Feasibility and Optimization of Delay Guarantees for Non-homogeneous Flows in IEEE WLANs

Size: px
Start display at page:

Download "Feasibility and Optimization of Delay Guarantees for Non-homogeneous Flows in IEEE WLANs"

Transcription

1 Feasblty and Optmzaton of Delay Guarantees for Non-homogeneous Flows n IEEE 8. WLANs Yan Gao,CheeWeTan, Yng Huang, Zheng Zeng,P.R.Kumar Department of Computer Scence & CSL, Unversty of Illnos at Urbana-Champagn Department of Computer Scence, Cty Unversty of Hong Kong Department of Computer Scence, Unversty of Illnos at Urbana-Champagn Abstract Due to the rapd growth of real-tme applcatons and the ubquty of IEEE 8. MAC as a layer- protocol for wreless local area networks (WLANs, t s of ncreasng nterest to support qualty of servce (QoS n such WLANs. In ths paper, we develop a smple but accurate enough analytcal model for predctng queueng delay n non-homogeneous random access based WLANs. Ths leads to tractable solutons for meetng queueng delay specfcatons of a number of flows. Usng ths model, we address the feasblty problem of whether the mean delays requred by a set of nelastc flows can be guaranteed n WLANs. Based on the model and feasblty analyss, we further develop an optmzaton technque to mnmze the delays for nelastc flows. We present extensve smulaton results to demonstrate the accuracy of our model and the performance of the algorthms. I. INTRODUCTION The recent rapd growth of real tme applcatons has led to a strong need to provde qualty of servce (QoS for moble computers and portable devces n wreless local area networks (WLANs. Ths has to be supported over the IEEE 8. snce t has ganed wdespread popularty and become the de facto WLAN standard. However, the mechansms employed n the IEEE 8. MAC, namely random access and the dstrbuted coordnaton functon (DCF, render t substantally more dffcult to ensure delay guarantees because of the channel contenton and the random back-off mechansm. Therefore, as the frst task confrontng researchers n ths feld, t s necessary to characterze the delays n such networks. Second, t s mportant to devse solutons that provde the requred delay performance. We address both ssues n ths paper. Exstng studes on the performance analyss of the IEEE 8. MAC have focused on ts throughput capacty n networks wth saturated traffc; see Banch [], Cal, Cont, and Gregor []. In [], a dscrete-tme M/Geo/ queueng analyss under network saturaton s studed. Models for unsaturated homogeneous networks have also been reported. For example, Medepall and Tobag [4] present a unfed model for multhop networks that approxmates each queue by an ndependent M/M/ queue. However, ths approxmaton s not accurate for Ths materal s based upon work partally supported by NSF under Contracts CNS-578, CCF-997, CNS-9597, CNS-54, USARO under Contract Nos. W9NF-8--8 and W9NF-7-87, AFOSR under Contract FA955-9-, and CtyU Project detaled delay analyss n WLAN. Tkoo and Skdar [5] present a G/G/ queueng model for delay analyss n homogeneous networks. Ther focus s on performance analyss of the standard IEEE 8. DCF. Varous studes have also been conducted on provdng QoS support n WLANs, and most use centralzed pollng technques based on the pont coordnaton functon (PCF. For example, Coutras, Gupta and Shroff [6] analyze the performance of PCF n support of voce servces. However, they do not address the fact that both best-effort traffc and real-tme traffc coexst n WLANs, and IEEE 8. DCF s the de facto settng used n most WLANs. Provdng QoS requres networks to support servce dfferentaton under non-homogeneous traffc dynamcs. Networks should also reallocate lmted resources from the over-provsoned flows to the under-provsoned flows. IEEE 8.e has been proposed to enhance the orgnal standard to support QoS. However, IEEE 8.e classfes flows only by ther applcatons (e.g., voce, vdeo, etc. and provdes the same servce to flows that fall n the same class. Moreover, t only dfferentates prorty among flows, but does not actually provde delay guarantees. A non-homogeneous and adaptve WLAN s hghly preferred over one that operates n a fxed homogeneous manner. However, an accurate model of nonhomogeneous flows n random access WLANs, especally ther delay characterzaton, s stll elusve. We develop a smple but suffcently accurate analytcal model based on an M/G/ queue for non-homogeneous unsaturated IEEE 8. networks. We characterze the channel access delay wth respect to the contenton wndow and the probablty that the queue s nonempty. The latter n turn depends on the channel access delay. Both ths probablty of beng non-empty and the access delay can be jontly obtaned by solvng a coupled system of nonlnear equatons through a fxed pont teraton wth a carefully chosen ntal pont so that t converges to a fxed pont. Moreover, we show that n random access networks, the second moment of the access delay s determned only by ts frst moment f the packet sze s suffcently large. Ths approxmaton smplfes the formula of the queueng delay. Thereby, we analytcally determne whether the network can provde the delay guarantees requred by the QoS flows. The contrbutons of the paper are summarzed as follows:

2 We derve a smple but accurate model for queueng delay n non-homogeneous IEEE 8. MAC based networks. We use t to determne the feasblty of usng a random-access based WLAN to serve a set of real-tme flows wth mean delay requrements. We provde characterzaton of the average delay and access rate, and propose fxed pont algorthms to compute them. A lnear system approxmaton s derved to complement the analyss. We provde an algorthm to mnmze the delays for a set of nelastc flows whle meetng mean delay requrements. 4 We valdate our algorthm to provde performance guarantees through extensve NS- smulatons. We motvate the non-homogeneous IEEE 8. flows problem n Secton II. In Secton III, we characterze the channel access delay and queueng delay. In Secton IV, we study fxed pont teratons related to the queueng model. We show how to optmze the delay performance n Secton V. Numercal results are gven n Secton VI. II. PROBLEM STATEMENT A. Non-homogeneous IEEE 8. network In IEEE 8. DCF networks, each node wth a packet to transmt randomly selects a back-off tmer BC from [,CW ], where CW denotes the contenton wndow. If the channel s sensed dle, these nodes decrement ther tmers untl one of them expres. Then that node attempts to access the channel and the remanng nodes pause ther tmers. The count-down resumes when the channel s dle agan. If more than one node attempts n the same slot, a collson occurs. A collded transmsson s retred up to a retransmsson lmt before t s dscarded. In the standard IEEE 8. network, the contenton wndow of each node s set to be the same. Ths homogeneous or unform settng works well for best-effort traffc where farness s to be taken nto account. However, the ncreasng need to support heterogeneous QoS requrements of dfferent flows requres networks to have the ablty to provde servce dfferentaton to real-tme flows. We consder a WLAN wth nodes that are capable of changng the backoff parameters by tunng only the contenton wndow CW. Thus, our scheme s IEEE 8. standardscompatble. We analytcally show that CW alone can effectvely be used for resource allocaton and performance dfferentaton. B. Soft Deadlne We are nterested n the soft deadlne that s the mean delay of a flow. Soft-deadlne guarantees are mportant for several real-tme applcatons such as voce over IP, onlne games and IP-TV, snce they often requre a fxed bt rate but are senstve to mean delays. We now formulate the problem. Consder a WLAN where N nodes are actve and each has a QoS flow to the access pont (AP. These flows dffer n rate and delay requrements. Assume that for each node the packet arrvals form a Posson process and the nter-arrval tme s exponentally dstrbuted wth mean /λ. Note that the Posson arrval model has been used n the lterature, e.g. []. Let λ =[λ,λ,..., λ N ] T be the arrval rate vector. Addtonally, each flow has a soft deadlne D to meet. The average queueng delay of the packet for flow s requred to be less than D. Let D =[D,D,..., D N ] T denote the target delay vector. Gven both λ and D, the queston we address s the followng: Does there exst an assgnment of contenton wndows CW = [CW,CW,..., CW n ] T such that all deadlnes are met? Ths queston s especally mportant for admsson control, whch needs to decde whether t s feasble to accommodate a new flow n the network wthout hurtng the performance of hgh prorty flows (.e., the already exstng flows. Furthermore, f t s ndeed feasble, to acheve all these mean delays, then how should one assgn CW for each node? We provde analyss to answer these two key questons n the followng. III. ANALYTICAL MODEL OF NON-HOMOGENEOUS IEEE 8. NETWORK A. Meda Access Delay We now analytcally address the meda access delay of a non-homogenous WLAN. We do not employ the exponental back-off algorthm mplemented n the standard protocol because our standalone scheme conssts of choosng a fx contenton wndow for each flow so as to meet ts mean delay. Imposng the redundant CW adjustment mechansm, e.g., exponental back-off algorthm, s an unnecessary layer of adaptaton that s not needed n our scheme. We note that smlar approaches have been adopted n the lterature. The schemes proposed n [7], [8] dsable the exponental backoff, and drectly adjust the contenton wndow. However, ther goal s to maxmze the throughput, whle ours s to provde the delay guarantees for heterogeneous flows. We consder an access rate for node that s equal to /CW. Ths corresponds to IEEE 8. DCF wth BC chosen randomly from [,CW ] [], [], [7], [9]. Snce our flows are not saturated, queues may be empty,.e., they do not transmt any packet. Let NE denote the event queue not empty and E denote the event queue empty. Then, the uncondtonal channel access (CA probablty of node s P[CA] =P[CA E]P[E]+P[CA NE]P[NE]. It s obvous that P[CA E] s equal to zero because the node has no packet to transmt when empty. We next approxmate P[CA NE] by CW, whch s only an approxmaton when the random backoff s chosen unformly wthn [,CW ], buts not an approxmaton f t s attempted after an exponentally dstrbuted nterval. Denotng p = /CW, and ρ as the probablty that the queue s not empty, we have P[CA] = ρ = ρ p. ( CW Let p be the vector [p,p,..., p N ] T, notng that p. Lkewse, ρ := [ρ,ρ,...,ρ N ] T. Now, we compute the probablty PI that the channel s dle when node has a packet to send, the probablty PS

3 that the channel s successfully carryng a packet of node, and the probablty PO that node sees the channel as busy though node does not transmt a packet successfully. Note that PI + P S + P O =for all. All these quanttes are to be computed as a functon of the vector p. Note that node competes for channel access only when t has a packet to transmt. Under ths condton, node fnds the channel dle n a tme slot f t does not attempt and no other node attempts at the begnnng of ths slot. Hence, N PI =( p ( ρ j p j. ( Node successfully transmts a packet f t attempts, and no other node attempts n the same slot. Ths probablty s N PS = p ( ρ j p j. ( Otherwse, node sees the channel occuped by other actvtes, consstng of successful transmssons of other nodes or collded transmssons. Note that the collded transmssons consst of both the transmssons nvolvng node as well as those not nvolvng node. Thus, we have N PO = PI PS = ( ρ j p j. (4 Defne the servce tme x of a packet (also referred to as channel access delay here as the tme from the nstant the packet reaches the head of the queue n the node tll the nstant t successfully departs from the queue. Ths servce tme ncludes two parts, namely the channel contenton delay and the packet transmsson tme. For smplcty, we assume that all packets are of the same sze and all nodes adopt the same bt rate to transmt. Thus, they have the same packet transmsson artme denoted by T. More precsely, n the IEEE 8. network, a packet transmsson artme s gven by T :=DIFS+PACKET+SIFS+ACK, (5 where DIFS denotes the duraton of the dstrbuted nterframe space, PACKET denotes the transmsson tme of a data packet, SIFS denotes the duraton of the short nterframe space, and ACK denotes the transmsson tme of an acknowledgement. There are two access modes used n IEEE 8. DCF, namely the basc access mode and the RTS/CTS access mode. In ths paper, we model the system only for the basc access mode. The RTS/CTS access mode s usually dsabled n practce due to ts large overhead. In the basc access mode, a collson s detected when a node does not receve an ACK wthn an ACK-tmeout perod. The ACK-tmeout s defned to be the tme to transmt an ACK frame plus SIFS. Thus, we assume that the artme spent on a collded transmsson s the same n duraton as that of a successful transmsson. We denote a slot-tme duraton by τ. Let t k denote the tme nstant when the k-th dle slot begns,.e., the nstant that the channel s dle at the begnnng of the correspondng slot. There are two possble events followng ths nstant: a the channel contnues to be dle for a duraton of τ untl the next dle slot begns; b at least one of the nodes attempts to transmt n ths slot, whch results n a T tme unt channelbusy perod. We assume that the ntervals S (k =t k+ t k are ndependent and dentcally dstrbuted random varables and refer to these ntervals as vrtual slots. Assume that the tme nterval from the tme the packet reaches the head of the queue at node to the tme t starts to depart from the queue conssts of K vrtual slots, where K s a random varable ndependent of S. Its dstrbuton s gven by P[K = n] =( PS n PS for n =,,,... (6 It follows that E[K ]=PS n( PS n = P S P. (7 n= S For node, ts servce tme s therefore K x = S (k+t, (8 k= where the S (k are Bernoull random varables that are ether equal to τ f the channel s dle or equal to T f a transmsson of a node other than occurs: P τ wth probablty I S (k = T Then, we have wth probablty PS P O. PS E[S ]= P I τ + P O T PS. ( One can see that both E[S ] < and E[K ] <. Fromthe ndependence of S and K, we can apply Wald s equaton [] to obtan X := E[x ] = E[K ]E[S ]+T. ( Substtutng (7 and ( nto ( gves X = P I τ + P O T PS + T. ( Note that ( captures an nterestng relatonshp between the expected servce tme and the access rate n CSMA-based random access WLAN. Snce the network s unsaturated, we need to determne the probablty ρ that the queue s nonempty. However, snce each node s an M/G/ queue, we have ρ = λ X. ( Substtutng ( nto (, we have N equatons wth N unknowns [x,x,,x N ]. Solvng ths N dmensonal vector fxed pont problem gves us the servce tmes for the nonhomogeneous random access flows. We summarze ths relatonshp that allows us to compute the mean servce tmes for non-homogeneous random access WLANs: Gven the contenton wndows CW, the mean servce tmes are gven by (, where PI, P S and P O are gven by (,,4, wth p defned by (. The quanttes ρ s n ( satsfy (. (9

4 B. Queueng Delay In the prevous secton, we have derved an analytcal model that can be used to compute the servce tme f the access rates of all nodes are gven va ther contenton wndows. Snce many real-tme applcatons such as onlne games, VoIP and IPTV requre strct lmts on jtter and mean delay, n ths secton, we study how the non-homogeneous contenton wndow settngs and the non-homogeneous throughput requrements jontly affect the average queueng delay. Defne the queueng delay of a packet to be the tme from the nstant that the packet arrves at the queue to the nstant that the packet successfully departs from the queue. The average queue sze of the M/G/ queue s gven by []: E[Q ]=λ X + λ E[x ] ( λ X, (4 where Q denotes the queue sze and E[x ] s the second moment of the servce tme. Usng Lttle s law, the average queueng delay Y s Y = E[Q ] = X + λ E[x ] λ ( λ X. (5 To determne the average queueng delay (5, we need to determne the second moment of the servce tmes. In (8, we have characterzed the servce tme x by a sequence of vrtual slots S plus a transmsson artme T. Takng squares on both sdes of (8, we have K x =( S [k]+t k= K K k K = S [k]+ S [k]s [l]+t S [k]+t. k= k= l= k= Applyng Wald s equaton agan, we get E[x ]=E[K ]E[S ]+E[K K ]E [S ] +TE[K ]E[S ]+T. Usng the dstrbuton of S n (9, we compute (6 (7 E[S ]= τ PI + T PO PS. (8 To determne E[K K ], we frst obtan the moment generatng functon of K from (6 as follows: M K (B = B n ( PS n P PS S = ( P. (9 n= S B It s easy to verfy that d M K (B d B B= = n(n B n ( PS n PS B= = n= n(n ( PS n PS = E[K K ]. n= Hence, from (9 and (, we get ( E[K K ]= ( P S (P S. ( Thus, substtutng (7, (, ( and (8 nto (7, we get the second moment of the servce tme for node as follows: E[x ]= τ P I + T P O P S + (τp I + TP O (P S ( +T τp I + TP O PS + T. Substtutng ( and ( nto (5, we therefore obtan the average queueng delay wth respect to vector p. Queueng delays as a functon of contenton wndows Y (p: Consder a non-homogeneous random access WLAN wth contenton wndows CW and packet transmsson tme T. Then the average queueng delay s gven by (5, where E[x ] s gven by (, E[x ] s gven by (, P I, P S and PO are gven by (,,4, and ρ =[ρ,ρ,,ρ N ] T s a fxed pont of (. C. Queueng Delay and Channel Access Delay Substtutng ( nto (, we have E[x ] = (X T +T (X T +T + P I τ + PO T PI τ + P O T (X T. ( Snce lm τ E[x ]=(X T +T (X T +T + T (X T, f we assume that the packet transmsson artme T s suffcently large compared to slot-tme τ, then we get a smplfed formula for E[x ] as follows: E[x ]=(X T X. (4 Note that (4 mples that the second moment of x s determned by ts frst moment only. Ths demonstrates an nterestng property nherent n the random access mechansm. Therefore, the average delay s Y = ( λ T X ( λ X. (5 Now, (5 s equvalent to Y X =. (6 λ T +λ Y Note that (6 captures an mportant property: The mean queueng delay n a random access network s determned only by the mean channel access delay. IV. ANALYSIS OF FIXED-POINT PROBLEMS A. Nonlnear Characterzaton of Delay and Access Rate We have shown that when the transmsson artme T s suffcently large compared to the slot-tme τ, the queueng delay Y s determned by X. Thus, we need to characterze X,.e., to analyze (. Based on (, we derve a set of fxed pont equatons: T p X +( p (T τ = ( λ. (7 jx j p j There are two problems of nterest, namely analyss and desgn. We now express the fxed pont problems of both problems n the form of (7. The analyss or performance

5 evaluaton (PE problem conssts of determnng the delay, gven the access rates. The desgn or access rate assgnment (ARA problem s the reverse; t conssts of determnng the access rates for the flows so as to meet all the delay constrants. Performance Evaluaton (PE: We fx the access rate p, and evaluate the channel access delay X. For node, ts delay can be wrtten as X = I PE (X T := p ( λ jx j p j ( p (T τ (8. p We denote by X a fxed pont of (8, assumng one exsts. We consder the followng fxed pont teraton to solve (8: X(k +=I PE (X(k. (9 From a protocol desgner s vewpont, t s nstead more nterestng to compute the access rate assgnment such that all the flows meet ther requred delays: Access Rate Assgnment (ARA: We want to adjust the access rate p such that all the delays X are fulflled. For node, the access rate s gven by p = I ARA (p := T (X T + τ ( λ jx j p j T τ X T + τ. ( We denote by p a fxed pont of (, assumng one exsts. We consder the followng fxed pont teraton to solve (: p(k +=I ARA (p(k. ( B. Lnear System Approxmaton Note that λ X p < for all f the system s stable. Now, usng the fact that /( z +z for nonnegatve z<, we can lower bound the RHS of (7 by an affne expresson. In partcular, we have p X +( p (T τ T ( + λ j X j p j. ( Note that we can approxmate the nequalty n ( by an equalty f we assume small p X for all, and apply Taylor s expanson theorem to the RHS of (7. Ths leads us to consder the followng fxed pont equaton: p X λ j Tp j X j = p T +( p τ. ( Now, we can consder two dfferent lnear fxed pont equatons n the form of (: One n terms of X for performance evaluaton assumng fxed p, and the other n terms of p for access rate assgnment assumng fxed X. The followng results show that each of these two lnear fxed pont teratons has a unque soluton. Theorem 4.: If [p,p,..., p N ] T are gven, ( has a unque soluton for [ X, X,..., X N ] T. Proof: Let y denote the vector [p X,p X,,p N XN ] T and b denote the vector [p T +( p τ,p T +( p τ,,p N T +( p N τ] T. Then we represent ( by y = F y + b, (4 where F s an rreducble nonnegatve matrx wth entres: {, f l = j F lj = (5 λ T, f l = j. We now apply nonnegatve matrx theory to characterze the soluton to (4. Let Λ A denotes the spectral radus of a nonnegatve matrx A. By the Collatz-Welandt theorem (see, e.g., [], Λ F max λ j T< λ T<, (6 where the last nequalty follows from the necessary condton that the M/G/ system s stable only f the workload s strctly less than,.e., λ T <. Next, we state the followng result from []. Lemma 4.: A necessary and suffcent condton for a soluton z, z = to exst to the equatons (I Az = c, for any c, c = s that Λ A <. In ths case there s only one soluton z, whch s strctly postve and gven by z =(I A c. Applyng Lemma 4. to (4, ths mples (I F b has a unque postve soluton. Ths proves the theorem. Lemma 4.: Assume X s gven. If p s the fxed pont of (, and p s the fxed pont of (7, then we have, component wse, p < p. Proof: Suppose the followng holds: p X +( p (T τ =T ( + λ j X j p j, (7 p X +( p T (T τ = ( λ jx j p. (8 j For each, we subtract (7 from (8 to obtan (X T + τ(p p T = ( λ jx j p j T ( + λ j X j p j >T( + λ j X j p j T ( + λ j X j p j (9 = λ j TX j (p j p j. Let u denote a vector wth the th entry as X (p p. Now, (9 for all can be wrtten n matrx form as (I Cu = v >, (4 where v denotes some postve vector (wth the postve slack of nequalty (9 as ts th entry, and C s a postve matrx wth entres { (T τ/xl, f l = j C lj = (4 λ T, f l = j. Snce C s a postve matrx, usng the Perron-Frobenus theorem, Λ C s strctly postve. Now, Λ C satsfes Λ C (a max ( λ jt + (b < max ( T X j + T τ X T τ X (c < T (d X <, (4

6 where nequalty (a s due to the Collatz-Welandt theorem, nequalty (b s due to the servce rate /X beng strctly larger than the arrval rate λ (as (6 enforces ths constrant, nequalty (c s obvous, and nequalty (d s due to the necessary stablty condton for a M/G/ queue. Applyng Lemma 4. to (4, shows that u s strctly postve. Ths proves the lemma. C. Convergence Theorem 4.4: If p exsts, then startng from p, theara algorthm produces a monotone ncreasng sequence of vectors p(k that converges to a fxed pont. Proof: By Lemma 4., we know p < p. Note that I ARA (p s a monotone non-decreasng functon. Thus, startng from p, wehavep( = I ARA ( p < I ARA (p and p( = I ARA ( p p. Suppose p( p( p(n p. Then monotoncty mples p = I ARA (p I ARA (p(n = p(n + I ARA (4 (p(n = p(n. That s, p p(n + p(n. Hence, the sequence p(n s nondecreasng and bounded above by p.itmplesthatp(n converges to a fxed pont. One can use a smlar approach to prove the convergence of the PE algorthm (9, and the proof s omtted. V. APPLICATIONS A. Feasblty Problem To demonstrate the utlty of the proposed model, we use the above algorthm to address the followng mportant ARA queston: In an IEEE 8. network, f the arrval rates λ and the requred delays D =[D,D,..., D N ] T are gven, does there exst a set of access rates [p,p,,p N ] T such that the resultng delay for each node s guaranteed to be smaller than D? We refer to ths problem as the average delay feasblty problem. More formally, we say that {(λ,d, (λ,d,, (λ N,D N } s feasble f there exst [p,p,,p N ] T such that Y (p D. (44 We argue that f there exsts a p such that the equalty holds (.e., Y D, for =,,..., N, then {(λ,d, (λ,d,..., (λ N,D N } s feasble. We mplctly assume n the followng that f a vector of delays s feasble, then any set of component-wse larger set of delays s also feasble. Equvalently, we have the expected channel access delay as D X =, (45 λ T +λ D where we substtute Y = D. Note that both D and λ are nputs, and hence X s completely determned by them. Consequently, ρ = λ X s also determned. Substtutng ρ nto ( yelds a fxed pont problem to determne contenton wndows p. One can use the ARA algorthm proposed n the prevous secton to solve ths fxed pont problem. After obtanng the fxed pont p,f <p < for all, then we can assert and conclude that the flows are feasble, and a feasble contenton wndow CW s then the maxmum nteger that s smaller than /p. Otherwse, we conclude that the flows are not feasble because f the fxed pont had exsted, the ARA algorthm s guaranteed to converge. We wll provde examples n smulatons. B. Mnmzaton of Delay We now consder a scheme for the delay mnmzaton problem that s solved by a central controller, e.g., access pont n a WLAN, whch collects the QoS requrements {(λ,d, (λ,d,..., (λ N,D N } from all nodes. Based on ths nformaton, the WLAN frst solves the feasblty problem n Secton V-A, and then optmzes the delay performance. Assume that the th node has a cost functon f (Y that s dfferentable, non-decreasng and strctly convex. Now, from (5, Y s convex n X. We substtute (5 nto f (Y to yeld a convex functon n X, whch we denote as f (X. Ths leads us to consder the followng optmzaton problem: N mn f (X (46 = s.t. X ˆX D := λ T +λ D, (47 X = I PE (X(p, (48 <p, (49 Varables: X,p. (5 Above, constrant (47 guarantees that the average delay s less than the requred delay. However, the constrant (48 that relates p to X s nonconvex. Hence, the optmzaton problem (46 s nonconvex. In ths paper, we use the barrer method [] to compute a local optmal soluton. The barrer method s an nteror-pont method whch, when started from a feasble pont, yelds a soluton n the nteror of the feasble regon. Ths property s useful for fndng a feasble soluton as t s crtcal to meet the delay requrements,.e., the delay constrants (47 as they are satsfed at all tmes. Based on (47 and (49, we consder the barrer functon: B (p := ˆX X (p + +. (5 p p Note that the barrer functon ncreases to + as any of the constrants approaches ts boundary. Let ε be a postve weght assocated wth B (p for all. Then we consder the optmzaton problem: N N max J(p := f (X (p + ε B (p. (5 We present the followng algorthm based on the gradent method to solve (5 []. Gradent Algorthm Obtan an ntal pont p by solvng the feasblty problem as dscussed n Secton V-A. We assume that each node has only one QoS flow for the AP.

7 For a fxed p k (output of the feasblty problem, run the PE algorthm tll convergence to some tolerance to obtan X k. For fxed p k and X k, obtan d J(pk from (5 and (48. d p k 4 Update p by p k+ = p k d J(p k β d p k. 5 Repeat from Step untl convergence to some small tolerance. We let β be a dmnshng stepsze []. Due to the nonconvexty, our gradent algorthm n general yelds a feasble soluton that s not the global optmal soluton of (46. However, by explotng the lnear system approxmaton n Secton IV-B, we obtan a relaxaton to (46 that yelds a lower bound to the global optmal value of (46: N mn f (X (5 = s.t. X ˆX, (54 X ((I F b(p /p, (55 <p,, (56 where (Ax denotes the th element of the vector Ax, and b(p =[(T τp + τ,(t τp + τ,, (T τp N + τ] T. Note that (5 s obtaned by relaxng the constrant (55 n (46 usng ( and some rearrangement. Now, (5 s stll nonconvex. However, by makng the change of varable p = log p for all, we obtan the followng convex problem that s equvalent to solvng (5: N mn f (X (57 = s.t. X ˆX, (58 X ((I F b(e p /e p, (59 p,, (6 where e a =[e a,e a,,e an ] T. Our smulatons show that (57 yelds a value that s slghtly smaller than the feasble soluton obtaned from the gradent algorthm, showng that our gradent algorthm can compute a near-optmal soluton. VI. SIMULATION RESULTS A. Smulaton Setup The smulaton envronment s created usng the NS- network smulator (verson ns. [4]. Table I summarzes the system parameters used n the smulaton. Throughout the smulaton, the only parameters that are changed are CW mn and CW max. Note that the model does not employ exponental back-off. Thus, after obtanng a CW from the analytcal model, we just set CW mn = CW max = CW to dsable the exponental back-off. These values of CW mn and CW max shown n Table I are referred to as the default settngs for comparson. Collocated topologes were created n whch all nodes can carrer-sense each other. Each sender node s attached to a Posson traffc generaton agent n whch packet nter-arrval tmes can be customzed. The nterface queues at each node used a Droptal polcy and the queue sze s set at 5 packets. Each smulaton was run for 4 seconds n smulaton tme. Two metrcs, namely the channel access Packet payload 4 bytes UDP header bytes MAC header 8 bytes PHY header 4 bytes ACK frame 8 bytes Channel bt rate Mbps PHY header bt rate Mbps Slot tme μs SIFS μs DIFS 5 μs CW mn CW max Retransmsson lmt 7 TABLE I SYSTEM PARAMETERS delays and the queueng delays, are measured for each flow. For the channel access delay, we measure the tme nterval from the nstant that the packet arrves at the head of the queue to the nstant that the packet successfully departs from the queue. For the queueng delay, the tme nterval from the nstant that a packet s sent by the applcaton layer (labeled by AGT n trace fles to the nstant that the packet s successfully receved s measured. B. Accuracy of the Analytcal Model The accuracy of the model s measured through three scenaros: channel access delays under saturated condtons, channel access delays under unsaturated condtons, and queueng delays. For each smulaton, both the smulaton results (denoted by smulaton and the theoretcal results obtaned from our model (denoted by theoretcal are plotted for comparson. Channel access delays under saturated condtons: Snce we clam our model s generc, t should apply to saturated condtons as well. In these smulatons, three lnks were examned. The sender of each lnk sends a saturated traffc to the recever. The theoretcal results are obtaned by applyng (, where ρ =due to saturated condtons. Two scenaros are studed. In the frst scenaro, CW of lnk s vared between 4 and 6 whle the contenton wndows of lnk and lnk are fxed wth CW = CW =. Fgure plots the smulaton results as well as the theoretcal results. One can observe that as CW s ncreased, lnk s access delays ncrease. Even though CW and CW are not changed, ther correspondng access delays decrease because CW s ncreased. In the second scenaro, CW was changed, whle holdng the fxed rato CW : CW : CW =::. The results are shown n Fgure. One can observe that except for the nonlnear part when CW s very small, the channel access delays agree wth the theoretcal values. The nonlnear ntal part of the curves s due to the fact that the collson probablty s extremely hgh when every node has a small CW for contenton resoluton.

8 Theoretcal (CW.45 Theoretcal (CW.6 Theoretcal (CW =CW Channel Access Delay (s Theoretcal (CW Theoretcal (CW Smulaton (CW Smulaton (CW Smulaton (CW Channel Acess Delay (s Theoretcal (CW =CW Smulaton (CW Smulaton (CW =CW Smulaton (CW =CW.5. CW Fg.. Saturated condtons: Channel access delays v.s. CW, where CW = CW = CW Fg.. Saturated condtons: Channel access delays v.s. CW, fx the rato CW : CW : CW =::. Channel access delays and queueng delays under unsaturated condtons: For the unsaturated condtons, three scenaros are examned. The frst scenaro s ntended to study how traffc arrval rates affect channel access delays. The nterarrval tme of flow s vared, whle keepng the other two lnks arrval rates fxed. The fxed packet nter-arrval tmes are λ =. and λ =.5. For the contenton wndow, CW = CW = CW =s set. Fgure plots the results. The theoretcal results are obtaned by solvng ( usng the PE algorthm. In the second scenaro, t s examned how CW affects channel access delays. Traffc arrval rates, and CW and CW are fxed. Only CW s changed from to 44. The results are shown n Fgure 4. One can observe that as CW s ncreased, the delays of flow ncrease. As a sde effect, the delays of flow and flow drop. The thrd scenaro s used to demonstrate how channel access delays change n response to the number of nodes. Each lnk has the same traffc rate and the same CW. In partcular, λ =. and CW =for all. Only the number of lnks s changed. Fgure 5 plots the results. As expected, the access delays ncrease as the number of lnks grow. Queueng delays: We repeat the same three scenaros for queueng delays. One can observe smlar trends n these fgures to ther counterparts for the channel access delays. From the three scenaros, one can see that the theoretcal results do accurately match the smulaton results. The accuracy s not only reflected n the trend but also n the quanttatve values. C. Performance Evaluaton In the followng smulatons, two case studes are examned to demonstrate the applcablty of the model and evaluate the performance of the proposed algorthm. Each pont n the fgures s a tme-average of the queueng delay over every 5 smulaton seconds. Feasblty: In the frst case, when the capacty s nsuffcent, the default 8. settng cannot meet the delay guarantees of all the QoS flows. But, wth the proposed scheme, one can fnd an approprate settng at whch all delay requrements are met. The three requred delays are assumed to be. seconds. Note that ths delay requrement s realstc accordng to [5]. The data rates of the nelastc flows are fxed as follows: λ =.5, λ =.4 and λ =.. The ARA algorthm was run to obtan a set of feasble contenton wndows: CW =66, CW =and CW =8. Fgure 9 plots the smulaton results. One can see that the default IEEE 8. can guarantee the delays only for flows and, whereas the delay of flow s much larger than the allowed delay. However, the network can actually guarantee all the delays f contenton wndows are approprately adjusted. In fact, one does see that the delays of all flows are met when the network uses the contenton wndows that are computed as descrbed n ths paper. Mnmzng delays: In ths case study, the performance of the scheme that mnmzes the average delays for nelastc flows, whle preservng ther delay guarantees s evaluated. The partcular cost functon ˆf (Y = Y (6 λ s used. Inelastc flows have fxed arrval rates λ =.4, λ =.4 and λ =.. The delay requrements are stll. seconds. Compared to the nput of the frst case, one can observe that the network capacty s suffcent for ths nput. Thus, there should be room for the flows to mprove the performance (.e., queueng delays n ths case. Usng the gradent algorthm presented n Secton V-B, the optmal CWs are computed to be CW = 9, CW =, and CW =9. The comparsons are plotted n Fgure. One can observe that when confgured wth the CWs suggested n ths paper, the network does acheve the optmzed delays and provde a certan level of farness. In contrast, n the default IEEE 8., flow suffers from bad delay performance and experences serous unfarness. VII. CONCLUSIONS We have presented a smple but apparently accurate model for analyzng queueng delay n non-homogeneous IEEE 8. MAC based WLANs. The model allows us to analytcally study the feasblty problem of whether the network can provde the mean delay guarantees requred by several non-homogeneous QoS flows. Future n order to optmze the performance of QoS flows, we have proposed an optmzaton algorthm to mnmze the mean delays, as measured by

9 Channel Access Delay (s 7 x Theoretcal (flow, nterarv=. Theoretcal (flow, nterarv=.5 Theoretcal (flow Smulaton (flow, nterarv=. Smulaton (flow, nterarv=.5 Smulaton (flow Channel Access Delay (s 8 x Theoretcal (CW =,nterarv=. Theoretcal (CW =, nterarv=.5 Theoretcal (CW, nterarvl =.4 Smulaton (CW =,nterarv=. Smulaton (CW =, nterarv=.5 Smulaton (CW, nterarvl =.4 Average Channel Access Delay (s 4 x.5.5 Theoretcal Smulaton Mean Interarrval Tme of flow CW Number of Clents Fg.. Unsaturated condtons: Channel access delays v.s.,where =., =.5, λ λ λ and CW = CW = CW =. Fg. 4. Unsaturated condtons: Channel access delays v.s. CW,where =., =.5, λ λ =.4 and CW λ = CW = CW =. Fg. 5. Unsaturated condtons: Channel access delays v.s. the number of lnks, where all = λ. and all CW =. Queueng Delay (s Theoretcal (flow, nterarv=. Theoretcal (flow, nterarv=.5 Theoretcal (flow Smulaton (flow, nterarv=. Smulaton (flow, nterarv=.5 Smulaton (flow Queueng Delay (s Theoretcal (CW =,nterarv=. Theoretcal (CW =, nterarv=.5 Theoretcal (CW, nterarvl =.4 Smulaton (CW =,nterarv=. Smulaton (CW =, nterarv=.5 Smulaton (CW, nterarvl =.4 Average Queueng Delay (s 5 x Theoretcal Smulaton Mean Interarrval Tme of flow CW Number of Clents Fg. 6. Unsaturated condtons: Queueng delays v.s.,where =., =.5, and λ λ λ CW = CW = CW =. Fg. 7. Unsaturated condtons: Queueng delays v.s. CW,where =., =.5, = λ λ λ.4 and CW = CW = CW =. Fg. 8. Unsaturated condtons: Queueng delays v.s. the number of lnks, where all =. and λ all CW =. Average Queueng Delay (s flow (CW =66, nterarv=.5 flow (CW =, nterarv=.4 flow (CW =8, nterarv=. flow (default 8. flow (default 8. flow (default 8. Average Queueng Delay (s flow (Mn Delay flow (Mn Delay flow (Mn Delay flow (default 8. flow (default 8. flow (default Smulaton Tme (s Fg. 9. A feasble soluton: Illustraton of the queueng delay dynamcs Smulaton Tme (s Fg.. Mnmzng delays: =.. λ λ =.4, λ =.4 and a certan cost functon, for a set of nelastc flows whle preservng mean delay guarantees. Extensve NS- smulatons have been conducted to verfy the accuracy of the model and to evaluate the performance of the algorthms. REFERENCES [] G. Banch, Performance analyss of the IEEE 8. dstrbuted coordnaton functon, IEEE Journal on Selected Areas n Communcatons, vol. 8, no., pp , March. [] F. Cal, M. Cont, and E. Gregor, Dynamc tunng of the IEEE 8. protocol to acheve a theoretcal throughput lmt, IEEE/ACM Trans. on Networkng, December. [] A. Abdrabou and W. Zhuang, Servce tme approxmaton n IEEE 8. sngle-hop ad hoc networks, IEEE Trans. on Wreless Communcatons, vol. 7, no., pp. 5, 8. [4] K. Medepall and F. A. Tobag, Towards performance modelng of IEEE 8. based wreless networks: A unfed framework and ts applcatons, n Proc. IEEE INFOCOM, 6. [5] O. Tckoo and B. Skdar, Queueng analyss and delay mtgaton n IEEE 8. random access MAC based wreless networks, n Proc. IEEE INFOCOM. IEEE, 4, pp [6] C. Coutras, S. Gupta, and N. Shroff, Schedulng of real-tme traffc n IEEE 8. wreless LANs, Wreless Networks, vol. 6, no. 6, pp ,. [7] M. Heusse, F. Rousseau, R. Guller, and A. Duda, Idle sense: An optmal access method for hgh throughput and farness n rate dverse wreless LANs, Proc. ACM SIGCOMM, 5. [8] L. Jang and J. Walrand, A dstrbuted CSMA algorthm for throughput and utlty maxmzaton n wreless networks, n Allerton Conference on Communcaton, Control, and Computng, 8. [9] Y. Gao, D.-M. Chu, and J. C. Lu, Determnng the end-to-end throughput capacty n mult-hop networks: Methodology and applcatons, Proc. ACM SIGMETRICS Perform. Eval. Rev., 6. [] A. Wald, Sequental tests of statstcal hypotheses, Ann. Math. Stat, vol. 6, pp. 7 86, 945. [] L. Klenrock, Queueng Systems. John Wley & Sons, 975. [] E. Seneta, Non-negatve matrces and Markov chans, Sprnger, 6. [] D. P. Bertsekas, Nonlnear Programmng. Athena Scentfc, 999. [4] The network smulator-ns, [5] Csco, Understandng delay n packet voce networks, 6.

Characterization and Optimization of Delay Guarantees for Real-time Multimedia Traffic Flows in IEEE WLANs

Characterization and Optimization of Delay Guarantees for Real-time Multimedia Traffic Flows in IEEE WLANs Characterzaton and Optmzaton of Delay Guarantees for Real-tme Multmeda Traffc Flows n IEEE 802. WLANs Yan Gao, Member, IEEE, Chee We Tan, Senor Member, IEEE, Shan Ln, Yng Huang, Member, IEEE, Zheng Zeng,

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

Distributed Optimal TXOP Control for Throughput Requirements in IEEE e Wireless LAN

Distributed Optimal TXOP Control for Throughput Requirements in IEEE e Wireless LAN Dstrbuted Optmal TXOP Control for Throughput Requrements n IEEE 80.e Wreless LAN Ju Yong Lee, Ho Young Hwang, Jtae Shn, and Shahrokh Valaee KAIST Insttute for Informaton Technology Convergence, KAIST,

More information

MMA and GCMMA two methods for nonlinear optimization

MMA and GCMMA two methods for nonlinear optimization MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons

More information

Queueing Networks II Network Performance

Queueing Networks II Network Performance Queueng Networks II Network Performance Davd Tpper Assocate Professor Graduate Telecommuncatons and Networkng Program Unversty of Pttsburgh Sldes 6 Networks of Queues Many communcaton systems must be modeled

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

TCOM 501: Networking Theory & Fundamentals. Lecture 7 February 25, 2003 Prof. Yannis A. Korilis

TCOM 501: Networking Theory & Fundamentals. Lecture 7 February 25, 2003 Prof. Yannis A. Korilis TCOM 501: Networkng Theory & Fundamentals Lecture 7 February 25, 2003 Prof. Yanns A. Korls 1 7-2 Topcs Open Jackson Networks Network Flows State-Dependent Servce Rates Networks of Transmsson Lnes Klenrock

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE

CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng

More information

Analysis of Discrete Time Queues (Section 4.6)

Analysis of Discrete Time Queues (Section 4.6) Analyss of Dscrete Tme Queues (Secton 4.6) Copyrght 2002, Sanjay K. Bose Tme axs dvded nto slots slot slot boundares Arrvals can only occur at slot boundares Servce to a job can only start at a slot boundary

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

Feature Selection: Part 1

Feature Selection: Part 1 CSE 546: Machne Learnng Lecture 5 Feature Selecton: Part 1 Instructor: Sham Kakade 1 Regresson n the hgh dmensonal settng How do we learn when the number of features d s greater than the sample sze n?

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling Real-Tme Systems Multprocessor schedulng Specfcaton Implementaton Verfcaton Multprocessor schedulng -- -- Global schedulng How are tasks assgned to processors? Statc assgnment The processor(s) used for

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017 U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 4s Luca Trevsan September 5, 07 Summary of Lecture 4 In whch we ntroduce semdefnte programmng and apply t to Max Cut. Semdefnte Programmng Recall that

More information

Numerical Heat and Mass Transfer

Numerical Heat and Mass Transfer Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and

More information

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve

More information

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS

A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS HCMC Unversty of Pedagogy Thong Nguyen Huu et al. A PROBABILITY-DRIVEN SEARCH ALGORITHM FOR SOLVING MULTI-OBJECTIVE OPTIMIZATION PROBLEMS Thong Nguyen Huu and Hao Tran Van Department of mathematcs-nformaton,

More information

EEE 241: Linear Systems

EEE 241: Linear Systems EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

Lecture 21: Numerical methods for pricing American type derivatives

Lecture 21: Numerical methods for pricing American type derivatives Lecture 21: Numercal methods for prcng Amercan type dervatves Xaoguang Wang STAT 598W Aprl 10th, 2014 (STAT 598W) Lecture 21 1 / 26 Outlne 1 Fnte Dfference Method Explct Method Penalty Method (STAT 598W)

More information

Winter 2008 CS567 Stochastic Linear/Integer Programming Guest Lecturer: Xu, Huan

Winter 2008 CS567 Stochastic Linear/Integer Programming Guest Lecturer: Xu, Huan Wnter 2008 CS567 Stochastc Lnear/Integer Programmng Guest Lecturer: Xu, Huan Class 2: More Modelng Examples 1 Capacty Expanson Capacty expanson models optmal choces of the tmng and levels of nvestments

More information

Fixed Point Analysis of Single Cell IEEE e WLANs: Uniqueness, Multistability and Throughput Differentiation

Fixed Point Analysis of Single Cell IEEE e WLANs: Uniqueness, Multistability and Throughput Differentiation Fxed Pont Analyss of Sngle Cell IEEE 82.e WLANs: Unqueness, Multstablty and Throughput Dfferentaton Venkatesh Ramayan ECE Department Indan Insttute of Scence Bangalore, Inda rvenkat@ece.sc.ernet.n Anurag

More information

Some modelling aspects for the Matlab implementation of MMA

Some modelling aspects for the Matlab implementation of MMA Some modellng aspects for the Matlab mplementaton of MMA Krster Svanberg krlle@math.kth.se Optmzaton and Systems Theory Department of Mathematcs KTH, SE 10044 Stockholm September 2004 1. Consdered optmzaton

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

CS 798: Homework Assignment 2 (Probability)

CS 798: Homework Assignment 2 (Probability) 0 Sample space Assgned: September 30, 2009 In the IEEE 802 protocol, the congeston wndow (CW) parameter s used as follows: ntally, a termnal wats for a random tme perod (called backoff) chosen n the range

More information

DUE: WEDS FEB 21ST 2018

DUE: WEDS FEB 21ST 2018 HOMEWORK # 1: FINITE DIFFERENCES IN ONE DIMENSION DUE: WEDS FEB 21ST 2018 1. Theory Beam bendng s a classcal engneerng analyss. The tradtonal soluton technque makes smplfyng assumptons such as a constant

More information

Pricing and Resource Allocation Game Theoretic Models

Pricing and Resource Allocation Game Theoretic Models Prcng and Resource Allocaton Game Theoretc Models Zhy Huang Changbn Lu Q Zhang Computer and Informaton Scence December 8, 2009 Z. Huang, C. Lu, and Q. Zhang (CIS) Game Theoretc Models December 8, 2009

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

COS 521: Advanced Algorithms Game Theory and Linear Programming

COS 521: Advanced Algorithms Game Theory and Linear Programming COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton

More information

Minimisation of the Average Response Time in a Cluster of Servers

Minimisation of the Average Response Time in a Cluster of Servers Mnmsaton of the Average Response Tme n a Cluster of Servers Valery Naumov Abstract: In ths paper, we consder task assgnment problem n a cluster of servers. We show that optmal statc task assgnment s tantamount

More information

Suggested solutions for the exam in SF2863 Systems Engineering. June 12,

Suggested solutions for the exam in SF2863 Systems Engineering. June 12, Suggested solutons for the exam n SF2863 Systems Engneerng. June 12, 2012 14.00 19.00 Examner: Per Enqvst, phone: 790 62 98 1. We can thnk of the farm as a Jackson network. The strawberry feld s modelled

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

Markov Chain Monte Carlo Lecture 6

Markov Chain Monte Carlo Lecture 6 where (x 1,..., x N ) X N, N s called the populaton sze, f(x) f (x) for at least one {1, 2,..., N}, and those dfferent from f(x) are called the tral dstrbutons n terms of mportance samplng. Dfferent ways

More information

Supplement: Proofs and Technical Details for The Solution Path of the Generalized Lasso

Supplement: Proofs and Technical Details for The Solution Path of the Generalized Lasso Supplement: Proofs and Techncal Detals for The Soluton Path of the Generalzed Lasso Ryan J. Tbshran Jonathan Taylor In ths document we gve supplementary detals to the paper The Soluton Path of the Generalzed

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,

More information

On the Multicriteria Integer Network Flow Problem

On the Multicriteria Integer Network Flow Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of

More information

Yong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 )

Yong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 ) Kangweon-Kyungk Math. Jour. 4 1996), No. 1, pp. 7 16 AN ITERATIVE ROW-ACTION METHOD FOR MULTICOMMODITY TRANSPORTATION PROBLEMS Yong Joon Ryang Abstract. The optmzaton problems wth quadratc constrants often

More information

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U)

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U) Econ 413 Exam 13 H ANSWERS Settet er nndelt 9 deloppgaver, A,B,C, som alle anbefales å telle lkt for å gøre det ltt lettere å stå. Svar er gtt . Unfortunately, there s a prntng error n the hnt of

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

Solutions to exam in SF1811 Optimization, Jan 14, 2015

Solutions to exam in SF1811 Optimization, Jan 14, 2015 Solutons to exam n SF8 Optmzaton, Jan 4, 25 3 3 O------O -4 \ / \ / The network: \/ where all lnks go from left to rght. /\ / \ / \ 6 O------O -5 2 4.(a) Let x = ( x 3, x 4, x 23, x 24 ) T, where the varable

More information

Markov chains. Definition of a CTMC: [2, page 381] is a continuous time, discrete value random process such that for an infinitesimal

Markov chains. Definition of a CTMC: [2, page 381] is a continuous time, discrete value random process such that for an infinitesimal Markov chans M. Veeraraghavan; March 17, 2004 [Tp: Study the MC, QT, and Lttle s law lectures together: CTMC (MC lecture), M/M/1 queue (QT lecture), Lttle s law lecture (when dervng the mean response tme

More information

Global Sensitivity. Tuesday 20 th February, 2018

Global Sensitivity. Tuesday 20 th February, 2018 Global Senstvty Tuesday 2 th February, 28 ) Local Senstvty Most senstvty analyses [] are based on local estmates of senstvty, typcally by expandng the response n a Taylor seres about some specfc values

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

Randomness and Computation

Randomness and Computation Randomness and Computaton or, Randomzed Algorthms Mary Cryan School of Informatcs Unversty of Ednburgh RC 208/9) Lecture 0 slde Balls n Bns m balls, n bns, and balls thrown unformly at random nto bns usually

More information

Single-Facility Scheduling over Long Time Horizons by Logic-based Benders Decomposition

Single-Facility Scheduling over Long Time Horizons by Logic-based Benders Decomposition Sngle-Faclty Schedulng over Long Tme Horzons by Logc-based Benders Decomposton Elvn Coban and J. N. Hooker Tepper School of Busness, Carnege Mellon Unversty ecoban@andrew.cmu.edu, john@hooker.tepper.cmu.edu

More information

Convergence of random processes

Convergence of random processes DS-GA 12 Lecture notes 6 Fall 216 Convergence of random processes 1 Introducton In these notes we study convergence of dscrete random processes. Ths allows to characterze phenomena such as the law of large

More information

The optimal delay of the second test is therefore approximately 210 hours earlier than =2.

The optimal delay of the second test is therefore approximately 210 hours earlier than =2. THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple

More information

Assortment Optimization under MNL

Assortment Optimization under MNL Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.

More information

Lecture 4: November 17, Part 1 Single Buffer Management

Lecture 4: November 17, Part 1 Single Buffer Management Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input

More information

Analysis of Queuing Delay in Multimedia Gateway Call Routing

Analysis of Queuing Delay in Multimedia Gateway Call Routing Analyss of Queung Delay n Multmeda ateway Call Routng Qwe Huang UTtarcom Inc, 33 Wood Ave. outh Iseln, NJ 08830, U..A Errol Lloyd Computer Informaton cences Department, Unv. of Delaware, Newark, DE 976,

More information

Solutions HW #2. minimize. Ax = b. Give the dual problem, and make the implicit equality constraints explicit. Solution.

Solutions HW #2. minimize. Ax = b. Give the dual problem, and make the implicit equality constraints explicit. Solution. Solutons HW #2 Dual of general LP. Fnd the dual functon of the LP mnmze subject to c T x Gx h Ax = b. Gve the dual problem, and make the mplct equalty constrants explct. Soluton. 1. The Lagrangan s L(x,

More information

Chapter Newton s Method

Chapter Newton s Method Chapter 9. Newton s Method After readng ths chapter, you should be able to:. Understand how Newton s method s dfferent from the Golden Secton Search method. Understand how Newton s method works 3. Solve

More information

Equilibrium Analysis of the M/G/1 Queue

Equilibrium Analysis of the M/G/1 Queue Eulbrum nalyss of the M/G/ Queue Copyrght, Sanay K. ose. Mean nalyss usng Resdual Lfe rguments Secton 3.. nalyss usng an Imbedded Marov Chan pproach Secton 3. 3. Method of Supplementary Varables done later!

More information

Matrix Approximation via Sampling, Subspace Embedding. 1 Solving Linear Systems Using SVD

Matrix Approximation via Sampling, Subspace Embedding. 1 Solving Linear Systems Using SVD Matrx Approxmaton va Samplng, Subspace Embeddng Lecturer: Anup Rao Scrbe: Rashth Sharma, Peng Zhang 0/01/016 1 Solvng Lnear Systems Usng SVD Two applcatons of SVD have been covered so far. Today we loo

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

Interactive Bi-Level Multi-Objective Integer. Non-linear Programming Problem

Interactive Bi-Level Multi-Objective Integer. Non-linear Programming Problem Appled Mathematcal Scences Vol 5 0 no 65 3 33 Interactve B-Level Mult-Objectve Integer Non-lnear Programmng Problem O E Emam Department of Informaton Systems aculty of Computer Scence and nformaton Helwan

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

Error Probability for M Signals

Error Probability for M Signals Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal

More information

Linear Feature Engineering 11

Linear Feature Engineering 11 Lnear Feature Engneerng 11 2 Least-Squares 2.1 Smple least-squares Consder the followng dataset. We have a bunch of nputs x and correspondng outputs y. The partcular values n ths dataset are x y 0.23 0.19

More information

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011 Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected

More information

Transfer Functions. Convenient representation of a linear, dynamic model. A transfer function (TF) relates one input and one output: ( ) system

Transfer Functions. Convenient representation of a linear, dynamic model. A transfer function (TF) relates one input and one output: ( ) system Transfer Functons Convenent representaton of a lnear, dynamc model. A transfer functon (TF) relates one nput and one output: x t X s y t system Y s The followng termnology s used: x y nput output forcng

More information

A Game Theoretic Approach to Distributed Opportunistic Scheduling

A Game Theoretic Approach to Distributed Opportunistic Scheduling A Game Theoretc Approach to Dstrbuted Opportunstc Schedulng Albert Banchs, Senor Member, IEEE, Andres Garca-Saavedra, Pablo Serrano, Member, IEEE, and Joerg Wdmer, Senor Member, IEEE. Banchs et al.: A

More information

Generalized Linear Methods

Generalized Linear Methods Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set

More information

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 5, JUNE

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 5, JUNE IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 59, NO. 5, JUNE 2010 2511 Optmal Confguraton of 802.11e EDCA for Real-Tme and Data Traffc Pablo Serrano, Member, IEEE, Albert Banchs, Member, IEEE, Paul

More information

Additional Codes using Finite Difference Method. 1 HJB Equation for Consumption-Saving Problem Without Uncertainty

Additional Codes using Finite Difference Method. 1 HJB Equation for Consumption-Saving Problem Without Uncertainty Addtonal Codes usng Fnte Dfference Method Benamn Moll 1 HJB Equaton for Consumpton-Savng Problem Wthout Uncertanty Before consderng the case wth stochastc ncome n http://www.prnceton.edu/~moll/ HACTproect/HACT_Numercal_Appendx.pdf,

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

A Simple Inventory System

A Simple Inventory System A Smple Inventory System Lawrence M. Leems and Stephen K. Park, Dscrete-Event Smulaton: A Frst Course, Prentce Hall, 2006 Hu Chen Computer Scence Vrgna State Unversty Petersburg, Vrgna February 8, 2017

More information

COMPLETE BUFFER SHARING IN ATM NETWORKS UNDER BURSTY ARRIVALS

COMPLETE BUFFER SHARING IN ATM NETWORKS UNDER BURSTY ARRIVALS COMPLETE BUFFER SHARING WITH PUSHOUT THRESHOLDS IN ATM NETWORKS UNDER BURSTY ARRIVALS Ozgur Aras and Tugrul Dayar Abstract. Broadband Integrated Servces Dgtal Networks (B{ISDNs) are to support multple

More information

Lecture 20: November 7

Lecture 20: November 7 0-725/36-725: Convex Optmzaton Fall 205 Lecturer: Ryan Tbshran Lecture 20: November 7 Scrbes: Varsha Chnnaobreddy, Joon Sk Km, Lngyao Zhang Note: LaTeX template courtesy of UC Berkeley EECS dept. Dsclamer:

More information

EEL 6266 Power System Operation and Control. Chapter 3 Economic Dispatch Using Dynamic Programming

EEL 6266 Power System Operation and Control. Chapter 3 Economic Dispatch Using Dynamic Programming EEL 6266 Power System Operaton and Control Chapter 3 Economc Dspatch Usng Dynamc Programmng Pecewse Lnear Cost Functons Common practce many utltes prefer to represent ther generator cost functons as sngle-

More information

Lecture 12: Classification

Lecture 12: Classification Lecture : Classfcaton g Dscrmnant functons g The optmal Bayes classfer g Quadratc classfers g Eucldean and Mahalanobs metrcs g K Nearest Neghbor Classfers Intellgent Sensor Systems Rcardo Guterrez-Osuna

More information

Computing Correlated Equilibria in Multi-Player Games

Computing Correlated Equilibria in Multi-Player Games Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,

More information

Lecture 10 Support Vector Machines II

Lecture 10 Support Vector Machines II Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed

More information

Lecture 12: Discrete Laplacian

Lecture 12: Discrete Laplacian Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly

More information

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm Desgn and Optmzaton of Fuzzy Controller for Inverse Pendulum System Usng Genetc Algorthm H. Mehraban A. Ashoor Unversty of Tehran Unversty of Tehran h.mehraban@ece.ut.ac.r a.ashoor@ece.ut.ac.r Abstract:

More information

Simulation and Random Number Generation

Simulation and Random Number Generation Smulaton and Random Number Generaton Summary Dscrete Tme vs Dscrete Event Smulaton Random number generaton Generatng a random sequence Generatng random varates from a Unform dstrbuton Testng the qualty

More information

Adaptive Dynamical Polling in Wireless Networks

Adaptive Dynamical Polling in Wireless Networks BULGARIA ACADEMY OF SCIECES CYBERETICS AD IFORMATIO TECHOLOGIES Volume 8, o Sofa 28 Adaptve Dynamcal Pollng n Wreless etworks Vladmr Vshnevsky, Olga Semenova Insttute for Informaton Transmsson Problems

More information

Economics 101. Lecture 4 - Equilibrium and Efficiency

Economics 101. Lecture 4 - Equilibrium and Efficiency Economcs 0 Lecture 4 - Equlbrum and Effcency Intro As dscussed n the prevous lecture, we wll now move from an envronment where we looed at consumers mang decsons n solaton to analyzng economes full of

More information

Lecture 4. Instructor: Haipeng Luo

Lecture 4. Instructor: Haipeng Luo Lecture 4 Instructor: Hapeng Luo In the followng lectures, we focus on the expert problem and study more adaptve algorthms. Although Hedge s proven to be worst-case optmal, one may wonder how well t would

More information

Perfect Competition and the Nash Bargaining Solution

Perfect Competition and the Nash Bargaining Solution Perfect Competton and the Nash Barganng Soluton Renhard John Department of Economcs Unversty of Bonn Adenauerallee 24-42 53113 Bonn, Germany emal: rohn@un-bonn.de May 2005 Abstract For a lnear exchange

More information

How Bad Is Suboptimal Rate Allocation?

How Bad Is Suboptimal Rate Allocation? How Bad Is Suboptmal Rate Allocaton? Tan Lan, Xaojun Ln 2, Mung Chang, Ruby Lee Department of Electrcal Engneerng, Prnceton Unversty, NJ 08544, USA 2 School of Electrcal and Computer Engneerng, Purdue

More information

Parametric fractional imputation for missing data analysis. Jae Kwang Kim Survey Working Group Seminar March 29, 2010

Parametric fractional imputation for missing data analysis. Jae Kwang Kim Survey Working Group Seminar March 29, 2010 Parametrc fractonal mputaton for mssng data analyss Jae Kwang Km Survey Workng Group Semnar March 29, 2010 1 Outlne Introducton Proposed method Fractonal mputaton Approxmaton Varance estmaton Multple mputaton

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

Copyright 2017 by Taylor Enterprises, Inc., All Rights Reserved. Adjusted Control Limits for P Charts. Dr. Wayne A. Taylor

Copyright 2017 by Taylor Enterprises, Inc., All Rights Reserved. Adjusted Control Limits for P Charts. Dr. Wayne A. Taylor Taylor Enterprses, Inc. Control Lmts for P Charts Copyrght 2017 by Taylor Enterprses, Inc., All Rghts Reserved. Control Lmts for P Charts Dr. Wayne A. Taylor Abstract: P charts are used for count data

More information

Edge Isoperimetric Inequalities

Edge Isoperimetric Inequalities November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary

More information

Assignment 5. Simulation for Logistics. Monti, N.E. Yunita, T.

Assignment 5. Simulation for Logistics. Monti, N.E. Yunita, T. Assgnment 5 Smulaton for Logstcs Mont, N.E. Yunta, T. November 26, 2007 1. Smulaton Desgn The frst objectve of ths assgnment s to derve a 90% two-sded Confdence Interval (CI) for the average watng tme

More information

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin

LOW BIAS INTEGRATED PATH ESTIMATORS. James M. Calvin Proceedngs of the 007 Wnter Smulaton Conference S G Henderson, B Bller, M-H Hseh, J Shortle, J D Tew, and R R Barton, eds LOW BIAS INTEGRATED PATH ESTIMATORS James M Calvn Department of Computer Scence

More information

Lecture 14: Bandits with Budget Constraints

Lecture 14: Bandits with Budget Constraints IEOR 8100-001: Learnng and Optmzaton for Sequental Decson Makng 03/07/16 Lecture 14: andts wth udget Constrants Instructor: Shpra Agrawal Scrbed by: Zhpeng Lu 1 Problem defnton In the regular Mult-armed

More information