Arbitrary Throughput Versus Complexity Tradeoffs in Wireless Networks using Graph Partitioning

Size: px
Start display at page:

Download "Arbitrary Throughput Versus Complexity Tradeoffs in Wireless Networks using Graph Partitioning"

Transcription

1 University of Pennsyvania SchoaryCommons Departmenta Papers (ESE) Department of Eectrica & Systems Engineering November 2006 Arbitrary Throughput Versus Compexity Tradeoffs in Wireess Networks using Graph Partitioning Saikat Ray University of Pennsyvania, Saswati Sarkar University of Pennsyvania, Foow this and additiona works at: Recommended Citation Saikat Ray and Saswati Sarkar, "Arbitrary Throughput Versus Compexity Tradeoffs in Wireess Networks using Graph Partitioning",. November This paper is posted at SchoaryCommons. For more information, pease contact

2 Arbitrary Throughput Versus Compexity Tradeoffs in Wireess Networks using Graph Partitioning Abstract Severa poicies have recenty been proposed for attaining the maximum throughput region, or a guaranteed fraction thereof, through dynamic ink scheduing. Among these poicies, the ones that attain the maximum throughput region require a computation time which is inear in the network size, and the ones that require constant or ogarithmic computation time attain ony certain fractions of the maximum throughput region. In contrast, in this paper we propose poicies that can attain any desirabe fraction of the maximum throughput region and require a computation time that is independent of the network size. First, using a combination of graph partitioning techniques and yapunov arguments, we propose a simpe poicy for tree topoogies under the primary interference mode that requires each ink to exchange ony 1 bit information with its adjacent inks and approximates the maximum throughput region using a computation time that depends ony on the maximum degree of nodes and the approximation factor. We subsequenty deveop a framework for attaining arbitrary cose approximations for the maximum throughput region in arbitrary networks and interference modes and use this framework to obtain any desired tradeoff between throughput guarantees and computation times for a arge cass of networks and interference modes. Specificay, given any ε > 0, the maximum throughput region can be approximated in these networks using a computation time that depends ony on the maximum node degree and ε. Keywords wireess networks, scheduing, medium access contro, throughput region This working paper is avaiabe at SchoaryCommons:

3 1 Arbitrary Throughput Versus Compexity Tradeoffs in Wireess Networks using Graph Partitioning Saikat Ray and Saswati Sarkar Department of Eectrica and Systems Engineering University of Pennsyvania Abstract Severa poicies have recenty been proposed for attaining the maximum throughput region, or a guaranteed fraction thereof, through dynamic ink scheduing. Among these poicies, the ones that attain the maximum throughput region require a computation time which is inear in the network size, and the ones that require constant or ogarithmic computation time attain ony certain fractions of the maximum throughput region. In contrast, in this paper we propose poicies that can attain any desirabe fraction of the maximum throughput region and require a computation time that is independent of the network size. First, using a combination of graph partitioning techniques and yapunov arguments, we propose a simpe poicy for tree topoogies under the primary interference mode that requires each ink to exchange ony 1 bit information with its adjacent inks and approximates the maximum throughput region using a computation time that depends ony on the maximum degree of nodes and the approximation factor. We subsequenty deveop a framework for attaining arbitrary cose approximations for the maximum throughput region in arbitrary networks and interference modes and use this framework to obtain any desired tradeoff between throughput guarantees and computation times for a arge cass of networks and interference modes. Specificay, given any ɛ > 0, the maximum throughput region can be approximated in these networks using a computation time that depends ony on the maximum node degree and ɛ. I. INTRODUCTION Attaining the maximum throughput region, or a guaranteed fraction thereof, through dynamic ink scheduing, is a key design goa in mutihop wireess networks. The scheduing probem invoves determination of which inks transmit packets at any given time. Appropriate scheduing of inks is key towards attaining throughput guarantees as the success of transmission in any given ink depends on which other inks transmit packets simutaneousy. The transmission schedues can not be pre-computed, and needs to be determined at every transmission epoch, as the congestion eves in the nodes and the transmission conditions in the wireess medium vary with time, and the statistics of these tempora variations are oftentimes not known a priori. Thus, the time required to determine which inks woud transmit at any transmission epoch is a key performance metric for any dynamic scheduing poicy. The contribution of this paper is to characterize tradeoffs between throughput guarantees and computation times for scheduing poicies for different casses of wireess networks. Owing to the ack of a centra controer, at every transmission epoch each ink needs to determine whether it woud transmit based on its own state and the information it acquires about the states of other nodes. The throughput guarantees usuay improve with increase in the information each ink (or rather a node which is the source of the ink) acquires about the states of other inks. The time required for each ink to decide whether to transmit at any given time depends on the time required (a) to exchange messages with other inks to earn their states and (b) to perform the computations required to arrive at an appropriate decision based on the information acquired. We refer to the tota time required in both parts as the schedue computation time, or rather the computation time. The time required in each part increases with increase in the amount of information a ink acquires about the states of other inks. Thus, an important question is how much information a ink shoud acquire about the states of other inks. The scheduing poicies that have been widey investigated can be cassified in two broad casses based on the above quaifier: the poicies that require each ink to know some attribute that depends on the states of (a) a inks in the network [14], [15] and (b) ony the inks that interfere with it [2], [9], [10],

4 [12], [16]. We refer to the two casses as INFORMATION(N) and INFORMATION(1) poicies respectivey, where N is the number of inks in the network. By this nomencature, INFORMATION(k) is the cass of poicies that require each ink to earn the states of their k-hop interferers. A semina resut has estabished that poicies in INFORMATION(N) cass can attain the maximum possibe throughput region in arbitrary wireess networks using O(N) computation time per scheduing decision [14]. Recenty, it has been shown that a poicy in INFORMATION(1) cass can attain a guaranteed fraction of the maximum throughput region using O( G ogn) computation time per scheduing decision where G is the maximum degree, or the maximum number of neighbors of any given node, in the network [2]. The contribution of this paper is to show that in certain important casses of wireess networks, for appropriate seection of k between 1 and N, poicies can be designed in INFORMATION(k) cass so as to obtain arbitrary cose approximations for the maximum throughput region, whie requiring a computation time that depends ony on G and the desired approximation factor and is otherwise independent of the size of the network. We first consider the primary interference mode which mandates that any set of inks can be simutaneousy schedued provided they do not have any common node. Under this interference mode, when the network topoogy is a tree, given any positive constant ɛ, we obtain a distributed scheduing poicy in INFORMATION(1) cass that (a) approximates the throughput region within a factor of 1 ɛ and (b) requires a computation time of O( G /ɛ) (Section IV). We next present a genera framework for designing INFORMATION(k) poicies for approximating the throughput region arbitrariy cosey for arbitrary networks and interference modes (Section V). We subsequenty use this framework for obtaining arbitrary tradeoffs between throughput guarantees and computation times for arge casses of networks, e.g., graphs with imited cycicity and primary interference modes (Section V-B), geometric graphs (Section V- C) and quasi-geometric graphs (Section V-D) under both primary and secondary interference modes. For exampe, for the specia case where nodes are embedded in a pane and two inks interfere if and ony if at east one end-node of one ink is within a given distance D of an end-node of the other ink (i.e., geometric graphs and secondary interference mode), given any positive constant ɛ, we obtain a distributed scheduing poicy in INFORMATION(O( 2 G /ɛ2 )) cass that (a) approximates the throughput region within a factor of 1 ɛ and (b) requires a computation time of ( 2 G /ɛ2 ) O(1/ɛ2). The throughput and computation time guarantees hod in a cases even when sessions traverse mutipe inks (Section VI). Under the primary interference constraints in tree topoogies existing poicies attain (a) the maximum throughput region using a computation time of Θ(N) [14] (b) 2/3 of the maximum throughput region using a computation time of Θ( G (ogn) 2 ) [12] and (c) 1/2 of the maximum throughput region using a computation time of Θ( G ) [9]. For geometric graphs and secondary interference mode, existing poicies attain (a) the maximum throughput region using a computation time of Θ(N) [14] (b) 1/8 of the maximum throughput region using a computation time of Θ( G ogn) [2] and (c) 1/ G of the maximum throughput region using a computation time of Θ( G ) [9]. Our poicies therefore attain arbitrary desired tradeoffs between the best known guarantees for throughput and computation times. Specificay, for networks with bounded degree, our poicies approximate the throughput region within any constant factor using a computation time which depends ony on the approximation factor and does not depend on the network size, whereas existing agorithms that require constant computation time attain an approximation guarantee of at most 1/2 and 1/8 for the above cases respectivey. For networks with degrees O(ogN) (which happens in severa topoogies), our poicies approximate the throughput region within any constant factor using poy-ogarithmic computation time, whereas existing agorithms that use poy-ogarithmic computation time attain an approximation factor of at most 2/3 and 1/8 for the above cases respectivey. We now briefy describe the design of the proposed poicies, and provide the intuition behind the performance guarantees. The proposed poicies partition the network in a coection of components - the size of the components depend ony on G and ɛ. The inks that originate in a component but interfere with those in another component are shut down i.e., not schedued. Thus, the inks schedued in each component wi not interfere with those schedued in other components irrespective of the scheduing poicy in each component. Hence, the scheduing in different components can now be determined in parae. Thus, the time required to compute the overa schedue now depends ony on the size of each 2

5 3 component and is therefore determined ony by G and ɛ. We now describe how the inks in each component are schedued. The weight of each ink is the number of packets waiting for transmission in the ink, the weight of a set of inks is the sum of the weights of the inks in the set, and a set of inks in which no two inks interfere with each other is referred to as an independent set of inks. In each component the set of inks are schedued such that they constitute the maximum weighted independent set of inks in the component. When different partitioning schemes are used at different times and the size of the components in each partition is arge enough, each ink is shut down ony a sma fraction of time. Thus, the inks seected as above, constitute an independent set whose weight is at east (1 ɛ) that of the weight of the maximum weighted independent set of inks in the entire network. The throughput guarantee now foows from the existing resut that a poicy that schedues an independent set of inks whose weight is at east 1 ɛ that of the weight of the maximum weighted independent set of inks attains 1 ɛ fraction of the throughput region [10]. II. RELATED LITERATURE The probem of maximizing the throughput region in wireess networks, or attaining a guaranteed fraction thereof, has received significant attention. Tassiuas et a. have characterized the maximum throughput region and provided a poicy that attains this throughput region in an arbitrary wireess network [15]. This poicy schedues the maximum weighted independent set of inks in each sot, and hence requires Ω(e N ) computation time uness P = NP. Later, Tassiuas [14] provided randomized scheduing schemes that attain the maximum achievabe throughput region, which can be impemented in fuy distributed manner using gossip based agorithms [4]. In each sot, this poicy randomy seects an independent set of inks, compares its weight with the weight of the set of inks schedued in the previous sot and schedues the set that has the arger weight. This poicy requires Θ(N) computation time. A these poicies are in the INFORMATION(N) cass. Recenty, provabe throughput guarantees have been obtained with some poicies in INFORMATION(1) cass. Dai et. a. [3], Lin et a [10] and Wu et. a. [16] proved that a simpe greedy scheduing scheme, maxima matching, attains haf the maximum throughput region for the primary interference mode; the computation time for maxima matching is Θ(ogN). Chaporkar et. a. [2] proved that maxima matching can be generaized to attain guaranteed fraction of the maximum throughput region for arbitrary interference modes, whie retaining the ogarithmic computation time. Sarkar et. a. [12] proved that for primary interference mode and tree graphs, a queue ength dependent maxima matching attains 2/3 of the throughput region whie using Θ ( G og 2 (N) ) computation time. Lin et. a. [9] proved that a random access scheme, where inks access the medium with a probabiity that depends on their and their interferers queue engths, attains 1/2 and 1/ G the throughput region for arbitrary networks under primary interference mode and secondary interference modes respectivey, whie requiring a O( G ) computation time. Our contribution is to introduce the cass of INFORMATION(k) poicies and prove that for appropriate choices of k, poicies can be designed in the INFORMATION(k) cass so as to obtain arbitrary tradeoffs between the best throughput guarantees and the computation times obtained so far. The design of our poicies rey on the use of graph partitioning techniques. Hunt et. a. [7], Kuhn et. a. [8], Nieberg et. a [11] and Sharma et. a. [13] have devised graph partitioning techniques for obtaining arbitrary cose approximations of maximum weighted independent sets in poynomia growth bounded graphs. A graph is said to be poynomia growth bounded if the maximum number of pairwise independent nodes in any r-neighborhood of a node can be upper-bounded by a poynomia in r. Many of the graphs we consider, e.g., trees, are not poynomia growth bounded. Even in the poynomia growth bounded graphs we consider, i.e., geometric graphs, existing resuts [7], [11], [13] approximate maximum weighted independent sets ( within a factor ) of 1 ɛ using poicies in INFORMATION (N) cass which have computation times of Θ N + f(ɛ) G where f(ɛ) is a function of ɛ that increases with decrease in ɛ. Thus seecting the inks using these approximation techniques require centra contro and Θ(N) time for

6 4 computing each schedue. We propose a poicy in the INFORMATION(O( 2 G /ɛ2 )) cass that computes each schedue in O( 2 G /ɛ2 ) time using a simper partitioning technique, and sti attains desired approximation guarantees for the maximum throughput region. The partitioning technique used in [8] however requires time for computing each schedue which does not depend on N as we, but this technique approximates a maximum weighted independent set arbitrariy cosey ony when the weights are a equa. Since different inks have different queue engths in a network, this partitioning technique does not provide throughput guarantees. Finay, Brzezinski et. a. have recenty used graph partitioning techniques for providing throughput guarantees using Θ(N) scheduing schemes for networks with mutipe channes [1]. Their goa is to divide the graph in subgraphs such that different subgraphs are assigned different channes, and a greedy maxima weight scheduing, which requires Θ(N) computation time, maximizes the throughput region in each subgraph. Driven by different goas, we use different partitioning schemes. O(1/ɛ2 ) G III. SYSTEM MODEL We consider scheduing at the MAC ayer in a wireess network. We assume that time is sotted. The topoogy in a wireess network can be modeed as a graph G = (V, E), where V and E respectivey denote the sets of nodes and inks. A ink exists from a node u to another node v if and ony if both u and v can receive each others signas. Each session represents a tripet (i, u, v) where i is the identifier associated with the session and u and v are source and destinations of the session. At the MAC ayer, each session traverses ony one ink, but mutipe sessions may traverse a ink. We consider a network with N sessions. We now introduce terminoogies that we use throughout the paper. Some of these are we-known in graph theory; we mention these for competeness. A node i is a neighbor of a node j, if there exists a ink from i to j, i.e., (i, j) E. Two inks (sessions) are adjacent to each other if they have common nodes. By definition, a ink is adjacent to itsef. The degree of a node u is the number of inks in E originating from or ending at u. The maximum degree in G, G, is the maximum degree of any node in G. A ink i interferes with ink j if j can not successfuy transmit a packet when i is transmitting. A subset of inks is said to be independent if if no ink in the subset interferes with another ink in the subset. Let X be the coection of independent sets of inks. We now describe the packet arriva process. We assume that at most α max 1 packets arrive for any session in any sot. Let  i (t) be the number of packets that session i generates in sot t. We assume that a packet arriving in a sot arrives at the end of the sot, and may not be transmitted in the sot. The arriva process {Âi(t)} is independent and identicay distributed for a t. A scheduing poicy is an agorithm that decides in each sot the subset of sessions that woud transmit packets in the sot. Ceary, a subset of sessions can transmit packets in any sot if no two sessions in the subset traverse the same ink and the inks the sessions traverse constitute an independent set X, i.e., if X X. Every packet has ength 1 sot. Thus, if a session is schedued in a sot, it transmits a packet in the sot. Let ˆDi (t) be the number of packets that session i transmits in sot t, i = 1,...,..., N. Now, ˆDi (t) {0, 1} and depends on the scheduing poicy. Let ˆQi (t) be the queue ength before the arrivas and the transmissions in sot t. Then ˆQ i (t + 1) = ˆQ i (t) + Âi(t) ˆD i (t). Definition 1: The network is said to be stabe if there exists a finite rea number Γ such that with probabiity 1, T 1 im sup ˆQ i (t)/t Γ, i = 1,..., N. (1) T t=0 We consider a virtua-queue Q associated with ink that contains a packets waiting for transmission for a sessions that traverse. Note that the virtua queue in a ink may contain packets of sessions

7 5 L (0) L (1) L (0) L (1) (a) Tree topoogies (b) Topoogies with imited cycicity Fig. 1. The figures demonstrate the edge sets L (0), L (1) under the primary interference mode for (a) a tree and (b) topoogy with imited cycicity. L (0) L (0) GRID 0 GRID 0 GRID 1 GRID 1 D D (a) Geometric graphs under primary interference (b) Geometric graphs under secondary interference Fig. 2. The figures demonstrate the edge sets L (0), L (1) for a geometric graph under (a) primary and (b) secondary interference modes. traversing in both directions. Let A (t) and D (t) respectivey denote the number of arrivas and departures in sot t in virtua queue Q. Ceary, the arriva process {A (t)} is independent and identicay distributed for a t. Let EA (t) = λ. The arriva rate of ink i is λ i, i = 1,..., E. The arriva rate vector λ is an E dimensiona vector whose components are the arriva rates. Now, Q (t + 1) = Q (t) + A (t) D (t). Aso, (1) hods if and ony if im sup T 1 T t=0 Q i(t)/t is finite. The throughput region Λ π of a scheduing poicy π is the set of arriva rate vectors λ for which the network is stabe under π. An arriva rate vector λ is said to be feasibe if it is in the throughput region of some scheduing poicy. The maximum throughput region Λ is the set of feasibe arriva rate vectors. A scheduing poicy π is said to approximate the maximum throughput region within a factor 1 ɛ if for each arriva rate vector λ Λ, (1 ɛ) λ Λ π. IV. INFORMATION(1) POLICY FOR APPROXIMATING THE MAXIMUM THROUGHPUT REGION ARBITRARILY CLOSELY IN TREE TOPOLOGIES We assume that G is a tree and consider the primary interference mode. Under this interference mode, two inks interfere if and ony if they have a common end-point. A matching is a set of inks such that no two inks in the set are adjacent to each other. Thus, a vaid schedue in a sot is a matching in the basic graph G. Thus, X is the set of a matchings in G. This interference mode is encountered in networks ike Buetooth where each node has a singe transceiver and a unique frequency in its neighborhood. We now describe the scheduing poicy which we refer to as TREE-PARTITION-MATCHING (k), and abbreviate as TPM(k). Here, k is a parameter which determines the throughput region and the computation time of the poicy. We first introduce the foowing notations. The eve of a node in a tree is its distance from the root of the tree. A ink = (u, v) is the parent of a ink = (v, w) if the eve of v exceeds that of w, and then

8 6 is a chid of. Links (u, v 1 ), (u, v 2 ),... are sibings of each other; different priorities are associated with different sibings such that between any two sibings one is oder and the other is younger. Let J = { E : is a parent or oder sibing of }. For j = 0,..., k 1, et L (j) be the set of inks (u, v) such that eves of u and v are j and j + 1 moduo k (Figure 1(a)). A forma description of TPM(k) foows. TREE-PARTITION-MATCHING (k) In sot t, every ink seects an integer in the range [0,... k 1]; each integer is seected with probabiity 1/k and a inks seect the same integer. Let i(t) be the integer seected in sot t. A ink contends if and ony if (a) its virtua-queue has packets to transmit, and (b) E \ L (i(t)). A ink schedues itsef if and ony if (a) it contends and (b) inks in J do not schedue themseves. When a ink is schedued, the head of ine packet in the corresponding virtua queue is served. Note that TPM (k) beongs in the INFORMATION (1) cass irrespective of the vaue of k, and is simpe to impement since each ink ony needs to inform its adjacent inks about whether its virtua queue is empty or non-empty. We now evauate the computation time for TPM(k). Note that in any sot the inks that contend constitute a forest such that those in a tree of the forest do not interfere with those in a different tree of the forest. Thus, the scheduing in different components can be determined in parae. The maximum ength of a path in any tree in the forest is k. Each ink that contends decides whether to schedue itsef immediatey after it knows the decisions of its parents and oder sibings that contend. Thus, each ink waits for the scheduing decision of at most k G inks. Thus, the overa computation time is O(k G ). Theorem 1: If λ Int(Λ), then (1 1/k) λ Λ TPM(k). We first outine the intuition behind Theorem 1. First, intuitivey a scheduing poicy π that schedues a ink if and ony if (a) it has a packet to transmit and (b) inks in J do not schedue themseves, maximizes the throughput region in a tree. This is because whenever a ink has a packet to transmit, π schedues either or a ink in J ; the optimum poicy aso schedues at most one ink in J {} in each sot. Ceary, the computation time for π is O(d G ) where d is the depth of the tree, and d is O( E ). Now, by preventing the contention of a subset L (i(t)) of inks in each sot t, TPM (k) partitions the graph in a forest where the depth of each tree is at most k, and uses the above scheduing poicy in each tree of the forest. This reduces the computation time of TPM (k) to O(k G ). The choice of L (0),..., L (k 1), and different seections of i(t) {0,..., k 1} in each sot t ensures that a ink contends with probabiity 1 1/k in each sot t; this in turn ensures that the maximum throughput region reduces ony by a factor of 1 1/k. Proof: The resut ceary hods if k = 1. Thus, we assume that k > 1. The arriva rate vector is (1 1/k) λ where λ Int(Λ). Since λ Λ and X constitutes of a matchings of the inks, ( J {} λ < 1 P 1 max ) [6], [15]. Let δ = min J {} λ, 1. Ceary, δ > 0. Consider a ink = (u, v) where eve of v 2 E max λ exceeds u; then χ denotes the sum of the eve of u and the number of oder sibings of. Observe that the queue engths of the virtua queues constitute a Markov chain. We consider a yapunov function V ( Q) = δ χ Q δ χ Q ( We prove that E Q = J Q. ( ) ( ) V Q (t + 1) V Q(t) Q(t) = Q ) < 1 for a sufficienty arge Q, where V ( Q). Then, from Foster s theorem (Theorem in [5]) the Markov chain representing the queue ength process Q (t) is positive recurrent. Aso, E (Q (t)) < for each under the steady state P K 1 t=0 distribution for the above Markov chain. Thus, im Q (t) K <. The resut foows. K

9 7 V ( ) Q(t + 1) V ( Q(t) ) = δ χ (Q (t + 1) Q (t)) (Q (t + 1) + Q (t)) + 2 δ χ Q (t + 1) J Q (t + 1) 2 δ χ Q (t) J Q (t) 2 δ χ (A (t) D (t)) Q (t) + 2 δ χ (A (t) D (t)) δ χ Q (t) J (A (t) D (t)) +2 δ χ (A (t) D (t)) Q (t) + 2 δ χ (A (t) D (t)) (A (t) D (t)) J J 2 δ χ Q (t) (A (t) D (t)) + δ χ χ A (t) + 4N 2 αmax 2 J {} : J 2 δ χ Q (t) (A (t) D (t)) + δ A (t) + 4N 2 αmax. 2 (2) J {} : J The ast inequaity foows since 0 < δ 1, χ < χ if J. From (2), ( ( ) ( ) E V Q (t + 1) V Q(t) Q(t) = Q ) (2/k) k 1 δ χ E Q (t) (A (t) D (t)) + δ A (t) Q(t) = Q, i(t) = m m=0 J {} : J +4N 2 α 2 max (2/k) δ χ Q k(1 1/k) J {} (since L (j) for ony one j {0,..., k 1} λ (k 1) + k(1 1/k)δ : J and D (t) = 1 for some J {} uness Q (t) = 0 or L (i(t)) ) 2(1 1/k) δ χ Q λ 1 + δ λ + 4N 2 αmax 2 J {} 2(1 1/k) E max λ δ δ χ Q : J λ + 4N 2 α 2 max < 1 for sufficienty arge Q (since δ > 0 and k > 1). The resut foows. Thus, TPM ( 1/ɛ ) attains a throughput region that is at east 1 ɛ times that of the maximum throughput region. The computation time for TPM ( 1/ɛ ) is O( G /ɛ). V. INFORMATION (k) POLICIES FOR APPROXIMATING THE MAXIMUM THROUGHPUT REGION ARBITRARILY CLOSELY FOR ARBITRARY NETWORKS AND INTERFERENCE MODELS We first provide a genera framework for approximating the maximum throughput region arbitrariy cosey in arbitrary networks and interference modes using poicies in INFORMATION (k) cass (Section V- A). Subsequenty, we eucidate the utiity of the framework in severa important casses of networks

10 8 and interference modes (Section V-B, V-C, V-D). We consider both primary and secondary interference modes. For the primary interference mode, we generaize the throughput and computation time guarantees presented in the previous section to graphs with imited cycicity (Section V-B) and geometric and quasigeometric graphs (Section V-C.1). For the secondary interference mode, we obtain simiar resuts for geometric (Section V-C.2) and quasi-geometric graphs (Section V-D). In Section V-E, we discuss how these poicies can be impemented. A. Genera Framework We consider an arbitrary network and an interference mode as described in Section III. We consider a poicy π(k) that consists of k subsets of inks L (0),..., L (k 1) such that the inks in a component of G (j) = (V, E \ L (j) ) do not interfere with those in other components of G (j). In every sot t, every ink seects an integer in the range [0,... k 1]; each integer is seected with probabiity 1/k and a inks seect the same integer. In any sot t, the weight of a ink is the number of packets waiting for transmission in the virtua queue associated with the ink, and the inks that constitute a maximum weighted independent set in the interference graph of any component of G (i(t)) are schedued. Without oss of generaity, inks with zero weight are not schedued. When a ink is schedued, the virtua queue associated with transmits a packet. Note that π(k) is competey specified once L (0),..., L (k 1) are specified. We now describe when π(k) approximates the maximum throughput region within an approximation factor that depends ony on k. We first introduce the foowing definition. Definition 2: A coection of subsets E 1,..., E q of E is said to be c-approximate if for (a) any given E -dimensiona vector of non-negative rea numbers W = (W 1,..., W E ) and (b) any coection of subsets of E, X 1,... X q such that X i X and X i E i q W c max W. i=1 X i X We now present the key technica emma that aows us to obtain desired throughput guarantees. Lemma 1: Let L (0),..., L (k 1) be c-approximate. Then, ) ( E Q i (t)d i (t) Q(t) = Q i (1 c/k) max Q i (t). We first provide the intuition behind the resut. Now, the weight of the inks schedued by π(k) differs from the maximum weight of any schedue in the sot by at most the weight of the maximum weight independent set among inks that do not contend in the sot. Now, if L (0),..., L (k 1) are c approximate, the expected weight of the maximum weight independent set in L (j) for j = 0... k 1 turns out to be at most c/k times that of the weight of the maximum weight independent set in the sot. Thus, the expected weight of the schedued inks is at east (1 c/k) times that of the weight of the maximum weight of any schedue in the sot. Proof: Let i(t) be the integer seected by inks in sot t, and B(t) = arg max X L (i(t)) Q (t). X

11 Now, i Q i(t)d i (t) (max Q i(t) ) i B(t) Q i(t). Now, E Q (t) Q(t) = Q k 1 ( = P i(t) = j Q(t) = Q ) E Q (t) Q(t) = Q, i(t) = j B(t) j=0 j=0 B(t) B(t) k 1 = (1/k) E Q (t) Q(t) = Q, i(t) = j k 1 = (1/k) (c/k) max max j=0 X L (j) X Q (t) Q i (t) (since L (0),..., L (k 1) are c approximate). ( Thus, E i Q i(t)d i (t) Q(t) = Q ) (1 c/k) max Q i(t). Lemma 2: Let L (0),..., L (k 1) be c-approximate. Then, if λ Int(Λ) and k > c, (1 c/k) λ Λ π. We first provide the intuition behind the above resut. When L (0),..., L (k 1) are c-approximate, from emma 1 it foows that π(k) schedues inks such that the expected weight of the schedued inks in any sot is at east (1 c/k) times that of the maximum weight independent set of inks in the sot. The throughput guarantee now foows using yapunov arguments simiar to those in [10], [15]. Refer to appendix A for the proof. Once we prove that the coection L (0),..., L (k 1) is c-approximate, Lemma 2 aows us to approximate the maximum throughput region within a factor of 1 ɛ for any ɛ > 0 using π(k) for k = c/ɛ. In the next subsections we wi prove that in arge casses of networks the coection L (0),..., L (k 1) can be seected so as to render it c-approximate for different constant factors c. Note that different components in each G (j) can schedue the inks in parae as the inks in different components do not interfere. Thus, π(k) can be impemented provided in each sot and in each component either one, or a inks, know the weights of a inks in the component. In either case, π(k) is in INFORMATION(ˆk) cass where ˆk is the maximum diameter of the interference graph of any component of G (j) for any j {0,..., k 1}. The maximum diameter is upper bounded by the number of inks in any component of G (j) for any j {0,..., k 1}. The computation time for π(k) wi again be determined by the maximum size (number of inks or number of nodes or both) of a component in G (j) for j {0,..., k 1}. We wi show that for a arge cass of networks, the size of each component and therefore the overa computation time depends ony on G and k. 9 B. Graphs with Limited Cycicity Using the above genera framework, we generaize the tradeoffs between throughput and computation times to networks with imited cycicity. Specificay, we assume that there exists a constant H such that the maximum ength of a cyce in G is upper bounded by H +1. We sti consider the primary interference mode. We now describe L (0),..., L (k 1) for the scheduing poicy which we refer to as H-LIMITED-CYCLICITY- PARTITION-MATCHING (k), and abbreviate as H-LCPM(k). Consider a spanning tree T of G. For H- LCPM (k), for j = 0,..., k 1, L (j) E is the set of inks (u, v) such that the eves of u and v in T are (a) ess than or equa to jh moduo kh and (b) greater than jh moduo kh respectivey (Figure 1(b)). Intuitivey, for H-LIMITED-CYCLICITY-PARTITION-MATCHING (k), when i(t) = j, eves jh, jh + kh, jh + 2kH,... partition the graph, and L (j) consists of the inks that cross these eves. The set of edges of a graph corresponds to the set of vertices in the interference graph. There exists an edge between two vertices u and v in the interference graph if at east one of the corresponding edges interferes with the other.

12 10 Ceary, the components of G (j) are such that the inks in a component do not interfere with those in other components. We now evauate the computation time for H-LCPM (k). Let the set of edges in T be Ê. Note that the maximum ength of a path in T (j) = (V, Ê \ L(j) ) is kh. Thus each component in T (j) has O( kh G ) nodes. Each component of G (j) consists of severa components of T (j). Let u and v be nodes that are in different components of T (j) but the same components of G (j). Then the common ancestor of u and v in T is at a distance of at most H from both u and v in T. Thus, at most H H (j) G components of T can constitute the same component in G (j). Thus, each component in G (j) has O(H (k+1)h G ) nodes. Now, each independent set X of inks in each component of G (j) is a matching in the corresponding component of G (j). The time needed to compute a maximum weighted matching in each such component is therefore O(H 3 3(k+1)H G ). Thus, the overa computation time is O(H 3 3(k+1)H G ). If G is a bipartite graph, the overa computation time is O(H 2 2(k+1)H G ). The diameter of any component of T (j) is O(kH). Since a component of G (j) consists of at most H H G components of T (j), the diameter of any component of G (j) is O(kH 2 H G ). Thus, H-LCPM (k) beongs in INFORMATION(kH 2 H G ) cass. We now prove the foowing key resut which wi be used in obtaining throughput guarantees for H-LCPM (k). Lemma 3: L (0),..., L (k 1) is 4 approximate. Proof: Let W be an arbitrary N-dimensiona vector of non-negative rea numbers, X = arg max X W, and X 0,..., X k 1 be arbitrary subsets of inks such that X j X (i.e., X i is a matching) and X j L (j), j = 0,..., k 1. We need to prove that k 1 j=0 X j W 4 X W. Note that for any ink, W W i. S Let η (j) = X j S. Thus, ( k 1 k 1 ) W η (j) W. (3) j=0 X j X j=0 ( k 1 ) Hence, we need to show that j=0 η(j) 4 for each X. Consider = (u, v) E. Without oss of generaity, et eve of u in T be ess than or equa to that of v in T. There exists a unique j such that eve of u in T is in ((j 1)H, j H] mod kh. Note that is not adjacent to any ink in L (q) where q < (j 1) mod k or q > (j + 1) mod k. Since X j s are matchings, at most 1 ink in X j is adjacent to when j {(j 1) mod k, (j + 1) mod k}, and at most 2 inks in X j are adjacent to. Thus, ( k 1 j=0 η(j) ) 4 for each X. The resut foows. Theorem 2: If λ Int(Λ), then (1 ɛ) λ Λ H-LCPM( 4/ɛ )). Using k = 4/ɛ, c = 4, Theorem 2 foows from emmas 3 and 2. Now, H-LCPM ( 4/ɛ ) is in INFORMATION(H 2 H G /ɛ) cass and requires O(H 3 3H(1+ 4/ɛ ) G ) computation time. Thus, H-LCPM wi be usefu for sma vaues of H. Finay, Theorem 2 provides the throughput guarantees of 1-LCPM ( 4/ɛ ) for trees as we. But, 1-LCPM ( 4/ɛ ) approximates the maximum throughput region for trees within a factor of 1 ɛ using a computation time of O(1/ɛ) G, whereas TPM ( 1/ɛ ) attains the same throughput guarantee using ony O( G /ɛ). C. Geometric Graphs A graph is said to be geometric if nodes are embedded in the first quadrant of the 2-dimensiona pane, and a ink exists between nodes u and v if and ony if the distance between them is ess than a certain vaue say D. The distance D is referred to as the transmission range. We first consider the primary interference mode (Section V-C.1) and subsequenty consider the secondary interference mode (Section V-C.2).

13 11 1) Geometric Graphs with primary interference mode: We consider a geometric graph G with primary interference mode. We now describe the L (0),..., L (k 1) for the poicy GEOMETRIC-GRAPH-PARTITION- MATCHING(k) which we abbreviate as GGPM(k). We wi consider k different grids each of which consists of a series of horizonta and vertica ines. Here, L (j) is the set of inks that cross vertica or horizonta ines of grid j. We now describe how these grids are constructed. Each grid consists of horizonta and vertica ines parae to the x and y axes respectivey and the distance between any two cosest horizonta (vertica) ines is kd. Each grid is specified by its first horizonta and vertica ines. The first horizonta and vertica ines of grid j are given by y = jd and x = jd respectivey for j = 0,... k 1. Figure 2(a) eucidates the grids and the choices of L (0),..., L (k). Note that the inks in a component of G (j) do not interfere with those in other components. We first evauate the computation time for GGPM(k). The overa computation time equas the worst case computation time in a component. Let ν be the maximum number of nodes in any component of G (j) = (V, E\L (j) ) for any j. We next show that ν is O( G k 2 ). Thus, the computation time for GGPM(k) is the time required to compute a maximum weighted matching in a component with O( G k 2 ) nodes, which is O( 3 G k6 ). Lemma 4: For any j = 0,..., k 1, a component in G (j) = (V, E \ L (j) ) has O( G k 2 ) nodes. Proof: Consider some j 0,..., k 1. A component in G (j) consists of nodes in a square encosed by the cosest horizonta and vertica ines of the jth grid. The side of such a square is at most kd units. Such a square can be fied with κ = 2k 2 sma squares with sides equa to D/ 2. Ceary, κ ( 2 + 1) 2 k 2. Let I be a maxima independent set of nodes in the component, i.e., there does not exist an edge between any two nodes in I and every node in the component is either in I or has an edge to some node in I. Since the distance between any two points in any sma square is at most D, there cannot be more than one node from I present in any sma square. Therefore, I κ. Thus, the first part of the emma foows. Ceary, ν I G. Thus, ν κ G ( 2 + 1) 2 G k 2. Aso, the maximum number of inks in any component of G (j) is at most ν G which is O( 2 G k2 ). Thus, GGPM (k) is in INFORMATION(O( 2 G k2 )) cass. We now prove the foowing key resut which wi be used in obtaining throughput guarantees for GGPM(k). Lemma 5: L (0),..., L (k 1) is 20 approximate. Proof: The proof is simiar to that for emma 3. We point out the differences. We need to prove that k 1 j=0 X j W 20 X W. Reation (3) hods in this case as we. Hence, we need to show ( k 1 ) that j=0 η(j) 20 for each X. Now, note that the k grids do not share any common ine. Let SUPERGRID consist of a ines of a grids. Then SUPERGRID is a grid where the distance between any two cosest horizonta (vertica) ines is D. Ceary, η (j) = 1 for any X j X. If X \ X j, η (j) is the number of inks in X j that interferes with. Since these inks are in X j, they do not interfere with each other. Thus, η (j) 2 since at most 2 inks can be adjacent to but are not adjacent to each other. Thus, η (j) η (j) 2 for any X. Next, for each X we upper-bound the number of js in {0,..., k 1} such that η (j) > 0. Now, > 0 if either L (j) or L (j) but interferes with a ink in L (j). Note that for any, L (j) for at most 4 js in {0,..., k 1}. The observation foows from the fact that L (j) ony if both end nodes of are within a distance of D from a horizonta or vertica ine of grid j; this can happen at most 2 times for vertica ines and 2 more times for horizonta ines of SUPERGRID. Next, for any, L (j) but interferes with (i.e., is adjacent to) a ink in L (j) for at most 6 js in {0,..., k 1}. This happens ony if one of the nodes of is within D units of a horizonta or vertica ine of grid j. This can happen at most 3 times for vertica grid ines and 3 more times for horizonta grid ) ines of SUPERGRID. Thus, for each X, η (j) > 0 for 10 js in {0,..., k 1}. Hence, ( k 1 j=0 η(j) Theorem 3: If λ Int(Λ), then (1 ɛ) λ Λ GPIS( 20/ɛ, ɛ)) = 20 for each X.

14 12 Using k = 20/ɛ, c = 20, Theorem 3 foows from emmas 5 and 2. GGPM ( 20/ɛ ) is in INFORMATION(O( 2 G /ɛ2 )) cass and requires O( 3 G /ɛ6 ) computation time. In the next subsection, we propose a technique that computes each schedue in O( 2 G /ɛ2 ) time whie attaining a throughput region of (1 ɛ) times that of the maximum throughput region. 2) Geometric Graphs with Secondary Interference Mode: We consider a geometric graph G and the secondary interference mode. In this interference mode, a ink i interferes with ink j if one end point of j is within distance D from an end point of i. Note that if two inks interfere under the primary interference mode they aso interfere under the secondary interference mode but the converse is not true. This mode is an abstraction of bidirectiona wireess inks where a transmissions use a singe channe and overapping packets aways cause a coision. Note that an independent set of inks is no onger a matching in G. We now describe the L (0),..., L (k 1) for poicy GRAPH-PARTITION-INDEPENDENT-SET(k) which we abbreviate as GPIS(k). Just as in Section V-C.1, we consider k different grids. Now, L (j) is the set of inks that either cross or are adjacent to inks that cross vertica or horizonta ines of grid j (Figure 2(b)). Note that the inks in a component of G (j) do not interfere with those in other components. We first evauate the computation time for GPIS(k). Again, the overa computation time equas the worst case computation time in a component of G (j). The maximum size of any independent set of inks in a component is O(k 2 ) (in the proof of emma 4 I is O(k 2 ) for any I). Aso, each component of G (j) has O( 2 G k2 ) inks. Thus, in any component of G (j), the maximum weighted interference set can be computed in ( 2 G k2 ) O(k2). Thus, the computation time for GPIS(k) is ( 2 G k2 ) O(k2). Again, ike GGPM (k), GPIS (k) is in INFORMATION(O( 2 G k2 )) cass. We make the foowing observations about L (0),..., L (k 1). Let ψ = {j : L (j) }. Then, ψ 6 for any E (Observation 1). This hods because L (j) ony if at east one of the nodes of is within a distance of D from a horizonta or vertica ine of grid j, which can happen at most 3 times for vertica ines and 3 more times for horizonta ines of SUPERGRID. For any, L (j) but interferes with a ink in L (j) for at most 8 js in {0,..., k 1} (Observation 2). This happens ony if one of the nodes of is within 2D units of a horizonta or vertica ine of grid j but none of the nodes of is within a distance of D from any ine of grid j. This can happen at most 4 times for vertica grid ines and 4 more times for horizonta grid ines of SUPERGRID. We now prove the foowing key resut which wi be used in obtaining throughput guarantees for GPIS(k). Lemma 6: L (0),..., L (k 1) is 112 approximate. ( k 1 ) Proof: The proof is simiar to that for emma 5. Like in emma 5, we need to prove that j=0 η(j) 112 for each X. Now, η (j) 8 for any X as the number of inks that interfere with but do not interfere with each other is at most 8 [2]. Next, ) from observations 1 and 2, for each X, η (j) > 0 for 14 js in {0,..., k 1} Hence, 8 14 = 112 for each X. ( k 1 j=0 η(j) Theorem 4: If λ Int(Λ), then (1 ɛ) λ Λ GPIS( 112/ɛ )). Using k = 112/ɛ, c = 112, Theorem 4 foows from emmas 6 and 2. GPIS ( 112/ɛ ) is in INFORMATION(O( 2 G /ɛ2 )) cass and requires ( G /ɛ) O(1/ɛ2) computation time. We now combine the graph partitioning technique with a poicy design technique proposed by Tassiuas [14] so as to attain 1 ɛ times the maximum throughput region whie computing each schedue in ony O( 2 G /ɛ2 ) time. We denote the poicy as GRAPH-PARTITION-GRADUAL-IMPROVEMENT-INDEPENDENT- SET(k) and abbreviate it as GPGIIS (k). Note that this poicy does not beong in the genera cass of poicies π(k) described in Section V-A. In GPGIIS (k) each ink is associated with k 6 secondary virtua queues: Q (S) i, i {0,..., k 1}\ ˆψ where ˆψ is the union of ψ and max(0, 6 ψ ) arbitrary eements of {0,..., k 1} \ ψ. Whenever a packet arrives in the virtua queue Q it is routed to one of the secondary virtua queues with equa

15 13 probabiity. The poicy divides the time axis in frames of k sots. In the jth sot of each frame, for different inks E, the secondary virtua queues Q (S) j contend. Ony the secondary virtua queues that contend can be schedued for transmission and those that are schedued for transmission transmit their head of ine packets if they are non-empty. We now describe which contending secondary virtua queues are schedued for transmission in the jth sot of each frame. Note that Q (S) j does not exist if L (j) as then j ψ ˆψ. Thus, in the jth sot of each frame, no secondary virtua queue associated with any ink L (j) contends and at most one secondary virtua queue associated with each ink E \ L (j) contends. A ink is said to contend if one secondary virtua queue associated with it contends. Thus, for each j the inks that contend in the jth sot of each frame constitute components such that inks in different components do not interfere, and the inks in each component are a priori rank ordered in some manner. Links in the ordered ist sequentiay seect themseves with a probabiity p (0, 1) and those that interfere with the seected inks remove themseves from the ist. The weight of each contending ink is the number of packets waiting for transmission in the contending secondary virtua queue associated with it. The seected inks are schedued in each component if their tota weight exceeds the tota weight of the inks schedued in the same component in the jth sot of the previous frame; otherwise the inks schedued in the same component in the jth sot of the previous frame are schedued again. The contending secondary virtua queues associated with the schedued inks are schedued. The computation time of GPGIIS (k) is ceary O(γ) where γ is the maximum number of inks in any component of G (j) ; hence this computation time is O( 2 G k2 ). Aso, GPGIIS (k) is in INFORMATION(O( 2 G k2 )) cass. Theorem 5: If λ Int(Λ), then (1 8/k) λ Λ GPGIIS(k)). Proof: Consider a fictitious system that consists of ony the secondary virtua queues Q j for a. Let ˆΛ (j) be the maximum throughput region of this fictitious system. Then [15] Int(ˆΛ (j) ) = { λ : λ = β XI X, where β X = 1, β X 0 for each X X and β φ > 0}. X E\{:j ˆψ } X E\{:j ˆψ } Consider a scheduing poicy π that schedues secondary virtua queues that satisfy the foowing properties. 1) Q j (t) constitutes an irreducibe aperiodic markov chain. 2) In each sot t there is a positive probabiity associated with scheduing the secondary virtua queues associated with inks in X (t) where X (t) = arg max X E\:j ˆψ X Q j (t). 3) If X 0 and X 1 are the sets of inks associated with the secondary virtua queues schedued in sots t 1 and t then X 1 Q j (t) X 0 Q j (t). Then π stabiizes the fictitious system for any arriva rate vector λ Int(ˆΛ (j) ) [14], [4]. Let (1 6/k) λ be the arriva rate vector in the system where λ Int λ). Let λ (j) consist of those components of λ for which j ˆψ. From (5), λ (j) Int( Λ (j) ). We now consider the secondary virtua queues Q j for a at sots j, k + j, 2k + j,... in the actua system. Note that in the actua system these secondary virtua queues are schedued ony in these sots. We can therefore assume without oss of generaity that packets arrive in these queues ony in these sots as we whie the number of arrivas in sot mk + j is the number of arrivas in the actua system between sots ((m 1)k + j, mk + j] ([0, j]) for a positive integer m (m = 0). Note that the expected number of arrivas in secondary virtua queue Q j in sot mk + j is now k(1/(k 6))(1 6/k)λ = λ. Thus, the arriva rate vector for these secondary virtua queues is λ (j) Int( λ (j) ). Now, observe that GPGIIS(k)

16 14 satisfies properties (1) to (3) for these secondary virtua queues, since inks that contend in different components of G (j) do not interfere. Thus, for each j, the system consisting of these virtua queues are stabiized. The resut foows. Thus, for k = 6/ɛ, a poicy GPGIIS (k) in INFORMATION(O( 2 G /ɛ2 )) cass, attains a throughput region of 1 ɛ times that of the maximum throughput region using a computation time of O( 2 G /ɛ2 ). Note that GGPM (k) can be simiary modified to attain a throughput region of 1 ɛ times that of the maximum throughput region, using k = 4/ɛ and a computation time of O( 2 G /ɛ2 ). Finay, GPGIIS(k) attains substantiay better tradeoffs than GPIS(k) between throughput and computation time guarantees. But, at the same time GPGIIS(k) is ikey to have substantiay higher deay as compared to GPIS(k). This is because since, unike GPIS(k), GPGIIS(k) segregates the incoming traffic in each ink in mutipe queues and in each sot aows at most one queue in each ink to contend, when the contending queue is empty it does not schedue the ink even if the ink s interferers are not schedued and other queues in the same ink are non-empty. More importanty, unike GPIS(k), GPGIIS(k) does not schedue the queues whose expected weight is cose to that of the maximum weight independent set of queues, and instead attains stabiity by graduay improving the weight of the schedued queues. This behavior is known to significanty increase the deay, e.g., simuations have demonstrated that the poicy proposed by Tassiuas et a. [15] that schedues the maximum weight independent set in each sot has substantiay ower deay as compared to the randomized poicy proposed again by Tassiuas [14] that attains stabiity through simiar improvements as above. An interesting topic for future research is to investigate the tradeoffs between deay and computation times of scheduing poicies. D. Quasi-Geometric Graphs A graph is said to be quasi-geometric if nodes are embedded in the first quadrant of the 2-dimensiona pane, and a ink (a) exists between nodes u and v if the distance between them is ess than ιd where ι < 1 (b) may exist between nodes u and v if the distance between them is between ιd and D and (c) does not exist between nodes u and v if the distance between them is greater than or equa to D. Under primary interference constraints, as before, two inks interfere if and ony if they are adjacent. Under secondary interference constraints, two inks, interfere if and ony if (a) they are adjacent and (b) there is an edge between at east one end node of and another end node of. We first consider the secondary interference mode. Now, inks L (0),..., L (k 1) are seected as in the previous subsection, and GPGIIS (k) attains a throughput region which is 1 6/k of the maximum throughput region as before. However, each component of G (j) has O( G k 2 /ι 2 ) nodes, and O( 2 G k2 /ι 2 ) inks. Thus, the computation time for GPGIIS (k) is O( 2 G k2 /ι 2 ). Aso, GPGIIS (k) is in INFORMATION(O( 2 G k2 /ι 2 )) cass. Thus, GPGIIS ( 6/ɛ ) attains a throughput region which is 1 ɛ of the maximum throughput region, requires a computation time of O ( 2 G /(ι2 ɛ 2 )) and is in INFORMATION(O ( 2 G / (ι2 ɛ 2 ))) cass. Simiary, under the primary interference mode, a throughput region of 1 ɛ of the maximum throughput region can be attained using a poicy in INFORMATION(O( 2 G / (ι2 ɛ 2 ))) cass which requires O( 2 G /(ɛ2 ι 2 )) computation time. E. Distributed Impementation of the Scheduing Poicies We discuss two possibe distributed impementations for π(k). In one, in each sot one ink in each component determines which inks wi be schedued in the component and broadcasts the decisions in the entire component, and in another every ink does this computation. For the first each contending ink communicates its weight to the ink that computes the decisions in its component, and for the second each contending ink broadcasts its weight in its entire component. The probem with both impementations is that the size of the packets can not be bounded by any function of the network size since the queue engths exceed any given number with positive probabiity. A better soution is to have each ink broadcast the increase in its weight since the previous epoch in which the ink was in the same component (that is the same random number was seected). Now, the expectation of the magnitude of this increase is O(k)

Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling

Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling 1 Queue Length Stability in Trees under Slowly Convergent Traffic using Sequential Maximal Scheduling Saswati Sarkar and Koushik Kar Abstract In this paper, we consider queue-length stability in wireless

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks

Power Control and Transmission Scheduling for Network Utility Maximization in Wireless Networks ower Contro and Transmission Scheduing for Network Utiity Maximization in Wireess Networks Min Cao, Vivek Raghunathan, Stephen Hany, Vinod Sharma and. R. Kumar Abstract We consider a joint power contro

More information

Exploring the Throughput Boundaries of Randomized Schedulers in Wireless Networks

Exploring the Throughput Boundaries of Randomized Schedulers in Wireless Networks Exporing the Throughput Boundaries of Randomized Scheduers in Wireess Networks Bin Li and Atia Eryimaz Abstract Randomization is a powerfu and pervasive strategy for deveoping efficient and practica transmission

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

Problem set 6 The Perron Frobenius theorem.

Problem set 6 The Perron Frobenius theorem. Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines Recursive Constructions of Parae FIFO and LIFO Queues with Switched Deay Lines Po-Kai Huang, Cheng-Shang Chang, Feow, IEEE, Jay Cheng, Member, IEEE, and Duan-Shin Lee, Senior Member, IEEE Abstract One

More information

A Survey on Delay-Aware Resource Control. for Wireless Systems Large Deviation Theory, Stochastic Lyapunov Drift and Distributed Stochastic Learning

A Survey on Delay-Aware Resource Control. for Wireless Systems Large Deviation Theory, Stochastic Lyapunov Drift and Distributed Stochastic Learning A Survey on Deay-Aware Resource Contro 1 for Wireess Systems Large Deviation Theory, Stochastic Lyapunov Drift and Distributed Stochastic Learning arxiv:1110.4535v1 [cs.pf] 20 Oct 2011 Ying Cui Vincent

More information

Delay Analysis of Maximum Weight Scheduling in Wireless Ad Hoc Networks

Delay Analysis of Maximum Weight Scheduling in Wireless Ad Hoc Networks 1 Deay Anaysis o Maximum Weight Scheduing in Wireess Ad Hoc Networks ong Bao e, Krishna Jagannathan, and Eytan Modiano Abstract This paper studies deay properties o the weknown maximum weight scheduing

More information

<C 2 2. λ 2 l. λ 1 l 1 < C 1

<C 2 2. λ 2 l. λ 1 l 1 < C 1 Teecommunication Network Contro and Management (EE E694) Prof. A. A. Lazar Notes for the ecture of 7/Feb/95 by Huayan Wang (this document was ast LaT E X-ed on May 9,995) Queueing Primer for Muticass Optima

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea-Time Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 2, FEBRUARY

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 2, FEBRUARY IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO. 2, FEBRUARY 206 857 Optima Energy and Data Routing in Networks With Energy Cooperation Berk Gurakan, Student Member, IEEE, OmurOze,Member, IEEE,

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

The Group Structure on a Smooth Tropical Cubic

The Group Structure on a Smooth Tropical Cubic The Group Structure on a Smooth Tropica Cubic Ethan Lake Apri 20, 2015 Abstract Just as in in cassica agebraic geometry, it is possibe to define a group aw on a smooth tropica cubic curve. In this note,

More information

Separation of Variables and a Spherical Shell with Surface Charge

Separation of Variables and a Spherical Shell with Surface Charge Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation

More information

Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity

Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity Error-free Muti-vaued Broadcast and Byzantine Agreement with Optima Communication Compexity Arpita Patra Department of Computer Science Aarhus University, Denmark. arpita@cs.au.dk Abstract In this paper

More information

Optimal Distributed Scheduling under Time-varying Conditions: A Fast-CSMA Algorithm with Applications

Optimal Distributed Scheduling under Time-varying Conditions: A Fast-CSMA Algorithm with Applications Optima Distributed Scheduing under Time-varying Conditions: A Fast-CSMA Agorithm with Appications Bin Li and Atia Eryimaz Abstract Recenty, ow-compexity and distributed Carrier Sense Mutipe Access (CSMA)-based

More information

On the Goal Value of a Boolean Function

On the Goal Value of a Boolean Function On the Goa Vaue of a Booean Function Eric Bach Dept. of CS University of Wisconsin 1210 W. Dayton St. Madison, WI 53706 Lisa Heerstein Dept of CSE NYU Schoo of Engineering 2 Metrotech Center, 10th Foor

More information

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay Throughput Optima Scheduing for Wireess Downinks with Reconfiguration Deay Vineeth Baa Sukumaran vineethbs@gmai.com Department of Avionics Indian Institute of Space Science and Technoogy. Abstract We consider

More information

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity

More information

THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE

THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE KATIE L. MAY AND MELISSA A. MITCHELL Abstract. We show how to identify the minima path network connecting three fixed points on

More information

Target Location Estimation in Wireless Sensor Networks Using Binary Data

Target Location Estimation in Wireless Sensor Networks Using Binary Data Target Location stimation in Wireess Sensor Networks Using Binary Data Ruixin Niu and Pramod K. Varshney Department of ectrica ngineering and Computer Science Link Ha Syracuse University Syracuse, NY 344

More information

Centralized Coded Caching of Correlated Contents

Centralized Coded Caching of Correlated Contents Centraized Coded Caching of Correated Contents Qianqian Yang and Deniz Gündüz Information Processing and Communications Lab Department of Eectrica and Eectronic Engineering Imperia Coege London arxiv:1711.03798v1

More information

CONGRUENCES. 1. History

CONGRUENCES. 1. History CONGRUENCES HAO BILLY LEE Abstract. These are notes I created for a seminar tak, foowing the papers of On the -adic Representations and Congruences for Coefficients of Moduar Forms by Swinnerton-Dyer and

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea- Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process Management,

More information

BASIC NOTIONS AND RESULTS IN TOPOLOGY. 1. Metric spaces. Sets with finite diameter are called bounded sets. For x X and r > 0 the set

BASIC NOTIONS AND RESULTS IN TOPOLOGY. 1. Metric spaces. Sets with finite diameter are called bounded sets. For x X and r > 0 the set BASIC NOTIONS AND RESULTS IN TOPOLOGY 1. Metric spaces A metric on a set X is a map d : X X R + with the properties: d(x, y) 0 and d(x, y) = 0 x = y, d(x, y) = d(y, x), d(x, y) d(x, z) + d(z, y), for a

More information

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes A Fundamenta Storage-Communication Tradeoff in Distributed Computing with Stragging odes ifa Yan, Michèe Wigger LTCI, Téécom ParisTech 75013 Paris, France Emai: {qifa.yan, michee.wigger} @teecom-paristech.fr

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

Lower Bounds for the Relative Greedy Algorithm for Approximating Steiner Trees

Lower Bounds for the Relative Greedy Algorithm for Approximating Steiner Trees This paper appeared in: Networks 47:2 (2006), -5 Lower Bounds for the Reative Greed Agorithm for Approimating Steiner Trees Stefan Hougard Stefan Kirchner Humbodt-Universität zu Berin Institut für Informatik

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c)

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c) A Simpe Efficient Agorithm of 3-D Singe-Source Locaization with Uniform Cross Array Bing Xue a * Guangyou Fang b Yicai Ji c Key Laboratory of Eectromagnetic Radiation Sensing Technoogy, Institute of Eectronics,

More information

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver

More information

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR 1 Maximizing Sum Rate and Minimizing MSE on Mutiuser Downink: Optimaity, Fast Agorithms and Equivaence via Max-min SIR Chee Wei Tan 1,2, Mung Chiang 2 and R. Srikant 3 1 Caifornia Institute of Technoogy,

More information

Heavy-traffic Delay Optimality in Pull-based Load Balancing Systems: Necessary and Sufficient Conditions

Heavy-traffic Delay Optimality in Pull-based Load Balancing Systems: Necessary and Sufficient Conditions Heavy-traffic Deay Optimaity in Pu-based Load Baancing Systems: Necessary and Sufficient Conditions XINGYU ZHOU, The Ohio State University JIAN TAN, The Ohio State University NSS SHROFF, The Ohio State

More information

An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks

An Adaptive Opportunistic Routing Scheme for Wireless Ad-hoc Networks An Adaptive Opportunistic Routing Scheme for Wireess Ad-hoc Networks A.A. Bhorkar, M. Naghshvar, T. Javidi, and B.D. Rao Department of Eectrica Engineering, University of Caifornia San Diego, CA, 9093

More information

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai

More information

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract Stochastic Compement Anaysis of Muti-Server Threshod Queues with Hysteresis John C.S. Lui The Dept. of Computer Science & Engineering The Chinese University of Hong Kong Leana Goubchik Dept. of Computer

More information

Efficient Generation of Random Bits from Finite State Markov Chains

Efficient Generation of Random Bits from Finite State Markov Chains Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

SVM: Terminology 1(6) SVM: Terminology 2(6)

SVM: Terminology 1(6) SVM: Terminology 2(6) Andrew Kusiak Inteigent Systems Laboratory 39 Seamans Center he University of Iowa Iowa City, IA 54-57 SVM he maxima margin cassifier is simiar to the perceptron: It aso assumes that the data points are

More information

Statistical Learning Theory: A Primer

Statistical Learning Theory: A Primer Internationa Journa of Computer Vision 38(), 9 3, 2000 c 2000 uwer Academic Pubishers. Manufactured in The Netherands. Statistica Learning Theory: A Primer THEODOROS EVGENIOU, MASSIMILIANO PONTIL AND TOMASO

More information

Unconditional security of differential phase shift quantum key distribution

Unconditional security of differential phase shift quantum key distribution Unconditiona security of differentia phase shift quantum key distribution Kai Wen, Yoshihisa Yamamoto Ginzton Lab and Dept of Eectrica Engineering Stanford University Basic idea of DPS-QKD Protoco. Aice

More information

Inductive Bias: How to generalize on novel data. CS Inductive Bias 1

Inductive Bias: How to generalize on novel data. CS Inductive Bias 1 Inductive Bias: How to generaize on nove data CS 478 - Inductive Bias 1 Overfitting Noise vs. Exceptions CS 478 - Inductive Bias 2 Non-Linear Tasks Linear Regression wi not generaize we to the task beow

More information

FRIEZE GROUPS IN R 2

FRIEZE GROUPS IN R 2 FRIEZE GROUPS IN R 2 MAXWELL STOLARSKI Abstract. Focusing on the Eucidean pane under the Pythagorean Metric, our goa is to cassify the frieze groups, discrete subgroups of the set of isometries of the

More information

arxiv: v1 [math.co] 17 Dec 2018

arxiv: v1 [math.co] 17 Dec 2018 On the Extrema Maximum Agreement Subtree Probem arxiv:1812.06951v1 [math.o] 17 Dec 2018 Aexey Markin Department of omputer Science, Iowa State University, USA amarkin@iastate.edu Abstract Given two phyogenetic

More information

Age-based Scheduling: Improving Data Freshness for Wireless Real-Time Traffic

Age-based Scheduling: Improving Data Freshness for Wireless Real-Time Traffic Age-based Scheduing: Improving Data Freshness for Wireess Rea-Time Traffic Ning Lu Department of CS Thompson Rivers University amoops, BC, Canada nu@tru.ca Bo Ji Department of CIS Tempe University Phiadephia,

More information

Some Measures for Asymmetry of Distributions

Some Measures for Asymmetry of Distributions Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester

More information

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network

More information

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization

Scalable Spectrum Allocation for Large Networks Based on Sparse Optimization Scaabe Spectrum ocation for Large Networks ased on Sparse Optimization innan Zhuang Modem R&D Lab Samsung Semiconductor, Inc. San Diego, C Dongning Guo, Ermin Wei, and Michae L. Honig Department of Eectrica

More information

Theoretical Computer Science. Construction of strongly connected dominating sets in asymmetric multihop wireless networks

Theoretical Computer Science. Construction of strongly connected dominating sets in asymmetric multihop wireless networks Theoretica Computer Science 40 (009) 66 669 Contents ists avaiabe at ScienceDirect Theoretica Computer Science ourna homepage: www.esevier.com/ocate/tcs Construction of strongy connected dominating sets

More information

Seung Jun Baek 1 and Joon-Sang Park Introduction. example, autonomous vehicles, remote surgery, and automated

Seung Jun Baek 1 and Joon-Sang Park Introduction. example, autonomous vehicles, remote surgery, and automated Hindawi Mathematica Probems in Engineering Voume 2017, Artice ID 4362652, 15 pages https://doi.org/10.1155/2017/4362652 Research Artice Deay-Optima Scheduing for Two-Hop Reay Networks with Randomy Varying

More information

Gauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law

Gauss Law. 2. Gauss s Law: connects charge and field 3. Applications of Gauss s Law Gauss Law 1. Review on 1) Couomb s Law (charge and force) 2) Eectric Fied (fied and force) 2. Gauss s Law: connects charge and fied 3. Appications of Gauss s Law Couomb s Law and Eectric Fied Couomb s

More information

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University

More information

Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correlated Channel Failures

Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correlated Channel Failures Packet Fragmentation in Wi-Fi Ad Hoc Networks with Correated Channe Faiures Andrey Lyakhov Vadimir Vishnevsky Institute for Information Transmission Probems of RAS B. Karetny 19, Moscow, 127994, Russia

More information

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with?

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with? Bayesian Learning A powerfu and growing approach in machine earning We use it in our own decision making a the time You hear a which which coud equay be Thanks or Tanks, which woud you go with? Combine

More information

Atomic Hierarchical Routing Games in Communication Networks

Atomic Hierarchical Routing Games in Communication Networks Atomic Hierarchica Routing Games in Communication etworks Vijay Kambe, Eitan Atman, Rachid E-Azouzi Vinod Sharma Dept. of Industria Engineering Management, IIT - Kharagpur, West Benga, India Maestro group,

More information

Fast Blind Recognition of Channel Codes

Fast Blind Recognition of Channel Codes Fast Bind Recognition of Channe Codes Reza Moosavi and Erik G. Larsson Linköping University Post Print N.B.: When citing this work, cite the origina artice. 213 IEEE. Persona use of this materia is permitted.

More information

ASummaryofGaussianProcesses Coryn A.L. Bailer-Jones

ASummaryofGaussianProcesses Coryn A.L. Bailer-Jones ASummaryofGaussianProcesses Coryn A.L. Baier-Jones Cavendish Laboratory University of Cambridge caj@mrao.cam.ac.uk Introduction A genera prediction probem can be posed as foows. We consider that the variabe

More information

Coalitions in Routing Games: A Worst-Case Perspective

Coalitions in Routing Games: A Worst-Case Perspective Coaitions in Routing Games: A Worst-Case Perspective Gideon Bocq and Arie Orda, Feow, IEEE arxiv:30.3487v3 [cs.ni] 27 Mar 206 Abstract We investigate a routing game that aows for the creation of coaitions,

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

K a,k minors in graphs of bounded tree-width *

K a,k minors in graphs of bounded tree-width * K a,k minors in graphs of bounded tree-width * Thomas Böhme Institut für Mathematik Technische Universität Imenau Imenau, Germany E-mai: tboehme@theoinf.tu-imenau.de and John Maharry Department of Mathematics

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

How many random edges make a dense hypergraph non-2-colorable?

How many random edges make a dense hypergraph non-2-colorable? How many random edges make a dense hypergraph non--coorabe? Benny Sudakov Jan Vondrák Abstract We study a mode of random uniform hypergraphs, where a random instance is obtained by adding random edges

More information

Delay Asymptotics with Retransmissions and Fixed Rate Codes over Erasure Channels

Delay Asymptotics with Retransmissions and Fixed Rate Codes over Erasure Channels Deay Asymptotics with Retransmissions and Fixed Rate Codes over Erasure Channes Jian Tan, Yang Yang, Ness B. Shroff, Hesham E Gama Department of Eectrica and Computer Engineering The Ohio State University,

More information

(This is a sample cover image for this issue. The actual cover is not yet available at this time.)

(This is a sample cover image for this issue. The actual cover is not yet available at this time.) (This is a sampe cover image for this issue The actua cover is not yet avaiabe at this time) This artice appeared in a journa pubished by Esevier The attached copy is furnished to the author for interna

More information

Distributed average consensus: Beyond the realm of linearity

Distributed average consensus: Beyond the realm of linearity Distributed average consensus: Beyond the ream of inearity Usman A. Khan, Soummya Kar, and José M. F. Moura Department of Eectrica and Computer Engineering Carnegie Meon University 5 Forbes Ave, Pittsburgh,

More information

PHYS 110B - HW #1 Fall 2005, Solutions by David Pace Equations referenced as Eq. # are from Griffiths Problem statements are paraphrased

PHYS 110B - HW #1 Fall 2005, Solutions by David Pace Equations referenced as Eq. # are from Griffiths Problem statements are paraphrased PHYS 110B - HW #1 Fa 2005, Soutions by David Pace Equations referenced as Eq. # are from Griffiths Probem statements are paraphrased [1.] Probem 6.8 from Griffiths A ong cyinder has radius R and a magnetization

More information

A Statistical Framework for Real-time Event Detection in Power Systems

A Statistical Framework for Real-time Event Detection in Power Systems 1 A Statistica Framework for Rea-time Event Detection in Power Systems Noan Uhrich, Tim Christman, Phiip Swisher, and Xichen Jiang Abstract A quickest change detection (QCD) agorithm is appied to the probem

More information

Improved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization

Improved Min-Sum Decoding of LDPC Codes Using 2-Dimensional Normalization Improved Min-Sum Decoding of LDPC Codes sing -Dimensiona Normaization Juntan Zhang and Marc Fossorier Department of Eectrica Engineering niversity of Hawaii at Manoa Honouu, HI 968 Emai: juntan, marc@spectra.eng.hawaii.edu

More information

Algorithms to solve massively under-defined systems of multivariate quadratic equations

Algorithms to solve massively under-defined systems of multivariate quadratic equations Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations

More information

6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7

6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17. Solution 7 6.434J/16.391J Statistics for Engineers and Scientists May 4 MIT, Spring 2006 Handout #17 Soution 7 Probem 1: Generating Random Variabes Each part of this probem requires impementation in MATLAB. For the

More information

Discrete Applied Mathematics

Discrete Applied Mathematics Discrete Appied Mathematics 159 (2011) 812 825 Contents ists avaiabe at ScienceDirect Discrete Appied Mathematics journa homepage: www.esevier.com/ocate/dam A direct barter mode for course add/drop process

More information

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is

More information

8 Digifl'.11 Cth:uits and devices

8 Digifl'.11 Cth:uits and devices 8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,

More information

Math 1600 Lecture 5, Section 2, 15 Sep 2014

Math 1600 Lecture 5, Section 2, 15 Sep 2014 1 of 6 Math 1600 Lecture 5, Section 2, 15 Sep 2014 Announcements: Continue reading Section 1.3 and aso the Exporation on cross products for next cass. Work through recommended homework questions. Quiz

More information

Coded Caching for Files with Distinct File Sizes

Coded Caching for Files with Distinct File Sizes Coded Caching for Fies with Distinct Fie Sizes Jinbei Zhang iaojun Lin Chih-Chun Wang inbing Wang Department of Eectronic Engineering Shanghai Jiao ong University China Schoo of Eectrica and Computer Engineering

More information

Rate Adaptation Games in Wireless LANs: Nash Equilibrium and Price of Anarchy

Rate Adaptation Games in Wireless LANs: Nash Equilibrium and Price of Anarchy Rate Adaptation Games in Wireess LANs: Nash Equiibrium and Price of Anarchy Prasanna Chaporkar, Aexandre Proutiere, and Božidar Radunović Technica Report MSR-TR-2008-137 Microsoft Research Microsoft Corporation

More information

A proposed nonparametric mixture density estimation using B-spline functions

A proposed nonparametric mixture density estimation using B-spline functions A proposed nonparametric mixture density estimation using B-spine functions Atizez Hadrich a,b, Mourad Zribi a, Afif Masmoudi b a Laboratoire d Informatique Signa et Image de a Côte d Opae (LISIC-EA 4491),

More information

A mezoscopic vehicles pursuit model for managing traffic during a massive evacuation

A mezoscopic vehicles pursuit model for managing traffic during a massive evacuation A mezoscopic vehices pursuit mode for managing traffic during a massive evacuation Houssein Aaeddine a,b, Mindjid Maizia a, Kama Serrhini a, Emmanue Néron b a Laboratoire Citères de université de Tours

More information

Finite Horizon Energy-Efficient Scheduling with Energy Harvesting Transmitters over Fading Channels

Finite Horizon Energy-Efficient Scheduling with Energy Harvesting Transmitters over Fading Channels Finite Horizon Energy-Efficient Scheduing with Energy Harvesting Transmitters over Fading Channes arxiv:702.06390v [cs.it] 2 Feb 207 Baran Tan Bacinogu, Eif Uysa-Biyikogu, Can Emre Koksa METU, Ankara,

More information

Random maps and attractors in random Boolean networks

Random maps and attractors in random Boolean networks LU TP 04-43 Rom maps attractors in rom Booean networks Björn Samuesson Car Troein Compex Systems Division, Department of Theoretica Physics Lund University, Sövegatan 4A, S-3 6 Lund, Sweden Dated: 005-05-07)

More information

Connectivity and Aggregation in Multihop Wireless Networks

Connectivity and Aggregation in Multihop Wireless Networks Connectivity and Aggregation in Mutihop Wireess Networks Marijke H.L. Bodaender ICE-TCS Schoo of Computer Science Reykjavik University, Iceand. mbodaender@gmai.com Magnús M. Hadórsson ICE-TCS Schoo of

More information

Distributed Queue-Length based Algorithms for Optimal End-to-End Throughput Allocation and Stability in Multi-hop Random Access Networks

Distributed Queue-Length based Algorithms for Optimal End-to-End Throughput Allocation and Stability in Multi-hop Random Access Networks Distribute Queue-Length base Agorithms for Optima En-to-En Throughput Aocation an Stabiity in Muti-hop Ranom Access Networks Jiaping Liu Department of Eectrica Engineering Princeton University Princeton,

More information

How the backpropagation algorithm works Srikumar Ramalingam School of Computing University of Utah

How the backpropagation algorithm works Srikumar Ramalingam School of Computing University of Utah How the backpropagation agorithm works Srikumar Ramaingam Schoo of Computing University of Utah Reference Most of the sides are taken from the second chapter of the onine book by Michae Nieson: neuranetworksanddeepearning.com

More information

A New Backpressure Algorithm for Joint Rate Control and Routing with Vanishing Utility Optimality Gaps and Finite Queue Lengths

A New Backpressure Algorithm for Joint Rate Control and Routing with Vanishing Utility Optimality Gaps and Finite Queue Lengths A New Backpressure Agorithm or Joint Rate Contro and Routing with Vanishing Utiity Optimaity Gaps and Finite Queue Lengths Hao Yu and Michae J. Neey Abstract The backpressure agorithm has been widey used

More information

Transmit Antenna Selection for Physical-Layer Network Coding Based on Euclidean Distance

Transmit Antenna Selection for Physical-Layer Network Coding Based on Euclidean Distance Transmit ntenna Seection for Physica-Layer Networ Coding ased on Eucidean Distance 1 arxiv:179.445v1 [cs.it] 13 Sep 17 Vaibhav Kumar, arry Cardiff, and Mar F. Fanagan Schoo of Eectrica and Eectronic Engineering,

More information

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES ANDRZEJ DUDEK AND ANDRZEJ RUCIŃSKI Abstract. For positive integers k and, a k-uniform hypergraph is caed a oose path of ength, and denoted by

More information

ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK

ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK ESTIMATION OF SAMPLING TIME MISALIGNMENTS IN IFDMA UPLINK Aexander Arkhipov, Michae Schne German Aerospace Center DLR) Institute of Communications and Navigation Oberpfaffenhofen, 8224 Wessing, Germany

More information

Week 6 Lectures, Math 6451, Tanveer

Week 6 Lectures, Math 6451, Tanveer Fourier Series Week 6 Lectures, Math 645, Tanveer In the context of separation of variabe to find soutions of PDEs, we encountered or and in other cases f(x = f(x = a 0 + f(x = a 0 + b n sin nπx { a n

More information

APPENDIX C FLEXING OF LENGTH BARS

APPENDIX C FLEXING OF LENGTH BARS Fexing of ength bars 83 APPENDIX C FLEXING OF LENGTH BARS C.1 FLEXING OF A LENGTH BAR DUE TO ITS OWN WEIGHT Any object ying in a horizonta pane wi sag under its own weight uness it is infinitey stiff or

More information

Akaike Information Criterion for ANOVA Model with a Simple Order Restriction

Akaike Information Criterion for ANOVA Model with a Simple Order Restriction Akaike Information Criterion for ANOVA Mode with a Simpe Order Restriction Yu Inatsu * Department of Mathematics, Graduate Schoo of Science, Hiroshima University ABSTRACT In this paper, we consider Akaike

More information

Optimal Control of Assembly Systems with Multiple Stages and Multiple Demand Classes 1

Optimal Control of Assembly Systems with Multiple Stages and Multiple Demand Classes 1 Optima Contro of Assemby Systems with Mutipe Stages and Mutipe Demand Casses Saif Benjaafar Mohsen EHafsi 2 Chung-Yee Lee 3 Weihua Zhou 3 Industria & Systems Engineering, Department of Mechanica Engineering,

More information

Coupling of LWR and phase transition models at boundary

Coupling of LWR and phase transition models at boundary Couping of LW and phase transition modes at boundary Mauro Garaveo Dipartimento di Matematica e Appicazioni, Università di Miano Bicocca, via. Cozzi 53, 20125 Miano Itay. Benedetto Piccoi Department of

More information

Lecture Note 3: Stationary Iterative Methods

Lecture Note 3: Stationary Iterative Methods MATH 5330: Computationa Methods of Linear Agebra Lecture Note 3: Stationary Iterative Methods Xianyi Zeng Department of Mathematica Sciences, UTEP Stationary Iterative Methods The Gaussian eimination (or

More information

Statistical Learning Theory: a Primer

Statistical Learning Theory: a Primer ??,??, 1 6 (??) c?? Kuwer Academic Pubishers, Boston. Manufactured in The Netherands. Statistica Learning Theory: a Primer THEODOROS EVGENIOU AND MASSIMILIANO PONTIL Center for Bioogica and Computationa

More information

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient

More information

Efficient Similarity Search across Top-k Lists under the Kendall s Tau Distance

Efficient Similarity Search across Top-k Lists under the Kendall s Tau Distance Efficient Simiarity Search across Top-k Lists under the Kenda s Tau Distance Koninika Pa TU Kaisersautern Kaisersautern, Germany pa@cs.uni-k.de Sebastian Miche TU Kaisersautern Kaisersautern, Germany smiche@cs.uni-k.de

More information

Partial permutation decoding for MacDonald codes

Partial permutation decoding for MacDonald codes Partia permutation decoding for MacDonad codes J.D. Key Department of Mathematics and Appied Mathematics University of the Western Cape 7535 Bevie, South Africa P. Seneviratne Department of Mathematics

More information

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm 1 Asymptotic Properties of a Generaized Cross Entropy Optimization Agorithm Zijun Wu, Michae Koonko, Institute for Appied Stochastics and Operations Research, Caustha Technica University Abstract The discrete

More information