DTN-Meteo: Forecasting DTN Performance under Heterogeneous Mobility
|
|
- Marilynn Reynolds
- 6 years ago
- Views:
Transcription
1 : Forecasting DTN Performance under Heterogeneous Mobility Andreea Picu Dr. Thrasyvoulos Spyropoulos Computer Engineering and Networks Laboratory (TIK) Communication Systems Group (CSG) June 21, 2012
2 1 Motivation & Goals 2 Markov Chain 3 Calculating In Practice 4 Assumptions Derivation In Practice 5 A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 2 of 29
3 Delay Tolerant Networks a.k.a. Opportunistic Networks always disconnected data exchange through node mobility nodes come within communication range contact connectivity graph = highly dynamic, disconnected A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 3 of 29
4 Greed Is Not a Sin in DTNs Sporadic, partial connectivity Highly dynamic graph Greedy algorithms for everything This present contact Potential future contacts *Proverb: A bird in hand is worth two in the bush. A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 4 of 29
5 Current DTN Analytical s A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 5 of 29
6 Current DTN Analytical s A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 5 of 29
7 Studies of Real Mobility A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 6 of 29
8 Using Real Mobility New Algorithms/Protocols (still greedy) E. Daly and M. Haahr Social network analysis for routing in disconnected delay-tolerant MANETs MobiHoc 2007 P. Hui, J. Crowcroft and E. Yoneki BubbleRap: Social-based Forwarding in Delay Tolerant Networks MobiHoc 2008 s (still very problem-specific) T. Spyropoulos, T. Turletti and K. Obraczka Routing in Delay-Tolerant Networks Comprising Heterogeneous Node Populations TMC 2009 A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 7 of 29
9 Unified for Optimization in DTNs Markov Chain Decouple mobility (contact probability matrix P c ij ) algorithms (most of the time greedy) to obtain correctness conditions on mobility scenario [Globecom 11] convergence probability and convergence delay [now] Illustrative examples: talk: Content Placement with limited replication paper: + Routing with limited replication (SimBet, BubbleRap) [WoWMoM 12]: Forced replication (i.e., epidemic protocols) A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 8 of 29
10 Content/service placement Markov Chain x = (1, 0, 1, 1, 1, 0,..., 0)( N L ) A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 9 of 29
11 Content/service placement Markov Chain x = (1, 0, 1, 1, 1, 0,..., 0)( N L ) A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 9 of 29
12 Example problem description Markov Chain Node state space S = {0, 1} Network state space A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 10 of 29
13 Example problem description Markov Chain Node state space S = {0, 1} Network state space Ω = {x x = (x 1, x 2,..., x N )}, x i S A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 10 of 29
14 Example problem description Markov Chain Node state space S = {0, 1} Network state space Ω = {x x = (x 1, x 2,..., x N )}, x i S A set of constraints N i=1 x i L A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 10 of 29
15 Example problem description Markov Chain Node state space S = {0, 1} Network state space Ω = {x x = (x 1, x 2,..., x N )}, x i S A set of constraints N i=1 x i L A utility function U x = N i=1 x i d i or U x = N i=1 x i U SimBet i or U x = N i=1 x i U BubbleRap i A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 10 of 29
16 Content/service placement Markov Chain x = (x 1, x 2,..., x N ) = (1, 0, 1, 1, 1, 0,..., 0)( N L ) A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 11 of 29
17 Content/service placement Markov Chain x = (x 1, x 2,..., x N ) = (1, 0, 1, 1, 1, 0,..., 0)( N L ) A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 11 of 29
18 Exploring the Solution Space Markov Chain δ(x, y) = 1{x i y i } 1 i N A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 12 of 29
19 Exploring the Solution Space Markov Chain δ(x, y) = 1{x i y i } 1 i N A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 12 of 29
20 Exploring the Solution Space Markov Chain δ(x, y) = 1{xi yi } 1 i N A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 12 of 29
21 Heterogeneous mobility Markov Chain Contact probability matrix: 0 p c 12 p c 1N P c p = c 21 0 p c 2N p c N1 0 p c ij estimated from pairwise intercontacts of (i, j) A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 13 of 29
22 Local Optimization Algorithms Markov Chain Transition probability p xy : 1 contact probability 2 acceptance probability A xy = 1{U x < U y } A xy = f(u x, U y ) p c ij A xy = 0 (greedy) (probabilistic) A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 14 of 29
23 Local Optimization Algorithms Markov Chain Transition probability p xy : 1 contact probability 2 acceptance probability A xy = 1{U x < U y } A xy = f(u x, U y ) p c ij A xy = 0 (greedy) (probabilistic) A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 14 of 29
24 Local Optimization Algorithms Markov Chain Transition probability p xy : 1 contact probability 2 acceptance probability A xy = 1{U x < U y } A xy = f(u x, U y ) p c ij A xy = 0 (greedy) (probabilistic) A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 14 of 29
25 Local Optimization Algorithms Markov Chain Transition probability p xy : 1 contact probability 2 acceptance probability A xy = 1{U x < U y } A xy = f(u x, U y ) p c ij A xy = 0 (greedy) (probabilistic) A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 14 of 29
26 Putting the pieces together Markov Chain Pieces of : 1 Mobility (heterogeneous) p c ij 2 Solution space (node & network) 3 Utilities 4 Algorithm A = A xy contact probability matrix P c = {p c ij } e.g. combinations of L nodes e.g., combinations e.g. node degree acceptance probability matrix A = {A xy } A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 15 of 29
27 The Markov Chain Markov Chain Complicated problem Transition matrix, P = {p xy } mobility algorithm P c A 0 p c 12 p c 1N 1 A x1x2 A x1xm p c 21 0 p c 2N A x2x1 1 A x2xm p c N1 0 A xm x 1 1 P = {p xy } = p c ij A xy A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 16 of 29
28 The Markov Chain Complicated problem Transition matrix, P = {p xy } Markov Chain P = p x1x1 p x1x2 p x1xm p x2x1 p x2x2 p x2xm p xm x 1 p xm x M P = {p xy } = p c ij A xy A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 16 of 29
29 Why Is This Useful? Markov Chain Correctness analysis [Globecom 11] Feasability of (mobility + algorithm) analysis [now] Achieve trade-off (e.g., delay vs. # copies) Tune parameters Assess performance A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 17 of 29
30 Recall Our Absorbing Markov Chain Complicated problem Transition matrix, P = {p xy } Calculating In Practice P = p x1x1 p x1x2 p x1xm p x2x1 p x2x2 p x2xm p xm x 1 p xm x M P = {p xy } = p c ij A xy A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 18 of 29
31 Transient Markov Chain Calculating In Practice P = TR LM Q R 1 R 2 0 I x TR LM x Fundamental matrix: N = (I Q) 1 A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 19 of 29
32 Probability Calculating In Practice L Optimum Best local max. pred. meas. pred. meas. ETH N/A N/A Infocom MIT TVCM TVCM Table: Absorption probabilities A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 20 of 29
33 Content Placement: Delays Calculating In Practice Expected delays pred. meas. Expected convergence delay eth info mit tvcm24 tvcm104 Traces Expected delays Expected convergence delay (local max.) pred. meas. eth info mit tvcm24 tvcm104 Traces Optimum states Local maxima A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 21 of 29
34 Routing: End-to-end Delays Calculating In Practice Expected delays Expected end to end delay pred. meas. eth info mit tvcm24 tvcm104 Traces Expected delays Expected end to end delay pred. meas. eth info mit tvcm24 tvcm104 Traces SimBet BubbleRap A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 22 of 29
35 The Limitation of Increased replication increased solution space Simplified model: Assumptions Derivation In Practice A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 23 of 29
36 Copies Are Indenpendent Assumptions Derivation In Practice L/N D ( 10 5 ) Table: Copy dependency vs. L to N ratio A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 24 of 29
37 Copies Are Indenpendent Assumptions Derivation In Practice L/N D ( 10 5 ) Table: Copy dependency vs. L to N ratio A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 24 of 29
38 Multi-copy Delay from Single-copy Results Routing: τ rt = E[T rt ] = E [min(t s1d,..., T sl d)]. (1) Assumptions Derivation In Practice Content Placement: τ cp = E[T cp ] = E [ L i=1 T(L i+1) i ]. (2) absorption times of finite MC s T si d and T (L i+1) i : phase-type distributions approximately exponential A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 25 of 29
39 Multi-copy Delay from Single-copy Results Routing: τ rt = E[T rt ] = E [min(t s1d,..., T sl d)]. (1) Assumptions Derivation In Practice Content Placement: τ cp = E[T cp ] = E [ L i=1 T(L i+1) i ]. (2) absorption times of finite MC s T si d and T (L i+1) i : phase-type distributions approximately exponential A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 25 of 29
40 Approximation Accuracy Assumptions Derivation In Practice Expected delays Expected convergence delay approx. pred. meas. Expected delays Expected end to end delay approx. pred. meas. 0 eth info mit tvcm24 tvcm104 Traces 0 eth info mit tvcm24 tvcm104 Traces Content Placement SimBet Routing A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 26 of 29
41 Conclusion New unified model for DTNs 1 st analytical predictions for utility-based algorithms and heterogeneous mobility is generic (see paper in WoWMoM 12) Practical value Local maxima small delivery ratio Tuning replication to achieve target performance Tuning utility function parameters A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 27 of 29
42 Mobility model Semi-Markov No exponential assumption More on generality... Implicitly limited replication Bounds on approximation errors A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 28 of 29
43 The End Thank you for your attention. Your questions, please. A. Picu, Dr. T. Spyropoulos Forecasting DTN Performance 29 of 29
Upper Bounds on Expected Hitting Times in Mostly-Covered Delay-Tolerant Networks
Upper Bounds on Expected Hitting Times in Mostly-Covered Delay-Tolerant Networks Max F. Brugger, Kyle Bradford, Samina Ehsan, Bechir Hamdaoui, Yevgeniy Kovchegov Oregon State University, Corvallis, OR
More informationMessage Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs
01 7th International ICST Conference on Communications and Networking in China (CHINACOM) Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs Jiajia Liu Tohoku University Sendai,
More informationCrossing Over the Bounded Domain: From Exponential To Power-law Intermeeting
Crossing Over the Bounded Domain: From Exponential To Power-law Intermeeting time in MANET Han Cai, Do Young Eun Department of Electrical and Computer Engineering North Carolina State University Motivation
More informationNetworks: space-time stochastic models for networks
Mobile and Delay Tolerant Networks: space-time stochastic models for networks Philippe Jacquet Alcatel-Lucent Bell Labs France Plan of the talk Short history of wireless networking Information in space-time
More informationData Loss Modeling and Analysis in Partially-Covered Delay-Tolerant Networks
Data Loss Modeling and Analysis in Partially-Covered Delay-Tolerant Networks Kyle Bradford, Max Brugger, Samina Ehsan, Bechir Hamdaoui, Yevgeniy Kovchegov Oregon State University, Corvallis, OR 9733 bradfork,bruggerm,ehsans,hamdaoub,kovchegy@onid.orst.edu
More informationTOUR: Time-sensitive Opportunistic Utility- based Routing in Delay Tolerant Networks
TEMPLE UNIVERSITY TOUR: Time-sensitive Opportunistic Utility- based Routing in Delay Tolerant Networks Mingjun Xiao a,b, Jie Wu b, Cong Liu c, and Liusheng Huang a a University of Science and Technology
More informationCORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO
CORRECTNESS OF A GOSSIP BASED MEMBERSHIP PROTOCOL BY (ANDRÉ ALLAVENA, ALAN DEMERS, JOHN E. HOPCROFT ) PRATIK TIMALSENA UNIVERSITY OF OSLO OUTLINE q Contribution of the paper q Gossip algorithm q The corrected
More informationOPTIMAL CACHING POLICY OF STOCHASTIC UPDATING INFORMATION IN DELAY TOLERANT NETWORKS. Yahui Wu, Mingxing Liu, Su Deng, Hongbin Huang.
Computing and Informatics, Vol. 33, 2014, 965 991 OPTIMAL CACHING POLICY OF STOCHASTIC UPDATING INFORMATION IN DELAY TOLERANT NETWORKS Yahui Wu, Mingxing Liu, Su Deng, Hongbin Huang Science and Technology
More informationMarkov Chains Absorption Hamid R. Rabiee
Markov Chains Absorption Hamid R. Rabiee Absorbing Markov Chain An absorbing state is one in which the probability that the process remains in that state once it enters the state is (i.e., p ii = ). A
More informationPerformance of Ad Hoc Networks with Two-Hop Relay Routing and Limited Packet Lifetime
Performance of Ad Hoc Networks with Two-Hop Relay Routing and Limited Packet Lifetime Ahmad Al Hanbali Philippe Nain and Eitan Altman INRIA B.P. 93 69 Sophia Antipolis Cedex France {aalhanbanainaltman}@sophia.inria.fr
More informationMassachusetts Institute of Technology Department of Electrical Engineering and Computer Science Algorithms For Inference Fall 2014
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms For Inference Fall 2014 Problem Set 3 Issued: Thursday, September 25, 2014 Due: Thursday,
More informationwithout use of a calculator
Summer 017 Dear Incoming Student, Congratulations on accepting the challenge of taking International Baccalaureate Mathematics Standard Level (IB Math SL). I have prepared this packet to give you additional
More informationDistributed Systems Gossip Algorithms
Distributed Systems Gossip Algorithms He Sun School of Informatics University of Edinburgh What is Gossip? Gossip algorithms In a gossip algorithm, each node in the network periodically exchanges information
More informationTemporal Reachability Graphs
Temporal Reachability Graphs John Whitbeck, Marcelo Dias de Amorim, Vania Conan and Jean-Loup Guillaume August 25th, 212 Intro : Contact Traces 2/16 Intro : Contact Traces 2/16 Intro : Contact Traces Time
More informationOptimal Routing on Delay Tolerant Grids
Optimal Routing on Delay Tolerant Grids Michael Keane Evangelos Kranakis Danny Krizanc Lata Narayanan Abstract Delay (or disruption) tolerant networks may be modeled as a Markovian evolving graph [1].
More informationIEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS VOL:4 NO:24 YEAR 2013
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS VOL:4 NO:24 YEAR 23 Geo-Community-Based Broadcasting for Data Dissemination in Mobile Social Networks Jialu Fan, Member, IEEE, Jiming Chen, Senior
More informationThe Markov Chain Monte Carlo Method
The Markov Chain Monte Carlo Method Idea: define an ergodic Markov chain whose stationary distribution is the desired probability distribution. Let X 0, X 1, X 2,..., X n be the run of the chain. The Markov
More informationNetwork Infusion to Infer Information Sources in Networks Soheil Feizi, Ken Duffy, Manolis Kellis, and Muriel Medard
Computer Science and Artificial Intelligence Laboratory Technical Report MIT-CSAIL-TR-214-28 December 2, 214 Network Infusion to Infer Information Sources in Networks Soheil Feizi, Ken Duffy, Manolis Kellis,
More informationStochastic Processes
Stochastic Processes 8.445 MIT, fall 20 Mid Term Exam Solutions October 27, 20 Your Name: Alberto De Sole Exercise Max Grade Grade 5 5 2 5 5 3 5 5 4 5 5 5 5 5 6 5 5 Total 30 30 Problem :. True / False
More informationGeocommunity-Based Broadcasting for Data Dissemination in Mobile Social Networks
734 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 4, APRIL 2013 Geocommunity-Based Broadcasting for Data Dissemination in Mobile Social Networks Jialu Fan, Member, IEEE, Jiming Chen,
More informationRisk sensitive optimal control framework applied to delay tolerant networks
Risk sensitive optimal control framework applied to delay tolerant networks Eitan Altman, Veeraruna Kavitha +, Francesco De Pellegrini, Vijay Kamble and Vivek Borkar Maestro group, INRIA, Sophia Antipolis,
More informationMIT Manufacturing Systems Analysis Lectures 6 9: Flow Lines
2.852 Manufacturing Systems Analysis 1/165 Copyright 2010 c Stanley B. Gershwin. MIT 2.852 Manufacturing Systems Analysis Lectures 6 9: Flow Lines Models That Can Be Analyzed Exactly Stanley B. Gershwin
More information1 Ways to Describe a Stochastic Process
purdue university cs 59000-nmc networks & matrix computations LECTURE NOTES David F. Gleich September 22, 2011 Scribe Notes: Debbie Perouli 1 Ways to Describe a Stochastic Process We will use the biased
More informationABSTRACT. Mobility is the most important factor in mobile ad-hoc networks (MANETs) and
ABSTRACT KIM, SUNGWON. Super-Diffusive Behavior in Human Mobility and Finding Relevant Models in Mobile Opportunistic Networks. (Under the direction of Professor Do Young Eun.) Mobility is the most important
More informationGrade: The remainder of this page has been left blank for your workings. VERSION D. Midterm D: Page 1 of 12
First Name: Student-No: Last Name: Section: Grade: The remainder of this page has been left blank for your workings. Midterm D: Page of 2 Indefinite Integrals. 9 marks Each part is worth marks. Please
More informationConnectivity in time-graphs
Final version of this manuscript appears in Pervasive and Mobile Computing 7 (2011) 160 171 Connectivity in time-graphs Utku Günay Acer a,, Petros Drineas b, Alhussein A. Abouzeid c a Alcatel-Lucent Bell
More informationInformation Dissemination in Social Networks under the Linear Threshold Model
Information Dissemination in Social Networks under the Linear Threshold Model Srinivasan Venkatramanan and Anurag Kumar Department of Electrical Communication Engineering, Indian Institute of Science,
More informationGraphical Models and Kernel Methods
Graphical Models and Kernel Methods Jerry Zhu Department of Computer Sciences University of Wisconsin Madison, USA MLSS June 17, 2014 1 / 123 Outline Graphical Models Probabilistic Inference Directed vs.
More information3.4 The Chain Rule. F (x) = f (g(x))g (x) Alternate way of thinking about it: If y = f(u) and u = g(x) where both are differentiable functions, then
3.4 The Chain Rule To find the derivative of a function that is the composition of two functions for which we already know the derivatives, we can use the Chain Rule. The Chain Rule: Suppose F (x) = f(g(x)).
More informationQueuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem. Wade Trappe
Queuing Networks: Burke s Theorem, Kleinrock s Approximation, and Jackson s Theorem Wade Trappe Lecture Overview Network of Queues Introduction Queues in Tandem roduct Form Solutions Burke s Theorem What
More information8.1 Concentration inequality for Gaussian random matrix (cont d)
MGMT 69: Topics in High-dimensional Data Analysis Falll 26 Lecture 8: Spectral clustering and Laplacian matrices Lecturer: Jiaming Xu Scribe: Hyun-Ju Oh and Taotao He, October 4, 26 Outline Concentration
More informationIntroduction to Restricted Boltzmann Machines
Introduction to Restricted Boltzmann Machines Ilija Bogunovic and Edo Collins EPFL {ilija.bogunovic,edo.collins}@epfl.ch October 13, 2014 Introduction Ingredients: 1. Probabilistic graphical models (undirected,
More informationDistributed Optimization over Networks Gossip-Based Algorithms
Distributed Optimization over Networks Gossip-Based Algorithms Angelia Nedić angelia@illinois.edu ISE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Outline Random
More informationMarkov Processes Hamid R. Rabiee
Markov Processes Hamid R. Rabiee Overview Markov Property Markov Chains Definition Stationary Property Paths in Markov Chains Classification of States Steady States in MCs. 2 Markov Property A discrete
More informationMixing in Product Spaces. Elchanan Mossel
Poincaré Recurrence Theorem Theorem (Poincaré, 1890) Let f : X X be a measure preserving transformation. Let E X measurable. Then P[x E : f n (x) / E, n > N(x)] = 0 Poincaré Recurrence Theorem Theorem
More informationThe decoupling assumption in large stochastic system analysis Talk at ECLT
The decoupling assumption in large stochastic system analysis Talk at ECLT Andrea Marin 1 1 Dipartimento di Scienze Ambientali, Informatica e Statistica Università Ca Foscari Venezia, Italy (University
More informationREVIEW OF DIFFERENTIAL CALCULUS
REVIEW OF DIFFERENTIAL CALCULUS DONU ARAPURA 1. Limits and continuity To simplify the statements, we will often stick to two variables, but everything holds with any number of variables. Let f(x, y) be
More informationSampling Good Motifs with Markov Chains
Sampling Good Motifs with Markov Chains Chris Peikert December 10, 2004 Abstract Markov chain Monte Carlo (MCMC) techniques have been used with some success in bioinformatics [LAB + 93]. However, these
More informationSome Definition and Example of Markov Chain
Some Definition and Example of Markov Chain Bowen Dai The Ohio State University April 5 th 2016 Introduction Definition and Notation Simple example of Markov Chain Aim Have some taste of Markov Chain and
More informationLecture 22: Graph-SLAM (2)
Lecture 22: Graph-SLAM (2) Dr. J.B. Hayet CENTRO DE INVESTIGACIÓN EN MATEMÁTICAS Abril 2014 J.B. Hayet Probabilistic robotics Abril 2014 1 / 35 Outline 1 Data association in Graph-SLAM 2 Improvements and
More informationOptimal Forwarding in Delay Tolerant Networks with Multiple Destinations
Optimal Forwarding in Delay Tolerant Networks with Multiple Destinations Chandramani Singh, Student Member, IEEE, Eitan Altman, Fellow, IEEE, Anurag Kumar, Fellow, IEEE, and Rajesh Sundaresan, Senior Member,
More informationDCS: Distributed Asynchronous Clock Synchronization in Delay Tolerant Networks
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS 1 DCS: Distributed Asynchronous Clock Synchronization in Delay Tolerant Networks Bong Jun Choi, Student Member, IEEE, Hao Liang, Student Member, IEEE,
More informationCoupling. 2/3/2010 and 2/5/2010
Coupling 2/3/2010 and 2/5/2010 1 Introduction Consider the move to middle shuffle where a card from the top is placed uniformly at random at a position in the deck. It is easy to see that this Markov Chain
More informationOutlines. Discrete Time Markov Chain (DTMC) Continuous Time Markov Chain (CTMC)
Markov Chains (2) Outlines Discrete Time Markov Chain (DTMC) Continuous Time Markov Chain (CTMC) 2 pj ( n) denotes the pmf of the random variable p ( n) P( X j) j We will only be concerned with homogenous
More informationLecture 15: MCMC Sanjeev Arora Elad Hazan. COS 402 Machine Learning and Artificial Intelligence Fall 2016
Lecture 15: MCMC Sanjeev Arora Elad Hazan COS 402 Machine Learning and Artificial Intelligence Fall 2016 Course progress Learning from examples Definition + fundamental theorem of statistical learning,
More informationProbabilistic Graphical Models
School of Computer Science Probabilistic Graphical Models Variational Inference II: Mean Field Method and Variational Principle Junming Yin Lecture 15, March 7, 2012 X 1 X 1 X 1 X 1 X 2 X 3 X 2 X 2 X 3
More informationMixing Times and Hitting Times
Mixing Times and Hitting Times David Aldous January 12, 2010 Old Results and Old Puzzles Levin-Peres-Wilmer give some history of the emergence of this Mixing Times topic in the early 1980s, and we nowadays
More informationD. Correct! This is the correct answer. It is found by dy/dx = (dy/dt)/(dx/dt).
Calculus II - Problem Solving Drill 4: Calculus for Parametric Equations Question No. of 0 Instructions: () Read the problem and answer choices carefully () Work the problems on paper as. Find dy/dx where
More informationOptimal Energy-Aware Epidemic Routing in DTNs
1 Optimal Energy-Aware Epidemic Routing in DTNs Soheil Eshghi, Member, IEEE, MHR. Khouzani, Saswati Sarkar, Senior Member, IEEE, Ness. Shroff, Fellow, IEEE, Santosh S. Venkatesh, Senior Member, IEEE Abstract
More informationThe query register and working memory together form the accessible memory, denoted H A. Thus the state of the algorithm is described by a vector
1 Query model In the quantum query model we wish to compute some function f and we access the input through queries. The complexity of f is the number of queries needed to compute f on a worst-case input
More information6 Evolution of Networks
last revised: March 2008 WARNING for Soc 376 students: This draft adopts the demography convention for transition matrices (i.e., transitions from column to row). 6 Evolution of Networks 6. Strategic network
More informationModeling with Itô Stochastic Differential Equations
Modeling with Itô Stochastic Differential Equations 2.4-2.6 E. Allen presentation by T. Perälä 27.0.2009 Postgraduate seminar on applied mathematics 2009 Outline Hilbert Space of Stochastic Processes (
More informationA Tunable Mechanism for Identifying Trusted Nodes in Large Scale Distributed Networks
A Tunable Mechanism for Identifying Trusted Nodes in Large Scale Distributed Networks Joydeep Chandra 1, Ingo Scholtes 2, Niloy Ganguly 1, Frank Schweitzer 2 1 - Dept. of Computer Science and Engineering,
More informationEE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing
EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a
More informationDIFFERENTIATION RULES
3 DIFFERENTIATION RULES DIFFERENTIATION RULES 3.6 Derivatives of Logarithmic Functions In this section, we: use implicit differentiation to find the derivatives of the logarithmic functions and, in particular,
More informationMATH The Chain Rule Fall 2016 A vector function of a vector variable is a function F: R n R m. In practice, if x 1, x n is the input,
MATH 20550 The Chain Rule Fall 2016 A vector function of a vector variable is a function F: R n R m. In practice, if x 1, x n is the input, F(x 1,, x n ) F 1 (x 1,, x n ),, F m (x 1,, x n ) where each
More informationcs/ee/ids 143 Communication Networks
cs/ee/ids 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also
More informationStatistics 150: Spring 2007
Statistics 150: Spring 2007 April 23, 2008 0-1 1 Limiting Probabilities If the discrete-time Markov chain with transition probabilities p ij is irreducible and positive recurrent; then the limiting probabilities
More informationTODAY, a considerable fraction of data requirements in
Simplifying Wireless Social Caching Mohammed Karmoose, Martina Cardone, and Christina Fragouli Abstract Social groups give the opportunity for a new form of caching. In this paper, we investigate how a
More informationMarkov basis for testing homogeneity of Markov chains
Markov basis for testing homogeneity of Markov chains Akimichi Takemura and Hisayuki Hara University of Tokyo July 6, 2009 Takemura and Hara (Univ. of Tokyo) Testing homogeneity of Markov chains July 6,
More informationA General Model for Store-carry-forward Routing Schemes with Multicast in Delay Tolerant Networks
A General Moel for Store-carry-forwar Routing Schemes with Multicast in Delay Tolerant Networks 2011 IEEE. Personal use of this material is permitte. Permission from IEEE must be obtaine for all other
More informationStochastic modelling of epidemic spread
Stochastic modelling of epidemic spread Julien Arino Centre for Research on Inner City Health St Michael s Hospital Toronto On leave from Department of Mathematics University of Manitoba Julien Arino@umanitoba.ca
More informationControlling Spreading Processes in Networks
Controlling Spreading Processes in Networks (or how to rapidly spread mutants throughout a geographic region) Lorenzo Zino DISMA Weekly Seminar (Seminari Cadenzati - Progetto Eccellenza) July, 08 Why to
More informationProbabilistic Models for Sequence Labeling
Probabilistic Models for Sequence Labeling Besnik Fetahu June 9, 2011 Besnik Fetahu () Probabilistic Models for Sequence Labeling June 9, 2011 1 / 26 Background & Motivation Problem introduction Generative
More informationIit Istituto di Informatica e Telematica
C Consiglio Nazionale delle Ricerche Modelling inter-contact times in human social pervasive networks A. Passarella, M. Conti, C. Boldrini, R. Dunbar IIT TR-08/2011 Technical report giugno 2011 Iit Istituto
More informationRouting. Topics: 6.976/ESD.937 1
Routing Topics: Definition Architecture for routing data plane algorithm Current routing algorithm control plane algorithm Optimal routing algorithm known algorithms and implementation issues new solution
More informationImplicit Differentiation
Implicit Differentiation Sometimes we have a curve in the plane defined by a function Fxy= (, ) 0 (1) that involves both x and y, possibly in complicated ways. Examples. We show below the graphs of the
More informationForward Correction and Fountain Codes in Delay Tolerant Networks
Forward Correction and Fountain Codes in Delay Tolerant Networks Eitan Altman INRIA, 24 Route des Lucioles, 692 Sophia-Antipolis Cedex, France eitan.altman@sophia.inria.fr Francesco De Pellegrini CREATE-NET,
More informationInfinitely iterated Brownian motion
Mathematics department Uppsala University (Joint work with Nicolas Curien) This talk was given in June 2013, at the Mittag-Leffler Institute in Stockholm, as part of the Symposium in honour of Olav Kallenberg
More information2.6 Logarithmic Functions. Inverse Functions. Question: What is the relationship between f(x) = x 2 and g(x) = x?
Inverse Functions Question: What is the relationship between f(x) = x 3 and g(x) = 3 x? Question: What is the relationship between f(x) = x 2 and g(x) = x? Definition (One-to-One Function) A function f
More informationLecture 7. We can regard (p(i, j)) as defining a (maybe infinite) matrix P. Then a basic fact is
MARKOV CHAINS What I will talk about in class is pretty close to Durrett Chapter 5 sections 1-5. We stick to the countable state case, except where otherwise mentioned. Lecture 7. We can regard (p(i, j))
More informationOptimal Monotone Forwarding Policies in Delay Tolerant Mobile Ad Hoc Networks with Multiple Classes of Nodes
Optimal onotone Forwarding Policies in Delay Tolerant obile Ad Hoc Networks with ultiple Classes of Nodes Francesco De Pellegrini, Eitan Altman, Tamer Basar To cite this version: Francesco De Pellegrini,
More informationAt the boundary states, we take the same rules except we forbid leaving the state space, so,.
Birth-death chains Monday, October 19, 2015 2:22 PM Example: Birth-Death Chain State space From any state we allow the following transitions: with probability (birth) with probability (death) with probability
More informationDynamic Power Allocation and Routing for Time Varying Wireless Networks
Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,
More informationImplicit Differentiation and Inverse Trigonometric Functions
Implicit Differentiation an Inverse Trigonometric Functions MATH 161 Calculus I J. Robert Buchanan Department of Mathematics Summer 2018 Explicit vs. Implicit Functions 0.5 1 y 0.0 y 2 0.5 3 4 1.0 0.5
More information9 Forward-backward algorithm, sum-product on factor graphs
Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.438 Algorithms For Inference Fall 2014 9 Forward-backward algorithm, sum-product on factor graphs The previous
More informationGibbsian On-Line Distributed Content Caching Strategy for Cellular Networks
Gibbsian On-Line Distributed Content Caching Strategy for Cellular Networks Arpan Chattopadhyay, Bartłomiej Błaszczyszyn, H. Paul Keeler arxiv:1610.02318v2 [cs.ni] 6 Nov 2017 Abstract In this paper, we
More informationConditional Random Field
Introduction Linear-Chain General Specific Implementations Conclusions Corso di Elaborazione del Linguaggio Naturale Pisa, May, 2011 Introduction Linear-Chain General Specific Implementations Conclusions
More informationBayesian networks approximation
Bayesian networks approximation Eric Fabre ANR StochMC, Feb. 13, 2014 Outline 1 Motivation 2 Formalization 3 Triangulated graphs & I-projections 4 Successive approximations 5 Best graph selection 6 Conclusion
More informationContinuous Time Markov Chain Examples
Continuous Markov Chain Examples Example Consider a continuous time Markov chain on S {,, } The Markov chain is a model that describes the current status of a match between two particular contestants:
More informationWorksheet # 2: Higher Order Linear ODEs (SOLUTIONS)
Name: November 8, 011 Worksheet # : Higher Order Linear ODEs (SOLUTIONS) 1. A set of n-functions f 1, f,..., f n are linearly independent on an interval I if the only way that c 1 f 1 (t) + c f (t) +...
More informationThe SIS and SIR stochastic epidemic models revisited
The SIS and SIR stochastic epidemic models revisited Jesús Artalejo Faculty of Mathematics, University Complutense of Madrid Madrid, Spain jesus_artalejomat.ucm.es BCAM Talk, June 16, 2011 Talk Schedule
More informationOverview and comparison of random walk based techniques for estimating network averages
Overview and comparison of random walk based techniques for estimating network averages Konstantin Avrachenkov (Inria, France) Ribno COSTNET Conference, 21 Sept. 2016 Motivation Analysing (online) social
More informationCOMS 4721: Machine Learning for Data Science Lecture 20, 4/11/2017
COMS 4721: Machine Learning for Data Science Lecture 20, 4/11/2017 Prof. John Paisley Department of Electrical Engineering & Data Science Institute Columbia University SEQUENTIAL DATA So far, when thinking
More informationSection 3.5: Implicit Differentiation
Section 3.5: Implicit Differentiation In the previous sections, we considered the problem of finding the slopes of the tangent line to a given function y = f(x). The idea of a tangent line however is not
More informationSocial Influence in Online Social Networks. Epidemiological Models. Epidemic Process
Social Influence in Online Social Networks Toward Understanding Spatial Dependence on Epidemic Thresholds in Networks Dr. Zesheng Chen Viral marketing ( word-of-mouth ) Blog information cascading Rumor
More informationPreliminaries Lectures. Dr. Abdulla Eid. Department of Mathematics MATHS 101: Calculus I
Preliminaries 2 1 2 Lectures Department of Mathematics http://www.abdullaeid.net/maths101 MATHS 101: Calculus I (University of Bahrain) Prelim 1 / 35 Pre Calculus MATHS 101: Calculus MATHS 101 is all about
More informationMAT1300 Final Review. Pieter Hofstra. December 4, 2009
December 4, 2009 Sections from the book to study (8th Edition) Chapter 0: 0.1: Real line and Order 0.2: Absolute Value and Distance 0.3: Exponents and Radicals 0.4: Factoring Polynomials (you may omit
More informationAC analysis. EE 201 AC analysis 1
AC analysis Now we turn to circuits with sinusoidal sources. Earlier, we had a brief look at sinusoids, but now we will add in capacitors and inductors, making the story much more interesting. What are
More informationA Study on Performance Analysis of Queuing System with Multiple Heterogeneous Servers
UNIVERSITY OF OKLAHOMA GENERAL EXAM REPORT A Study on Performance Analysis of Queuing System with Multiple Heterogeneous Servers Prepared by HUSNU SANER NARMAN husnu@ou.edu based on the papers 1) F. S.
More informationWorksheet Week 1 Review of Chapter 5, from Definition of integral to Substitution method
Worksheet Week Review of Chapter 5, from Definition of integral to Substitution method This worksheet is for improvement of your mathematical writing skill. Writing using correct mathematical expressions
More informationRecap. Probability, stochastic processes, Markov chains. ELEC-C7210 Modeling and analysis of communication networks
Recap Probability, stochastic processes, Markov chains ELEC-C7210 Modeling and analysis of communication networks 1 Recap: Probability theory important distributions Discrete distributions Geometric distribution
More informationReview Guideline for Final
Review Guideline for Final Here is the outline of the required skills for the final exam. Please read it carefully and find some corresponding homework problems in the corresponding sections to practice.
More informationReading for Lecture 13 Release v10
Reading for Lecture 13 Release v10 Christopher Lee November 15, 2011 Contents 1 Evolutionary Trees i 1.1 Evolution as a Markov Process...................................... ii 1.2 Rooted vs. Unrooted Trees........................................
More informationFinite Markov Information-Exchange processes
Finite Markov Information-Exchange processes David Aldous February 2, 2011 Course web site: Google Aldous STAT 260. Style of course Big Picture thousands of papers from different disciplines (statistical
More informationDynamic interpretation of eigenvectors
EE263 Autumn 2015 S. Boyd and S. Lall Dynamic interpretation of eigenvectors invariant sets complex eigenvectors & invariant planes left eigenvectors modal form discrete-time stability 1 Dynamic interpretation
More informationExponential and Logarithmic Functions. Copyright Cengage Learning. All rights reserved.
Exponential and Logarithmic Functions Copyright Cengage Learning. All rights reserved. 4.5 Exponential and Logarithmic Equations Copyright Cengage Learning. All rights reserved. Objectives Exponential
More information3 Algebraic Methods. we can differentiate both sides implicitly to obtain a differential equation involving x and y:
3 Algebraic Methods b The first appearance of the equation E Mc 2 in Einstein s handwritten notes. So far, the only general class of differential equations that we know how to solve are directly integrable
More informationReducing The Computational Cost of Bayesian Indoor Positioning Systems
Reducing The Computational Cost of Bayesian Indoor Positioning Systems Konstantinos Kleisouris, Richard P. Martin Computer Science Department Rutgers University WINLAB Research Review May 15 th, 2006 Motivation
More information0.1 Naive formulation of PageRank
PageRank is a ranking system designed to find the best pages on the web. A webpage is considered good if it is endorsed (i.e. linked to) by other good webpages. The more webpages link to it, and the more
More information