Delay Performance of Threshold Policies for Dynamic Spectrum Access

Size: px
Start display at page:

Download "Delay Performance of Threshold Policies for Dynamic Spectrum Access"

Transcription

1 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO. 7, JULY 83 Delay Performance of Threshold Policies for Dynamic Sectrum Access Rong-Rong Chen and Xin Liu Abstract In this aer, we analyze the delay erformance of a secondary user SU under dynamic sectrum access. We design simle time-threshold olicies for the SU to minimize the average delay while satisfying the collision robability constraint of the rimary user PU. Such olicies erform closely to an otimized olicy found by a Markov Decision Process MDP formulation, while facilitating analytical analysis of the delay and collision robability. For general PU busy and idle eriod distributions, we analyze the erformance of threshold olicies through a onedimensional Markov chain, and develo analytical exressions to aroximate the delay and collision robability. The accuracy of the Markov chain analysis and the analytical aroximations is examined under various busy and idle distributions. We investigate the imact of busy and idle distributions on system erformance. We find that while the idle distribution determines the time caacity of SU access, the busy distribution significantly affects the delay erformance of the threshold olicies. The effect of imerfect sensing is also studied. Index Terms Cognitive radio, dynamic sectrum access, delay, collision robability, Markov Decision Process. I. INTRODUCTION COGNITIVE Radio CR technology has great otential to alleviate sectrum scarcity in wireless communication networks. It allows secondary users SUs to oortunistically access sectrum licensed by rimary users PUs while rotecting the PUs activity. This new aradigm is tyically referred to as dynamic sectrum access DSA []. Most existing work focuses on either sectrum sensing or dynamic sectrum allocation. The delay erformance of cognitive radio networks, however, remains an under-exlored area, desite its imortance in characterizing the quality of service rovided by such networks. There are few aers on the delay analysis of SUs in cogntive radio networks [] [5], artially due to the technical difficulties of such an analysis. Hence, the delay erformance of cognitive radio networks in general is not wellunderstood. The goal of this work is to rovide an analytical study of the delay erformance of cognitive radio networks based on a class of threshold olicies. A distinguishing feature of this work is that we analyze the delay erformance of the SU while exlicitly taking into account the interference to the Manuscrit received July 8, ; revised October 3, and Aril 3, ; acceted Aril 5,. The associate editor coordinating the review of this aer and aroving it for ublication was S. Liew. R.-R. Chen is with the Deartment of Electrical and Comuter Engineering, University of Utah rchen@ece.utah.edu. The work of R.-R. Chen was suorted in art by NSF under grant ECS X. Liu is with the Comuter Science Deartment, University of California, Davis liu@cs.ucdavis.edu. The work of X. Liu was artially suorted by NSF through awards CNS-975 and CNS-44863, and Fujitsu Inc. through a gift grant. Digital Object Identifier.9/TWC PU. Secifically, we adot an imortant constraint on the SU transmission such that the collision robability of a PU acket is less than a threshold secified arioriby the PU. While this constraint is commonly adoted for the rotection of PU in the design of DSA [6] [8], to the best of our knowledge, it has not been considered in rior work on the delay analysis of DSA [] [5]. Furthermore, we consider the DSA under general PU busy and idle distributions, which go beyond the simle exonential distribution considered in other existing work. We study the time-threshold olicies for the following reasons: The threshold olicies erform closely to the otimal olicy found by the Markov Decision Process MDP formulation, but are simler in structure, and rovide better insights and being comutationally more efficient than the MDP olicy. The threshold olicies facilitate analytical characterizations of the delay and collision robability under general PU busy and idle distributions. The threshold olicies were first studied in [9] to maximize the time caacity of the SU access for the case of backlogged traffic. In comarison, the threshold olicies develoed here are for minimizing delay under dynamic SU acket arrivals. Hence, the delay analysis develoed in this aer involves new techniques that are significantly different from and more challenging than those of [9]. The main contributions of this work are summarized as follows. We establish a class of time-threshold olicies as near otimal oortunistic transmission olicies for minimizing the delay of the SU under an exlicit PU collision robability constraint. Such olicies achieve close to otimal erformance comared with an otimal olicy we develoed based on an MDP formulation. For general PU busy and idle distributions, we rovide exact analytical characterizations of the erformance of the roosed threshold olicies through a Markovian analysis. Novel techniques are develoed to overcome the non-markovian nature of the original roblem and to reduce the system dimension. These techniques yield accurate analytical exressions for both the delay erformance and the PU collision robability. We conduct steady-state analysis and use techniques from renewal theory to derive closed-form aroximations of the delay and collision robability for the threshold olicies under various PU busy and idle distributions. These rovide valuable insights on the imact of system arameters on the delay and collision robability. The accuracy of these aroximations is confirmed through simulations. In related work [], a fluid queue aroximation aroach /$5. c IEEE

2 84 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO. 7, JULY PU transmit SU sense t= SU transmit t= t=3 time... collision t=k PU return Fig.. Illustration of the system model. Each SU slot consists of a sensing eriod and a transmission eriod. A collision occurs in the k-th SU slot, when the SU starts transmission after sensing the PU channel to be idle, and the PU returns before the end of the SU transmission eriod. was develoed to analyze the delay erformance of SUs that contend for the available rimary sectrum using random access. In [3], caacity and delay bounds for SUs were derived using a G/G/ queueing model. Our work differs from [], [3] in that we exlicitly consider the PU collision robability constraint in the delay analysis due to the imortance of PU rotection in DSA networks. In [5], under a PU collision robability constraint, the authors designed oortunistic scheduling olicies for SUs to maximize system throughut using Lyaunov functions. While the authors stated that there exists a tradeoff between throughut and delay, and a coarse delay bound can be derived following the framework in [], delay was not exlicitly analyzed in [5]. In [4], the delay analysis was develoed assuming exonentially distributed busy and idle eriods. In comarison, our work considers general busy and idle distributions which are more difficult to analyze. Due to the technical challenges of theoretical analysis, in this aer we consider only the case of a single SU accessing a PU channel, ossibly shared by multile PUs. In the analysis we also make the idealized assumtion of erfect sensing and rovide only numerical results for the imerfect sensing case. We show that the erformance analysis we develoed for the single SU case rovides a good aroximation of the erformance of the multile SUs scenario under a simle round-robin rotocol. Extensions of the analysis to the more realistic scenarios of multile SUs and multile PU bands under more sohisticated rotocols are imortant directions for future research, but are out of the scoe of this aer. The remainder of the aer is organized as follows. In Section II, we introduce the system model that characterizes the PU and SU activities. In Section III, we resent the time-threshold olicies. We analyze the erformance of the threshold olicies in Section IV through Markovian analysis, and derive closed-form analytical exressions to aroximate the delay and collision robability of such olicies in Section V. In Section VII, we study the multile SU scenario. Numerical results are resented in Section VI. Finally, we conclude in Section VIII. II. SYSTEM MODEL We consider one sectrum band that is assigned to the PU. One SU oortunistically exloits sectrum oortunities vacated by the PU under the rotection requirement of the PU. While it is ossible that there are multile PUs sharing the sectrum band, we assume that the SU does not distinguish among different PUs, and can only access the channel when no PU is active. Thus, the SU treats all PUs collectively as one aggregated PU in designing the sectrum access schemes. A. PU Model We assume that PU activities follow an alternating busy-idle attern. Multile PU ackets, ossibly with various lengths, are transmitted within a busy eriod. When all PU ackets in the queue have been transmitted, the PU channel becomes idle. The PU channel remains idle until the arrival of the next PU acket, which is the start of the next busy-idle cycle. We denote the sojourn time of the PU idle state as I, its robability density function PDF as f I, its cumulative distribution function CDF as F I, its mean as μ I = vf I vdv, and its second moment as ν I = v f I vdv. Similarly, B, f B, F B, μ B, ν B reresent the sojourn time of the PU busy state, the df, the cdf, the mean, and the second moment, resectively. B. SU Model We consider a acketized and time-slotted system for the SU. The SU has a fixed acket length that is no greater than that of the PU. Smaller values of the SU acket length allow more freedom for designing the SU access strategy. The arrival rocess of the SU is modeled as a Bernoulli rocess such that with robability an SU acket arrives in a time slot and with robability there is no acket arrival. Each SU time slot consists of a short sensing eriod, followed by a transmission eriod, as shown in Fig.. The SU senses the channel during the sensing eriod. If the channel is sensed busy, the SU does not transmit in the transmission eriod, and will sense the channel again in the sensing eriod of the next SU time slot. If the channel is sensed idle, the SU has the otions to either transmit, or not transmit, according to some transmission olicies described in Section III. For examle, as shown in Fig., the SU does not transmit in time slot after sensing, either because its queue is emty or because its transmission olicy decides so. If the SU transmits and the PU channel remains idle for the entire duration of the SU transmission eriod, then the transmission is successful. Otherwise, if the PU returns in the middle of the SU transmission eriod, a acket collision occurs. This is illustrated in Fig., where a collision occurs in time-slot k. For ease of resentation, in this aer we do not consider PU/SU acket re-transmission in the event of a collision, even though such modifications should be straightforward. We also assume an infinite buffer size at the SU and thus the acket droing robability is not considered. C. PU Collision Probability Requirement We denote c as the average acket collision robability erceived by the PU in the long-run, given by K k= c = lim su N ck K K k= N k, where N c k and N k are random variables reresenting the total number of collided and transmitted PU ackets in the k-th busy-idle cycle, resectively. The PU acket collision

3 CHEN and LIU: DELAY PERFORMANCE OF THRESHOLD POLICIES FOR DYNAMIC SPECTRUM ACCESS 85 robability constraint, c η, is imosed by either the PU or the sectrum regulator and is known to the SU ariori. Under the assumtions that the SU acket length is no greater than the PU acket length, and that the sensing outcome of thesuiserfect,wenotethatthere is at most one PU acket collision within a busy-idle cycle, which may only occur at the beginning of a busy eriod when the PU returns after the SU has already sensed the channel to be idle and started a transmission. During the next SU time slot, the SU will sense the channel to be busy and refrain from transmission, thus avoiding additional collisions with PU ackets. The analysis develoed in this aer is based on these assumtions. When the sensing outcome is not error-free, the SU can ossibly miss detect PU activities, causing multile PU acket collisions within a busy eriod. We will study the latter scenario through simulation in Section VI. III. TRANSMISSION POLICIES FOR MINIMIZING DELAY In this section, we study transmission olicies to minimize the average delay of the SU subject to the constraint c η. The SU is assumed to have erfect knowledge of η, f I, and f B. An otimal olicy can be found using the owerful tool of MDP. In articular, the state sace is two-dimensional: time and queue length; and the action is either to transmit or not to transmit. Through an MDP formulation, we can numerically comute the otimal olicy that minimizes the average cost in an infinite horizon. The cost considered here has two comonents: the delay cost and the collision cost. The collision cost can be adjusted numerically to meet the collision robability constraint. Due to sace limitation, we refer the readers to our technical reort [] for a detailed descrition of the MDP formulation for this roblem. The calculation of the otimal MDP olicy, however, is cumbersome and rone to numerical inaccuracy. Furthermore, the MDP olicy rovides little insight on the relationshi between delay and other system arameters. Therefore, we are motivated to look for olicies that are more structured. It is shown in [9] that for the case of backlogged traffic, under certain conditions, the otimal SU transmission olicy that achieves the time caacity of a PU channel is a timethreshold olicy. The SU should transmit only when the elased time since the channel has been idle, denoted by t, is below a threshold. The intuition behind this is that the SU should transmit only when the robability of a collision with the PU is small. For most idle distributions considered, [9] shows that conditioned uon t, the robability of a collision due to an SU transmission at time t is an increasing function of t. This naturally yields a time-threshold olicy so that the SU will transmit only when t is below a threshold. We can easily adat the time-threshold olicy of [9] here to the case when the arrival of SU ackets is dynamic. The time-threshold olicy with threshold is defined such that the SU will transmit only when the following three conditions are met: i the channel is sensed idle, ii t < note that is in general different from the that maximizes caacity, and iii the SU queue length M is greater than zero. The time-threshold should be adjusted to satisfy the PU collision robability constraint. As shown in Sections IV and V, the simlicity of time-threshold olicies facilitates theoretical analysis of the delay and collision robability. Furthermore, we find that the time-threshold olicy erforms closely to the otimal MDP olicy desite its simlicity. This reveals that the elased time t is a major factor that affects the delay and collision robability of a transmission olicy, hence justifies the usage of the time-threshold olicies considered here. IV. MARKOV CHAIN ANALYSIS OF THRESHOLD POLICIES In this section, we develo a Markovian model to analyze the erformance of the threshold olicies. Since the SU is not synchronized with the PU, the SU can only estimate I and B through eriodic sensing. Hence, even though in general I and B are continuous random variables, their estimates obtained by the SU, denoted by I d and B d, resectively, are discrete random variables whose values are integer multiles of the SU slot length. For instance, if the SU detects the PU channel to be idle for m consecutive SU slots sensing is done only once within each SU slot, then the length of the idle eriod observed by the SU is I d = m, assuming that each SU slot has unit length. The length of the busy eriod B d is defined similarly. To simlify analysis, we assume erfect sensing, i.e., the length of the sensing eriod is zero, and the sensing outcome is error-free. A. Probability Mass Function of I d and B d Given a continuous idle distribution with df f I v and cdf F I v, the robability mass function of I d can be comuted as follows. Let Z denote the time between the start of an idle eriod and the start of the next SU slot. We can model Z as a uniformly distributed random variable in [, ]. Assuming erfect sensing, the SU will sense the PU channel to be idle for m consecutive SU slots if and only if z+m I z+m. It follows that for every m =,,, P I d z+m = m = f I vdv dz = z+m FI z + m F I z + m dz. The robability mass function of B d can be comuted in a similar fashion. In the remainder of this section, for notational simlicity we suress the suerscrit in I d and B d and let I and B denote the estimated integer lengths of the idle and busy eriods, resectively. B. Construction of a one-dimensional Markov Chain Assume that the k-th PU busy-idle cycle observed by the SU consists of B k busy slots and I k idle slots. To model the dynamics of the number of SU ackets in the system, we define X k = {Number of SU ackets at the beginning of the k-thbusyeriod} Y k = {Number of SU ackets at the beginning of the k-th idle eriod}

4 86 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO. 7, JULY X k i Y k j = {Number of SU ackets at the end of the i-th slot of the k-th busy eriod, i B k }, = {Number of SU ackets at the end of the j-th slot of the k-th idle eriod, j I k }. Clearly, we have Y k I k = X k+ because the number of SU ackets at the end of the k-th idle eriod equals the number of SU ackets at the beginning of the k +-th busy eriod. Similarly, Y k = X k B k also holds. The dynamics of the number of SU ackets is characterized by the sequence of random variables X,X,,X B = Y Y I =X,X,Y,Y,,Y,,X B = Y I,,Y,Y, The above sequence of random variables does not form a Markov chain, because the number of SU ackets at time n deends on how long the PU channel has been in a busy/idle state. One can overcome this roblem by tracking not only the number of SU ackets, but also the elased time from the last busy-idle change. This aroach, however, results in a Markov chain with a large two-dimensional state sace and thus has rohibitive comlexity. Our aroach is based on the imortant observation that,k =,, } at the beginning of each busy-idle cycle forms a Markov chain. We treat each busy-idle cycle as a single ste in a discrete-time Markov chain and average over the lengths of busy and idle eriods to comute the one-ste transition robability matrix P.Let the sequence of random variables {X k P k+ i,j =P X =j X k =i=p Y k I k =j X k =i. 3 Next, we consider a tyical busy-idle cycle and dro the index k to write P i,j =P Y I =j X = i = P Y v = j X = ip I = v v= [ ] = P Y v = j X = i, B =up B =u P I =v. v= u= Note that the term P Y v = j X = i, B = u in 4 deends on of the threshold olicy. Details for comuting P can be found in []. Assume that the steady-state distribution of the Markov chain is π =π,π,,π n,, whereπ n denotes the robability that there are n SU ackets at the beginning of a busy eriod. We can find π by solving the equation πp = π. Thus, the average number of SU ackets at the beginning of a busy-idle cycle is EX = iπ i. C. Calculation of Average Delay The average number of SU ackets in the system is N = EX + + X B + Y + + Y I. 5 μ B + μ I Following Little s formula [], the average delay is W =N/. Here, W excludes the time slot that an SU acket i= 4 is transmitted. In [], we show that W can be comuted using 6, where P Y n == π i P Y n = X = i,n= i=,,, is comuted in 4. D. Calculation of Collision Probability Given, an SU transmits during the t-th slot of an idle eriod if t and the number of ackets at the end of the t -th idle slot is greater than zero, i.e., Y t >. This transmission will result in a collision if the PU returns during the t-th slot, i.e., I = t. Hence, we obtain c = P I = tp Y t > EN t= = P I = t[ P Y t =], 7 EN t= where EN is the average number of PU ackets er busy eriod. Here, we have used the fact that at most one acket collision occurs within each busy-idle cycle. V. ANALYTICAL APPROXIMATIONS OF THRESHOLD POLICIES While in Section IV we rovided exact Markovian analysis of the threshold olices, the resulting analytical exressions for the delay and collision robability 6 and 7 take comlex forms. In this section, we will derive simler analytical aroximations to rovide closed-form exressions for the delay and collision robability. We first resent a useful lemma that is imortant for the analysis resented in this section. Lemma : Assume that there are n SU ackets at the beginning of an idle eriod. Then on average it takes n time slots for the SU queue length to first reach zero, assuming that the SU can transmit whenever the channel is idle and the idle eriod is sufficiently long to facilitate all SU transmissions. The roof of Lemma is straightforward. Hence, the roof is omitted for brevity. An imortant consequence of Lemma is that to ensure system stability, we must choose such that > n. Furthermore, the relation between, n,and the length of the idle eriod v, lays an imortant role in determining the SU queue length by the end of the idle eriod, as we will see from subsequent analysis. A. Aroximation of n = EY Following similar techniques of Section IV, here we conduct the erformance analysis over a tyical busy-idle cycle. We find that a useful quantity is n = EY, i.e., the average number of SU ackets at the beginning of an idle eriod. Clearly, the delay of a newly arrived SU acket in a busy-idle cycle is closely related to n. Lemma below resents a key equation for n that follows from the steady-state analysis of the dynamic system. Lemma : The solution to the following equation gives a good aroximation to n = EY. n μ B = + n n + v f I v dv + n f I v dv v f I v dv. 8

5 CHEN and LIU: DELAY PERFORMANCE OF THRESHOLD POLICIES FOR DYNAMIC SPECTRUM ACCESS 87 W = EX { νb μ B + + μ B μ I + P I = vv v μ B + μ I v= + v v + P I = v +v + v=+ v } + P I = v P Y n =v n+ P I = v P Y n =v n, 6 v= n= v=+ n= Proof of Lemma : When the system is in steady-state, we have n = EY =EX B =EX +μ B. Hence, we obtain EY I =EX =n μ B.Letmv, n = EY v Y = n. We can aroximate EY I by EY I + mv, n f I vdv = n f I vmv, n dv+ n f I vmv, n dv f I vmv, n dv. 9 Next, we comute mv, n for each integral term in 9. First, when v< n,wehavemv, n n + v because during an idle eriod of length v, on average there are a total of v new acket arrivals and v acket deartures. Second, when n <v<, wehavemv, n. This is because it follows from Lemma that on average the SU queue length reaches zero after n time slots. Each new acket that arrives afterwards will be transmitted during the next time slot, excet for the acket that arrives in the last slot of the idle eriod. This imlies that with robability there is one acket at the end of the idle eriod and with robability there is no acket left in the queue. Third, when <v, the SU ackets that are still in the queue by the end of the idle eriod are new arrivals from [,v]. Hence, we have mv, n v. We can solve 8 to obtain n, sometimes in closedform, as shown in the examles in Section V-D. The delay aroximation resented section V-B uses knowledge of n. average delay of an SU acket, denoted by W,as W = μ B + μ I W I + W B, where μ B +μ I is the average length of a busy-idle cycle. Next, we aim to find analytical aroximations of W I and W B.The main idea is to classify SU ackets according to their arrival time and then comute the average delay for each class of ackets resectively. Aroximation of W I : We find that the following three classes of ackets that arrive during an idle eriod contribute most significantly to W I. A acket is defined as a class acket if v > and x,v. Such a acket arrives after the SU has stoed transmission within the idle eriod. We aroximate d I x, v by d I x, v v x + x + μ B,wherev x is the residual idle time, x is the queueing delay due to acket arrivals in [,x], andμ B is the average delay incurred by the next busy eriod. Hence, the total average delay due to class SU ackets is given by L = v v d I x, v dx f I vdv μ B + + v f I vdv. B. Delay Aroximation To comute the delay of a tyical SU acket, we again carry out the comutation over a tyical busy-idle cycle. Since the SU arrival follows a Bernoulli rocess, a new SU acket may arrive equally likely in any of the SU slots within the busy-idle cycle. However, the average delay of this SU acket clearly deends on whether it arrives during the busy eriod, or the idle eriod, and also the secific time slot that it arrives. These lead to the following definitions. Let d I x, v and d B x, u denote the average delay of a acket that arrives x time-units after the start of an idle eriod of length v, or after the start of a busy eriod of length u, resectively. The total average delay due to acket arrivals in different slots of an idle eriod, or in that of a busy eriod, are given by W I = v d Ix, vdxf I vdv and W B = u d Bx, udxf B udu, resectively. We then aly the renewal theory [] to obtain an exression for the A acket is defined as a class acket if v> n and x n,. It follows from Lemma that this acket is likely to be transmitted within the idle eriod, and thus d I x, v n + x x = n + x. This yields L = = n n n n n n d I x, v dx f I vdv n + x dx f I vdv f I vdv. A acket is defined as a class 3 acket if v,. Because the length of the idle eriod is short, this acket might need to wait for one more busy-idle cycle for transmission. This n

6 88 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO. 7, JULY leads to d I x, v n + x + μ B. Thus, L 3 = = n n n v v d I x, v dx f I vdv [ n + μ B + x dx] f I vdv [n + μ B v + v ] f I vdv. 3 We then combine,, and 3 to obtain W I L + L + L 3. Aroximation of W B : We follow similar techniques to those used for estimating W I. For any acket that arrives x time-units after the start of a busy eriod of length u, d B x, u must include the average queueing delay n +x, wheren = EX =n μ B, and the residual busy time u x. Welet R B denote the associated delay R B = u n + x + u x dxf B udu = n μ B + + u f B udu. 4 When a acket is not transmitted in the current busy-idle cycle, for instance, if n + x > minv,, wherev is the length of the idle eriod following the current busy eriod, then d B x, u has to include additional delay due to the residual idle time beyond and the next busy eriod. The associated delay is denoted by R N. We consider three classes of ackets that contribute to R N and let R Ni denote the contribution of class i ackets to R N,wherei =,, 3. The classification of ackets and the corresonding delay are given by class : v<n <. R N n u class : v n, and x R N n v n u μ Bdx f Buduf Ivdv = μ B v n v n,u. n f Ivdv. 5 μ Bdx f Buduf Ivdv. 6 class 3: v, and x n,u. u R N3 μ B + v dxf Buduf Ivdv. 7 n n We combine 4 7 to obtain W B R B +R N +R N + R N3. Substituting this into, we have W L + L + L 3 + R B + R N + R N + R N3. μ B + μ I 8 C. Aroximation of Collision Probability It follows from Lemma that if the length of the idle eriod v is less than n, then most likely that the SU queue has not reached zero when the PU returns and a acket collision will occur. If v [ n, ], then a collision occurs with robability, because this is the robability that there is one SU acket in transmission when the PU returns. This yields n c f I vdv + f I vdv. 9 EN n D. Examles The aroximations of W and c given in 8 and 9 are alicable to general busy and idle distributions. Next, we resent several examles in which we obtain closed-form exressions of such aroximations. Examle : Fixed Busy Distribution and Uniform Idle Distribution. Assume that f I t follows a uniform distribution in [, μ I ], and the busy eriod is fixed to be μ B.Wesolve8 to obtain [ μi n 4 μ I ] +4μB μ I + μ I. For the delay aroximation 8, we aly 3 to obtain L μ I μ B μ I, μ I 4μ I n L μ I n, 4 μ I L 3 n n + μ B 4μ I n 3 μ I, and aly 4 7 to obtain R B n μ B ++ μ B, R N n μ B, μ I R N μ3 B, R N3 =. 4μ I The collision robability can be comuted from 9 as c μ I EN n +. 3 Examle : Exonential Busy Distribution and Uniform Idle Distribution. This examle differs from Examle only in the busy distribution. Hence,, and 3 remain the same, and is relaced by R B μ B + +n μ B, R N μ3 B e n μ B, μ I R N3 μ B μ I R N n μ B μ I, 4μ I + μ B μ I e n μ B. 4 Examle 3: Fixed Busy Distribution and Weibull Idle Distribution. We consider a Weibull idle distribution with f I t = t λ e t λ. We solve 8 to obtain n λ erfinv erfc λ + μ B πλ. 5 Here, erfx is the error function, erfinvx is the inverse error function, and erfcx is the comlementary error function. For

7 CHEN and LIU: DELAY PERFORMANCE OF THRESHOLD POLICIES FOR DYNAMIC SPECTRUM ACCESS 89 the delay aroximation 8, we aly 3 to obtain λe λ L μ πerfc λ I + μ Bμ I π.5.5 erfc λ, n n λ, L e L 3 μ I n + μ B λ π erf n λ n n e n λ μ I λ [ n + e λ λ ], 6 and aly 4 7 to obtain R B μ B + +n μ B,R N μ B n e λ,r N3 =, R N μ B μ B n + μ B + n e μ B +n λ + μ B n n + μ B e n λ π + μ B λ erf n λ erfμ B + n. 7 λ The collision robability is comuted from 9 c e n λ + e λ EN e λ. 8 VI. NUMERICAL RESULTS In this section, we resent numerical results to examine the erformance of the threshold olicies and the accuracy of the analysis. A. Simulation Setu We generate the PU traffic in continuous time, consisting of 7 consecutive busy-idle cycles. The length of each idle eriod is continuous and follows the df f I v. Assuming that each PU acket has unit length, the busy eriod takes an integer value equals the number of PU ackets in the busy eriod, obtained by rounding the continuous random variable B generated following f B u. Both the SU slot length and the SU acket length are set to be one. The SU acket arrival in each SU slot is Bernoulli with robability. The SU senses the channel only at the beginning of each SU slot to obtain I d and B d.given of the threshold olicy, the SU transmits when its queue is nonemty and I d. The SU acket delay is comuted by averaging over the delay exerienced by each SU acket transmitted over the entire simulation eriod. The simulated PU acket collision robability is evaluated following. From Section VI-B to VI-E, we assume erfect sensing with zero sensing time and error-free sensing outcome. Detailed simulation setu for the case of imerfect sensing can be found in Section VI-F. B. Comarison of Threshold Policy and MDP Policy In Fig., we comare the threshold olicy with the MDP olicy comuted from the discounted MDP formulation described in []. The busy eriod is fixed to be μ B =. The length of the idle eriod is uniformly distributed in [, 3] with mean μ I = 5. The caacity of this system is Delay W SU time slot Threshold olicy MDP olicy SU arrival rate Fig.. Comarisons of threshold olicy and MDP olicy for a fixed busy distribution and a uniform idle distribution. For each, wefind a threshold olicy and an MDP olicy such that c = η =.. queue length M Transmits under both olicies = 94 for threshold olicy Transmits under MDP olicy, does not transmit under threshold olicy line line does not transmit under either olicy idle time t SU time slot Fig. 3. Transmission regions of the MDP olicy and the threshold olicy for a fixed busy time distribution and a uniform idle distribution. Assume =.. The two olicies are found such that c = η =.. C =.4 for η =. [9]. For each SU acket arrival rate, we first determine for the threshold olicy such that c = η and then find delay W under this olicy. Using the MDP formulation, for each, we adjust the cost C m to find an MDP olicy so that c = η and evaluate its delay. In Fig., we lot the delay of threshold olicy and MDP olicy as a function of. It shows that the threshold olicy erforms very closely to MDP olicy for the entire range of considered. In Fig. 3, we comare the two-dimensional transmission regions of MDP olicy and threshold olicy for =.. The threshold olicy has =94. The MDP olicy is a function of both the elased idle time t and the queue length M. The SU transmits when t, M falls into the region to the left of line shown in Fig. 3. As oosed to the MDP olicy, the threshold olicy is indeendent of M and its transmission region is to the left of line corresonding to t =94. It is interesting to note that the corner oint of the MDP curve t, M =9, is very close to of the threshold olicy. While the transmission region of MDP olicy is larger than that of the threshold olicy, the two olicies yield similar delay erformance. This is because the robability that t, M

8 9 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO. 7, JULY Delay W SU time slot PU Collision Prob. c Markov chain analysis ex/unif Simulation ex/unif Delay arox. ex/unif Markov chain analysis fix/wbl Simulation fix/wbl Delay arox. fix/wbl Threshold SU time slot a Delay.5 x Threshold SU time slot b Collision robability Fig. 4. Performance of threshold olicies as a function of. Two grous of curves are resented. Consider an exonential busy distribution and a uniform idle distribution for =.. Comarisons of Markov chain analysis 6 and 7, analytical aroximations 8 and 9 based on, 3, 4, and simulation results. Consider a fixed busy distribution and a Weibull idle distribution for =.. Comarisons of Markov chain analysis 6 and 7, analytical aroximations 8 and 9 based on 6 8, and simulation results. The legend of sub-figure b is the same as that of subfigure a. belongs to the middle region between line and line is small. Its effect on the delay erformance is thus negligible. C. Accuracy of Markov Chain Analysis and Analytical Aroximations In Fig. 4 we examine the accuracy of the Markov chain analysis in Section IV and the analytical aroximations in Section V. Here, we fix and lot W and c as functions of. The curves for the Markov chain analysis are numerically evaluated from 6 for W and 7 for c. The aroximations for W and c are from 8 and 9, evaluated using closedform exressions resented in Section V-D. Two grous of curves are considered in Fig. 4. First, we consider an exonential busy distribution and a uniform idle distribution for =.. It shows that the Markov chain analysis matches the simulation results erfectly. A total of states is found to be sufficient to obtain accurate numerical results for Markov chain analysis. Following Examle in Section V-D, we Delay W SU time slot PU Collision Prob. c 3 Fixed busy dist. Uniform busy dist. Exonential busy dist. Weibull busy dist Threshold SU time slot.6 x a Delay Fixed busy dist. Uniform busy dist. Exonential busy dist. Weibull busy dist Threshold SU time slot b Collision robability Fig. 5. Performance of threshold olicies as a function of. Delay and collision robability comarisons of various busy distributions. Assume a uniform idle distribution and =.. evaluate the closed-form analytical aroximations for W and c. Both aroximations are very tight, yielding errors less than 3% 4%. Similar results hold for Examle, but are not resented here due to sace limitation. Second, we consider the fixed busy distribution and Weibull idle distribution. Since Weibull distribution yields a higher caacity of C =.3, we choose a higher =. to oerate near caacity. While the Markov chain analysis remains accurate, the analytical aroximations from Examle 3 become looser comared to that of the exonential busy distribution and uniform idle distribution. The error of the delay aroximation, as shown in Fig. 4 a, is roughly 5% excet for =66. Note that the delay increases raidly around this value of, andsome SU ackets might need to wait for more than two busy-idle cycles for transmission. This is not taken into account in the analysis of Section V, which may contribute to the inaccuracy of the aroximation at this oint. The error of the collision robability aroximation is about 8% in the case. D. The Imact of Busy Distribution In Fig. 5, we examine the effect of busy distribution on W and c. We consider four different busy distributions with the same mean: exonential, uniform, Weibull, and the fixed busy

9 CHEN and LIU: DELAY PERFORMANCE OF THRESHOLD POLICIES FOR DYNAMIC SPECTRUM ACCESS 9 Delay W SU time slot Exonential idle distribution Uniform idle distribution Weibull idle distribution * =.75 for uniform dist. * =.6 for exonential dist. * =.95 for Weibull dist SU arrival rate Fig. 6. Delay erformance of the threshold olicies as a function of. For each, we choose of the threshold olicy such that c = η =.. Assume a uniform busy distribution and various idle distributions. time. Fig. 5 a shows that the busy distribution affects W significantly. The exonential busy distribution and the fixed busy distribution induce the largest delay and the smallest delay, resectively. On the other hand, for the same, Fig.5 b shows that c changes only slightly with busy distributions. E. The Imact of Idle Distribution Next, we examine the effect of idle distribution on W. We assume a uniform busy distribution and consider three idle distributions with the same mean μ I = 5: uniform, Weibull, and exonential. For the first two idle distributions and for each, we determine such that c = η =.. For the exonential distribution, due to its memoryless roerty, it is otimal to use a greedy olicy, under which the SU transmits whenever the channel is sensed idle and the SU queue is nonemty. Given η =., the time caacity C =.6,.4,.3, for the exonential, uniform, and Weibull idle distribution, resectively. In Fig. 6, we lot the delay of the threshold olicy as a function of for η =.. For each idle distribution, there exists some such that when <, the threshold olicy becomes the greedy olicy. We find that =.6,.75,.95 for the exonential, uniform, and Weibull distribution, resectively. Fig. 6 shows that for these idle distributions, the delay of the threshold olicy is similar in the region < where the greedy olicy is otimal. For the exonential distribution, =.6 is the highest arrival rate such that c does not exceed η. In comarison, the caacity of the uniform distribution is higher. Therefore, when [.75,.4, a threshold olicy can be found to ensure that c = η at the cost of increased delay. We note that the delay of the threshold olicy increases raidly as aroaches C =.4. The Weibull distribution has the highest caacity. When [.95,.], the delay of the threshold olicy increases with, but at a slower rate than that of the uniform distribution. F. Imerfect Sensing The analysis develoed in this aer assumes erfect sensing, i.e., the sensing time is zero and the sensing outcome is error-free. In Fig. 7, we examine more realistic scenarios of imerfect sensing. The busy and idle distributions are uniform with μ B = and μ I = 5, resectively. The PU acket length is fixedtobems.eachsuslotisms long, in which 5% is for sensing, and 95% is for transmission. We first consider three imerfect sensing scenarios in which the miss detection robability = 3, and the false alarm robability γ f is.,., and., resectively. We set low in order to limit PU acket collisions. Due to the ossibility of false alarm, the SU will determine the transition from an idle eriod to a busy eriod only when, within an idle eriod, the PU channel is detected to be busy for several consecutive sensing eriods. Similarly, due to the ossibility of miss detection, the transition from a busy eriod to an idle eriod is determined only when, within a busy eriod, the PU channel is detected to be idle for a few consecutive sensing eriods. As shown in Fig. 7, both W and c decrease as γ f decreases. A fourth imerfect sensing scenario, in which = γ f =and the other system arameters are the same as the revious three scenarios, is also lotted as a erformance benchmark. This is the best erformance that one can achieve for the given system setu with nonzero sensing time. Fig. 7 shows that indeed the curves for = γ f =are very close to that of the analytical curves obtained from 8 and 9, which assume error-free sensing outcome and zero sensing time. We also observe from Fig. 7 b that for c, the analytical curve gives close aroximation to all four curves of imerfect sensing scenarios, and the largest ga is less than 6%. In comarison, imerfect sensing has a stronger effect on W.As shown in Fig. 7 a, the ga between the imerfect sensing curves and the analytical curve becomes more ronounced as γ f increases. VII. DISCUSSION ON MULTIPLE SUS In this section, we discuss the scenario where multile SUs share one PU channel. There has been a significant amount of work on various multile access mechanisms, such as slotted ALOHA, CSMA, ooling, and TDM, e.g., in [3], [4]. Here, in order to focus on the imact of delay analysis, we consider a modified TDM version. We assume that all SUs are synchronized. The SUs have a re-assigned rank, so that if all SUs have ackets to send, their multile access is in a TDM round-robin manner. Note that it requires only minor signaling to establish ranking and synchronization through a control channel. Existing literature in cognitive radio advocates dedicated control channels either virtual or hysical [5]. Assume that there are N SUs, numbered as {,,,N}. SU i is allocated time slots i + Nk,wherek =,,..., for all k such that i + Nk. To imrove channel utilization, we allow other SUs to use slots i + Nk when SU i has an emty queue. The rank of the SUs for slot i + Nk is i, i +,,N,,,,i, wheresui has the highest rank. To facilitate channel access, we divide each SU time slot into multile mini-slots, each with length α. Assume that there

10 9 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL., NO. 7, JULY Delay W SU time slot PU Collision Prob. c Analytical =, γ f = = 3, γ f =. = 3, γ f =. = 3, γ f = Threshold SU time slot.6 x a Delay Analytical =, γ f = = 3, γ f =. = 3, γ f =. = 3, γ f = Threshold SU time slot b Collision robability Delay W SU time slot PU Collision Prob. c Analytical N= α=.5, N=3 α=., N=3 α=.5, N= Threshold SU time slot x 3 a Delay Analytical N= α=.5, N=3 α=., N=3 α=.5, N= Threshold SU time slot b Collision robability Fig. 7. Performance of threshold olicies as a function of. Comarisons of delay and collision robability for various imerfect sensing scenarios and the analytical aroximations from 8 and 9 that assume erfect sensing. Assume a uniform idle distribution and a uniform busy distribution, =.. Fig. 8. Consider a uniform busy distribution with μ B = and a uniform idle distribution with μ I = 5. Assume =.. Performance comarisons of the single user case N =with multile SU case N =3under a roundrobin rotocol. The analytical aroximations 8 and 9 for N =are rovided as erformance benchmarks. are m SUs whose ranks are higher than SU j. ThenSUj is allowed to transmit starting from the beginning of the m+- th mini-slot, if none of the higher ranked SUs transmitted in the first m mini-slots. We also assume that each SU attemts to transmit at most once within an SU time slot, and thus if the first N mini-slots are idle, then the remainder of the SU slot will be idle. This round-robin rotocol requires that each SU erforms channel sensing not only at the beginning of each SU slot, but also at the beginning of each mini-slot, until the channel is sensed to be busy due to either an SU transmission or a PU transmission. For examle, consider N =3.Letthe length of an SU time slot be and the length of a mini-slot be α =.. Thefirst SU slot in an idle eriod is assigned to SU. The rank of the SUs is {,, 3}. If SU s queue is non-emty, then it transmits and uses the entire SU time slot. If SU s queue is emty, then after α, SU will sense the channel, and will transmit if the channel is idle and its queue is non-emty. If SU also has an emty queue, then after another α, SU 3 will sense the channel and will transmit in the remainder of the SU slot if the channel is idle. For the next SU slot within the same idle eriod, the rank of the SUs becomes {, 3, }. The rank of the SUs is reset to {,, 3} for the first SU slot in the next idle eriod. In Fig. 8, we comare the erformance of the round-robin multile SU rotocol N = 3 with that of the single SU case N =. We consider a uniform busy distribution with μ B = and a uniform idle distribution with μ I = 5. For both delay W and collision robability c,wevary to resent the analytical curve 8 and 9 derived for N =, simulation curves for N =,andforn =3with α =.5,.,.5. It shows that the analytical curves for N =remain good aroximations within % ofw and c under the multiuser round-robin rotocol. We observe that as shown in Fig. 8 a, W increases only slightly with increasing N and α. asshowninfig.8b, c decreases slightly with increasing N and α. These can be exlained as follows. For the case of N =, channel sensing is erformed only at the beginning of each SU slot. A collision occurs if the SU starts transmission after sensing the channel to be idle at the beginning of an SU slot, and the PU returns later during this time slot. For the multiuser case, it is ossible to avoid such collisions. For instance, during an SU time slot [, ], the PU returns at time.5. For the single user case, a collision occurs when the SU has a non-emty queue. For

11 CHEN and LIU: DELAY PERFORMANCE OF THRESHOLD POLICIES FOR DYNAMIC SPECTRUM ACCESS 93 the multiuser case, if α =. and the first ranked SU has an emty queue, then the second ranked SU will refrain from transmission since it senses the channel at time. and detects the PU transmission. Therefore, a collision is avoided at the exense of the deferred SU transmission. Since the robability of such events increases with α, we observe in Fig. 8 b that c decreases with increasing α. Another ossible aroach for multile SUs to share a single PU channel is to develo back-ressure-tye of algorithms [6]. Intuitively, users with longer queues will have higher riority of access. Back-ressure algorithms are likely to be throughut-otimal in our setting assuming aroriate multile access schemes. Along this line, one can rove queue stability of such algorithms e.g., through Lyaunov functions [], and there are various heuristics that can balance the tradeoff between delay and throughut. However, the delay of such an algorithm cannot be analyzed recisely as in our current aroach, to the best of our knowledge. VIII. CONCLUSIONS In this work, we roosed and analyzed threshold olicies to minimize the delay of the SU subject to a PU collision robability constraint. Such threshold olicies were shown to erform closely to the otimal olicy found through a discounted MDP formulation. A novel Markovian aroach was develoed to analyze the erformance of the threshold olicies. This aroach treats each PU busy-idle cycle as a one-ste transition in the Markov chain, which effectively reduces the dimension of the state sace to facilitate numerical comutations. We develod analytical exressions to aroximate the delay and collision robability of the threshold olicies under general busy and idle distributions. The accuracy of the roosed aroximations was confirmed numerically for several commonly used busy and idle distributions. Furthermore, we showed that the busy time distribution significantly imacts the delay of the SU, while the idle distribution largely determines the transmission threshold and collision robability. This is a dual observation of the results of [9], which showed that the PU idle time distribution determines the time caacity of the SU access. Future work includes extension of the erformance analysis to more general scenarios such as arbitrary SU arrival rocesses, multile SUs and multile PU channels. REFERENCES [] Q. Zhao and B. Sadler, A survey of dynamic sectrum access: signal rocessing, networking, and regulatory olicy, IEEE Signal Process. Mag., vol. 55, no. 5, , 7. [] S. Wang, J. Zhang, and L. Tong, Delay analysis for cognitive radio networks with random access: a fluid queue view,. [3] F. Borgonovo, M. Cesana, and L. Fratta, Throughut and delay bounds for cognitive transmissions, in Advances in Ad Hoc Networking, 8. [4] E. W. M. Wong and C. H. Foh, Analysis of cognitive radio sectrum access with finite user oulation, IEEE Commun. Lett., 9. [5] R. Urgaonkar and M. J. Neely, Oortunistic scheduling with reliability guarantees in cognitive radio networks, IEEE INFOCOM, Ar. 8. [6] S. Huang, X. Liu, and Z. Ding, Oortunistic sectrum access in cognitive radio networks, IEEE INFOCOM, Ar. 8. [7] Q. Zhao, S. Geirhofer, L. Tong, and B. M. Sadler, Otimal dynamic sectrum access via eriodic channel sensing, in Proc. Wireless Communications and Networking Conference, 7. [8] T. Shu, S. Cui, and M. Krunz, Medium access control for multichannel arallel transmission in cognitive radio networks, in Proc. IEEE GLOBECOM, Dec. 6. [9] S. Huang, X. Liu, and Z. Ding, Otimization of transmission strategies for oortunistic access in cognitive radio networks, IEEE Trans. Mobile Comuting, 9. [] L. Georgiadis, M. J. Neely, and L. Tassiulas, Resource Allocation and Cross-Layer Control in Wireless Networks, Foundations and Trends in Networking. [] R.-R. Chen and X. Liu, Delay erformance of threshold olicy for dynamic sectrum access. Available: liu/aer/rongrongmdp.df,. [] S. M. Ross, Introduction to Probability Models, 8th edition. Academic Press, 3. [3] J. W. Lee and J. Walrand, Zero collision random backoff algorithm, EECS Deartment, University of California, Berkeley, tech. re. UCB/EECS-7-63, May 7. [4] D. Bertsekas and R. Gallager, Data Networks. Prentice Hall, 987. [5] R. W. Brodersen, A. Wolisz, D. Cabric, S. M. Mishra, and D. Willkomm, CORVUS: a cognitive radio aroach for usage of virtual unlicensed sectrum, 4. [6] L. Tassiulas and A. Ehremides, Stability roerties of constrained queueing systems and scheduling olicies for maximum throughut in multiho radio networks, IEEE Trans. Automatic Control, vol. 37, no., , Dec. 99. Rong-Rong Chen received her Ph.D. degree in electrical and comuter engineering ECE from the University of Illinois at Urbana-Chamaign UIUC in 3. She is currently an assistant rofessor in the Deartment of ECE. at the University of Utah. Her main research interest is in communication systems and networks, with an emhasis on MIMO communication, statistical soft detection, underwater acoustic communication, and cognitive radio networks. She was the reciient of the M. E. Van Valkenburg Graduate Research Award for excellence in doctoral research in the Deartment of ECE at UIUC. She is a reciient of the restigious National Science Foundation NSF Faculty Early Career Develoment CAREER award in 6. Xin Liu received her Ph.D. degree in electrical engineering from Purdue University in. She is currently an associate rofessor in the Comuter Science Deartment at the University of California, Davis. Before joining UC Davis, she was a ostdoctoral research associate in the Coordinated Science Laboratory at UIUC. Her research is on wireless communication networks, with a focus on resource allocation and dynamic sectrum management. She received the Best Paer of year award of the Comuter Networks Journal in 3, NSF CAREER award in 5, the Outstanding Engineering Junior Faculty Award from the College of Engineering, University of California, Davis in 5.

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting On the Role of Finite Queues in Cooerative Cognitive Radio Networks with Energy Harvesting Mohamed A. Abd-Elmagid, Tamer Elatt, and Karim G. Seddik Wireless Intelligent Networks Center (WINC), Nile University,

More information

An Analysis of TCP over Random Access Satellite Links

An Analysis of TCP over Random Access Satellite Links An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance

More information

Age of Information: Whittle Index for Scheduling Stochastic Arrivals

Age of Information: Whittle Index for Scheduling Stochastic Arrivals Age of Information: Whittle Index for Scheduling Stochastic Arrivals Yu-Pin Hsu Deartment of Communication Engineering National Taiei University yuinhsu@mail.ntu.edu.tw arxiv:80.03422v2 [math.oc] 7 Ar

More information

Multi-Channel MAC Protocol for Full-Duplex Cognitive Radio Networks with Optimized Access Control and Load Balancing

Multi-Channel MAC Protocol for Full-Duplex Cognitive Radio Networks with Optimized Access Control and Load Balancing Multi-Channel MAC Protocol for Full-Dulex Cognitive Radio etworks with Otimized Access Control and Load Balancing Le Thanh Tan and Long Bao Le arxiv:.3v [cs.it] Feb Abstract In this aer, we roose a multi-channel

More information

Opportunistic Spectrum Access in Multiple Primary User Environments Under the Packet Collision Constraint

Opportunistic Spectrum Access in Multiple Primary User Environments Under the Packet Collision Constraint IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. X, NO. Y, 1 Oortunistic Sectrum Access in Multile Primary User Environments Under the Packet Collision Constraint Eric Jung, Student Member, IEEE, and Xin Liu,

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging 1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

Power Aware Wireless File Downloading: A Constrained Restless Bandit Approach

Power Aware Wireless File Downloading: A Constrained Restless Bandit Approach PROC. WIOP 204 Power Aware Wireless File Downloading: A Constrained Restless Bandit Aroach Xiaohan Wei and Michael J. Neely, Senior Member, IEEE Abstract his aer treats ower-aware throughut maximization

More information

Optimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI

Optimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI Otimal Power Control over Fading Cognitive Radio Channels by Exloiting Primary User CSI Rui Zhang Abstract arxiv:0804.67v2 [cs.it] 7 Feb 2009 This aer is concerned with sectrum sharing cognitive radio

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 On the Relationshi Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 Imad Antonios antoniosi1@southernct.edu CS Deartment MO117 Southern Connecticut State University 501 Crescent St.

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie Wireless Intelligent Networks Center WINC, Nile University,

More information

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies Online Aendix to Accomany AComarisonof Traditional and Oen-Access Aointment Scheduling Policies Lawrence W. Robinson Johnson Graduate School of Management Cornell University Ithaca, NY 14853-6201 lwr2@cornell.edu

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

Analysis of M/M/n/K Queue with Multiple Priorities

Analysis of M/M/n/K Queue with Multiple Priorities Analysis of M/M/n/K Queue with Multile Priorities Coyright, Sanjay K. Bose For a P-riority system, class P of highest riority Indeendent, Poisson arrival rocesses for each class with i as average arrival

More information

On Code Design for Simultaneous Energy and Information Transfer

On Code Design for Simultaneous Energy and Information Transfer On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter

More information

Approximate Dynamic Programming for Dynamic Capacity Allocation with Multiple Priority Levels

Approximate Dynamic Programming for Dynamic Capacity Allocation with Multiple Priority Levels Aroximate Dynamic Programming for Dynamic Caacity Allocation with Multile Priority Levels Alexander Erdelyi School of Oerations Research and Information Engineering, Cornell University, Ithaca, NY 14853,

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE)

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE) KAUST Reository Outage erformance of cognitive radio systems with Imroer Gaussian signaling Item tye Authors Erint version DOI Publisher Journal Rights Conference Paer Amin Osama; Abediseid Walid; Alouini

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications

Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Bartłomiej Błaszczyszyn Paul Muhlethaler Nadjib Achir INRIA/ENS INRIA Rocquencourt INRIA Rocquencourt

More information

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION O P E R A T I O N S R E S E A R C H A N D D E C I S I O N S No. 27 DOI:.5277/ord73 Nasrullah KHAN Muhammad ASLAM 2 Kyung-Jun KIM 3 Chi-Hyuck JUN 4 A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST

More information

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

Delay characterization of multi-hop transmission in a Poisson field of interference

Delay characterization of multi-hop transmission in a Poisson field of interference 1 Delay characterization of multi-ho transmission in a Poisson field of interference Kostas Stamatiou and Martin Haenggi, Senior Member, IEEE Abstract We evaluate the end-to-end delay of a multi-ho transmission

More information

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino

More information

Developing A Deterioration Probabilistic Model for Rail Wear

Developing A Deterioration Probabilistic Model for Rail Wear International Journal of Traffic and Transortation Engineering 2012, 1(2): 13-18 DOI: 10.5923/j.ijtte.20120102.02 Develoing A Deterioration Probabilistic Model for Rail Wear Jabbar-Ali Zakeri *, Shahrbanoo

More information

Supplementary Materials for Robust Estimation of the False Discovery Rate

Supplementary Materials for Robust Estimation of the False Discovery Rate Sulementary Materials for Robust Estimation of the False Discovery Rate Stan Pounds and Cheng Cheng This sulemental contains roofs regarding theoretical roerties of the roosed method (Section S1), rovides

More information

Optimism, Delay and (In)Efficiency in a Stochastic Model of Bargaining

Optimism, Delay and (In)Efficiency in a Stochastic Model of Bargaining Otimism, Delay and In)Efficiency in a Stochastic Model of Bargaining Juan Ortner Boston University Setember 10, 2012 Abstract I study a bilateral bargaining game in which the size of the surlus follows

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System Vol.7, No.7 (4),.37-38 htt://dx.doi.org/.457/ica.4.7.7.3 Robust Predictive Control of Inut Constraints and Interference Suression for Semi-Trailer System Zhao, Yang Electronic and Information Technology

More information

Anytime communication over the Gilbert-Eliot channel with noiseless feedback

Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anant Sahai, Salman Avestimehr, Paolo Minero Deartment of Electrical Engineering and Comuter Sciences University of California

More information

Signaled Queueing. Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT. Categories and Subject Descriptors. General Terms. Keywords

Signaled Queueing. Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT. Categories and Subject Descriptors. General Terms. Keywords Signaled Queueing Laura Brink, Robert Shorten, Jia Yuan Yu ABSTRACT Burstiness in queues where customers arrive indeendently leads to rush eriods when wait times are long. We roose a simle signaling scheme

More information

Discrete-time Geo/Geo/1 Queue with Negative Customers and Working Breakdowns

Discrete-time Geo/Geo/1 Queue with Negative Customers and Working Breakdowns Discrete-time GeoGeo1 Queue with Negative Customers and Working Breakdowns Tao Li and Liyuan Zhang Abstract This aer considers a discrete-time GeoGeo1 queue with server breakdowns and reairs. If the server

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

arxiv: v1 [physics.data-an] 26 Oct 2012

arxiv: v1 [physics.data-an] 26 Oct 2012 Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation

Paper C Exact Volume Balance Versus Exact Mass Balance in Compositional Reservoir Simulation Paer C Exact Volume Balance Versus Exact Mass Balance in Comositional Reservoir Simulation Submitted to Comutational Geosciences, December 2005. Exact Volume Balance Versus Exact Mass Balance in Comositional

More information

How to Estimate Expected Shortfall When Probabilities Are Known with Interval or Fuzzy Uncertainty

How to Estimate Expected Shortfall When Probabilities Are Known with Interval or Fuzzy Uncertainty How to Estimate Exected Shortfall When Probabilities Are Known with Interval or Fuzzy Uncertainty Christian Servin Information Technology Deartment El Paso Community College El Paso, TX 7995, USA cservin@gmail.com

More information

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels oname manuscrit o. will be inserted by the editor) Quantitative estimates of roagation of chaos for stochastic systems with W, kernels Pierre-Emmanuel Jabin Zhenfu Wang Received: date / Acceted: date Abstract

More information

Adaptive estimation with change detection for streaming data

Adaptive estimation with change detection for streaming data Adative estimation with change detection for streaming data A thesis resented for the degree of Doctor of Philosohy of the University of London and the Diloma of Imerial College by Dean Adam Bodenham Deartment

More information

SIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING. Ruhul SARKER. Xin YAO

SIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING. Ruhul SARKER. Xin YAO Yugoslav Journal of Oerations Research 13 (003), Number, 45-59 SIMULATED ANNEALING AND JOINT MANUFACTURING BATCH-SIZING Ruhul SARKER School of Comuter Science, The University of New South Wales, ADFA,

More information

VIBRATION ANALYSIS OF BEAMS WITH MULTIPLE CONSTRAINED LAYER DAMPING PATCHES

VIBRATION ANALYSIS OF BEAMS WITH MULTIPLE CONSTRAINED LAYER DAMPING PATCHES Journal of Sound and Vibration (998) 22(5), 78 85 VIBRATION ANALYSIS OF BEAMS WITH MULTIPLE CONSTRAINED LAYER DAMPING PATCHES Acoustics and Dynamics Laboratory, Deartment of Mechanical Engineering, The

More information

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of

More information

Algorithms for Air Traffic Flow Management under Stochastic Environments

Algorithms for Air Traffic Flow Management under Stochastic Environments Algorithms for Air Traffic Flow Management under Stochastic Environments Arnab Nilim and Laurent El Ghaoui Abstract A major ortion of the delay in the Air Traffic Management Systems (ATMS) in US arises

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data

Lower Confidence Bound for Process-Yield Index S pk with Autocorrelated Process Data Quality Technology & Quantitative Management Vol. 1, No.,. 51-65, 15 QTQM IAQM 15 Lower onfidence Bound for Process-Yield Index with Autocorrelated Process Data Fu-Kwun Wang * and Yeneneh Tamirat Deartment

More information

Spatial Outage Capacity of Poisson Bipolar Networks

Spatial Outage Capacity of Poisson Bipolar Networks Satial Outage Caacity of Poisson Biolar Networks Sanket S. Kalamkar and Martin Haenggi Deartment of Electrical Engineering, University of Notre Dame, Notre Dame, IN 46556, USA E-mail: skalamka@nd.edu,

More information

Pretest (Optional) Use as an additional pacing tool to guide instruction. August 21

Pretest (Optional) Use as an additional pacing tool to guide instruction. August 21 Trimester 1 Pretest (Otional) Use as an additional acing tool to guide instruction. August 21 Beyond the Basic Facts In Trimester 1, Grade 8 focus on multilication. Daily Unit 1: Rational vs. Irrational

More information

Statistical Multiplexing Gain of Link Scheduling Algorithms in QoS Networks (Short Version)

Statistical Multiplexing Gain of Link Scheduling Algorithms in QoS Networks (Short Version) 1 Statistical Multilexing Gain of Link Scheduling Algorithms in QoS Networks (Short Version) Technical Reort: University of Virginia, CS-99-23, July 1999 Robert Boorstyn Almut Burchard Jörg Liebeherr y

More information

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Asymptotically Optimal Simulation Allocation under Dependent Sampling Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS #A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,

More information

Characteristics of Beam-Based Flexure Modules

Characteristics of Beam-Based Flexure Modules Shorya Awtar e-mail: shorya@mit.edu Alexander H. Slocum e-mail: slocum@mit.edu Precision Engineering Research Grou, Massachusetts Institute of Technology, Cambridge, MA 039 Edi Sevincer Omega Advanced

More information

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces

Research Article An iterative Algorithm for Hemicontractive Mappings in Banach Spaces Abstract and Alied Analysis Volume 2012, Article ID 264103, 11 ages doi:10.1155/2012/264103 Research Article An iterative Algorithm for Hemicontractive Maings in Banach Saces Youli Yu, 1 Zhitao Wu, 2 and

More information

State Estimation with ARMarkov Models

State Estimation with ARMarkov Models Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,

More information

On Doob s Maximal Inequality for Brownian Motion

On Doob s Maximal Inequality for Brownian Motion Stochastic Process. Al. Vol. 69, No., 997, (-5) Research Reort No. 337, 995, Det. Theoret. Statist. Aarhus On Doob s Maximal Inequality for Brownian Motion S. E. GRAVERSEN and G. PESKIR If B = (B t ) t

More information

Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems

Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Hsiao-Lan Chiang, Tobias Kadur, and Gerhard Fettweis Vodafone Chair for Mobile Communications Technische Universität

More information

A MONOTONICITY RESULT FOR A G/GI/c QUEUE WITH BALKING OR RENEGING

A MONOTONICITY RESULT FOR A G/GI/c QUEUE WITH BALKING OR RENEGING J. Al. Prob. 43, 1201 1205 (2006) Printed in Israel Alied Probability Trust 2006 A MONOTONICITY RESULT FOR A G/GI/c QUEUE WITH BALKING OR RENEGING SERHAN ZIYA, University of North Carolina HAYRIYE AYHAN

More information

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment

More information

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators

An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators An Investigation on the Numerical Ill-conditioning of Hybrid State Estimators S. K. Mallik, Student Member, IEEE, S. Chakrabarti, Senior Member, IEEE, S. N. Singh, Senior Member, IEEE Deartment of Electrical

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

Mobility-Induced Service Migration in Mobile. Micro-Clouds

Mobility-Induced Service Migration in Mobile. Micro-Clouds arxiv:503054v [csdc] 7 Mar 205 Mobility-Induced Service Migration in Mobile Micro-Clouds Shiiang Wang, Rahul Urgaonkar, Ting He, Murtaza Zafer, Kevin Chan, and Kin K LeungTime Oerating after ossible Deartment

More information

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size

Some Unitary Space Time Codes From Sphere Packing Theory With Optimal Diversity Product of Code Size IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 5, NO., DECEMBER 4 336 Some Unitary Sace Time Codes From Shere Packing Theory With Otimal Diversity Product of Code Size Haiquan Wang, Genyuan Wang, and Xiang-Gen

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

Partial Identification in Triangular Systems of Equations with Binary Dependent Variables

Partial Identification in Triangular Systems of Equations with Binary Dependent Variables Partial Identification in Triangular Systems of Equations with Binary Deendent Variables Azeem M. Shaikh Deartment of Economics University of Chicago amshaikh@uchicago.edu Edward J. Vytlacil Deartment

More information

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating

More information

Traffic Engineering in a Multipoint-to-Point Network

Traffic Engineering in a Multipoint-to-Point Network 1 Traffic Engineering in a Multioint-to-Point Network Guillaume Urvoy-Keller, Gérard Hébuterne, and Yves Dallery Abstract The need to guarantee Quality of Service (QoS) to multimedia alications leads to

More information

Periodic scheduling 05/06/

Periodic scheduling 05/06/ Periodic scheduling T T or eriodic scheduling, the best that we can do is to design an algorithm which will always find a schedule if one exists. A scheduler is defined to be otimal iff it will find a

More information

A Simple Throughput Model for TCP Veno

A Simple Throughput Model for TCP Veno A Simle Throughut Model for TCP Veno Bin Zhou, Cheng Peng Fu, Dah-Ming Chiu, Chiew Tong Lau, and Lek Heng Ngoh School of Comuter Engineering, Nanyang Technological University, Singaore 639798 Email: {zhou00,

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

New Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms

New Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms New Schedulability Test Conditions for Non-reemtive Scheduling on Multirocessor Platforms Technical Reort May 2008 Nan Guan 1, Wang Yi 2, Zonghua Gu 3 and Ge Yu 1 1 Northeastern University, Shenyang, China

More information

Estimation of component redundancy in optimal age maintenance

Estimation of component redundancy in optimal age maintenance EURO MAINTENANCE 2012, Belgrade 14-16 May 2012 Proceedings of the 21 st International Congress on Maintenance and Asset Management Estimation of comonent redundancy in otimal age maintenance Jorge ioa

More information

A Bound on the Error of Cross Validation Using the Approximation and Estimation Rates, with Consequences for the Training-Test Split

A Bound on the Error of Cross Validation Using the Approximation and Estimation Rates, with Consequences for the Training-Test Split A Bound on the Error of Cross Validation Using the Aroximation and Estimation Rates, with Consequences for the Training-Test Slit Michael Kearns AT&T Bell Laboratories Murray Hill, NJ 7974 mkearns@research.att.com

More information

A Study of Active Queue Management for Congestion Control

A Study of Active Queue Management for Congestion Control A Study of Active Queue Management for Congestion Control Victor Firoiu vfiroiu@nortelnetworks.com Nortel Networks 3 Federal St. illerica, MA 1821 USA Marty orden mborden@tollbridgetech.com Tollridge Technologies

More information

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1)

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1) CERTAIN CLASSES OF FINITE SUMS THAT INVOLVE GENERALIZED FIBONACCI AND LUCAS NUMBERS The beautiful identity R.S. Melham Deartment of Mathematical Sciences, University of Technology, Sydney PO Box 23, Broadway,

More information

Generalized Coiflets: A New Family of Orthonormal Wavelets

Generalized Coiflets: A New Family of Orthonormal Wavelets Generalized Coiflets A New Family of Orthonormal Wavelets Dong Wei, Alan C Bovik, and Brian L Evans Laboratory for Image and Video Engineering Deartment of Electrical and Comuter Engineering The University

More information

1-way quantum finite automata: strengths, weaknesses and generalizations

1-way quantum finite automata: strengths, weaknesses and generalizations 1-way quantum finite automata: strengths, weaknesses and generalizations arxiv:quant-h/9802062v3 30 Se 1998 Andris Ambainis UC Berkeley Abstract Rūsiņš Freivalds University of Latvia We study 1-way quantum

More information

COMMUNICATION BETWEEN SHAREHOLDERS 1

COMMUNICATION BETWEEN SHAREHOLDERS 1 COMMUNICATION BTWN SHARHOLDRS 1 A B. O A : A D Lemma B.1. U to µ Z r 2 σ2 Z + σ2 X 2r ω 2 an additive constant that does not deend on a or θ, the agents ayoffs can be written as: 2r rθa ω2 + θ µ Y rcov

More information

ECE 6960: Adv. Random Processes & Applications Lecture Notes, Fall 2010

ECE 6960: Adv. Random Processes & Applications Lecture Notes, Fall 2010 ECE 6960: Adv. Random Processes & Alications Lecture Notes, Fall 2010 Lecture 16 Today: (1) Markov Processes, (2) Markov Chains, (3) State Classification Intro Please turn in H 6 today. Read Chater 11,

More information

Deriving Indicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V.

Deriving Indicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V. Deriving ndicator Direct and Cross Variograms from a Normal Scores Variogram Model (bigaus-full) David F. Machuca Mory and Clayton V. Deutsch Centre for Comutational Geostatistics Deartment of Civil &

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

3312 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 5, MAY 2016

3312 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 5, MAY 2016 3312 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 65, NO. 5, MAY 2016 L -Problem-Based Transmission Rate Allocation With Packet Loss and Power Metrics Over Satellite Networks Igor Bisio, Senior Member,

More information

Uniformly best wavenumber approximations by spatial central difference operators: An initial investigation

Uniformly best wavenumber approximations by spatial central difference operators: An initial investigation Uniformly best wavenumber aroximations by satial central difference oerators: An initial investigation Vitor Linders and Jan Nordström Abstract A characterisation theorem for best uniform wavenumber aroximations

More information

Performance of Round Robin Policies for Dynamic Multichannel Access

Performance of Round Robin Policies for Dynamic Multichannel Access Performance of Round Robin Policies for Dynamic Multichannel Access Changmian Wang, Bhaskar Krishnamachari, Qing Zhao and Geir E. Øien Norwegian University of Science and Technology, Norway, {changmia,

More information

Bilinear Entropy Expansion from the Decisional Linear Assumption

Bilinear Entropy Expansion from the Decisional Linear Assumption Bilinear Entroy Exansion from the Decisional Linear Assumtion Lucas Kowalczyk Columbia University luke@cs.columbia.edu Allison Bisho Lewko Columbia University alewko@cs.columbia.edu Abstract We develo

More information

arxiv: v3 [cs.pf] 26 Jul 2011

arxiv: v3 [cs.pf] 26 Jul 2011 Forever Young: Aging Control For Smarthones in Hybrid Networks Eitan Altman INRIA & University of Avignon, France Rachid El-Azouzi University of Avignon, France arxiv:1009.4733v3 [cs.pf] 26 Jul 2011 Daniel

More information

Session 5: Review of Classical Astrodynamics

Session 5: Review of Classical Astrodynamics Session 5: Review of Classical Astrodynamics In revious lectures we described in detail the rocess to find the otimal secific imulse for a articular situation. Among the mission requirements that serve

More information