Device-to-Device Collaboration through Distributed Storage
|
|
- Randall Walters
- 5 years ago
- Views:
Transcription
1 Device-to-Device Collaboration through Distributed Storage Negin Golrezaei, Student Meber, IEEE, Alexandros G Diakis, Meber, IEEE, Andreas F Molisch, Fellow, IEEE Dept of Electrical Eng University of Southern California Los Angeles, CA, USA eails: {golrezae,diakis,olisch}@uscedu Abstract Video is the ain driver for the inexorable increase in wireless data traffic In this paper we analyze a new architecture in which device-to-device (DD) counications is used to drastically increase the capacity of cellular networks for video transission Users cache popular video files and - after receiving requests fro other users - serve these requests via DD localized transissions; the short range of the DD transission enables frequency reuse within the cell We analyze the scaling behavior of the throughput with the nuber of devices per cell The user content request statistics, as well as the caching distribution, are odeled by a Zipf distribution with paraeters γ r and γ c, respectively For the practically iportant case γ r < and γ c >, we derive a closed for expression for the scaling behavior of the nuber of DD links that coexist without interference Our analysis relies on a novel Poisson approxiation result for wireless networks obtained through the Chen-Stein Method I INTRODUCTION Wireless data traffic has risen sharply over the past years, and is expected to increase by a further factor of 40 over the next five years [] While the initial increase was ainly driven by web-browsing and associated applications, ephasis is now oving to wireless delivery of video content This threatens to overwhel the already-strained cellular networks Since increasing cellular data capacity by traditional eans (ore spectru, larger nuber of antennas, saller cells) is either reaching its natural liits or becoing very costly, there is a need for fundaentally new cellular architectures that can exploit the special properties of video requests (eg fro YouTube), as well as of odern sartphone applications Our architecture relies on two key observations: (i) Video has a high degree of content reuse, ie, a few popular files are requested by a large nuber of users (ii) Sartphones and tablets have significant storage capacity that is rapidly growing and typically underutilized Our proposed distributed storage schee is based on the fact that if there is enough content reuse, ie, any users are requesting the sae video content, the storage space on cellular devices can be used as a distributed cache [], [3] We allow users to store popular content and use local device-to-device (DD) counication for collaborative disseination when a user in the vicinity requests a popular file Since DD counication occurs over a short range, this enables frequency reuse, ie, the sae tie-frequency resource can be exploited by ultiple DD links within one acrocell This draatically increases the spectral efficiency and is siilar to the constant trend of shrinking cell sizes What is fundaentally different between DD counications and sall cells, however, is that feto and pico-cell base stations require high-bandwidth backhaul links The DD collaborative video content disseination schee we are proposing essentially replaces backhaul with storage, by caching files that have been already requested by users, without relying on additional infrastructure As the nuber of devices in a cell increases, the distance between devices becoes saller, which allows to use less power, and increase the frequency reuse Yet, on the other hand, ore users will request a greater variety of files, which decreases the probability that a device is within counication range of another device that has the desired content Thus, while it sees intuitive that a greater density of devices allows a larger nuber of active and non-interfering links within a cell, the actual functional scaling behavior cannot be obtained siply by inspection In our recent paper [4], we analyzed the scaling behavior of the average nuber of DD links that can coexist without interference when users choose which file to store randoly Throughout this work, the geoetry of our networks follows the standard Rando Geoetric Graph protocol odel [5], [6] We showed that the scaling behavior depends on both the content request statistics and content cache statistics which are odeled by Zipf distributions In particular, our prior work deonstrated that for particular types of content popularity and cache statistics, a linear scaling becoes feasible However, for a different range of paraeters for content statistics, we could only deterine loose upper bounds Our contributions: In this paper we close this gap in our theoretical understanding of the scaling behavior Specifically, we analyze the previously-unknown case where the Zipf distribution for the requests is characterized by a paraeter γ r < and the caching distribution by a paraeter γ c >, and provide a unique scaling law for the nuber of active DD links as a function of the nuber of devices in the cell Our analysis relies on a novel Poisson approxiation result for
2 Fig Rando geoetric graph exaple The connectivity radius is r(n) wireless networks obtained through the Chen-Stein Method We note that the case of γ r < is the ost practically relevant one, since prior epirical Youtube studies [7] have estiated this exponent to be in the range of The reainder of this paper is organized as follows: In Section II we setup the proble forulation, defining the popularity distributions and active links Section III contains our ain theore, the scaling behavior of the average nuber of DD interference-free links After soe siulation results, in Section V we discuss future directions, open probles and conclusions II MODEL AND SETUP Consider a cellular network where each cell/base station (BS) serves n users For siplicity we assue that the cells are square, and neglect inter-cell interference, so that we can consider one cell in isolation Users are distributed uniforly in the cell Every user is assued to have a storage capacity called cache, which is filled up with soe video files The base station (BS) ight be aware of the stored files and channel state inforation of the users and control the DD counications We assue that the DD counication does not interfere with counication between the BS and users This assuption is justified if the DD counications occur in a separate frequency band (eg, WiFi) For the deviceto-device throughput, we henceforth do not need to consider explicitly the BS and its associated counications Each user in the cell requests a file randoly and independently fro a library of size The size of the library is a function of the nuber of users n, since a larger nuber of users covers a larger set of files they could be interested in Studies show that there is redundancy in video requests and soe popular files are requested ore [7] We assue that the various file popularities are distributed as per the Zipf distribution, which has been established in nuerous studies as being a good approxiation to the easured popularity of video files [8] In a Zipf distribution, the frequency of the ith popular file, denoted by f i, is inversely proportional to its rank: f i = i γr j=, i, () j γr The exponent γ r characterizes the distribution by controlling the relative popularity of files A large γ r eans a concentrated distribution, ie, the first few popular files account for the ajority of requests Ref [7] confired the Zipf odel for video popularity based on epirical YouTube data and easured the γ r exponent in the range of In this paper we refer to the range γ r > as the high content reuse regie and γ r < as the low content reuse regie Each user (peer) has soe storage capability that we use to cache video files For siplicity in our analysis, we assue that all files have the sae size, and each user can store one file This assuption has the advantage of yielding a clean forulation; however, our work can be easily extended to larger cache size Our counication network is odeled by a rando geoetric graph G(n, r(n)) where two users (assuing DD counication is possible) can counicate if their physical distance is saller than soe collaboration distance r(n) [5], [6] The axiu allowable distance for DD counication r(n) is deterined by the power level for each transission Figure illustrates an exaple of rando geoetric graph (RGG) Our odel works as follows: if a user requests one of the files stored in neighbors caches in the RGG, neighbors will handle the request locally through DD counication; otherwise, the BS should serve the request Thus, to have DD counication it is not sufficient that the distance between two users be less than r(n); users should find their desired files locally in caches of their neighbors Therefore, the probability that DD counications happen depends on what files are stored by the users Caching decisions can be ade either in a distributed or centralized way A central control of the caching by the BS allows very efficient file-assignent to the users [9] However, if such control is not desired, and/or the users are oving around quickly, then the caching has to be done distributedly and randoly In other words, each user will cache files according to a probability density function (pdf) In order to avoid the difficulties of optiizing a function, we assued that the functional for of the caching pdf is also a Zipf distribution, but with a paraeter γ c that can be different fro the paraeter γ r In our previous work, we showed the surprising fact that the optiu γ c is not equal to γ r [] We assue that all DD links share the sae tie-frequency transission resource within one cell area This is possible since the distance between requesting user and sartphone with the stored file will be sall in ost cases However, there should be no interference of a transission by others on an active DD link We assue that - given that node u wants to transit to node v - any transission within range r(n) fro v (the receiver) can introduce interference for the u v transission Thus, such two links cannot be activated siultaneously This odel is known as protocol odel; while it neglects iportant wireless propagation effects such as fading [0], it can provide fundaental insights and has been widely used in the literature [5]
3 The proble we investigate is: how does the nuber of active DD links scale given that users request files based on a Zipf distribution with exponent γ r and cache files with exponent γ c III ANALYSIS In this section, we investigate the asyptotic behavior of the average nuber of DD links that can exist without introducing interference to other DD links We consider a dense scenario in which the nuber of users in the cell n goes to infinity Recall big O and Ω notations : f(n) = O(g(n)) and f(n) = Ω(g(n)) respectively denote that f(n) cg(n) and f(n) cg(n) where c is a constant Besides, according to Knuth s notations if f(n) = Θ(g(n)), it eans that f(n) = O(g(n)) as well as f(n) = Ω(g(n)) Little-o notation, f(x) ie, f(x) = o(g(x)) is equivalent to li x g(x) = 0 Throughout this paper, c is used to denote deterinistic positive constants not depending on n The scaling law for the high content reuse regie was derived in our recent prior work [4] We showed that if γ r >, the expected nuber of active DD links scales like (a) E[L] = Θ(n) However, for the case low content reuse regie, γ r <, the upper and lower bound scaling laws of [4] have different exponents The ain result of this paper is a precise characterization of E[L] for the low content reuse regie Theore : If γ r <, γ c >, and r(n) = Θ( E[L] = Θ( n ( a)( γr) ), b n ), where a = b γ c and 0 < a < ( γr) γ c+ γ r This is achieved for any value of the storage exponent γ c > We can see that as a user sees on average ore users in its neighborhood (larger a), the nuber of active DD links that can coexist increases with n Proof: First, we establish the lower bound for E[L] We divide the cell into r(n) virtual square clusters Figure (a) shows the virtual clusters in the cell The cell side is noralized to and the side of each cluster is equal to r(n) Thus, all users within clusters can counicate with each other Besides, based on the protocol odel, in each cluster only one link can be activated siultaneously When there is an active link within a cluster, we call the cluster good But, not all good clusters can be activated siultaneously One good cluster can at ost block 6 clusters (see Figure (b)) The axiu interference happens when a user in the corner of a cluster receives a file fro another user Thus, we have E[L] E[G] 7 where E[G] is the expected nuber of good clusters Since we want to find the lower bound for E[L], we can liit users (b) Fig a) Dividing cell into virtual clusters b) In the worst case, a good cluster can block at ost 6 clusters In the dashed circle, receiving is not possible and in the solid circle, transission is not allowed to counicate with users in virtual clusters they belong to Thus, we have: E[G] = n r(n) Pr[good k] Pr[K = k] k=0 r(n) Pr[good k] Pr[K = k], () k A where A = [nr(n) ( δ)/, nr(n) (+δ)/] and 0 < δ < r(n) is the total nuber of virtual clusters K is the nuber of users in the cluster, which is a binoial rando variable with n trials and probability of r(n), ie, K = B(n, r(n) ) Pr[K = k] is the probability that there are k users in the cluster and Pr[good k] is the probability that the cluster is good conditioned on k Define k arg in Pr[good k] Pr[K = k] k A Notice that k is Θ(nr(n) ) Fro (), we have: E[G] r(n) Pr[good k ] Pr[K A] (3) r(n) Pr[good k ]( e nr(n) δ /6 ) (4)
4 We apply a Chernoff bound to derive equation (4) [] Fro the range of r(n), the second ter in (4), ie, ( e nr(n) δ /6 ) is O() Thus, to prove the theore, we should show that Pr[good k nr(n) ] c( ) ( a)( γr ) Let us define an indicator function u for each user within a cluster u is if user u can find its requested file within the cluster; otherwise it is 0 Since users cache files randoly, the set of available files through DD links in the cluster is also rando Thus, u and u for u u are dependent rando variables In that case, given that user u requests according to the soe popularity distribution and it cannot find it locally, it is ore likely that files currently within the cluster cache are not popular files So, if user u requests independently fro user u but according to the sae popularity distribution, it is ore probable that user u also cannot find its request file locally The cluster is good if at least one of users within the cluster finds its desired file via DD counication Thus, Let us define Pr[good k ] = Pr[ u = 0] k u= W u (5) k u= By using the Chen Stein ethod in lea 3, we show that W can be approxiated by a Poisson rando variable with average of λ E[ k u= u] We also show that the probability that W is zero is asyptotically equal to e λ where λ = k E[ u ] = k i= f i ( ( p i ) k ) (6) p i is the probability that a user caches file i based on Zipf distribution with exponent γ c In the above equation we consider the possibility of self-requests, ie, a user ight find the file it requests in its own cache; in this case clearly no DD counication will be activated by this user Then, we have: Pr[good k ] = e λ (7) nr(n) In lea, we show that λ = Θ( ) = o() Thus, ( a)( γr ) Pr[good k nr(n) ] = Θ(λ) = Θ( ( a)( γr) ), fro which the lower bound follows Now, we prove the upper bound The probability that a user cannot find its desired file locally is the probability that either he has the file itself or all his neighbours do not have the desired files Thus we have: E[L] n Pr[no DD] n = n f j p j + n Pr[K = k] f j ( ( p j ) k ) j= j= k= k= j= n n f j p j + n Pr[K = k] [ a f j + k n j= j= j= f j p j + n [ a f j + πnr(n) j= a + j= a + f j p j ], f j p j ] where K is the nuber of a users that counicate K is a binoial rando variable, ie, K = B(n, πr(n) ) In the second equation above, the first suation is the probability that a user requests a file that he has already stored The second suation is the probability that the user requests a file and all users in its neighborhood in RGG have not stored the desired n file Using lea, E[L] = Ω( ) ( a)( γr ) Lea : i) If γ > and a = o(b), H(γ, a, b) = Θ( a ii) If γ <, a = o(b), and a = Θ(), iii) If γ r <, γ c >, γ ) H(γ, a, b) = Θ(b γ ) f j p j = Θ( j= γr ), where the haronic function H(γ, a, b) = x γ b j=a i γ Proof: We first prove the parts i and ii of the lea is onotonically decreasing Thus, H(γ, a, b) b x=a We also have the following inequality: H(γ, a, b) a γ = Thus, H(γ, a, b) satisfies: b ( γ+) a γ+ γ + x γ = b( γ+) a γ+ (8) γ + b j=a+ b x=a j γ x γ = b( γ+) a ( γ+) (9) γ + H(γ, a, b) b( γ+) a γ+ γ + + a γ (0) Therefore, if γ >, H(γ, a, b) = Θ( a γ ) Besides, if γ < and a = Θ(), then H(γ, a, b) = Θ(b γ )
5 For part iii, using (), we have: jγr +γc f j p j = j= j γr j= γ c = H(γ c + γ r,, ) H(γ c,, )H(γ r,, ), () j= j= When γ c > and γ r <, H(γ c + γ r,, ) and H(γ c,, ) are both Θ() and H(γ r,, ) = Θ( γr ) which follows the result Lea : If γ c >, γ r <, k = Θ( b ), p u E[ u ] = Θ( ) () ( a)( γr) p uu E[ u u ] = O( ), (3) ( a)( γr) where a = b γ c Proof: We first prove the first part of the lea E[ u ] is given in (6) E[ u ] = f j ( ( p j ) k ) + a j= j= a + f j + (k ) a j= f j ( ( p j ) k ) j= a + f j p j H(γ r,, a ) H(γ r,, ) + (k ) H(γ c + γ r, a +, ) H(γ r,, )H(γ c,, ), (4) where the haronic function H is defined in lea If we apply the results of lea, we can show that both ters in (4) are Θ( ) ( a)( γr ) For the lower-bound, we have: E[ u ] f j ( ( p j ) k ) a j= f j ( e (k )pj ) a j= Using lea, we know p j = Θ( j γ ) Then, considering that j = O( a ), the exponent (k )p j is Ω() Therefore, a E[ u ] c j= f j = H(γ r,, a ) H(γ r,, ) = Θ( ) (5) ( a)( γr) Now, we show the second part of the lea p uu = Pr[ u = 0 and u = 0] = f i f j ( ( p i p j ) k ) + i= j=,i j f i ( ( p i ) k ) i= i= j= f i f j ( ( p i p j ) k ) f i f j + + a a i= j= i= a + j= a + ( a a ) f i + i= Then, we have: a i= j= a + f i f j k(p i + p j ) i= j= a + f i f j f i f j + k i= a + f i p i p uu H(γ r,, a ) H(γ r,, ) + H(γ r,, a )H(γ r, a +, ) H(γ r,, ) (6) + k H(γ c + γ r, a +, ) H(γ r,, )H(γ c,, ) (7) According to the scaling results of the lea, the first, the second and the third ters are respectively Θ( ), Θ( ) and Θ( ) Thus, ( a)( γr ) ( a)( γr ) ( a)( γr ) p u,u = O( ) ( a)( γr ) Lea 3: W defined in (5) is asyptotically a Poisson rando variable with ean λ = E[W ] and Pr[W = 0] asyptotically equals e λ if k = Θ( aγc ) where 0 < a < ( γ r) γ c+ γ r Proof: To prove the lea, we use the Chen Stein ethod (the following theore) Theore : [] Let W be the nuber of occurrence of dependent events, and Z be a Poisson rando variable with E[Z] = E[W ] = λ Then and D(W ) D(Z) (b + b ), (8) Pr(W = 0) e λ < ( λ )(b + b ), (9) where D(W ) D(Z) is the total variation distance between the distribution of W and Z, λ is the iniu of and λ, and k k b = p u p u (0) b = u= u = k u= u = k p uu ()
6 p u and p uu are respectively defined in () and (3) Using the results of lea b = k Θ( ) () ( a)( γr) b = k O( ) (3) ( a)( γr) Then, fro (8), W is asyptotically a Poisson rando variable if b + b = o() which iplies that k should be o( ( a)( γr)/ ) Considering that k = Θ( aγc ), we can ( γ conclude that a in the lea should be less than r) γ c+ γ r Beside, fro (9), we can see when b + b = o(), the probability that W is zero asyptotically approaches e λ IV SIMULATION RESULTS In this section, we provide soe nuerical results to verify our theoretical analyses We consider there are n active users which are randoly distributed across the entire cell There is a library of size = 0 4 log(n) For the siulation, we use Monte Carlo ethod In every iteration, we place n users randoly in the cell Each user stores/requests one file randoly by sapling fro the Zipf distribution with exponents γ c /γ r Based on that, we deterine all good DD links and axiu nuber of DD links that can be activated siultaneously without introducing interference for each other Figure 3 illustrates the average nuber of active DD links versus the nuber users in the cell with γ c = and for different value of γ r The paraeter a in the theore is 0, ie, r(n) = 0 n We can see that the theoretical results atch the siulations As expected, for larger γ r (ore content reuse) there exist ore non interfering DD links Siulation results deonstrate that the scaling law, though defined for large node density, is experientally verified for 00 obiles per cell, which is a realistic scale for today s systes We furtherore find that even though the scaling behavior of the nuber of non-interfering collaborative links grows sub-linearly with the nuber of users, the deviation fro linearity is sall for a wide range of paraeters γ r and γ c This theoretically justifies what we would intuitively expect: device-to-device video sharing, enabled by local storage can bring treendous benefits in future wireless systes VI ACKNOWLEDGEMENTS This work was financially supported by the Intel/Cisco VAWN project Helpful discussions with Chris Raing and Jeff Foerster (Intel), as well as Giuseppe Caire, Michael Neely, Antonio Ortega, and Jay Kuo (USC) are gratefully acknowledged REFERENCES [] /ns705/ns87/white paper c-5086htl [] N Golrezaei, A F Molisch, and A G Diakis, Base station assisted device-to-device counications for high-throughput wireless video networks, subitted for publication [3] N Golrezaei, K Shanuga, A G Diakis, A F Molisch, and G Caire, Fetocaching: Wireless video content delivery through distributed caching helpers, in INFOCOM IEEE, 0 [4] N Golrezaei, A G Diakis, and A F Molisch, Wireless device-todevice counications with distributed caching, subitted for publication [5] P Gupta and P Kuar, The capacity of wireless networks, Inforation Theory, IEEE Transactions on, vol 46, no, pp , 000 [6] M Penrose and O U Press, Rando geoetric graphs Oxford University Press Oxford, 003, vol 5 [7] [8] M Cha, H Kwak, P Rodriguez, Y Ahn, and S Moon, I tube, you tube, everybody tubes: analyzing the world s largest user generated content video syste, in Proceedings of the 7th ACM SIGCOMM conference on Internet easureent ACM, 007, pp 4 [9] N Golrezaei, A G Diakis, and A F Molisch, Asyptotic throughput of base station assisted device-to-device counications, pp , to be subitted for publication [0] A F Molisch, Wireless counications IEEE Wiley, 0 [] M Mitzenacher and E Upfal, Probability and coputing: Randoized algoriths and probabilistic analysis Cabridge Univ Pr, 005 [] R Arratia, L Goldstein, and L Gordon, Two oents suffice for poisson approxiations: the chen stein ethod, The Annals of Probability, vol 7, no, pp 9 5, 989 Fig 3 The average nuber of active DD links versus the nuber users in the cell, γ c = and a = 0 V CONCLUSIONS We discussed a novel schee for increasing the efficiency of video content delivery in cellular counications systes We found the scaling behavior of nuber of interferencefree DD links as a function of the statistics of requests, the statistics of the caching, and the collaboration distance
Non-Parametric Non-Line-of-Sight Identification 1
Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,
More informationThe Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks
The Throughput-Outage Tradeoff of Wireless One-Hop Caching Networks Mingyue Ji, Student Meber, IEEE, Giuseppe Caire, Fellow, IEEE, and Andreas F. Molisch, Fellow, IEEE arxiv:3.637v [cs.it] 8 Jul 05 The
More information13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices
CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay
More informationOn Constant Power Water-filling
On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives
More informationAsynchronous Gossip Algorithms for Stochastic Optimization
Asynchronous Gossip Algoriths for Stochastic Optiization S. Sundhar Ra ECE Dept. University of Illinois Urbana, IL 680 ssrini@illinois.edu A. Nedić IESE Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu
More informationSPECTRUM sensing is a core concept of cognitive radio
World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile
More informationA Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay
A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer
More informationOn the Design of MIMO-NOMA Downlink and Uplink Transmission
On the Design of MIMO-NOMA Downlink and Uplink Transission Zhiguo Ding, Meber, IEEE, Robert Schober, Fellow, IEEE, and H. Vincent Poor, Fellow, IEEE Abstract In this paper, a novel MIMO-NOMA fraework for
More informationNonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy
Storage Capacity and Dynaics of Nononotonic Networks Bruno Crespi a and Ignazio Lazzizzera b a. IRST, I-38050 Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I-38050 Povo (Trento) Italy INFN Gruppo
More informationThis model assumes that the probability of a gap has size i is proportional to 1/i. i.e., i log m e. j=1. E[gap size] = i P r(i) = N f t.
CS 493: Algoriths for Massive Data Sets Feb 2, 2002 Local Models, Bloo Filter Scribe: Qin Lv Local Models In global odels, every inverted file entry is copressed with the sae odel. This work wells when
More informationImpact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels
This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings Ipact of Iperfect Channel State Inforation on ARQ
More informationOptimal Resource Allocation in Multicast Device-to-Device Communications Underlaying LTE Networks
1 Optial Resource Allocation in Multicast Device-to-Device Counications Underlaying LTE Networks Hadi Meshgi 1, Dongei Zhao 1 and Rong Zheng 2 1 Departent of Electrical and Coputer Engineering, McMaster
More informationE0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis
E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds
More informationBlock designs and statistics
Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent
More informationCourse Notes for EE227C (Spring 2018): Convex Optimization and Approximation
Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October
More informationVulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Time-Varying Jamming Links
Vulnerability of MRD-Code-Based Universal Secure Error-Correcting Network Codes under Tie-Varying Jaing Links Jun Kurihara KDDI R&D Laboratories, Inc 2 5 Ohara, Fujiino, Saitaa, 356 8502 Japan Eail: kurihara@kddilabsjp
More informationarxiv: v2 [math.co] 3 Dec 2008
arxiv:0805.2814v2 [ath.co] 3 Dec 2008 Connectivity of the Unifor Rando Intersection Graph Sion R. Blacburn and Stefanie Gere Departent of Matheatics Royal Holloway, University of London Egha, Surrey TW20
More informationSymbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm
Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat
More informationHybrid System Identification: An SDP Approach
49th IEEE Conference on Decision and Control Deceber 15-17, 2010 Hilton Atlanta Hotel, Atlanta, GA, USA Hybrid Syste Identification: An SDP Approach C Feng, C M Lagoa, N Ozay and M Sznaier Abstract The
More informationFairness via priority scheduling
Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation
More informationAnalytical Model of Epidemic Routing for Delay-Tolerant Networks Qingshan Wang School of Mathematics Hefei University of Technology Hefei, China
Analytical Model of Epideic Routing for Delay-Tolerant etwors Qingshan Wang School of Matheatics Hefei University of Technology Hefei, China qswang@hfut.edu.cn Zygunt J. Haas School of Electrical and Coputer
More informationA note on the multiplication of sparse matrices
Cent. Eur. J. Cop. Sci. 41) 2014 1-11 DOI: 10.2478/s13537-014-0201-x Central European Journal of Coputer Science A note on the ultiplication of sparse atrices Research Article Keivan Borna 12, Sohrab Aboozarkhani
More informationIN modern society that various systems have become more
Developent of Reliability Function in -Coponent Standby Redundant Syste with Priority Based on Maxiu Entropy Principle Ryosuke Hirata, Ikuo Arizono, Ryosuke Toohiro, Satoshi Oigawa, and Yasuhiko Takeoto
More informationResearch Article On the Isolated Vertices and Connectivity in Random Intersection Graphs
International Cobinatorics Volue 2011, Article ID 872703, 9 pages doi:10.1155/2011/872703 Research Article On the Isolated Vertices and Connectivity in Rando Intersection Graphs Yilun Shang Institute for
More informationUniform Approximation and Bernstein Polynomials with Coefficients in the Unit Interval
Unifor Approxiation and Bernstein Polynoials with Coefficients in the Unit Interval Weiang Qian and Marc D. Riedel Electrical and Coputer Engineering, University of Minnesota 200 Union St. S.E. Minneapolis,
More informationA Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science
A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest
More informationOn Conditions for Linearity of Optimal Estimation
On Conditions for Linearity of Optial Estiation Erah Akyol, Kuar Viswanatha and Kenneth Rose {eakyol, kuar, rose}@ece.ucsb.edu Departent of Electrical and Coputer Engineering University of California at
More informationLower Bounds for Quantized Matrix Completion
Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &
More informationFixed-to-Variable Length Distribution Matching
Fixed-to-Variable Length Distribution Matching Rana Ali Ajad and Georg Böcherer Institute for Counications Engineering Technische Universität München, Gerany Eail: raa2463@gail.co,georg.boecherer@tu.de
More informationASSUME a source over an alphabet size m, from which a sequence of n independent samples are drawn. The classical
IEEE TRANSACTIONS ON INFORMATION THEORY Large Alphabet Source Coding using Independent Coponent Analysis Aichai Painsky, Meber, IEEE, Saharon Rosset and Meir Feder, Fellow, IEEE arxiv:67.7v [cs.it] Jul
More informationOn random Boolean threshold networks
On rando Boolean threshold networs Reinhard Hecel, Steffen Schober and Martin Bossert Institute of Telecounications and Applied Inforation Theory Ul University Albert-Einstein-Allee 43, 89081Ul, Gerany
More informationSharp Time Data Tradeoffs for Linear Inverse Problems
Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used
More informationExtension of CSRSM for the Parametric Study of the Face Stability of Pressurized Tunnels
Extension of CSRSM for the Paraetric Study of the Face Stability of Pressurized Tunnels Guilhe Mollon 1, Daniel Dias 2, and Abdul-Haid Soubra 3, M.ASCE 1 LGCIE, INSA Lyon, Université de Lyon, Doaine scientifique
More informationBayesian Approach for Fatigue Life Prediction from Field Inspection
Bayesian Approach for Fatigue Life Prediction fro Field Inspection Dawn An and Jooho Choi School of Aerospace & Mechanical Engineering, Korea Aerospace University, Goyang, Seoul, Korea Srira Pattabhiraan
More informationIn this chapter, we consider several graph-theoretic and probabilistic models
THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions
More informationInspection; structural health monitoring; reliability; Bayesian analysis; updating; decision analysis; value of information
Cite as: Straub D. (2014). Value of inforation analysis with structural reliability ethods. Structural Safety, 49: 75-86. Value of Inforation Analysis with Structural Reliability Methods Daniel Straub
More informationThe Weierstrass Approximation Theorem
36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined
More informationStatistical Logic Cell Delay Analysis Using a Current-based Model
Statistical Logic Cell Delay Analysis Using a Current-based Model Hanif Fatei Shahin Nazarian Massoud Pedra Dept. of EE-Systes, University of Southern California, Los Angeles, CA 90089 {fatei, shahin,
More informationIEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 60, NO. 2, FEBRUARY ETSP stands for the Euclidean traveling salesman problem.
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 60, NO., FEBRUARY 015 37 Target Assignent in Robotic Networks: Distance Optiality Guarantees and Hierarchical Strategies Jingjin Yu, Meber, IEEE, Soon-Jo Chung,
More informationWarning System of Dangerous Chemical Gas in Factory Based on Wireless Sensor Network
565 A publication of CHEMICAL ENGINEERING TRANSACTIONS VOL. 59, 07 Guest Editors: Zhuo Yang, Junie Ba, Jing Pan Copyright 07, AIDIC Servizi S.r.l. ISBN 978-88-95608-49-5; ISSN 83-96 The Italian Association
More informationKernel-Based Nonparametric Anomaly Detection
Kernel-Based Nonparaetric Anoaly Detection Shaofeng Zou Dept of EECS Syracuse University Eail: szou@syr.edu Yingbin Liang Dept of EECS Syracuse University Eail: yliang6@syr.edu H. Vincent Poor Dept of
More informationMachine Learning Basics: Estimators, Bias and Variance
Machine Learning Basics: Estiators, Bias and Variance Sargur N. srihari@cedar.buffalo.edu This is part of lecture slides on Deep Learning: http://www.cedar.buffalo.edu/~srihari/cse676 1 Topics in Basics
More informationCS Lecture 13. More Maximum Likelihood
CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood
More informationDesign of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding
IEEE TRANSACTIONS ON INFORMATION THEORY (SUBMITTED PAPER) 1 Design of Spatially Coupled LDPC Codes over GF(q) for Windowed Decoding Lai Wei, Student Meber, IEEE, David G. M. Mitchell, Meber, IEEE, Thoas
More informationTEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES
TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES S. E. Ahed, R. J. Tokins and A. I. Volodin Departent of Matheatics and Statistics University of Regina Regina,
More informationarxiv: v1 [cs.ds] 3 Feb 2014
arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/
More informationQuantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search
Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths
More informationModel Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon
Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential
More informationUsing a De-Convolution Window for Operating Modal Analysis
Using a De-Convolution Window for Operating Modal Analysis Brian Schwarz Vibrant Technology, Inc. Scotts Valley, CA Mark Richardson Vibrant Technology, Inc. Scotts Valley, CA Abstract Operating Modal Analysis
More information4920 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 63, NO. 12, DECEMBER 2015
4920 IEEE TRASACTIOS O COMMUICATIOS, VOL. 63, O. 12, DECEMBER 2015 Energy Efficient Coordinated Beaforing for Multicell Syste: Duality-Based Algorith Design and Massive MIMO Transition Shiwen He, Meber,
More informationNumerical Studies of a Nonlinear Heat Equation with Square Root Reaction Term
Nuerical Studies of a Nonlinear Heat Equation with Square Root Reaction Ter Ron Bucire, 1 Karl McMurtry, 1 Ronald E. Micens 2 1 Matheatics Departent, Occidental College, Los Angeles, California 90041 2
More informationSupport recovery in compressed sensing: An estimation theoretic approach
Support recovery in copressed sensing: An estiation theoretic approach Ain Karbasi, Ali Horati, Soheil Mohajer, Martin Vetterli School of Coputer and Counication Sciences École Polytechnique Fédérale de
More informationError Exponents in Asynchronous Communication
IEEE International Syposiu on Inforation Theory Proceedings Error Exponents in Asynchronous Counication Da Wang EECS Dept., MIT Cabridge, MA, USA Eail: dawang@it.edu Venkat Chandar Lincoln Laboratory,
More informationDepartment of Electronic and Optical Engineering, Ordnance Engineering College, Shijiazhuang, , China
6th International Conference on Machinery, Materials, Environent, Biotechnology and Coputer (MMEBC 06) Solving Multi-Sensor Multi-Target Assignent Proble Based on Copositive Cobat Efficiency and QPSO Algorith
More informationAntenna Saturation Effects on MIMO Capacity
Antenna Saturation Effects on MIMO Capacity T S Pollock, T D Abhayapala, and R A Kennedy National ICT Australia Research School of Inforation Sciences and Engineering The Australian National University,
More informationDistance Optimal Target Assignment in Robotic Networks under Communication and Sensing Constraints
Distance Optial Target Assignent in Robotic Networks under Counication and Sensing Constraints Jingjin Yu CSAIL @ MIT/MechE @ BU Soon-Jo Chung Petros G. Voulgaris AE @ University of Illinois Supported
More informationStochastic Subgradient Methods
Stochastic Subgradient Methods Lingjie Weng Yutian Chen Bren School of Inforation and Coputer Science University of California, Irvine {wengl, yutianc}@ics.uci.edu Abstract Stochastic subgradient ethods
More informationA Simple Regression Problem
A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where
More informationComputable Shell Decomposition Bounds
Coputable Shell Decoposition Bounds John Langford TTI-Chicago jcl@cs.cu.edu David McAllester TTI-Chicago dac@autoreason.co Editor: Leslie Pack Kaelbling and David Cohn Abstract Haussler, Kearns, Seung
More information1 Bounding the Margin
COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #12 Scribe: Jian Min Si March 14, 2013 1 Bounding the Margin We are continuing the proof of a bound on the generalization error of AdaBoost
More informationInteractive Markov Models of Evolutionary Algorithms
Cleveland State University EngagedScholarship@CSU Electrical Engineering & Coputer Science Faculty Publications Electrical Engineering & Coputer Science Departent 2015 Interactive Markov Models of Evolutionary
More informationRandomized Recovery for Boolean Compressed Sensing
Randoized Recovery for Boolean Copressed Sensing Mitra Fatei and Martin Vetterli Laboratory of Audiovisual Counication École Polytechnique Fédéral de Lausanne (EPFL) Eail: {itra.fatei, artin.vetterli}@epfl.ch
More informationThe Transactional Nature of Quantum Information
The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.
More informationA DESIGN GUIDE OF DOUBLE-LAYER CELLULAR CLADDINGS FOR BLAST ALLEVIATION
International Journal of Aerospace and Lightweight Structures Vol. 3, No. 1 (2013) 109 133 c Research Publishing Services DOI: 10.3850/S201042862013000550 A DESIGN GUIDE OF DOUBLE-LAYER CELLULAR CLADDINGS
More informationSoft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis
Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES
More informationOn the theoretical analysis of cross validation in compressive sensing
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.erl.co On the theoretical analysis of cross validation in copressive sensing Zhang, J.; Chen, L.; Boufounos, P.T.; Gu, Y. TR2014-025 May 2014 Abstract
More informationResearch Article Rapidly-Converging Series Representations of a Mutual-Information Integral
International Scholarly Research Network ISRN Counications and Networking Volue 11, Article ID 5465, 6 pages doi:1.54/11/5465 Research Article Rapidly-Converging Series Representations of a Mutual-Inforation
More informationMSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE
Proceeding of the ASME 9 International Manufacturing Science and Engineering Conference MSEC9 October 4-7, 9, West Lafayette, Indiana, USA MSEC9-8466 MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL
More informationRevisiting the performance of the modular clock algorithm for distributed blind rendezvous in cognitive radio networks
Revisiting the perforance of the odular clock algorith for distributed blind rendezvous in cognitive radio networks Michel Barbeau, Gier Cervera, Joaquin Garcia-Alfaro, Evangelos Kranakis To cite this
More informationarxiv: v1 [cs.ds] 17 Mar 2016
Tight Bounds for Single-Pass Streaing Coplexity of the Set Cover Proble Sepehr Assadi Sanjeev Khanna Yang Li Abstract arxiv:1603.05715v1 [cs.ds] 17 Mar 2016 We resolve the space coplexity of single-pass
More informationGreen Inter-Cluster Interference Management in Uplink of Multi-Cell Processing Systems
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS 1 Green Inter-Cluster Interference Manageent in Uplink of Multi-Cell Processing Systes Efstathios Katranaras, Meber, IEEE, Muhaad Ali Iran, Senior Meber, IEEE,
More informationAverage Consensus and Gossip Algorithms in Networks with Stochastic Asymmetric Communications
Average Consensus and Gossip Algoriths in Networks with Stochastic Asyetric Counications Duarte Antunes, Daniel Silvestre, Carlos Silvestre Abstract We consider that a set of distributed agents desire
More informationŞtefan ŞTEFĂNESCU * is the minimum global value for the function h (x)
7Applying Nelder Mead s Optiization Algorith APPLYING NELDER MEAD S OPTIMIZATION ALGORITHM FOR MULTIPLE GLOBAL MINIMA Abstract Ştefan ŞTEFĂNESCU * The iterative deterinistic optiization ethod could not
More informationAn Improved Particle Filter with Applications in Ballistic Target Tracking
Sensors & ransducers Vol. 72 Issue 6 June 204 pp. 96-20 Sensors & ransducers 204 by IFSA Publishing S. L. http://www.sensorsportal.co An Iproved Particle Filter with Applications in Ballistic arget racing
More informationCompression and Predictive Distributions for Large Alphabet i.i.d and Markov models
2014 IEEE International Syposiu on Inforation Theory Copression and Predictive Distributions for Large Alphabet i.i.d and Markov odels Xiao Yang Departent of Statistics Yale University New Haven, CT, 06511
More informationPh 20.3 Numerical Solution of Ordinary Differential Equations
Ph 20.3 Nuerical Solution of Ordinary Differential Equations Due: Week 5 -v20170314- This Assignent So far, your assignents have tried to failiarize you with the hardware and software in the Physics Coputing
More informationIs the seismic moment frequency relation universal?
Geophys. J. Int. (2) 142, 193 198 Is the seisic oent frequency relation universal? C. Godano1 and F. Pingue2 1 Dipartiento di Scienze Abientali, Seconda Università di Napoli, via V ivaldi 43, 811 Caserta,
More informationProbability Distributions
Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples
More informationComputable Shell Decomposition Bounds
Journal of Machine Learning Research 5 (2004) 529-547 Subitted 1/03; Revised 8/03; Published 5/04 Coputable Shell Decoposition Bounds John Langford David McAllester Toyota Technology Institute at Chicago
More informationA Note on the Applied Use of MDL Approximations
A Note on the Applied Use of MDL Approxiations Daniel J. Navarro Departent of Psychology Ohio State University Abstract An applied proble is discussed in which two nested psychological odels of retention
More informationSampling How Big a Sample?
C. G. G. Aitken, 1 Ph.D. Sapling How Big a Saple? REFERENCE: Aitken CGG. Sapling how big a saple? J Forensic Sci 1999;44(4):750 760. ABSTRACT: It is thought that, in a consignent of discrete units, a certain
More informationEstimating Entropy and Entropy Norm on Data Streams
Estiating Entropy and Entropy Nor on Data Streas Ait Chakrabarti 1, Khanh Do Ba 1, and S. Muthukrishnan 2 1 Departent of Coputer Science, Dartouth College, Hanover, NH 03755, USA 2 Departent of Coputer
More informationLecture 21 Nov 18, 2015
CS 388R: Randoized Algoriths Fall 05 Prof. Eric Price Lecture Nov 8, 05 Scribe: Chad Voegele, Arun Sai Overview In the last class, we defined the ters cut sparsifier and spectral sparsifier and introduced
More informationOptimal Jamming Over Additive Noise: Vector Source-Channel Case
Fifty-first Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 2-3, 2013 Optial Jaing Over Additive Noise: Vector Source-Channel Case Erah Akyol and Kenneth Rose Abstract This paper
More informationma x = -bv x + F rod.
Notes on Dynaical Systes Dynaics is the study of change. The priary ingredients of a dynaical syste are its state and its rule of change (also soeties called the dynaic). Dynaical systes can be continuous
More informationTesting Properties of Collections of Distributions
Testing Properties of Collections of Distributions Reut Levi Dana Ron Ronitt Rubinfeld April 9, 0 Abstract We propose a fraework for studying property testing of collections of distributions, where the
More informationSpine Fin Efficiency A Three Sided Pyramidal Fin of Equilateral Triangular Cross-Sectional Area
Proceedings of the 006 WSEAS/IASME International Conference on Heat and Mass Transfer, Miai, Florida, USA, January 18-0, 006 (pp13-18) Spine Fin Efficiency A Three Sided Pyraidal Fin of Equilateral Triangular
More informationON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD
PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Matheatical Sciences 04,, p. 7 5 ON THE TWO-LEVEL PRECONDITIONING IN LEAST SQUARES METHOD M a t h e a t i c s Yu. A. HAKOPIAN, R. Z. HOVHANNISYAN
More informationThe degree of a typical vertex in generalized random intersection graph models
Discrete Matheatics 306 006 15 165 www.elsevier.co/locate/disc The degree of a typical vertex in generalized rando intersection graph odels Jerzy Jaworski a, Michał Karoński a, Dudley Stark b a Departent
More informationIAENG International Journal of Computer Science, 42:2, IJCS_42_2_06. Approximation Capabilities of Interpretable Fuzzy Inference Systems
IAENG International Journal of Coputer Science, 4:, IJCS_4 6 Approxiation Capabilities of Interpretable Fuzzy Inference Systes Hirofui Miyajia, Noritaka Shigei, and Hiroi Miyajia 3 Abstract Many studies
More informationSynchronization in large directed networks of coupled phase oscillators
CHAOS 16, 015107 2005 Synchronization in large directed networks of coupled phase oscillators Juan G. Restrepo a Institute for Research in Electronics and Applied Physics, University of Maryland, College
More informationEstimation of the Mean of the Exponential Distribution Using Maximum Ranked Set Sampling with Unequal Samples
Open Journal of Statistics, 4, 4, 64-649 Published Online Septeber 4 in SciRes http//wwwscirporg/ournal/os http//ddoiorg/436/os4486 Estiation of the Mean of the Eponential Distribution Using Maiu Ranked
More informationTaming the Matthew Effect in Online Markets with Social Influence
Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence AAAI-17 Taing the Matthew Effect in Online Markets with Social Influence Franco Berbeglia Carnegie Mellon University fberbegl@andrewcuedu
More informationOptimal nonlinear Bayesian experimental design: an application to amplitude versus offset experiments
Geophys. J. Int. (23) 155, 411 421 Optial nonlinear Bayesian experiental design: an application to aplitude versus offset experients Jojanneke van den Berg, 1, Andrew Curtis 2,3 and Jeannot Trapert 1 1
More informationOn the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation
journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation
More informationA PROBABILISTIC AND RIPLESS THEORY OF COMPRESSED SENSING. Emmanuel J. Candès Yaniv Plan. Technical Report No November 2010
A PROBABILISTIC AND RIPLESS THEORY OF COMPRESSED SENSING By Eanuel J Candès Yaniv Plan Technical Report No 200-0 Noveber 200 Departent of Statistics STANFORD UNIVERSITY Stanford, California 94305-4065
More informationRecursive Algebraic Frisch Scheme: a Particle-Based Approach
Recursive Algebraic Frisch Schee: a Particle-Based Approach Stefano Massaroli Renato Myagusuku Federico Califano Claudio Melchiorri Atsushi Yaashita Hajie Asaa Departent of Precision Engineering, The University
More informationGeneral Properties of Radiation Detectors Supplements
Phys. 649: Nuclear Techniques Physics Departent Yarouk University Chapter 4: General Properties of Radiation Detectors Suppleents Dr. Nidal M. Ershaidat Overview Phys. 649: Nuclear Techniques Physics Departent
More informationlecture 36: Linear Multistep Mehods: Zero Stability
95 lecture 36: Linear Multistep Mehods: Zero Stability 5.6 Linear ultistep ethods: zero stability Does consistency iply convergence for linear ultistep ethods? This is always the case for one-step ethods,
More information3.8 Three Types of Convergence
3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to
More information