formulation and catures the essence of correlated link failures. Our model assumes that once an SRLG failure event occurs, its associated links fail with some robabilities. Thus, the correlation exists among the links only when they belong to the same SRLG. Clearly, this model can be viewed as a generalization of the traditional (deteristic) SRLG model. Our contributions can be summarized as follows: We generalize the SRLG framework to a robabilistic SRLG (PSRLG). This new framework enables us to effectively model correlated link failures, and develo efficient formulations to otherwise intractable roblems involving correlated link failures. We develo mathematical formulations for the roblem of finding a air of aths with imum joint failure robability. This new aroach enables the generalization of disjoint ath rotection schemes to the case of multile (robabilistic) failures. We develo heuristic algorithms for finding a air of aths with imum joint failure robability. Our algorithms are based on linear aroximations and Lagrangian relaxations, and are shown to find nearly otimal solutions. While the deteristic SRLG model has been widely used in the literature, there are many scenarios where the deteristic model is not alicable. For examle, the Working Grou on California Earthquake Probabilities (WGCEP) has been develoing the earthquake rate models for California. In articular, they comute the robabilities of all ossible damaging earthquakes (according to their magnitudes) throughout a region and over a secified time san [26]. Such disasters lead to correlated failures that are well addressed by our new PSRLG model; namely, the earthquake robabilities corresond to SRLG failure robabilities, and the link failure robabilities can be comuted based on their magnitudes. The network roviders could use this PSRLG data and our formulation in order to rotect a ath in the resence of earthquakes. The robabilistic SRLG model can also be alied to deal with the inaccuracy in the SRLG database. Tyically, the SRLG data is the maing between the IP layer comonents and the underlying hysical comonents. This information is used for failure diagnosis as well as survivable routing. However, it often contains errors due to traffic engineering and recovery mechanism [28]. Recently, in [30], failure diagnosis mechanisms were studied assug robabilistic errors in the SRLG data where the association of an IP layer comonent to a hysical comonent is robabilistic. Note that with this erroneous SRLG data the survivable routing roblem is best handled robabilistically as in our PSRLG model. The rest of the aer is organized as follows. In Section II, we resent our new robabilistic SRLG model and describe the generalized ath rotection roblems. In Section III, we study the case of indeendent link failures, which rovides fundamental insights to the study of correlated failures. In Section IV, we formulate the ath rotection roblems using the PSRLG model and develo algorithms for finding aths with imum joint failure robability. Finally, in Section V, we analyze the erformance of our algorithms via simulations. II. MODEL AND PROBLEM DESCRIPTION Consider a directed network grah G = (V, E) where V is a set of nodes and E is a set of links. Any link in E will be denoted by (i, j) for i, j V, meaning that the link starts from node i and ends at node j. There is a set R of SRLG events that can incur link failures. Each SRLG event r R occurs with robability π r, and once an SRLG event r occurs, link (i, j) will fail with robability r ij [0, ]. For examle, if link (i, j) is never affected by event r, then we define r ij = 0. On the other hand, if the event r is a cable cut and link (i, j) traverses that cable, then we will have r ij =. In the following we generalize the traditional notion of an SRLG to include robabilistic correlated failures. Definition : A robabilistic SRLG (PSRLG) is a set of links with ositive failure robability in the event of an SRLG failure. Namely, link (i, j) belongs to SRLG r if r ij > 0, and SRLG r = {(i, j) E : r ij > 0}. We say that links (i, j) and (k, l) are correlated if there exists an SRLG r such that r ij, r kl > 0. Clearly, this model is a Tyically, in failure diagnosis, the underlying hysical layer failures are inferred from the IP layer failures by using the SRLG data, i.e., the maing between hysical layer comonents and IP layer comonents [27] [3].

3 3 generalization of the traditional SRLG model, and enables us to deal with correlated robabilistic link failures. We consider a single source-destination air. Let s V and t V be source and destination nodes resectively. Our objective is to find a air of rimary and backu aths from s to t with imum joint failure robability. This roblem will be considered using two different models: (i) indeendent link failure and (ii) SRLG-based correlated link failure. In each case, we seek to find a air of aths with imum joint failure robability. Let x ij = if the rimary ath traverses link (i, j), and 0 otherwise. Similarly, define another binary variable y ij for the backu ath. We will just dro the index of a variable to denote its vector version, e.g., x reresents the vector [x ij, (i, j) E]. The set of n-dimensional binary vectors will be defined as B n, i.e., B n = {0, } n. Our roblems will be formulated as Integer Programs (IPs). III. INDEPENDENT LINK FAILURE MODEL In order to gain insights into the roblem, we start by first considering the indeendent link failure model. Moreover, we begin by considering the simle case of finding a single ath with imum failure robability. We then use the insights gained in order to formulate the roblem of finding a air of aths with imum joint failure robability. In Section IV, we will further generalize our formulations to deal with correlated (SRLG) failures. A. Single Path Problem First, consider the roblem of finding a single ath having imum failure robability. Let ij be the robability that link (i, j) fails, then link (i, j) will survive with robability ij. Consequently, the survivability robability of ath x is given in a roduct form by ( ijx ij ). The roblem is formulated as: (P.) : ( ij x ij ) x B E x ij, i = s x ji =, i = t, i V, () j: E j:(j,i) E 0, o.w. where E is the cardinality of E. The constraints in () require that the set of links selected by x forms a ath from node s to node t. For simlicity, we will denote this constraint by CC(x), reresenting the connectivity constraint on x for a ath from s to t. As all the variables in this work are binary, we will sometimes omit the binary constraint for convenience. The roblem (P.) is an Integer NonLinear Program (INLP), which generally is very difficult to solve. However, using the following theorem, we are able to reformulate (P.) as an Integer Linear Program (ILP). Theorem : Assume ij [0, ), (i, j), then the roblem (P.) is equivalent to the following ILP: (P.L) : x ij log( ij ) x B E CC(x), where CC(x) is the connectivity constraint as given in equation (). Proof: First, the objective in (P.) can be equivalently written as max ( ijx ij ). Taking logarithm over the entire function gives max log( ijx ij ) without affecting the otimal solution. The roof is comleted by alying the identity log( ij x ij ) = x ij log( ij ) for binary variable x ij, and noting that max f(x) is the same as f(x). Observation : Theorem shows that the ath with imum failure robability is the shortest ath under link weights log( ij ), (i, j). It immediately follows that if the failure robability is sufficiently small (i.e., ij, (i, j)), then the robability-wise shortest ath has the imum failure robability because log( ij ) ij for small ij. Further, with uniform failure robability, i.e., ij = q, (i, j) E, the shortest-ho ath has the lowest failure robability. This result will be used in develoing heuristic algorithms. B. Path Pair Problem with Disjointness Constraint Let F (, x) be the objective function of roblem (P.), i.e., F (, x) is the failure robability of ath x for given link failure robability vector. Suose that the two aths x and y are link-disjoint, then their failures are mutually indeendent because the link failures are indeendent and further the aths do not share any link. Then, the joint failure robability of two disjoint aths x and y is given by F (, x) F (, y). The ath air roblem with disjointness constraint (DC) is thus formulated as: (P.2) : x,y F (, x)f (, y) x ij {, i = s x ji =, i = t, i V j: E j:(j,i) E 0, o.w. y ij {, i = s y ji =, i = t, i V j: E j:(j,i) E 0, o.w. x ij + y ij, (i, j) E. Again, the first and second constraints are the connectivity constraints requiring that x and y are aths from s to t. The last constraints require that x and y cannot share any link, i.e., they are link-disjoint. Hence, x and y satisfying all the constraints in (P.2) will form a air of disjoint aths from s to t. For brevity, throughout this aer, we will denote by CC(x) the connectivity constraint on any binary link selection vector x, and DC(x, y) the disjointness constraint (DC) on aths x and y. The roblem (P.2) is an Integer NonLinear Program (INLP) and has a secial structure which is difficult to solve in general. Let c be the length of the shortest ath from s to t. Lemma : Assume the uniform failure robability ij =, (i, j), where 2 c <. Then, the roblem (P.2) is a concave imization. Proof: See Aendix A. Therefore, the roblem (P.2) contains a concave imization as a secial case. Generally, a concave imization roblem is NP-hard [32], and hence the above lemma imlies that the roblem (P.2) may not be easy. In the following, we consider heuristic algorithms to solve the roblem.

4 4 ) Greedy Algorithm: First, we analyze the roerties of the otimal solution to (P.2). This motivates a greedy algorithm. Our analysis is based on the theory of majorization, introduced below. Definition 2 (Majorization): Given an n-tule vector a, let a [i] be the i-th largest of n coordinate. An n-tule vector α is said to be majorized by β if k α [i] k β [i], k =,..., n, and i= i= n i= α [i] = n β [i]. i= This relationshi is denoted by α β. The majorization formalizes how evenly distributed the elements of a vector are. For examle, α = [2, 2, 2] is the most evenly distributed vector over all the 3-tule vectors sumg u to 6, and majorized by any other such vector, e.g., β = [,, 4]. Definition 3 (Schur Convexity): A function f : A R n R is Schur convex if f(α) f(β) for any α, β A such that α β. It is called Schur concave if f(α) f(β) for α β. It is clear from this definition that a Schur convex function f : A R is imized at evenly distributed oints, whereas if f(x) is Schur concave, it is imized at unevenly distributed oints. We will show the Schur concavity of the objective function in (P.2), and use this roerty to develo a greedy ath selection algorithm. Assume the uniform failure robability, i.e., ij =, (i, j). Then, the objective function in (P.2) can be written as f(x, Y ) = ( ( ) X) ( ( ) Y ), (2) where X = x ij and Y = y ij. Note that X and Y are the number of hos in rimary and backu aths, resectively. Hence, for fixed, f(x, Y ) is a function of the numbers of hos in the rimary and back aths. The roblem (P.2) can be restated as: imize f(x, Y ) the same constraints as in (P.2) with the additional constraints X = x ij and Y = y ij. The objective function f(x, Y ) in this roblem can be shown to be Schur concave. Lemma 2: The function f(x, Y ) in (2) is Schur concave for 0 <. Proof: See Aendix B. As mentioned above, a Schur concave function is imized at unevenly distributed oints rather than evenly distributed ones. So, for examle, we have f(2, 2) f(, 3) since (2, 2) (, 3). Accordingly, Lemma 2 imlies that a air with unbalanced (in terms of the number of hos) aths is referred because its joint failure robability may be lower than that of a balanced air. Consider an examle in Fig., where there are two airs of s t aths: one with X = 3, Y = 3 and the other with X = 2, Y = 4. Fig. (b) lots the joint ath failure robabilities of the two airs, and shows that the unbalanced air (i.e., the one with X = 2, Y = 4) is more reliable than the balanced air for all values of. It should be noted that a similar observation can also be made as follows for the nonuniform failure robabilities where ij s can be different. Observation 2: Consider an examle toology in Fig. 2 where the number on each link is its failure robability. We want to find a air of disjoint aths with imum joint failure s s 3 3 ( ) ( ) f ( ) 2 4 ( ) f (a) Two airs of disjoint aths: one with X = 3, Y = 3 and one with X = 2, Y = 4 Joint ath failure robability f(x,y) (b) Plot of joint ath failure robabilities t X=3, Y=3 X=2, Y=4 Fig.. Two airs of disjoint aths and their failure robabilities under uniform link failure robability: the unbalanced air is always more reliable than the balanced one robability. It is easy to see that there are only two airs shown in the figure. The air in the to has individual ath failure robabilities of (0., 0.) and thus its joint failure robability is 0.0. On the other hand, the air in the bottom has individual ath failure robabilities of (0, 0.9), leading to zero joint failure robability. This reasserts that a good-bad ath air might be better than a medium-medium air. The above observations suggest that it is imortant to include the best ath (i.e., ath having imum failure robability) in the air. Further, it motivates a greedy algorithm which selects the best ath first and then selects the next best disjoint ath (See Algorithm ). Note that according to Observation, the best ath is obtained by the robabilitywise shortest ath. Hence, Algorithm only needs to run a shortest ath algorithm twice whose comlexity is O( V 2 ). Note that the greedy algorithm can ossibly run out of s t aths after the first ath is found. This is a so-called tra roblem. In the following, we show that such a case does not haen under mild assumtions. First, notice that the aths t

5 5 s s Path failure robabilities = (0., 0.) Joint ath failure robability = 0.0 Path failure robabilities = (0, 0.9) Joint ath failure robability = 0 Fig. 2. Examle motivating greedy algorithm: including the most reliable ath is also imortant in the case of non-uniform failure robabilities Algorithm Greedy: IND w/ DC : Set link weight w ij = ij, (i, j) E 2: Find shortest ath x 3: Remove all the directed edges used by x 4: Find shortest ath y found by the greedy algorithm are simle (i.e., do not contain cycles) or can contain cycles of zero length, in which case they can be removed without affecting the ath failure robability. Hence, we may assume that the aths x and y found by the greedy algorithm are simle. Lemma 3: Consider a k-connected 2 bidirectional grah G where k 2. Removing a simle s t ath in G does not disconnect s and t. Proof: See Aendix C. Therefore, the greedy algorithm does not run out of s t aths after the first ath is found, rovided that the grah is bidirectional and k-connected with k 2. We note that this assumtion is very common; as most ractical networks use bidirectional links. 2) ILP Aroximation of (P.2) and Its Lagrangian Relaxation: We develo another heuristic algorithm based on the ILP aroximation of the roblem (P.2). First, the objective function in (P.2) can be exanded as F (, x)f (, y) = ( ij x ij ) ( ij y ij ) + ( ij x ij ) ( ij y ij ). (3) Further exanding the roduct terms and canceling out common terms yields F (, x)f (, y) = ij kl x ij y kl + HOT, (4) (k,l) 2 A grah is said to be k-connected if it remains connected after u to k link (or node) failures. Equivalently, if every source-destination air has at least k disjoint aths, then it is k-connected. t t where HOT stands for high order terms; namely, terms involving the roduct of 3 or more failure robabilities. In the low failure robability regime, i.e., ij, (i, j), the HOTs can be neglected and the ILP can be formulated as follows: (P.2L) : x,y,z (k,l) ij kl z kl ij CC(x), CC(y), DC(x, y) (C) zij kl ij + y kl, (i, j), (k, l) E, where we have introduced the binary variables zij kl, (i, j), (k, l) such that zkl ij = only if both of x ij and y kl are. That is, link (i, j) is used by the rimary and (k, l) by the backu ath. This enables us to use zij kl instead of x ij y kl in the objective, hence resulting in a linear formulation. Consequently, the objective function reresents the joint failure robability based on the air-wise (one from x and one from y) joint link failure. While generally ILPs are difficult to solve, in this case we also observe that the constraints CC(x) and CC(y) are totally unimodular 3 (TU) [33], hence the linear rogram (LP) relaxation has an integral otimal solution [33]. Further, we can use Lagrangian relaxation on the constraints DC(x, y) and (C ) to further simlify the roblem. In articular, define the Lagrangian function as L(x, y, z, µ, ν) = ( µ ij + ) (k,l) νkl ij x ij + ( µ ij + ) (k,l) νij kl y ij + ( ),(k,l) ij kl νij kl z kl ij where µ and ν are Lagrangian multilier vectors associated with DC(x, y) and (C), resectively. The (Lagrangian) relaxed roblem is given by (P.2LR) : x,y,z L(x, y, z, µ, ν) CC(x), CC(y). The above roblem is TU, and so it can be solved by LP relaxation which is olynomial time solvable. Moreover, for given µ and ν, the roblem (P.2LR) is comletely searable with resect to x, y and z. Namely, the otimal x and y are shortest aths resectively, and otimal zij kl is obtained as: zkl ij = if νij kl > ij kl, and 0 otherwise. Now, the above otimization can be solved using a simle rimal-dual method as described in Algorithm 2, where γ m is a ositive diishing ste size, M is the maximum number of iterations, and w ij is the weight of link (i, j). Note that stes solve the relaxed roblem (P.2LR), and stes are the subgradient-based udate of Lagrangian multiliers. The algorithm kees the best ath air all over the iterations (ste 2.6), and takes it as the final solution. Such a Lagrangian relaxation method for IP does not guarantee an otimal solution due to the duality ga, but it has been very successful in solving many IPs [34]. Although the linear aroximation in (P.2L) may not be accurate in the high robability regime, it is an uer bound on the original (nonlinear) objective function. 3 A matrix A is said to be totally unimodular if the deterant of each square submatrix of A is 0,, or (The network flow conservation matrices are TU). If the constraint matrix of an ILP is TU, then its linear rogram relaxation has an integral otimal solution, that is equivalent to the otimal solution of the ILP. Hence, the otimal solution of such an ILP can be obtained by solving its linear rogram relaxation, which is olynomial time solvable.

6 6 Algorithm 2 Lagrangian Relaxation: IND w/ DC : Initialization: m = 0, µ ij (0) = ij and νij kl(0) = ij kl, (i, j), (k, l) E, and best = 2: While m < M 2. Set w ij = µ ij (m) + (k,l) νkl ij Find shortest ath x(m) (m), (i, j) E; (m), (i, j) E; 2.2 Set w ij = µ ij (m) + (k,l) νij kl Find shortest { ath y(m) 2.3 zij kl, if ν (m) = kl ij (m) > ij kl, (i, j), (k, l) 0, otherwise 2.4 µ ij (m+) = [µ ij (m) + γ m (x ji (m)+ y ij (m) )] + (m + ) = [νkl ij (m) + γ m(x ji (m) + y kl (m) ij (m) )]+, (i, j), (k, l) E 2.6 Set (x best, y best ) = (x(m), y(m)) if (m) < best where (m) is the joint failure rob. of (x(m), y(m)) 2.7 m = m νij kl z kl Lemma 4: The objective function in (P.2L) is an uer bound on the joint ath failure robability F (, x)f (, y). Proof: See Aendix D. Therefore, the linearization aroach may work as well in other regimes including the high robability regime. This is verified through simulations in Section V. C. Path Pair Problem without Disjointness Constraint The disjointness constraint is a necessary condition for surviving a single link failure in the traditional deteristic failure model. However, in a robabilistic model, a link may be shared if it is known that the link is very reliable. If link (i, j) is shared by x and y, then (i, j) s failure leads to the simultaneous failure of both x and y. Hence, the robability that both x and y fail can be written as F S (, x, y) + ( F S (, x, y))f NS (, x, y), (5) where F S (, x, y) is the robability that both x and y fail due to a shared link failure, and F NS (, x, y) is the robability that both x and y fail due to the failure of non-shared links. For ath air (x, y), let E xy denote the set of links shared by x and y, i.e., E xy = {(i, j) E : x ij =, y ij = }. Then, the robability F S (, x, y) can be written as F S (, x, y) = E xy ( ij ) = E ( ijx ij y ij ). For a binary vector v, define its comlement as v = v where is a vector of s with aroriate dimension. Then, the vector ȳ only includes the links which are not selected by y. Hence, the robability that x fails due to the failure of non-shared links is equivalent to the robability that both x and ȳ fail due to the failure of the links shared by x and ȳ. This robability can be subsequently exressed as F S (, x, ȳ) following to the definition F S (, x, y). Similarly, F S (, x, y) denotes the robability that y fails due to the failure of non-shared links. The robability F NS (, x, y) is then given by F NS (, x, y) = F S (, x, ȳ)f S (, x, y), leading to the following formulation: (P.3) : x,y (6) F S (, x, y) + ( F S (, x, y))f NS (, x, y) CC(x), CC(y). Algorithm 3 Greedy: IND w/o DC : Set w ij { = ij, (i, j) E; Find shortest ath x ij kl x kl, if x ij = 0 2: w ij = (k,l), (i, j) E; ij, if x ij = Find shortest ath y Fig. 3. s Examle toology u The roblem (P.3) has an equivalent (if disjoint aths are otimal in (P.3)) or better otimal solution comared to the roblem (P.2). Under the low failure robability regime, we can aroximate the roblem (P.3) by an ILP as follows: (P.3L) : x,y,z, z ij z ij + (k,l) ij kl z kl ij CC(x), CC(y) (C) z ij x ij + y ij, (i, j) E (C2) zij kl x ij y ij + y kl x kl, (i, j), (k, l). In constraint (C), z ij = only if x ij = y ij = which means that link (i, j) is shared. Hence, the first term in the objective function is the joint failure robability due to the failure of shared links. In constraint (C2), z ij kl = only if x ij = y kl = and y ij = x kl = 0 which means links (i, j) and (k, l) are resectively used by x and y, but neither of them are shared. Hence, the second term is the joint failure robability due to the failure of non-shared links. The formulation (P.3L) is a standard ILP that can be solved using an ILP solver such as CPLEX. However, it can take unaccetably long to run because it is NP-comlete in general. Insired by the aroximation (P.3L), we roose a simle greedy algorithm, as shown in Algorithm 3. Similar to Algorithm, Ste finds a shortest ath for x using link weights w ij = ij, (i, j) and this gives a rimary ath x with imum failure robability. For the backu ath y, the weight of each link (i, j) is set to the joint ath failure robability due to the failure of link (i, j) and the links in x. Hence, two different cases have to be considered. First, if link (i, j) has not been selected by the rimary ath x, then its weight is set to the roduct of (i, j) s failure robability ij and the (aroximated) failure robability (k,l) klx kl of ath x. If (i, j) was selected by x, then (i, j) s failure leads to joint ath failure (rovided that y also selects (i, j)), and so its weight is set to ij. The shortest ath under these link weights will imize the joint ath failure robability and will be used as the backu ath y. Note that if link (i, j) is to be shared, its weight is set to a first-order value, i.e., ij which is obviously larger than the second-order weight in the non-shared case. Hence, the links with relatively low failure robability will be more likely to be shared. D. Extension to Correlated Failures t As discussed in the introduction, many failure scenarios involve multile links. Hence, link failure events may be

7 7 correlated. In order to account for such correlation, the ath failure robability exressions must include conditional robabilities for joint link failures. Let ij kl be the robability of link (i, j) s failure given (k, l) s failure, then the joint link failure robability is given by kl ij kl or ij kl ij. Note that high value of conditional robability ij kl imlies strong correlation between the failures of (i, j) and (k, l). Consider an examle toology in Fig. 3, then the ath s t s failure robability can be exressed as su + ut su ut su. (7) Generally, it can be written as ij ij kl ij E(s,t) E(s,t) (k, l) E(s, t), (k, l) (i, j) + ij kl ij mn ij,kl E(s,t) (k, l) E(s, t), (m, n) E(s, t), (k, l) (i, j) (m, n) (i, j) (m, n) (k, l) + high order terms, (8) where E(s, t) is the set of links on s t ath. These conditional robability exressions involve an exonential number of terms accounting for the joint failure robability of multile links. Hence, formulating the above roblems under correlated failures seems to be intractable. Due to this difficulty, [25] considers only the first order correlation, i.e., conditional robability for every air of links. In order to better account for correlated failures, we roose a new model using robabilistic SRLGs. In our model, once an SRLG failure event occurs, its associated links fail with some robabilities. So, the link failures are correlated only if the links belong to the same SRLG (while in the linkwise model, the correlation is considered between every air of links). Moreover, under the condition that an SRLG event occurs, its associated link failures are mutually indeendent, and thus the formulations develoed in the indeendent model can be used. This enables a simle formulation for the ath rotection roblems with correlated failures. More imortantly, it can be used to model most correlated failure scenarios; as events leading to failures can be modeled as a robabilistic SRLG (PSRLG). IV. PSRLG-BASED CORRELATED FAILURE MODEL We consider a single SRLG model where only one SRLG failure event can take lace at a time. Let π r be the robability that the failed SRLG is r R, then we will have r R π r =. We refer to this model as the mutually exclusive PSRLGs. Note that the traditional deteristic SRLG model also assumes a single SRLG failure, and so our model of mutually exclusive PSRLGs is a robability-wise generalization of the traditional model. A. Single Path Problem Again, we start by considering a single ath roblem. Given that SRLG event r haens, each link (i, j) will fail with robability r ij as if they are indeendent. Hence, the failure robability of ath x is given by ( r ij x ij), and according to the definition of F in Section III, this robability can be denoted by F ( r, x) where r = [ r ij, (i, j) E]. The single ath roblem can be simly written as (P2.) : π r F ( r, x) x B E r R CC(x). Note that the ath failure robability is averaged over all SRLGs because they are mutually exclusive. As shown in Section III-A, the single ath roblem under indeendent failures is an easy shortest ath roblem. However, the same roblem in the correlated failures case (i.e., (P2.)) can be shown to be difficult. Theorem 2: The single-ath roblem (P2.) is NPcomlete. Proof: This is roved by showing that the roblem (P2.) contains as a secial case a Minimum-Color Single-Path (MCSiP) Problem which is NP-comlete [35]. The MCSiP roblem is stated as follows. Given network grah G = (V, E) and set of colors C = {c, c 2,..., c K }, each edge is colored with one of the colors in C. The roblem is to find a ath from s to t that touches the imum number of colors. Note that it assumes monochromatic edges (i.e., single color to each edge), but this assumtion can be easily relaxed by grah transformation. Namely, an edge with k colors is relaced by k serial edges (and k intermediate nodes) each of which is associated with a different color from the set of k colors. Hence, the MCSiP roblem without the monochromatic assumtion is also NP-comlete. First, assume uniform failure robabilities, i.e., π r = R, r and r ij = for all (i, j) r such that r ij > 0. Then, using the identity f(x) max f(x), the objective in (P2.) can be rewritten as ) x = x max x ( π r ( r ij x ij) r R ( E R ) ( x ij ) r R r ( x ij ) r R r Further, assume =. Note that this case corresonds to the traditional SRLG model that assumes deteristic failures. Under this assumtion, the above objective function value reresents the number of untouched SRLGs. In other words, it finds a ath that touches the imum number of SRLGs. If SRLG is relaced by color, it is a Minimum-Color Single-Path Problem (without monochromatic assumtion). This shows that the roblem (P2.) contains an NP-comlete roblem, imlying that it is NP-comlete. Due to this difficulty, its aroximation is again considered. Under the low failure robability assumtion (i.e., r ij, r, (i, j)), the objective function can be written as (9) ( r R π r r ij) xij. (0) We first begin by considering the simle case of uniform SRLG failure robability. Namely, let π r = / R, r R and r ij =, r R(i, j), (i, j) E where R(i, j) = {r R : r ij > 0}.

8 8 Observation 3: Under the uniform failure robability, imizing the objective function (0) is equivalent to imizing R(i, j) x ij where each term R(i, j) in the summation is the number of SRLGs to which link (i, j) belongs. This shows that the ath touching the imum number of SRLGs has the lowest failure robability. The traditional SRLG model falls into a secial case of the uniform failure robability with q =, and hence, Observation 3 imlies that in the traditional model, the number of SRLGs touched by a link is an imortant link-weight metric when finding a reliable ath. In fact, some revious works have used this metric [0], and our result rovides a theoretical basis for those works in traditional SRLG model. B. Path Pair Problem with Disjointness Constraint The ath air roblem can also be formulated in a simle form as in the case of single ath. Once an SRLG event r occurs, aths x and y will fail with robabilities F ( r, x) and F ( r, y), resectively. In this case, their joint failure robability is given by the roduct F ( r, x)f ( r, y) because the link failures are indeendent, under the condition that SRLG event r has occurred. The roblem can be formulated as follows: (P2.2) : x,y π r F ( r, x)f ( r, y) r R CC(x), CC(y), DC(x, y). Our robabilistic SRLG model has enabled us to exress the joint failure robability in a roduct form leading to a simle formulation. Namely, the objective function in (P2.2) is the combination of the objective functions in (P.2) and (P2.). That is, for given SRLG r, the joint ath failure robability is equivalent to the joint ath failure robability with link failure robability vector r in the indeendent model, and those joint failure robabilities are averaged over all SRLGs, as done in (P2.). This is in shar contrast with the linkwise correlated failure model where the ath failure robability would include terms of the conditional robabilities involving all the combinations of link failures. It is obvious that the ath air roblem is harder than the single ath roblem, and thus, we can infer from Theorem 2 that the roblem (P2.2) will also be difficult. In fact, we can show its NP-comleteness as well. Theorem 3: The ath-air roblem (P2.2) is NP-comlete. Proof: First, note that the objective value of (P2.2) is nonnegative, and so if any ath air results in zero objective value, then it is otimal. The robability F ( r, x) in (P2.2) can be written as F ( r, x) = ( r ij x ij) = r ( r ij x ij), () because r ij = 0 if link (i, j) does not belong to SRLG r, i.e., (i, j) / r. Consequently, the function F ( r, x) becomes zero for the ath x which does not touch SRLG r, i.e., x ij = 0, (i, j) r. Hence if x and y do not share any SRLG, then the roduct F ( r, x)f ( r, y) will be zero for every r R, thereby leading to zero objective value. This imlies that any air of SRLG-disjoint aths is an otimal solution to Algorithm 4 Greedy: MES w/ DC : Set w ij = r R π r r ij, (i, j) E 2: Find shortest ath x 3: Remove all the links used by x 4: Set w ij = (k,l) x kl r R π r r ij r kl, (i, j) E 5: Find shortest ath y the roblem (P2.2). Subsequently, the roblem (P2.2) becomes an SRLG-disjoint aths roblem if one exists. Therefore, the roblem (P2.2) is NP-comlete because it includes (as a secial case) the SRLG-disjoint aths roblem which is NPcomlete [5]. Again, it is easy to show that when the link failure robabilities are low, the objective function of (P2.2) can be exressed as ( (k,l) r R π r r ij kl) r xij y kl. (2) Next, we observe that the roblem is still NP-comlete even after the aroximation. Observation 4: Under the uniform failure robability (i.e., π r = / R, r R and r ij = q, r R(i, j), (i, j) E), the objective function (2) becomes (k,l) R(i, j) R(k, l) x ij y kl where each term in the summation reresents the number of SRLGs shared by corresonding link air in x and y. This obviously contains SRLGdisjoint aths roblem as a secial case (if there exist SRLGdisjoint aths), and so, it is NP-comlete (following to the roof of Theorem 3). Subsequently, the aroximated roblem (2) is also NP-comlete. As this aroximation is still difficult to solve, we roose a heuristic in Algorithm 4 using the aroximations (0) and (2). For rimary ath x, we set the link weights and find the shortest ath according to (0). This will give a ath having imum failure robability. Then, all the links selected by x are removed for disjointness. Finally, the obtained rimary x is substituted into (2), and the backu ath y is comuted by imizing (2) for fixed x. Hence, the greedy algorithm takes into account the correlation so that the links highly correlated with the selected links can be avoided. One can also develo a Lagrangian relaxation based algorithm by linearizing the roblem. However, this develoment is nearly identical to that in Section III-B2 and omitted for brevity. The ath air roblem without disjointness constraint was also studied, but omitted for brevity. V. PERFORMANCE EVALUATION In this section, we evaluate and comare the erformance of the algorithms develoed in this aer. In articular, we consider the following four algorithms: The brute-force solution to the ILP formulations using the CPLEX solver (denoted by CPLEX). The Lagrangian relaxation for the ILP (Algorithm 2; denoted by LR). The greedy algorithms that select the first ath with imum failure robability and the second ath with adjusted link weights to reduce the joint ath failure

9 9 robability (i.e., Algorithms, 3 and 4; denoted by Greedy). The shortest disjoint aths algorithm that finds a air of disjoint aths with imum total weight, where the weight of a link is its failure robability (i.e., for each link (i, j), w ij = ij in the indeendent model or w ij = r π r r ij in the PSRLG model). This algorithm is a straightforward aroach simly selecting a shortest ath air, and as mentioned in Observation 2, such a air does not necessarily have imum joint failure robability. Note that this joint shortest ath aroach is in contrast with our heuristic which is one-by-one shortest ath aroach. (denoted by SDP) The rotection quality (i.e., joint ath failure robability) and run-time of the above algorithms will be comared. First, we comare the ILP (P.L) and robability-wise shortest ath (PSP) algorithm that finds a shortest ath under link weights w ij = ij, (i, j). As discussed in Theorem and Observation, the ILP finds a ath with imum failure robability while the PSP algorithm aroximates the otimal ath in the low failure robability regime. Because the PSP algorithm is used in our heuristics (Algorithms, 3 and 4) to find a ath with imum failure robability, this comarison will demonstrate the suitability of the PSP algorithm in our heuristics. We generated 00 random grahs, each of which has 0 nodes and maximum node degree of 5, and is 3- connected 4 from s to t. To avoid the tra roblem discussed in Section III, we assume that the grahs are bidirectional. In each grah, the failure robability of each link (i, j) is assigned as follows: ij = α(β + ( β)u), where α and β are constants in [0, ], and u is a random number uniformly distributed on the interval (0, ). Note that as β increases, the network aroaches to the uniform failure robability regime (i.e., ij = q, (i, j)). For examle, if β =, it will be ij = α, (i, j), which imlies uniform failure robability regime. In contrast, if β = 0, ij will be a random number from (0, α). On the other hand, small α corresonds to the low failure robability regime and large α to the high failure robability regime. Fig. 4 lots the ath failure robability for each combination of (α, β) where each oint is the average of the results of 00 random grahs. As exected in Observation, the PSP algorithm finds an otimal ath in the uniform or low failure robability regime (large β or small α, resectively). Furthermore, even in high robability regime (large α), the PSP aroximates the ILP very well. When the network is nearly in the uniform robability regime (large β), shortestho ath would be otimal, and the PSP obviously finds this shortest ath. With small β, the network is in a mixed regime having high and low failure robabilities. In this case, both the ILP and PSP would select only the links with low failure robability whenever feasible. Then, it is highly likely that the same ath is otimal after the links with high 4 In our simulation, once a grah is generated, we exae the 3- connectedness of the grah, and if it is not 3-connected, it is discarded. Fig. 4. Path failure robability ILP PSP Low rob. regime β=0.99 β=0.7 β=0.5 β=0.3 β=0. β=0 High rob. regime Scaling factor α Comarison of ILP and robability-wise shortest ath (PSP) failure robability are removed. This is equivalent to being in the low robability regime, and therefore, the PSP erforms comarably to the ILP. Overall, the PSP algorithm finds an otimal ath in most cases, as desired. Next, we consider the roblem of finding the ath air with imum joint failure robability. The roosed greedy and LR-based algorithms are comared with CPLEX and the SDP algorithm using various toologies. The CPLEX solves the ILP version of every ath air roblem. For LR-based iterative algorithms, the following arameters are used: maximum iteration number M = and ste size γ m = 0 9 / m. The comarison is erformed by changing the number of nodes, and 00 random geometric grahs are generated for each case. In a random geometric grah, N nodes are randomly located on the N N lane. Two nodes are connected if the distance from one to the other is less than 0.5. As in the above, each grah is 3-connected (from s to t) with maximum node degree of 5. For each toology, we consider only a single s-t air, and average these values over 00 different toologies. For the indeendent model, the failure robability of each link is set to a random number uniformly distributed on the interval (0, 0 3 ), hence ij (0, 0 3 ), (i, j) E. For the PSRLG model, 20 SRLGs are generated for every grah and their failure event robabilities π r s are set to uniformly distributed random numbers such that r π r =. Each SRLG is associated with a circle whose center is randomly located on the lane and radius is a uniformly distributed random number in (,.5). An SRLG includes all the links touched by its circle. Once a link, say (i, j), is included in SRLG r, its failure robability r ij is set to a uniformly distributed random number in (0, 0 3 ) for low robability regime and in (0.5, ) for high robability regime. Fig. 5 lots the joint ath failure robability achieved by each algorithm in the indeendent model, with and without the disjointness constraints. Fig. 5(a) shows that with the disjointness constraint, the CPLEX always finds the best ath air, while the other algorithms achieve nearly the same rotection erformance as the CPLEX. Without disjointness constraint, the CPLEX still erforms better than any other, whereas the erformance of Lagrangian relaxation (LR) based algorithm is

10 0 Joint ath failure robability x Averaged 00 cases for each number of nodes CPLEX w/ DC Greedy w/ DC LR w/ DC SDP Joint ath failure robability 6 x Averaged 00 cases for each number of nodes CPLEX w/o DC Greedy w/o DC LR w/o DC Number of nodes (a) With disjointness constraint (DC) Number of nodes (b) Without disjointness constraint (DC) Fig. 5. Joint ath failure robability in indeendent model substantially degraded as the number of nodes increases (See Fig. 5(b)). It is remarkable that our greedy algorithm which does not exlicitly attemt to solve the otimization roblem erforms as well as the CPLEX solution which finds a ath air by solving the otimization roblem. This verifies our observation in Section III-B that for ath rotection against robabilistic failures, it is imortant to include the best ath in the rimary and backu ath air. Notice that the LR-based algorithm erforms well with disjointness constraint. However, without disjointness constraint, the LR-based algorithm does not erform very well esecially in large networks (See Fig. 5(b)). Clearly, the search sace without disjointness constraint is much larger than that with disjointness constraint. This imlies that in large networks, it requires many more iterations in order to find a better solution. This is art of the reason why the LR-based algorithm does not work well in large networks. The run-time of each algorithm is shown in Fig. 6. As the number of nodes increases, the run-time of CPLEX increases exonentially. This shows that CPLEX takes a brute-force aroach having exonential run-time and hence, may be rohibitively comlex. The LR algorithm also takes a long time, but its run-time increases much more slowly than CPLEX. On the other hand, the greedy and SDP find a ath air in imal time, almost indeendent of the roblem size. Therefore, both the greedy and the SDP algorithms find a fairly reliable air of aths with short run-times. The joint ath failure robabilities in the PSRLG model are shown in Fig. 7. As in the indeendent model, the CPLEX always finds the most reliable air of aths in the low failure robability regime (See Fig. 7(a)). Observe from Fig. 7(b) that the CPLEX erforms as well in the high robability regime. As discussed earlier, this is because the linear aroximation solved by CPLEX is an uer bound on the joint ath failure robability. Fig. 7 also shows that our greedy algorithm rovides better rotection than the SDP. This is due to the fact that our greedy algorithm adjusts the failure robability before selecting the second ath in order to reduce the joint failure robability while the SDP algorithm fails to take correlation Fig LR CPLEX w/ DC CPLEX w/o DC LR w/ DC LR w/o DC CPLEX SDP Greedy SDP Greedy w/ DC Greedy w/o DC Run-time (on DELL Workstation T7400) in indeendent model into account. As mentioned in Section III-C, relaxing the disjointness constraint (DC) should imrove the rotection quality (if nondisjoint ath air is otimal). Fig. 8 shows that the joint failure robability is decreased by relaxing the DC. Observe further that our greedy algorithm finds a more reliable ath air than SDP, again verifying our observation in Section III-B that it is imortant to include the best ath in the air. We further exae the algorithms using a US IP network toology shown in Fig. 9. As in the revious simulations, the link failure robability ij under the indeendent model is uniformly distributed on the interval (0, 0 3 ). For the PSRLG model, the nodes are located on the lane as seen in Fig. 9. As in the revious simulations, R (=5,0,20) SRLGs are randomly located on the lane and include the links touched by their circles of radius in (, 2). The link failure robability r ij is uniformly distributed on the interval (0.5, ). Under this assumtion, 00 realizations of the SRLGs and failure robabilities are generated. In each realization, 00 sourcedestination airs are randomly selected to find their disjoint

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment Neutrosohic Sets and Systems Vol 14 016 93 University of New Mexico Otimal Design of Truss Structures Using a Neutrosohic Number Otimization Model under an Indeterminate Environment Wenzhong Jiang & Jun

More information

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

Probability Estimates for Multi-class Classification by Pairwise Coupling

Probability Estimates for Multi-class Classification by Pairwise Coupling Probability Estimates for Multi-class Classification by Pairwise Couling Ting-Fan Wu Chih-Jen Lin Deartment of Comuter Science National Taiwan University Taiei 06, Taiwan Ruby C. Weng Deartment of Statistics

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

Cryptanalysis of Pseudorandom Generators

Cryptanalysis of Pseudorandom Generators CSE 206A: Lattice Algorithms and Alications Fall 2017 Crytanalysis of Pseudorandom Generators Instructor: Daniele Micciancio UCSD CSE As a motivating alication for the study of lattice in crytograhy we

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

An Analysis of TCP over Random Access Satellite Links

An Analysis of TCP over Random Access Satellite Links An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Sums of independent random variables

Sums of independent random variables 3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where

More information

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Asymptotically Optimal Simulation Allocation under Dependent Sampling Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee

More information

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th

1 1 c (a) 1 (b) 1 Figure 1: (a) First ath followed by salesman in the stris method. (b) Alternative ath. 4. D = distance travelled closing the loo. Th 18.415/6.854 Advanced Algorithms ovember 7, 1996 Euclidean TSP (art I) Lecturer: Michel X. Goemans MIT These notes are based on scribe notes by Marios Paaefthymiou and Mike Klugerman. 1 Euclidean TSP Consider

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

On the Chvatál-Complexity of Knapsack Problems

On the Chvatál-Complexity of Knapsack Problems R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

Use of Transformations and the Repeated Statement in PROC GLM in SAS Ed Stanek

Use of Transformations and the Repeated Statement in PROC GLM in SAS Ed Stanek Use of Transformations and the Reeated Statement in PROC GLM in SAS Ed Stanek Introduction We describe how the Reeated Statement in PROC GLM in SAS transforms the data to rovide tests of hyotheses of interest.

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

Convexification of Generalized Network Flow Problem with Application to Power Systems

Convexification of Generalized Network Flow Problem with Application to Power Systems 1 Convexification of Generalized Network Flow Problem with Alication to Power Systems Somayeh Sojoudi and Javad Lavaei + Deartment of Comuting and Mathematical Sciences, California Institute of Technology

More information

arxiv: v1 [cs.lg] 31 Jul 2014

arxiv: v1 [cs.lg] 31 Jul 2014 Learning Nash Equilibria in Congestion Games Walid Krichene Benjamin Drighès Alexandre M. Bayen arxiv:408.007v [cs.lg] 3 Jul 204 Abstract We study the reeated congestion game, in which multile oulations

More information

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem Combinatorics of tomost discs of multi-eg Tower of Hanoi roblem Sandi Klavžar Deartment of Mathematics, PEF, Unversity of Maribor Koroška cesta 160, 000 Maribor, Slovenia Uroš Milutinović Deartment of

More information

An Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem

An Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem An Ant Colony Otimization Aroach to the Probabilistic Traveling Salesman Problem Leonora Bianchi 1, Luca Maria Gambardella 1, and Marco Dorigo 2 1 IDSIA, Strada Cantonale Galleria 2, CH-6928 Manno, Switzerland

More information

MA3H1 TOPICS IN NUMBER THEORY PART III

MA3H1 TOPICS IN NUMBER THEORY PART III MA3H1 TOPICS IN NUMBER THEORY PART III SAMIR SIKSEK 1. Congruences Modulo m In quadratic recirocity we studied congruences of the form x 2 a (mod ). We now turn our attention to situations where is relaced

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

Statics and dynamics: some elementary concepts

Statics and dynamics: some elementary concepts 1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and

More information

The Fekete Szegő theorem with splitting conditions: Part I

The Fekete Szegő theorem with splitting conditions: Part I ACTA ARITHMETICA XCIII.2 (2000) The Fekete Szegő theorem with slitting conditions: Part I by Robert Rumely (Athens, GA) A classical theorem of Fekete and Szegő [4] says that if E is a comact set in the

More information

Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle

Notes on duality in second order and -order cone otimization E. D. Andersen Λ, C. Roos y, and T. Terlaky z Aril 6, 000 Abstract Recently, the so-calle McMaster University Advanced Otimization Laboratory Title: Notes on duality in second order and -order cone otimization Author: Erling D. Andersen, Cornelis Roos and Tamás Terlaky AdvOl-Reort No. 000/8

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

CMSC 425: Lecture 4 Geometry and Geometric Programming

CMSC 425: Lecture 4 Geometry and Geometric Programming CMSC 425: Lecture 4 Geometry and Geometric Programming Geometry for Game Programming and Grahics: For the next few lectures, we will discuss some of the basic elements of geometry. There are many areas

More information

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation Paer C Exact Volume Balance Versus Exact Mass Balance in Comositional Reservoir Simulation Submitted to Comutational Geosciences, December 2005. Exact Volume Balance Versus Exact Mass Balance in Comositional

More information

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and

More information

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction

GOOD MODELS FOR CUBIC SURFACES. 1. Introduction GOOD MODELS FOR CUBIC SURFACES ANDREAS-STEPHAN ELSENHANS Abstract. This article describes an algorithm for finding a model of a hyersurface with small coefficients. It is shown that the aroach works in

More information

General Linear Model Introduction, Classes of Linear models and Estimation

General Linear Model Introduction, Classes of Linear models and Estimation Stat 740 General Linear Model Introduction, Classes of Linear models and Estimation An aim of scientific enquiry: To describe or to discover relationshis among events (variables) in the controlled (laboratory)

More information

Real Analysis 1 Fall Homework 3. a n.

Real Analysis 1 Fall Homework 3. a n. eal Analysis Fall 06 Homework 3. Let and consider the measure sace N, P, µ, where µ is counting measure. That is, if N, then µ equals the number of elements in if is finite; µ = otherwise. One usually

More information

LECTURE 7 NOTES. x n. d x if. E [g(x n )] E [g(x)]

LECTURE 7 NOTES. x n. d x if. E [g(x n )] E [g(x)] LECTURE 7 NOTES 1. Convergence of random variables. Before delving into the large samle roerties of the MLE, we review some concets from large samle theory. 1. Convergence in robability: x n x if, for

More information

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels oname manuscrit o. will be inserted by the editor) Quantitative estimates of roagation of chaos for stochastic systems with W, kernels Pierre-Emmanuel Jabin Zhenfu Wang Received: date / Acceted: date Abstract

More information

where x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H:

where x i is the ith coordinate of x R N. 1. Show that the following upper bound holds for the growth function of H: Mehryar Mohri Foundations of Machine Learning Courant Institute of Mathematical Sciences Homework assignment 2 October 25, 2017 Due: November 08, 2017 A. Growth function Growth function of stum functions.

More information

Applications to stochastic PDE

Applications to stochastic PDE 15 Alications to stochastic PE In this final lecture we resent some alications of the theory develoed in this course to stochastic artial differential equations. We concentrate on two secific examles:

More information

p-adic Measures and Bernoulli Numbers

p-adic Measures and Bernoulli Numbers -Adic Measures and Bernoulli Numbers Adam Bowers Introduction The constants B k in the Taylor series exansion t e t = t k B k k! k=0 are known as the Bernoulli numbers. The first few are,, 6, 0, 30, 0,

More information

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment

More information

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1)

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1) CERTAIN CLASSES OF FINITE SUMS THAT INVOLVE GENERALIZED FIBONACCI AND LUCAS NUMBERS The beautiful identity R.S. Melham Deartment of Mathematical Sciences, University of Technology, Sydney PO Box 23, Broadway,

More information

ON THE NORM OF AN IDEMPOTENT SCHUR MULTIPLIER ON THE SCHATTEN CLASS

ON THE NORM OF AN IDEMPOTENT SCHUR MULTIPLIER ON THE SCHATTEN CLASS PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Volume 00, Number 0, Pages 000 000 S 000-9939XX)0000-0 ON THE NORM OF AN IDEMPOTENT SCHUR MULTIPLIER ON THE SCHATTEN CLASS WILLIAM D. BANKS AND ASMA HARCHARRAS

More information

Approximate Dynamic Programming for Dynamic Capacity Allocation with Multiple Priority Levels

Approximate Dynamic Programming for Dynamic Capacity Allocation with Multiple Priority Levels Aroximate Dynamic Programming for Dynamic Caacity Allocation with Multile Priority Levels Alexander Erdelyi School of Oerations Research and Information Engineering, Cornell University, Ithaca, NY 14853,

More information

Age of Information: Whittle Index for Scheduling Stochastic Arrivals

Age of Information: Whittle Index for Scheduling Stochastic Arrivals Age of Information: Whittle Index for Scheduling Stochastic Arrivals Yu-Pin Hsu Deartment of Communication Engineering National Taiei University yuinhsu@mail.ntu.edu.tw arxiv:80.03422v2 [math.oc] 7 Ar

More information

HENSEL S LEMMA KEITH CONRAD

HENSEL S LEMMA KEITH CONRAD HENSEL S LEMMA KEITH CONRAD 1. Introduction In the -adic integers, congruences are aroximations: for a and b in Z, a b mod n is the same as a b 1/ n. Turning information modulo one ower of into similar

More information

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018 Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

Finding a sparse vector in a subspace: linear sparsity using alternating directions

Finding a sparse vector in a subspace: linear sparsity using alternating directions IEEE TRANSACTION ON INFORMATION THEORY VOL XX NO XX 06 Finding a sarse vector in a subsace: linear sarsity using alternating directions Qing Qu Student Member IEEE Ju Sun Student Member IEEE and John Wright

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

Beyond Worst-Case Reconstruction in Deterministic Compressed Sensing

Beyond Worst-Case Reconstruction in Deterministic Compressed Sensing Beyond Worst-Case Reconstruction in Deterministic Comressed Sensing Sina Jafarour, ember, IEEE, arco F Duarte, ember, IEEE, and Robert Calderbank, Fellow, IEEE Abstract The role of random measurement in

More information

Availability and Maintainability. Piero Baraldi

Availability and Maintainability. Piero Baraldi Availability and Maintainability 1 Introduction: reliability and availability System tyes Non maintained systems: they cannot be reaired after a failure (a telecommunication satellite, a F1 engine, a vessel

More information

Additive results for the generalized Drazin inverse in a Banach algebra

Additive results for the generalized Drazin inverse in a Banach algebra Additive results for the generalized Drazin inverse in a Banach algebra Dragana S. Cvetković-Ilić Dragan S. Djordjević and Yimin Wei* Abstract In this aer we investigate additive roerties of the generalized

More information

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating

More information

An Improved Calibration Method for a Chopped Pyrgeometer

An Improved Calibration Method for a Chopped Pyrgeometer 96 JOURNAL OF ATMOSPHERIC AND OCEANIC TECHNOLOGY VOLUME 17 An Imroved Calibration Method for a Choed Pyrgeometer FRIEDRICH FERGG OtoLab, Ingenieurbüro, Munich, Germany PETER WENDLING Deutsches Forschungszentrum

More information

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm Gabriel Noriega, José Restreo, Víctor Guzmán, Maribel Giménez and José Aller Universidad Simón Bolívar Valle de Sartenejas,

More information

Session 5: Review of Classical Astrodynamics

Session 5: Review of Classical Astrodynamics Session 5: Review of Classical Astrodynamics In revious lectures we described in detail the rocess to find the otimal secific imulse for a articular situation. Among the mission requirements that serve

More information

arxiv: v2 [math.na] 6 Apr 2016

arxiv: v2 [math.na] 6 Apr 2016 Existence and otimality of strong stability reserving linear multiste methods: a duality-based aroach arxiv:504.03930v [math.na] 6 Ar 06 Adrián Németh January 9, 08 Abstract David I. Ketcheson We rove

More information

Extension of Minimax to Infinite Matrices

Extension of Minimax to Infinite Matrices Extension of Minimax to Infinite Matrices Chris Calabro June 21, 2004 Abstract Von Neumann s minimax theorem is tyically alied to a finite ayoff matrix A R m n. Here we show that (i) if m, n are both inite,

More information

Scaling Multiple Point Statistics for Non-Stationary Geostatistical Modeling

Scaling Multiple Point Statistics for Non-Stationary Geostatistical Modeling Scaling Multile Point Statistics or Non-Stationary Geostatistical Modeling Julián M. Ortiz, Steven Lyster and Clayton V. Deutsch Centre or Comutational Geostatistics Deartment o Civil & Environmental Engineering

More information

Lilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3

Lilian Markenzon 1, Nair Maria Maia de Abreu 2* and Luciana Lee 3 Pesquisa Oeracional (2013) 33(1): 123-132 2013 Brazilian Oerations Research Society Printed version ISSN 0101-7438 / Online version ISSN 1678-5142 www.scielo.br/oe SOME RESULTS ABOUT THE CONNECTIVITY OF

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle]

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle] Chater 5 Model checking, verification of CTL One must verify or exel... doubts, and convert them into the certainty of YES or NO. [Thomas Carlyle] 5. The verification setting Page 66 We introduce linear

More information

A Network-Flow Based Cell Sizing Algorithm

A Network-Flow Based Cell Sizing Algorithm A Networ-Flow Based Cell Sizing Algorithm Huan Ren and Shantanu Dutt Det. of ECE, University of Illinois-Chicago Abstract We roose a networ flow based algorithm for the area-constrained timing-driven discrete

More information

A Closed-Form Solution to the Minimum V 2

A Closed-Form Solution to the Minimum V 2 Celestial Mechanics and Dynamical Astronomy manuscrit No. (will be inserted by the editor) Martín Avendaño Daniele Mortari A Closed-Form Solution to the Minimum V tot Lambert s Problem Received: Month

More information

STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS. A Dissertation JAMES ROBERT FISHER

STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS. A Dissertation JAMES ROBERT FISHER STABILITY ANALYSIS AND CONTROL OF STOCHASTIC DYNAMIC SYSTEMS USING POLYNOMIAL CHAOS A Dissertation by JAMES ROBERT FISHER Submitted to the Office of Graduate Studies of Texas A&M University in artial fulfillment

More information

Hidden Predictors: A Factor Analysis Primer

Hidden Predictors: A Factor Analysis Primer Hidden Predictors: A Factor Analysis Primer Ryan C Sanchez Western Washington University Factor Analysis is a owerful statistical method in the modern research sychologist s toolbag When used roerly, factor

More information

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

Some results of convex programming complexity

Some results of convex programming complexity 2012c12 $ Ê Æ Æ 116ò 14Ï Dec., 2012 Oerations Research Transactions Vol.16 No.4 Some results of convex rogramming comlexity LOU Ye 1,2 GAO Yuetian 1 Abstract Recently a number of aers were written that

More information

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes Infinite Series 6.2 Introduction We extend the concet of a finite series, met in Section 6., to the situation in which the number of terms increase without bound. We define what is meant by an infinite

More information

An efficient method for generalized linear multiplicative programming problem with multiplicative constraints

An efficient method for generalized linear multiplicative programming problem with multiplicative constraints DOI 0.86/s40064-06-2984-9 RESEARCH An efficient method for generalized linear multilicative rogramming roblem with multilicative constraints Yingfeng Zhao,2* and Sanyang Liu Oen Access *Corresondence:

More information

Stochastic integration II: the Itô integral

Stochastic integration II: the Itô integral 13 Stochastic integration II: the Itô integral We have seen in Lecture 6 how to integrate functions Φ : (, ) L (H, E) with resect to an H-cylindrical Brownian motion W H. In this lecture we address the

More information

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES

IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES IMPROVED BOUNDS IN THE SCALED ENFLO TYPE INEQUALITY FOR BANACH SPACES OHAD GILADI AND ASSAF NAOR Abstract. It is shown that if (, ) is a Banach sace with Rademacher tye 1 then for every n N there exists

More information

Numerical Linear Algebra

Numerical Linear Algebra Numerical Linear Algebra Numerous alications in statistics, articularly in the fitting of linear models. Notation and conventions: Elements of a matrix A are denoted by a ij, where i indexes the rows and

More information

Automatic Generation and Integration of Equations of Motion for Linked Mechanical Systems

Automatic Generation and Integration of Equations of Motion for Linked Mechanical Systems Automatic Generation and Integration of Equations of Motion for Linked Mechanical Systems D. Todd Griffith a, John L. Junkins a, and James D. Turner b a Deartment of Aerosace Engineering, Texas A&M University,

More information

A generalization of Amdahl's law and relative conditions of parallelism

A generalization of Amdahl's law and relative conditions of parallelism A generalization of Amdahl's law and relative conditions of arallelism Author: Gianluca Argentini, New Technologies and Models, Riello Grou, Legnago (VR), Italy. E-mail: gianluca.argentini@riellogrou.com

More information

Topic 7: Using identity types

Topic 7: Using identity types Toic 7: Using identity tyes June 10, 2014 Now we would like to learn how to use identity tyes and how to do some actual mathematics with them. By now we have essentially introduced all inference rules

More information

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., DECEMBER 4 336 Some Unitary Sace Time Codes From Shere Packing Theory With Otimal Diversity Product of Code Size Haiquan Wang, Genyuan Wang, and Xiang-Gen

More information

Brownian Motion and Random Prime Factorization

Brownian Motion and Random Prime Factorization Brownian Motion and Random Prime Factorization Kendrick Tang June 4, 202 Contents Introduction 2 2 Brownian Motion 2 2. Develoing Brownian Motion.................... 2 2.. Measure Saces and Borel Sigma-Algebras.........

More information

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes

16.2. Infinite Series. Introduction. Prerequisites. Learning Outcomes Infinite Series 6. Introduction We extend the concet of a finite series, met in section, to the situation in which the number of terms increase without bound. We define what is meant by an infinite series

More information

Introduction to Banach Spaces

Introduction to Banach Spaces CHAPTER 8 Introduction to Banach Saces 1. Uniform and Absolute Convergence As a rearation we begin by reviewing some familiar roerties of Cauchy sequences and uniform limits in the setting of metric saces.

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

A Social Welfare Optimal Sequential Allocation Procedure

A Social Welfare Optimal Sequential Allocation Procedure A Social Welfare Otimal Sequential Allocation Procedure Thomas Kalinowsi Universität Rostoc, Germany Nina Narodytsa and Toby Walsh NICTA and UNSW, Australia May 2, 201 Abstract We consider a simle sequential

More information

Minimax Design of Nonnegative Finite Impulse Response Filters

Minimax Design of Nonnegative Finite Impulse Response Filters Minimax Design of Nonnegative Finite Imulse Resonse Filters Xiaoing Lai, Anke Xue Institute of Information and Control Hangzhou Dianzi University Hangzhou, 3118 China e-mail: laix@hdu.edu.cn; akxue@hdu.edu.cn

More information

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

Factorability in the ring Z[ 5]

Factorability in the ring Z[ 5] University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Dissertations, Theses, and Student Research Paers in Mathematics Mathematics, Deartment of 4-2004 Factorability in the ring

More information