Differentially Private and Strategy-Proof Spectrum Auction with Approximate Revenue Maximization

Size: px
Start display at page:

Download "Differentially Private and Strategy-Proof Spectrum Auction with Approximate Revenue Maximization"

Transcription

1 Differentiay Private and Strategy-Proof Spectrum Auction with Approximate Revenue Maximization Ruihao Zhu and Kang G. Shin Department of Eectrica Engineering and Computer Science The University of Michigan, Ann Arbor, MI , U.S.A. Abstract The rapid growth of wireess mobie users and appications has ed to high demand of spectrum. Auction is a powerfu too to improve the utiization of spectrum resource, and many auction mechanisms have been proposed thus far. However, none of them has considered both the privacy of bidders and the revenue gain of the auctioneer together. In this paper, we study the design of privacy-preserving auction mechanisms: we first propose a differentiay private auction mechanism which can achieve strategy-proofness and a near optima expected revenue based on the concept of virtua vauation. Assuming the knowedge of the bidders vauation distributions, the near optima differentiay private and strategy-proof auction mechanism uses the generaized Vickrey-Carke-Groves auction payment scheme to achieve high revenue with a high probabiity. To tacke its high computationa compexity, we aso propose an approximate differentiay PrivAte, Strategy-proof, and poynomiay tractabe Spectrum PASS auction mechanism that can achieve a suboptima revenue. PASS uses a monotone aocation agorithm and the critica payment scheme to achieve strategy-proofness. We aso evauate PASS extensivey via simuation, showing that it can generate more revenue than existing mechanisms in the spectrum auction market. I. INTRODUCTION Radio spectrum becomes a scarce resource due to the rapid increase in wireess service demand. Conventionay, radio spectrum is aocated in a centraized and static way, but such a poicy eaves a arge portion of radio spectrum unused in some geographic areas, whie making the ide spectrum inaccessibe to new wireess appication providers that do not have icensed spectrum bands. Consequenty, dynamic spectrum aocation DSA is introduced to sove or aeviate the probem of spectrum shortage. Auction is a widey accepted way to tacke the probem of spectrum re-aocation. The Federa Communications Commission FCC has adopted it over two decades ago 1. In recent years, numerous sma-scae spectrum auctions have been hed, and many spectrum auction mechanisms have aso been proposed 36, 37. There exist three major difficuties in this new spectrum reaocation. The first difficuty comes from the spatia reusabiity of each radio spectrum channe. The spatia reusabiity of a channe can aow two bidders to use the same spectrum simutaneousy as ong as they are geographicay far enough from each other out of the interference range. The second is the seer s incentive, which is widey studied for spectrum auction mechanism design 1, 17. If the seer does not have enough incentive, he wi not reease his ide channes. The ast is strategy-proofness that comprises truthfuness and individua rationaity. Intuitivey, truthfuness means that no bidder can get a higher payoff by bidding a vaue other than his true vauation for the goods; whie individua rationaity means that each bidder gets non-negative utiity when bidding truthfuy. In the radio spectrum auction, the bidders are rationa, and may manipuate the auction by misreporting to gain benefits. This misreporting, however, may ower the seer s revenue as we as the other bidders incentive. Recenty, protection of the bid-privacy in spectrum auction has aso become an important issue 14, 38. In most existing studies, a strategy-proof spectrum auction mechanism requires each bidder to report his true vauation, but once the true vauation of a bidder is reported in pubic, the other bidders can infer the true type of that bidder merey based on the outcome of the auction. In a spectrum auction, a channe is icensed to the bidders for a certain period of time, and a of the bidders shoud compete again for the usage of the same channe at the end of this period. This makes the inference of a bidder s true type even easier. Moreover, the true type is an important commercia secret for bidders because it can refect the potentia vaue of the wireess service carried by the spectrum. When the above four difficuties are taken into account, the probem of designing a privacy-preserving and strategy-proof spectrum auction mechanism for revenue maximization can be very chaenging. Previousy, cryptography was the main too for designing privacy-preserving mechanisms 15, 24, but it often incurs high computation and communication overheads, and the performance of the resuting mechanisms may suffer greaty. The recenty proposed exponentia mechanism, which incorporates techniques from differentia privacy 23 and mechanism design, provides us a preiminary hep to sove the probem. Intuitivey, differentia privacy means that a singe change in the input data set ony has imited impact on the output. Therefore, hardy can one make an accurate inference on bidders bids based on the winners when the exponentia mechanism is appied as a arge deviation of a singe bid does not infuence the set of winners much, thereby protecting the bid privacy. In order to achieve good performance in terms of revenue maximization, however, the exponentia mecha-

2 nism often requires an enumeration of a possibe auction outcomes 16, but it is we-known that even computing the optima soution for spectrum aocation is NP-compete 6 in muti-hop wireess networks. Besides, exponentia mechanisms are often impemented in an approximate truthfu manner 23, 38. Therefore, it is necessary to design proper differentiay private mechanisms that can achieve strategyproofness and approximate revenue maximization. In this paper, we study the probem of designing a differentiay private and strategy-proof auction mechanism for spectrum reaocation. For simpicity of presentation, we consider the case of bidding for a singe channe. Each bidder is interested in purchasing a short-term icense for this channe in a fixed geographica area. The bidders do not want other bidders and externa agents to know their bidding information. Assuming that the seer has a priori knowedge of the bidders vauation distributions, we first design a differentiay private and strategy-proof auction mechanism which achieves near optima expected revenue. This mechanism is based on the exponentia mechanism 16. The near optima privacy-preserving mechanism can be viewed as a generaization of the Vickrey- Carke-Groves VCG mechanism. Here we adopt the concept of virtua vauation, which is the surpus of the true vauation and a function of vauation distribution, instead of the bidders origina vaue. This is a widey-used method for the design of conventiona mechanisms 13, 18. It can be shown that maximizing expected revenue is equivaent to maximizing virtua socia wefare. The near optima privacy-preserving mechanism assigns a probabiity of being chosen for each possibe outcome to enforce differentia privacy. Nevertheess, this approach is NP-Hard. In order to tacke the probem of high computationa compexity, we propose PASS, which is an approximate differentiay PrivAte, Strategy-proof, and poynomiay tractabe Spectrum auction mechanism. PASS uses the technique of graph partitioning and the concept of virtua channe to address the spatia reusabiity of the channe, and a monotone agorithm which combines the features of exponentia mechanism and greedy heuristic to aocate the channe. The monotone aocation agorithm, together with the payment rue proposed in 2, guarantees truthfuness. We aso impement PASS, and evauate its performance extensivey. This paper makes the foowing main contributions. To the best of our knowedge, this is the first to design differentiay private, approximate revenue maximization and strategy-proof mechanism for spectrum auction. We mode the probem of spectrum reaocation as a seaed-bid auction, and design a near optima privacypreserving mechanism. This mechanism is proven to be privacy-preserving, strategy-proof, and achieve a near optima expected revenue. By adopting the graph-partitioning technique 1, we introduce the concept of virtua channe, and propose a differentiay private and strategy-proof spectrum auction mechanism with approximate revenue maximization, to reduce the computationa compexity of the exponentia mechanism. PASS is proven to be a privacy-preserving and strategy-proof auction mechanism, and can achieve a sub-optima revenue. The computationa compexity of PASS is On 2, where n is the number of bidders. This ow computationa compexity makes PASS attractive for short-ease-term and arge-scae spectrum auctions. We impement PASS, and extensivey evauate its performance. Our evauation resuts show that PASS achieves differentia privacy and a higher revenue than existing approaches. The remainder of this paper is organized as foows. In Section II, we briefy review the reated work in the areas of incentive mechanism design, differentiay private mechanisms, and privacy-preserving spectrum auction. Section III presents the mode and reviews some reated soution concepts, whie Section IV detais the design of a near optima privacypreserving mechanism, and proves its properties. In Section V, we detai the design of PASS and anayze its properties. Section VI presents our evauation resuts for PASS. Finay, we concude the paper with Section VII. II. RELATED WORK Numerous efforts have been made to design incentive mechanisms 2, 25, 33. Nisan 26 studied the genera combinatoria auction, whie Godberg et a. 11 studied how to auction mutipe digita copies. The authors of 19 showed how to construct a mechanism with an approximation agorithm under certain cases via inear programming. The authors of 8 investigated the power of samping in designing a combinatoria auction mechanism. Dobzinski and Nisan 7 proposed a new method for computing the ower bound for a combinatoria auction mechanism with sub-moduar vauations. McSherry and Tawar 23 first incorporated the techniques of differentia privacy into mechanism design and proposed the first differentiay private auction mechanisms. They used a differentiay private pricing approach, and it coud ony be appied to very simpe settings. The agorithmic mechanism design community then focused on how to design truthfu and computationay efficient, differentiay private auction mechanisms. Leung and Lui 21 studied differentiay private and approximatey truthfu mechanisms in Bayesian setting. Nissim et a. 28 modeed privacy oss with dis-utiity functions, and studied truthfu mechanisms and their appicabiity to eectronic poing and digita goods pricing. Chen et a. 3 aso proposed a mode to measure the privacy oss, and studied truthfu mechanisms and their appicabiity to faciity aocation and socia choice. Nissim et a. 29 studied how to convert approximatey truthfu mechanisms into truthfu ones with some privacy oss. In 3, 16, 35, differentiay private and truthfu mechanisms were studied. To the best of our knowedge, there ony exists a few privacy preserving spectrum auction mechanisms. Huang et a. 15 proposed the first strategy-proof and privacy-preserving spectrum auction mechanism. Pan et a. 32 aso studied the probem of designing privacy-preserving spectrum auction

3 mechanism to prevent maicious behaviors of the auctioneer. However, neither of them makes a performance guarantee in terms of socia wefare or revenue. The authors of 14 proposed the first privacy-preserving spectrum auction mechanism with a performance guarantee in socia wefare. Nevertheess, a of the above auction mechanism used cryptographic toos, and thus induce high computation and communication overheads. Zhu et a. 38 proposed the first differentiay private spectrum auction mechanism for revenue maximization, but their mechanism achieves ony approximate truthfuness. III. PROBLEM FORMULATION We now present the auction mode and some reated soution concepts. A. Mode We mode the probem of privacy-preserving spectrum aocation as a seaed-bid auction. There is a seer, who is the primary user. He has a singe ide channe, 1 and wants to subease his ide channe to n secondary users e.g., wireess service providers, who do not have icense from the government to use radio spectrum. The secondary users are the bidders, and want to buy the icense of the ide channe from the seer to provide services to their customers. In the auction, the seer is trustworthy, and can act as the auctioneer. The seer has a singe channe C for sae, which has the interference range d. Let N = {1,2,...,n} be the set of bidders. Each bidder i N has a vauation v i for C, which is private information that we want to protect. The vauation can be cacuated as the revenue to be gained by providing wireess services using C. Whie the exact vauation v i is private information, we assume that the distribution of v i, denoted by F i, is known to the seer, but the bidders do not have information about each other s vauation distribution 17. Let f i v = df i v/dv be the corresponding density function. Such information is based on the past transactions. This is known as the Bayesian setting for spectrum auction 1. In the auction, the bidders determine their own bids. Let b = {b 1,b 2,...,b n } denote the bid profie which is based on the bid types; Bidders submit seaed bids to the auctioneer simutaneousy. We assume that each bidder s vauation and bid are within a given scope v min,v max. We use a graph G = N, E, caed confict graph, to describe the geographica information, where each node represents a bidder. Any pair of bidders who are separated by a geographica distance smaer than the interference range of C are said to have confict, and are connected via an edge in G. Any pair of bidders who are connected cannot win the channe simutaneousy. Given the bid vector b and the confict graph G, the auctioneer determines the outcome of the auction, denoted by b = {x 1,x 2,...,x n }, where x i is an indicator s.t., { 1, the channe is aocated to i; x i = 1, otherwise. 1 This is for the simpicity of interpretation, the soution for mutipe channes can be easiy generated from our soution. The auctioneer aso cacuates the payment profie, p = {p 1, p 2,..., p n }, where p i is bidder i s payment. The auctioneer s revenue, R EV, can be computed as the sum of the bidders payments: R EV = n p i. Bidder i s utiity u i is defined as the difference between his vauation times the corresponding indicator and his payment: u i = v i x i p i. We assume that the bidders are rationa and each bidder s goa is to maximize his own utiity. B. Soution Concepts Here we review some important and usefu concepts in mechanism design and differentia privacy. Definition 1 Dominant Strategy 31. Strategy a i is a payer i s dominant strategy if for any a i a i and any strategy profie of the other payers a i, u i a i, a i u i a i, a i. The concept of truthfuness is based on that of dominant strategy. Intuitivey, truthfuness means that reveaing truthfu information is the dominant strategy for every payer 22 Definition 2 Truthfu Mechanism 17. An auction is truthfu if and ony if any bidder i s expected utiity of bidding its true vauation v i is at east its expected utiity of bidding any other vaue b i, u i v i,b i u i b i, b i. 2 An immediate theorem which reates monotone agorithm and truthfu auction mechanism design 2 is Theorem 1. A mechanism is truthfu in expectation if and ony if, for any agent i and any fixed choice of bids by the other agents b i, 1 x i b is monotone nondecreasing in b i. 2 p i b = b i y i b b i y izdz, where y i z is the probabiity that bidder i is seected when his bid is z. Let s review concepts reated to differentia privacy. Informay, differentia privacy means that the outcome of two neary identica input data sets different for a singe input shoud aso be neary identica. Formay, Definition 3 Differentia Privacy 9. A randomized computation M has differentia privacy if for any two input sets A and B with a singe input difference, and for any set of outcomes R RANGEM, PrMA R exp PrMB R. One important property of differentia privacy is composabiity: Coroary 1 Composabiity 23. The sequentia appication of randomized computation M i, each giving i differentia privacy, yieds i i differentia privacy There is aso a reaxation of the definition of differentia privacy:

4 Definition 4 Approximate Differentia Privacy 9. A randomized computation M has, δ differentia privacy if for any two input sets A and B with a singe data difference, and for any set of outcomes R RANGEM, PrMA R exp PrMB R + δ. Incorporating differentia privacy, one powerfu too in mechanism design is the exponentia mechanism 16, 23. Mapping the input data set A and an outcome r in the outcome space R to a certain score function qa,r, the exponentia mechanism qa satisfies: Pr qa = r expqa,r. This exponentia mechanism guarantees a 2 differentia privacy, where is an upper-bound of difference of two data sets. An immediate theorem can aso be derived as 12: Theorem 2. When used to seect an output r R, the exponentia mechanism qa yieds 2 differentia privacy. Let R OPT denote the subset of R achieving qa,r = max r qa,r, then the exponentia mechanism ensures that Pr qa, qa < max qa,r n R / R OPT t r exp t. 3 The goa of our auction mechanism design is to achieve strategy-proofness, privacy preservation and revenue maximization. The probem of revenue maximization can be formuated as the foowing binary programming: Objective: Subject to: Maximize R EV = n p i x i x i + x j 1, i, j E; 4 x i {,1}, i N, 5 but this is known to be computationay intractabe 34, nor is it privacy-preserving. Therefore, we need to seek an approximation approach. IV. NEAR OPTIMAL PRIVACY-PRESERVING MECHANISM We now present a near optima privacy preserving mechanism. This mechanism is based on the exponentia mechanism proposed in 16, which is a strategy-proof mechanism that maximizes the auctioneer s expected free socia wefare see 16 for the meaning of free socia wefare. We first adopt the concept of virtua vauation 27, which is essentia for revenue maximization. We appy the exponentia mechanism on the virtua vauations, which guarantees the maximum expected free revenue whie enforcing strategy-proofness and differentia privacy. A. Virtua Vauation and Virtua Surpus We first adopt the concept of virtua vauation and virtua surpus from 27: Definition 5. The virtua vauation of agent i with vauation v i is: φ i v i = v i 1 F iv i. 6 f i v i A company concept is the virtua bid, which is cacuated by pugging in the bid into Eq. 6. The virtua bid profie of the bidders is denoted by φ b = {φ 1 b 1,φ 2 b 2...,φ n b n }. Definition 6. Given vauations, v i, and the corresponding virtua vauations, φ i v i, the virtua surpus of aocation is: n φ i v i x i. 7 We further assume that the distributions of the bidders satisfy the monotone hazard rate i.e., f i v/1 F i v is monotone non-decreasing, so that the virtua vauations are monotone non-decreasing. This is a sufficient condition for a strategy-proof mechanism 27. We aso assume that for each bidder i, his virtua vauations are bounded by φ i v min,φ i v max, and the difference between φ i v max and φ i v min is denoted by. An immediate theorem is that any truthfu mechanism has an expected revenue equa to its expected virtua surpus: Theorem 3. The expected profit of any truthfu mechanism is equa to its expected virtua surpus: ER EV = E n φ i v i x i. 8 Due to space imitation, we omit the proof here, but the proof of this theorem can be found in 27. B. Design Detais With the hep of virtua vauations and virtua surpus, the probem of designing privacy-preserving and near optima maximization spectrum auction can be soved with the exponentia mechanism. Foowing the guiding principe of 16, the mechanism assigns each outcome a probabiity, which is proportiona to the exponentia of its revenue, and then seects an outcome accordingy. The mechanism aso charges each bidder a VCG-ike payment to enforce strategy-proofness. The detaied auction works as foows. 1 For each bidder i, cacuate the virtua bid φ i b i = b i 1 F ib i. 9 f i b i 2 Seect an outcome satisfies Eqs. 4and 5 with probabiity Pr exp 2 φ i b i x i. 1 i

5 3 The payment for a winner bidder i is p i = φ 1 i p i, where p i = E φ k b k x k EXP R φ i b i, φ i b i 2 EXP S R φ i b i, φ i b i + 2 n exp 2 φ k b k x k, 11 where b i = {b 1,...,b i 1,b i+1,...,b n } 12 φ i = {φ 1 b 1,...,φ i 1 b i 1,φ i+1 b i+1,...,φ n b n } 13 is the virtua bid profie of a bidders other than i, EXP R is the assigned probabiity distribution over the virtua bid profie of a bidders in Step 2, and S is the Shannon entropy 5. C. Anaysis of the Near Optima Privacy-Preserving Mechanism Here we anayze the properties of the near optima privacypreserving mechanism. We first show that our design can achieve near optima expected revenue; we then show that together with our VCG-ike payment design, the mechanism achieves strategy-proofness; we finay show that the mechanism achieves differentia privacy. 1 Near Optima Expected Revenue By Theorem 3, we show that the expected revenue of the mechanism is equivaent to the expected virtua surpus. Therefore, we anayze the expected virtua surpus. One important concept that can hep us is the free energy in the iterature of physics and chemistry 3. Simiary, we first define the free virtua surpus F V S n F V SF = E φ k b k x k + 2 F k=1 SF, 14 where F is a distribution over. We prove the foowing theorem, which states that when the distribution F in Eq. 14 is chosen as in Step 2 of the near optima mechanism, the free virtua surpus is maximized over the input bid profie of the bidders Theorem 4. Given bid vector b, F V S is maximized when and the maximum vaue is 2 n F = EXP R φ b, exp where EXP R φ i b i, φ i b i. 2 φ b,, 15 Proof. First, the free virtua surpus can be written as n F V SF = E φ k b k x k + 2 F k=1 SF = Pr φ b, 2 F Pr F n Pr F 16 Then, we focus on the first term of RHS Pr φ b, = 2 F Pr F 2 φ b, = 2 Pr n exp F 2 φ b, = 2 Pr n exp 2 φ b, F exp 2 φ b, + 2 n exp F 2 φ b, = 2 Pr n F Pr EXP R + 2 n exp F 2 φ b, 17 Combining Eqs. 16 and 17, the free virtua surpus becomes F V S = 2 Pr Pr n EXP R F Pr F + 2 n exp 2 φ b, 18 By basic properties of the KL-divergence, the term Pr 2 Pr n EXP R F Pr 19 F is maximized when F = EXP R, and the second term is independent of F. Therefore, the emma hods, and the maximum free virtua surpus with given bid profie is F V S max = 2 n exp 2 φ b,, 2 where EXP R φ b. Now that the free virtua surpus is equa to the expected revenue pus a term, the mechanism achieves a near optima expected revenue. 2 Strategy-proofness With the above theorem, we are now ready to prove that the near optima privacy-preserving mechanism achieves truthfuness. Reca that in the VCG auction 4, each winning bidder is charged the externaity he exerts on the rest of the bidders e.g., the payment of a winner i is the difference between the optima socia wefare of the bidders other than i and the optima socia wefare of a the bidders minus i s bid; otherwise, the bidder is charged.

6 We start by proving that the near optima privacy-preserving mechanism achieves truthfuness. Lemma 1. The proposed mechanism achieves truthfuness. Proof. We prove that reporting the true vauation is the dominant strategy of each bidder. For a bidder i, if he reports any bid ˆb i v i, we denote the corresponding outcome and utiity by ˆ and û i, respectivey. The difference between the utiity of truthfuy report and misreport is u i û i =φ 1 i φi v i x i p i φ 1 i φi ˆb i ˆx i ˆp i. 21 Since φ i is monotone non-decreasing, we ony need to compare the two terms φ i v i x i p i and φ iˆb i ˆx i ˆp i where φ i v i x i p i φ i ˆb i ˆx i ˆp i = E φ i v i x i + φ k b k x k EXP R φ i v i, φ i b i + 2 EXP S R φ i v i, φ i b i 2 n exp r 2 φ k b k x k E φ i v i ˆx i + φ k b k ˆx k EXP R φ i ˆb i, φ i b i 2 EXP S R φ i ˆb i, φ i b i + 2 n exp r 2 φ k b k ˆx k = E φ i v i x i + φ k b k x k EXP R φ i v i, φ i b i + 2 EXP S R φ i v i, φ i b i E φ i v i ˆx i + φ k b k ˆx k EXP R φ i ˆb i, φ i b i 2 EXP S R φ i ˆb i, φ i b i =H EXP R φ i v i, φ i b i H EXP R φ i ˆb i, φ i b i, 22 H F = E F φ i v i ˆx i + φ k b k ˆx k 2 SF. 23 Note that H F is the free virtua surpus function with an input bid vector b = {b 1,...,b i 1,v i 1,b i+1,...,b n }. According to theorem 4, HF achieves the maximum when F = EXP R φ i b i, φ i b i. Therefore, we have φ i v i x i p i φ i ˆb i ˆx i ˆp i, and thus u i û i. The near optima privacy-preserving mechanism is truthfu. We then show that the near optima privacy-preserving mechanism achieves individua rationaity. Lemma 2. The proposed mechanism achieves individua rationaity. Proof. For an arbitrary bidder i, we prove that he can aways get non-negative utiity when bidding truthfuy. When bidding truthfuy, bidder i s utiity is u i = v i x i p i = φ 1 φv i x i φ 1 p i. 24 Since φ is a monotone non-decreasing function by assumption, φ 1 is aso a monoton non-decreasing function. Therefore, in order to prove that u i when i bids truthfuy, it is sufficient to prove thatφv i x i p i. Note that φv i x i p i = E φ i v i x i + φ k b k x k EXP R φ i v i, φ i b i + 2 EXP S R φ i v i, φ i b i 2 n exp r 2 φ k b k x k = 2 n exp φ i v i x i + r 2 φ k b k x k 2 n exp r 2 φ k b k x k. 25 The second ast step is due to Theorem 4. Therefore, we prove that the mechanism is individua rationa. 3 Differentia Privacy We finay state that the near optima privacy-preserving mechanism can preserve the bidders vauation privacy. Theorem 5. The near optima privacy-preserving mechanism preserves -differentia privacy for bidders vauation privacy. This theorem is a coroary of Theorem 2. V. PASS: A DIFFERENTIALLY PRIVATE AND STRATEGY-PROOF SPECTRUM AUCTION MECHANISM The near optima auction mechanism introduced in the previous section can protect the bidders bid privacy as we as generate a near optima expected revenue. Nevertheess, its computationa compexity is prohibitivey high, thus making it unsuitabe for arge-scae spectrum markets. Therefore, by adopting the graph partitioning technique 1, and introducing the concept of virtua channe, we propose PASS, which is a poynomiay tractabe, differentiay private, and strategyproof spectrum auction mechanism. PASS achieves good performance in terms of approximate revenue maximization.

7 A. Design Rationae PASS integrates the exponentia mechanism with the greedy heuristic for a singe-minded combinatoria auction mechanism 2 into spectrum auction to achieve both approximate revenue maximization and differentia privacy. Basicay, PASS chooses the winning bidders iterativey. In each iteration, each remaining bidder is assigned a probabiity of being chosen, and PASS chooses one of them as a winning bidder. The main idea of PASS is to first appy the technique of graph partitioning, and create a set of virtua channes that capture the confict among the bidders for each bidder, thus transorming the spectrum auction into a singe-minded combinatoria auction ike scenario. Finay, PASS computes the probabiity of being chosen for each bidder based on a specific norm, and chooses the set of winning bidders iterativey, and determines the payment for each bidder. B. Design Detais Foowing the guideines in Section V-A, we describe PASS in detai. PASS performs the auction in four steps. It first partitions the confict graph into uniform hexagons, thus dividing the bidders into groups. Afterwards, PASS creates virtua channes for bidders according to their geographica ocations and the confict graph. PASS then computes the probabiity of being chosen for each bidder, and chooses winning bidders randomy based on the assigned probabiity iterativey. Finay, PASS determines the payment for each bidder. Phase 1: Graph Partition PASS first partitions the geographica area 1. Since the interference range of C is d, PASS divides the entire area into sma hexagons with side-ength equa to haf of the interference range of C i.e., the side-ength is d/2. Suppose there are a tota of m hexagons, and correspondingy, m bidder groups, denoted by A = {a 1,a 2,...,a m }. Each bidder i beongs to exacty one hexagon a j i.e., m j=1 a j = N. An iustrative exampe of the partition with m = 24 is shown Fig. 1. Fig. 1. An iustrative exampe of partition. The partition satisfies that the maximum distance within a singe hexagon is ess than or equa to d i.e., the diametrica ength so that a the bidders in a singe hexagon are mutuay confict i.e., the confict graph over a singe hexagon is a compete graph. Fact 1. Any pair of bidders from the same hexagon are conficting bidders, and can not be aocated to the channe simutaneousy. The graph partition technique is the basis of virtua channe, and the intuition behind this partition is that in the singeminded combinatoria auction, the approximation ratio is equa to k 2, where k is the maximum size of the bundes of a the bidders; whie in PASS, the maximum size of the bundes is determined by the number of virtua channes each bidder is interested in. By partitioning the geographica area, the number of virtua channes each bidder is interested in is cut down. Phase 2: Virtua Channe Assignment With the partitioned graph, PASS introduces virtua channe to capture the interference among the bidders. Specificay, a virtua channe vc j,k j and k can be the same is assigned to bidder i if he satisfies one of the foowing two conditions: 1 i ocates in a j, and he is in confict with at east one bidder i in a k i.e., i and i cannot be granted the channe simutaneousy. 2 i ocates in a k, and he is in confict with at east one bidder i in a j i.e., i and i cannot be granted the channe simutaneousy. For convenience, et r = {r 1,r 2,...,r n } denote the set of virtua channes assigned to each bidder, where r i is the bunde of virtua channes assigned to bidder i. In other words, i is interested in the bunde of virtua channes r i. The forma process of assigning virtua channes to each bidder is described in Agorithm 1, where DISTANCEi,i is the geographica distance of bidders i and i. The assignment of virtua channes guarantees that the intersection of the sets of virtua channes assigned to a pair of confict bidders is nonempty. Lemma 3. For any pair of bidders i and j, if i and j are in confict i.e., i. j E, then r i r j / Agorithm 1 Virtua Channe Assignment Input: A confict G = {N,E}. A Partitioned Groups A. Output: A vector of bundes of virtua channes each bidder is interested in r. 1: r /. 2: for a a j A,a k A do 3: for a i a j,i i a k do 4: if DISTANCEi,i d then 5: r i r i {vc j,k },r i r i {vc j,k }. 6: end if 7: end for 8: end for 9: return r. Phase 3: Winner Determination Based on the partitioned graph and each bidder s interested virtua channe. PASS first cacuates each bidder s virtua bid, and then assigns each bidder i a probabiity of being chosen with respect to a specific norm, which is the bidder s virtua bid over the square root of the size of the set of virtua channes

8 he is interested in, i.e., φ i b i ri. 26 PASS then chooses the winning bidders iterativey, and maintains a set of remaining bidders, denoted by R. Initiay, R = N. In each iteration, for a the bidders i R, the probabiity of being chosen is proportiona to the exponentia of the norm defined in Eq. 26 times a constant; otherwise, the probabiity is, i.e., exp PrW W {i} φ i b i if i R, ri 27, otherwise. where = /e ne/δ and W is the set of winning bidders. PASS then normaizes the vaues and chooses a winning bidder accordingy, i.e., exp φ i b i / r i if i R, PrW W {i} = j R exp φ j b j / r j, otherwise. 28 Suppose bidder i is chosen as a winner. Then, PASS removes i from R. If bidder j R is in confict with i i.e., r i r j /, then j is aso removed from R. PASS repeats this unti there is no bidder eft in R. Seection of the winner is described formay in Agorithm 2. PASS takes On 2 time to assign virtua channes. For the winner determination, PASS takes On time to assign the probabiity of being chosen to each remaining bidder in an iteration. Since there are at most n iterations, PASS takes On 2 to determine the winners. Therefore, the tota computationa compexity of PASS is On 2. Phase 4: Payment Scheme PASS s winner determination agorithm is monotonic see the next subsection for a proof. According to Theorem 1, the payment for a bidder i is p i b = b i y i b bi y i zdz, 29 where y i z is generaized to be the probabiity that bidder i wins the channe when his bid is z. C. Anaysis of PASS The properties of PASS are anayzed in this subsection. 1 Revenue We first anayze the revenue guarantee of PASS. One of our key steps is to provide an upper-bound for the size of the virtua channes bunde assigned to each bidder. Lemma 4. The size of the virtua channes bunde assigned to each bidder is ess than or equa to 12: r i 12 i N. 3 Proof. Consider the hexagon a 1 in Fig. 2 as an exampe. Due to its topoogica symmetry, we divide a 1 into 12 Agorithm 2 Differentiay Private and Strategy-Proof Spectrum Auction Mechanism Input: A confict graph G = {N,E}, a virtua bid vector φ b, and a vector of virtua channe requests r Output: A set of winners W. 1: W /, / ene/δ,r N. 2: whie R / do 3: for a i R do 4: PrW W {i} = exp φ i b i / r i j R exp φ j b j / r j. 5: end for 6: Seect i according to the computed probabiity distribution. 7: if i is seected then 8: R R \ {i}. 9: for a j R do 1: if r j r i / then 11: R R \ { j}. 12: end if 13: end for 14: end if 15: end whie 16: return W. identica right trianges. We take one of them and denote it by T as shown in the shaded area in a 1. After some simpe cacuation, we can concude that a the bidders in confict with any of the bidders in T ie in the 12 coored hexagons, and no bidder from other hexagon wi be in confict with bidders in T. An arbitrary bidder i must be in one of the right trianges, and hence r i 12. Fig. 2. Bounding r i. We are now ready to prove the revenue guarantee of PASS: Theorem 6. With the probabiity of at east 1 1/n O1, PASS can generate a set of winners with a revenue of at east R EV /12 Onn. Here R EV is the optima revenue. Proof. Let OP T denote the set of bidders with the optima revenue. For an arbitrary auction outcome, we renumber the

9 winning bidders according to the order they are seected assuming a tota of winners, i.e., W = {w 1,w 2,...,w }. For each w W, et OPT w denote the set of bidders satisfy that j OPT w : 1 j OPT. 2 r w r j /. 3 r k r j = / k {w 1,w 2,...,w i 1 }. OPT w is the set of eements in OPT that does not enter W because of w. By taking t = Onn in Theorem 2, we have φ w b w rw φ jb j r j Onn j OPT w. with a probabiity of at east 1 1/n O1. This impies that φ j b j φ wb w r j rw φ j b j + Onn j OPT w. 31 with a probabiity of at east 1 1/n O1. Summing over a j OPT w, and appy the union bound, we have φ w b w rw + Onn r j. 32 with a probabiity of at east 1 1/n O1. By using Cauchy-Schwarz inequaity, we have: r j OPT w r j. 33 Note that every r j for j OPT w intersects with r w, and a the r j s for j OPT w are disjoint since this is an aocation, we have OPT w r w. Aso, by Lemma 4, we have r j r w Pugging into Eq. 32, we have φ w b w φ j b j j OPT rw w + Onn r j j OPT w φ w b w OPT rw + Onn w r j φ w b w rw 12 rw + Onn =12φ w b w + Onn 12φ w b w + Onn. 35 with a probabiity of at east 1 1/n O1. Summing over a w W, we have R EV φ j b j + φ j b j w W j W OPT 12 φ w b w + Onn. 36 w W with a probabiity of at east 1 1/n O1. Thus, the theorem foows. 2 Strategy-proofness Here we prove that PASS achieves strategy-proofness. According to Theorem 1, what we need to prove is that the aocation rue of PASS is monotone i.e., for each bidder i, the probabiity that he is seected as a winner is monotonicay non-decreasing with his bid. Lemma 5. For each bidder i, the probabiity that he is seected as a winner is monotonicay non-decreasing with his bid b i. Proof. Note that the entire geographica area is divided into m hexagons, each of which can have at most one winning bidder. Therefore, W m. For an arbitrary sequence of winner seection {w 1,w 2,...,w } W of ength, that does not contain i, we prove that, if b i grows arger, the probabiity that this sequence is seected becomes smaer. According to the design of PASS, the probabiity that {w 1,w 2,...,w } is the sequence of winning bidders can be computed as = k=1 k=1 exp φ w k b wk rwk j N \{w1,...,w k 1 } exp exp j N \{w1,...,w k 1,i} exp φ jb j r j φ w k b wk rwk φ jb j r j, + exp φ ib i ri which is monotonicay decreasing with b i. Thus, the aocation rue of PASS is monotonicay nondecreasing. By the above Lemmas and Theorem 1, we can concude that PASS achieves strategy-proofness. Theorem 7. PASS achieves strategy-proofness. 3 Differentia Privacy We finay prove that PASS can preserve the bidders vauation privacy. Theorem 8. For any δ 1/2, PASS preserves e 1 ne/δ, δ differentia privacy for bidders virtua bids. Proof. Let φ and φ be two input virtua bid vectors that differ in a singe bidder k s virtua bid, and et b and b be the two corresponding bid vectors, respectivey. We show that PASS achieves bid privacy preservation, even reveaing the order in which the bidders are chosen, for an arbitrary sequence of winners seection W = W = {w 1,w 2,...,w } of arbitrary ength for φ and φ, respectivey. We consider the reative probabiity of PASS resuts for given virtua bids inputs φ and φ : PrW = {w 1,w 2,...,w } PrW = {w 1,w 2,...,w }

10 = = exp φ w i b w i / r wi j N \{πi } exp φ j b j / r j j N \{πi } exp φ j b j /, 37 r j where π i = {w 1,w 2,...,w i }. If φ k b k > φ k b k, the first product is ess than exp : exp φ k b k φ k b k / r k exp φ k b k φ k b k exp, 38 and the second product is ess than 1. If φ k b k < φ k b k, the first product is ess than 1. Therefore, we have PrW = {w 1,w 2,...,w } PrW = {w 1,w 2,...,w } j N \{πi } exp φ j b j / r j j N \{πi } exp φ j b j / r j j N \{πi } exp = α j / r j exp φ j b j / r j j N \{πi } exp φ j b j / r j = where α j = E j exp α j / r j E j N \{πi }exp α j 39 φ j b j φ jb j. Note that for a β 1, we have e β 1 + e 1 β. Therefore, for a 1, we have exp φ wi b wi / r wi / j N \{πi } exp φ j b j / r j exp φ w i b w i / A. Methodoogy r wi / j N \{πi } exp φ j b j / r j exp φ wi b wi / r wi E j N \{πi }exp α j E j N \{πi } 1 + e 1 α j exp e 1 E j N \{πi } α j. If E j N \{π i } α j neδ 1, we have PrW = {w 1,w 2,...,w } PrW = {w 1,w 2,...,w } exp e 1 neδ 1. 4 By Lemma B.2 in 12, we have Pr E j N \{π i } α j > neδ 1 δ. Thus, the theorem foows. VI. NUMERICAL RESULTS We have impemented PASS in a simuator and extensivey evauated its performance. Our evauation resuts show that PASS can not ony generate a reativey high revenue, but aso achieves good differentia privacy. To evauate the performance of PASS in terms of revenue maximization, we compare PASS with DEAR, which is a differentiay private and approximatey truthfu mechanism for spectrum auction proposed in 38 and a truthfu spectrum auction mechanism denoted as TSAWAP proposed in 1. The number of bidders is varied from 1 to 15 with a step of 1, and the bidders are randomy depoyed in a square area of 1m 1m. Each bidder has an interference range of 425m 38. We assume that each bidder s bid foows a uniform distribution over,1. We vary the number of channes from 5 to 15 with a step of 5. We set the privacy constant to.1 and.5, and δ to A the resuts are averaged over 1 runs. We use two metrics to evauate PASS s performance revenue and privacy. Revenue refers to the sum of charges to the bidders. A mechanism guarantees good privacy if the probabiity distribution over an arbitrary outcome has as sma a change as possibe when any bidder uniateray reports a different bid. Foowing the definition of differentia privacy, we definite the the notion of Privacy Leakage note that this is different from the one proposed in 38 to quantitativey measure the privacy guarantee of PASS: Definition 7 Privacy Leakage. Given a mechanism M, et φ and φ be virtua bid vectors for bidding profies b and b, which ony differ in a singe entry, respectivey. Let O be the outcome space The privacy eakage between the two bidding profies is the maximum of absoute differences between the ogarithmic probabiities of any outcome, i.e., max nπ o nπ o, 41 o O where π and π is the probabiity distribution over the outcome space with respect to φ and φ, respectivey. B. Revenue We first evauate PASS s performances in terms of revenue. Fig. 3a shows the comparison of PASS with DEAR and TSAWAP, when the number of channes is 5. From these resuts, PASS is shown to outperform DEAR and TSWAP in neary a the cases in terms of revenue. The ony exception is when the number of bidders is 5 for both =.1 and =.5, DEAR can generate sighty more revenue than PASS. This is because PASS reies on the existence of critica neighbors to generate revenue. When the number of bidders grows, PASS can find critica neighbors with higher bids. Fig. 3b compares PASS with DEAR and TSAWAP, when the number of channes is 1. From these resuts, PASS is outperforms DEAR and TSWAP in neary a of the cases in terms of revenue. The ony exception is when the number of bidders is ess than 1 for both =.1 and =.5, DEAR can generate more revenues than PASS. This is because when 2 The range of each bidder s vauation/bid, budget, and the vaue of, and δ can be chosen differenty from those used here. However, the resuts of using different setups are simiar to those shown in this paper. Therefore, we ony show the resuts for the above setup.

11 Revenue PASS.5 PASS.1 2 DEAR.5 1 DEAR.1 TSAWAP Number of bidders a 5 channes Revenue PASS.5 PASS.1 DEAR.5 2 DEAR.1 TSAWAP Number of bidders b 1 channes Revenue PASS.5 PASS.1 5 DEAR.5 DEAR.1 TSAWAP Number of bidders c 15 channes Fig. 3. Revenue generated by PASS.15 PASS.1 PASS PASS.1 PASS PASS.1 PASS.5 Privacy eakage.1.5 Privacy eakage Privacy eakage Number of bidders Number of bidders Number of bidders a 5 channes b 1 channes c 15 channes Fig. 4. Privacy performance the number of channes increases, PASS cannot find enough critica neighbors to generate revenue. When the number of bidders grows, PASS can find critica neighbors more easiy. Fig. 3c shows the comparison resuts of PASS with DEAR and TSAWAP, when the number of channes is 15. From these resuts, PASS is shown to outperform DEAR and TSWAP in most of the cases in terms of revenue. The ony exception are when the number of bidders is ess than 1 for =.5, and when the number of bidders is than 15 for =.1, DEAR can generate more revenue than PASS. This is aso because PASS reies on the existence of critica neighbors to generate revenue. When the number of channes is arge, PASS cannot find enough critica neighbors. A of the above figures shows that PASS outperforms TSAWAP because TSAWAP can ony use critica neighbors in the same hexagon to generate revenue whie PASS can use critica neighbors in other hexagons to generate revenue. This eads to critica neighbors with higher bids. In summary, PASS is shown to be suitabe for argescae secondary spectrum markets, especiay when spectrum channes are scarce. C. Privacy Next, PASS is evauated in terms of privacy. Fig. 4a shows the privacy eakage of PASS when =.1 and =.5 under this setting, PASS is supposed to achieve e 1/1e,.25 and e 1/2e,.25 differentia privacy, respectivey. The number of channes is 5. The resuts show that PASS s privacy eakage is aways ess than.4 when =.1, and it is aways ess than.15 when =.5. The resuts aso show that when the number of bidders increases, the privacy eakage of PASS decreases. This is because with more bidders, the probabiity of each outcome becomes smaer. Besides, we can see that the privacy performance of PASS is far better than e 1/1e,.25 and e 1/1e,.25 differentia privacy when =.1 and.5, respectivey. Therefore, it is neary impossibe for any agent to earn the bid information of the bidders when PASS is impemented. Figs. 4b and 4c show the privacy eakage of PASS, when the number of channes are 1 and 15, respectivey. The resuts show that the privacy eakage foows the same pattern as the case of 5 channes. We can aso see that PASS reduces privacy eakage when the number of channes grows. This is because when the number of channes grows, the number of winning bidders as we as the outcome grows arger, and thus the privacy is preserved better. These resuts show that PASS achieves good differentia privacy. VII. CONCLUSIONS In this paper, we have presented the first differentiay private and strategy-proof spectrum auction mechanism with approximate revenue maximization. Assuming that the seer has a priori knowedge of the bidders vauation distributions, we have first presented a differentiay private and strategyproof auction mechanism which achieves a near optima expected revenue. In order to tacke the probem of high computationa compexity, we have then presented PASS, which is an approximate differentiay private, strategy-proof, and poynomiay tractabe auction mechanism. We have theoreticay anayzed both mechanisms properties in strategyproofness, revenue, and privacy. We have aso impemented PASS, and evauated its performance extensivey. PASS is shown to be abe to generate reativey high revenue, whie protecting the bid-privacy. REFERENCES 1 M. A-Ayyoub and H. Gupta, Truthfu spectrum auctions with approximate revenue, in INFOCOM, A. Archer and E. Tardos, Truthfu mechanisms for one-parameter agents, in FOCS, 21.

12 3 Y. Chen, S. Chong, I. A. Kash, T. Moran, and S. Vadhan, Truthfu mechanisms for agents that vaue privac, in EC, E. Carke, Mutipart pricing of pubic goods, in Pubic Choice, T. Cover and J. Thomas, Eements of Information Theory. John Wiey & Sons, Inc., D. C. Cox and D. O. Reudink, Dynamic channe assignment in high capacity mobie communication system, Be System Technica Journa, vo. 5, no. 6, pp , S. Dobzinski and N. Nisan, Limitations of vcg-based mechanisms, in STOC, S. Dobzinski, N. Nisan, and M. Schapira, Truthfu randomized mechanisms for combinatoria auctions, in STOC, C. Dwork, F. McSherry, K. Nissim, and A. Smith, Caibrating noise to sensitivity in private data anaysis, in TCC, Federa Communications Commission FCC Spectrum Auction, home. 11 A. V. Godberg, J. D. Hartine, and A. Wright, Competitive auctions and digita goods, in SODA, A. Gupta, K. Ligett, F. McSherry, A. Roth, and K. Tawar, Differentiay private combinatoria optimization, in SODA, J. Hartine and B. Lucier, Bayesian agorithmic mechanism design, in STOC, H. Huang, X.-Y. Li, Y. e Sun, H. Xu, and L. Huang, Pps: Privacypreserving strategyproof socia-efficient spectrum auction mechanisms, in Q. Huang, Y. Tao, and F. Wu, SPRING: A strategy-proof and privacy preserving spectrum auction mechanism, in INFOCOM, Z. Huang and S. Kannan, Exponentia mechanism for socia wefare: private, truthfu, and neary optima, in FOCS, J. Jia, Q. Zhang, Q. Zhang, and M. Liu, Revenue generation for truthfu spectrum auction in dynamic spectrum access, in MobiHoc, G. Kosmopouou and S. Wiiams, The robustness of the independent private vaue mode in bayesian mechanism design, in Economic theory, R. Lavi and C. Swamy, Truthfu and near optima mechanism design via inear programming, in FOCS, D. Lehmann, L. I. O Caaghan, and Y. Shoham, Truth reveation in approximatey efficient combinatoria auctions, in EC, S. Leung and E. Lui, Bayesian mechanism design with efficiency, privacy, and approximate truthfuness, in WINE, A. Mas-Coe, M. D. Whinston, and J. R. Green, Microeconomic Theory. Oxford Press, F. McSherry and K. Tawar, Mechanism design via differentia privacy, in FOCS, M. Naor, B. Pinkas, and R. Sumner, Privacy preserving auctions and mechanism design, in EC, N. Nisan and A. Ronen, Agorithmic mechanism design, in STOC, N. Nisan, Bidding and aocation in combinatoria auctions, in EC, N. Nisan, T. Roughgarden, E. Tardos, and V. V. Vazirani, Agorithmic Game Theory. Cambridge University Press, K. Nissim, C. Orandi, and R. Smorodinsky, Privacy-aware mechanism design, in EC, K. Nissim, R. Smorodinsky, and M. Tennenhotz, Approximatey optima mechanism design via differentia privacy, in ITCS, A. L. Ny, Introduction to generaized gibbs measures, in Ensaios Matematicos, M. J. Osborne and A. Rubenstein, A Course in Game Theory. MIT Press, M. Pan, J. Sun, and Y. Fang, Purging the back-room deaing: Secure spectrum auction everaging paiier cryptosystem, in JSAC, C. H. Papadimitriou, Agorithms, games, and the internet, in STOC, D. Wedein, An agorithm for arge scae 1 integer programming with appication to airine crew scheduing, Annas of Operations Research, vo. 57, no. 1, pp , D. Xiao, Is privacy compatibe with truthfuness? in ITCS, X. Zhou, S. Gandhi, S. Suri, and H. Zheng, ebay in the sky: Strategyproof wireess spectrum auctions, in MobiCom, X. Zhou and H. Zheng, Trust: A genera framework for truthfu doube spectrum auctions, in INFOCOM, R. Zhu, Z. Li, F. Wu, K. G. Shin, and G. Chen, Differentiay private spectrum auction with approximate revenue maximization, in MobiHoc, 214.

SPRING: A Strategy-Proof and Privacy Preserving Spectrum Auction Mechanism

SPRING: A Strategy-Proof and Privacy Preserving Spectrum Auction Mechanism 23 Proceedings IEEE INFOCOM SPRING: A Strategy-Proof and Privacy Preserving Spectrum Auction Mechanism Qianyi Huang, Yixin Tao, and Fan Wu Shanghai Key Laboratory of Scaabe Computing and Systems Department

More information

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao, Vivek Raghunathan, Stephen Hany, Vinod Sharma and. R. Kumar Abstract We consider a joint power contro

More information

New Efficiency Results for Makespan Cost Sharing

New Efficiency Results for Makespan Cost Sharing New Efficiency Resuts for Makespan Cost Sharing Yvonne Beischwitz a, Forian Schoppmann a, a University of Paderborn, Department of Computer Science Fürstenaee, 3302 Paderborn, Germany Abstract In the context

More information

Efficient Money Burning in General Domains

Efficient Money Burning in General Domains Efficient Money Burning in Genera Domains Dimitris Fotakis 1, Dimitris Tsipras 1, Christos Tzamos 2, and Emmanoui Zampetakis 2 1 Nationa Technica University of Athens, 157 80 Athens, Greece 2 Massachusetts

More information

Transport Cost and Optimal Number of Public Facilities

Transport Cost and Optimal Number of Public Facilities Transport Cost an Optima Number of Pubic Faciities Kazuo Yamaguchi Grauate Schoo of Economics, University of Tokyo June 14, 2006 Abstract We consier the number an ocation probem of pubic faciities without

More information

Truthful Mechanism Design for Multidimensional Covering Problems

Truthful Mechanism Design for Multidimensional Covering Problems Truthfu Mechanism Design for Mutidimensiona Covering Probems Hadi Minooei Chaitanya Swamy Abstract We investigate mutidimensiona covering mechanism-design probems, wherein there are m items that need to

More information

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization Scaabe Spectrum ocation for Large Networks ased on Sparse Optimization innan Zhuang Modem R&D Lab Samsung Semiconductor, Inc. San Diego, C Dongning Guo, Ermin Wei, and Michae L. Honig Department of Eectrica

More information

Auctioning a Cake: Truthful Auctions of Heterogeneous Divisible Goods

Auctioning a Cake: Truthful Auctions of Heterogeneous Divisible Goods Auctioning a Cake: Truthfu Auctions of Heterogeneous Divisibe Goods Yonatan Aumann Department of Computer Science Bar-Ian University Ramat-Gan 52900, Israe aumann@cs.biu.ac.i Yair Dombb Department of Computer

More information

Characterizing False-name-proof Allocation Rules in Combinatorial Auctions

Characterizing False-name-proof Allocation Rules in Combinatorial Auctions Characterizing Fase-name-proof Aocation Rues in Combinatoria Auctions Taiki Todo, Atsushi Iwasaki, Makoto Yokoo, and Yuko Sakurai Graduate Schoo of ISEE, Kyushu University Motooka 744, Nishi-ku, Fukuoka,

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

Improved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization

Improved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization Improved Min-Sum Decoding of LDPC Codes sing -Dimensiona Normaization Juntan Zhang and Marc Fossorier Department of Eectrica Engineering niversity of Hawaii at Manoa Honouu, HI 968 Emai: juntan, marc@spectra.eng.hawaii.edu

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Brandon Maone Department of Computer Science University of Hesini February 18, 2014 Abstract This document derives, in excrutiating

More information

Competitive Diffusion in Social Networks: Quality or Seeding?

Competitive Diffusion in Social Networks: Quality or Seeding? Competitive Diffusion in Socia Networks: Quaity or Seeding? Arastoo Fazei Amir Ajorou Ai Jadbabaie arxiv:1503.01220v1 [cs.gt] 4 Mar 2015 Abstract In this paper, we study a strategic mode of marketing and

More information

Centralized Coded Caching of Correlated Contents

Centralized Coded Caching of Correlated Contents Centraized Coded Caching of Correated Contents Qianqian Yang and Deniz Gündüz Information Processing and Communications Lab Department of Eectrica and Eectronic Engineering Imperia Coege London arxiv:1711.03798v1

More information

Discrete Applied Mathematics

Discrete Applied Mathematics Discrete Appied Mathematics 159 (2011) 812 825 Contents ists avaiabe at ScienceDirect Discrete Appied Mathematics journa homepage: www.esevier.com/ocate/dam A direct barter mode for course add/drop process

More information

(1 ) = 1 for some 2 (0; 1); (1 + ) = 0 for some > 0:

(1 ) = 1 for some 2 (0; 1); (1 + ) = 0 for some > 0: Answers, na. Economics 4 Fa, 2009. Christiano.. The typica househod can engage in two types of activities producing current output and studying at home. Athough time spent on studying at home sacrices

More information

NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION

NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION NEW DEVELOPMENT OF OPTIMAL COMPUTING BUDGET ALLOCATION FOR DISCRETE EVENT SIMULATION Hsiao-Chang Chen Dept. of Systems Engineering University of Pennsyvania Phiadephia, PA 904-635, U.S.A. Chun-Hung Chen

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay Throughput Optima Scheduing for Wireess Downinks with Reconfiguration Deay Vineeth Baa Sukumaran vineethbs@gmai.com Department of Avionics Indian Institute of Space Science and Technoogy. Abstract We consider

More information

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity

More information

(This is a sample cover image for this issue. The actual cover is not yet available at this time.)

(This is a sample cover image for this issue. The actual cover is not yet available at this time.) (This is a sampe cover image for this issue The actua cover is not yet avaiabe at this time) This artice appeared in a journa pubished by Esevier The attached copy is furnished to the author for interna

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR 1 Maximizing Sum Rate and Minimizing MSE on Mutiuser Downink: Optimaity, Fast Agorithms and Equivaence via Max-min SIR Chee Wei Tan 1,2, Mung Chiang 2 and R. Srikant 3 1 Caifornia Institute of Technoogy,

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

Melodic contour estimation with B-spline models using a MDL criterion

Melodic contour estimation with B-spline models using a MDL criterion Meodic contour estimation with B-spine modes using a MDL criterion Damien Loive, Ney Barbot, Oivier Boeffard IRISA / University of Rennes 1 - ENSSAT 6 rue de Kerampont, B.P. 80518, F-305 Lannion Cedex

More information

u(x) s.t. px w x 0 Denote the solution to this problem by ˆx(p, x). In order to obtain ˆx we may simply solve the standard problem max x 0

u(x) s.t. px w x 0 Denote the solution to this problem by ˆx(p, x). In order to obtain ˆx we may simply solve the standard problem max x 0 Bocconi University PhD in Economics - Microeconomics I Prof M Messner Probem Set 4 - Soution Probem : If an individua has an endowment instead of a monetary income his weath depends on price eves In particuar,

More information

User-initiated Data Plan Trading via A Personal Hotspot Market

User-initiated Data Plan Trading via A Personal Hotspot Market 1 User-initiated Data Pan Trading via A Persona Hotspot Market Xuehe Wang, Lingjie Duan, and Rui Zhang Abstract Mobie data services are becoming the main driver of a wireess service provider s WSP s) revenue

More information

Supplemental Information

Supplemental Information Suppementa Information A Singe-eve Tunne Mode to Account for Eectrica Transport through Singe Moecue- Sef-Assembed Monoayer-based Junctions by A. R. Garrigues,. Yuan,. Wang, E. R. Muccioo, D. Thompson,

More information

Maximum likelihood decoding of trellis codes in fading channels with no receiver CSI is a polynomial-complexity problem

Maximum likelihood decoding of trellis codes in fading channels with no receiver CSI is a polynomial-complexity problem 1 Maximum ikeihood decoding of treis codes in fading channes with no receiver CSI is a poynomia-compexity probem Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department

More information

Akaike Information Criterion for ANOVA Model with a Simple Order Restriction

Akaike Information Criterion for ANOVA Model with a Simple Order Restriction Akaike Information Criterion for ANOVA Mode with a Simpe Order Restriction Yu Inatsu * Department of Mathematics, Graduate Schoo of Science, Hiroshima University ABSTRACT In this paper, we consider Akaike

More information

A Comparison Study of the Test for Right Censored and Grouped Data

A Comparison Study of the Test for Right Censored and Grouped Data Communications for Statistica Appications and Methods 2015, Vo. 22, No. 4, 313 320 DOI: http://dx.doi.org/10.5351/csam.2015.22.4.313 Print ISSN 2287-7843 / Onine ISSN 2383-4757 A Comparison Study of the

More information

Algorithms to solve massively under-defined systems of multivariate quadratic equations

Algorithms to solve massively under-defined systems of multivariate quadratic equations Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea-Time Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process

More information

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai

More information

THE evolution of the current 4G and the upcoming

THE evolution of the current 4G and the upcoming IEEE TRASATIOS O OMMUIATIOS, VOL. 65, O. 3, MARH 207 05 Virtuaized Resource Sharing in oud Radio Access etworks Through Truthfu Mechanisms Sijia Gu, Zongpeng Li, Senior Member, IEEE, huan Wu, Senior Member,

More information

Online Load Balancing on Related Machines

Online Load Balancing on Related Machines Onine Load Baancing on Reated Machines ABSTRACT Sungjin Im University of Caifornia at Merced Merced, CA, USA sim3@ucmerced.edu Debmaya Panigrahi Duke University Durham, NC, USA debmaya@cs.duke.edu We give

More information

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance

Research of Data Fusion Method of Multi-Sensor Based on Correlation Coefficient of Confidence Distance Send Orders for Reprints to reprints@benthamscience.ae 340 The Open Cybernetics & Systemics Journa, 015, 9, 340-344 Open Access Research of Data Fusion Method of Muti-Sensor Based on Correation Coefficient

More information

SydU STAT3014 (2015) Second semester Dr. J. Chan 18

SydU STAT3014 (2015) Second semester Dr. J. Chan 18 STAT3014/3914 Appied Stat.-Samping C-Stratified rand. sampe Stratified Random Samping.1 Introduction Description The popuation of size N is divided into mutuay excusive and exhaustive subpopuations caed

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract Stochastic Compement Anaysis of Muti-Server Threshod Queues with Hysteresis John C.S. Lui The Dept. of Computer Science & Engineering The Chinese University of Hong Kong Leana Goubchik Dept. of Computer

More information

Some Measures for Asymmetry of Distributions

Some Measures for Asymmetry of Distributions Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester

More information

Paragraph Topic Classification

Paragraph Topic Classification Paragraph Topic Cassification Eugene Nho Graduate Schoo of Business Stanford University Stanford, CA 94305 enho@stanford.edu Edward Ng Department of Eectrica Engineering Stanford University Stanford, CA

More information

arxiv: v1 [cs.db] 1 Aug 2012

arxiv: v1 [cs.db] 1 Aug 2012 Functiona Mechanism: Regression Anaysis under Differentia Privacy arxiv:208.029v [cs.db] Aug 202 Jun Zhang Zhenjie Zhang 2 Xiaokui Xiao Yin Yang 2 Marianne Winsett 2,3 ABSTRACT Schoo of Computer Engineering

More information

Width of Percolation Transition in Complex Networks

Width of Percolation Transition in Complex Networks APS/23-QED Width of Percoation Transition in Compex Networs Tomer Kaisy, and Reuven Cohen 2 Minerva Center and Department of Physics, Bar-Ian University, 52900 Ramat-Gan, Israe 2 Department of Computer

More information

Optimal Control of Assembly Systems with Multiple Stages and Multiple Demand Classes 1

Optimal Control of Assembly Systems with Multiple Stages and Multiple Demand Classes 1 Optima Contro of Assemby Systems with Mutipe Stages and Mutipe Demand Casses Saif Benjaafar Mohsen EHafsi 2 Chung-Yee Lee 3 Weihua Zhou 3 Industria & Systems Engineering, Department of Mechanica Engineering,

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea- Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process Management,

More information

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network

More information

Minimizing Total Weighted Completion Time on Uniform Machines with Unbounded Batch

Minimizing Total Weighted Completion Time on Uniform Machines with Unbounded Batch The Eighth Internationa Symposium on Operations Research and Its Appications (ISORA 09) Zhangiaie, China, September 20 22, 2009 Copyright 2009 ORSC & APORC, pp. 402 408 Minimizing Tota Weighted Competion

More information

Manipulation in Financial Markets and the Implications for Debt Financing

Manipulation in Financial Markets and the Implications for Debt Financing Manipuation in Financia Markets and the Impications for Debt Financing Leonid Spesivtsev This paper studies the situation when the firm is in financia distress and faces bankruptcy or debt restructuring.

More information

The Group Structure on a Smooth Tropical Cubic

The Group Structure on a Smooth Tropical Cubic The Group Structure on a Smooth Tropica Cubic Ethan Lake Apri 20, 2015 Abstract Just as in in cassica agebraic geometry, it is possibe to define a group aw on a smooth tropica cubic curve. In this note,

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

Formulas for Angular-Momentum Barrier Factors Version II

Formulas for Angular-Momentum Barrier Factors Version II BNL PREPRINT BNL-QGS-06-101 brfactor1.tex Formuas for Anguar-Momentum Barrier Factors Version II S. U. Chung Physics Department, Brookhaven Nationa Laboratory, Upton, NY 11973 March 19, 2015 abstract A

More information

Heterogeneous Facility Location Games

Heterogeneous Facility Location Games AAMAS 18, Juy 1-15, 18, Stockhom, Sweden Heterogeneous Faciity Location Games ABSTRACT Eeftherios Anastasiadis London Southbank University London, Uk efterans@gmai.com We study heterogeneous k-faciity

More information

Symbolic models for nonlinear control systems using approximate bisimulation

Symbolic models for nonlinear control systems using approximate bisimulation Symboic modes for noninear contro systems using approximate bisimuation Giordano Poa, Antoine Girard and Pauo Tabuada Abstract Contro systems are usuay modeed by differentia equations describing how physica

More information

On the Goal Value of a Boolean Function

On the Goal Value of a Boolean Function On the Goa Vaue of a Booean Function Eric Bach Dept. of CS University of Wisconsin 1210 W. Dayton St. Madison, WI 53706 Lisa Heerstein Dept of CSE NYU Schoo of Engineering 2 Metrotech Center, 10th Foor

More information

Automobile Prices in Market Equilibrium. Berry, Pakes and Levinsohn

Automobile Prices in Market Equilibrium. Berry, Pakes and Levinsohn Automobie Prices in Market Equiibrium Berry, Pakes and Levinsohn Empirica Anaysis of demand and suppy in a differentiated products market: equiibrium in the U.S. automobie market. Oigopoistic Differentiated

More information

Approximate Bandwidth Allocation for Fixed-Priority-Scheduled Periodic Resources (WSU-CS Technical Report Version)

Approximate Bandwidth Allocation for Fixed-Priority-Scheduled Periodic Resources (WSU-CS Technical Report Version) Approximate Bandwidth Aocation for Fixed-Priority-Schedued Periodic Resources WSU-CS Technica Report Version) Farhana Dewan Nathan Fisher Abstract Recent research in compositiona rea-time systems has focused

More information

#A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG

#A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG #A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG Guixin Deng Schoo of Mathematica Sciences, Guangxi Teachers Education University, Nanning, P.R.China dengguixin@ive.com Pingzhi Yuan

More information

Network Slicing Games: Enabling Customization in Multi-Tenant Mobile Networks

Network Slicing Games: Enabling Customization in Multi-Tenant Mobile Networks Network Sicing Games: Enabing Customization in Muti-Tenant Mobie Networks Pabo Cabaero Abert Banchs Gustavo de Veciana Xavier Costa-Pérez The University of Texas at Austin, Austin, TX Emai: pabocabaero@utexasedu,

More information

Efficient Generation of Random Bits from Finite State Markov Chains

Efficient Generation of Random Bits from Finite State Markov Chains Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with?

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with? Bayesian Learning A powerfu and growing approach in machine earning We use it in our own decision making a the time You hear a which which coud equay be Thanks or Tanks, which woud you go with? Combine

More information

Tight Approximation Algorithms for Maximum Separable Assignment Problems

Tight Approximation Algorithms for Maximum Separable Assignment Problems MATHEMATICS OF OPERATIONS RESEARCH Vo. 36, No. 3, August 011, pp. 416 431 issn 0364-765X eissn 156-5471 11 3603 0416 10.187/moor.1110.0499 011 INFORMS Tight Approximation Agorithms for Maximum Separabe

More information

Improving the Accuracy of Boolean Tomography by Exploiting Path Congestion Degrees

Improving the Accuracy of Boolean Tomography by Exploiting Path Congestion Degrees Improving the Accuracy of Booean Tomography by Expoiting Path Congestion Degrees Zhiyong Zhang, Gaoei Fei, Fucai Yu, Guangmin Hu Schoo of Communication and Information Engineering, University of Eectronic

More information

$, (2.1) n="# #. (2.2)

$, (2.1) n=# #. (2.2) Chapter. Eectrostatic II Notes: Most of the materia presented in this chapter is taken from Jackson, Chap.,, and 4, and Di Bartoo, Chap... Mathematica Considerations.. The Fourier series and the Fourier

More information

STA 216 Project: Spline Approach to Discrete Survival Analysis

STA 216 Project: Spline Approach to Discrete Survival Analysis : Spine Approach to Discrete Surviva Anaysis November 4, 005 1 Introduction Athough continuous surviva anaysis differs much from the discrete surviva anaysis, there is certain ink between the two modeing

More information

Stochastic Variational Inference with Gradient Linearization

Stochastic Variational Inference with Gradient Linearization Stochastic Variationa Inference with Gradient Linearization Suppementa Materia Tobias Pötz * Anne S Wannenwetsch Stefan Roth Department of Computer Science, TU Darmstadt Preface In this suppementa materia,

More information

Tracking Control of Multiple Mobile Robots

Tracking Control of Multiple Mobile Robots Proceedings of the 2001 IEEE Internationa Conference on Robotics & Automation Seou, Korea May 21-26, 2001 Tracking Contro of Mutipe Mobie Robots A Case Study of Inter-Robot Coision-Free Probem Jurachart

More information

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische

More information

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient

More information

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c)

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c) A Simpe Efficient Agorithm of 3-D Singe-Source Locaization with Uniform Cross Array Bing Xue a * Guangyou Fang b Yicai Ji c Key Laboratory of Eectromagnetic Radiation Sensing Technoogy, Institute of Eectronics,

More information

Effects of Information Disclosure under First- and Second-Price Auctions in a Supply Chain Setting

Effects of Information Disclosure under First- and Second-Price Auctions in a Supply Chain Setting Effects of Information Discosure under First- and Second-Price Auctions in a Suppy Chain Setting Ying-Ju Chen Gustavo Vucano Apri 28, 2006 Abstract We consider a two-stage suppy chain comprising two retaiers

More information

Noname manuscript No. (will be inserted by the editor) Can Li Ignacio E. Grossmann

Noname manuscript No. (will be inserted by the editor) Can Li Ignacio E. Grossmann Noname manuscript No. (wi be inserted by the editor) A finite ɛ-convergence agorithm for two-stage convex 0-1 mixed-integer noninear stochastic programs with mixed-integer first and second stage variabes

More information

Secure Information Flow Based on Data Flow Analysis

Secure Information Flow Based on Data Flow Analysis SSN 746-7659, Engand, UK Journa of nformation and Computing Science Vo., No. 4, 007, pp. 5-60 Secure nformation Fow Based on Data Fow Anaysis Jianbo Yao Center of nformation and computer, Zunyi Norma Coege,

More information

hole h vs. e configurations: l l for N > 2 l + 1 J = H as example of localization, delocalization, tunneling ikx k

hole h vs. e configurations: l l for N > 2 l + 1 J = H as example of localization, delocalization, tunneling ikx k Infinite 1-D Lattice CTDL, pages 1156-1168 37-1 LAST TIME: ( ) ( ) + N + 1 N hoe h vs. e configurations: for N > + 1 e rij unchanged ζ( NLS) ζ( NLS) [ ζn unchanged ] Hund s 3rd Rue (Lowest L - S term of

More information

Module 22: Simple Harmonic Oscillation and Torque

Module 22: Simple Harmonic Oscillation and Torque Modue : Simpe Harmonic Osciation and Torque.1 Introduction We have aready used Newton s Second Law or Conservation of Energy to anayze systems ike the boc-spring system that osciate. We sha now use torque

More information

Lecture Note 3: Stationary Iterative Methods

Lecture Note 3: Stationary Iterative Methods MATH 5330: Computationa Methods of Linear Agebra Lecture Note 3: Stationary Iterative Methods Xianyi Zeng Department of Mathematica Sciences, UTEP Stationary Iterative Methods The Gaussian eimination (or

More information

A GENERAL METHOD FOR EVALUATING OUTAGE PROBABILITIES USING PADÉ APPROXIMATIONS

A GENERAL METHOD FOR EVALUATING OUTAGE PROBABILITIES USING PADÉ APPROXIMATIONS A GENERAL METHOD FOR EVALUATING OUTAGE PROBABILITIES USING PADÉ APPROXIMATIONS Jack W. Stokes, Microsoft Corporation One Microsoft Way, Redmond, WA 9852, jstokes@microsoft.com James A. Ritcey, University

More information

AALBORG UNIVERSITY. The distribution of communication cost for a mobile service scenario. Jesper Møller and Man Lung Yiu. R June 2009

AALBORG UNIVERSITY. The distribution of communication cost for a mobile service scenario. Jesper Møller and Man Lung Yiu. R June 2009 AALBORG UNIVERSITY The distribution of communication cost for a mobie service scenario by Jesper Møer and Man Lung Yiu R-29-11 June 29 Department of Mathematica Sciences Aaborg University Fredrik Bajers

More information

Lecture 6: Moderately Large Deflection Theory of Beams

Lecture 6: Moderately Large Deflection Theory of Beams Structura Mechanics 2.8 Lecture 6 Semester Yr Lecture 6: Moderatey Large Defection Theory of Beams 6.1 Genera Formuation Compare to the cassica theory of beams with infinitesima deformation, the moderatey

More information

Maintenance activities planning and grouping for complex structure systems

Maintenance activities planning and grouping for complex structure systems Maintenance activities panning and grouping for compex structure systems Hai Canh u, Phuc Do an, Anne Barros, Christophe Bérenguer To cite this version: Hai Canh u, Phuc Do an, Anne Barros, Christophe

More information

FRST Multivariate Statistics. Multivariate Discriminant Analysis (MDA)

FRST Multivariate Statistics. Multivariate Discriminant Analysis (MDA) 1 FRST 531 -- Mutivariate Statistics Mutivariate Discriminant Anaysis (MDA) Purpose: 1. To predict which group (Y) an observation beongs to based on the characteristics of p predictor (X) variabes, using

More information

Applied Nuclear Physics (Fall 2006) Lecture 7 (10/2/06) Overview of Cross Section Calculation

Applied Nuclear Physics (Fall 2006) Lecture 7 (10/2/06) Overview of Cross Section Calculation 22.101 Appied Nucear Physics (Fa 2006) Lecture 7 (10/2/06) Overview of Cross Section Cacuation References P. Roman, Advanced Quantum Theory (Addison-Wesey, Reading, 1965), Chap 3. A. Foderaro, The Eements

More information

https://doi.org/ /epjconf/

https://doi.org/ /epjconf/ HOW TO APPLY THE OPTIMAL ESTIMATION METHOD TO YOUR LIDAR MEASUREMENTS FOR IMPROVED RETRIEVALS OF TEMPERATURE AND COMPOSITION R. J. Sica 1,2,*, A. Haefee 2,1, A. Jaai 1, S. Gamage 1 and G. Farhani 1 1 Department

More information

Supporting Information for Suppressing Klein tunneling in graphene using a one-dimensional array of localized scatterers

Supporting Information for Suppressing Klein tunneling in graphene using a one-dimensional array of localized scatterers Supporting Information for Suppressing Kein tunneing in graphene using a one-dimensiona array of ocaized scatterers Jamie D Was, and Danie Hadad Department of Chemistry, University of Miami, Cora Gabes,

More information

Atomic Hierarchical Routing Games in Communication Networks

Atomic Hierarchical Routing Games in Communication Networks Atomic Hierarchica Routing Games in Communication etworks Vijay Kambe, Eitan Atman, Rachid E-Azouzi Vinod Sharma Dept. of Industria Engineering Management, IIT - Kharagpur, West Benga, India Maestro group,

More information

<C 2 2. λ 2 l. λ 1 l 1 < C 1

<C 2 2. λ 2 l. λ 1 l 1 < C 1 Teecommunication Network Contro and Management (EE E694) Prof. A. A. Lazar Notes for the ecture of 7/Feb/95 by Huayan Wang (this document was ast LaT E X-ed on May 9,995) Queueing Primer for Muticass Optima

More information

Combining reaction kinetics to the multi-phase Gibbs energy calculation

Combining reaction kinetics to the multi-phase Gibbs energy calculation 7 th European Symposium on Computer Aided Process Engineering ESCAPE7 V. Pesu and P.S. Agachi (Editors) 2007 Esevier B.V. A rights reserved. Combining reaction inetics to the muti-phase Gibbs energy cacuation

More information

Statistical Learning Theory: A Primer

Statistical Learning Theory: A Primer Internationa Journa of Computer Vision 38(), 9 3, 2000 c 2000 uwer Academic Pubishers. Manufactured in The Netherands. Statistica Learning Theory: A Primer THEODOROS EVGENIOU, MASSIMILIANO PONTIL AND TOMASO

More information

An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks

An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks An Adaptive Opportunistic Routing Scheme for Wireess Ad-hoc Networks A.A. Bhorkar, M. Naghshvar, T. Javidi, and B.D. Rao Department of Eectrica Engineering, University of Caifornia San Diego, CA, 9093

More information

Bayesian Unscented Kalman Filter for State Estimation of Nonlinear and Non-Gaussian Systems

Bayesian Unscented Kalman Filter for State Estimation of Nonlinear and Non-Gaussian Systems Bayesian Unscented Kaman Fiter for State Estimation of Noninear and Non-aussian Systems Zhong Liu, Shing-Chow Chan, Ho-Chun Wu and iafei Wu Department of Eectrica and Eectronic Engineering, he University

More information

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS TONY ALLEN, EMILY GEBHARDT, AND ADAM KLUBALL 3 ADVISOR: DR. TIFFANY KOLBA 4 Abstract. The phenomenon of noise-induced stabiization occurs

More information

Separation of Variables and a Spherical Shell with Surface Charge

Separation of Variables and a Spherical Shell with Surface Charge Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation

More information

Coalitions in Routing Games: A Worst-Case Perspective

Coalitions in Routing Games: A Worst-Case Perspective Coaitions in Routing Games: A Worst-Case Perspective Gideon Bocq and Arie Orda, Feow, IEEE arxiv:30.3487v3 [cs.ni] 27 Mar 206 Abstract We investigate a routing game that aows for the creation of coaitions,

More information

Limited magnitude error detecting codes over Z q

Limited magnitude error detecting codes over Z q Limited magnitude error detecting codes over Z q Noha Earief choo of Eectrica Engineering and Computer cience Oregon tate University Corvais, OR 97331, UA Emai: earief@eecsorstedu Bea Bose choo of Eectrica

More information

Optimization Based Bidding Strategies in the Deregulated Market

Optimization Based Bidding Strategies in the Deregulated Market Optimization ased idding Strategies in the Dereguated arket Daoyuan Zhang Ascend Communications, nc 866 North ain Street, Waingford, C 0649 Abstract With the dereguation of eectric power systems, market

More information

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES ANDRZEJ DUDEK AND ANDRZEJ RUCIŃSKI Abstract. For positive integers k and, a k-uniform hypergraph is caed a oose path of ength, and denoted by

More information

Precoding for the Sparsely Spread MC-CDMA Downlink with Discrete-Alphabet Inputs

Precoding for the Sparsely Spread MC-CDMA Downlink with Discrete-Alphabet Inputs IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL.*, NO.*, MONTH 2016 1 Precoding for the Sparsey Spread MC-CDMA Downin with Discrete-Aphabet Inputs Min Li, Member, IEEE, Chunshan Liu, Member, IEEE, and Stephen

More information