CMSC 858F: Algorithmic Game Theory Fall 2010 BGP and Interdomain Routing
|
|
- Aleesha Watson
- 5 years ago
- Views:
Transcription
1 CMSC 858F: Algorithmic Game Theory Fall 2010 BGP an Interomain Routing Instructor: Mohamma T. Hajiaghayi Scribe: Yuk Hei Chan November 3, Overview In this lecture, we cover BGP (Borer Gateway Protocol) an interomain routing, an iscuss their relation to game theory. 2 Introuction The Internet can be viewe as a collection of clous, where each clou is an autonomous system (AS), a network (or a set of networks) that is uner a single aministration. For example, the whole UMD network can be an AS, while for larger corporations like AT&T, the whole corporate network can be ivie into several ASes, say AT&T California, AT&T Texas, an so on. Each AS has an officially registere AS number (ASN). Currently (as of 2010) there are over 35,000 registere ASNs in use. IGP (Interior Gateway Protocol) is use insie one AS. It is use to figure out how o to route within an AS. IGRP (Interior Gateway Routing Protocol) an OSPF (Open Shortest Path First) are use as an IGP. They are istancebase policies. IGRP, together with its enhance version, EIGRP (Enhance IGRP), are Bellman-For base protocols. They are istance-vector routing protocols. In each router, there is a routing table which is a vector of size n (n is the number of routers in the AS). This vector inicates the istance to other routers in the AS, as well as the next hop neighbor to sen the packet to. The router oes not possess the full information about the network topology. The istance-vector is avertise to its neighbors to perform upates to the routing table. IGRP an EIGRP are supporte by Cisco routers. OSPF, on the other han, is a link-state routing protocol. It saves the current state (ajacency matrix) of the whole worl (which is the whole AS). 1
2 It is a Dijkstra base protocol an is more ominant. The ajacency matrix is upate with the istance / capacity of the router s links. It is more global compare to EIGRP. If there are several shortest paths, it ivies the payloa into parts an utilize all shortest paths so it is faster. OSPF is also supporte in Cisco routers. In upating the istance metrics, we assume metricity (or triangle inequality), i.e. (a, c) (a, b) + (b, c) for all router a, b an c in the AS. BGP (Borer Gateway Protocol) is the sole protocol use for routing between omains. It replace EGP (Exterior Gateway Protocol) since 1994 an BGP version 4 is now the accepte stanar. It allows each AS to efine its own preference for routing policy. The policy oes not nee to ahere to a istance-base policy like the ones in Interior Gateway Protocol (IGP) metrics an Exterior Gateway Protocol (EGP). In BGP, each AS becomes a noe. By making sure the AS number oes not appear in a path more than once, loops are prevente. The analysis of the robustness of policy choices in BGP has implication towars the overall efficiency an the functionality of the Internet. Also, stability correspon to Nash equilibria an that s why we stuy BGP. 3 Theoretical Moel We moel the whole system as an unirecte graph on ASes, where each AS is a noe an we want to fin some route to the estination. The goal is to esign mechanism so as to have goo behavior. Consier the BGP routing mechanism where is the estination: 1. avertise itself 2. For all router v : Iteratively receives upates about path to Receives status upates Choose the best path an upate the forwaring table (accoring to some policy) Announce the best path to its neighbors similar to IGRP As a simple example, noe i (i = 1, 2, 3) prefers the route i(i + 1) to i to the estination : Let s say at the beginning, 3 picks the route 3 (as there are currently no paths chosen). Then, 2, on seeing the choice of 3, picks the route 23 (since 23 is preferre by 2 to the route 2). 1 picks the route 1 (Figure 3, left). Then 3, on seeing the choice of 1, changes its min an picks the route 31. Next, seeing that the route 23 is gone, 2 has to pick the route 2 (Figure 3, right). In turn, 1 sees the opportunity to change is route to 12, which forces 3 to change its choice. This switching among route on each router s preference list goes on forever which means the system is not stable. 2
3 3 31 Preference 3 3 list of routes Figure 1: Not all choices of preference list lea to stable paths. 4 The Stable Path Problem (SPP) The stable path problem (SPP) is as follows: Input: an unirecte graph G = (V, E). For each v V, P v is the set of permitte (simple) paths from v to the estination vertex. For each v V, there is a ranking function λ v efine over P v. If λ v (P 1 ) < λ v (P 2 ) then P 2 is a more preferre permitte path than P 1. Empty path ɛ P v is permitte an ranke lowest: λ v (ɛ) = 0, while λ v (P) > 0 for P ɛ. P 1, P 2 P v = λ v (P 1 ) λ v (P 2 ). (each path receives a istinct ranking) If the en point of a path P is the same as the start point of a path Q, the concatenation of the two paths is enote by PQ. If P = (1, 2) an Q = (2, 3) then PQ = (1, 2, 3). Note that ɛp = Pɛ = P. A path assignment is a function Π that maps each noe u V to a path Π(u) P u (with the special case Π() = ()). Initially Π(u) = ɛ which means u is not assigne a path to the estination. The set of paths choices(π, u) for u = is {()} an {(u, v)π(v) {u, v} E} P u otherwise. This represents all possible permitte paths at u that can be forme by extening the paths assigne to neighbors of u. Given a noe u, suppose W is a subset of the permitte paths P u such that each path in W has a istinct next hop. Then the best path in W is efine to be best(w, u) = P W with maximal λ u (P) for W an ɛ otherwise. The path assignment Π is stable at noe u if Π(u) = best(choices(π, u), u). Note that if Π is stable at noe u an Π(u) = ɛ, then the set of choices at u must be empty. The path assignment Π is stable if it is stable at each noe u. Essentially, Π = (P 1,..., P n ) where Π(u) = P u (assume 0 is the estination). If Π is stable an Π(u) = (u, w)p, then Π(w) = P. Hence, any stable assignment efines a tree roote at the estination (each noe has one outgoing ege that points towars the estination), although it is not always the case that it is a shortest path tree. 3
4 u n 1 R n 1 Q n 1 u 0 Q 0 R 0 u 1 0 Q 1 R 1 0 Q 2 u 2 Figure 2: (Left) A isagree gaget; (Right) A ispute wheel. The stable paths problem S = (G, P = v P v, λ) is solvable if there is a stable path assignment. The example in Figure 3 oes not have a stable path assignment. Theorem 1 (Griffin, Shepher, Wilfong, TON 2002) SPP is NP-Complete (prove by reucing it to 3-SAT). When oes SPP amit a unique solution? Let s look at a configuration with more than one solution. A isagree gaget is shown in Figure 2, left. In this configuration, there are 2 stable paths, namely (2, 1, 0) an (1, 2, 0). The isagree gaget can be generalize into a ispute wheel, as shown in Figure 2, right: 1. A rim path R i is a path from u i to u i+1 2. Spoke path Q i P u i 3. R i Q i+1 P u i 4. λ u i (Q i ) < λ u i (R i Q i+1 ) Theorem 2 If the stable path problem S has no ispute wheel configuration, then there is a unique solution. Note that if S has no ispute wheel, then it is solvable. Roughly speaking, having no ispute wheel implies safety an robustness. There are two types of relationship between entities on the Internet, namely provier-customer an peer-to-peer (Figure 3). Gao-Rexfor conition is a reasonable assumption in the context of connectivity of the Internet, which states if there is no customer-provier (irecte) cycle, then there is no ispute wheel configuration, which implies a stable assignment. We can achieve this by filtering of paths, e.g. not avertising your peers to your provier. We can efine a game such that Nash equilibria of the game are precisely the stable solutions in the equivalent SPP formulation. 4
5 Peers Proviers Peers Customers Figure 3: Provier-customer relationship (soli line) an peer-to-peer relationship (ashe line). V i P 2 u 2 u u 1 D i Figure 4: A consistent path. 5 Greey Algorithm in the Absence of Dispute Wheel In the absence of ispute wheel, a greey algorithm that is base on the iea of expaning the tree can be use to fin the solution to the SPP. Starting with V 0, which contains only the estination 0, we construct larger an larger set V i, such that {0} = V 0 V 1 V k, an for v V i, Π(v) V i (i.e. the whole path stays insie V i ). If u V V i an P P u, then P is sai to be consistent with current (partial) Π i if P = P 1 (u 1, u 2 )P 2, where P 1 is a path in the igraph inuce by V V i, u 2 V i, u 1 V V i, {u 1, u 2 } E an P 2 Π(u 2 ) (Figure 4). Call a path P a irect path to V i if P 1 = (in this case u = u 1 ). Let D i be the set of noes with irect path to V i. Assuming every noe has a non-empty permitte path to the origin, D i is non-empty. Let H i D i be the set of vertices u such that a irect path of u is preferre among all consistent paths of u. For the greey algorithm to work, we want H i to be non-empty at each iteration. What if H i = but D i? Since u 0 D i H i, there is a vertex u 1 V V i an path R 0 V V i from u 0 to u 1, such that {u 1, v 1 } E, v 1 V i an P i (v 1 ) Π(v 1 ). Let the path from u 0 to a vertex in V i an on to the estination be Q 0. Since Q 0 is not the preferre path, we have λ(r 0 Q 1 ) > λ(q 0 ), where R 0 is a path in V V i that leas from u 0 to u 1, an Q 1 is a path from u 1 to v 1 an on to the estination (Figure 5). Then consier u 1. Again since 5
6 Q 0 v 0 u 0 Q 1 v 1 R 0 V i u 1 Figure 5: The first step to a ispute wheel. u 1 D i H i, there exists u 2 V V i, R 1 V V i from u 1 to u 2, Q 2, v 2 V i with {u 2, v 2 } E an λ(r 1 Q 2 ) > λ(q 1 ). The argument continues an eventually forms a ispute wheel (although u 0 may not involve in the ispute wheel). This shows that H i an proves that the greey algorithm works in the absence of ispute wheel. References [1] Timothy G. Griffin, F. Bruce Shepher, Goron Wilfong. The stable paths problem an interomain routing. IEEE/ACM Transactions on Networking (TON), Vol. 10(2), [2] L. Gao, J. Rexfor. Stable Internet Routing Without Global Coorination. ACM SIGMETRICS, June
Lecture 22. Lecturer: Michel X. Goemans Scribe: Alantha Newman (2004), Ankur Moitra (2009)
8.438 Avance Combinatorial Optimization Lecture Lecturer: Michel X. Goemans Scribe: Alantha Newman (004), Ankur Moitra (009) MultiFlows an Disjoint Paths Here we will survey a number of variants of isjoint
More informationcs/ee/ids 143 Communication Networks
cs/ee/ids 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also
More informationAn algebraic framework for a unified view of route-vector protocols
An algebraic framework for a unified view of route-vector protocols João Luís Sobrinho Instituto Superior Técnico, Universidade de Lisboa Instituto de Telecomunicações Portugal 1 Outline 1. ontext for
More informationThe Role of Routing Policies in the Internet: Stability, Security, and Load-Balancing
ROMA TRE UNIVERSITÀ DEGLI STUDI Roma Tre University Ph.D. in Computer Science and Engineering The Role of Routing Policies in the Internet: Stability, Security, and Load-Balancing Marco Chiesa The Role
More informationRamsey numbers of some bipartite graphs versus complete graphs
Ramsey numbers of some bipartite graphs versus complete graphs Tao Jiang, Michael Salerno Miami University, Oxfor, OH 45056, USA Abstract. The Ramsey number r(h, K n ) is the smallest positive integer
More informationWheel + Ring = Reel: the Impact of Route Filtering on the Stability of Policy Routing
1 Wheel + Ring = Reel: the Impact of Route Filtering on the Stability of Policy Routing Luca Cittadini Giuseppe Di Battista Massimo Rimondini Stefano Vissicchio Dept. of Computer Science and Automation,
More informationPermanent vs. Determinant
Permanent vs. Determinant Frank Ban Introuction A major problem in theoretical computer science is the Permanent vs. Determinant problem. It asks: given an n by n matrix of ineterminates A = (a i,j ) an
More informationWhat Have We Learned from Reverse-Engineering the Internet s Inter-domain Routing Protocol?
What Have We Learned from Reverse-Engineering the Internet s Inter-domain Routing Protocol? Timothy G. Griffin Computer Laboratory University of Cambridge, UK timothy.griffin@cl.cam.ac.uk Advanced Networks
More informationAn Axiomatic Approach to Routing
An Axiomatic Approach to Routing Omer Lev Hebrew University an Microsoft Research, Israel omerl@cs.huji.ac.il Moshe Tennenholtz Technion moshet@ie.technion.ac.il Aviv Zohar Hebrew University an Microsoft
More informationChapter 6. Dynamic Programming. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.
Chapter 6 Dynamic Programming Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. 1 6.8 Shortest Paths Shortest Paths Shortest path problem. Given a directed graph G = (V,
More informationDesigning Information Devices and Systems II Fall 2017 Note Theorem: Existence and Uniqueness of Solutions to Differential Equations
EECS 6B Designing Information Devices an Systems II Fall 07 Note 3 Secon Orer Differential Equations Secon orer ifferential equations appear everywhere in the real worl. In this note, we will walk through
More informationNon-deterministic Social Laws
Non-eterministic Social Laws Michael H. Coen MIT Artificial Intelligence Lab 55 Technology Square Cambrige, MA 09 mhcoen@ai.mit.eu Abstract The paper generalizes the notion of a social law, the founation
More informationarxiv: v1 [math.co] 29 May 2009
arxiv:0905.4913v1 [math.co] 29 May 2009 simple Havel-Hakimi type algorithm to realize graphical egree sequences of irecte graphs Péter L. Erős an István Miklós. Rényi Institute of Mathematics, Hungarian
More informationSwitching Time Optimization in Discretized Hybrid Dynamical Systems
Switching Time Optimization in Discretize Hybri Dynamical Systems Kathrin Flaßkamp, To Murphey, an Sina Ober-Blöbaum Abstract Switching time optimization (STO) arises in systems that have a finite set
More informationComparative Approaches of Calculation of the Back Water Curves in a Trapezoidal Channel with Weak Slope
Proceeings of the Worl Congress on Engineering Vol WCE, July 6-8,, Lonon, U.K. Comparative Approaches of Calculation of the Back Water Curves in a Trapezoial Channel with Weak Slope Fourar Ali, Chiremsel
More informationPerfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs
Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Ashish Goel Michael Kapralov Sanjeev Khanna Abstract We consier the well-stuie problem of fining a perfect matching in -regular bipartite
More informationSeparation of Variables
Physics 342 Lecture 1 Separation of Variables Lecture 1 Physics 342 Quantum Mechanics I Monay, January 25th, 2010 There are three basic mathematical tools we nee, an then we can begin working on the physical
More informationMulti-agent Systems Reaching Optimal Consensus with Time-varying Communication Graphs
Preprints of the 8th IFAC Worl Congress Multi-agent Systems Reaching Optimal Consensus with Time-varying Communication Graphs Guoong Shi ACCESS Linnaeus Centre, School of Electrical Engineering, Royal
More informationQuantum Mechanics in Three Dimensions
Physics 342 Lecture 20 Quantum Mechanics in Three Dimensions Lecture 20 Physics 342 Quantum Mechanics I Monay, March 24th, 2008 We begin our spherical solutions with the simplest possible case zero potential.
More information6 General properties of an autonomous system of two first order ODE
6 General properties of an autonomous system of two first orer ODE Here we embark on stuying the autonomous system of two first orer ifferential equations of the form ẋ 1 = f 1 (, x 2 ), ẋ 2 = f 2 (, x
More informationLower bounds on Locality Sensitive Hashing
Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,
More informationTOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH
English NUMERICAL MATHEMATICS Vol14, No1 Series A Journal of Chinese Universities Feb 2005 TOEPLITZ AND POSITIVE SEMIDEFINITE COMPLETION PROBLEM FOR CYCLE GRAPH He Ming( Λ) Michael K Ng(Ξ ) Abstract We
More informationGeneralizing Kronecker Graphs in order to Model Searchable Networks
Generalizing Kronecker Graphs in orer to Moel Searchable Networks Elizabeth Boine, Babak Hassibi, Aam Wierman California Institute of Technology Pasaena, CA 925 Email: {eaboine, hassibi, aamw}@caltecheu
More informationA Sketch of Menshikov s Theorem
A Sketch of Menshikov s Theorem Thomas Bao March 14, 2010 Abstract Let Λ be an infinite, locally finite oriente multi-graph with C Λ finite an strongly connecte, an let p
More informationExperimental Robustness Study of a Second-Order Sliding Mode Controller
Experimental Robustness Stuy of a Secon-Orer Sliing Moe Controller Anré Blom, Bram e Jager Einhoven University of Technology Department of Mechanical Engineering P.O. Box 513, 5600 MB Einhoven, The Netherlans
More informationu t v t v t c a u t b a v t u t v t b a
Nonlinear Dynamical Systems In orer to iscuss nonlinear ynamical systems, we must first consier linear ynamical systems. Linear ynamical systems are just systems of linear equations like we have been stuying
More informationSituation awareness of power system based on static voltage security region
The 6th International Conference on Renewable Power Generation (RPG) 19 20 October 2017 Situation awareness of power system base on static voltage security region Fei Xiao, Zi-Qing Jiang, Qian Ai, Ran
More informationSurvey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013
Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing
More informationEquilibrium in Queues Under Unknown Service Times and Service Value
University of Pennsylvania ScholarlyCommons Finance Papers Wharton Faculty Research 1-2014 Equilibrium in Queues Uner Unknown Service Times an Service Value Laurens Debo Senthil K. Veeraraghavan University
More informationComputing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions
Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5
More informationNumber of wireless sensors needed to detect a wildfire
Number of wireless sensors neee to etect a wilfire Pablo I. Fierens Instituto Tecnológico e Buenos Aires (ITBA) Physics an Mathematics Department Av. Maero 399, Buenos Aires, (C1106ACD) Argentina pfierens@itba.eu.ar
More information6. DYNAMIC PROGRAMMING II. sequence alignment Hirschberg's algorithm Bellman-Ford distance vector protocols negative cycles in a digraph
6. DYNAMIC PROGRAMMING II sequence alignment Hirschberg's algorithm Bellman-Ford distance vector protocols negative cycles in a digraph Shortest paths Shortest path problem. Given a digraph G = (V, E),
More informationarxiv: v4 [cs.ds] 7 Mar 2014
Analysis of Agglomerative Clustering Marcel R. Ackermann Johannes Blömer Daniel Kuntze Christian Sohler arxiv:101.697v [cs.ds] 7 Mar 01 Abstract The iameter k-clustering problem is the problem of partitioning
More informationA note on asymptotic formulae for one-dimensional network flow problems Carlos F. Daganzo and Karen R. Smilowitz
A note on asymptotic formulae for one-imensional network flow problems Carlos F. Daganzo an Karen R. Smilowitz (to appear in Annals of Operations Research) Abstract This note evelops asymptotic formulae
More informationMultivariable Calculus: Chapter 13: Topic Guide and Formulas (pgs ) * line segment notation above a variable indicates vector
Multivariable Calculus: Chapter 13: Topic Guie an Formulas (pgs 800 851) * line segment notation above a variable inicates vector The 3D Coorinate System: Distance Formula: (x 2 x ) 2 1 + ( y ) ) 2 y 2
More informationA Path Planning Method Using Cubic Spiral with Curvature Constraint
A Path Planning Metho Using Cubic Spiral with Curvature Constraint Tzu-Chen Liang an Jing-Sin Liu Institute of Information Science 0, Acaemia Sinica, Nankang, Taipei 5, Taiwan, R.O.C., Email: hartree@iis.sinica.eu.tw
More informationOn the Connectivity Analysis over Large-Scale Hybrid Wireless Networks
This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM proceeings This paper was presente as part of the main Technical
More information05 The Continuum Limit and the Wave Equation
Utah State University DigitalCommons@USU Founations of Wave Phenomena Physics, Department of 1-1-2004 05 The Continuum Limit an the Wave Equation Charles G. Torre Department of Physics, Utah State University,
More information6. DYNAMIC PROGRAMMING II
6. DYNAMIC PROGRAMMING II sequence alignment Hirschberg's algorithm Bellman-Ford algorithm distance vector protocols negative cycles in a digraph Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison
More informationChromatic number for a generalization of Cartesian product graphs
Chromatic number for a generalization of Cartesian prouct graphs Daniel Král Douglas B. West Abstract Let G be a class of graphs. The -fol gri over G, enote G, is the family of graphs obtaine from -imensional
More informationPDE Notes, Lecture #11
PDE Notes, Lecture # from Professor Jalal Shatah s Lectures Febuary 9th, 2009 Sobolev Spaces Recall that for u L loc we can efine the weak erivative Du by Du, φ := udφ φ C0 If v L loc such that Du, φ =
More informationA Second Time Dimension, Hidden in Plain Sight
A Secon Time Dimension, Hien in Plain Sight Brett A Collins. In this paper I postulate the existence of a secon time imension, making five imensions, three space imensions an two time imensions. I will
More informationII. First variation of functionals
II. First variation of functionals The erivative of a function being zero is a necessary conition for the etremum of that function in orinary calculus. Let us now tackle the question of the equivalent
More information3.7 Implicit Differentiation -- A Brief Introduction -- Student Notes
Fin these erivatives of these functions: y.7 Implicit Differentiation -- A Brief Introuction -- Stuent Notes tan y sin tan = sin y e = e = Write the inverses of these functions: y tan y sin How woul we
More informationMulti-robot Formation Control Using Reinforcement Learning Method
Multi-robot Formation Control Using Reinforcement Learning Metho Guoyu Zuo, Jiatong Han, an Guansheng Han School of Electronic Information & Control Engineering, Beijing University of Technology, Beijing
More informationFoundational Theory for Understanding Policy Routing Dynamics
Foundational Theory for Understanding Policy Routing Dynamics Karim Mattar Samuel Epstein Ibrahim Matta Computer Science, Boston University Email: {kmattar, samepst, matta}@cs.bu.edu Technical Report BUCS-TR-9-
More informationLecture 5. Symmetric Shearer s Lemma
Stanfor University Spring 208 Math 233: Non-constructive methos in combinatorics Instructor: Jan Vonrák Lecture ate: January 23, 208 Original scribe: Erik Bates Lecture 5 Symmetric Shearer s Lemma Here
More informationPassivity-Based Position Consensus of Multiple Mechanical Integrators with Communication Delay
To appear in ACC 010 Passivity-Base Position Consensus of Multiple Mechanical Integrators with Communication Delay Ke Huang an Dongjun Lee Abstract We present a consensus framework for multiple variable-rate
More informationOn the Aloha throughput-fairness tradeoff
On the Aloha throughput-fairness traeoff 1 Nan Xie, Member, IEEE, an Steven Weber, Senior Member, IEEE Abstract arxiv:1605.01557v1 [cs.it] 5 May 2016 A well-known inner boun of the stability region of
More informationNumerical Key Results for Studying the Performance of TCP Traffic under Class-Based Weighted Fair Queuing System
Journal of ommunication an omputer 13 (2016) 195-201 oi:10.17265/1548-7709/2016.04.007 D DAVID PUBLISHING Numerical Key Results for Stuying the Performance of TP Traffic uner lass-base Weighte Fair Queuing
More informationMAINTAINING LIMITED-RANGE CONNECTIVITY AMONG SECOND-ORDER AGENTS
MAINTAINING LIMITED-RANGE CONNECTIVITY AMONG SECOND-ORDER AGENTS KETAN SAVLA, GIUSEPPE NOTARSTEFANO AND FRANCESCO BULLO Abstract. In this paper we consier a-hoc networks of robotic agents with ouble integrator
More informationWhat s in an Attribute? Consequences for the Least Common Subsumer
What s in an Attribute? Consequences for the Least Common Subsumer Ralf Küsters LuFG Theoretical Computer Science RWTH Aachen Ahornstraße 55 52074 Aachen Germany kuesters@informatik.rwth-aachen.e Alex
More informationA study on ant colony systems with fuzzy pheromone dispersion
A stuy on ant colony systems with fuzzy pheromone ispersion Louis Gacogne LIP6 104, Av. Kenney, 75016 Paris, France gacogne@lip6.fr Sanra Sanri IIIA/CSIC Campus UAB, 08193 Bellaterra, Spain sanri@iiia.csic.es
More informationd-dimensional Arrangement Revisited
-Dimensional Arrangement Revisite Daniel Rotter Jens Vygen Research Institute for Discrete Mathematics University of Bonn Revise version: April 5, 013 Abstract We revisit the -imensional arrangement problem
More informationNode Density and Delay in Large-Scale Wireless Networks with Unreliable Links
Noe Density an Delay in Large-Scale Wireless Networks with Unreliable Links Shizhen Zhao, Xinbing Wang Department of Electronic Engineering Shanghai Jiao Tong University, China Email: {shizhenzhao,xwang}@sjtu.eu.cn
More informationShort Intro to Coordinate Transformation
Short Intro to Coorinate Transformation 1 A Vector A vector can basically be seen as an arrow in space pointing in a specific irection with a specific length. The following problem arises: How o we represent
More informationLecture 6 : Dimensionality Reduction
CPS290: Algorithmic Founations of Data Science February 3, 207 Lecture 6 : Dimensionality Reuction Lecturer: Kamesh Munagala Scribe: Kamesh Munagala In this lecture, we will consier the roblem of maing
More informationTime-of-Arrival Estimation in Non-Line-Of-Sight Environments
2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor
More informationOptimal Control of Spatially Distributed Systems
Optimal Control of Spatially Distribute Systems Naer Motee an Ali Jababaie Abstract In this paper, we stuy the structural properties of optimal control of spatially istribute systems. Such systems consist
More informationCHAPTER 1 : DIFFERENTIABLE MANIFOLDS. 1.1 The definition of a differentiable manifold
CHAPTER 1 : DIFFERENTIABLE MANIFOLDS 1.1 The efinition of a ifferentiable manifol Let M be a topological space. This means that we have a family Ω of open sets efine on M. These satisfy (1), M Ω (2) the
More informationMake graph of g by adding c to the y-values. on the graph of f by c. multiplying the y-values. even-degree polynomial. graph goes up on both sides
Reference 1: Transformations of Graphs an En Behavior of Polynomial Graphs Transformations of graphs aitive constant constant on the outsie g(x) = + c Make graph of g by aing c to the y-values on the graph
More informationLecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012
CS-6 Theory Gems November 8, 0 Lecture Lecturer: Alesaner Mąry Scribes: Alhussein Fawzi, Dorina Thanou Introuction Toay, we will briefly iscuss an important technique in probability theory measure concentration
More informationu!i = a T u = 0. Then S satisfies
Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace
More informationMaximizable Routing Metrics
Maximizable Routing Metrics Mohamed G. Gouda Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188, USA gouda@cs.utexas.edu Marco Schneider SBC Technology Resources
More informationMcMaster University. Advanced Optimization Laboratory. Title: The Central Path Visits all the Vertices of the Klee-Minty Cube.
McMaster University Avance Optimization Laboratory Title: The Central Path Visits all the Vertices of the Klee-Minty Cube Authors: Antoine Deza, Eissa Nematollahi, Reza Peyghami an Tamás Terlaky AvOl-Report
More informationSpring 2016 Network Science
Spring 206 Network Science Sample Problems for Quiz I Problem [The Application of An one-imensional Poisson Process] Suppose that the number of typographical errors in a new text is Poisson istribute with
More information26.1 Metropolis method
CS880: Approximations Algorithms Scribe: Dave Anrzejewski Lecturer: Shuchi Chawla Topic: Metropolis metho, volume estimation Date: 4/26/07 The previous lecture iscusse they some of the key concepts of
More informationThroughput Optimal Control of Cooperative Relay Networks
hroughput Optimal Control of Cooperative Relay Networks Emun Yeh Dept. of Electrical Engineering Yale University New Haven, C 06520, USA E-mail: emun.yeh@yale.eu Ranall Berry Dept. of Electrical an Computer
More informationRobustness and Perturbations of Minimal Bases
Robustness an Perturbations of Minimal Bases Paul Van Dooren an Froilán M Dopico December 9, 2016 Abstract Polynomial minimal bases of rational vector subspaces are a classical concept that plays an important
More informationFast Structuring of Radio Networks
Fast Structuring of Raio Networks for Multi-Message Communications Mohsen Ghaffari ghaffari@mit.eu MIT Bernhar Haeupler haeupler@mit.eu MIT Abstract We introuce collision free layerings as a powerful way
More informationOn colour-blind distinguishing colour pallets in regular graphs
J Comb Optim (2014 28:348 357 DOI 10.1007/s10878-012-9556-x On colour-blin istinguishing colour pallets in regular graphs Jakub Przybyło Publishe online: 25 October 2012 The Author(s 2012. This article
More informationPhysics 121 for Majors
Physics 121 for Majors Scheule Do Post-Class Quiz #3 Do Pre-Class Quiz #4 HW #2 is ue Wenesay Quiz #1 is ue Saturay, Sept. 16 Lab #1 is set up now, ue Monay Some Department Resources Computers N-212 ESC
More informationTCP throughput and timeout steady state and time-varying dynamics
TCP throughput an timeout steay state an time-varying ynamics Stephan Bohacek an Khushboo Shah Dept. of Electrical an Computer Engineering Dept. of Electrical Engineering University of Delaware University
More informationThis module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics
This moule is part of the Memobust Hanbook on Methoology of Moern Business Statistics 26 March 2014 Metho: Balance Sampling for Multi-Way Stratification Contents General section... 3 1. Summary... 3 2.
More informationPerturbation Analysis and Optimization of Stochastic Flow Networks
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. XX, NO. Y, MMM 2004 1 Perturbation Analysis an Optimization of Stochastic Flow Networks Gang Sun, Christos G. Cassanras, Yorai Wari, Christos G. Panayiotou,
More informationx = c of N if the limit of f (x) = L and the right-handed limit lim f ( x)
Limit We say the limit of f () as approaches c equals L an write, lim L. One-Sie Limits (Left an Right-Hane Limits) Suppose a function f is efine near but not necessarily at We say that f has a left-hane
More informationA General Analytical Approximation to Impulse Response of 3-D Microfluidic Channels in Molecular Communication
A General Analytical Approximation to Impulse Response of 3- Microfluiic Channels in Molecular Communication Fatih inç, Stuent Member, IEEE, Bayram Cevet Akeniz, Stuent Member, IEEE, Ali Emre Pusane, Member,
More informationData Structures and Algorithms CMPSC 465
ata Structures and Algorithms MPS LTUR ellman-ford Shortest Paths Algorithm etecting Negative ost ycles Adam Smith // A. Smith; based on slides by K. Wayne,. Leiserson,. emaine L. Negative Weight dges
More informationLecture 2 Lagrangian formulation of classical mechanics Mechanics
Lecture Lagrangian formulation of classical mechanics 70.00 Mechanics Principle of stationary action MATH-GA To specify a motion uniquely in classical mechanics, it suffices to give, at some time t 0,
More informationLecture 12: November 6, 2013
Information an Coing Theory Autumn 204 Lecturer: Mahur Tulsiani Lecture 2: November 6, 203 Scribe: Davi Kim Recall: We were looking at coes of the form C : F k q F n q, where q is prime, k is the message
More informationSolutions to Math 41 Second Exam November 4, 2010
Solutions to Math 41 Secon Exam November 4, 2010 1. (13 points) Differentiate, using the metho of your choice. (a) p(t) = ln(sec t + tan t) + log 2 (2 + t) (4 points) Using the rule for the erivative of
More informationLaplacian Cooperative Attitude Control of Multiple Rigid Bodies
Laplacian Cooperative Attitue Control of Multiple Rigi Boies Dimos V. Dimarogonas, Panagiotis Tsiotras an Kostas J. Kyriakopoulos Abstract Motivate by the fact that linear controllers can stabilize the
More informationQuantum Search on the Spatial Grid
Quantum Search on the Spatial Gri Matthew D. Falk MIT 2012, 550 Memorial Drive, Cambrige, MA 02139 (Date: December 11, 2012) This paper explores Quantum Search on the two imensional spatial gri. Recent
More informationQF101: Quantitative Finance September 5, Week 3: Derivatives. Facilitator: Christopher Ting AY 2017/2018. f ( x + ) f(x) f(x) = lim
QF101: Quantitative Finance September 5, 2017 Week 3: Derivatives Facilitator: Christopher Ting AY 2017/2018 I recoil with ismay an horror at this lamentable plague of functions which o not have erivatives.
More informationLower Bounds for the Smoothed Number of Pareto optimal Solutions
Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.
More informationExact Max 2-Sat: Easier and Faster
Exact Max -Sat: Easier an Faster Martin Fürer Shiva Prasa Kasiviswanathan Computer Science an Engineering, Pennsylvania State University e-mail: {furer,kasivisw}@cse.psu.eu Abstract Prior algorithms known
More informationOptimal Control of Spatially Distributed Systems
Optimal Control of Spatially Distribute Systems Naer Motee an Ali Jababaie Abstract In this paper, we stuy the structural properties of optimal control of spatially istribute systems. Such systems consist
More informationAnalysis on a Localized Pruning Method for Connected Dominating Sets
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 23, 1073-1086 (2007) Analysis on a Localize Pruning Metho for Connecte Dominating Sets JOHN SUM 1, JIE WU 2 AND KEVIN HO 3 1 Department of Information Management
More informationState observers and recursive filters in classical feedback control theory
State observers an recursive filters in classical feeback control theory State-feeback control example: secon-orer system Consier the riven secon-orer system q q q u x q x q x x x x Here u coul represent
More informationConvergence of random variables, and the Borel-Cantelli lemmas
Stat 205A Setember, 12, 2002 Convergence of ranom variables, an the Borel-Cantelli lemmas Lecturer: James W. Pitman Scribes: Jin Kim (jin@eecs) 1 Convergence of ranom variables Recall that, given a sequence
More informationTopology Design and Control: A Game-Theoretic Perspective
Topology Design an Control: A Game-Theoretic Perspective Amir Nahir Department of Computer Science Technion, Israel Institue of Technology Haifa 32000, Israel Email: nahira@cs.technion.ac.il Ariel Ora
More informationTMA 4195 Matematisk modellering Exam Tuesday December 16, :00 13:00 Problems and solution with additional comments
Problem F U L W D g m 3 2 s 2 0 0 0 0 2 kg 0 0 0 0 0 0 Table : Dimension matrix TMA 495 Matematisk moellering Exam Tuesay December 6, 2008 09:00 3:00 Problems an solution with aitional comments The necessary
More informationarxiv: v1 [cs.ds] 31 May 2017
Succinct Partial Sums an Fenwick Trees Philip Bille, Aners Roy Christiansen, Nicola Prezza, an Freerik Rye Skjoljensen arxiv:1705.10987v1 [cs.ds] 31 May 2017 Technical University of Denmark, DTU Compute,
More informationFractional Geometric Calculus: Toward A Unified Mathematical Language for Physics and Engineering
Fractional Geometric Calculus: Towar A Unifie Mathematical Language for Physics an Engineering Xiong Wang Center of Chaos an Complex Network, Department of Electronic Engineering, City University of Hong
More informationProof of SPNs as Mixture of Trees
A Proof of SPNs as Mixture of Trees Theorem 1. If T is an inuce SPN from a complete an ecomposable SPN S, then T is a tree that is complete an ecomposable. Proof. Argue by contraiction that T is not a
More informationMarkov Chains in Continuous Time
Chapter 23 Markov Chains in Continuous Time Previously we looke at Markov chains, where the transitions betweenstatesoccurreatspecifietime- steps. That it, we mae time (a continuous variable) avance in
More informationPhysics 505 Electricity and Magnetism Fall 2003 Prof. G. Raithel. Problem Set 3. 2 (x x ) 2 + (y y ) 2 + (z + z ) 2
Physics 505 Electricity an Magnetism Fall 003 Prof. G. Raithel Problem Set 3 Problem.7 5 Points a): Green s function: Using cartesian coorinates x = (x, y, z), it is G(x, x ) = 1 (x x ) + (y y ) + (z z
More informationApproximate Constraint Satisfaction Requires Large LP Relaxations
Approximate Constraint Satisfaction Requires Large LP Relaxations oah Fleming April 19, 2018 Linear programming is a very powerful tool for attacking optimization problems. Techniques such as the ellipsoi
More informationSOME RESULTS ON THE GEOMETRY OF MINKOWSKI PLANE. Bing Ye Wu
ARCHIVUM MATHEMATICUM (BRNO Tomus 46 (21, 177 184 SOME RESULTS ON THE GEOMETRY OF MINKOWSKI PLANE Bing Ye Wu Abstract. In this paper we stuy the geometry of Minkowski plane an obtain some results. We focus
More informationA simplified macroscopic urban traffic network model for model-based predictive control
Delft University of Technology Delft Center for Systems an Control Technical report 9-28 A simplifie macroscopic urban traffic network moel for moel-base preictive control S. Lin, B. De Schutter, Y. Xi,
More information