Network coding for online and dynamic networking problems. Tracey Ho Center for the Mathematics of Information California Institute of Technology
|
|
- Ethel Cole
- 5 years ago
- Views:
Transcription
1 Network coding for online and dynamic networking problems Tracey Ho Center for the Mathematics of Information California Institute of Technology 1
2 Work done in collaboration with: Harish Viswanathan: Bell Laboratories Ralf Koetter and Niranjan Ratnakar: Coordinated Science Laboratory, University of Illinois Urbana-Champaign 2
3 Network coding for static single multicast in wired networks Static multicast network connection problem defined on graph (V, E) by given set of sinks T V, source rates λ i, link capacities R ab and link costs C ab (g) Optimal link usage g ab given by optimization with linear constraints [LMHK04]: minimize C ab (g ab ) (a,b) E subject to λ i = λ i = i b:(i,b) E a:(a,β) E f β ib a:(a,i) E f β aβ β T f β ai i V, β T, β i 0 f β ab g ab R ab (a, b) E, β T 3
4 Network coding for static single multicast in wired networks Solution is a union of flows A network code can be constructed over this solution by deterministic or random methods 4
5 Extensions of practical interest static time-varying, packetized, bursty wired wireless single multicast session non-multicast/multiple sessions 5
6 From flows to packets analysis of a dynamic solution static case unit rate source processes unit capacity links coding node dynamic case exogenous source packets coded/forwarded packets formation of a coded packet design of dynamic algorithms? 6
7 c c c c c From wired to wireless flow model must account for wireless multicast advantage: a single wireless link can have multiple destinations, but all receive identical information model each wireless link using a virtual bottleneck node [WuChouKung04] constrain sum of each receiver s flows, via different destination nodes of a wireless link, to be at most the flow on the link [LunMédHoKoe04, HoVis05] 7
8 From wired to wireless (cont d) Minimum energy wireless flow formulation [LunMédHoKoe04]: minimize C ab (g ab ) (a,b) E subject to λ i = f β ib b:(i,b) E a:(a,i) E i V, β T, β i λ i = f β aβ β T i a:(a,β) E f β ab 0 (g ac fac) β 0 (a, b) E, β T c:(a,c) E,(a,c) (a,b) other issues: interference, physical layer cooperation f β ai 8
9 Non-multicast [DouFreZeg05] (1) A scalar linear solution over any ring of characteristic 2 No linear solution for any vector dimension over a finite field with odd characteristic By equating coefficients and manipulating,we have: M i invertible for all i 9
10 Non-multicast [DouFreZeg05] (2) A scalar linear solution over any ring where 2 is a unit No linear solution for any vector dimension over a finite field with characteristic 2 By equating coefficients and manipulating,we have: M i invertible for all i 10
11 Non-multicast [DouFreZeg05] (2) A scalar linear solution over any ring where 2 is a unit No linear solution for any vector dimension over a finite field with characteristic 2 For any value of vector c, there exist values for a,b,d,e such that all six inputs to node 43 are zero 11
12 Non-multicast [DouFreZeg05] (3) 12
13 Multiple multicast/unicast sessions optimal inter-session network coding is an open problem intra-session network coding for multiple multicasts/unicasts improves capacity and optimization complexity over uncoded operation dynamic, bursty settings provides guidance for wireless physical/mac layer choices online network coding across unicast sessions additional flexibility for accommodating more sessions/handling congestion exploits wireless multicast advantage 13
14 Dynamic intra-session network coding for multiple multicast/unicast sessions Problem statement Multi-hop wired/wireless networks with bursty sources, variable channel states, queued packets Multiple multicast/unicast sessions Each session has one or more independent or correlated sources, and one or more sinks Network coding within sessions Problems: network coding, routing, scheduling among packets, power control/scheduling among transmitters, rate control for correlated sources Maximize throughput, minimize cost 14
15 Background back pressure routing introduced for multicommodity unicast problems by [TasEph92,AweLei93] routing and scheduling decisions based on lengths of queues Ui c (t) for each commodity c at each node i supply at sources and removal at sinks create gradients down which packets flow stabilizes any stabilizable set of input rates multicast routing algorithms: predetermined set of multicast trees [SarTas02] a queue for every subset of every session s sinks at each node [AweBriSch02] 15
16 Back pressure multicast with network coding Each node has one queue per sink (independent sources case) or per (source, sink) pair (correlated sources case) local decisions and control: nodes locally determine network coding and packet scheduling for correlated sources, rate control by sinks completely decentralized algorithms for wired networks centralized scheduling and power allocation for interfering wireless transmitters Throughput-optimal given constraint of not coding across sessions 16
17 Back pressure and optimization queue lengths can be interpreted as dual variables (prices) in classical subgradient search methods for multicommodity flow [NeeModRoh05] besides throughput, can optimize cost [Neely05] or achieve fairness [ErySri05] 17
18 Virtual queues Windows of packets that can be coded together Larger windows Handles more burstiness May increase delay Larger code description overhead Packets are replicated in virtual queues for each sink of the session Sink 1 Sink 2 Sink 3 18
19 Case 1: wired network, independent sources Session 1 Sink 1 Sink 2 Active link in this slot In active link in this slot Sink 3 RNC Sink 2 Sink 1 Sink 3 Session 2 Sink 4 RNC Zero fill up to allowed rate if other queue is longer No network coding across sessions Session 1 is chosen as it has a larger sum (over sinks) of positive queue size differences Session 1, Sink 1 queue is not a part of the network code combining as it is less than the corresponding queue at destination of link. 19
20 Algorithm for wired networks, independent sources local decisions based on lengths of virtual queues U cβ i (t) at each node i for each sink β of each session c at each time slot [t, t + T), for each link (a, b), choose one session c ab = arg max c β T c max ( U cβ a ) U cβ b, 0 send at link capacity a random linear combination of data from session c ab queues at a corresponding to all sinks β for which U c ab β a U c ab β b > 0 each sink decodes when it has enough packets by inverting linear combinations 20
21 Case 2: wireless network, independent sources Additional elements: wireless links wireless multicast advantage physical layer cooperation consider generalized links (a, Z) from an originating node a to a set Z of receiving nodes algorithm must choose which queues to update at receiving nodes d Z interference among transmitters; link rates determined by channel states as well as transmit powers algorithm must determine powers/schedules for transmission 21
22 Wireless links 22
23 Network coding on a given wireless link Sink 1 Multiple destination nodes Session 1 Sink 2 Sink 2 Sink 3 RNC Sink 3 Session 2 Sink 1 Sink 4 RNC Zero fill up to allowed rate if other queue is longer No network coding across sessions Session 1 is chosen as it has a larger sum (over sinks) of positive maximum (over destinations of the link) queue size differences For a link (a,z), we denote this sum by 23
24 Dealing with interference transmit scenarios 24
25 Algorithm for wireless, independent sources In each time slot [t, t + T), Scheduling: for each potential link (a, Z), choose one session c az = arg max c β T c max ( ( max Ua cβ b Z ) ) U cβ b, 0 25
26 Algorithm for wireless, independent sources (cont d) Power control: based on channel state S(t), a power allocation P is chosen to maximize µ az (P, S(t))waZ a,z where µ az (P, S(t)) is the link rate and waz = ( ( max U c az a β b Z β T c az max ) ) U c az β b, 0 26
27 Algorithm for wireless, independent sources (cont d) Network coding: for each link (a, Z), a random linear combination ( of data corresponding ) to each sink β for which max b Z U c az a β U c az β b > 0 is sent at the available rate each destination node d Z associates the received information with the virtual( queues corresponding ) to sinks β for which d = arg max b Z U c az a β U c az β b 27
28 Heuristics for choosing transmission scenarios Choices guided by weights w l based on queue lengths, which may also be useful for non-dynamic optimization Form a set of transmission scenarios with transmit powers fixed at maximum (optimal at low SNRs) Build each scenario S starting with a different link Greedily add link l with maximum µ l w l Scenario is completed when potential increase from adding any link is below some threshold Choose the transmission scenario with maximum l S µ lw l Similar to heuristics used in [MukVis04,WuChoZhaJaiZhuKun05] that try to find scenarios maximizing l S µ l 28
29 Minimizing energy Approach of [Neely05] for multiple unicasts extends to multicast with a network coding Goal: minimize energy while stabilizing any stabilizable rates Objective function: E { a V g a ( Z P az (t)) where g a (p) is any convex increasing cost function of the power p used by node a Power control: choose power allocation P to maximize [ µ az (P, S(t))waZ V g a ( ] P az ) a Z Z Parameter V trades off between condition and power optimality } 29
30 Case 3: correlated sources Slepian-Wolf problem [SW73]: separate encoding of correlated sources for a single receiver R 1 X 1. X 2. R 2 achievable rate region: R 1 H(X 1 X 2 ); R 2 H(X 2 X 1 ); R 1 + R 2 H(X 1, X 2 ) generalization to arbitrary networks achieved by random linear network coding for single multicast session with given link capacities [HoMéEffKoe04] 30
31 Case 3: correlated sources Problem: when there are multiple sessions sharing the network, how to choose data rates from correlated sources (which are to some extent interchangeable)? Approach: each node i maintains a virtual queue for each (source, sink) pair (α, β) of each session c each sink β drains the virtual queues of sources α at rates A cαβ out (t) chosen based on lengths of virtual queues at β token queue associated with each virtual queue at sinks keeps track of deficits in received rate caused by source burstiness and link variability reverse of previous algorithms: uses the difference V cαβ i (t) between maximum queue size M and virtual queue length 31
32 Algorithm for correlated sources In each time slot [t, t + T), Outflow rate allocation: Each sink β chooses outflow rates {A cαβ out (t) α S c } to minimize V cαβ β (t + )A cαβ out (t) subject to α S A cαβ out (t) T A cαβ out (t) T α H(S (S c \S )) + ǫ ˆǫ c, S S c λ c α c, α S c. and removes data accordingly from its virtual queues; when queues become empty the deficit is reflected in the token queues 32
33 Algorithm for correlated sources (cont d) Inflow rate control: Each source α adds random linear combinations of exogenous data to its virtual queues at the exogenous data rate, up to a maximum amount of Vα cαβ (t). Network coding, scheduling and power control: analogous to case of independent sources Token queue adjustments: for each virtual queue at the sinks, an amount ( ) Ŵ cαβ (t) = min V V cαβ β (t ), W cαβ (t ) is removed to repay deficit (or, if negative, is added to the deficit) 33
34 Necessary condition (R az ) and {f cαβ abz, gc az, λcαβ } satisfying: Z,a Z f cαβ aiz Z,b Z α S c,b Z ( c f cαβ abz 0 a, b, Z, c, α S c, β T c λ cαβ c, α S c, β T c, i = α f cαβ ibz = λ cαβ c, α S c, β T c, i = β 0 c, α S c, β T c, i / {α, β} f cαβ abz g c az a, Z, c, β T c g c az ) α S λ cαβ (R az ) for some (R az ) Γ λ cαβ λ c α c, α S c, β T c H(S (S c \S )) c, S S c, β T c 34
35 Sufficient condition For some ǫ > 0, (R az ) and {f cαβ abz, gc az, λcαβ } satisfying: Z,a Z f cαβ aiz Z,b Z α S c,b Z ( c f cαβ abz 0 a, b, Z, c, α S c, β T c λ cαβ c, α S c, β T c, i = α f cαβ ibz = λ cαβ c, α S c, β T c, i = β 0 c, α S c, β T c, i / {α, β} f cαβ abz g c az a, Z, c, β T c g c az ) α S λ cαβ (R az ) for some (R az ) Γ λ cαβ λ c α c, α S c, β T c H(S (S c \S )) + ǫ c, S S c, β T c 35
36 Theorem The back-pressure algorithm with V = TBN ˆǫ M = V + Nµ out max, where B = τ max 2 ( 1 N ( E i,c +(µ out max) 2 + (µ in max) 2 ) A cαβ in T, 0 < ˆǫ < ǫ and ) N σ maxµ out maxµ in max is stable and asymptotically achieves the desired multicast rates. 36
37 Proof outline Compare with a randomized policy that depends on the (unknown) flow solution At t = (kt), token queue adjustments for both policies: for each virtual queue at the sinks, an amount ( ) Ŵ cαβ (t) = min V V cαβ β (t ), W cαβ (t ) is removed to repay token queue deficit (or, if negative, is added to the deficit), i.e. V cαβ β (t + ) = V cαβ (t ) + Ŵ cαβ (t) β W cαβ (t + ) = W cαβ (t ) Ŵ cαβ (t) 37
38 Proof outline Outflow rate allocation: back pressure policy: each sink β chooses {A cαβ out (t) α S c } to minimize V cαβ β (t + )A cαβ out (t) subject to α S A cαβ out (t) T A cαβ out (t) T α H(S (S c \S )) + ǫ ˆǫ c, S S c λ c α c, α S c randomized policy: A cαβ out (t) = T(λ cαβ ˆǫ) 38
39 Inflow at sources: Proof outline back pressure policy: A cαβ in (t) = Tλc α randomized policy: A cαβ in (t) = Tλcαβ add a corresponding amount of data to source queues up to maximum capacity Scheduling and power control: back pressure policy: choose so as to maximize µ az (P, S(t))waZ a,z where µ az (P, S(t)) is the link rate and waz = ( ( max U c az a β b Z β T c az max ) ) U c az β b, 0 39
40 randomized policy: choose so as to achieve average rates power allocation: for each S, choose allocation from a finite set according to a set of probabilities for each link (a, Z), one session c is chosen randomly with g c az probability c gc az each of its sinks β is independently chosen with probability α,b fcαβ abz g c az for each chosen sink, one (source, destination node) pair (α S c, b Z) is chosen with probability f cαβ abz α,b fcαβ abz 40
41 Proof outline Network coding: send a random linear combination of data corresponding to the chosen (session, source, sink, destination)-tuples (c, α, β, d) on each link (a, Z) at its instantaneous rate (back pressure policy) c or at a fraction gc az R az of its instantaneous rate (randomized policy) up to maximum capacity of destination queue 41
42 Evolution of queues in interval (t,t + T): V cαβ α (t + T) max V α cαβ (t) A cαβ in (t) T a,z aαz (t), 0 µ cαβ +T b,z V cαβ i (t + T) max µ cαβ αbz (t) V cαβ i (t) T a,z aiz (t), 0 µ cαβ +T b,z µ cαβ ibz (t) i / {α, β} 42
43 Evolution of sink queues in interval (t,t + T): V cαβ β ((t + T) ) max V cαβ β (t + ) T a,z aβz (t), 0 µ cαβ +T b,z µ cαβ βbz (t) + Âcαβ out (t) W cαβ ((t + T) ) = W cαβ (t + ) + A cαβ out (t) Âcαβ out (t) 43
44 Lyapunov functions For each (c, α S c, β T c ), define the Lyapunov function L cαβ (V cαβ, W cαβ ) = i (V cαβ i ) 2 + 2V W cαβ and let L cαβ (t) = L cαβ (V cαβ (t), W cαβ (t)). 44
45 Evolution of Lyapunov functions At t = kt, L cαβ (t + ) L cαβ (t ) = Ŵ cαβ (t) (Ŵ cαβ (t) + 2V cαβ β (t ) 2V ) 0 45
46 Evolution of Lyapunov functions (cont d) For (t, t + T), E{L cαβ ((t + T) ) L cαβ (t + ) V (t + ), W(t + )} c,α S c,β T c 2T 2 BN 2T V cαβ i (t)e µ cαβ aiz c,α S c,β T c i a,z b,z { } { }] +Vα cαβ A cαβ in (t)e V cαβ β (t + A cαβ out )E T T µ cαβ ibz = D(V (t + ), W(t + )) where B = τ max 2 ( 5 2N c,α (λ c α) 2 + 4σ maxµ in maxµ out max N + (µ out max) 2 + (µ in max) 2 ) 46
47 Comparing the policies Token queue adjustment at t = kt identical for both policies For (t, t + T), D = K 2T + c,α,β = K 2T + c,α,β i,c Vα cαβ (t)e a,b,z V cαβ i α S c,β T c c,β Vα cαβ (t)e { } A cαβ in T { E µ cαβ abz { A cαβ in T } (t)e } ( c,α,β V cαβ a c,α,β a,z V cαβ β (t)e µ cαβ aiz b,z µ cαβ ibz { } A cαβ out T ) (t) V cαβ b (t) V cαβ β (t)e { } A cαβ out T 47
48 Comparing the policies The three terms of the preceding expression involve disjoint sets of policy-dependent variables The back-pressure policy maximizes each of them subject to constraints which are also satisfied by the randomized policy Thus, D backpressure (V (t + ), W(t + )) D randomized (V (t + ), W(t + )) 48
49 Evolution over one time step For the randomized policy, E{µ cαβ abz (t)} = fcαβ abz a, b, Z, c, α S c, β T c A cαβ in = Tλ cαβ c, α S c, β T c A cαβ out = T ˆλ cαβ = T(λ cαβ ˆǫ) c, α S c, β T c independently of V (t), W(t) Thus, E { L cαβ ((t T) ) L cαβ (t ) } D backpressure D randomized 2T 2 BN 2Tˆǫ c V cαβ β α S c,β T c (t) 49
50 Stability of back pressure policy If W cαβ (t + ) = 0 for all (c, α, β), L cαβ (t ) NM 2 t (t, t + T) If W cαβ (t + ) > 0 for some (c, α, β), then V cαβ β (t + ) = V, and E { L cαβ ((t T) ) L cαβ (t ) } 2T 2 BN 2TˆǫV 0 for V = TBN ˆǫ 50
51 Coding across unicast sessions wired 51
52 Coding across unicast sessions wired 52
53 Coding across unicast sessions wired 53
54 Coding across unicast sessions wired 54
55 Coding across unicast sessions wireless 55
56 Coding across unicast sessions wireless 56
57 Coding across unicast sessions wireless 57
58 Coding across sessions advantages in capacity, online incremental solutions how to find the minimum cost way to add a connection? additional flow requirements depend on which existing flow(s), if any, are coded with new flow use butterfly structure as a basic building block 58
59 re m e d y re q u e s t re m e d y re q u e s t Wired butterfly structure 59
60 Linear constraints for adding a new connection x e (i): usage of link e by flow i p e (m n, u): poison on flow n originating from merger with flow m at node u q e (m n, u): associated remedy request r e (m n, u): associated remedy r e (m n, u) is a positive real flow; p e (m n, u) and q e (m n, u) are negative virtual flows completing loop in opposite direction to real flows 60
61 Linear constraints for adding a new connection Src 1 x(1) = 1, q(1 2) = 1 r(1 2) = 1 Rcv 2 x(2) = 1, p(1 2) = 1 61
62 Linear constraints for adding a new connection New flow of size r n from source s n to sink t n x e (n) 0 v / {s n, t n } x e (n) = r n v = t n e: d(e)=v e: o(e)=v r n v = s n Conservation of flow in loops (p e (m n, u) + q e ( ) + r e ( )) = e: d(e)=v e: o(e)=v (p e ( ) + q e ( ) + r e ( )) Virtual flows are associated with corresponding real flows x e (n) + (p e (m n, u) + q e (n m, u)) 0 u m 62
63 Linear constraints for adding a new connection p e (m n, u) generated at u and diminishes going downstream p e (m n, u) p e (m n, u) e: d(e)=u p e (m n, v) e: o(e)=u e: d(e)=v e: o(e)=v p e (m n, v) v u q e (m n, u) generated at u and diminishes going upstream q e (m n, u) q e (m n, u) e: d(e)=u q e (m n, v) e: o(e)=u e: d(e)=v e: o(e)=v q e (m n, v) v u 63
64 Linear constraints for adding a new connection Poison generated symmetrically p e (m n, o(e)) = p e (n m, o(e)) Link capacity constraint n max(p e (m n, u), p e (n m, u)) + x e (i) u m + u i=1 (r e (m n, u) + r e (n m, u)) z e m 64
65 Wireless multicast advantage 65
66 Linear constraints for adding a new connection wireless multicast advantage Poison generation Link capacity constraints ( max u m b Z p ubz (m n, u) = b Z p ubz (n m, u) p abz (n m, u) p abz (m n, u), b Z b Z + [ ( max x az (m), ) r abz (m n, u) m u b ( + max x az (n), )] r abz (n m, u) u b ) z abz 66
67 Competitive online algorithms we extend the approach of Awerbuch et al. [AAP93] on throughput-competitive online routing to network coding sequentially consider unicast session requests β j, j = 1, 2,...,k, each specifying source s j, destination d j, duration, bandwidth and an associated reward goal is to maximize total reward (e.g. throughput) online algorithm either allocates sufficient capacity to accommodate request or rejects request; no rerouting Evaluate online algorithm by competitive ratio: supremum, over all possible input sequences, of the ratio of the optimal offline reward to the online reward 67
68 m links in network Notation and assumptions reward ρ j of j th request bounded within range [1, R] consider single period and unit bandwidth requests for simplicity capacity u e of each link e bounded within range [log µ, P], where P 1 and µ = 2mPR 68
69 Online routing approach of Awerbuch et al. Online strategy: assign link costs exponential in fractional usage accept a connection only if worthwhile compared to costs Competitive ratio of O(log n) achieved, where n is the number of nodes 69
70 Incorporating network coding allow up to two connections to share capacity by being coded together associate with each edge e a cost, after considering j 1 requests, based on fraction λ e,x (j) of its capacity already assigned to x = 1, 2 or more flows: where 0 α < 1 c e (j) = 1 m µλ e,1(j)+αλ e,2 (j)(1 1 ue λ e,1(j)) + 70
71 Online strategy algorithm accommodates request β j iff it can find a solution such that (a e,1 + αa e,2 ) c e (j) ρ j u e e a e,1 + αa e,2 u e a e,2 u e λ e,1 (j) λ e,2 (j) e & 1 log µ e where a e,x is the capacity of e used in adding β j that becomes shared by x = 1, 2 connections 71
72 Finding a low-cost solution for a connection by linear programming based on the equations described earlier, or by heuristics, e.g. searching for remedy paths within limited local areas, greedy Dijkstra-like approach 72
73 Performance A (2 log µ + 3) competitive ratio is obtained as long as each connection added uses a solution costing no more than the lowest cost routing-only solution This is order-optimal [AAP93] 73
74 Enforcing capacity constraints When λ e,1 (j) > 1 1 u e, using the assumption that log µ u e P, we have 1 c e (j) > µ1 u e mu e µ 2mP = R, so capacity will not be exceeded log µ 74
75 Lower bounding online performance If request β j is admitted, (c e (j + 1) c e (j)) e e e c e (j) ρ j log µ ( ) µ a e,1 +αa e,2 ue 1 ( ) ae,1 + αa e,2 c e (j) log µ Summing over set A of all accepted requests, ρ j log µ ( c e (k + 1) 1 ) m j A e = e where k is the total number of requests. c e (k + 1) 1, u e 75
76 Upper bounding off-line performance If request j is admitted by the off-line algorithm but not the online algorithm, ρ j < e P j c e (j) u e e P j c e (k + 1) u e where P j is the path from s j to t j that forms part of the set of links used by the off-line algorithm to accommodate β j Total reward from the set Q of these requests is at most j Q e P j c e (k + 1) u e = e: e P j, j Q c e (k + 1) j Q: e P j 1 u e 2 e c e (k + 1) 76
77 Competitive ratio Off-line reward is at most j Qρ j + j Aρ j 2 e c e (k + 1) + j A ρ j 2 + (2 log µ + 1) j Aρ j Competitive ratio is 2 log µ
78 Conclusions and further work Dynamic back pressure-based algorithms for intra-session multicast with independent or correlated sources Online algorithm for sequentially phasing in multiple unicast connections Further work: fully decentralized dynamic algorithms for wireless evaluation and comparisons on typical or random graphs randomized online network coding algorithms 78
Dynamic Power Allocation and Routing for Time Varying Wireless Networks
Dynamic Power Allocation and Routing for Time Varying Wireless Networks X 14 (t) X 12 (t) 1 3 4 k a P ak () t P a tot X 21 (t) 2 N X 2N (t) X N4 (t) µ ab () rate µ ab µ ab (p, S 3 ) µ ab µ ac () µ ab (p,
More informationOn queueing in coded networks queue size follows degrees of freedom
On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,
More informationRobust Network Codes for Unicast Connections: A Case Study
Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,
More informationInformation in Aloha Networks
Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha
More informationFairness and Optimal Stochastic Control for Heterogeneous Networks
λ 91 λ 93 Fairness and Optimal Stochastic Control for Heterogeneous Networks sensor network wired network wireless 9 8 7 6 5 λ 48 λ 42 4 3 0 1 2 λ n R n U n Michael J. Neely (USC) Eytan Modiano (MIT) Chih-Ping
More informationCode Construction for Two-Source Interference Networks
Code Construction for Two-Source Interference Networks Elona Erez and Meir Feder Dept. of Electrical Engineering-Systems, Tel Aviv University, Tel Aviv, 69978, Israel, E-mail:{elona, meir}@eng.tau.ac.il
More informationQueue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling
1 Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling Saswati Sarkar and Koushik Kar Abstract In this paper, we consider queue-length stability in wireless
More informationK User Interference Channel with Backhaul
1 K User Interference Channel with Backhaul Cooperation: DoF vs. Backhaul Load Trade Off Borna Kananian,, Mohammad A. Maddah-Ali,, Babak H. Khalaj, Department of Electrical Engineering, Sharif University
More informationCommon Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel
Wang, ISIT 2011 p. 1/15 Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel Chih-Chun Wang, Jaemin Han Center of Wireless Systems and Applications (CWSA) School
More informationHalf-Duplex Gaussian Relay Networks with Interference Processing Relays
Half-Duplex Gaussian Relay Networks with Interference Processing Relays Bama Muthuramalingam Srikrishna Bhashyam Andrew Thangaraj Department of Electrical Engineering Indian Institute of Technology Madras
More informationHow to deal with uncertainties and dynamicity?
How to deal with uncertainties and dynamicity? http://graal.ens-lyon.fr/ lmarchal/scheduling/ 19 novembre 2012 1/ 37 Outline 1 Sensitivity and Robustness 2 Analyzing the sensitivity : the case of Backfilling
More informationEnergy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California
Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California http://www-rcf.usc.edu/~mjneely Part 1: A single wireless downlink (L links) L 2 1 S={Totally
More informationCommunication constraints and latency in Networked Control Systems
Communication constraints and latency in Networked Control Systems João P. Hespanha Center for Control Engineering and Computation University of California Santa Barbara In collaboration with Antonio Ortega
More informationCompetitive Management of Non-Preemptive Queues with Multiple Values
Competitive Management of Non-Preemptive Queues with Multiple Values Nir Andelman and Yishay Mansour School of Computer Science, Tel-Aviv University, Tel-Aviv, Israel Abstract. We consider the online problem
More informationTRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS
The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,
More informationNode-based Distributed Optimal Control of Wireless Networks
Node-based Distributed Optimal Control of Wireless Networks CISS March 2006 Edmund M. Yeh Department of Electrical Engineering Yale University Joint work with Yufang Xi Main Results Unified framework for
More informationContinuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks
Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer
More informationECE Information theory Final (Fall 2008)
ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1
More informationOptimal Sensing and Transmission in Energy Harvesting Sensor Networks
University of Arkansas, Fayetteville ScholarWorks@UARK Theses and Dissertations 2-206 Optimal Sensing and Transmission in Energy Harvesting Sensor Networks Xianwen Wu University of Arkansas, Fayetteville
More informationOn the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks
Technical Report Computer Networks Research Lab Department of Computer Science University of Toronto CNRL-08-002 August 29th, 2008 On the Throughput-Optimality of CSMA Policies in Multihop Wireless Networks
More informationMicroeconomic Algorithms for Flow Control in Virtual Circuit Networks (Subset in Infocom 1989)
Microeconomic Algorithms for Flow Control in Virtual Circuit Networks (Subset in Infocom 1989) September 13th, 1995 Donald Ferguson*,** Christos Nikolaou* Yechiam Yemini** *IBM T.J. Watson Research Center
More informationEnergy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications
Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications Ibrahim Fawaz 1,2, Philippe Ciblat 2, and Mireille Sarkiss 1 1 LIST, CEA, Communicating Systems Laboratory,
More informationDynamic spectrum access with learning for cognitive radio
1 Dynamic spectrum access with learning for cognitive radio Jayakrishnan Unnikrishnan and Venugopal V. Veeravalli Department of Electrical and Computer Engineering, and Coordinated Science Laboratory University
More informationDistributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks
Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks Marco Moretti, Andrea Abrardo Dipartimento di Ingegneria dell Informazione, University of Pisa, Italy
More informationWireless Internet Exercises
Wireless Internet Exercises Prof. Alessandro Redondi 2018-05-28 1 WLAN 1.1 Exercise 1 A Wi-Fi network has the following features: Physical layer transmission rate: 54 Mbps MAC layer header: 28 bytes MAC
More informationMulticast Packing for Coding across Multiple Unicasts
Multicast Packing for Coding across Multiple Unicasts Chun Meng INC, CUHK & EECS, UC Irvine cmeng1@uci.edu Hulya Seferoglu LIDS, MIT hseferog@mit.edu Athina Markopoulou EECS, UC Irvine athina@uci.edu Kenneth
More informationLearning Algorithms for Minimizing Queue Length Regret
Learning Algorithms for Minimizing Queue Length Regret Thomas Stahlbuhk Massachusetts Institute of Technology Cambridge, MA Brooke Shrader MIT Lincoln Laboratory Lexington, MA Eytan Modiano Massachusetts
More informationNetwork Optimization and Control
Foundations and Trends R in Networking Vol. 2, No. 3 (2007) 271 379 c 2008 S. Shakkottai and R. Srikant DOI: 10.1561/1300000007 Network Optimization and Control Srinivas Shakkottai 1 and R. Srikant 2 1
More informationFlow-level performance of wireless data networks
Flow-level performance of wireless data networks Aleksi Penttinen Department of Communications and Networking, TKK Helsinki University of Technology CLOWN seminar 28.8.08 1/31 Outline 1. Flow-level model
More informationOFDMA Downlink Resource Allocation using Limited Cross-Layer Feedback. Prof. Phil Schniter
OFDMA Downlink Resource Allocation using Limited Cross-Layer Feedback Prof. Phil Schniter T. H. E OHIO STATE UNIVERSITY Joint work with Mr. Rohit Aggarwal, Dr. Mohamad Assaad, Dr. C. Emre Koksal September
More informationImperfect Randomized Algorithms for the Optimal Control of Wireless Networks
Imperfect Randomized Algorithms for the Optimal Control of Wireless Networks Atilla ryilmaz lectrical and Computer ngineering Ohio State University Columbus, OH 430 mail: eryilmaz@ece.osu.edu Asuman Ozdaglar,
More informationABSTRACT CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS. Title of dissertation: Anthony A. Fanous, Doctor of Philosophy, 2013
ABSTRACT Title of dissertation: CROSS-LAYER ASPECTS OF COGNITIVE WIRELESS NETWORKS Anthony A. Fanous, Doctor of Philosophy, 2013 Dissertation directed by: Professor Anthony Ephremides Department of Electrical
More informationThroughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting
Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210
More informationOptimal matching in wireless sensor networks
Optimal matching in wireless sensor networks A. Roumy, D. Gesbert INRIA-IRISA, Rennes, France. Institute Eurecom, Sophia Antipolis, France. Abstract We investigate the design of a wireless sensor network
More informationdistributed approaches For Proportional and max-min fairness in random access ad-hoc networks
distributed approaches For Proportional and max-min fairness in random access ad-hoc networks Xin Wang, Koushik Kar Rensselaer Polytechnic Institute OUTline Introduction Motivation and System model Proportional
More informationA Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single Node Case. 1
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Single Node Case 1 Abhay K Parekh 2 3 and Robert G Gallager 4 Laboratory for Information and Decision Systems
More informationMorning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland
Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable
More informationMaximizing throughput in zero-buffer tandem lines with dedicated and flexible servers
Maximizing throughput in zero-buffer tandem lines with dedicated and flexible servers Mohammad H. Yarmand and Douglas G. Down Department of Computing and Software, McMaster University, Hamilton, ON, L8S
More informationRepeated Inter-Session Network Coding Games: Efficiency and Min-Max Bargaining Solution
Repeated Inter-Session Networ Coding Games: Efficiency and Min-Max Bargaining Solution Hamed Mohsenian-Rad, Member, IEEE, Jianwei Huang, Senior Member, IEEE, Vincent W.S. Wong, Senior Member, IEEE, and
More informationCapacity and Delay Tradeoffs for Ad-Hoc Mobile Networks
IEEE TRASACTIOS O IFORMATIO THEORY 1 Capacity and Delay Tradeoffs for Ad-Hoc Mobile etworks Michael J. eely University of Southern California mjneely@usc.edu http://www-rcf.usc.edu/ mjneely Eytan Modiano
More informationWireless Transmission with Energy Harvesting and Storage. Fatemeh Amirnavaei
Wireless Transmission with Energy Harvesting and Storage by Fatemeh Amirnavaei A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in The Faculty of Engineering
More informationCooperative HARQ with Poisson Interference and Opportunistic Routing
Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline
More informationQueue length analysis for multicast: Limits of performance and achievable queue length with random linear coding
Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding The MIT Faculty has made this article openly available Please share how this access benefits
More informationPower Allocation and Coverage for a Relay-Assisted Downlink with Voice Users
Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,
More informationDistributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks
Distributed Approaches for Proportional and Max-Min Fairness in Random Access Ad Hoc Networks Xin Wang, Koushik Kar Department of Electrical, Computer and Systems Engineering, Rensselaer Polytechnic Institute,
More informationAn Achievable Rate for the Multiple Level Relay Channel
An Achievable Rate for the Multiple Level Relay Channel Liang-Liang Xie and P. R. Kumar Department of Electrical and Computer Engineering, and Coordinated Science Laboratory University of Illinois, Urbana-Champaign
More informationTopics in Data Mining Fall Bruno Ribeiro
Network Utility Maximization Topics in Data Mining Fall 2015 Bruno Ribeiro 2015 Bruno Ribeiro Data Mining for Smar t Cities Need congestion control 2 Supply and Demand (A Dating Website [China]) Males
More informationInformation Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels
1 Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels Invited Paper Ali ParandehGheibi, Muriel Médard, Asuman Ozdaglar, and Atilla Eryilmaz arxiv:0810.167v1 cs.it
More informationMessage Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs
01 7th International ICST Conference on Communications and Networking in China (CHINACOM) Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs Jiajia Liu Tohoku University Sendai,
More informationAn Ins t Ins an t t an Primer
An Instant Primer Links from Course Web Page Network Coding: An Instant Primer Fragouli, Boudec, and Widmer. Network Coding an Introduction Koetter and Medard On Randomized Network Coding Ho, Medard, Shi,
More informationAlpha Fair Coded Caching
Alpha Fair Coded Caching Apostolos Destounis 1, Mari Kobayashi 2, Georgios Paschos 1, Asma Ghorbel 2 1 France Research Center, Huawei Technologies Co. Ltd., email: firstname.lastname@huawei.com 2 Centrale-Supélec,
More informationLow-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. X, NO. XX, XXXXXXX X Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks Longbi Lin, Xiaojun Lin, Member, IEEE, and Ness B. Shroff,
More informationA POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation
A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New
More informationOnline Packet Routing on Linear Arrays and Rings
Proc. 28th ICALP, LNCS 2076, pp. 773-784, 2001 Online Packet Routing on Linear Arrays and Rings Jessen T. Havill Department of Mathematics and Computer Science Denison University Granville, OH 43023 USA
More informationOptimal Utility-Lifetime Trade-off in Self-regulating Wireless Sensor Networks: A Distributed Approach
Optimal Utility-Lifetime Trade-off in Self-regulating Wireless Sensor Networks: A Distributed Approach Hithesh Nama, WINLAB, Rutgers University Dr. Narayan Mandayam, WINLAB, Rutgers University Joint work
More information16.36 Communication Systems Engineering
MIT OpenCourseWare http://ocw.mit.edu 16.36 Communication Systems Engineering Spring 2009 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. 16.36: Communication
More informationTechnion - Computer Science Department - Technical Report CS On Centralized Smooth Scheduling
On Centralized Smooth Scheduling Ami Litman January 25, 2005 Abstract Shiri Moran-Schein This paper studies evenly distributed sets of natural numbers and their applications to scheduling in a centralized
More informationRandom Linear Intersession Network Coding With Selective Cancelling
2009 IEEE Information Theory Workshop Random Linear Intersession Network Coding With Selective Cancelling Chih-Chun Wang Center of Wireless Systems and Applications (CWSA) School of ECE, Purdue University
More informationTowards Achieving Full Secrecy Rate in Wireless Networks: A Control Theoretic Approach
owards Achieving Full Secrecy Rate in Wireless Networks: A Control heoretic Approach Zhoujia Mao Department of ECE he Ohio State University maoz@ece.osu.edu Can Emre Koksal Department of ECE he Ohio State
More informationDelay QoS Provisioning and Optimal Resource Allocation for Wireless Networks
Syracuse University SURFACE Dissertations - ALL SURFACE June 2017 Delay QoS Provisioning and Optimal Resource Allocation for Wireless Networks Yi Li Syracuse University Follow this and additional works
More informationLinear Codes, Target Function Classes, and Network Computing Capacity
Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, and Kenneth Zeger IEEE Transactions on Information Theory Submitted:
More informationTowards Achieving Full Secrecy Rate and Low Delays in Wireless Networks
owards Achieving Full Secrecy Rate and Low Delays in Wireless Networks Zhoujia Mao Department of ECE he Ohio State University maoz@ece.osu.edu Can Emre Koksal Department of ECE he Ohio State University
More informationUNIVERSITY OF YORK. MSc Examinations 2004 MATHEMATICS Networks. Time Allowed: 3 hours.
UNIVERSITY OF YORK MSc Examinations 2004 MATHEMATICS Networks Time Allowed: 3 hours. Answer 4 questions. Standard calculators will be provided but should be unnecessary. 1 Turn over 2 continued on next
More informationSecrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View
Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View P. Mohapatra 9 th March 2013 Outline Motivation Problem statement Achievable scheme 1 Weak interference
More informationOptimization and Stability of TCP/IP with Delay-Sensitive Utility Functions
Optimization and Stability of TCP/IP with Delay-Sensitive Utility Functions Thesis by John Pongsajapan In Partial Fulfillment of the Requirements for the Degree of Master of Science California Institute
More information12. LOCAL SEARCH. gradient descent Metropolis algorithm Hopfield neural networks maximum cut Nash equilibria
12. LOCAL SEARCH gradient descent Metropolis algorithm Hopfield neural networks maximum cut Nash equilibria Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley h ttp://www.cs.princeton.edu/~wayne/kleinberg-tardos
More informationCommunicating the sum of sources in a 3-sources/3-terminals network
Communicating the sum of sources in a 3-sources/3-terminals network Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel Email: mikel@openu.ac.il Aditya Ramamoorthy
More informationWIRELESS systems often operate in dynamic environments
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 61, NO. 9, NOVEMBER 2012 3931 Structure-Aware Stochastic Control for Transmission Scheduling Fangwen Fu and Mihaela van der Schaar, Fellow, IEEE Abstract
More informationAn Algebraic Approach to Network Coding
An Algebraic Approach to July 30 31, 2009 Outline 1 2 a 3 Linear 4 Digital Communication Digital communication networks are integral parts of our lives these days; so, we want to know how to most effectively
More informationAlgorithms for Dynamic Spectrum Access with Learning for Cognitive Radio
Algorithms for Dynamic Spectrum Access with Learning for Cognitive Radio Jayakrishnan Unnikrishnan, Student Member, IEEE, and Venugopal V. Veeravalli, Fellow, IEEE 1 arxiv:0807.2677v2 [cs.ni] 21 Nov 2008
More informationDirichlet s Principle on Multiclass Multihop Wireless Networks: Minimum Cost Routing Subject to Stability
Dirichlet s Principle on Multiclass Multihop Wireless Networks: Minimum Cost Routing Subject to Stability Reza Banirazi, Edmond Jonckheere, Bhaskar Krishnamachari Department of Electrical Engineering,
More informationMulticast Packing for Coding across Multiple Unicasts
Multicast Packing for Coding across Multiple Unicasts Chun Meng INC, CUHK & EECS, UC Irvine cmeng@uci.edu Athina Markopoulou EECS, UC Irvine athina@uci.edu Hulya Seferoglu LIDS, MIT hseferog@mit.edu Kenneth
More informationThis article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and
This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and education use, including for instruction at the authors institution
More informationOptimal Secondary Spectrum Auctions for Markets with Communication Constraints
Optimal Secondary Spectrum Auctions for Markets with Communication Constraints Deepan Palguna, David J. Love, and Ilya Pollak Abstract Auctions have been proposed as a way to provide economic incentives
More informationBeyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions
Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions Chih-Chun Wang Center for Wireless Systems and Applications (CWSA) School of
More informationDelay-Based Back-Pressure Scheduling in. Multihop Wireless Networks
Delay-Based Back-Pressure Scheduling in Multihop Wireless Networks Bo Ji, Student Member, IEEE, Changhee Joo, Member, IEEE, and Ness B. Shroff, Fellow, IEEE arxiv:0.5674v3 [cs.ni] 7 Nov 202 Abstract Scheduling
More informationOn the stability of flow-aware CSMA
On the stability of flow-aware CSMA Thomas Bonald, Mathieu Feuillet To cite this version: Thomas Bonald, Mathieu Feuillet. On the stability of flow-aware CSMA. Performance Evaluation, Elsevier, 010, .
More informationUtility Maximizing Routing to Data Centers
0-0 Utility Maximizing Routing to Data Centers M. Sarwat, J. Shin and S. Kapoor (Presented by J. Shin) Sep 26, 2011 Sep 26, 2011 1 Outline 1. Problem Definition - Data Center Allocation 2. How to construct
More informationCross-layer Optimization for Wireless
Cross-layer Optimization for Wireless 1 Networks with Deterministic Channel Models Ziyu Shao, Minghua Chen, A. Salman Avestimehr +, and Shuo-Yen Robert Li Department of Information Engineering The Chinese
More informationA Mechanism for Pricing Service Guarantees
A Mechanism for Pricing Service Guarantees Bruce Hajek Department of Electrical and Computer Engineering and the Coordinated Science Laboratory University of Illinois at Urbana-Champaign Sichao Yang Qualcomm
More informationUtility-Maximizing Scheduling for Stochastic Processing Networks
Utility-Maximizing Scheduling for Stochastic Processing Networks Libin Jiang and Jean Walrand EECS Department, University of California at Berkeley {ljiang,wlr}@eecs.berkeley.edu Abstract Stochastic Processing
More informationOnline Path Computation & Function Placement in SDNs
Online Path Computation & Function Placement in SDNs Guy Even Tel Aviv University Moti Medina MPI for Informatics Boaz Patt-Shamir Tel Aviv University Today s Focus: Online Virtual Circuit Routing Network:
More informationOptimal Association of Stations and APs in an IEEE WLAN
Optimal Association of Stations and APs in an IEEE 802. WLAN Anurag Kumar and Vinod Kumar Abstract We propose a maximum utility based formulation for the problem of optimal association of wireless stations
More informationBacklog Optimal Downlink Scheduling in Energy Harvesting Base Station in a Cellular Network
MTech Dissertation Backlog Optimal Downlink Scheduling in Energy Harvesting Base Station in a Cellular Network Submitted in partial fulfillment of the requirements for the degree of Master of Technology
More informationStabilizing Hybrid Data Traffics in Cyber Physical Systems with Case Study on Smart Grid
1 Stabilizing Hybrid Data Traffics in Cyber Physical Systems with Case Study on Smart Grid Husheng Li, Zhu Han and Ju Bin Song Abstract In many cyber physical systems such as smart grids, communications
More informationAn Optimal Index Policy for the Multi-Armed Bandit Problem with Re-Initializing Bandits
An Optimal Index Policy for the Multi-Armed Bandit Problem with Re-Initializing Bandits Peter Jacko YEQT III November 20, 2009 Basque Center for Applied Mathematics (BCAM), Bilbao, Spain Example: Congestion
More informationDistributed Optimization over Networks Gossip-Based Algorithms
Distributed Optimization over Networks Gossip-Based Algorithms Angelia Nedić angelia@illinois.edu ISE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Outline Random
More informationWeakly Secure Data Exchange with Generalized Reed Solomon Codes
Weakly Secure Data Exchange with Generalized Reed Solomon Codes Muxi Yan, Alex Sprintson, and Igor Zelenko Department of Electrical and Computer Engineering, Texas A&M University Department of Mathematics,
More informationFair Scheduling in Input-Queued Switches under Inadmissible Traffic
Fair Scheduling in Input-Queued Switches under Inadmissible Traffic Neha Kumar, Rong Pan, Devavrat Shah Departments of EE & CS Stanford University {nehak, rong, devavrat@stanford.edu Abstract In recent
More informationOnline Scheduling for Energy Harvesting Broadcast Channels with Finite Battery
Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Abdulrahman Baknina Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park,
More informationFundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Edge Nodes
Fundamental Limits of Cloud and Cache-Aided Interference Management with Multi-Antenna Edge Nodes Jingjing Zhang and Osvaldo Simeone arxiv:72.04266v4 [cs.it] 2 Mar 208 Abstract In fog-aided cellular systems,
More informationStability Analysis in a Cognitive Radio System with Cooperative Beamforming
Stability Analysis in a Cognitive Radio System with Cooperative Beamforming Mohammed Karmoose 1 Ahmed Sultan 1 Moustafa Youseff 2 1 Electrical Engineering Dept, Alexandria University 2 E-JUST Agenda 1
More informationEnergy Harvesting Multiple Access Channel with Peak Temperature Constraints
Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,
More informationMarkov decision processes with threshold-based piecewise-linear optimal policies
1/31 Markov decision processes with threshold-based piecewise-linear optimal policies T. Erseghe, A. Zanella, C. Codemo Dept. of Information Engineering, University of Padova, Italy Padova, June 2, 213
More informationAnalyzing Large Communication Networks
Analyzing Large Communication Networks Shirin Jalali joint work with Michelle Effros and Tracey Ho Dec. 2015 1 The gap Fundamental questions: i. What is the best achievable performance? ii. How to communicate
More informationMaximum-Life Routing Schedule
Maximum-Life Routing Schedule Peng-Jun Wan wan@cs.iit.edu Peng-Jun Wan (wan@cs.iit.edu) Maximum-Life Routing Schedule 1 / 42 Outline Problem Description Min-Cost Routing Ellipsoid Algorithm Price-Directive
More informationThroughput-Optimal Multi-hop Broadcast Algorithms
Throughput-Optimal Multi-hop Broadcast Algorithms Abhishe Sinha Laboratory for Information and Decision Systems MIT sinhaa@mit.edu Georgios Paschos Eytan Modiano Mathematical and Algorithmic Laboratory
More informationChannel Allocation Using Pricing in Satellite Networks
Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract
More informationOptimal power-delay trade-offs in fading channels: small delay asymptotics
Optimal power-delay trade-offs in fading channels: small delay asymptotics Randall A. Berry Dept. of EECS, Northwestern University 45 Sheridan Rd., Evanston IL 6008 Email: rberry@ece.northwestern.edu Abstract
More information