Device-to-Device Collaboration through Distributed Storage

Size: px
Start display at page:

Download "Device-to-Device Collaboration through Distributed Storage"

Transcription

1 Device-to-Device Collaboration through Distributed Storage Negin Golrezaei, Student Meber, IEEE, Alexandros G Diakis, Meber, IEEE, Andreas F Molisch, Fellow, IEEE Dept of Electrical Eng University of Southern California Los Angeles, CA, USA eails: {golrezae,diakis,olisch}@uscedu Abstract Video is the ain driver for the inexorable increase in wireless data traffic In this paper we analyze a new architecture in which device-to-device (DD) counications is used to drastically increase the capacity of cellular networks for video transission Users cache popular video files and - after receiving requests fro other users - serve these requests via DD localized transissions; the short range of the DD transission enables frequency reuse within the cell We analyze the scaling behavior of the throughput with the nuber of devices per cell The user content request statistics, as well as the caching distribution, are odeled by a Zipf distribution with paraeters γ r and γ c, respectively For the practically iportant case γ r < and γ c >, we derive a closed for expression for the scaling behavior of the nuber of DD links that coexist without interference Our analysis relies on a novel Poisson approxiation result for wireless networks obtained through the Chen-Stein Method I INTRODUCTION Wireless data traffic has risen sharply over the past years, and is expected to increase by a further factor of 40 over the next five years [] While the initial increase was ainly driven by web-browsing and associated applications, ephasis is now oving to wireless delivery of video content This threatens to overwhel the already-strained cellular networks Since increasing cellular data capacity by traditional eans (ore spectru, larger nuber of antennas, saller cells) is either reaching its natural liits or becoing very costly, there is a need for fundaentally new cellular architectures that can exploit the special properties of video requests (eg fro YouTube), as well as of odern sartphone applications Our architecture relies on two key observations: (i) Video has a high degree of content reuse, ie, a few popular files are requested by a large nuber of users (ii) Sartphones and tablets have significant storage capacity that is rapidly growing and typically underutilized Our proposed distributed storage schee is based on the fact that if there is enough content reuse, ie, any users are requesting the sae video content, the storage space on cellular devices can be used as a distributed cache [], [3] We allow users to store popular content and use local device-to-device (DD) counication for collaborative disseination when a user in the vicinity requests a popular file Since DD counication occurs over a short range, this enables frequency reuse, ie, the sae tie-frequency resource can be exploited by ultiple DD links within one acrocell This draatically increases the spectral efficiency and is siilar to the constant trend of shrinking cell sizes What is fundaentally different between DD counications and sall cells, however, is that feto and pico-cell base stations require high-bandwidth backhaul links The DD collaborative video content disseination schee we are proposing essentially replaces backhaul with storage, by caching files that have been already requested by users, without relying on additional infrastructure As the nuber of devices in a cell increases, the distance between devices becoes saller, which allows to use less power, and increase the frequency reuse Yet, on the other hand, ore users will request a greater variety of files, which decreases the probability that a device is within counication range of another device that has the desired content Thus, while it sees intuitive that a greater density of devices allows a larger nuber of active and non-interfering links within a cell, the actual functional scaling behavior cannot be obtained siply by inspection In our recent paper [4], we analyzed the scaling behavior of the average nuber of DD links that can coexist without interference when users choose which file to store randoly Throughout this work, the geoetry of our networks follows the standard Rando Geoetric Graph protocol odel [5], [6] We showed that the scaling behavior depends on both the content request statistics and content cache statistics which are odeled by Zipf distributions In particular, our prior work deonstrated that for particular types of content popularity and cache statistics, a linear scaling becoes feasible However, for a different range of paraeters for content statistics, we could only deterine loose upper bounds Our contributions: In this paper we close this gap in our theoretical understanding of the scaling behavior Specifically, we analyze the previously-unknown case where the Zipf distribution for the requests is characterized by a paraeter γ r < and the caching distribution by a paraeter γ c >, and provide a unique scaling law for the nuber of active DD links as a function of the nuber of devices in the cell Our analysis relies on a novel Poisson approxiation result for

2 Fig Rando geoetric graph exaple The connectivity radius is r(n) wireless networks obtained through the Chen-Stein Method We note that the case of γ r < is the ost practically relevant one, since prior epirical Youtube studies [7] have estiated this exponent to be in the range of The reainder of this paper is organized as follows: In Section II we setup the proble forulation, defining the popularity distributions and active links Section III contains our ain theore, the scaling behavior of the average nuber of DD interference-free links After soe siulation results, in Section V we discuss future directions, open probles and conclusions II MODEL AND SETUP Consider a cellular network where each cell/base station (BS) serves n users For siplicity we assue that the cells are square, and neglect inter-cell interference, so that we can consider one cell in isolation Users are distributed uniforly in the cell Every user is assued to have a storage capacity called cache, which is filled up with soe video files The base station (BS) ight be aware of the stored files and channel state inforation of the users and control the DD counications We assue that the DD counication does not interfere with counication between the BS and users This assuption is justified if the DD counications occur in a separate frequency band (eg, WiFi) For the deviceto-device throughput, we henceforth do not need to consider explicitly the BS and its associated counications Each user in the cell requests a file randoly and independently fro a library of size The size of the library is a function of the nuber of users n, since a larger nuber of users covers a larger set of files they could be interested in Studies show that there is redundancy in video requests and soe popular files are requested ore [7] We assue that the various file popularities are distributed as per the Zipf distribution, which has been established in nuerous studies as being a good approxiation to the easured popularity of video files [8] In a Zipf distribution, the frequency of the ith popular file, denoted by f i, is inversely proportional to its rank: f i = i γr j=, i, () j γr The exponent γ r characterizes the distribution by controlling the relative popularity of files A large γ r eans a concentrated distribution, ie, the first few popular files account for the ajority of requests Ref [7] confired the Zipf odel for video popularity based on epirical YouTube data and easured the γ r exponent in the range of In this paper we refer to the range γ r > as the high content reuse regie and γ r < as the low content reuse regie Each user (peer) has soe storage capability that we use to cache video files For siplicity in our analysis, we assue that all files have the sae size, and each user can store one file This assuption has the advantage of yielding a clean forulation; however, our work can be easily extended to larger cache size Our counication network is odeled by a rando geoetric graph G(n, r(n)) where two users (assuing DD counication is possible) can counicate if their physical distance is saller than soe collaboration distance r(n) [5], [6] The axiu allowable distance for DD counication r(n) is deterined by the power level for each transission Figure illustrates an exaple of rando geoetric graph (RGG) Our odel works as follows: if a user requests one of the files stored in neighbors caches in the RGG, neighbors will handle the request locally through DD counication; otherwise, the BS should serve the request Thus, to have DD counication it is not sufficient that the distance between two users be less than r(n); users should find their desired files locally in caches of their neighbors Therefore, the probability that DD counications happen depends on what files are stored by the users Caching decisions can be ade either in a distributed or centralized way A central control of the caching by the BS allows very efficient file-assignent to the users [9] However, if such control is not desired, and/or the users are oving around quickly, then the caching has to be done distributedly and randoly In other words, each user will cache files according to a probability density function (pdf) In order to avoid the difficulties of optiizing a function, we assued that the functional for of the caching pdf is also a Zipf distribution, but with a paraeter γ c that can be different fro the paraeter γ r In our previous work, we showed the surprising fact that the optiu γ c is not equal to γ r [] We assue that all DD links share the sae tie-frequency transission resource within one cell area This is possible since the distance between requesting user and sartphone with the stored file will be sall in ost cases However, there should be no interference of a transission by others on an active DD link We assue that - given that node u wants to transit to node v - any transission within range r(n) fro v (the receiver) can introduce interference for the u v transission Thus, such two links cannot be activated siultaneously This odel is known as protocol odel; while it neglects iportant wireless propagation effects such as fading [0], it can provide fundaental insights and has been widely used in the literature [5]

3 The proble we investigate is: how does the nuber of active DD links scale given that users request files based on a Zipf distribution with exponent γ r and cache files with exponent γ c III ANALYSIS In this section, we investigate the asyptotic behavior of the average nuber of DD links that can exist without introducing interference to other DD links We consider a dense scenario in which the nuber of users in the cell n goes to infinity Recall big O and Ω notations : f(n) = O(g(n)) and f(n) = Ω(g(n)) respectively denote that f(n) cg(n) and f(n) cg(n) where c is a constant Besides, according to Knuth s notations if f(n) = Θ(g(n)), it eans that f(n) = O(g(n)) as well as f(n) = Ω(g(n)) Little-o notation, f(x) ie, f(x) = o(g(x)) is equivalent to li x g(x) = 0 Throughout this paper, c is used to denote deterinistic positive constants not depending on n The scaling law for the high content reuse regie was derived in our recent prior work [4] We showed that if γ r >, the expected nuber of active DD links scales like (a) E[L] = Θ(n) However, for the case low content reuse regie, γ r <, the upper and lower bound scaling laws of [4] have different exponents The ain result of this paper is a precise characterization of E[L] for the low content reuse regie Theore : If γ r <, γ c >, and r(n) = Θ( E[L] = Θ( n ( a)( γr) ), b n ), where a = b γ c and 0 < a < ( γr) γ c+ γ r This is achieved for any value of the storage exponent γ c > We can see that as a user sees on average ore users in its neighborhood (larger a), the nuber of active DD links that can coexist increases with n Proof: First, we establish the lower bound for E[L] We divide the cell into r(n) virtual square clusters Figure (a) shows the virtual clusters in the cell The cell side is noralized to and the side of each cluster is equal to r(n) Thus, all users within clusters can counicate with each other Besides, based on the protocol odel, in each cluster only one link can be activated siultaneously When there is an active link within a cluster, we call the cluster good But, not all good clusters can be activated siultaneously One good cluster can at ost block 6 clusters (see Figure (b)) The axiu interference happens when a user in the corner of a cluster receives a file fro another user Thus, we have E[L] E[G] 7 where E[G] is the expected nuber of good clusters Since we want to find the lower bound for E[L], we can liit users (b) Fig a) Dividing cell into virtual clusters b) In the worst case, a good cluster can block at ost 6 clusters In the dashed circle, receiving is not possible and in the solid circle, transission is not allowed to counicate with users in virtual clusters they belong to Thus, we have: E[G] = n r(n) Pr[good k] Pr[K = k] k=0 r(n) Pr[good k] Pr[K = k], () k A where A = [nr(n) ( δ)/, nr(n) (+δ)/] and 0 < δ < r(n) is the total nuber of virtual clusters K is the nuber of users in the cluster, which is a binoial rando variable with n trials and probability of r(n), ie, K = B(n, r(n) ) Pr[K = k] is the probability that there are k users in the cluster and Pr[good k] is the probability that the cluster is good conditioned on k Define k arg in Pr[good k] Pr[K = k] k A Notice that k is Θ(nr(n) ) Fro (), we have: E[G] r(n) Pr[good k ] Pr[K A] (3) r(n) Pr[good k ]( e nr(n) δ /6 ) (4)

4 We apply a Chernoff bound to derive equation (4) [] Fro the range of r(n), the second ter in (4), ie, ( e nr(n) δ /6 ) is O() Thus, to prove the theore, we should show that Pr[good k nr(n) ] c( ) ( a)( γr ) Let us define an indicator function u for each user within a cluster u is if user u can find its requested file within the cluster; otherwise it is 0 Since users cache files randoly, the set of available files through DD links in the cluster is also rando Thus, u and u for u u are dependent rando variables In that case, given that user u requests according to the soe popularity distribution and it cannot find it locally, it is ore likely that files currently within the cluster cache are not popular files So, if user u requests independently fro user u but according to the sae popularity distribution, it is ore probable that user u also cannot find its request file locally The cluster is good if at least one of users within the cluster finds its desired file via DD counication Thus, Let us define Pr[good k ] = Pr[ u = 0] k u= W u (5) k u= By using the Chen Stein ethod in lea 3, we show that W can be approxiated by a Poisson rando variable with average of λ E[ k u= u] We also show that the probability that W is zero is asyptotically equal to e λ where λ = k E[ u ] = k i= f i ( ( p i ) k ) (6) p i is the probability that a user caches file i based on Zipf distribution with exponent γ c In the above equation we consider the possibility of self-requests, ie, a user ight find the file it requests in its own cache; in this case clearly no DD counication will be activated by this user Then, we have: Pr[good k ] = e λ (7) nr(n) In lea, we show that λ = Θ( ) = o() Thus, ( a)( γr ) Pr[good k nr(n) ] = Θ(λ) = Θ( ( a)( γr) ), fro which the lower bound follows Now, we prove the upper bound The probability that a user cannot find its desired file locally is the probability that either he has the file itself or all his neighbours do not have the desired files Thus we have: E[L] n Pr[no DD] n = n f j p j + n Pr[K = k] f j ( ( p j ) k ) j= j= k= k= j= n n f j p j + n Pr[K = k] [ a f j + k n j= j= j= f j p j + n [ a f j + πnr(n) j= a + j= a + f j p j ], f j p j ] where K is the nuber of a users that counicate K is a binoial rando variable, ie, K = B(n, πr(n) ) In the second equation above, the first suation is the probability that a user requests a file that he has already stored The second suation is the probability that the user requests a file and all users in its neighborhood in RGG have not stored the desired n file Using lea, E[L] = Ω( ) ( a)( γr ) Lea : i) If γ > and a = o(b), H(γ, a, b) = Θ( a ii) If γ <, a = o(b), and a = Θ(), iii) If γ r <, γ c >, γ ) H(γ, a, b) = Θ(b γ ) f j p j = Θ( j= γr ), where the haronic function H(γ, a, b) = x γ b j=a i γ Proof: We first prove the parts i and ii of the lea is onotonically decreasing Thus, H(γ, a, b) b x=a We also have the following inequality: H(γ, a, b) a γ = Thus, H(γ, a, b) satisfies: b ( γ+) a γ+ γ + x γ = b( γ+) a γ+ (8) γ + b j=a+ b x=a j γ x γ = b( γ+) a ( γ+) (9) γ + H(γ, a, b) b( γ+) a γ+ γ + + a γ (0) Therefore, if γ >, H(γ, a, b) = Θ( a γ ) Besides, if γ < and a = Θ(), then H(γ, a, b) = Θ(b γ )

5 For part iii, using (), we have: jγr +γc f j p j = j= j γr j= γ c = H(γ c + γ r,, ) H(γ c,, )H(γ r,, ), () j= j= When γ c > and γ r <, H(γ c + γ r,, ) and H(γ c,, ) are both Θ() and H(γ r,, ) = Θ( γr ) which follows the result Lea : If γ c >, γ r <, k = Θ( b ), p u E[ u ] = Θ( ) () ( a)( γr) p uu E[ u u ] = O( ), (3) ( a)( γr) where a = b γ c Proof: We first prove the first part of the lea E[ u ] is given in (6) E[ u ] = f j ( ( p j ) k ) + a j= j= a + f j + (k ) a j= f j ( ( p j ) k ) j= a + f j p j H(γ r,, a ) H(γ r,, ) + (k ) H(γ c + γ r, a +, ) H(γ r,, )H(γ c,, ), (4) where the haronic function H is defined in lea If we apply the results of lea, we can show that both ters in (4) are Θ( ) ( a)( γr ) For the lower-bound, we have: E[ u ] f j ( ( p j ) k ) a j= f j ( e (k )pj ) a j= Using lea, we know p j = Θ( j γ ) Then, considering that j = O( a ), the exponent (k )p j is Ω() Therefore, a E[ u ] c j= f j = H(γ r,, a ) H(γ r,, ) = Θ( ) (5) ( a)( γr) Now, we show the second part of the lea p uu = Pr[ u = 0 and u = 0] = f i f j ( ( p i p j ) k ) + i= j=,i j f i ( ( p i ) k ) i= i= j= f i f j ( ( p i p j ) k ) f i f j + + a a i= j= i= a + j= a + ( a a ) f i + i= Then, we have: a i= j= a + f i f j k(p i + p j ) i= j= a + f i f j f i f j + k i= a + f i p i p uu H(γ r,, a ) H(γ r,, ) + H(γ r,, a )H(γ r, a +, ) H(γ r,, ) (6) + k H(γ c + γ r, a +, ) H(γ r,, )H(γ c,, ) (7) According to the scaling results of the lea, the first, the second and the third ters are respectively Θ( ), Θ( ) and Θ( ) Thus, ( a)( γr ) ( a)( γr ) ( a)( γr ) p u,u = O( ) ( a)( γr ) Lea 3: W defined in (5) is asyptotically a Poisson rando variable with ean λ = E[W ] and Pr[W = 0] asyptotically equals e λ if k = Θ( aγc ) where 0 < a < ( γ r) γ c+ γ r Proof: To prove the lea, we use the Chen Stein ethod (the following theore) Theore : [] Let W be the nuber of occurrence of dependent events, and Z be a Poisson rando variable with E[Z] = E[W ] = λ Then and D(W ) D(Z) (b + b ), (8) Pr(W = 0) e λ < ( λ )(b + b ), (9) where D(W ) D(Z) is the total variation distance between the distribution of W and Z, λ is the iniu of and λ, and k k b = p u p u (0) b = u= u = k u= u = k p uu ()

6 p u and p uu are respectively defined in () and (3) Using the results of lea b = k Θ( ) () ( a)( γr) b = k O( ) (3) ( a)( γr) Then, fro (8), W is asyptotically a Poisson rando variable if b + b = o() which iplies that k should be o( ( a)( γr)/ ) Considering that k = Θ( aγc ), we can ( γ conclude that a in the lea should be less than r) γ c+ γ r Beside, fro (9), we can see when b + b = o(), the probability that W is zero asyptotically approaches e λ IV SIMULATION RESULTS In this section, we provide soe nuerical results to verify our theoretical analyses We consider there are n active users which are randoly distributed across the entire cell There is a library of size = 0 4 log(n) For the siulation, we use Monte Carlo ethod In every iteration, we place n users randoly in the cell Each user stores/requests one file randoly by sapling fro the Zipf distribution with exponents γ c /γ r Based on that, we deterine all good DD links and axiu nuber of DD links that can be activated siultaneously without introducing interference for each other Figure 3 illustrates the average nuber of active DD links versus the nuber users in the cell with γ c = and for different value of γ r The paraeter a in the theore is 0, ie, r(n) = 0 n We can see that the theoretical results atch the siulations As expected, for larger γ r (ore content reuse) there exist ore non interfering DD links Siulation results deonstrate that the scaling law, though defined for large node density, is experientally verified for 00 obiles per cell, which is a realistic scale for today s systes We furtherore find that even though the scaling behavior of the nuber of non-interfering collaborative links grows sub-linearly with the nuber of users, the deviation fro linearity is sall for a wide range of paraeters γ r and γ c This theoretically justifies what we would intuitively expect: device-to-device video sharing, enabled by local storage can bring treendous benefits in future wireless systes VI ACKNOWLEDGEMENTS This work was financially supported by the Intel/Cisco VAWN project Helpful discussions with Chris Raing and Jeff Foerster (Intel), as well as Giuseppe Caire, Michael Neely, Antonio Ortega, and Jay Kuo (USC) are gratefully acknowledged REFERENCES [] /ns705/ns87/white paper c-5086htl [] N Golrezaei, A F Molisch, and A G Diakis, Base station assisted device-to-device counications for high-throughput wireless video networks, subitted for publication [3] N Golrezaei, K Shanuga, A G Diakis, A F Molisch, and G Caire, Fetocaching: Wireless video content delivery through distributed caching helpers, in INFOCOM IEEE, 0 [4] N Golrezaei, A G Diakis, and A F Molisch, Wireless device-todevice counications with distributed caching, subitted for publication [5] P Gupta and P Kuar, The capacity of wireless networks, Inforation Theory, IEEE Transactions on, vol 46, no, pp , 000 [6] M Penrose and O U Press, Rando geoetric graphs Oxford University Press Oxford, 003, vol 5 [7] [8] M Cha, H Kwak, P Rodriguez, Y Ahn, and S Moon, I tube, you tube, everybody tubes: analyzing the world s largest user generated content video syste, in Proceedings of the 7th ACM SIGCOMM conference on Internet easureent ACM, 007, pp 4 [9] N Golrezaei, A G Diakis, and A F Molisch, Asyptotic throughput of base station assisted device-to-device counications, pp , to be subitted for publication [0] A F Molisch, Wireless counications IEEE Wiley, 0 [] M Mitzenacher and E Upfal, Probability and coputing: Randoized algoriths and probabilistic analysis Cabridge Univ Pr, 005 [] R Arratia, L Goldstein, and L Gordon, Two oents suffice for poisson approxiations: the chen stein ethod, The Annals of Probability, vol 7, no, pp 9 5, 989 Fig 3 The average nuber of active DD links versus the nuber users in the cell, γ c = and a = 0 V CONCLUSIONS We discussed a novel schee for increasing the efficiency of video content delivery in cellular counications systes We found the scaling behavior of nuber of interferencefree DD links as a function of the statistics of requests, the statistics of the caching, and the collaboration distance

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks

The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks Mingyue Ji, Student Meber, IEEE, Giuseppe Caire, Fellow, IEEE, and Andreas F. Molisch, Fellow, IEEE arxiv:3.637v [cs.it] 8 Jul 05 The

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

Asynchronous Gossip Algorithms for Stochastic Optimization

Asynchronous Gossip Algorithms for Stochastic Optimization Asynchronous Gossip Algoriths for Stochastic Optiization S. Sundhar Ra ECE Dept. University of Illinois Urbana, IL 680 ssrini@illinois.edu A. Nedić IESE Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

On the Design of MIMO-NOMA Downlink and Uplink Transmission

On the Design of MIMO-NOMA Downlink and Uplink Transmission On the Design of MIMO-NOMA Downlink and Uplink Transission Zhiguo Ding, Meber, IEEE, Robert Schober, Fellow, IEEE, and H. Vincent Poor, Fellow, IEEE Abstract In this paper, a novel MIMO-NOMA fraework for

More information

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy Storage Capacity and Dynaics of Nononotonic Networks Bruno Crespi a and Ignazio Lazzizzera b a. IRST, I-38050 Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I-38050 Povo (Trento) Italy INFN Gruppo

More information

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.

This model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t. CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when

More information

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings Ipact of Iperfect Channel State Inforation on ARQ

More information

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks

Optimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks 1 Optial Resource Allocation in Multicast Device-to-Device Counications Underlaying LTE Networks Hadi Meshgi 1, Dongei Zhao 1 and Rong Zheng 2 1 Departent of Electrical and Coputer Engineering, McMaster

More information

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October

More information

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links

Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp

More information

arxiv: v2 [math.co] 3 Dec 2008

arxiv: v2 [math.co] 3 Dec 2008 arxiv:0805.2814v2 [ath.co] 3 Dec 2008 Connectivity of the Unifor Rando Intersection Graph Sion R. Blacburn and Stefanie Gere Departent of Matheatics Royal Holloway, University of London Egha, Surrey TW20

More information

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat

More information

Hybrid System Identification: An SDP Approach

Hybrid System Identification: An SDP Approach 49th IEEE Conference on Decision and Control Deceber 15-17, 2010 Hilton Atlanta Hotel, Atlanta, GA, USA Hybrid Syste Identification: An SDP Approach C Feng, C M Lagoa, N Ozay and M Sznaier Abstract The

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

Analytical Model of Epidemic Routing for Delay-Tolerant Networks Qingshan Wang School of Mathematics Hefei University of Technology Hefei, China

Analytical Model of Epidemic Routing for Delay-Tolerant Networks Qingshan Wang School of Mathematics Hefei University of Technology Hefei, China Analytical Model of Epideic Routing for Delay-Tolerant etwors Qingshan Wang School of Matheatics Hefei University of Technology Hefei, China qswang@hfut.edu.cn Zygunt J. Haas School of Electrical and Coputer

More information

A note on the multiplication of sparse matrices

A note on the multiplication of sparse matrices Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani

More information

IN modern society that various systems have become more

IN modern society that various systems have become more Developent of Reliability Function in -Coponent Standby Redundant Syste with Priority Based on Maxiu Entropy Principle Ryosuke Hirata, Ikuo Arizono, Ryosuke Toohiro, Satoshi Oigawa, and Yasuhiko Takeoto

More information

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs

Research Article On the Isolated Vertices and Connectivity in Random Intersection Graphs International Cobinatorics Volue 2011, Article ID 872703, 9 pages doi:10.1155/2011/872703 Research Article On the Isolated Vertices and Connectivity in Rando Intersection Graphs Yilun Shang Institute for

More information

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval

Uniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,

More information

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest

More information

On Conditions for Linearity of Optimal Estimation

On Conditions for Linearity of Optimal Estimation On Conditions for Linearity of Optial Estiation Erah Akyol, Kuar Viswanatha and Kenneth Rose {eakyol, kuar, rose}@ece.ucsb.edu Departent of Electrical and Coputer Engineering University of California at

More information

Lower Bounds for Quantized Matrix Completion

Lower Bounds for Quantized Matrix Completion Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &

More information

Fixed-to-Variable Length Distribution Matching

Fixed-to-Variable Length Distribution Matching Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de

More information

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical

ASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul

More information

On random Boolean threshold networks

On random Boolean threshold networks On rando Boolean threshold networs Reinhard Hecel, Steffen Schober and Martin Bossert Institute of Telecounications and Applied Inforation Theory Ul University Albert-Einstein-Allee 43, 89081Ul, Gerany

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels

Extension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels Extension of CSRSM for the Paraetric Study of the Face Stability of Pressurized Tunnels Guilhe Mollon 1, Daniel Dias 2, and Abdul-Haid Soubra 3, M.ASCE 1 LGCIE, INSA Lyon, Université de Lyon, Doaine scientifique

More information

Bayesian Approach for Fatigue Life Prediction from Field Inspection

Bayesian Approach for Fatigue Life Prediction from Field Inspection Bayesian Approach for Fatigue Life Prediction fro Field Inspection Dawn An and Jooho Choi School of Aerospace & Mechanical Engineering, Korea Aerospace University, Goyang, Seoul, Korea Srira Pattabhiraan

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information

Inspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

Statistical Logic Cell Delay Analysis Using a Current-based Model

Statistical Logic Cell Delay Analysis Using a Current-based Model Statistical Logic Cell Delay Analysis Using a Current-based Model Hanif Fatei Shahin Nazarian Massoud Pedra Dept. of EE-Systes, University of Southern California, Los Angeles, CA 90089 {fatei, shahin,

More information

IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 60, NO. 2, FEBRUARY ETSP stands for the Euclidean traveling salesman problem.

IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 60, NO. 2, FEBRUARY ETSP stands for the Euclidean traveling salesman problem. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 60, NO., FEBRUARY 015 37 Target Assignent in Robotic Networks: Distance Optiality Guarantees and Hierarchical Strategies Jingjin Yu, Meber, IEEE, Soon-Jo Chung,

More information

Warning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network

Warning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network 565 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 07 Guest Editors: Zhuo Yang, Junie Ba, Jing Pan Copyright 07, AIDIC Servizi S.r.l. ISBN 978-88-95608-49-5; ISSN 83-96 The Italian Association

More information

Kernel-Based Nonparametric Anomaly Detection

Kernel-Based Nonparametric Anomaly Detection Kernel-Based Nonparaetric Anoaly Detection Shaofeng Zou Dept of EECS Syracuse University Eail: szou@syr.edu Yingbin Liang Dept of EECS Syracuse University Eail: yliang6@syr.edu H. Vincent Poor Dept of

More information

Machine Learning Basics: Estimators, Bias and Variance

Machine Learning Basics: Estimators, Bias and Variance Machine Learning Basics: Estiators, Bias and Variance Sargur N. srihari@cedar.buffalo.edu This is part of lecture slides on Deep Learning: http://www.cedar.buffalo.edu/~srihari/cse676 1 Topics in Basics

More information

CS Lecture 13. More Maximum Likelihood

CS Lecture 13. More Maximum Likelihood CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood

More information

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding

Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas

More information

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES S. E. Ahed, R. J. Tokins and A. I. Volodin Departent of Matheatics and Statistics University of Regina Regina,

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

Using a De-Convolution Window for Operating Modal Analysis

Using a De-Convolution Window for Operating Modal Analysis Using a De-Convolution Window for Operating Modal Analysis Brian Schwarz Vibrant Technology, Inc. Scotts Valley, CA Mark Richardson Vibrant Technology, Inc. Scotts Valley, CA Abstract Operating Modal Analysis

More information

4920 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 12, DECEMBER 2015

4920 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 12, DECEMBER 2015 4920 IEEE TRASACTIOS O COMMUICATIOS, VOL. 63, O. 12, DECEMBER 2015 Energy Efficient Coordinated Beaforing for Multicell Syste: Duality-Based Algorith Design and Massive MIMO Transition Shiwen He, Meber,

More information

Numerical Studies of a Nonlinear Heat Equation with Square Root Reaction Term

Numerical Studies of a Nonlinear Heat Equation with Square Root Reaction Term Nuerical Studies of a Nonlinear Heat Equation with Square Root Reaction Ter Ron Bucire, 1 Karl McMurtry, 1 Ronald E. Micens 2 1 Matheatics Departent, Occidental College, Los Angeles, California 90041 2

More information

Support recovery in compressed sensing: An estimation theoretic approach

Support recovery in compressed sensing: An estimation theoretic approach Support recovery in copressed sensing: An estiation theoretic approach Ain Karbasi, Ali Horati, Soheil Mohajer, Martin Vetterli School of Coputer and Counication Sciences École Polytechnique Fédérale de

More information

Error Exponents in Asynchronous Communication

Error Exponents in Asynchronous Communication IEEE International Syposiu on Inforation Theory Proceedings Error Exponents in Asynchronous Counication Da Wang EECS Dept., MIT Cabridge, MA, USA Eail: dawang@it.edu Venkat Chandar Lincoln Laboratory,

More information

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China

Department of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China 6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith

More information

Antenna Saturation Effects on MIMO Capacity

Antenna Saturation Effects on MIMO Capacity Antenna Saturation Effects on MIMO Capacity T S Pollock, T D Abhayapala, and R A Kennedy National ICT Australia Research School of Inforation Sciences and Engineering The Australian National University,

More information

Distance Optimal Target Assignment in Robotic Networks under Communication and Sensing Constraints

Distance Optimal Target Assignment in Robotic Networks under Communication and Sensing Constraints Distance Optial Target Assignent in Robotic Networks under Counication and Sensing Constraints Jingjin Yu CSAIL @ MIT/MechE @ BU Soon-Jo Chung Petros G. Voulgaris AE @ University of Illinois Supported

More information

Stochastic Subgradient Methods

Stochastic Subgradient Methods Stochastic Subgradient Methods Lingjie Weng Yutian Chen Bren School of Inforation and Coputer Science University of California, Irvine {wengl, yutianc}@ics.uci.edu Abstract Stochastic subgradient ethods

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

Computable Shell Decomposition Bounds

Computable Shell Decomposition Bounds Coputable Shell Decoposition Bounds John Langford TTI-Chicago jcl@cs.cu.edu David McAllester TTI-Chicago dac@autoreason.co Editor: Leslie Pack Kaelbling and David Cohn Abstract Haussler, Kearns, Seung

More information

1 Bounding the Margin

1 Bounding the Margin COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #12 Scribe: Jian Min Si March 14, 2013 1 Bounding the Margin We are continuing the proof of a bound on the generalization error of AdaBoost

More information

Interactive Markov Models of Evolutionary Algorithms

Interactive Markov Models of Evolutionary Algorithms Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary

More information

Randomized Recovery for Boolean Compressed Sensing

Randomized Recovery for Boolean Compressed Sensing Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

A DESIGN GUIDE OF DOUBLE-LAYER CELLULAR CLADDINGS FOR BLAST ALLEVIATION

A DESIGN GUIDE OF DOUBLE-LAYER CELLULAR CLADDINGS FOR BLAST ALLEVIATION International Journal of Aerospace and Lightweight Structures Vol. 3, No. 1 (2013) 109 133 c Research Publishing Services DOI: 10.3850/S201042862013000550 A DESIGN GUIDE OF DOUBLE-LAYER CELLULAR CLADDINGS

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

On the theoretical analysis of cross validation in compressive sensing

On the theoretical analysis of cross validation in compressive sensing MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.erl.co On the theoretical analysis of cross validation in copressive sensing Zhang, J.; Chen, L.; Boufounos, P.T.; Gu, Y. TR2014-025 May 2014 Abstract

More information

Research Article Rapidly-Converging Series Representations of a Mutual-Information Integral

Research Article Rapidly-Converging Series Representations of a Mutual-Information Integral International Scholarly Research Network ISRN Counications and Networking Volue 11, Article ID 5465, 6 pages doi:1.54/11/5465 Research Article Rapidly-Converging Series Representations of a Mutual-Inforation

More information

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE Proceeding of the ASME 9 International Manufacturing Science and Engineering Conference MSEC9 October 4-7, 9, West Lafayette, Indiana, USA MSEC9-8466 MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL

More information

Revisiting the performance of the modular clock algorithm for distributed blind rendezvous in cognitive radio networks

Revisiting the performance of the modular clock algorithm for distributed blind rendezvous in cognitive radio networks Revisiting the perforance of the odular clock algorith for distributed blind rendezvous in cognitive radio networks Michel Barbeau, Gier Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis To cite this

More information

arxiv: v1 [cs.ds] 17 Mar 2016

arxiv: v1 [cs.ds] 17 Mar 2016 Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass

More information

Green Inter-Cluster Interference Management in Uplink of Multi-Cell Processing Systems

Green Inter-Cluster Interference Management in Uplink of Multi-Cell Processing Systems IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Green Inter-Cluster Interference Manageent in Uplink of Multi-Cell Processing Systes Efstathios Katranaras, Meber, IEEE, Muhaad Ali Iran, Senior Meber, IEEE,

More information

Average Consensus and Gossip Algorithms in Networks with Stochastic Asymmetric Communications

Average Consensus and Gossip Algorithms in Networks with Stochastic Asymmetric Communications Average Consensus and Gossip Algoriths in Networks with Stochastic Asyetric Counications Duarte Antunes, Daniel Silvestre, Carlos Silvestre Abstract We consider that a set of distributed agents desire

More information

Ştefan ŞTEFĂNESCU * is the minimum global value for the function h (x)

Ştefan ŞTEFĂNESCU * is the minimum global value for the function h (x) 7Applying Nelder Mead s Optiization Algorith APPLYING NELDER MEAD S OPTIMIZATION ALGORITHM FOR MULTIPLE GLOBAL MINIMA Abstract Ştefan ŞTEFĂNESCU * The iterative deterinistic optiization ethod could not

More information

An Improved Particle Filter with Applications in Ballistic Target Tracking

An Improved Particle Filter with Applications in Ballistic Target Tracking Sensors & ransducers Vol. 72 Issue 6 June 204 pp. 96-20 Sensors & ransducers 204 by IFSA Publishing S. L. http://www.sensorsportal.co An Iproved Particle Filter with Applications in Ballistic arget racing

More information

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models

Compression and Predictive Distributions for Large Alphabet i.i.d and Markov models 2014 IEEE International Syposiu on Inforation Theory Copression and Predictive Distributions for Large Alphabet i.i.d and Markov odels Xiao Yang Departent of Statistics Yale University New Haven, CT, 06511

More information

Ph 20.3 Numerical Solution of Ordinary Differential Equations

Ph 20.3 Numerical Solution of Ordinary Differential Equations Ph 20.3 Nuerical Solution of Ordinary Differential Equations Due: Week 5 -v20170314- This Assignent So far, your assignents have tried to failiarize you with the hardware and software in the Physics Coputing

More information

Is the seismic moment frequency relation universal?

Is the seismic moment frequency relation universal? Geophys. J. Int. (2) 142, 193 198 Is the seisic oent frequency relation universal? C. Godano1 and F. Pingue2 1 Dipartiento di Scienze Abientali, Seconda Università di Napoli, via V ivaldi 43, 811 Caserta,

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

Computable Shell Decomposition Bounds

Computable Shell Decomposition Bounds Journal of Machine Learning Research 5 (2004) 529-547 Subitted 1/03; Revised 8/03; Published 5/04 Coputable Shell Decoposition Bounds John Langford David McAllester Toyota Technology Institute at Chicago

More information

A Note on the Applied Use of MDL Approximations

A Note on the Applied Use of MDL Approximations A Note on the Applied Use of MDL Approxiations Daniel J. Navarro Departent of Psychology Ohio State University Abstract An applied proble is discussed in which two nested psychological odels of retention

More information

Sampling How Big a Sample?

Sampling How Big a Sample? C. G. G. Aitken, 1 Ph.D. Sapling How Big a Saple? REFERENCE: Aitken CGG. Sapling how big a saple? J Forensic Sci 1999;44(4):750 760. ABSTRACT: It is thought that, in a consignent of discrete units, a certain

More information

Estimating Entropy and Entropy Norm on Data Streams

Estimating Entropy and Entropy Norm on Data Streams Estiating Entropy and Entropy Nor on Data Streas Ait Chakrabarti 1, Khanh Do Ba 1, and S. Muthukrishnan 2 1 Departent of Coputer Science, Dartouth College, Hanover, NH 03755, USA 2 Departent of Coputer

More information

Lecture 21 Nov 18, 2015

Lecture 21 Nov 18, 2015 CS 388R: Randoized Algoriths Fall 05 Prof. Eric Price Lecture Nov 8, 05 Scribe: Chad Voegele, Arun Sai Overview In the last class, we defined the ters cut sparsifier and spectral sparsifier and introduced

More information

Optimal Jamming Over Additive Noise: Vector Source-Channel Case

Optimal Jamming Over Additive Noise: Vector Source-Channel Case Fifty-first Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 2-3, 2013 Optial Jaing Over Additive Noise: Vector Source-Channel Case Erah Akyol and Kenneth Rose Abstract This paper

More information

ma x = -bv x + F rod.

ma x = -bv x + F rod. Notes on Dynaical Systes Dynaics is the study of change. The priary ingredients of a dynaical syste are its state and its rule of change (also soeties called the dynaic). Dynaical systes can be continuous

More information

Testing Properties of Collections of Distributions

Testing Properties of Collections of Distributions Testing Properties of Collections of Distributions Reut Levi Dana Ron Ronitt Rubinfeld April 9, 0 Abstract We propose a fraework for studying property testing of collections of distributions, where the

More information

Spine Fin Efficiency A Three Sided Pyramidal Fin of Equilateral Triangular Cross-Sectional Area

Spine Fin Efficiency A Three Sided Pyramidal Fin of Equilateral Triangular Cross-Sectional Area Proceedings of the 006 WSEAS/IASME International Conference on Heat and Mass Transfer, Miai, Florida, USA, January 18-0, 006 (pp13-18) Spine Fin Efficiency A Three Sided Pyraidal Fin of Equilateral Triangular

More information

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD

ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Matheatical Sciences 04,, p. 7 5 ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD M a t h e a t i c s Yu. A. HAKOPIAN, R. Z. HOVHANNISYAN

More information

The degree of a typical vertex in generalized random intersection graph models

The degree of a typical vertex in generalized random intersection graph models Discrete Matheatics 306 006 15 165 www.elsevier.co/locate/disc The degree of a typical vertex in generalized rando intersection graph odels Jerzy Jaworski a, Michał Karoński a, Dudley Stark b a Departent

More information

IAENG International Journal of Computer Science, 42:2, IJCS_42_2_06. Approximation Capabilities of Interpretable Fuzzy Inference Systems

IAENG International Journal of Computer Science, 42:2, IJCS_42_2_06. Approximation Capabilities of Interpretable Fuzzy Inference Systems IAENG International Journal of Coputer Science, 4:, IJCS_4 6 Approxiation Capabilities of Interpretable Fuzzy Inference Systes Hirofui Miyajia, Noritaka Shigei, and Hiroi Miyajia 3 Abstract Many studies

More information

Synchronization in large directed networks of coupled phase oscillators

Synchronization in large directed networks of coupled phase oscillators CHAOS 16, 015107 2005 Synchronization in large directed networks of coupled phase oscillators Juan G. Restrepo a Institute for Research in Electronics and Applied Physics, University of Maryland, College

More information

Estimation of the Mean of the Exponential Distribution Using Maximum Ranked Set Sampling with Unequal Samples

Estimation of the Mean of the Exponential Distribution Using Maximum Ranked Set Sampling with Unequal Samples Open Journal of Statistics, 4, 4, 64-649 Published Online Septeber 4 in SciRes http//wwwscirporg/ournal/os http//ddoiorg/436/os4486 Estiation of the Mean of the Eponential Distribution Using Maiu Ranked

More information

Taming the Matthew Effect in Online Markets with Social Influence

Taming the Matthew Effect in Online Markets with Social Influence Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence AAAI-17 Taing the Matthew Effect in Online Markets with Social Influence Franco Berbeglia Carnegie Mellon University fberbegl@andrewcuedu

More information

Optimal nonlinear Bayesian experimental design: an application to amplitude versus offset experiments

Optimal nonlinear Bayesian experimental design: an application to amplitude versus offset experiments Geophys. J. Int. (23) 155, 411 421 Optial nonlinear Bayesian experiental design: an application to aplitude versus offset experients Jojanneke van den Berg, 1, Andrew Curtis 2,3 and Jeannot Trapert 1 1

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

A PROBABILISTIC AND RIPLESS THEORY OF COMPRESSED SENSING. Emmanuel J. Candès Yaniv Plan. Technical Report No November 2010

A PROBABILISTIC AND RIPLESS THEORY OF COMPRESSED SENSING. Emmanuel J. Candès Yaniv Plan. Technical Report No November 2010 A PROBABILISTIC AND RIPLESS THEORY OF COMPRESSED SENSING By Eanuel J Candès Yaniv Plan Technical Report No 200-0 Noveber 200 Departent of Statistics STANFORD UNIVERSITY Stanford, California 94305-4065

More information

Recursive Algebraic Frisch Scheme: a Particle-Based Approach

Recursive Algebraic Frisch Scheme: a Particle-Based Approach Recursive Algebraic Frisch Schee: a Particle-Based Approach Stefano Massaroli Renato Myagusuku Federico Califano Claudio Melchiorri Atsushi Yaashita Hajie Asaa Departent of Precision Engineering, The University

More information

General Properties of Radiation Detectors Supplements

General Properties of Radiation Detectors Supplements Phys. 649: Nuclear Techniques Physics Departent Yarouk University Chapter 4: General Properties of Radiation Detectors Suppleents Dr. Nidal M. Ershaidat Overview Phys. 649: Nuclear Techniques Physics Departent

More information

lecture 36: Linear Multistep Mehods: Zero Stability

lecture 36: Linear Multistep Mehods: Zero Stability 95 lecture 36: Linear Multistep Mehods: Zero Stability 5.6 Linear ultistep ethods: zero stability Does consistency iply convergence for linear ultistep ethods? This is always the case for one-step ethods,

More information

3.8 Three Types of Convergence

3.8 Three Types of Convergence 3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to

More information