Shared-State Sampling

Size: px
Start display at page:

Download "Shared-State Sampling"

Transcription

1 Share-State Samling Freeric Rasall, Sebastia Sallent an Jose Yufera Det. of Telematics, Technical University of Catalonia (UPC) ABSTRACT We resent an algorithm, Share-State Samling (S 3 ), for the roblem of etecting large flows in high-see networks. While evise with ifferent rinciles in min, S 3 turns out to be a generaliation of two existing algorithms tackling the same roblem: Samle-an-Hol an Multistage Filters. S 3 is foun to outerform its reecessors, with the avantage of smoothly aating to the memory technology available, to the extent of allowing a artial imlementation in DRAM. S 3 exhibits mil traeoffs between the ifferent metrics of interest, which greatly benefits the scalability of the aroach. The roblem of etecting frequent items in streams aears in other areas. We also comare our algorithm with roosals aearing in the context of atabases an regare suerior to the aforementione. Our analysis an exerimental results show that, among those evaluate, S 3 is the most attractive an scalable solution to the roblem in the context of high-see network measurements. Categories an Subject Descritors: C.2.3 [Comuter- Communication Networks]: Network Oerations traffic measurement, ientifying large flows General Terms: Algorithms, Measurement Keywors: Per-flow measurements, scalability. INTRODUCTION Network measurements are essential for a number of network management tasks like traffic engineering [5], the etection of hot-sots or DoS attacks [] or accounting. Within traffic measurements, the er-flow aroach rovies a reasonable traeoff between the amount of information acquire an its usefulness [6]. Unfortunately, the major rawback of the er-flow aroach is its lack of scalability: link sees imrove % er year, while the see of memory evices imroves at a much slower ace (7 9%) [2]. The only memory technology that can kee u with the increasing This work has been fune by grant CICYT TSI from the Sanish Ministery of Science an Eucation. Permission to make igital or har coies of all or art of this work for ersonal or classroom use is grante without fee rovie that coies are not mae or istribute for rofit or commercial avantage an that coies bear this notice an the full citation on the first age. To coy otherwise, to reublish, to ost on servers or to reistribute to lists, requires rior secific ermission an/or a fee. IMC 6, October 25 27, 26, Rio e Janeiro, Brail. Coyright 26 ACM /6/...$5.. number of flows is DRAM. However, DRAM evices are alreay too slow for existing high-see line rates. SRAM is the only memory technology allowing for er-acket uates at current line sees. Unfortunately, SRAM evices are exensive, ower-hungry an have limite caacity. This, together with the observation in several stuies that a large share of the traffic is ue to a small fraction of the total number of flows [4], have motivate the search for solutions concentrating on the measurement of large flows. Focusing on such flows not only suffices for many alications but may also allow for new ones: e.g. threshol accounting or scalable queue management [2]. Pioneering work by Estan an Varghese [2] showe that it was ossible to ientify or etect such heavy-hitters using slightly more memory than that require in case such flows were known beforehan. While subsequent research has tackle the roblem of measuring flows simultaneously consiering ifferent flow efinitions [3], the roblem for reefine flow efinitions is still oen from a research oint of view an of great ractical interest. This aer contributes with a scalable algorithm, Share-State Samling(S 3 ), for the etection of large flows in high-see networks. The aer is structure as follows. Section 2 summaries revious work focusing on those our work shall be comare to. In section 3, we resent our algorithm an we analye it in section 4. Section 5 iscusses how S 3 coul be imlemente in high-see routers. Besies being of interest er se, the iscussion shows the versatility of S 3 an hels unerstaning its scalability, an issue that we finally aress in section 6. Section 7 resents some results obtaine with software imlementations of the algorithms an real traffic traces. While the focus is on the erformance of S 3, we comare to other roosals in the literature. An exhaustive evaluation of all algorithms is not ossible for sace reasons. Nevertheless, the exeriments resente suffice for a concetual comarison ientifying the weaknesses an strengths of the algorithms. Section 8 conclues the aer. 2. RELATED WORK The roblem of etecting frequent or hot items in streams has attracte consierable attention in the ast, secially in the fiel of atabase management an ata mining. In this context, Toivonen [7] rooses algorithms that use uniform ranom samling for the iscovery of association rules, which require a single ass as comare to rior work. Manku an Motwani [7] roose two algorithms, Sticky Samling (S 2 ) an Lossy Counting (LC), for comuting frequency counts exceeing user-secifie threshols. Cormoe

2 an Muthukrishnan [] roose algorithms able to ientify hot items in atabases in a single ass while allowing for eletions. To the best of our knowlege, Samle-an- Hol () an Multistage Filters( ) [2], while showing some similarities with revious work in the context of atabases [6], were the first algorithms roose in the context of network measurements. [] [8] [9] aress relate roblems, but their focus is not on etecting large flows. In what follows, we summarie the ieas behin the roosals that we comare with, while reviewing the roblem at han. an aim at ientifying, within the total traffic resent in some measurement interval, large flows, efine as those with sie above some threshol (such as T bytes) or above some fraction of the total (e.g. = %). Flows are unerstoo as sets of ackets with common roerties. The secific roerties consiere, the so-calle flow efinition or attern, is alication-secific 2. Given a flow efinition, each flow is uniquely ientifie by the secific values the roerties within the efinition take, what is calle the flow ientifier (FID) or key. The iea in an is the following: there can be at most / large flows in a measurement interval. Thus, if these can be ientifie, small but fast memories can be use to iniviually track such flows by keeing a eicate entry in the so-calle flow memory: not only small but fast memories suffice but also, accuracy is imrove since bytes arriving after etection are exactly counte. Further, the amount of measurement ata to reort is rastically reuce. This is a araigm shift comare to revious techniques (e.g. Samle NetFlow), that use large (but slow) DRAM memories an alleviate the ga between link an memory banwith through samling. In both algorithms, flows are challenge to instantiate entries in the flow memory accoring to their sie. oes this by means of samling an is memoryless an ranom: flows must be samle once to get etecte. On the contrary, is eterministic an stateful: flows must increase some counters beyon some threshol before entering the flow memory. S 2 an LC in [7] resemble an in that, once item tyes (i.e. flows) are ientifie, eicate entries are suorte, which get uate with subsequent occurrences of such tyes. LC slits the stream into fixe-length buckets where items either uate or instantiate entries. In aition, entries for infrequent items are rune at bucket bounaries. S 2 runes entries at the en of variable-length buckets an only samle items instantiate entries, where the samling rate varies over the length of the stream. LC an S 2 relax the challenge ut on flows to enter the flow memory so as to imrove accuracy an comensate the increase number of enries occuie by means of runing. Hence, the challenge ut on flows is not only entering but also remaining at the synosis structure. While both algorithms have been suggeste to outerform an, no evaluation with real traffic traces has, to our knowlege, ever been conucte. An ieal algorithm shoul reort, at the en of a measurement interval, the FID an sie of only those flows above the threshol. Less ieal algorithms may fail in three ways: i) missing to reort some large flows (false negatives) ii) Measurement intervals can san ifferent timescales: for instance, for traffic engineering these may be in the orer of minutes to hours whereas for queue management these coul be in the orer of secons. 2 E.g., for traffic matrices estimation, flows may be efine as ackets with same source an estination refixes, whereas for ientifying TCP DoS attacks, the focus may be on TCP ackets with some flags set an istinguishe by aresses. reorting flows below the threshol (false ositives) an iii) roviing inaccurate estimates for large flows. Consequently, when assessing the erformance of this tye of algorithms the focus will be on: first, how high the etection robability for large flows is; secon, how accurately can their sies be estimate an, thir, the overall amount of memory require. Due to the resence of false ositives, more than / entries may have to be suorte in the flow memory: false ositives may revent large flows from being measure (in site of them being etecte), if these exhaust the entries available. The amount of memory require by algorithms, in excess to the minimum, is relate to their ability to avoi false ositives. In an, this eens on how much can algorithms revent small flows from entering the flow memory. Although S 2 an LC eliminate false ositives when querie, their memory requirements are etermine by the number of entries that may have active at any oint, which eens on how goo these algorithms are at exelling small flows from the flow memory. Finally, we shall also be concerne with algorithm s er-acket rocessing times, which ultimately een on the number of memory accesses require: too many accesses may reclue the imlementation of the algorithms or limit their scalability even if the fastest memories are use. 3. SHARED-STATE SAMPLING The algorithm that we shall now resent, Share-State Samling (S 3 ), is base on the following rincile: if the number of flows in a link is large an most of the traffic is ue to a small fraction of these flows then, most of the flows must be small. Therefore, making it harer for these many small flows to get cature may be a reasonable strategy to avoi false ositives. The major rawback of is the strong traeoff it exhibits between accuracy an sace requirements: to achieve reasonable accuracy, must oversamle, which causes the etection of small flows thereby increasing the memory requirements. This is so since oversamling by a factor O reuces the threshol by a factor /O. In this regar, we shoul carefully istinguish between the threshol of the roblem efinition, T, that classifies flows into small or large an the threshol of the algorithm, which is the sie of a flow beyon which the etection robability is higher than some rescribe value. In, flows of sie / bytes (with the byte samling robability) are etecte with robability.63. S 3 aims at imroving the etection curve of by making it closer to that of an ieal algorithm, which shoul be Pet ieal (v) = u(v T ), with u(v) the iscrete ste function, T the threshol an v the flow sie. The key issue is how to achieve a ecrease in the etection robability for small flows, without affecting the etection robability for large flows. S 3 works as follows. For each arriving acket, it erforms a looku in the flow memory to check whether that flow has alreay been cature. In that case, the corresoning eicate byte counter is uate. That is, as in an, ackets of flows alreay cature byass the challenge or filter. Packets of flows not (yet) etecte are samle with some robability. If a flow is samle times then, an entry is create in the flow memory. In orer to count the number of times that each flow has been samle, a set of counters are suorte. When a acket gets samle, these counters are examine: if these hol a value of, this makes

3 samles altogether an an entry for this flow is create in the flow memory; otherwise, the counters get incremente to remember the number of samles taken so far. That is, our algorithm counts the number of times flows get samle an entries in the flow memory shoul only be create for flows samle times. We refer to as the samle threshol. The way in which samles are obtaine an counte is exlaine in what follows, together with the suorting analysis. 4. ANALYSIS OF OUR ALGORITHM 4. The "single-flow" case Let us start analying what haens in case there were only one flow. Suose that the algorithm samle every byte with robability an that samles from a flow incremente some counter until samles were taken. Samling each byte with robability, the first samles will increment the counter an the th samle (if there) will get to the flow memory. Clearly, the flow will not be etecte if fewer than samles from it are taken. Hence, the etection robability for a flow of sie v bytes, P et(v), is the robability that we take at least samles ha we samle all of its bytes (the suerinex shall later become clear). Since each byte is ineenently samle, the number of samles that we woul take, N v, is a binomial r.v. an we can write! vx Pet(v) v = P {N v } = j ( ) v j () j j= Alternatively: the number of bytes that ass before we get the first samle is a geometric() r.v. Thus, the number of bytes that go before the th samle is taken, S, is the sum of i.i. geometric r.v., which has a negative binomial istribution. Therefore, the robability that a flow of sie v gets etecte is the robability that the number of bytes require to take samles be no larger than v. Think of bytes as attemts to get a samle: a flow is etecte if fewer attemts than the available, v, suffice to get samles. The robability that it takes exactly j attemts until the th samle is obtaine is P {S = j} = `j ( ) j, where j. Thus, if v <, the etection robability for a flow is an P et(v) = P {S v} = vx j=! j ( ) j (2) if v. Let us see what the role of the samle threshol is. The first observation is that, for =, only one samle is neee to cature a flow. Further, no counters are require (no revious samle nees to be remebere ) an Pet(v) in () an (2) become ( ) v, which is the etection robability with since, then, both algorithms are ientical. Clearly, the etection robability for a flow ecreases when we increase for the same, since more samles from the flow are require. This is shown in fig. (bottom-right) which lots Pet(v) for ifferent values of. The key observation is that, as increases, Pet(v) has an inflection oint as comare to the curve of, which oes not have it regarless of. Let us see what haens if is chosen eening on. If each byte is samle with robability an samles from a flow are require, the flow will be etecte, on the average, after bytes, which is times the average of a geometric() r.v. Let us see what haens (v) (logscale) P et P et (v) e-4 e-6 e-8 e- e-2 e-4 e-6 e-8 e-2 = = v (flow sie).4.2 = =2 =3 =5 = =5 = =5 = = v (flow sie) ineenent of, = = v (flow sie) Figure : Pet (v) for several values of when = ; / = 5. Bottom-right: Pet (v) for = an =... if we set the samling robability so that, regarless of, it takes, on the average, a constant amount of bytes, /, until a flow gets cature. It is straightforwar to see that has to be chosen as = (3) Choosing as in (3), the suose inflection oint will be locate at v = =, which oes not een on either. Fig. (to) shows this effect lotting Pet(v) when is chosen accoring to (3), for some values of an = 5. As can be observe, varies the steeness of Pet(v). The following terms will be use throughout the remainer of the aer. We call the location of the inflection oint, the cutoff sie, =. The etection robability for a flow of Vcut bytes is aroximately.63 for small values of. In these terms, (3) can be written as =. We call granularity,, the targete caability of etecting flows no smaller than a fraction of the total traffic in a measurement interval, C. That is, = T/C. By selectivity we mean the ower of iscriminating (etecting) flows accoring to their sie. Secifically, we mean the ability of algorithms to avoi etecting small flows while not comromising the etection of large flows. Now, the reason for Pet(v) exhibiting such behavior is the following. For a flow of sie v, E{N v} = v since N v is binomial(v,). It is well known that the most likely values of a binomial r.v. are concentrate aroun its mean. If v < an = / then, the average number of samles taken ( v ) will always be smaller than. Thus, the robability of the most likely values of N v shall not be inclue in P {N v }, thereby yieling a low etection robability. Conversely, if v >, v = ( v ) shall always excee thereby raising Pet(v, ), which will be high. As of this reliminary analysis, we will set equal to the threshol T an use to govern the selectivity of S 3. To see the gain in selectivity in S 3 comare to, fig. (bottom-left) lots Pet(v) as before, but in logarithmic scale. As can be seen, the etection robability for flows above = 5 is very high in S 3, while being several orers of magnitue smaller than that with for flows below ; alreay for small values of. Further, as increases, Pet(v) seems to aroximate the etection curve of an ieal algorithm. Finally, note that corresons to the

4 average number of samles that woul be taken from a flow of sie. 4.2 The inflection oint, the ieal algorithm We shall now justify why is an inflection oint. Secifically, the following iscussion shows that, if = /, selectivity in S 3 imroves as we increase, in that the etection robability for a flow increases if v >, ecreases if v < an remains aroximately constant if v =. Let N v, be the number of bytes samle from a flow with v bytes when each is samle with robability =. The etection robability for a flow is P {N v, }. Note that, increasing, the istribution of N v, changes. As binomial(v, ), N v, is the sum of v i.i. r.v., with mean E{N v, } = v an variance σn 2 v, = v( ). The etection robability can be written as P {N v, < }, which is equivalent to ( Nv, E{N v, } P < E{N ) v,} (4) σ Nv, σ Nv, By virtue of the central limit theorem, Z v, = (N v, E{N v, })/σ Nv, is, for large v, aroximately a stanar normal r.v., Z an (4) aroximates Φ(( E{N v, })/σ Nv, ) with Φ(x) = P {Z < x}. Letting = in the exectation an variance of N v,, Pet(v) can be aroximate by s Vcut v! Φ (5) v The square root in (5) monotonically increases in. If v <, the term in arentheses is ositive. Hence, increasing, the argument of Φ(x) increases. Since Φ(x) monotonically increases with x, Φ(x) P et (v, ) ecreases. Conversely, if v >, the argument of Φ(x) is negative an increasing in absolute value with, meaning that Φ(x) will increase in. When v =, the argument in Φ(x) is, an the etection robability slightly varies aroun.5. Lemma. In the single-flow case, S 3 aroximates an ieal algorithm as aroaches =. In other wors, lim P et(v) = u(v ) Proof. As, we ten to require samles from flows before etecting them. However, if = /, we also ten to samle every byte. Thus, when =, every byte is samle an therefore accounte: if v <, the number of samles never reaches the samle threshol (no etection); if v the threshol is always reache. 4.3 The effects of limite memory So far we have stuie the etection robability in S 3 for the case with only one flow, P et(v). In reality, we have stuie the etection robability for any number of flows ha the algorithm sufficient memory to exactly count the number of samles taken from every flow. This is so since, in that case, the etection robability for a flow eens only on its sie an on given that the samling rocess is memoryless an bytes get ineenently samle. We call this, the unlimite memory case (hence, the reason for the suerinex ). Unfortunately, the case will be that the number of flows is larger than the number of counters that can be affore. Thus, some counters will have to count the number of samles taken from several flows. This may lea to flows below the threshol being etecte: since counters are raise by other flows, the algorithm may think that a flow has been samle more times than it really were. We call this effect, interference. For large flows the imact shall be small since P et(v) may alreay be close to unity. The roblem may be for small flows, since the assumtion is that there are many such flows. In what follows we stuy what haens when counters have to be share among flows (hence, the name of our algorithm). 4.4 Keeing track of samles The way samles are counte may be critical for S 3 to erform as in the unlimite memory case. Thus, we investigate several aroaches. It turns out that suorting several stages of counters, where counters get assigne to flows by means of comuting ineenent hash functions on acket FIDs (as in ), is a goo strategy. For sace reasons, we o not rovie the full iscussion an the reaer is referre to [5]. Thus, the remainer of the aer focuses on the erformance of our algorithm when counters are arrange in m arallel stages: each samle byte will increment by a counter inexe by the result of comuting a hash function on the acket FID, at each of the stages until a samle fins all its stage counters at, in which case an entry shall be create for that flow. This comletes the efinition of the algorithm an the analysis motivating it. The next section stuies how the etection robability is when samles are counte using m stages of b counters. 4.5 P et (v) arranging counters in stages A flow must be samle at least once to get etecte. If a flow woul have been samle more than times (which can only haen if v > ), interference woul not hel since it woul be etecte anyway. If a flow woul have been samle < k < times, it woul be etecte rovie that all counters where it hashe to were, at least, k, even if v <. Consequently, if N v is the number of times a flow woul be samle, we have that: 8 < P et (v N v = k) = : k = k =,... v P {all k} k =... The etection robability for a flow of sie v is maximum if it is the last one to arrive an all other bytes, C v, enter the samler. Let S be the number of samles taken out of these C v bytes. If S = r, the number of counters at k is, at most, r. Thus, the robability that a flow k samle k times hashes to one of these counters when S = r is boune above by r r. Since the hash k b ( k)b functions are assume ineenent an the same samle bytes may increment a counter at each stage, the etection robability for a flow samle k times is boune above by ` r m when exactly S = r samles from the rest of ( k)b the traffic are taken. Thus, in general we have that: (6) C v X r mp P {all k} {S = r} (7) ( k)b r= k where S is binomial(c v, ). As such, for large C, S will be very close to (C v) < C = / with very high robability, by virtue of the law of large numbers. Thus, we can aroximate P {all k} P {all k an (7) as P {all k} min ( k)b S /} m,. Note that this suggests taking b > / for this robability to be

5 below. Consiering this aroximation, (6) an unconitioning from N v, the etection robability for a flow with v bytes is boune above by P et (v) P et(v) + (b) m µx k= m P {n = k} (8) k where µ = min(, v). That is, by the etection robability in case of unlimite memory, Pet(v), lus a term, P et (v,,, C, b, m) reresenting the increase in the etection robability cause by other traffic incrementing our flow s counters. Note that, unlike in the unlimite memory case, flows smaller than may get etecte if samle. The observation is that selectivity may no longer een solely on : it shall also een on the egree of interference between flows, which eens on the amount of memory suorte. Note the following traeoff: on one han, increasing the samle threshol, the term Pet(v) iminishes for flows below, thereby imroving the selectivity. On the other, the byte samling robability also increases, which translates into more samles from other flows increasing stage counters ( P et ), thereby otentially increasing the etection robability for small flows. This suggests the existence of an otimum value for. In aition, for P et (v) to be close to Pet(v), the term /(b) m shoul be small. In articular, note that if b the rightmost term in (8) vanishes. Increasing m, the same factor also vanishes if b > /. Let us now see the role of m an b. Let S be the number of samles taken from the rest of flows an ɛ i, i =..m the amount by which the counters (one at each of m stages) where our flow hashes to get incremente by other flows. We omit, for clarity, the subinex but recall that the istribution of the above een on. The etection robability for our flow is maximum if it is the last one to arrive an the rest of traffic enters the samler, in which case S is binomial(c v, ). The robability that a flow gets etecte is no larger than the robability that, at all stages, ɛ i + N v. Consiering that, for any k, E{ɛ i S = k} = k E{S}, we have that E{ɛi} = = b b (C v). Since N b v an S are ineenent, so are N v an ɛ i, i =..m. Hence, efining Z i = Nv+ɛ i E{N v+ɛ i } σ Nv+ɛi, the etection robability for a flow arriving last can be written as P {Z i v/vcut (C v)/(vcutb), i =..m}. Following (σ Nv 2 +σ2 ɛ ) /2 i the same line of reasoning as in section 4.2, it can be roven that the inflection oint in the etection curve at the en of the measurement interval is at V infl ( ), regarless of m. This suggests the nee to suort a number b of counters er stage at least several times / for the etection curve to be selective throughout the measurement interval. The rouct b can be written as C. If we interret C = as the minimum strength of a large flow C/b an C/b as the strength of the interference, b can be unerstoo as the signal-to-interference ratio. Fig. 2 lots (8) for ifferent stage sies when 2 stages are use. Note how, even for the worst-case etection curve given by (8), V infl well aroximates the location of the inflection oint. This is shown in fig. 2, where vertical lines are lotte at V infl for each value of b, whose location lies close to the value of v where the convexity of P et (v) changes. Note how, for b / =, the inflection oint isaears, whereas, for b /, V infl. While m oes not affect the location of the inflection oint, it shall imact on the shae of the etection curve. P et (v) (logscale) P et (v) v. b=2 unlimite memory. b=. b=5 b=2 e-4 b=3 e-5 b=5 b=7 e-6 b=x 3 e-7 unlimite memory b=3x 3 b=5x 3 e-8 b=x 4 e-9 b=5x v Figure 2: Worst-case etection robability (8) when = 5, = 5 ( = %) an m = 2, for ifferent stage sies. Secifically, the etection robability for flows much smaller than the threshol exonentially ecreases with m. This suggests that, once the number of counters er stage excees several times /, it is much more effective to a stages than to increase the sie of the existing ones. Fig. 3 shows the worst-case etection curve for a fixe stage sie of counters, when ifferent number of stages are use. Note that using m = 2 stages with counters is much more effective than using 2 stages with b = 4 counters, for the same amount of memory. The etection robability for a flow with 2 3 bytes is 7 in the first case an 4 in the secon. Finally, note how, for a large number of stages, P et (v) Pet(v + Vcut ). That b is, flows at the en of the measurement interval aear as V infl = /b = C/b bytes larger. P et (v) (logscale) P et (v) v b b unlimite memory e-5 unlimite m= memory m=2 m=3 e- m=4 m=5 m= m=5 e-5 m=2 m=3 m=5 e v Figure 3: Effect of the number of stages, m, in (8) for the same setu when stages are of b = counters. 4.6 On the number of cature flows In S 3, flows must be samle at least once to get etecte. Therefore, an uer boun for the etection robability for a flow of v bytes is the robability that it gets samle at least once, i.e. P et (v) ( ) v, which is the etection robability with for an oversamling factor an threshol. A first consequence of this observation is the following lemma, whose roof (that can be foun in [5]) we omit for sace reasons.

6 Lemma 2. For the same byte samling robability, S 3 etects, on the average, fewer flows than. The next theorem (also roven in [5]) bouns above the execte number of etecte flows in S 3 when the number of counters suorte at each stage is large enough. While tighter bouns for secific flow sie istributions may be foun, our boun is ineenent of the flow sie istribution. Theorem. With m stages of b counters each, if b > ( )/m, > then, the execte number of flows etecte by S 3 in a measurement interval is boune above by ` +, (+m)((b) m ) regarless of the flow sie istribution, acket sie istribution, number of flows an amount of total traffic in a measurement interval. Recall that, for a granularity, there can be at most / large flows. Hence, if no assumtion is to be mae about the flow sie istribution, the flow memory has to be at least / entries. Thus, the term ` + (+m)((b) m ) can be unerstoo as the factor by which we nee to inflate the flow memory beyon the minimum so that, on the average, all cature flows fin an entry available. The boun in theorem shows that, regarless of the traffic mix (e.g. number of flows), the flow memory oes not nee to be overimensione if the amount of memory suorte at the stages is sufficiently large. In this regar, if b is several times / then, (b) m (b) m, an the excess memory require ecreases exonentially in m. 4.7 S 3 relate to an While the iscussion so far has focuse on [, ], the comlete analysis coul have been formulate in terms of [/, ] since, in S 3, =. When =, S 3 behaves as with O = an T =. As aroaches, tens to unity an then every incoming byte for an unetecte flow increases stage counters until one fins all stages at =. Therefore, if samle counters are arrange in arallel stages, S 3 becomes when the samling robability becomes. Hence, an can be unerstoo as secial instances of S 3 when or take their extreme values. At one ege, this gives a ranom memoryless algorithm,. At the other, a eterministic memoryful one,. In the mile, S 3 shall iffer from in the following. In, counters may have to hol values as large as since the ecision on creating entries is taken eening on whether counters reach such value. Thus, requires log 2() bits er counter. In S 3, counters have to hol values of, at most, [2,..], thereby requiring log 2() = log 2() bits er counter. Thus, for the same amount of memory, S 3 can suort more counters than. This memory gain shall be aroximate by G m = log 2()/log 2(). Define as such, G m monotonically ecreases for [2,..]. For = (), no counters are neee an G m =. For = ( ), G m =. Finally, in, all ackets belonging to unetecte flows increment counters. Further, all ackets fining all counters at or above create an entry. In S 3, only ackets with bytes samle increase counters an ackets that woul fin all counters at o not instantiate entries unless samle. The memory gain an the fact that only samle bytes increment counters translate into smaller interference. Smaller interference (i.e. hel from other flows assing the stages) an the fact that flows must be samle at least once to get etecte, translates into better selectivity for the same amount of memory, as we will see in section 7. While we o not show it for sace reasons, it can be more rigorously roven that S 3 becomes as. This, together with the generality of theorem allows us to rove the following lemma that gives an alternative boun to that in [2] for the number of cature flows in that oes not een on the number of flows. Lemma 3. The execte number of flows assing a arallel Multistage Filter with m stages of b = V /m cut counters each is boune above by ` + (+m)( ) regarless of the flow sie istribution, number of flows an amount of traffic in a measurement interval. Proof. Since S 3 when an theorem () alies for any value of >, conition b > ( )/m yiels b > (Vcut )/m, which is always met if (b) m =. Thus, = (b) m, which yiels the result when substitute in the boun in theorem. 4.8 Accuracy of S 3 There are two sources of inaccuracy in S 3 : the uncertainty ue to samling an the effect of interference resulting from limite memory. With unlimite memory, the number of bytes that go before a flow gets etecte, S, has a negative binomial(, ) istribution. The best estimate for the sie of a large flow, v, is ˆv = E{S }+R = /+R = +R, with R the number of bytes accounte once the flow is etecte. The absolute error is ˆv v = S for a mean square error MSE = E{(ˆv v) 2 } = V ar(s ). Since S is the sum of i.i. geometric() r.v., X, we have that V ar(s ) = σx. 2 )V 2 Since =, the MSE is given by ( cut/. Defining the relative error, ɛ rel, as the square root of the MSE over the sie of a flow, the relative error is (for a flow at the threshol an unlimite memory) given by ɛ = q. Note that ɛ is, by efinition, only ue to the effect of samling. In aition, note how it vanishes when an that it can be aroximate by for large threshols when. Limite memory translates into interference at the stages, causing the remature etection of flows. Consequently, estimating the number of misse bytes with, the worst case is for a flow arriving last since it shall be overestimate at the most. Let c..c m be the values at the stage counters that the first samle from this flow fins: c min samles from it shall be require with c min = min(c..c m) since the flow has to raise all its stage counters to ( ) an get samle once again before entering the flow memory. This imlies a number of misse bytes S cmin with a negative binomial( c min, ) istribution. The MSE is therefore given by E{( S cmin ) 2 } = Vcut 2 + E{S c 2 min } 2E{S cmin }. Now, conitioning for c min an taking exectation we have that E{S cmin } = ( E{c min} )V cut an E{S c 2 min } = 2 `( E{cmin})( 2 ) + E{( c min) 2 }. Substituting in the exression for the MSE, taking the square root an iviing by, the worst-case relative error is foun to be ɛ rel = r E{cmin} ɛ 2 + E{c2 min } 2 (9)

7 Note that, as, ɛ vanishes an the relative error is given by E{c 2 min }/Vcut: there is no inaccuracy ue to samling since bytes are samle with robability an E{c 2 min} is the secon moment of the smallest increment cause by other flows that share our flow s counters. In aition, as we enlarge the stages, E{c min} an E{c 2 min} get small an ɛ rel ɛ. Lemma 4. The worst-case relative error in S 3, ɛ rel, is boune below by ɛ. Proof. From (9), ɛ rel ɛ ( E{c min} )ɛ 2 + E{c2 min } 2 ɛ 2 E{c2 min } E{c min} E{c min}. Since c min is integervalue, E{c 2 min} E{c min}, an the above is always true. The observation in lemma 4 has imortant ractical an theoretical imlications: for a certain, the relative error may ecrease with the amount of memory, but this imrovement shall, at some oint, become negligible since the relative error is boune below by ɛ. However, ɛ can be mae arbitrarily as close to as we wish 3. The following two lemmas shall be use in section 6 to stuy the scalability of S 3. Lemma 5. It suffices that E{c2 min } ɛ 2 2 ɛ 2 for the relative error in the estimates of large flows to be no larger than ɛ, where ɛ ɛ. Proof. c min is, at most, : samles beyon the ( ) th either instantiate entries or o not raise the counters. Thus, ( E{c min}/). Consiering (9), this yiels ɛ rel ɛ 2 + E{c 2 min }/2. Thus, for ɛ rel to be below ɛ it suffices that ɛ 2 + E{c 2 min}/ 2 ɛ 2. Since c min, an ɛ 2 are non-negative, this is ossible only if ɛ ɛ. Lemma 6. If P {c min ɛ} δ for some ɛ, δ < then, the relative error for a large flow is boune above by ɛ 2 + ɛ 2 ( δ) + δ Proof. c 2 min is integer-value, non-negative an restricte P to,... ( ) 2. Thus, it can be roven that E{c 2 min} = P {c 2 min i}, i =..( ) 2. Since P {c min i} is nonincreasing with i, the revious summation can be boune above by R ( ) 2 P {c 2 min x}. Since P {c min ɛ } δ P {c 2 min ɛ 2 2 } δ, if such conition is met, the revious integral (i.e. E{c 2 min}) can be boune as E{c 2 min} R ɛ R ( ) 2 δ = ɛ (( ) 2 ɛ 2 2 )δ. This imlies ɛ 2 2 E{c 2 min } ɛ 2 ( δ)+( 2 )2 δ ɛ 2 ( δ)+δ. Proof follows by virtue of lemma IMPLEMENTING S 3 Stage counters in have to be imlemente in memories as fast as line rates, since such counters may have to be uate on each acket arrival. Given its resemblance with, stages in S 3 coul be imlemente using SRAM [2]. In this section we resent some reference esign that shows how S 3 coul be imlemente using slower memories. This will reveal the flexibility of S 3 aating to the available memory technology an how S 3 coul scale even if the ga between memory an link sees increase. Two observations motivate this esign: first, the fact that, in S 3, not every arriving acket translates into a memory uate; secon, the 3 This is true, since, while in the iscussion we have assume integer values for, nothing revents us really from using real-value samle threshols. fact that, unlike in other er-acket rocessing tasks (like classification in firewalls or route lookus), the actions out of accounting o not aly to the ackets but to counters, which allows early releasing ackets before such actions are taken. In the following, we assume that several rocessing engines (µp for short) are available for the execution of measurement algorithms as well as two tyes of memory evices, fast but small ones (e.g. SRAM) an larger but slower ones (e.g. DRAM) 4. While we shall refer to these memories as SRAM or DRAM, what we shall really be stuying is the fact that S 3 smoothly relaxes the time requirements of the memories involve, no matter their technology: i.e., with SRAM we shall mean memories able to count at line rates, whereas DRAM shall refer to slower memories. Reference esign: Whenever a acket arrives (e.g. at a line car), S 3 erforms a looku in the flow memory, as an. This can involve lookus as often as ackets arrive. Thus, the flow memory nees to be imlemente in high-see memory. However, unlike in, only ackets with samle bytes cause rea/write oerations at the stages. Let us assume that, on recetion of ackets, an inut µp, create some samle hanler, S h, an release the acket from the measurement rocess 5. This woul minimise the elay that the measurement might a since creating a S h involves retrieving a small amount of acket ata, which may alreay be gathere for other uroses. These S h s coul contain the information relevant to our algorithm: the F ID (S F ID), a timestam (S tstam), the acket length (S len ) an the number of bytes samle from the acket (S bytes ). Finally, this inut µp coul ut this hanler asie in a queue at some memory evice, until another µp rea it an took over. Clearly, this queue shoul also be in fast memory since consecutive ackets coul be samle an queueing a S h shoul finish before any other S h entere. Some other rocessor (server µp ) coul be use to to rea these S h s from the queue, scheule the comutation of the hash functions on the S F ID an increment the resective stage counters, hel in a larger but slower memory evice. Let us assume that the write oerations on the counters coul be ieline, an that after such oerations the server µp coul know if all counters reache so that entries coul be create in the flow memory when aroriate. Fig. 4 shows the iea. In what follows, we stuy the feasibility of such a esign using fewer fast memory an the limitations that this may ut on the erformance of S Analysis of our reference esign A acket causes memory oerations at the stages if one or more of its bytes get samle. It can be easily roven that, the case with the worst time constraints is when traffic is comose of ackets of minimum sie, l min, the link is ermanently busy an all the traffic goes to the samler. Let t = l min be the minimum inter-arrival time, with C C l l the link caacity. A acket will cause the creation of a S h with robability s = ( ) lmin. Thus, the average 4 These assumtions are very reasonable in case of network rocessors, where we fin a core rocessor erforming control functions an a set of RISC rocessors otimie for acket-rocessing functions, which tyically run several harwareassiste threas. Further, NPs (for instance Intel s IXP2xx) are tyically esigne to interface with DRAM as well as SRAM evices. 5 A similar concet is use in NP s, where acket hanlers, tyically hel in SRAM, are create for ackets. Such hanlers are ata structures containing control information an are tyically use as ointers for tasks like queueing.

8 Figure 4: Reference esign worst-case inter-samle time is t/ s. Let us aroximate this geometric arrival rocess by assuming that the intersamle times are exonentially istribute (the continuous counterart of a geometric rocess) with the same mean, that is, by a Poisson rocess with rate λ = s/ t. With this aroximation, we are consiering a worse case since, as Poisson, more than one samle coul arrive within t. In orer to queue a S h in the buffer, the access time of the fast evice shoul be no larger than t. Let T a be the time sent by the server µp in reaing S h s from the buffer, comuting the hash functions an uating the corresoning stage counters. Since comarisons an hash functions can be efficiently imlemente in harware, T a will be on the orer of the access time of the large memory evice. Let us efine α = Ta, α > as the isarity between the access times t of the two tyes of memories. If we require the fast memory scale with the link caacity, then α = Ta = t l min C l / T a which can be unerstoo as the ratio link versus memory banwith, for the slower memory. Since it is reasonable to consier T a constant, we can moel our esign as an M/D//k system, as shown in fig. 4. With such moel, the loa of the buffer+server µp system is given by ρ = λt a = s Ta = sα. Now, for the t system to be stable it must be that ρ <. Thus, the first constraint is that we cannot oversamle at will: s <. α Thus, using memories α times slower may limit, which shall in turn limit the selectivity (for the same or ) or the granularity for a fixe selectivity. To easily see this, C l D let us aroximate s l min = lmin, where D is the uration of the measurement interval for a total of C l D bytes. The inequality bove becomes < C ld l min. In aition, α as er section 4.8 this constraint for shall limit accuracy since the worst-case relative error is above ɛ /. Now, since T a > t, some S h s may fin the server µp busy uating counters at the slow memory 6 or reviously create S h s in the queue. Since this buffer will in ractice have limite sace, it coul haen that some S h foun it full an ha to be iscare. Losing S h s woul reuce the etection robability of flows, since the algorithm woul think that flows were samle fewer times. Let us see how large shoul this buffer be for this to rarely haen. 5.. Dimensioning the buffer in fast memory In orer to imension the sie of the buffer, we can use the relations for the M/G/ for constant service times. In case of an infinite queue (i.e. M/D/ instea of M/D//k), the average waiting time for a S h woul be E{W } = ρta 2( ρ) for, by virtue of Little s formulae, an average occuation 6 In reality, the case might be that µp suort several threas an that the accesses to memory are queue at some memory interface. This is the case with Intel s IXP2xx where the so-calle micro-engines issue memory oerations to the memory controllers. Nevertheless, we moel the situation as a server being busy with a samle hanler for some time Ta. E{Q} = λe{w } = time woul be σ 2 W = eviation σ W Ta ρ ( ρ) 3 The variance of the waiting T 2 a ρ an its stanar 3( ρ) 2. Hence, the stanar eviation for ρ2. 2( ρ) T a 2 ρ ` 4 ρ ( ρ) 2 2 the number of samles in the queue can be boune by σ Q ρ. Now, since the arrival of samles is aroximately ( ρ) 3 Poisson, the PASTA roerty hols. Thus, the robability that some S h fins exactly k samles in the buffer is P {Q = k} an the robability of a S h fining more than k samles in the queue is P {Q k}. By virtue of Chebyshev s inequality, P {Q > E{Q} + nσ Q} <, n >. Hence, if the buffer n 2 is of sie B = E{Q} + σ Q ɛo then, the robability that a S h gets iscare will be < ɛ o. For small values of ɛ o, the behavior of our M/D//k may be well estimate using the relations for the M/D/. Thus, substituting each term by the values foun before, we get to B = 3ɛoρ 2 +2 ρ ρ2 2( ρ) + ρ ( ρ) 3ɛ o = 2. For ρ <, we have that 3ɛ ρ2 < ρ an B can o( ρ) be boune above as ρ( 3ɛo+2) ρ B 2 3ɛ o( ρ) ( ρ), where 3ɛ o the latter aroximation comes from consiering ɛ o. Concluing, if the buffer is, in number of S h s, as large as ρ B = ( ρ) () 3ɛ o then, the overflow robability will be smaller than ɛ o Imact of uate elay on accuracy The following imairment ue to this buffering shoul be note. Whenever a S h is queue, it takes some time until stage counters for that flow get uate. If one of these S h turns out to be the one fining all counters at, the creation of an entry for this flow will be elaye the time it took that S h to get to the counters. If subsequent ackets of that flow arrive within this time interval, they will fin no entry an will be either samle or ignore. Thus, while losing S h s affects the etection robability, elaying them may affect accuracy. Again, the worst case is when the link is always busy an all ackets arriving after the flow just etecte belong to it. If it takes, on the average, τ for a S h to get service then, the maximum number of bytes that the algorithm shall miss is, on the average, τc l. The average time it takes for a S h to get service is τ = E{W } + T a = (2 ρ)ta, 2( ρ) with W the waiting time in the buffer. Thus, the average number of bytes misse from a flow is boune above by E{v miss } (2 ρ)ta 2( ρ) C l = + α lmin. Note that this error tens to infinity as ρ tens to unity. Thus, if either the ρ 2 isarity of sees or the byte-samling robability is high, this error will be consierable. However, for e.g. ρ <.75, the error will be boune above by 2.5 α l min, which is 2.5 α minimum-sie ackets. For the same loa, B = 2 ensures an overflow robability below 6. Thus, for moerate loas (achieve reucing ), this error shoul not be a concern. In case the loa were high, our esign can be easily ugrae so as to estimate this error an boun it above as shown in [5], where we also show some numerical examle showing the otential of the solution. Final remark an section summary: At very high sees the flow memory may have to be imlemente with CAMs [2] (currently ns). In our esign, both µp s (inut an server) access the buffer of S h s. Memories simultaneously suorting rea/write oerations o actually exist [3]. For the same amount of memory, S 3 can suort

9 more stage counters than. Further, stages in S 3 can be imlemente in memories slower than link banwiths. This allows imlementing S 3 at sees where an imlementation of woul be either ifficult, costly or not ossible. Further, the use of DRAM translates into consierable savings in terms of sace an ower consumtion. Using memories α times slower limits above the samling robability, thereby theoretically limiting selectivity an the worst-case accuracy. Both can be comensate in case of DRAM using more an larger stages. Further, even for high (essimistic) values of α, S 3 can be very selective for values of (or ) much below the limit ue to α. Thus, small buffers may alreay ensure no overflow an the imact on accuracy ue to the elay may be negligible. Finally, schemes combining both memory tyes have been roose in relate contexts SCALABILITY OF S 3 We shall now see how S 3 scales an comare it to the other aroaches mentione in this aer. The roblem at han gets harer when finer granularities are targete, when higher accuracy is require or when the amount of traffic in a measurement interval increases. As a consequence, the error relative to the smallest sie of interest (rather than the absolute error, or the error relative to the total) is the natural metric of interest. Hence, the focus in this section is on the amount of memory (an number of accesses) require by algorithms to etect flows above a fraction of the total traffic C while incurring a relative error no larger than some rescribe ɛ. For the sake of comarison, we shall assume that stage counters in S 3 are of fixe sie. For its ractical relevance, we shall istinguish between entries an stage counters not only because stages coul be hel in DRAM, but also since, even if imlemente in SRAM, entries may be significantly larger than stage counters (a : relationshi is suggeste in [2]). This suggests the convenience of minimising the sie of the flow memory. S 3 requires three arameters to be set: the stage sie (b), number of stages (m) an the samle threshol (). This gives three egrees of freeom. For what accuracy concerns, the worst case is for a large flow arriving last as iscusse in section 4.8. Let c min be the smallest of the m counters, c..c m, that this flow shall fin an let us start imensioning m an b so that P {c min ɛ} δ () for some ɛ <, δ <. Assuming c..c m i.i. (which is reasonable since hash functions ten to uniformly srea flows at each stage), () is equivalent to P {c i ɛ } m δ. Now, the average number of samles taken altogether is boune above by C =. Since stage counter values are, at most,, we have that E{c i} min(, / ). Since we shall b require b > / an, we have that E{c i} /. b Thus, from the non-negativity of c i, i =..m an by virtue of Markov s inequality it suffices that ` E{c i } m δ for () ɛ to hol. Consiering the boun for E{c i}, the inequality above is satisfie if ` m δ, meaning that stages with ɛ b ` b /m counters suffice. Taking the equality, the total ɛ δ 7 For instance [4] roose a counter management algorithm(cma) for a generalurose counting architecture reviously roose in which DRAM is use to store statistics counte at line rates using counters in SRAM. We irectly count samles in DRAM instea of using small SRAM to uate a large number of counters in DRAM an thus we o not use a CMA. number of stage counters for () to hol is given by M = bm = /mm (2) ɛ δ regarless of the value of >. As a function of m, (2) reners a minimum at m = log(/δ) for any δ >, ɛ >. Taking m = log(/δ) stages means suorting stages with b = e counters, for a total of M = e log(/δ) counters. ɛ ɛ Now, by virtue of lemma 6, for the worst-case relative error to be no larger than some ɛ it suffices that ɛ 2 + ɛ 2 ( δ) + δ = ɛ 2 (3) where ɛ 2 = ɛ 2. This last conition requires (ɛ 2 +/), or (ɛ 2 +), which can always be satisfie. Solving for ɛ in (3), the number of require stage counters is given by M = e s δ (ɛ 2 ɛ 2 ) δ log( δ ) (4) Observations: i) (4) ecreases in r = (ɛ 2 ɛ 2 ), where ɛ 2 < ɛ 2. As a function of δ, (4) exhibits a minimum in (, r ). For values of ɛ of ractical significance (say between 8 an 2 ), δ r well aroximates the location of this minimum. ii) For a given ɛ 2, the only way to increase r is making ɛ 2 small, that is, increasing or, for a given. Hence, (4) is smallest when ɛ =, i.e. when =. In this case, the minimum is for δ ɛ 2 /, which gives the boun M (e/ɛ )log(/ɛ 2 ) for, that oes not een on nor on C. Recall that C increases with either the see of links or with measurement interval lengths. iii) For small ɛ 2, may have to be chosen close to for ɛ 2 to be below ɛ 2, that is, the samling robability may have to be high. However, as link sees increase (right when timing constraints get harer an there are otentially more flows), ɛ can be mae, for the same granularity, significantly smaller than ɛ for or. Thus, S 3 may meet the error boun, with roughly the same number of stage counters that, at small samling robabilities, allowing for an imlementation of the stages in DRAM. iv) The number of counters to uate er samle acket is m. Choosing m as log(/ɛ 2 ) slowly increases with ɛ. For ɛ = %, this is 2 stages an 2 for an error one hunre times smaller. Even in this worst-case analysis this shoul not reclue a DRAM imlementation of the stages, since only samle ackets shall increase counters. v) Several guarantee ɛ 2 < ɛ 2. Increasing increases the see requirements but also r ɛ 2, thereby iminishing (4)). In aition, δ r / otimies in sie. However, b = e/(ɛ) an m = log(/δ) subject to (3) allow multile setus that guarantee the error boun. Thus, in the circumstances that taking m = log(/ɛ 2 ) ut excessive time requirements for a secific memory technology an value of, larger δ an smaller ɛ can be chosen. This is suorting fewer but larger stages. Larger stages shoul not be a concern if DRAM can be use. Note the flexibility of the aroach aating to the secific see/caacity features of the memories. vi) With b e/(ɛ ), m 2log( /ɛ ) an > /ɛ 2, conition b > ( )/m in theorem translates aroximately into < (e/ɛ ) log(/ɛ2 ), which oses no ractical constraint. For instance, for ɛ = %, the constraint is < Plugging the values for b an m, the boun

Lecture 6 : Dimensionality Reduction

Lecture 6 : Dimensionality Reduction CPS290: Algorithmic Founations of Data Science February 3, 207 Lecture 6 : Dimensionality Reuction Lecturer: Kamesh Munagala Scribe: Kamesh Munagala In this lecture, we will consier the roblem of maing

More information

Consistency and asymptotic normality

Consistency and asymptotic normality Consistency an asymtotic normality Class notes for Econ 842 Robert e Jong March 2006 1 Stochastic convergence The asymtotic theory of minimization estimators relies on various theorems from mathematical

More information

Colin Cameron: Asymptotic Theory for OLS

Colin Cameron: Asymptotic Theory for OLS Colin Cameron: Asymtotic Theory for OLS. OLS Estimator Proerties an Samling Schemes.. A Roama Consier the OLS moel with just one regressor y i = βx i + u i. The OLS estimator b β = ³ P P i= x iy i canbewrittenas

More information

Lenny Jones Department of Mathematics, Shippensburg University, Shippensburg, Pennsylvania Daniel White

Lenny Jones Department of Mathematics, Shippensburg University, Shippensburg, Pennsylvania Daniel White #A10 INTEGERS 1A (01): John Selfrige Memorial Issue SIERPIŃSKI NUMBERS IN IMAGINARY QUADRATIC FIELDS Lenny Jones Deartment of Mathematics, Shiensburg University, Shiensburg, Pennsylvania lkjone@shi.eu

More information

The Effect of a Finite Measurement Volume on Power Spectra from a Burst Type LDA

The Effect of a Finite Measurement Volume on Power Spectra from a Burst Type LDA The Effect of a Finite Measurement Volume on Power Sectra from a Burst Tye LDA Preben Buchhave 1,*, Clara M. Velte, an William K. George 3 1. Intarsia Otics, Birkerø, Denmark. Technical University of Denmark,

More information

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

Bivariate distributions characterized by one family of conditionals and conditional percentile or mode functions

Bivariate distributions characterized by one family of conditionals and conditional percentile or mode functions Journal of Multivariate Analysis 99 2008) 1383 1392 www.elsevier.com/locate/jmva Bivariate istributions characterize by one family of conitionals an conitional ercentile or moe functions Barry C. Arnol

More information

Application of Measurement System R&R Analysis in Ultrasonic Testing

Application of Measurement System R&R Analysis in Ultrasonic Testing 17th Worl Conference on Nonestructive Testing, 5-8 Oct 8, Shanghai, China Alication of Measurement System & Analysis in Ultrasonic Testing iao-hai ZHANG, Bing-ya CHEN, Yi ZHU Deartment of Testing an Control

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

Optimal Spatial Reuse in Poisson Multi-hop Networks

Optimal Spatial Reuse in Poisson Multi-hop Networks Otimal Satial Reuse in Poisson Multi-ho Networks Kostas Stamatiou an Martin Haenggi Deartment of Electrical Engineering University of Notre Dame, Notre Dame, IN 46556 {kstamati,mhaenggi}@n.eu Abstract

More information

Colin Cameron: Brief Asymptotic Theory for 240A

Colin Cameron: Brief Asymptotic Theory for 240A Colin Cameron: Brief Asymtotic Theory for 240A For 240A we o not go in to great etail. Key OLS results are in Section an 4. The theorems cite in sections 2 an 3 are those from Aenix A of Cameron an Trivei

More information

Convergence Analysis of Terminal ILC in the z Domain

Convergence Analysis of Terminal ILC in the z Domain 25 American Control Conference June 8-, 25 Portlan, OR, USA WeA63 Convergence Analysis of erminal LC in the Domain Guy Gauthier, an Benoit Boulet, Member, EEE Abstract his aer shows how we can aly -transform

More information

Probabilistic Learning

Probabilistic Learning Statistical Machine Learning Notes 11 Instructor: Justin Domke Probabilistic Learning Contents 1 Introuction 2 2 Maximum Likelihoo 2 3 Examles of Maximum Likelihoo 3 3.1 Binomial......................................

More information

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is

More information

Digitally delicate primes

Digitally delicate primes Digitally elicate rimes Jackson Hoer Paul Pollack Deartment of Mathematics University of Georgia Athens, Georgia 30602 Tao has shown that in any fixe base, a ositive roortion of rime numbers cannot have

More information

Convergence of random variables, and the Borel-Cantelli lemmas

Convergence of random variables, and the Borel-Cantelli lemmas Stat 205A Setember, 12, 2002 Convergence of ranom variables, an the Borel-Cantelli lemmas Lecturer: James W. Pitman Scribes: Jin Kim (jin@eecs) 1 Convergence of ranom variables Recall that, given a sequence

More information

5. THERMAL CONVERSION OF SOLAR RADIATION. Content

5. THERMAL CONVERSION OF SOLAR RADIATION. Content 5. Introuction 5. THEMAL CONVESION OF SOLA ADIATION Content 5. Introuction 5. Collectors without concentration 5.. Otical efficiency of the flat collector 5.. Thermal efficiency of the flat collector 5..3

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

Submitted to the Journal of Hydraulic Engineering, ASCE, January, 2006 NOTE ON THE ANALYSIS OF PLUNGING OF DENSITY FLOWS

Submitted to the Journal of Hydraulic Engineering, ASCE, January, 2006 NOTE ON THE ANALYSIS OF PLUNGING OF DENSITY FLOWS Submitte to the Journal of Hyraulic Engineering, ASCE, January, 006 NOTE ON THE ANALYSIS OF PLUNGING OF DENSITY FLOWS Gary Parker 1, Member, ASCE an Horacio Toniolo ABSTRACT This note is evote to the correction

More information

He s Homotopy Perturbation Method for solving Linear and Non-Linear Fredholm Integro-Differential Equations

He s Homotopy Perturbation Method for solving Linear and Non-Linear Fredholm Integro-Differential Equations nternational Journal of Theoretical an Alie Mathematics 2017; 3(6): 174-181 htt://www.scienceublishinggrou.com/j/ijtam oi: 10.11648/j.ijtam.20170306.11 SSN: 2575-5072 (Print); SSN: 2575-5080 (Online) He

More information

Novel Algorithm for Sparse Solutions to Linear Inverse. Problems with Multiple Measurements

Novel Algorithm for Sparse Solutions to Linear Inverse. Problems with Multiple Measurements Novel Algorithm for Sarse Solutions to Linear Inverse Problems with Multile Measurements Lianlin Li, Fang Li Institute of Electronics, Chinese Acaemy of Sciences, Beijing, China Lianlinli1980@gmail.com

More information

Learning Markov Graphs Up To Edit Distance

Learning Markov Graphs Up To Edit Distance Learning Markov Grahs U To Eit Distance Abhik Das, Praneeth Netraalli, Sujay Sanghavi an Sriram Vishwanath Deartment of ECE, The University of Texas at Austin, USA Abstract This aer resents a rate istortion

More information

Consistency and asymptotic normality

Consistency and asymptotic normality Consistency an ymtotic normality Cls notes for Econ 842 Robert e Jong Aril 2007 1 Stochtic convergence The ymtotic theory of minimization estimators relies on various theorems from mathematical statistics.

More information

Probabilistic Learning

Probabilistic Learning Statistical Machine Learning Notes 10 Instructor: Justin Domke Probabilistic Learning Contents 1 Introuction 2 2 Maximum Likelihoo 2 3 Examles of Maximum Likelihoo 3 3.1 Binomial......................................

More information

Modeling Residual-Geometric Flow Sampling

Modeling Residual-Geometric Flow Sampling 1 Modeling Residual-Geometric Flow Samling Xiaoming Wang, Xiaoyong Li, and Dmitri Loguinov Abstract Traffic monitoring and estimation of flow arameters in high seed routers have recently become challenging

More information

7. Introduction to Large Sample Theory

7. Introduction to Large Sample Theory 7. Introuction to Large Samle Theory Hayashi. 88-97/109-133 Avance Econometrics I, Autumn 2010, Large-Samle Theory 1 Introuction We looke at finite-samle roerties of the OLS estimator an its associate

More information

arxiv: v1 [physics.data-an] 26 Oct 2012

arxiv: v1 [physics.data-an] 26 Oct 2012 Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch

More information

Robust Control of Robot Manipulators Using Difference Equations as Universal Approximator

Robust Control of Robot Manipulators Using Difference Equations as Universal Approximator Proceeings of the 5 th International Conference of Control, Dynamic Systems, an Robotics (CDSR'18) Niagara Falls, Canaa June 7 9, 218 Paer No. 139 DOI: 1.11159/csr18.139 Robust Control of Robot Maniulators

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

MINIMAL MAHLER MEASURE IN REAL QUADRATIC FIELDS. 1. Introduction

MINIMAL MAHLER MEASURE IN REAL QUADRATIC FIELDS. 1. Introduction INIAL AHLER EASURE IN REAL QUADRATIC FIELDS TODD COCHRANE, R.. S. DISSANAYAKE, NICHOLAS DONOHOUE,. I.. ISHAK, VINCENT PIGNO, CHRIS PINNER, AND CRAIG SPENCER Abstract. We consier uer an lower bouns on the

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

Modeling and Estimation of Full-Chip Leakage Current Considering Within-Die Correlation

Modeling and Estimation of Full-Chip Leakage Current Considering Within-Die Correlation 6.3 Modeling and Estimation of Full-Chi Leaage Current Considering Within-Die Correlation Khaled R. eloue, Navid Azizi, Farid N. Najm Deartment of ECE, University of Toronto,Toronto, Ontario, Canada {haled,nazizi,najm}@eecg.utoronto.ca

More information

A secure approach for embedding message text on an elliptic curve defined over prime fields, and building 'EC-RSA-ELGamal' Cryptographic System

A secure approach for embedding message text on an elliptic curve defined over prime fields, and building 'EC-RSA-ELGamal' Cryptographic System International Journal of Comuter Science an Information Security (IJCSIS), Vol. 5, No. 6, June 7 A secure aroach for embeing message tet on an ellitic curve efine over rime fiels, an builing 'EC-RSA-ELGamal'

More information

Lower bounds on Locality Sensitive Hashing

Lower bounds on Locality Sensitive Hashing Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,

More information

Online Nearest Neighbor Search in Hamming Space

Online Nearest Neighbor Search in Hamming Space Online Nearest Neighbor Search in Hamming Sace Seehr Eghbali, Hassan Ashtiani, Laan Tahvilari University of Waterloo, Ontario, Canaa Email: {s2eghbal, mhzokaei, laan.tahvilari}@uwaterloo.ca Abstract We

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Topic 7: Convergence of Random Variables

Topic 7: Convergence of Random Variables Topic 7: Convergence of Ranom Variables Course 003, 2016 Page 0 The Inference Problem So far, our starting point has been a given probability space (S, F, P). We now look at how to generate information

More information

A Course in Machine Learning

A Course in Machine Learning A Course in Machine Learning Hal Daumé III 12 EFFICIENT LEARNING So far, our focus has been on moels of learning an basic algorithms for those moels. We have not place much emphasis on how to learn quickly.

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

The Principle of Least Action

The Principle of Least Action Chapter 7. The Principle of Least Action 7.1 Force Methos vs. Energy Methos We have so far stuie two istinct ways of analyzing physics problems: force methos, basically consisting of the application of

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

A method of constructing the half-rate QC-LDPC codes with linear encoder, maximum column weight three and inevitable girth 26

A method of constructing the half-rate QC-LDPC codes with linear encoder, maximum column weight three and inevitable girth 26 Communications 20; 2(): 22-4 Publishe online January 1 2015 (htt://www.scienceublishinggrou.com/j/com) oi: 10.11648/j.com.20020.11 ISSN: 228-5966 (Print); ISSN: 228-592 (Online) A metho of constructing

More information

NOTES. The Primes that Euclid Forgot

NOTES. The Primes that Euclid Forgot NOTES Eite by Sergei Tabachnikov The Primes that Eucli Forgot Paul Pollack an Enrique Treviño Abstract. Let q 2. Suosing that we have efine q j for all ale j ale k, let q k+ be a rime factor of + Q k j

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Mod p 3 analogues of theorems of Gauss and Jacobi on binomial coefficients

Mod p 3 analogues of theorems of Gauss and Jacobi on binomial coefficients ACTA ARITHMETICA 2.2 (200 Mo 3 analogues of theorems of Gauss an Jacobi on binomial coefficients by John B. Cosgrave (Dublin an Karl Dilcher (Halifax. Introuction. One of the most remarkable congruences

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

INVESTIGATION OF THE DEISGN AND PERFORMANCE OF REPEATING SPACE TRACK CONSTELLATIONS

INVESTIGATION OF THE DEISGN AND PERFORMANCE OF REPEATING SPACE TRACK CONSTELLATIONS INVESTIGATION OF THE DEISGN AND PEFOMANCE OF EPEATING SPACE TACK CONSTELLATIONS Michelle K. Perez Avisor: Dr. Christoher Hall Virginia Polytechnic Institute an State University, Blacsburg, VA, 24060 Abstract

More information

1 dx. where is a large constant, i.e., 1, (7.6) and Px is of the order of unity. Indeed, if px is given by (7.5), the inequality (7.

1 dx. where is a large constant, i.e., 1, (7.6) and Px is of the order of unity. Indeed, if px is given by (7.5), the inequality (7. Lectures Nine an Ten The WKB Approximation The WKB metho is a powerful tool to obtain solutions for many physical problems It is generally applicable to problems of wave propagation in which the frequency

More information

A simple model for the small-strain behaviour of soils

A simple model for the small-strain behaviour of soils A simple moel for the small-strain behaviour of soils José Jorge Naer Department of Structural an Geotechnical ngineering, Polytechnic School, University of São Paulo 05508-900, São Paulo, Brazil, e-mail:

More information

Econometrics I. September, Part I. Department of Economics Stanford University

Econometrics I. September, Part I. Department of Economics Stanford University Econometrics I Deartment of Economics Stanfor University Setember, 2008 Part I Samling an Data Poulation an Samle. ineenent an ientical samling. (i.i..) Samling with relacement. aroximates samling without

More information

The thermal wind 1. v g

The thermal wind 1. v g The thermal win The thermal win Introuction The geostrohic win is etermine by the graient of the isobars (on a horizontal surface) or isohyses (on a ressure surface). On a ressure surface the graient of

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

State Estimation with ARMarkov Models

State Estimation with ARMarkov Models Deartment of Mechanical and Aerosace Engineering Technical Reort No. 3046, October 1998. Princeton University, Princeton, NJ. State Estimation with ARMarkov Models Ryoung K. Lim 1 Columbia University,

More information

Nonlinear Estimation. Professor David H. Staelin

Nonlinear Estimation. Professor David H. Staelin Nonlinear Estimation Professor Davi H. Staelin Massachusetts Institute of Technology Lec22.5-1 [ DD 1 2] ˆ = 1 Best Fit, "Linear Regression" Case I: Nonlinear Physics Data Otimum Estimator P() ˆ D 1 D

More information

On Characterizing the Delay-Performance of Wireless Scheduling Algorithms

On Characterizing the Delay-Performance of Wireless Scheduling Algorithms On Characterizing the Delay-Performance of Wireless Scheuling Algorithms Xiaojun Lin Center for Wireless Systems an Applications School of Electrical an Computer Engineering, Purue University West Lafayette,

More information

Lyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering,

Lyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering, On the Queue-Overflow Probability of Wireless Systems : A New Approach Combining Large Deviations with Lyapunov Functions V. J. Venkataramanan an Xiaojun Lin Center for Wireless Systems an Applications

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

New Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms

New Schedulability Test Conditions for Non-preemptive Scheduling on Multiprocessor Platforms New Schedulability Test Conditions for Non-reemtive Scheduling on Multirocessor Platforms Technical Reort May 2008 Nan Guan 1, Wang Yi 2, Zonghua Gu 3 and Ge Yu 1 1 Northeastern University, Shenyang, China

More information

Cryptanalysis of Pseudorandom Generators

Cryptanalysis of Pseudorandom Generators CSE 206A: Lattice Algorithms and Alications Fall 2017 Crytanalysis of Pseudorandom Generators Instructor: Daniele Micciancio UCSD CSE As a motivating alication for the study of lattice in crytograhy we

More information

Brownian Motion and Random Prime Factorization

Brownian Motion and Random Prime Factorization Brownian Motion and Random Prime Factorization Kendrick Tang June 4, 202 Contents Introduction 2 2 Brownian Motion 2 2. Develoing Brownian Motion.................... 2 2.. Measure Saces and Borel Sigma-Algebras.........

More information

Hotelling s Two- Sample T 2

Hotelling s Two- Sample T 2 Chater 600 Hotelling s Two- Samle T Introduction This module calculates ower for the Hotelling s two-grou, T-squared (T) test statistic. Hotelling s T is an extension of the univariate two-samle t-test

More information

ON THE AVERAGE NUMBER OF DIVISORS OF REDUCIBLE QUADRATIC POLYNOMIALS

ON THE AVERAGE NUMBER OF DIVISORS OF REDUCIBLE QUADRATIC POLYNOMIALS ON THE AVERAGE NUMBER OF DIVISORS OF REDUCIBLE QUADRATIC POLYNOMIALS KOSTADINKA LAPKOVA Abstract. We give an asymtotic formula for the ivisor sum c

More information

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations

Diophantine Approximations: Examining the Farey Process and its Method on Producing Best Approximations Diophantine Approximations: Examining the Farey Process an its Metho on Proucing Best Approximations Kelly Bowen Introuction When a person hears the phrase irrational number, one oes not think of anything

More information

SYNCHRONOUS SEQUENTIAL CIRCUITS

SYNCHRONOUS SEQUENTIAL CIRCUITS CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents

More information

A generalization of Amdahl's law and relative conditions of parallelism

A generalization of Amdahl's law and relative conditions of parallelism A generalization of Amdahl's law and relative conditions of arallelism Author: Gianluca Argentini, New Technologies and Models, Riello Grou, Legnago (VR), Italy. E-mail: gianluca.argentini@riellogrou.com

More information

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models

Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Evaluating Circuit Reliability Under Probabilistic Gate-Level Fault Models Ketan N. Patel, Igor L. Markov and John P. Hayes University of Michigan, Ann Arbor 48109-2122 {knatel,imarkov,jhayes}@eecs.umich.edu

More information

An Analysis of Reliable Classifiers through ROC Isometrics

An Analysis of Reliable Classifiers through ROC Isometrics An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit

More information

inflow outflow Part I. Regular tasks for MAE598/494 Task 1

inflow outflow Part I. Regular tasks for MAE598/494 Task 1 MAE 494/598, Fall 2016 Project #1 (Regular tasks = 20 points) Har copy of report is ue at the start of class on the ue ate. The rules on collaboration will be release separately. Please always follow the

More information

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs Lectures - Week 10 Introuction to Orinary Differential Equations (ODES) First Orer Linear ODEs When stuying ODEs we are consiering functions of one inepenent variable, e.g., f(x), where x is the inepenent

More information

Skiba without unstable equlibrium in a linear quadratic framework

Skiba without unstable equlibrium in a linear quadratic framework Skiba without unstable equlibrium in a linear quaratic framework Richar F. Hartl Institute of Management, University of Vienna, Brünnerstraße 8, -0 Vienna, ustria Richar.Hartl@univie.ac.at Tel. +43--477-3809

More information

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device Close an Open Loop Optimal Control of Buffer an Energy of a Wireless Device V. S. Borkar School of Technology an Computer Science TIFR, umbai, Inia. borkar@tifr.res.in A. A. Kherani B. J. Prabhu INRIA

More information

Schrödinger s equation.

Schrödinger s equation. Physics 342 Lecture 5 Schröinger s Equation Lecture 5 Physics 342 Quantum Mechanics I Wenesay, February 3r, 2010 Toay we iscuss Schröinger s equation an show that it supports the basic interpretation of

More information

arxiv: v2 [math.nt] 28 Jun 2017

arxiv: v2 [math.nt] 28 Jun 2017 GEERATIG RADOM FACTORED IDEALS I UMBER FIELDS ZACHARY CHARLES arxiv:62.06260v2 [math.t] 28 Jun 207 Abstract. We resent a ranomize olynomial-time algorithm to generate an ieal an its factorization uniformly

More information

Lower Bounds for the Smoothed Number of Pareto optimal Solutions

Lower Bounds for the Smoothed Number of Pareto optimal Solutions Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.

More information

Unit 1 - Computer Arithmetic

Unit 1 - Computer Arithmetic FIXD-POINT (FX) ARITHMTIC Unit 1 - Comuter Arithmetic INTGR NUMBRS n bit number: b n 1 b n 2 b 0 Decimal Value Range of values UNSIGND n 1 SIGND D = b i 2 i D = 2 n 1 b n 1 + b i 2 i n 2 i=0 i=0 [0, 2

More information

Analysis of M/M/n/K Queue with Multiple Priorities

Analysis of M/M/n/K Queue with Multiple Priorities Analysis of M/M/n/K Queue with Multile Priorities Coyright, Sanjay K. Bose For a P-riority system, class P of highest riority Indeendent, Poisson arrival rocesses for each class with i as average arrival

More information

A MECHANISM FOR THE TEMPERATURE DEPENDENCE OF THE SURFACE RELAXATION RATE IN CARBONATES

A MECHANISM FOR THE TEMPERATURE DEPENDENCE OF THE SURFACE RELAXATION RATE IN CARBONATES SCA2002-27 1/12 A MECHANISM FOR THE TEMPERATURE DEPENDENCE OF THE SURFACE RELAXATION RATE IN CARBONATES Christian Straley, Schlumberger-Doll Research, Rigefiel, Connecticut ABSTRACT Unexlaine temerature

More information

ANALYSIS OF PNEUMATIC FINE PARTICLE PEENING PROCESS BY USING A HIGH-SPEED-CAMERA

ANALYSIS OF PNEUMATIC FINE PARTICLE PEENING PROCESS BY USING A HIGH-SPEED-CAMERA International Journal of Moern Physics B Vol. 24, Nos. 15 & 16 (21) 347 352 Worl Scientific Publishing Comany DOI: 1.1142/S217979216669 ANALYSIS OF PNEUMATIC FINE PARTICLE PEENING PROCESS BY USING A HIGH-SPEED-CAMERA

More information

Fluctuating epidemics on adaptive networks

Fluctuating epidemics on adaptive networks PHYSCAL REVEW E 77, 6611 28 Fluctuating eiemics on aative networks Leah B. Shaw Deartment of Alie Science, College of William an Mary, Williamsburg, Virginia 23187, USA ra B. Schwartz US Naval Research

More information

Table of Common Derivatives By David Abraham

Table of Common Derivatives By David Abraham Prouct an Quotient Rules: Table of Common Derivatives By Davi Abraham [ f ( g( ] = [ f ( ] g( + f ( [ g( ] f ( = g( [ f ( ] g( g( f ( [ g( ] Trigonometric Functions: sin( = cos( cos( = sin( tan( = sec

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

Competition in the health care market: a two-sided. approach

Competition in the health care market: a two-sided. approach Cometition in the health care market: a two-sie aroach Mario Pezzino Giacomo Pignataro Abstract Two ientical hositals comete for atients an octors choosing locations (e.g. secializations) on a Hotelling

More information

GIVEN an input sequence x 0,..., x n 1 and the

GIVEN an input sequence x 0,..., x n 1 and the 1 Running Max/Min Filters using 1 + o(1) Comarisons er Samle Hao Yuan, Member, IEEE, and Mikhail J. Atallah, Fellow, IEEE Abstract A running max (or min) filter asks for the maximum or (minimum) elements

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

Periodic scheduling 05/06/

Periodic scheduling 05/06/ Periodic scheduling T T or eriodic scheduling, the best that we can do is to design an algorithm which will always find a schedule if one exists. A scheduler is defined to be otimal iff it will find a

More information

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies Online Aendix to Accomany AComarisonof Traditional and Oen-Access Aointment Scheduling Policies Lawrence W. Robinson Johnson Graduate School of Management Cornell University Ithaca, NY 14853-6201 lwr2@cornell.edu

More information

1 Gambler s Ruin Problem

1 Gambler s Ruin Problem Coyright c 2017 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins

More information

Uncertainty Modeling with Interval Type-2 Fuzzy Logic Systems in Mobile Robotics

Uncertainty Modeling with Interval Type-2 Fuzzy Logic Systems in Mobile Robotics Uncertainty Modeling with Interval Tye-2 Fuzzy Logic Systems in Mobile Robotics Ondrej Linda, Student Member, IEEE, Milos Manic, Senior Member, IEEE bstract Interval Tye-2 Fuzzy Logic Systems (IT2 FLSs)

More information

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)

More information

The Exact Form and General Integrating Factors

The Exact Form and General Integrating Factors 7 The Exact Form an General Integrating Factors In the previous chapters, we ve seen how separable an linear ifferential equations can be solve using methos for converting them to forms that can be easily

More information

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression

A Comparison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Journal of Modern Alied Statistical Methods Volume Issue Article 7 --03 A Comarison between Biased and Unbiased Estimators in Ordinary Least Squares Regression Ghadban Khalaf King Khalid University, Saudi

More information