As a model for an ATM switch we consider the overow frequency of a queue that

Size: px
Start display at page:

Download "As a model for an ATM switch we consider the overow frequency of a queue that"

Transcription

1 BUFFER OVERFLOW ASYMPTOTICS FOR A BUFFER HANDLING MANY TRAFFIC SOURCES COSTAS COURCOUBETIS, University of Crete RICHARD WEBER, University of Cabridge Abstract As a odel for an ATM switch we consider the overow frequency of a queue that is served at a constant rate and in which the arrival process is the superposition of N trac streas. We consider an asyptotic as N! in which the service rate N c and buer size N b also increase linearly in N. In this regie, the frequency of buer overow is approxiately exp(?n I(c; b)), where I(c; b) is given by the solution to an optiization proble posed in ters of tie-dependent logarithic oent generating functions. Experiental results for Gaussian and Markov odulated uid source odels show that this asyptotic provides a better estiate of the frequency of buer overow than ones based on large buer asyptotics. ATM SWITCHES; BUFFER OVERFLOW ASYMPTOTICS; EFFECTIVE BANDWIDTHS; LARGE DEVIATIONS; MARKOV MODULATED FLUID AMS 99 SUBJECT CLASSIFICATION: PRIMARY 60K30, SECONDARY 60F0, 60K25, 68M20, 90B0, 90B22. Switches handling any bursty sources In a high speed data counications network, such as one operating according to the ideas of ATM (asynchronous transfer ode), data is packaged into cells of xed size which are Received 9 Deceber 994; revision received 3 May, 995 Postal address: Departent of Coputer Science, University of Crete, PO Box 470 Heraklion, 70 Greece Postal address: Statistical Laboratory, 6 Mill Lane, Cabridge CB2 SB, UK

2 transitted between switches along high capacity links. The trac sources are of various types, such as voice, video and le transfer, and they are bursty, in the sense that the rate at which cells are produced by a source is not constant, but uctuates around a ean rate. Switches are buered, as a safeguard against those occasions when the total rate at which cells enter the buer fro all sources that are routed through that switch exceeds the rate at which they can be served by the output links. Occasionally, the buer will not be large enough and cell loss will occur. This should happen rarely. Since the nuber of sources that are routed through a switch is large, there is a statistical ultiplexing which reduces the probability of buer overow. The idea is that when soe sources are producing cells at above their average rates other sources will be producing calls at below their average rates. A easure of Quality of Service (QoS) is the cell loss rate; this rate should be very sall, typically of the order of 0?6 to 0?0. The cell loss rate is dicult to easure, but is iportant to estiate, both to decide questions of call acceptance and to identify paths in the network that are heavily or lightly loaded for the purpose of call routing. Except for very siple odels it is ipossible for a queueing theory analysis to evaluate the savings in bandwidth due to statistical ultiplexing or to estiate the cell loss rate. For this reason researchers have focused their attention on analysis based on asyptotics and upon on-line easureents of the cell loss rate. One such asyptotic has been developed for systes with large buers. In this paper we study an asyptotic for a large nubers of sources, and show that it can be used ore successfully to estiate the cell loss rate. The odel The behavior of a switch in an ATM network can be odelled as queue with a constant service rate and a buer for B cells. We shall suppose that tie is discretised into epochs, n = ; 2; : : :; and that during epoch n the cell service rate and arrival rate are both constant, and equal to C and X n cells per epoch respectively. The workload at the start of epoch n is denoted W n and W n+ = axf0; in[(w n + X n? C); B]g: The iniization in the above reects the fact that cells are lost when the buer is full, and the axiization insures that the the queue cannot becoe negative. We shall assue that fx n g is a ergodic process, and that E[X n ] < C. This condition iplies that fw n g is ergodic. 2

3 Suppose that fx n g is the superposition of sources of M dierent types, with there being N i sources of type i, i = ; : : :; M. Thus the trac is dened by the paraeter = ( ; : : :; M ) and the scaling paraeter N. Let b and c denote respectively the aounts of buer space and bandwidth per source, so that B = Nb and C = Nc. The cell loss rate can be expressed as L(c; b; N) = E[(W n + X n? C? B; 0) + ], when W n and X n have their stationary values. A related easure is the proportion of tie the buer is full, which we denote (c; b; N) = P (W n = B). Alternatively, we ight suppose the buer is innite and study the proportion of tie that the content it is above level B, say Q(c; b; N). Note that L(c; b; N), (c; b; N) and Q(c; b; N) are all functions of, but to lighten the notation this dependence is not shown. The large N asyptotic The large N asyptotic with which we are concerned takes the following for. (c; b; N) = exp(?ni(c; b) + g (c; b; N)); () where li N! g (c; b; N)=N = 0. Both I(c; b) and g (c; b; N) depend on but as we have done above this is suppressed to lighten the notation. The rate I(c; b) is found as the solution to an optiization proble posed in ters of tie dependent logarithic oent generating functions. Asyptotic () can be copared with a well-known asyptotic in B, (c; b; N) = exp(?nbh(c) + g 2 (c; b; N)); (2) where li b! g 2 (c; b; N)=b = 0. This is an asyptotic that has been studied in a long series of papers, by Courcoubetis and Weber (995), de Veciana and Walrand (994), Elwalid and Mitra (993), Kelly (99), Kesidis, Walrand and Chang (993) and Whitt (993). Either () or (2) ay be used to estiate, as exp(?ni(c; b)) or exp(?nbh(c)) respectively. In section 2 we show that I(c; b)=b! H(c) as b! and so if the buer space per source is large then either of these estiates ight be used. However, we nd that it is usually better to base an estiate of on () rather than (2). For one thing, to base an estiate upon the asyptotic for large N takes ore account of what really happens in practice. In the output link of an actual ATM switch, the nuber of sources is of the order 0 3 {0 4 and so it is correct to apply a results that assues N is large. 3

4 One cannot say the sae for the approach that assues the buer is large; in any ATM switch designs, the total buer space ay be oderate, say 00? 200 cells. This eans that in actuality there is a uch saller aount of buering per source than is supposed by use of the estiate based on the large b asyptotic. The utilization of the switch by the bursty trac also have an ipact on the relative erits of the approaches. In an ATM network, soe of the real-tie trac, such as voice and video, will be assigned high priority and soe, such as le transfer and interactive trac, can be delayed and subject to ow control. The real-tie trac will only utilize a proportion of the bandwidth. If we are concerned to odel the high-priority trac fx n g can be considered to be a odel for this trac alone. Siulations show that when the utilization of the switch is low, say X n = (2=3)C, the estiation of the overow rate using the large N asyptotic reains accurate, whereas the estiate based on the large b asyptotic is very poor, overestiating the overow rate by as uch as 0 5. Section 2 begins with a proof of the large N asyptotic. We discuss the for of I(c; b) in cases when b is sall or large, and the iplications of expressing a quality of service constraint as the requireent that I(c; b) should exceed soe target value. In Section 3 we calculate I(c; b) for a Markov odulated uid odel of a source and observe fro soe calculations with typical values that the large N asyptotic does a uch better job of estiating the cell loss rate for this odel than does the large b asyptotic. Our approach reproduces ore easily soe of the results of Weiss that were obtained by a ore rened analysis. In Section 4 we consider a odel of a source as an autoregressive Gaussian process. Again the large N asyptotic does a better job of estiating the cell loss rate than does the large b asyptotic. In the special case where the paraeters of the autoregressive process are chosen so that the source odel becoes relatively unbursty then the large b asyptotic underestiates the cell loss rate, whereas the large N asyptotic continues to overestiate it and therefore lead to conservative decisions. The analysis in this section conrs and explains observations of Choudhury, Lucantoni and Whitt (994a), (994b). Section 5 concludes with a discussion of on-line estiation and of asyptotics for trac whose coposition is unknown. 4

5 2. The large N asyptotic Both the large N and large b asyptotics are expressed in ters of logarithic oent generating functions. Suppose fy i ; Y i 2 ; : : :g denotes cells generated in epochs ; 2; : : :; by a trac source of type i, and dene ' i () = log E "exp X n=!# Yn i : It is well-known that ' i () is a convex increasing function of. We shall also suppose that the asyptotic logarithic oent generating function exists, dened as ' i () = li! 'i (): We write ' () = P i i ' i () and '() = li! ' (). The large b asyptotic of (2) has its rate given by, H(c) = sup[ : c '()=]: (3) Note that H(c) does not depend on N, but only on proportions of the dierent types of trac. Since the sources are independent, and ' i ()= is increasing in, H(c) () c X i ' i () i ; (4) and the quantity ' i ()= is identied as the eective bandwidth of source type i. Exactly the sae asyptotic holds for L(c; b; N), (c; b; N) and Q(c; b; N). In eect, these quantities dier by approxiately constant ultiplicative factors, and these factors are absorbed by g 2. Siulation results have shown that an approxiation of L(c; b; N) by exp(?nbh(c)) can be good for large values of Nb. However, as entioned above, the approxiation is good only if b, the buer per source, is quite large. For realistic specications of an ATM switch, b ay be very sall, and the approxiation can overestiate L(c; b; N) by several orders of agnitude. Equivalently, it overestiates the eective bandwidths. The large N asyptotic result is expressed in the following theore. This result has also recently been proved independently by Dueld (994) and by Sionian and Guilbert (994) for the case of on-o Markov uid sources. Theore For the odel above and under appropriate assuptions, li N! log (c; b; N) =?I(c; b); N 5

6 where I(c; b) = inf sup [(b + c)? ' ()]: (5) For a xed the supreu over in (5) calculates a large deviation coecient (appropriate to an asyptotic in N) for the probability that the buer overows in periods; the way in which this overow occurs is by each of the N sources producing c + b cells, and so contributing an equal share to the total of C + B cells that causes the buer to ll. The inu xes upon the for which this probability is greatest. Proof of Theore. Recall that the switch is odelled as a queue with a constant service rate of Nc. If the buer is overowing at epoch 0 then there ust have been soe epoch,?, at which the buer was last epty and since which at least N(c + b) cells have been received. Thus (c; b; N) P (S > Nc + Nb for soe ), where S = P n= X n. Pick a such that c? '( ) > 2. Then since ' ( )! '( ), there ust be an such that for all >, both and A Cherno bound is that for all > 0, c? ' ( ) > b + > sup[c? ' ()]: P (S > Na) E exp((s? Na)) = exp(?n[a? ' ()]): Using this, with a = c + b, we have Hence P (S > Nc + Nb for soe ) li N! X = X? = X? = P (S > N(b + c)) e?n sup [(b+c)?' ()] + e?n [ b+fc?' ( )g] = X X e?n sup [(b+c)?' ()] + = e?n [ b+] (? )e?n in< sup [(b+c)?' ()] + e?n [ b+]? e?n : log (c; b; N)? in N < sup [(b + c)? ' ()] 6

7 ? inf sup [(b + c)? ' ()]: In the reverse direction, let us consider consecutive epochs. The expected nuber of these epochs in which overow occurs is at least as large as the probability that there is overow during at least one of the epochs. Thus we have that for all, (c; b; N) P (S > Nc + Nb) : Therefore, using Craer's lower bound for the su of N i.i.d. rando variables li N! N As this holds for all, the proof is coplete. log (c; b; N)? sup[(b + c)? ' ()]: By observing fro (5) that for any given, NI(c; b) Nb if and only if for each there exists a such that (b + c)? ' () b, we have the following equivalent expression for bandwidth requireent. Corollary. b I(c; b) b () c sup inf? + ' () : (6) The far right hand side of Equation (6) species the least value that ay be taken by c if the large deviation coecient I is to exceed b (a nuber related to axiu allowable cell loss rate). Alternatively, for xed values of c and, it expresses in ters of the quantity ' () the constraint on the trac that ay be carried by the switch. Notice that there is no notion of eective bandwidths siilar to that which occurring in Equation (4) for the large b asyptotic. The large N asyptotic ay be interpreted in another way: it is as if in a syste, indexed by N, a single source is replaced by the average of N identically distributed sources. The asyptotic is taken as N! while the total buer and total bandwidth are held constant. This asyptotic has been considered by Weiss (983), for identical sources that are Markov odulated uids. His approach is ore rened in that he uses a large deviation result for saple paths to nd the ost likely path by which a buer will ll. We consider now soe issues raised by the large N asyptotic. 7

8 Discretization of tie We have assued a discrete tie odel and it is illuinating to consider how this aects the results. Suppose the length of an epoch is doubled. Then c ust be replaced by 2c, and ' () by ' 2 (). We get I(c; b) = inf sup [(b + 2c)? 2' 2 ()]: So it is as if we are now only taking inf only over the even values of. The answer will be greater. This is to be expected since by taking an epoch to be longer there is soe averaging of the trac within each epoch. This dependence on the discretization is not seen in the analysis of the large b asyptotic. The case of no buer If there is no buer then we have the following. Theore 2 Proof. We have and I(c; 0) = sup[c? ' ()]: I(c; 0) = inf sup [c? ' ()]: (7) ' () = log E log E " exp " = ' (); X n=!# X X n n= exp (X n ) # where the rst inequality follows by convexity. Thus I(c; 0) inf sup [c? ' ()] = sup[ 0 c? ' ( 0 )]: (8) 0 The nal equality follows by letting 0 =. On the other hand, by choosing = in the iniization of (7), the right hand side in (8) attained. Thus I(c; 0) = sup [c? ' ()]. Note that (7) is siply the large deviation asyptotic for the probability that the buer should receive ore than C cells in a single epoch. 8

9 Large buer asyptotics The following theore connects the asyptotics for large b and large N. Theore 3 li b! I(c; b) = H(c): b Proof. Recall that = H(c) satises '( )= = c. Let us take b = (' 0 ( )? c). Note that since ' 0 ( )! ' 0 ( ), as!, we also have b! as!. Furtherore, the growth in b is approxiately linear for large. Thus for any suciently large that b b, b I(c; b) b I(c; b ) b b b b sup [ + (=b )(c? ' ())] b b sup [ + (=b )(c? ' ( )? (? )' 0 ( ))] = b b '0 ( )? ' ( )= ' 0 ( )? '( )= ; where the third inequality follows by convexity of ' (). But by the fact that b grows linearly in for large, we can let! as b! in such a anner that b =b!. So fro the above it follows that li b! b I(c; b) : To establish an inequality in the reverse direction, pick <. Recall that '()= is increasing in and li! ' () = '(). Then there exists 0 such that for all 0, c?' () > 0. So for all 0 we have [b + (c? ' ())] > b and I(c; b) = inf sup [(c + b)? ' ()] inf [b + (c? ' ())] inf in <0 [b + (c? ' ())]; bg = b + in <0 [(c? ' ())? ] The second ter on the right hand side of the nal expression is a constant and hence li b! I(c; b) : b 9

10 Since this holds for all <, the proof is coplete. Notice that in the case that fx n g is a sequence of i.i.d. variables, ' () = '() and so we can take 0 = 0. Thus I(c; b) bh(c) for all b. Moreover, for those b for which b = (' 0 (H(c))? c), = ; 2; : : :, we have I(c; b) = bh(c). Also, fro the rst part of the proof we have at upper bound, and so in the i.i.d. case, H(c) I(c; b) b b b = ('0 (H(c))? c) H(c) b The following corollaries are worth noting. + '0 (H(c))? c b H(c) Corollary 3. As b! the value of that is optial on the right hand side of (5) also tends to innity. Proof. Suppose the result is not true and that for arbitrarily large b, the optial is less than soe 0. Choose any. Then for arbitrarily large values of b, I(c; b) > b inf <0 [ + (=b)(c? ' ())]: This iplies li b! (=b)i(c; b) >. For > H(c) this contradicts Theore 2. Corollary 3.2 g (c; b; N)=b! 0 as b! : Proof. This follows fro g (c; b; N) = log (c; b; N) + NI(c; b). For xed N we have that as b! both log (c; b; N)=b!?H(c) by de Veciana and Walrand (994), and I(c; b)=b! H(c) by Theore 3. Thus g (c; b; N)=b! 0. The shape of the acceptance region Recall that there are N i sources of type i. Thus the trac is dened by the paraeters N and = ( ; : : :; M ). Given a desired loss probability of less than exp(?nb), we ight dene as acceptable those possible ixes of sources 2 R, where R = f : Nb < NI(c; b; )g; 0

11 or equivalently, " b c sup inf? + MX i= # ' i () i : (9) Now we can see that in the case that the cells produced in each period are i.i.d. rando variables, then odulo discreteness eects, the acceptance region is linear. For in this case, ' () = '(), and I(c; b) = inf sup [(b + c)? '()] inf sup t>0 [(b + tc)? t'()] = sup[b : '()= c] = sup " b : X i i ' i ()= c # : So I(c; b) b if and only if '()= c; this is the sae as (4) that holds for the large b asyptotic and shows that in this case the boundary to the acceptance region is linear in the i. However, if we do not disregard discreteness eects, or the cells produced in successive periods are not i.i.d., the shape of the acceptance region can be ore coplicated. To show the eect introduced by the discreteness of we can consider two sources in which the nuber of cells in successive epochs are i.i.d. Gaussian variables, with eans = 5=3, 2 = and variances 2 = =3, 2 2 =. For a source of type i, ' i () = i + 2 i 2 =2. Hence the acceptance region dened in (9) becoes c MX i= i i + sup 2s 4 2b P i i 2 i 3? b 5 : The rst ter is linear in, but the ter within the supreu is concave in. For the values above, and = 2, b =, c = 2, soe values of ; 2 that lie on the boundary of the acceptance region are These show that the boundary of the acceptance region is neither locally concave nor convex. We believe that it is not only because of discreteness of that the shape of the acceptance boundary is not always either concave or convex. However, we have yet to give an exaple of this.

12 Of course we know that I(b; c)=b! H(c), as b! and so the acceptance region dened as Nb NI has a boundary that is asyptotically the linear one dened in Equation (4) by c P i i ' i ()=. 3. Markov odulated uid sources The Markov odulated uid odel of a source is one in which the rate of the source alternates between 0 and a peak rate a according to the state of a continuous tie Markov process. The o and on states have exponentially distributed holding ties with paraeters and respectively. The proportion of tie the source in on is =( + ), and so for sensible scenarios, we require a=( + ) < c < a. Theore was proved under the assuption of a discrete tie odel, but it also clearly holds for the continuous-tie setting here (cf. Dueld (994) for a proof). To nd I(c; b) for the a Markov odulated uid, we will copute the oent generating functions Z t z i;t () = E i exp x(s)ds ; i = 0; ; where x(t) is the uid rate at tie t and i = 0; as the source is o or on initially. Now 0 z 0;t+ = (? )z 0;t + z ;t + o() z ;t+ = e a [z 0;t + (? )z ;t ] + o(): So 0 _z 0 and _z 0 C A B a? 0 C A z 0 z C A z 0;t =! 2! 2?! e! t?!! 2?! e! 2t z ;t =! 2? a! 2?! e! t + a?!! 2?! e! 2t ; where! =?( +? a)? p ( +? a) 2 + 4a 2! 2 =?( +? a) + p ( +? a) 2 + 4a 2 2

13 are the two roots of! 2 + ( +? a)!? a = 0. Hence Z t z t () = E exp x(s)ds The proble which we wish to solve is = 0 + z 0;t() + + z ;t() =! 2 + (! 2? a) (! 2?! )( + ) e! t +?! + (a?! ) (! 2?! )( + ) e! 2t : I(c; b) = inf sup t>0 [(b + tc)? log(z t ())]: By Theore 3, we know that I(c; b)=b! H(c), and also that the t that is optial in the right hand side above tends to as b!. Note that '() = li t! t log z t() =! 2 (): The bandwidth requireent c! 2 ()= () H(c) is precisely that given in other papers, such as Gibbens and Hunt (99). An alternative expression of this constraint is H(c) = ( + )c? a c(a? c) : Nuerical results We have conducted a nuber of experients to deterine the eectiveness of estiating buer overow rates using the large N asyptotic. For a Markov odulated uid odel, Q(c; b; N) = P (W > Nb) can be obtained exactly using techniques of Anick, Mitra and Sondhi (982). To odel a voice source we use the paraeters = 650s, = 353s and a = 64kbps. The ean bandwidth is 22:48kbps. In Figure, we take c to be as :5 ties the ean rate, i.e., 33:72kbps. We plot as functions of b graphs of I(c; b), bh(c) and the exact value of (=N) log Q(c; b; N) as coputed using the forula of Anick, et. al. for N = 50; 00. Notice that the large N asyptotic is a uch better estiator of Q(c; b; N) than is the large b asyptotic, and that it is ore exact for larger N. For exaple, at b = 0:05,?(=N) log Q(c; b; N) is 0:0903 for N = 50, 0:09758 for N = 00; these are well-estiated by I(c; b) = 0:07989, but not by bh(c) = 0:0024. Both estiates are conservative in the sense that they both overestiate the true probability that the queue should exceed N b. 3

14 The shape of I(c; b) near b = 0 Our nuerical results agree with the calculations of Weiss (983) that for the Markov odulated uid the behavior for sall b is I(c; b) = C + C 2 p b. We have not been able to establish the p b behavior fro (5), but we can copute the constant C = I(c; 0). Following the ideas in Theore 2, suppose s is very large. Then I(c; 0) = inf sup s>t>0 inf sup s>t>0 [tc? t' t ()] [n(t=n)c? (t=n)' t=n (n)] = inf sup[tc? t' t ()] s=n>t>0 li [tc? t' t ()] sup t!0 h = li sup tc? log E[exp([tX(0) + o(t)])] t!0 "!# e = li sup c? log a t! o(t)=t = c 0 c 0 log + (? c 0? c 0 ) log ; p? p where p = =( + ) and c 0 = c=a. Clearly I(c; 0) li t!0 sup [tc? t' t ()]. So this is in fact the value of I(c; 0), and it is just the asyptotic rate for the probability that the nuber of on sources exceeds c=a. i 4. Gaussian sources Gaussian stationary sources Suppose fx n g is the superposition of N Gaussian sources, each distributed as fy n g with ean, variance 2 and autocovariance function (k). Then ' () = =2, where 2 is given by 2 = var X i= Y i! = 2 + 2[(? )() + (? 2)(2) + + (? )]: Notice that li! 2 =, where is the index of dispersion and equal to P? (k). Now I(c; b) = inf (b + c? ) 2 ; 2 2 with the optiu achieved by = (b + c? )= 2. 4

15 Also the bandwidth requireent (6) is b c sup inf? + ' () with the optiu achieved by = p 2b= 2. 2 = sup 4 s2b + 2 3? b 5 ; An autoregressive source A siple autoregression has soeties been used as a odel for a videotelephone source. Let us take Y n = Y n? + (? ) + n ; where f n g is Gaussian white noise with variance 2. Then 2 = 2 =(? 2 ), = ( + ) 2 =(? ) and 2 can be derived as follows. 2 = (? ) 2? ( ? ) 2 = (? ) 2? + 2 2??? 2 = (? ) + + (? 2 )? (? ) 2? =?(? 2) ? = +? 2? 2? + (? ) 2 2 =? 2 (? ) (? ) 2 2 : "?? 2? +? It turns out that 2 is a convex increasing function of when > 0. Notice 2 =? 2 (? ) (? ) 2 2 < if > 0. But 2 > for < 0. Now since '() is quadratic in, we can easily nd that sup[(b + c)? ' ()] = (b + c? )2 2? 4 (? ) (?) 2 2 : For large b this is iniized by large, and so assuing is sall this is iniized with respect to by ' b c? + =; # 5

16 where The optial value is I(c; b) ' 2b(c? ) + = 4 (? ) 2 2 : (c? )2 2b(c? ) 4(c? )2 = + 2 ( + ) 2 : 2 This can be copared with bh(c) = 2b(c? )=. One sees that bh(c) < I(c; b) when > 0, but that the inequality is reversed when < 0. The case > 0 corresponds to a relatively bursty source, while < 0 corresponds to relatively sooth source, because of the negative rst order autocorrelation. When > 0 the use of the large b asyptotic to estiate L(c; b; N) leads to a larger estiate of cell loss rate than does the large N asyptotic: the experiental evidence is that both asyptotics lead to over-estiates of the true cell loss rate but that the large N asyptotic is closer. When < 0 the large b asyptotic estiates a saller loss rate than the estiate based on a large N asyptotic: the experiental evidence is that the large b asyptotic under-estiates the true loss rate while the large N asyptotics over-estiates it and is closer. In this case the large N asyptotic is clearly preferable. Nuerical results For an autoregressive Gaussian process with =?0:5, = 8, 2 = 64 and c = 8:5, we plot exp(?n bi(b; c)) and exp(?bh(c)) against b, together with siulation results (over 2,000,000 epochs) for the probability Q(c; b; N) = P (W > Nb), for N = 000 and ve values of b, :0; :2; :4; :6; :8. The proportion of the tie that the buer is epty is 60.95%. Figure 2 shows that for these sall aounts of buer per source, the large N asyptotic over-estiates the tail probability by a factor of about 2{3, while the large N asyptotic under-estiates it by a factor of about 2{5. For exaple, at b = :2, the true value has a 95% condence interval (92; 04) 0?5, and ean 98 0?5 ; the large N asyptotic gives 263 0?5 and the large b asyptotic give 32 0?5. The sign of I(c; b)? bh(c) The above exaple is illuinating in considering the dierence between the large N and large b asyptotics. Our results are consistent with the work of Choudhury, Lucantoni and Whitt 6

17 (994a), (994b), who discuss the fact that their nuerical experience suggests that the large B asyptotic should be odied by prior ultiplication by an exponential factor in N, so Q(c; b; N) e?n e?b : This can now be explained theoretically by writing Q(c; b; N) = e?ni(c;b)+g (c;b;n ) = e?n [I(c;b)?bH(c)]?NbH(c)+g (c;b;n ) = e?n [I(c;b)?bH(c)?g (c;b;n )=N ] e?bh(c) : Of course = H(c) and g (c; b; N)=N! 0 as N! with b xed. It is therefore clear that has the sign of I(c; b)? bh(c)? g (c; b; N)=N which for xed b is deterined by the sign of I(c; b)? bh(c) for large N. We have seen in the discussion above that I(c; b) > bh(c) when > 0 and I(c; b) < bh(c) when < 0, and that these correspond to greater or less burstiness of the source, and give > 0 and < 0 respectively. Notice that I(c; b) > bh(c) if ' () > '(), for all and. Note that if for two rando variables, X and Y, E exp(x) > E exp(y ) then X is ore variable than Y. Siilarly, an ordering of oent generating functions corresponds to a ordering of burstiness. This eans that the quantity of cells arriving over a nuber of periods is actually less bursty than is iplicitly assued when ones uses with '() in (3) to calculate H(c). Therefore exp(?bh(c)) tends to overestiate Q(c; b; N). In the cases we have considered it appears that ' () is onotone in, and thus > 0 and ' () < '(), corresponds to the case in which ' () < ' (), and in which we would say that the source is `ore bursty than Poisson', in the sense that for a Poisson source, or any which is i.i.d., we have ' () = ' (). The sae coents apply, with inequalities reversed, so < 0 occurs for sources that are `less bursty than Poisson.' 5. Open issues and rearks On-line estiation An iportant issue in ATM networks is the accurate and tiely estiation of the cell-loss probabilities that occur at various switches in the network, so that correct decisions can be 7

18 ade about whether or not to accept ore trac or how it should be routed. A generic proble that the network anageent syste faces is that because the events of interest are rare, e.g., cells loss rates of the order of 0?6? 0?0, any brute-force on-line estiation procedure would fail because of the large tie that would be required to ake an accurate estiate. Providing a reasonable condence interval for the estiator requires tie of the order of agnitude of tens of inutes, which is ipractical since decisions about accepting new trac in the network ust be done iediately, and because the coposition of the trac can change in such a large tie interval. The large N asyptotic can be used to estiate in real-tie the cell loss rate in the following anner. Suppose N sources (coprising N i sources of type i) are active in a switch with total bandwidth C and total buer B. Suppose that we can ake an on-line easureent to estiate the cell loss rate that would occur if N=k sources were routed through a switch that has total bandwidth C=k and total buer B=k. This can be done by a special device at the switch level which siulates a `virtual' switch of =k the size of the actual one, operating on a representative saple of the actual input of size =k. The device provides an estiator of the buer overow rate that occurs in the virtual syste. The large N asyptotic suggests that the loss rate in the virtual syste should be about p = exp(?ni(c; b)=k), hence it can be estiated accurately in a tie that is orders of agnitude saller than the tie required to ake an estiate of the buer overow rate in the original syste, and we can extrapolate the actual loss rate to be p k. For exaple, suppose the channel is carrying 000 sources, with a loss rate of about 0?0. As we have already entioned, such a sall cell loss rate is dicult to easure directly. However, an on-line easureent of the loss rate for 200 sources in a virtual syste with one-fth the bandwidth and buer space should easure a loss rate p of about 0?2. At this loss rate cell losses will be observed in a relatively short tie and the loss rate can be easured satisfactorily. Then p 5 is an estiate of the actual cell loss rate. Of course there is the opportunity to ake ve independent estiates of p, using ve groups of 200 sources. This idea can be rened further to provide a ore accurate estiate of the cell-loss probability by coputing the o(n) ters in (). On can assue that (N) = AN exp(?ni) and estiate the values of A,, I by easuring in three virtual systes of size N=k ; N=k 2 ; N=k 3, where N=k < N=k 2 < N=k 3 << N. Then (N) is coputed by substituting the correspond- 8

19 ing values. This provides an alternative to the MINOS procedure described in Courcoubetis et al. (995). Nuerical work has validated the utility of this heuristic approach. Trac of rando coposition The class of trac ay not be known exactly. Suppose that a certain class of trac the sources are actually of k possible types, with each source having probability p i of being of type i. The probability of buer overow is axiized when the observed ix deviates fro the expected ix in an appropriate way and sources produce cells at above their ean rates. The probability that N sources of such rando ixture should have epirical distribution ; : : :; k is P () = exp?n kx i= and thus taking the product of probabilities, li N! log (c; b) =? inf N P inf sup M i : i= i= i log( i =p i ) + o(n) " (b + c)? kx i=! ; i f' i ()? log( i =p i )g Assuing the optiization over i occurs at an interior point, the stationarity condition iplies i is proportional to p i exp(' i ()), and hence after soe algebra, # : I (c; b) = li N! N =? inf sup =? inf sup log (c; b) " " (b + c)? log (b + c)? log kx i= kx i= h i!# p i E exp S i p i exp(' i ())!# ; (0) where S i has the stationary distribution of the nuber of cells produced by a source of type i over epochs. Note that the nal ter in (0) is, by convexity, log kx i= p i exp(' i ())! kx i= p i ' i ()) = ' (); and thus the asyptotic overow frequency, given by (0), is greater than when the ix is known exactly. Then as b! the optial value of tends to innity and the su in (0) is doinated by the axial ter, hence I (c; b) li b! b = H (c) = axf : ' i ()= < c; for all ig = in H i (c); i 9

20 where H i (c) is obtained for a source consisting only of type i. Siilarly, H (c) > if and only if ' i ()= < c for all i, and so this analysis concludes that the eective bandwidth of the rando ix is equal to the axiu of the eective bandwidths of the individual source types. This akes sense since the ost likely way that a single source of unknown type will ll a large buer is if the source type turns out to be the ost bursty of the k possible types. Open probles A nuber of further issues require study. These include: (a) the ecient nuerical solution of the double optiization proble dening I(c; b); it is not clear that the function always has a saddle point, though this is the case in the exaples we have studied; (b) further understanding of the properties of the solution and the iplied acceptance region, and (c) the on-line estiate of the ' (), or on-line estiation of I(c; b). Acknowledgent We are very grateful to Georgos Fouskas for coputing the nuerical result reported in Sections 4 and 5. References Anick, D., Mitra, D. and Sondhi, M. (982) Stochastic theory of a data-handling syste with ultiple sources. The Bell Syste Technical Journal 6, 872{894. Choudhury, G., Lucantoni, D. and Whitt, W. (994a) On the eectiveness of eective bandwidths for adission control in ATM networks. In J. Labetouille and J. Roberts, eds., ITC, volue 4, pp. 4{420. Elsevier Sciences B.V. Choudhury, G., Lucantoni, D. and Whitt, W. (994b) Squeezing the ost out of ATM. Preprint. Courcoubetis, C., Kesidis, G., Ridder, A., Walrand, J. and Weber, R. (995) Adission control and routing in ATM networks using inferences fro easured buer occupancy. IEEE Transactions on Counications 43, 778{

21 Courcoubetis, C. and Weber, R. (995) Eective bandwidths for stationary sources. Probability in the Engineering and Inforational Sciences 9, 285{296. to appear. de Veciana, G. and Walrand, J. (994) Eective bandwidths: call adission, trac policing and ltering for ATM networks. to appear in Queueing Systes. Duffield, N. (994) Econoies of scale in queues with sources having power-law large deviation scalings. Preprint. Elwalid, A. and Mitra, D. (993) Eective bandwidth of general Markovian trac sources and adission control of high speed networks. IEEE/ACM Trans. Networking, 329{343. Gibbens, R. and Hunt, P. (99) Eective bandwidths for the ulti-type UAS channel. Queueing Systes, 7{28. Kelly, F. (99) Eective bandwidths at ulti-class queues. Queueing Systes 9, 5{5. Kesidis, G., Walrand, J. and Chang, C. (993) Eective bandwidths for ulticlass Markov uids and other ATM sources. IEEE/ACM Transactions on Networking, 424{428. Sionian, A. and Guilbert, J. (994) Large deviations approxiation for uid queues fed by a large nuber of on-o sources. Preprint. Weiss, A. (983) The large deviation of a Markov process which odels trac generation. Technical report, AT&T Bell Laboratories. Whitt, W. (993) Tail probabilities with statistical ultiplexing and eective bandwidths in ulti-class queues. Telecounication Systes 2, 7{07. 2

On the Performance of an Eective Bandwidths Formula. Costas Courcoubetis, George Fouskas. and Richard Weber y. Abstract

On the Performance of an Eective Bandwidths Formula. Costas Courcoubetis, George Fouskas. and Richard Weber y. Abstract On the Performance of an Eective Bandwidths Formula Costas Courcoubetis, George Fouskas and Richard Weber y Abstract At a buered switch in an ATM (asynchronous transfer mode) network it is important to

More information

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science

A Better Algorithm For an Ancient Scheduling Problem. David R. Karger Steven J. Phillips Eric Torng. Department of Computer Science A Better Algorith For an Ancient Scheduling Proble David R. Karger Steven J. Phillips Eric Torng Departent of Coputer Science Stanford University Stanford, CA 9435-4 Abstract One of the oldest and siplest

More information

Bootstrapping Dependent Data

Bootstrapping Dependent Data Bootstrapping Dependent Data One of the key issues confronting bootstrap resapling approxiations is how to deal with dependent data. Consider a sequence fx t g n t= of dependent rando variables. Clearly

More information

Non-Parametric Non-Line-of-Sight Identification 1

Non-Parametric Non-Line-of-Sight Identification 1 Non-Paraetric Non-Line-of-Sight Identification Sinan Gezici, Hisashi Kobayashi and H. Vincent Poor Departent of Electrical Engineering School of Engineering and Applied Science Princeton University, Princeton,

More information

A Simple Regression Problem

A Simple Regression Problem A Siple Regression Proble R. M. Castro March 23, 2 In this brief note a siple regression proble will be introduced, illustrating clearly the bias-variance tradeoff. Let Y i f(x i ) + W i, i,..., n, where

More information

On Constant Power Water-filling

On Constant Power Water-filling On Constant Power Water-filling Wei Yu and John M. Cioffi Electrical Engineering Departent Stanford University, Stanford, CA94305, U.S.A. eails: {weiyu,cioffi}@stanford.edu Abstract This paper derives

More information

Simulation of Discrete Event Systems

Simulation of Discrete Event Systems Siulation of Discrete Event Systes Unit 9 Queueing Models Fall Winter 207/208 Prof. Dr.-Ing. Dipl.-Wirt.-Ing. Sven Tackenberg Benedikt Andrew Latos M.Sc.RWTH Chair and Institute of Industrial Engineering

More information

In Proceedings of the 13th U.K. Workshop on Performance Engineering of Computer. and Telecommunication Systems (UKPEW'97), July 1997, Ilkley, U.K.

In Proceedings of the 13th U.K. Workshop on Performance Engineering of Computer. and Telecommunication Systems (UKPEW'97), July 1997, Ilkley, U.K. In Proceedings of the 13th U.K. Workshop on Performance Engineering of Computer and Telecommunication Systems (UKPEW'97), July 1997, Ilkley, U.K. Investigation of Cell Scale and Burst Scale Eects on the

More information

Block designs and statistics

Block designs and statistics Bloc designs and statistics Notes for Math 447 May 3, 2011 The ain paraeters of a bloc design are nuber of varieties v, bloc size, nuber of blocs b. A design is built on a set of v eleents. Each eleent

More information

The Weierstrass Approximation Theorem

The Weierstrass Approximation Theorem 36 The Weierstrass Approxiation Theore Recall that the fundaental idea underlying the construction of the real nubers is approxiation by the sipler rational nubers. Firstly, nubers are often deterined

More information

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy

Nonmonotonic Networks. a. IRST, I Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I Povo (Trento) Italy Storage Capacity and Dynaics of Nononotonic Networks Bruno Crespi a and Ignazio Lazzizzera b a. IRST, I-38050 Povo (Trento) Italy, b. Univ. of Trento, Physics Dept., I-38050 Povo (Trento) Italy INFN Gruppo

More information

lecture 36: Linear Multistep Mehods: Zero Stability

lecture 36: Linear Multistep Mehods: Zero Stability 95 lecture 36: Linear Multistep Mehods: Zero Stability 5.6 Linear ultistep ethods: zero stability Does consistency iply convergence for linear ultistep ethods? This is always the case for one-step ethods,

More information

An Extension to the Tactical Planning Model for a Job Shop: Continuous-Time Control

An Extension to the Tactical Planning Model for a Job Shop: Continuous-Time Control An Extension to the Tactical Planning Model for a Job Shop: Continuous-Tie Control Chee Chong. Teo, Rohit Bhatnagar, and Stephen C. Graves Singapore-MIT Alliance, Nanyang Technological Univ., and Massachusetts

More information

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair

A Simplified Analytical Approach for Efficiency Evaluation of the Weaving Machines with Automatic Filling Repair Proceedings of the 6th SEAS International Conference on Siulation, Modelling and Optiization, Lisbon, Portugal, Septeber -4, 006 0 A Siplified Analytical Approach for Efficiency Evaluation of the eaving

More information

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE

MSEC MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL SOLUTION FOR MAINTENANCE AND PERFORMANCE Proceeding of the ASME 9 International Manufacturing Science and Engineering Conference MSEC9 October 4-7, 9, West Lafayette, Indiana, USA MSEC9-8466 MODELING OF DEGRADATION PROCESSES TO OBTAIN AN OPTIMAL

More information

3.8 Three Types of Convergence

3.8 Three Types of Convergence 3.8 Three Types of Convergence 3.8 Three Types of Convergence 93 Suppose that we are given a sequence functions {f k } k N on a set X and another function f on X. What does it ean for f k to converge to

More information

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES

TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES TEST OF HOMOGENEITY OF PARALLEL SAMPLES FROM LOGNORMAL POPULATIONS WITH UNEQUAL VARIANCES S. E. Ahed, R. J. Tokins and A. I. Volodin Departent of Matheatics and Statistics University of Regina Regina,

More information

Lost-Sales Problems with Stochastic Lead Times: Convexity Results for Base-Stock Policies

Lost-Sales Problems with Stochastic Lead Times: Convexity Results for Base-Stock Policies OPERATIONS RESEARCH Vol. 52, No. 5, Septeber October 2004, pp. 795 803 issn 0030-364X eissn 1526-5463 04 5205 0795 infors doi 10.1287/opre.1040.0130 2004 INFORMS TECHNICAL NOTE Lost-Sales Probles with

More information

A Note on the Applied Use of MDL Approximations

A Note on the Applied Use of MDL Approximations A Note on the Applied Use of MDL Approxiations Daniel J. Navarro Departent of Psychology Ohio State University Abstract An applied proble is discussed in which two nested psychological odels of retention

More information

The Transactional Nature of Quantum Information

The Transactional Nature of Quantum Information The Transactional Nature of Quantu Inforation Subhash Kak Departent of Coputer Science Oklahoa State University Stillwater, OK 7478 ABSTRACT Inforation, in its counications sense, is a transactional property.

More information

Biostatistics Department Technical Report

Biostatistics Department Technical Report Biostatistics Departent Technical Report BST006-00 Estiation of Prevalence by Pool Screening With Equal Sized Pools and a egative Binoial Sapling Model Charles R. Katholi, Ph.D. Eeritus Professor Departent

More information

New upper bound for the B-spline basis condition number II. K. Scherer. Institut fur Angewandte Mathematik, Universitat Bonn, Bonn, Germany.

New upper bound for the B-spline basis condition number II. K. Scherer. Institut fur Angewandte Mathematik, Universitat Bonn, Bonn, Germany. New upper bound for the B-spline basis condition nuber II. A proof of de Boor's 2 -conjecture K. Scherer Institut fur Angewandte Matheati, Universitat Bonn, 535 Bonn, Gerany and A. Yu. Shadrin Coputing

More information

Measuring Temperature with a Silicon Diode

Measuring Temperature with a Silicon Diode Measuring Teperature with a Silicon Diode Due to the high sensitivity, nearly linear response, and easy availability, we will use a 1N4148 diode for the teperature transducer in our easureents 10 Analysis

More information

1 Bounding the Margin

1 Bounding the Margin COS 511: Theoretical Machine Learning Lecturer: Rob Schapire Lecture #12 Scribe: Jian Min Si March 14, 2013 1 Bounding the Margin We are continuing the proof of a bound on the generalization error of AdaBoost

More information

On Conditions for Linearity of Optimal Estimation

On Conditions for Linearity of Optimal Estimation On Conditions for Linearity of Optial Estiation Erah Akyol, Kuar Viswanatha and Kenneth Rose {eakyol, kuar, rose}@ece.ucsb.edu Departent of Electrical and Coputer Engineering University of California at

More information

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon

Model Fitting. CURM Background Material, Fall 2014 Dr. Doreen De Leon Model Fitting CURM Background Material, Fall 014 Dr. Doreen De Leon 1 Introduction Given a set of data points, we often want to fit a selected odel or type to the data (e.g., we suspect an exponential

More information

Asynchronous Gossip Algorithms for Stochastic Optimization

Asynchronous Gossip Algorithms for Stochastic Optimization Asynchronous Gossip Algoriths for Stochastic Optiization S. Sundhar Ra ECE Dept. University of Illinois Urbana, IL 680 ssrini@illinois.edu A. Nedić IESE Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu

More information

ma x = -bv x + F rod.

ma x = -bv x + F rod. Notes on Dynaical Systes Dynaics is the study of change. The priary ingredients of a dynaical syste are its state and its rule of change (also soeties called the dynaic). Dynaical systes can be continuous

More information

Machine Learning Basics: Estimators, Bias and Variance

Machine Learning Basics: Estimators, Bias and Variance Machine Learning Basics: Estiators, Bias and Variance Sargur N. srihari@cedar.buffalo.edu This is part of lecture slides on Deep Learning: http://www.cedar.buffalo.edu/~srihari/cse676 1 Topics in Basics

More information

have long been used to odel telecounication networks (see for exaple, [16, page 203], [17], and, for a ore recent discussion, [18]), and the iplied co

have long been used to odel telecounication networks (see for exaple, [16, page 203], [17], and, for a ore recent discussion, [18]), and the iplied co Distributed Adission Control Frank P. Kelly, Peter B. Key and Stan Zachary Abstract This paper describes a fraework for adission control for a packet-based network where the decisions are taken by edge

More information

e-companion ONLY AVAILABLE IN ELECTRONIC FORM

e-companion ONLY AVAILABLE IN ELECTRONIC FORM OPERATIONS RESEARCH doi 10.1287/opre.1070.0427ec pp. ec1 ec5 e-copanion ONLY AVAILABLE IN ELECTRONIC FORM infors 07 INFORMS Electronic Copanion A Learning Approach for Interactive Marketing to a Custoer

More information

Lower Bounds for Quantized Matrix Completion

Lower Bounds for Quantized Matrix Completion Lower Bounds for Quantized Matrix Copletion Mary Wootters and Yaniv Plan Departent of Matheatics University of Michigan Ann Arbor, MI Eail: wootters, yplan}@uich.edu Mark A. Davenport School of Elec. &

More information

In this chapter, we consider several graph-theoretic and probabilistic models

In this chapter, we consider several graph-theoretic and probabilistic models THREE ONE GRAPH-THEORETIC AND STATISTICAL MODELS 3.1 INTRODUCTION In this chapter, we consider several graph-theoretic and probabilistic odels for a social network, which we do under different assuptions

More information

Sharp Time Data Tradeoffs for Linear Inverse Problems

Sharp Time Data Tradeoffs for Linear Inverse Problems Sharp Tie Data Tradeoffs for Linear Inverse Probles Saet Oyak Benjain Recht Mahdi Soltanolkotabi January 016 Abstract In this paper we characterize sharp tie-data tradeoffs for optiization probles used

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE7C (Spring 018: Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee7c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee7c@berkeley.edu October 15,

More information

Analyzing Simulation Results

Analyzing Simulation Results Analyzing Siulation Results Dr. John Mellor-Cruey Departent of Coputer Science Rice University johnc@cs.rice.edu COMP 528 Lecture 20 31 March 2005 Topics for Today Model verification Model validation Transient

More information

CS Lecture 13. More Maximum Likelihood

CS Lecture 13. More Maximum Likelihood CS 6347 Lecture 13 More Maxiu Likelihood Recap Last tie: Introduction to axiu likelihood estiation MLE for Bayesian networks Optial CPTs correspond to epirical counts Today: MLE for CRFs 2 Maxiu Likelihood

More information

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors

New Slack-Monotonic Schedulability Analysis of Real-Time Tasks on Multiprocessors New Slack-Monotonic Schedulability Analysis of Real-Tie Tasks on Multiprocessors Risat Mahud Pathan and Jan Jonsson Chalers University of Technology SE-41 96, Göteborg, Sweden {risat, janjo}@chalers.se

More information

The degree of a typical vertex in generalized random intersection graph models

The degree of a typical vertex in generalized random intersection graph models Discrete Matheatics 306 006 15 165 www.elsevier.co/locate/disc The degree of a typical vertex in generalized rando intersection graph odels Jerzy Jaworski a, Michał Karoński a, Dudley Stark b a Departent

More information

Graphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes

Graphical Models in Local, Asymmetric Multi-Agent Markov Decision Processes Graphical Models in Local, Asyetric Multi-Agent Markov Decision Processes Ditri Dolgov and Edund Durfee Departent of Electrical Engineering and Coputer Science University of Michigan Ann Arbor, MI 48109

More information

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis

Soft Computing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Soft Coputing Techniques Help Assign Weights to Different Factors in Vulnerability Analysis Beverly Rivera 1,2, Irbis Gallegos 1, and Vladik Kreinovich 2 1 Regional Cyber and Energy Security Center RCES

More information

Fairness via priority scheduling

Fairness via priority scheduling Fairness via priority scheduling Veeraruna Kavitha, N Heachandra and Debayan Das IEOR, IIT Bobay, Mubai, 400076, India vavitha,nh,debayan}@iitbacin Abstract In the context of ulti-agent resource allocation

More information

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices

13.2 Fully Polynomial Randomized Approximation Scheme for Permanent of Random 0-1 Matrices CS71 Randoness & Coputation Spring 018 Instructor: Alistair Sinclair Lecture 13: February 7 Disclaier: These notes have not been subjected to the usual scrutiny accorded to foral publications. They ay

More information

DEPARTMENT OF ECONOMETRICS AND BUSINESS STATISTICS

DEPARTMENT OF ECONOMETRICS AND BUSINESS STATISTICS ISSN 1440-771X AUSTRALIA DEPARTMENT OF ECONOMETRICS AND BUSINESS STATISTICS An Iproved Method for Bandwidth Selection When Estiating ROC Curves Peter G Hall and Rob J Hyndan Working Paper 11/00 An iproved

More information

Necessity of low effective dimension

Necessity of low effective dimension Necessity of low effective diension Art B. Owen Stanford University October 2002, Orig: July 2002 Abstract Practitioners have long noticed that quasi-monte Carlo ethods work very well on functions that

More information

IN modern society that various systems have become more

IN modern society that various systems have become more Developent of Reliability Function in -Coponent Standby Redundant Syste with Priority Based on Maxiu Entropy Principle Ryosuke Hirata, Ikuo Arizono, Ryosuke Toohiro, Satoshi Oigawa, and Yasuhiko Takeoto

More information

Keywords: Estimator, Bias, Mean-squared error, normality, generalized Pareto distribution

Keywords: Estimator, Bias, Mean-squared error, normality, generalized Pareto distribution Testing approxiate norality of an estiator using the estiated MSE and bias with an application to the shape paraeter of the generalized Pareto distribution J. Martin van Zyl Abstract In this work the norality

More information

Solutions of some selected problems of Homework 4

Solutions of some selected problems of Homework 4 Solutions of soe selected probles of Hoework 4 Sangchul Lee May 7, 2018 Proble 1 Let there be light A professor has two light bulbs in his garage. When both are burned out, they are replaced, and the next

More information

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis

Experimental Design For Model Discrimination And Precise Parameter Estimation In WDS Analysis City University of New York (CUNY) CUNY Acadeic Works International Conference on Hydroinforatics 8-1-2014 Experiental Design For Model Discriination And Precise Paraeter Estiation In WDS Analysis Giovanna

More information

COS 424: Interacting with Data. Written Exercises

COS 424: Interacting with Data. Written Exercises COS 424: Interacting with Data Hoework #4 Spring 2007 Regression Due: Wednesday, April 18 Written Exercises See the course website for iportant inforation about collaboration and late policies, as well

More information

SPECTRUM sensing is a core concept of cognitive radio

SPECTRUM sensing is a core concept of cognitive radio World Acadey of Science, Engineering and Technology International Journal of Electronics and Counication Engineering Vol:6, o:2, 202 Efficient Detection Using Sequential Probability Ratio Test in Mobile

More information

Supplementary Information for Design of Bending Multi-Layer Electroactive Polymer Actuators

Supplementary Information for Design of Bending Multi-Layer Electroactive Polymer Actuators Suppleentary Inforation for Design of Bending Multi-Layer Electroactive Polyer Actuators Bavani Balakrisnan, Alek Nacev, and Elisabeth Sela University of Maryland, College Park, Maryland 074 1 Analytical

More information

1 Identical Parallel Machines

1 Identical Parallel Machines FB3: Matheatik/Inforatik Dr. Syaantak Das Winter 2017/18 Optiizing under Uncertainty Lecture Notes 3: Scheduling to Miniize Makespan In any standard scheduling proble, we are given a set of jobs J = {j

More information

Detection and Estimation Theory

Detection and Estimation Theory ESE 54 Detection and Estiation Theory Joseph A. O Sullivan Sauel C. Sachs Professor Electronic Systes and Signals Research Laboratory Electrical and Systes Engineering Washington University 11 Urbauer

More information

Prerequisites. We recall: Theorem 2 A subset of a countably innite set is countable.

Prerequisites. We recall: Theorem 2 A subset of a countably innite set is countable. Prerequisites 1 Set Theory We recall the basic facts about countable and uncountable sets, union and intersection of sets and iages and preiages of functions. 1.1 Countable and uncountable sets We can

More information

Probability Distributions

Probability Distributions Probability Distributions In Chapter, we ephasized the central role played by probability theory in the solution of pattern recognition probles. We turn now to an exploration of soe particular exaples

More information

Hybrid System Identification: An SDP Approach

Hybrid System Identification: An SDP Approach 49th IEEE Conference on Decision and Control Deceber 15-17, 2010 Hilton Atlanta Hotel, Atlanta, GA, USA Hybrid Syste Identification: An SDP Approach C Feng, C M Lagoa, N Ozay and M Sznaier Abstract The

More information

Testing the lag length of vector autoregressive models: A power comparison between portmanteau and Lagrange multiplier tests

Testing the lag length of vector autoregressive models: A power comparison between portmanteau and Lagrange multiplier tests Working Papers 2017-03 Testing the lag length of vector autoregressive odels: A power coparison between portanteau and Lagrange ultiplier tests Raja Ben Hajria National Engineering School, University of

More information

Computable Shell Decomposition Bounds

Computable Shell Decomposition Bounds Coputable Shell Decoposition Bounds John Langford TTI-Chicago jcl@cs.cu.edu David McAllester TTI-Chicago dac@autoreason.co Editor: Leslie Pack Kaelbling and David Cohn Abstract Haussler, Kearns, Seung

More information

Ch 12: Variations on Backpropagation

Ch 12: Variations on Backpropagation Ch 2: Variations on Backpropagation The basic backpropagation algorith is too slow for ost practical applications. It ay take days or weeks of coputer tie. We deonstrate why the backpropagation algorith

More information

Lecture 21. Interior Point Methods Setup and Algorithm

Lecture 21. Interior Point Methods Setup and Algorithm Lecture 21 Interior Point Methods In 1984, Kararkar introduced a new weakly polynoial tie algorith for solving LPs [Kar84a], [Kar84b]. His algorith was theoretically faster than the ellipsoid ethod and

More information

3.3 Variational Characterization of Singular Values

3.3 Variational Characterization of Singular Values 3.3. Variational Characterization of Singular Values 61 3.3 Variational Characterization of Singular Values Since the singular values are square roots of the eigenvalues of the Heritian atrices A A and

More information

Birthday Paradox Calculations and Approximation

Birthday Paradox Calculations and Approximation Birthday Paradox Calculations and Approxiation Joshua E. Hill InfoGard Laboratories -March- v. Birthday Proble In the birthday proble, we have a group of n randoly selected people. If we assue that birthdays

More information

arxiv: v1 [cs.ds] 3 Feb 2014

arxiv: v1 [cs.ds] 3 Feb 2014 arxiv:40.043v [cs.ds] 3 Feb 04 A Bound on the Expected Optiality of Rando Feasible Solutions to Cobinatorial Optiization Probles Evan A. Sultani The Johns Hopins University APL evan@sultani.co http://www.sultani.co/

More information

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay

A Low-Complexity Congestion Control and Scheduling Algorithm for Multihop Wireless Networks with Order-Optimal Per-Flow Delay A Low-Coplexity Congestion Control and Scheduling Algorith for Multihop Wireless Networks with Order-Optial Per-Flow Delay Po-Kai Huang, Xiaojun Lin, and Chih-Chun Wang School of Electrical and Coputer

More information

Expected Behavior of Bisection Based Methods for Counting and. Computing the Roots of a Function D.J. KAVVADIAS, F.S. MAKRI, M.N.

Expected Behavior of Bisection Based Methods for Counting and. Computing the Roots of a Function D.J. KAVVADIAS, F.S. MAKRI, M.N. Expected Behavior of Bisection Based Methods for Counting and Coputing the Roots of a Function D.J. KAVVADIAS, F.S. MAKRI, M.N. VRAHATIS Departent of Matheatics, University of Patras, GR-261.10 Patras,

More information

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation

On the Communication Complexity of Lipschitzian Optimization for the Coordinated Model of Computation journal of coplexity 6, 459473 (2000) doi:0.006jco.2000.0544, available online at http:www.idealibrary.co on On the Counication Coplexity of Lipschitzian Optiization for the Coordinated Model of Coputation

More information

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation

Course Notes for EE227C (Spring 2018): Convex Optimization and Approximation Course Notes for EE227C (Spring 2018): Convex Optiization and Approxiation Instructor: Moritz Hardt Eail: hardt+ee227c@berkeley.edu Graduate Instructor: Max Sichowitz Eail: sichow+ee227c@berkeley.edu October

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search Quantu algoriths (CO 781, Winter 2008) Prof Andrew Childs, University of Waterloo LECTURE 15: Unstructured search and spatial search ow we begin to discuss applications of quantu walks to search algoriths

More information

Learnability and Stability in the General Learning Setting

Learnability and Stability in the General Learning Setting Learnability and Stability in the General Learning Setting Shai Shalev-Shwartz TTI-Chicago shai@tti-c.org Ohad Shair The Hebrew University ohadsh@cs.huji.ac.il Nathan Srebro TTI-Chicago nati@uchicago.edu

More information

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography

Tight Bounds for Maximal Identifiability of Failure Nodes in Boolean Network Tomography Tight Bounds for axial Identifiability of Failure Nodes in Boolean Network Toography Nicola Galesi Sapienza Università di Roa nicola.galesi@uniroa1.it Fariba Ranjbar Sapienza Università di Roa fariba.ranjbar@uniroa1.it

More information

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis

E0 370 Statistical Learning Theory Lecture 6 (Aug 30, 2011) Margin Analysis E0 370 tatistical Learning Theory Lecture 6 (Aug 30, 20) Margin Analysis Lecturer: hivani Agarwal cribe: Narasihan R Introduction In the last few lectures we have seen how to obtain high confidence bounds

More information

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all

2 Q 10. Likewise, in case of multiple particles, the corresponding density in 2 must be averaged over all Lecture 6 Introduction to kinetic theory of plasa waves Introduction to kinetic theory So far we have been odeling plasa dynaics using fluid equations. The assuption has been that the pressure can be either

More information

arxiv: v2 [math.co] 3 Dec 2008

arxiv: v2 [math.co] 3 Dec 2008 arxiv:0805.2814v2 [ath.co] 3 Dec 2008 Connectivity of the Unifor Rando Intersection Graph Sion R. Blacburn and Stefanie Gere Departent of Matheatics Royal Holloway, University of London Egha, Surrey TW20

More information

Computational and Statistical Learning Theory

Computational and Statistical Learning Theory Coputational and Statistical Learning Theory Proble sets 5 and 6 Due: Noveber th Please send your solutions to learning-subissions@ttic.edu Notations/Definitions Recall the definition of saple based Radeacher

More information

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels

Impact of Imperfect Channel State Information on ARQ Schemes over Rayleigh Fading Channels This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE ICC 9 proceedings Ipact of Iperfect Channel State Inforation on ARQ

More information

Classical systems in equilibrium

Classical systems in equilibrium 35 Classical systes in equilibriu Ideal gas Distinguishable particles Here we assue that every particle can be labeled by an index i... and distinguished fro any other particle by its label if not by any

More information

Ph 20.3 Numerical Solution of Ordinary Differential Equations

Ph 20.3 Numerical Solution of Ordinary Differential Equations Ph 20.3 Nuerical Solution of Ordinary Differential Equations Due: Week 5 -v20170314- This Assignent So far, your assignents have tried to failiarize you with the hardware and software in the Physics Coputing

More information

General Properties of Radiation Detectors Supplements

General Properties of Radiation Detectors Supplements Phys. 649: Nuclear Techniques Physics Departent Yarouk University Chapter 4: General Properties of Radiation Detectors Suppleents Dr. Nidal M. Ershaidat Overview Phys. 649: Nuclear Techniques Physics Departent

More information

Physically Based Modeling CS Notes Spring 1997 Particle Collision and Contact

Physically Based Modeling CS Notes Spring 1997 Particle Collision and Contact Physically Based Modeling CS 15-863 Notes Spring 1997 Particle Collision and Contact 1 Collisions with Springs Suppose we wanted to ipleent a particle siulator with a floor : a solid horizontal plane which

More information

Device-to-Device Collaboration through Distributed Storage

Device-to-Device Collaboration through Distributed Storage Device-to-Device Collaboration through Distributed Storage Negin Golrezaei, Student Meber, IEEE, Alexandros G Diakis, Meber, IEEE, Andreas F Molisch, Fellow, IEEE Dept of Electrical Eng University of Southern

More information

Algebraic Approach for Performance Bound Calculus on Transportation Networks

Algebraic Approach for Performance Bound Calculus on Transportation Networks Algebraic Approach for Perforance Bound Calculus on Transportation Networks (Road Network Calculus) Nadir Farhi, Habib Haj-Sale & Jean-Patrick Lebacque Université Paris-Est, IFSTTAR, GRETTIA, F-93166 Noisy-le-Grand,

More information

PULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE

PULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE PULSE-TRAIN BASED TIME-DELAY ESTIMATION IMPROVES RESILIENCY TO NOISE 1 Nicola Neretti, 1 Nathan Intrator and 1,2 Leon N Cooper 1 Institute for Brain and Neural Systes, Brown University, Providence RI 02912.

More information

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words)

A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine. (1900 words) 1 A Self-Organizing Model for Logical Regression Jerry Farlow 1 University of Maine (1900 words) Contact: Jerry Farlow Dept of Matheatics Univeristy of Maine Orono, ME 04469 Tel (07) 866-3540 Eail: farlow@ath.uaine.edu

More information

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness

A Note on Scheduling Tall/Small Multiprocessor Tasks with Unit Processing Time to Minimize Maximum Tardiness A Note on Scheduling Tall/Sall Multiprocessor Tasks with Unit Processing Tie to Miniize Maxiu Tardiness Philippe Baptiste and Baruch Schieber IBM T.J. Watson Research Center P.O. Box 218, Yorktown Heights,

More information

Multi-Dimensional Hegselmann-Krause Dynamics

Multi-Dimensional Hegselmann-Krause Dynamics Multi-Diensional Hegselann-Krause Dynaics A. Nedić Industrial and Enterprise Systes Engineering Dept. University of Illinois Urbana, IL 680 angelia@illinois.edu B. Touri Coordinated Science Laboratory

More information

Scheduling Contract Algorithms on Multiple Processors

Scheduling Contract Algorithms on Multiple Processors Fro: AAAI Technical Report FS-0-04. Copilation copyright 200, AAAI (www.aaai.org). All rights reserved. Scheduling Contract Algoriths on Multiple Processors Daniel S. Bernstein, Theodore. Perkins, Shloo

More information

a + d < 1 with a = 0.03, d = 0.045, Nc = 40, and N = Nb a = 0.3, d = , Nc = 40, and N = 100.

a + d < 1 with a = 0.03, d = 0.045, Nc = 40, and N = Nb a = 0.3, d = , Nc = 40, and N = 100. On the Relevance of Time Scales in Performance Oriented Traffic Characterizations M. Montgomery and G. de Veciana Department of Electrical and Computer Engineering University of Texas at Austin Austin,

More information

Poisson processes and their properties

Poisson processes and their properties Poisson processes and their properties Poisson processes. collection {N(t) : t [, )} of rando variable indexed by tie t is called a continuous-tie stochastic process, Furtherore, we call N(t) a Poisson

More information

26 Impulse and Momentum

26 Impulse and Momentum 6 Ipulse and Moentu First, a Few More Words on Work and Energy, for Coparison Purposes Iagine a gigantic air hockey table with a whole bunch of pucks of various asses, none of which experiences any friction

More information

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics

ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS. A Thesis. Presented to. The Faculty of the Department of Mathematics ESTIMATING AND FORMING CONFIDENCE INTERVALS FOR EXTREMA OF RANDOM POLYNOMIALS A Thesis Presented to The Faculty of the Departent of Matheatics San Jose State University In Partial Fulfillent of the Requireents

More information

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder

Convolutional Codes. Lecture Notes 8: Trellis Codes. Example: K=3,M=2, rate 1/2 code. Figure 95: Convolutional Encoder Convolutional Codes Lecture Notes 8: Trellis Codes In this lecture we discuss construction of signals via a trellis. That is, signals are constructed by labeling the branches of an infinite trellis with

More information

Combining Classifiers

Combining Classifiers Cobining Classifiers Generic ethods of generating and cobining ultiple classifiers Bagging Boosting References: Duda, Hart & Stork, pg 475-480. Hastie, Tibsharini, Friedan, pg 246-256 and Chapter 10. http://www.boosting.org/

More information

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm

Symbolic Analysis as Universal Tool for Deriving Properties of Non-linear Algorithms Case study of EM Algorithm Acta Polytechnica Hungarica Vol., No., 04 Sybolic Analysis as Universal Tool for Deriving Properties of Non-linear Algoriths Case study of EM Algorith Vladiir Mladenović, Miroslav Lutovac, Dana Porrat

More information

A Theoretical Analysis of a Warm Start Technique

A Theoretical Analysis of a Warm Start Technique A Theoretical Analysis of a War Start Technique Martin A. Zinkevich Yahoo! Labs 701 First Avenue Sunnyvale, CA Abstract Batch gradient descent looks at every data point for every step, which is wasteful

More information

AN EFFICIENT CLASS OF CHAIN ESTIMATORS OF POPULATION VARIANCE UNDER SUB-SAMPLING SCHEME

AN EFFICIENT CLASS OF CHAIN ESTIMATORS OF POPULATION VARIANCE UNDER SUB-SAMPLING SCHEME J. Japan Statist. Soc. Vol. 35 No. 005 73 86 AN EFFICIENT CLASS OF CHAIN ESTIMATORS OF POPULATION VARIANCE UNDER SUB-SAMPLING SCHEME H. S. Jhajj*, M. K. Shara* and Lovleen Kuar Grover** For estiating the

More information

Computable Shell Decomposition Bounds

Computable Shell Decomposition Bounds Journal of Machine Learning Research 5 (2004) 529-547 Subitted 1/03; Revised 8/03; Published 5/04 Coputable Shell Decoposition Bounds John Langford David McAllester Toyota Technology Institute at Chicago

More information

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization

Support Vector Machine Classification of Uncertain and Imbalanced data using Robust Optimization Recent Researches in Coputer Science Support Vector Machine Classification of Uncertain and Ibalanced data using Robust Optiization RAGHAV PAT, THEODORE B. TRAFALIS, KASH BARKER School of Industrial Engineering

More information

List Scheduling and LPT Oliver Braun (09/05/2017)

List Scheduling and LPT Oliver Braun (09/05/2017) List Scheduling and LPT Oliver Braun (09/05/207) We investigate the classical scheduling proble P ax where a set of n independent jobs has to be processed on 2 parallel and identical processors (achines)

More information

Optimal Jamming Over Additive Noise: Vector Source-Channel Case

Optimal Jamming Over Additive Noise: Vector Source-Channel Case Fifty-first Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 2-3, 2013 Optial Jaing Over Additive Noise: Vector Source-Channel Case Erah Akyol and Kenneth Rose Abstract This paper

More information