Optimizing Power Allocation in Interference Channels Using D.C. Programming
|
|
- Shanna Hodge
- 5 years ago
- Views:
Transcription
1 Otimizing Power Allocation in Interference Channels Using D.C. Programming Hussein Al-Shatri, Tobias Weber To cite this version: Hussein Al-Shatri, Tobias Weber. Otimizing Power Allocation in Interference Channels Using D.C. Programming. WiOt 10: odeling Otimization in obile, Ad Hoc, Wireless Networks, ay 2010, Avignon, France , <inria > HAL Id: inria htts://hal.inria.fr/inria Submitted on 13 Jul 2010 HAL is a multi-discilinary oen access archive for the deosit dissemination of scientific research documents, whether they are ublished or not. The documents may come from teaching research institutions in France or abroad, or from ublic or rivate research centers. L archive ouverte luridiscilinaire HAL, est destinée au déôt et à la diffusion de documents scientifiques de niveau recherche, ubliés ou non, émanant des établissements d enseignement et de recherche français ou étrangers, des laboratoires ublics ou rivés.
2 RAWNET 2010 Otimizing Power Allocation in Interference Channels Using D.C. Programming Hussein Al-Shatri Tobias Weber Institute of Communications Engineering University of Rostock Richard-Wagner-Str. 31, Rostock, Germany Telehone:49) , Fax:49) Abstract Power allocation is a romising aroach for otimizing the erformance of mobile radio systems in interference channels. In the resent aer, the non-convex objective function of the ower allocation roblem aiming at maximizing the sum rate with a total ower constraint is reformulated as a difference of two concave functions. A global otimum ower allocation isfoundbyalyingabranchboundbasedalgorithmto the new formulation. The algorithm basically slits the feasible region consecutively into subregions where for every subregion the objective function is uer lower bounded. For a certain artition of the feasible region, a ower allocation corresonding to the highest lower bound which is uer bounded by the highest uer bound with some insignificant difference is found as the global otimum. A convex maximization formulation of the otimization roblem with a iecewise linearly outer aroximated feasible region is essentially alied for finding an uer bound which only requires solving a linear rogram roblem. The simulation results show a significant imrovement in the sum rate of the roosed algorithm over the conventional subotimal techniques. I. INTRODUCTION Interference is a dominant source of erformance degradations in mobile radio systems. If the nodes communicate autonomously through a shared channel, i.e., there is no cooeration among nodes, the interference channel can be considered as a system level model1]. In the interference channel, it is assumed that a number of transmitter-receiver airs communicate with each other through a shared medium where any transmission from a transmitter would not just result inausefulsignalatitscorresondingreceiverbutalsoinan interference signal at all other receivers. Power allocation lays a key role in imroving the system erformance in interference channels. A smart ower allocation resulting in minimizing the received interference thus maximizing the system sum rate is required. If the interference is treated as noise, the ower allocation otimization roblem aimingatmaximizingthesumratewithatotalowerconstraint is a non-convex roblem. Consequently, sub-otimal solutions of the roblem heuristic algorithms are roosed 2]. In the resent study, we solve this non-convex roblem by rewriting the non-convex objective function of the sum rate as a difference of two concave functions. The new formulation oftheroblemcanbesolvedusingaclassoftheglobalotimization methods called difference of two convex functions rogramming or shortly D.C. rogramming3]. Because of the nice roerties of the D.C. functions, D.C. rogramming attained a great attention during the last few decades several efficient algorithms for a variety of alications are roosed3],4]. Our aroach uses a branch bound algorithm. The algorithm initially estimates an uer bound a lower bound ofthed.c.functionofthesumrateoverthewholefeasible region. Then it slits the feasible region recursively into subregions where it estimates the bounds for every subregion. Considering the highest lower bound, many subregions with loweruerboundsarenotofinterest.alsoifthisbound reaches the highest uer bound for a certain artition of the feasible region with some insignificant difference, the corresonding ower allocation is taken as the otimum. Thefruitionofthealgorithmisbasedonagoodestimation ofthebounds.byintroducinganewvariable,i.e.,addinga new dimension to the roblem, the D.C. roblem is reformulated as a convex maximization roblem over a iecewise linearly outer aroximated convex set. An uer bound of a subregion is found by comuting the greatest distance with resecttothenewaddeddimensionbetweenaointinthe convexsetcorresondingtoalocallowerboundaointin the enveloe of the convex set. Furthermore, a corner oint in a subregion which leads to the highest sum rate is considered asalowerbound. In5], the authors find a global otimum ower allocation for multiuser DSL networks. Assuming a ower constraint er user, the otimization roblem for maximizing the sum rate is decouledacrossalltonestomakeitsolvableonaertone basis.sotheyformad.c.rogramoutofadualformofa weightedsumrateforasingletonewithweightedowersof all users. These weights are udated iteratively to meet both ower rate constraints. The D.C. roblem is solved using a rismatic branch bound algorithm which is roosed in 3]. Theremainderoftheaerisorganizedasfollows.Thenext section describes the system model. Section III introduces the roblem statement the D.C. formulation. In Section IV the roosed algorithm is described. Section V resents some simulation results. The conclusions are drawn in Section VI. 367
3 Tx 1, 1 Tx K, K g 1K g K1 g 11 g KK σ 2 1 σ 2 K Rx 1 Rx K Fig. 1: An interference channel scenario containing K transmitter-receiver airs II. SYSTE ODEL A general memoryless interference channel with erfect channel knowledge at the transmitters is assumed. A scenario consisting of K transmitter-receiver airs which are couled by interfering links is considered. Let h kl be the channel coefficient of the link between the transmitter l the receiver k,where k, l = 1,..., K.Thenthecorresondingchannelgain isdenotedas g kl = h kl 2.Fig.1showsaK transmitterreceiverairsscenariowhere σk 2isthenoiseoweratreceiver k. Then g 11 g 12 g 1K g 21 g 22 g 2K G = g K1 g K2 g KK is the gain matrix where the matrix s non-diagonal elements corresondtotheinterferinglinks.let = 1,, K ) T be the vector of the transmitted owers. The main concern here is how to allocate owers to the individual transmitters under the total ower constraint k = tot, k 0 1) which directly reflects the resulting total interference. The sum rateisusedasameasureoferformancewhichiscalculated based on a simlified assumtion that the interference is treated as white Gaussian noise: g kk k C = ld 1 + σk ) g kl l III. PROBLE STATEENT Based on the assumtions stated on Section II, the otimum owerallocationvector ot isfoundbysolvingthefollowing maximization roblem: g kk k ot = argmax ld 1 + σk 2 + g kl l 3) l k l k k = tot, k 0. 4) This roblem is non-convex a closed form solution is not known. Using a quotient roerty of the logarithms which statesthat loga/b) = loga) logb)for A, B > 0,the sumratefunctioncanbewrittenasadifferenceoftwoconcave functions. Therefore, the maximization roblem of3)-4) can be reformulated as a D.C. roblem: where ot = argmax f ) g )} 5) f ) = g ) = k = tot, k 0 6) ) K ld σk 2 + g kl l, 7) l=1 ld σ k 2 + l k g kl l. 8) Both functions of7) 8) are concave functions. IV. BRANCH AND BOUND ALGORITH Inthissection,analgorithmbasedonthebranchbound technique is described. The algorithm basically finds a global otimum ower allocation by searching over a full binary tree. A. Constructing the Tree Definition 1. A K-simlex T has the K + 1 vertices v 0),, v K) with v 0) beingthevertexattheorigin thereresentation x = K k=0 λk) v k) isuniqueforall x T where k λk) = 1 0 λ k) 1for k = 0,, K. The root of the tree corresondsto an initial K 1)- dimensionalface F 1),i.e., F 1) isobtainedbysetting λ 0) = 0 in a K-simlex, which covers exactly the whole feasible regionoftheowerallocationstheverticesof F 1) are the corners of the feasible region, i.e., F 1) = tot, 0,, 0),0, tot, 0,, 0),, 0,, 0, tot )] = 1), 2),, K)]. Eachnode ihastwochildren.theyareconstructedbyslitting F i) overitslongestedge.thisrocessiscalledbranching.now,consideranode iwith F i) = 1),, K)] whichhas Kverticesthelongestedgeisinbetweenthe vertices x) y).thenthenewvertexwhichisshared by F 2i) F 2i+1) is k) = 1 2 x) + y)).thetwonew K 1)-dimensional faces are F 2i) = 1),, x), k),, K)], 10) 9) 368
4 F 1) 3 3) F 2) F 3) F 4) F 5) F 6) F 7) F 1) 2) 2 Fig. 2: The structure of the tree where every node corresonds toafacecoveringthewholeorartofthefeasibleregion. F 2i+1) = 1),, y), k),, K)]. 11) ThestructureoftheresultingtreeisshowninFig.2.For examle, in a three-user scenario, the initial 2-dimensional face is F 1) = tot, 0, 0),0, tot, 0),0, 0, tot )] = 1), 2), 3)]. Itisslitintotwofaces F 2) = F 3) = 12) 1), 3), 4)], 13) 2), 3), 4)] 14) where 4) = 1 1) + 2)). 15) 2 This rocess is illustrated in Fig. 3. B. Searching Over the Tree Aly a breath-first search through the tree. For every node i in the tree, comute an uer bound u i) of max f ) g )} a lower bound l i) of max f ) g )}withthecorresondingowerallocation LB,i.Thecomutationofanuerboundalowerbound is described in details in Sections IV-C IV-D, resectively. This rocess is usually called bounding. Then udate the global lower bound as β i) = max β i 1), l i)} where β 1) = l 1) itscorresonding owerallocationis ot,i.accordingly,therearethreecases: 1) If u i) β i) < 0theowerallocationwhichmaximizes f ) g )isnotin F i).so,thereisnoneedtoinsect the children. 2) If u i) β i) > ǫforsometolerancevalue ǫ > 0,the face F i) maycontainaowerallocationcorresonding to the globalmaximumbut a lower boundwhich is closetotheuerbound u i) withsomearbitrarysmall 1 1 1) 1) 3 a) F 1) 3) F 2) F 3) 4) b) F 2) F 3) 2) Fig. 3: An examle of slitting a 2-dimensional face. difference ǫstillhastobefound.sothetwochildren nodes 2i 2i + 1needtobeinsected. 3) If 0 u i) β i) ǫthelowerbound β i) isthe localmaximumof F i) withsomeaccetablerecision if ot,i F i) itcanbeaglobalmaximumifno other nodes with higher lower bounds are found. Finally, the algorithm terminates when no more nodes have to beinsectedwithaglobalotimumowerallocation ot,i corresondingto β I) where Ireresentstheindexofthelast checked node. C. Comuting an Uer Bound Let i) = i 1) max,i 1 }with 1) = V F 1)) reresenting a set of feasible ower allocations where max,i 1 isafeasibleowerallocationwhichisfoundwhen calculatingtheuerbound u i 1) V F i)) isthesetof verticesoftheface F i). } f i) ) = min j ) T f j ) + f j ) j i) 2 16) 369
5 asanaroximationoftheconcavefunction f )withthe following roerties: f i) )isiecewiselinearconcave. ) f )isanouteraroximation. f i) f i) ) = f ), i). From i 1) i) follows f i 1) From f i) ) f )follows: ) > f i) ). } max f ) g )} max f i) ) g ). 17) } As a result, max f i) ) g ) is an uer bound of max f ) g )}. } The maximization roblem max f i) ) g ) with the total ower constraint can be reformulated as a convex maximization roblem: t u, u ) = argmax t g )} 18) t, k = tot, k 0, 19) t f i) ) 0. 20) The two constraints in19) 20) reresent a new feasible region which is described as a olytoe } E i) =, t) : a i) t A i) b i), k = tot, 21) i.e., the region is closed has linear boundaries, where I K K f 1 ) T A i) =., 22) ) T f i) ) b i) = a i) = 0K 1 1 i) 1 0 K 1 f 1 ) 1 ) T f 1 ).. ) ) T f i) i) f i), 23) ). 24) Fig.4showsthefeasibleregion E i) ofatwouserscenario.theotimumoint, t)intheolytoe E i) which maximizes t g ) has to be at the convexenveloeof E i) where t = f i) ). Now consider the oints, t) which lead to a constant value t g ) = c i) where ϕi) ) 1), f i) 1) )) 1 u, t u ) 1) t E i) t = f i) ) 2), f i) 2) 2) )) Fig.4:Thefeasibleregion E i) oftheconvexmaximization roblem of a two-user scenario. c i) = max f i) k) ) g k))}.theseointsformakdimensionalconcavefunction ϕ i) ) = t = } c i) + g )at therangeof twith = : k = tot asshownin Fig.4.Thenthemaximumof t g )corresondstothe oint u, t u )ontheenveloeof E i) whichhasthegreatest distanceto ϕ i) )withresecttot-axis. A K-dimensionalsubsace Υ i) isuniquelydefinedbythe oints k), t k)) theoriginas 2 t h T = 0, 25) where hisak-dimensionalvectortheoints k), t k)) arefoundas t k) = c i) + g k)), 26) for k = 1,, K. For the sake of simlicity, consider thesubsace Υ i) insteadoftheconcavefunction ϕ i) ). Since ϕ i) )isconcave Υ i) intersects ϕ i) )atthe oints k), t k)), } every oint, t) in Υ i) with = : k = tot leadsto t g ) c i).fig.5showsthe intersectionbetweenthefeasibleregion E i) thesubsace Υ i) whichissannedbythevectors u v.itshowsthatthis intersectionisuerboundedby ϕ i) ).Ontheotherh, thegreatestdistance i) inthedirectionoft-axisbetween aoint, t)ontheenveloeof } E i) aoint, t)in Υ i) with = : k = tot is larger than the distance between ϕ i) )anyointontheenveloeof E i) intaxisdirection.therefore, i) +c i) isasuitableuerbound of t g ). Proosition1. Thegreatestdistance i) max between a oint, t)ontheenveloeof E i) aoint, t)in Υ i) with 370
6 } = : k = tot is found using the linear rogram } ) Λ i) max, t max = argmax t λ k) t k) 27) Λ i),t a i) t A i) P i) Λ i) b i), 28) 1 1 K P i) Λ i)) = tot, 29) where Λ i) = λ 1),, λ K)) T is a vector of weighting factors λ k) ofthevertices k) P i) beingamatrixwith columns k), k. Proof:Thegreatestdistance i) max is described as max,i, t max ) = argmax t h T } 30),t), t) E i). 31) Basedondefinition1,everyowerallocation F i) is uniquely reresentable as = λ k) k) 32) with K λ k) = 1, λ k) 0, k = 1,, K.Thensubstituting 32)to t h T gives K t h T λ k) k) = t λ k) h T k). 33) Since Υ i) ϕ i) )attheoints k), t k)),theseoints satisfy h T k) = t k) c i). 34) Substituting34) in33) gives t λ k) t k) c i)) = t λ k) t k) +c i) = i) +c i) 35) where λ k) = 1.Usingtheresultof35),theotimization k roblem of30)-31) is equivalent to the linear rogram of 27)-29). The linear rogram of27)-29) can be solved using the active-setmethodwithaninitialoint k), t k)) corresondingto c i) 6].Thentheuerboundis where u i) = c i) + i) max, 36) i) max = t max max,i, t max ) = λ k) max tk), 37) )) P i) Λ i) max, f P i) Λ i) max 38) 1), f i) 1), t 1)) 1 u, t u ) u 1) t max,i, t max ) i) max ϕ i) ) )) 2), f i) )) 2) 1) Υ i) E i) v 2), t 2)) 2) Fig.5:Thesubsace Υ i) withbasisvectors u vintersects the feasible region E i) in between the oints k), t k)) where this intersection is lower than the concave function ϕ i) )int-axisdirection. isthecornerointontheenveloeof E i) withthegreatest } distanceto Υ i) with = : k = tot in the directionoft-axis max,i = P i) Λ i) max is a ower allocation whichcanbealiedasalowerboundcidate. D. Comuting a Lower Bound Foreachnode i,alowerboundiscomutedas l i) = max f ) g )}, 39) the corresonding ower allocation is with LB,i = argmax f ) g )}, 40) 2 V F i)) }, max,i. 41) V. NUERICAL RESULTS In this section, the erformance of the roosed algorithm isdemonstratedasafunctionoftheseudosignaltonoise ratio γ SNR whichisdefinedastheratioofthetotaltransmit owertothenoiseoweratthereceiversindecibel γ SNR = 10log tot /σk 2 ), k. For the following, well known sub-otimal ower allocation schemes are used as benchmarks. The first scheme is the greedy ower allocation which serves only the user with the highest channel gain: k = tot k = k max, k 0 otherwise 42) 371
7 C/bit with k max = argmax g kk }, k. 43) k Also the equal ower allocation which serves all users with equal owers is considered: k = tot, k. 44) K The third scheme is the signal to interference ratio balancing schemesir balancing) which equalizes the signal to interference ratios at all receivers: γ k) = g kk k = γ 45) g kl l l k where γ is the resulting signal to interference ratio. As introduced in1], the waterfilling scheme neglects the interference art in2) solves the resulting convex roblem of3)-4) using the Lagrangian multilier method. The allocated ower at k-thuseris } k = max 0, w σ2 k 46) g kk where w isthewaterlevel.soitassignsowerstousers basedonthenoiseowertothechannelgainrationcr). Finally, an iterative algorithm which calculates the interference ower based on the ower allocation of the revious iteration isconsideredasroosedin2].atthe j-thiteration,the interference art in2) is constant, i.e., calculated from the ower allocation in iteration j 1. The otimization roblem of3)-4) is solvable using the Lagrangian multilier method. Theassignedowertothe k-thuserat j-thiterationis σ2 k + g kl j 1) l j) k = max 0, j) w l k 47) g kk where w j) isthewaterleveliniteration j.itisshownin 2] that excluding some users, i.e., allocates no ower to some users, alying this algorithm to the other users increases the sum rate significantly. Therefore, we imlement thisalgorithminsuchawaythatitallocatesowerstoasubset of users aiming at achieving the highest sum rate. Aart from the conventional distributed iterative waterfilling roosed in 7], this algorithm is also called iterative waterfilling in the sensethatitrefillsowerstousersonthetoofthenoiselus interference to the channel gain ratiosnicr), i.e., similar to waterfilling. Assuming equal noise owers for all users, a scenario of three transmitter-receiver airs is considered with G = ) Fig.6showsthesumrateachievedatdifferent γ SNR using different ower allocation schemes. Because the SIR balancing branch bound algorithm iterative waterfilling greedy allocation SIR balancing waterfilling equal ower γ SNR /db Fig.6:Sumrateversustheseudosignaltonoiseratio γ SNR for different ower allocation schemes. scheme serves all users the high interference to the first user caused by serving the second user, the achieved sum rateislowascomaredtotheotherschemeseseciallyat high γ SNR.oreover,alyingequalowerallocation,the achieved sum rate is low but increases monotonically with γ SNR tillitsaturatesathigh γ SNR. Waterfillingservesthefirstuserorthefirsttwousersatlow γ SNR,i.e.,thethirduserhasahigherNCRascomaredtothe waterlevel.butathigh γ SNR itservesalluserswithalmost equalowersbecausethencr sforallusersareverysmall as comared to the assigned owers. Therefore, waterfilling equalowerallocationarealignedathigh γ SNR. Greedy ower allocation achieves high sum rates by serving onlythefirstuseratlow γ SNR.Butatmoderateinterference, both iterative waterfilling the branch bound algorithm achievehighersumratesbyservingboththefirstuserthe third user. Finally, because the iterative waterfilling is a sub-otimal ower allocation scheme, it achieves lower sum rates as comared to the branch bound algorithm which outerforms the other schemes reaches the global otimum ower allocation. VI. CONCLUSION In this aer, a D.C.difference of two concave functions) formulation of the non-convex otimization roblem of ower allocation aiming at maximizing the sum rate with a total ower constraint is resented. A branch bound algorithm withagoodestimationoftheboundsis roosed.foran uer bound, both the convex maximization formulation of the roblem the iecewise linear aroximation of the 372
8 constraints relax the roblem into a linear rogram roblem. The results show that the roosed algorithm reaches the global otimum as well as it outerforms other subotimum schemes in all SNR values. ACKNOWLEDGENT This work is suorted by the German Research Foundation DFG. REFERENCES 1] T.CoverJ.Thomas,ElementsofInformationTheory,2nded. John Wiley&Sons,July ] H. Al-Shatri, N. Palleit, T. Weber, Transmitter ower allocation for otimizing sum caacity interference channels, in 14th International OFD-Worksho, Setember 2009, ] R. Horst, P. Pardalos, N. Thoai, Introduction to Global Otimization, 2nd ed., ser. Nonconvex Otimization its Alications. Kluwer Acadimic Publishers, January 2000, vol ] R. Horst V. Thoai, DC rogramming: Overview,, in Journal of Otimization Theory Alications, vol. 103, no. 1, October 1999, ] Y. Xu, T. Le-Ngoc, S. Panigrahi, Global concave minimization for otimal sectrum balancing in multi-user DSL networks, in IEEE Transactions on Signal Processing, vol. 56, no. 7, July 2008, ] P. Gill, W. urray,. Saunders,. Wright, Procedures for otimization roblems with a mixture of bounds general linear constraints, in AC Transactions on athematical Software, vol. 10, no. 3, Setember 1984, ] W. Yu, G. Ginis, J. Cioffi, Distributed multiuser ower control for digital subscriber lines, in IEEE Journal on Selected Areas in Communications, vol. 20, no. 5, June 2002,
The Arm Prime Factors Decomposition
The Arm Prime Factors Decomosition Boris Arm To cite this version: Boris Arm. The Arm Prime Factors Decomosition. 2013. HAL Id: hal-00810545 htts://hal.archives-ouvertes.fr/hal-00810545 Submitted on 10
More informationA filter-based computational homogenization method for handling non-separated scales problems
A filter-based comutational homogenization method for handling non-searated scales roblems Julien Yvonnet, Amen Tognevi, Guy Bonnet, Mohamed Guerich To cite this version: Julien Yvonnet, Amen Tognevi,
More informationOn the performance of greedy algorithms for energy minimization
On the erformance of greedy algorithms for energy minimization Anne Benoit, Paul Renaud-Goud, Yves Robert To cite this version: Anne Benoit, Paul Renaud-Goud, Yves Robert On the erformance of greedy algorithms
More informationA construction of bent functions from plateaued functions
A construction of bent functions from lateaued functions Ayca Cesmelioglu, Wilfried Meidl To cite this version: Ayca Cesmelioglu, Wilfried Meidl. A construction of bent functions from lateaued functions.
More informationAlgebraic Parameter Estimation of Damped Exponentials
Algebraic Parameter Estimation of Damed Exonentials Aline Neves, Maria Miranda, Mamadou Mbou To cite this version: Aline Neves, Maria Miranda, Mamadou Mbou Algebraic Parameter Estimation of Damed Exonentials
More informationA numerical approach of Friedrichs systems under constraints in bounded domains
A numerical aroach of Friedrichs systems under constraints in bounded domains Clément Mifsud, Bruno Desrés To cite this version: Clément Mifsud, Bruno Desrés. A numerical aroach of Friedrichs systems under
More informationThe sum of digits function in finite fields
The sum of digits function in finite fields Cécile Dartyge, András Sárközy To cite this version: Cécile Dartyge, András Sárközy. The sum of digits function in finite fields. Proceedings of the American
More informationUnderstanding Big Data Spectral Clustering
Understanding Big Data Sectral Clustering Romain Couillet, Florent Benaych-Georges To cite this version: Romain Couillet, Florent Benaych-Georges. Understanding Big Data Sectral Clustering. IEEE 6th International
More informationAN OPTIMAL CONTROL CHART FOR NON-NORMAL PROCESSES
AN OPTIMAL CONTROL CHART FOR NON-NORMAL PROCESSES Emmanuel Duclos, Maurice Pillet To cite this version: Emmanuel Duclos, Maurice Pillet. AN OPTIMAL CONTROL CHART FOR NON-NORMAL PRO- CESSES. st IFAC Worsho
More informationTraining sequence optimization for frequency selective channels with MAP equalization
532 ISCCSP 2008, Malta, 12-14 March 2008 raining sequence otimization for frequency selective channels with MAP equalization Imed Hadj Kacem, Noura Sellami Laboratoire LEI ENIS, Route Sokra km 35 BP 3038
More informationConvex Optimization methods for Computing Channel Capacity
Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem
More informationA new simple recursive algorithm for finding prime numbers using Rosser s theorem
A new simple recursive algorithm for finding prime numbers using Rosser s theorem Rédoane Daoudi To cite this version: Rédoane Daoudi. A new simple recursive algorithm for finding prime numbers using Rosser
More informationDecentralized Interference Channels with Noisy Feedback Possess Pareto Optimal Nash Equilibria
Decentralized Interference Channels with Noisy Feedback Possess Pareto Optimal Nash Equilibria Samir M. Perlaza Ravi Tandon H. Vincent Poor To cite this version: Samir M. Perlaza Ravi Tandon H. Vincent
More informationSmart Bolometer: Toward Monolithic Bolometer with Smart Functions
Smart Bolometer: Toward Monolithic Bolometer with Smart Functions Matthieu Denoual, Gilles Allègre, Patrick Attia, Olivier De Sagazan To cite this version: Matthieu Denoual, Gilles Allègre, Patrick Attia,
More information4. Score normalization technical details We now discuss the technical details of the score normalization method.
SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules
More informations v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4
Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work
More informationMethylation-associated PHOX2B gene silencing is a rare event in human neuroblastoma.
Methylation-associated PHOX2B gene silencing is a rare event in human neuroblastoma. Loïc De Pontual, Delphine Trochet, Franck Bourdeaut, Sophie Thomas, Heather Etchevers, Agnes Chompret, Véronique Minard,
More informationModelling and control of urban bus networks in dioids algebra
Modelling and control of urban bus networks in dioids algebra Laurent Houssin, Sébastien Lahaye, Jean-Louis Boimond To cite this version: Laurent Houssin, Sébastien Lahaye, Jean-Louis Boimond. Modelling
More informationBonding a linearly piezoelectric patch on a linearly elastic body
onding a linearly iezoelectric atch on a linearly elastic body Christian Licht, omsak Orankitjaroen, Patcharakorn Viriyasrisuwattana, Thibaut Weller To cite this version: Christian Licht, omsak Orankitjaroen,
More informationAn efficient method for generalized linear multiplicative programming problem with multiplicative constraints
DOI 0.86/s40064-06-2984-9 RESEARCH An efficient method for generalized linear multilicative rogramming roblem with multilicative constraints Yingfeng Zhao,2* and Sanyang Liu Oen Access *Corresondence:
More informationDecoding Linear Block Codes Using a Priority-First Search: Performance Analysis and Suboptimal Version
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 3, MAY 1998 133 Decoding Linear Block Codes Using a Priority-First Search Performance Analysis Subotimal Version Yunghsiang S. Han, Member, IEEE, Carlos
More informationNumerical Methods for Particle Tracing in Vector Fields
On-Line Visualization Notes Numerical Methods for Particle Tracing in Vector Fields Kenneth I. Joy Visualization and Grahics Research Laboratory Deartment of Comuter Science University of California, Davis
More informationCOMPARISON OF VARIOUS OPTIMIZATION TECHNIQUES FOR DESIGN FIR DIGITAL FILTERS
NCCI 1 -National Conference on Comutational Instrumentation CSIO Chandigarh, INDIA, 19- March 1 COMPARISON OF VARIOUS OPIMIZAION ECHNIQUES FOR DESIGN FIR DIGIAL FILERS Amanjeet Panghal 1, Nitin Mittal,Devender
More informationImproved Capacity Bounds for the Binary Energy Harvesting Channel
Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,
More informationOn Newton-Raphson iteration for multiplicative inverses modulo prime powers
On Newton-Raphson iteration for multiplicative inverses modulo prime powers Jean-Guillaume Dumas To cite this version: Jean-Guillaume Dumas. On Newton-Raphson iteration for multiplicative inverses modulo
More informationOn the longest path in a recursively partitionable graph
On the longest path in a recursively partitionable graph Julien Bensmail To cite this version: Julien Bensmail. On the longest path in a recursively partitionable graph. 2012. HAL Id:
More informationPasserelle entre les arts : la sculpture sonore
Passerelle entre les arts : la sculpture sonore Anaïs Rolez To cite this version: Anaïs Rolez. Passerelle entre les arts : la sculpture sonore. Article destiné à l origine à la Revue de l Institut National
More informationOn the Capacity of Full-Duplex Causal Cognitive Interference Channels to within a Constant Gap
On the Caacity of Full-Dulex Causal Cognitive Interference Channels to within a Constant Ga Martina Cardone, Daniela Tuninetti, Raymond Kno, Umer Salim To cite this version: Martina Cardone, Daniela Tuninetti,
More informationDecentralized Simultaneous Energy and Information Transmission in Multiple Access Channels
Decentralized Simultaneous Energy and Information Transmission in Multiple Access Channels Selma Belhadj Amor, Samir M. Perlaza To cite this version: Selma Belhadj Amor, Samir M. Perlaza. Decentralized
More informationFull-order observers for linear systems with unknown inputs
Full-order observers for linear systems with unknown inputs Mohamed Darouach, Michel Zasadzinski, Shi Jie Xu To cite this version: Mohamed Darouach, Michel Zasadzinski, Shi Jie Xu. Full-order observers
More informationEvolution of the cooperation and consequences of a decrease in plant diversity on the root symbiont diversity
Evolution of the cooperation and consequences of a decrease in plant diversity on the root symbiont diversity Marie Duhamel To cite this version: Marie Duhamel. Evolution of the cooperation and consequences
More informationFrom Unstructured 3D Point Clouds to Structured Knowledge - A Semantics Approach
From Unstructured 3D Point Clouds to Structured Knowledge - A Semantics Approach Christophe Cruz, Helmi Ben Hmida, Frank Boochs, Christophe Nicolle To cite this version: Christophe Cruz, Helmi Ben Hmida,
More informationDecentralized K-User Gaussian Multiple Access Channels
Decentralized K-User Gaussian Multiple Access Channels Selma Belhadj Amor, Samir Perlaza To cite this version: Selma Belhadj Amor, Samir Perlaza. Decentralized K-User Gaussian Multiple Access Channels.
More informationAnalysis of Boyer and Moore s MJRTY algorithm
Analysis of Boyer and Moore s MJRTY algorithm Laurent Alonso, Edward M. Reingold To cite this version: Laurent Alonso, Edward M. Reingold. Analysis of Boyer and Moore s MJRTY algorithm. Information Processing
More informationOn the diversity of the Naive Lattice Decoder
On the diversity of the Naive Lattice Decoder Asma Mejri, Laura Luzzi, Ghaya Rekaya-Ben Othman To cite this version: Asma Mejri, Laura Luzzi, Ghaya Rekaya-Ben Othman. On the diversity of the Naive Lattice
More informationL institution sportive : rêve et illusion
L institution sportive : rêve et illusion Hafsi Bedhioufi, Sida Ayachi, Imen Ben Amar To cite this version: Hafsi Bedhioufi, Sida Ayachi, Imen Ben Amar. L institution sportive : rêve et illusion. Revue
More informationA Note on Guaranteed Sparse Recovery via l 1 -Minimization
A Note on Guaranteed Sarse Recovery via l -Minimization Simon Foucart, Université Pierre et Marie Curie Abstract It is roved that every s-sarse vector x C N can be recovered from the measurement vector
More informationEaster bracelets for years
Easter bracelets for 5700000 years Denis Roegel To cite this version: Denis Roegel. Easter bracelets for 5700000 years. [Research Report] 2014. HAL Id: hal-01009457 https://hal.inria.fr/hal-01009457
More informationAmin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE)
KAUST Reository Outage erformance of cognitive radio systems with Imroer Gaussian signaling Item tye Authors Erint version DOI Publisher Journal Rights Conference Paer Amin Osama; Abediseid Walid; Alouini
More informationOn Code Design for Simultaneous Energy and Information Transfer
On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter
More informationCase report on the article Water nanoelectrolysis: A simple model, Journal of Applied Physics (2017) 122,
Case report on the article Water nanoelectrolysis: A simple model, Journal of Applied Physics (2017) 122, 244902 Juan Olives, Zoubida Hammadi, Roger Morin, Laurent Lapena To cite this version: Juan Olives,
More informationOn size, radius and minimum degree
On size, radius and minimum degree Simon Mukwembi To cite this version: Simon Mukwembi. On size, radius and minimum degree. Discrete Mathematics and Theoretical Computer Science, DMTCS, 2014, Vol. 16 no.
More informationMultiple sensor fault detection in heat exchanger system
Multiple sensor fault detection in heat exchanger system Abdel Aïtouche, Didier Maquin, Frédéric Busson To cite this version: Abdel Aïtouche, Didier Maquin, Frédéric Busson. Multiple sensor fault detection
More informationVibro-acoustic simulation of a car window
Vibro-acoustic simulation of a car window Christophe Barras To cite this version: Christophe Barras. Vibro-acoustic simulation of a car window. Société Française d Acoustique. Acoustics 12, Apr 12, Nantes,
More informationExact Comparison of Quadratic Irrationals
Exact Comparison of Quadratic Irrationals Phuc Ngo To cite this version: Phuc Ngo. Exact Comparison of Quadratic Irrationals. [Research Report] LIGM. 20. HAL Id: hal-0069762 https://hal.archives-ouvertes.fr/hal-0069762
More informationCompleteness of the Tree System for Propositional Classical Logic
Completeness of the Tree System for Propositional Classical Logic Shahid Rahman To cite this version: Shahid Rahman. Completeness of the Tree System for Propositional Classical Logic. Licence. France.
More informationMinimax Design of Nonnegative Finite Impulse Response Filters
Minimax Design of Nonnegative Finite Imulse Resonse Filters Xiaoing Lai, Anke Xue Institute of Information and Control Hangzhou Dianzi University Hangzhou, 3118 China e-mail: laix@hdu.edu.cn; akxue@hdu.edu.cn
More informationLearning an Adaptive Dictionary Structure for Efficient Image Sparse Coding
Learning an Adaptive Dictionary Structure for Efficient Image Sparse Coding Jérémy Aghaei Mazaheri, Christine Guillemot, Claude Labit To cite this version: Jérémy Aghaei Mazaheri, Christine Guillemot,
More informationAKRON: An Algorithm for Approximating Sparse Kernel Reconstruction
: An Algorithm for Aroximating Sarse Kernel Reconstruction Gregory Ditzler Det. of Electrical and Comuter Engineering The University of Arizona Tucson, AZ 8572 USA ditzler@email.arizona.edu Nidhal Carla
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More informationCan we reduce health inequalities? An analysis of the English strategy ( )
Can we reduce health inequalities? An analysis of the English strategy (1997-2010) Johan P Mackenbach To cite this version: Johan P Mackenbach. Can we reduce health inequalities? An analysis of the English
More informationOptimum Power Allocation in Parallel Interference Channels
Nachrichtetechi Otimm Power Allocatio i Parallel Iterferece Chaels M.Sc. Hssei Al-Shatri hssei.al-shatri@i-rostoc.de 17.03.011 UNIVERSITÄT ROSTOCK AKULTÄT INORMATIK UND ELEKTROTECHNIK Nachrichtetechi Motivatio
More informationSoundness of the System of Semantic Trees for Classical Logic based on Fitting and Smullyan
Soundness of the System of Semantic Trees for Classical Logic based on Fitting and Smullyan Shahid Rahman To cite this version: Shahid Rahman. Soundness of the System of Semantic Trees for Classical Logic
More informationSensitivity of hybrid filter banks A/D converters to analog realization errors and finite word length
Sensitivity of hybrid filter banks A/D converters to analog realization errors and finite word length Tudor Petrescu, Jacques Oksman To cite this version: Tudor Petrescu, Jacques Oksman. Sensitivity of
More informationConvolutional Codes. Lecture 13. Figure 93: Encoder for rate 1/2 constraint length 3 convolutional code.
Convolutional Codes Goals Lecture Be able to encode using a convolutional code Be able to decode a convolutional code received over a binary symmetric channel or an additive white Gaussian channel Convolutional
More informationMaxisets for μ-thresholding rules
Test 008 7: 33 349 DOI 0.007/s749-006-0035-5 ORIGINAL PAPER Maxisets for μ-thresholding rules Florent Autin Received: 3 January 005 / Acceted: 8 June 006 / Published online: March 007 Sociedad de Estadística
More informationLogistics Optimization Using Hybrid Metaheuristic Approach under Very Realistic Conditions
17 th Euroean Symosium on Comuter Aided Process Engineering ESCAPE17 V. Plesu and P.S. Agachi (Editors) 2007 Elsevier B.V. All rights reserved. 1 Logistics Otimization Using Hybrid Metaheuristic Aroach
More informationOn Solving Aircraft Conflict Avoidance Using Deterministic Global Optimization (sbb) Codes
On Solving Aircraft Conflict Avoidance Using Deterministic Global Optimization (sbb) Codes Sonia Cafieri, Frédéric Messine, Ahmed Touhami To cite this version: Sonia Cafieri, Frédéric Messine, Ahmed Touhami.
More informationOn the capacity of the general trapdoor channel with feedback
On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:
More informationSolving an integrated Job-Shop problem with human resource constraints
Solving an integrated Job-Shop problem with human resource constraints Olivier Guyon, Pierre Lemaire, Eric Pinson, David Rivreau To cite this version: Olivier Guyon, Pierre Lemaire, Eric Pinson, David
More informationb-chromatic number of cacti
b-chromatic number of cacti Victor Campos, Claudia Linhares Sales, Frédéric Maffray, Ana Silva To cite this version: Victor Campos, Claudia Linhares Sales, Frédéric Maffray, Ana Silva. b-chromatic number
More informationThomas Lugand. To cite this version: HAL Id: tel
Contribution à la Modélisation et à l Optimisation de la Machine Asynchrone Double Alimentation pour des Applications Hydrauliques de Pompage Turbinage Thomas Lugand To cite this version: Thomas Lugand.
More informationMATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK
Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment
More informationRadial Basis Function Networks: Algorithms
Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.
More informationThe Windy Postman Problem on Series-Parallel Graphs
The Windy Postman Problem on Series-Parallel Graphs Francisco Javier Zaragoza Martínez To cite this version: Francisco Javier Zaragoza Martínez. The Windy Postman Problem on Series-Parallel Graphs. Stefan
More informationThe sound power output of a monopole source in a cylindrical pipe containing area discontinuities
The sound power output of a monopole source in a cylindrical pipe containing area discontinuities Wenbo Duan, Ray Kirby To cite this version: Wenbo Duan, Ray Kirby. The sound power output of a monopole
More informationFor q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i
Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:
More informationRecursive Estimation of the Preisach Density function for a Smart Actuator
Recursive Estimation of the Preisach Density function for a Smart Actuator Ram V. Iyer Deartment of Mathematics and Statistics, Texas Tech University, Lubbock, TX 7949-142. ABSTRACT The Preisach oerator
More informationA Network-Flow Based Cell Sizing Algorithm
A Networ-Flow Based Cell Sizing Algorithm Huan Ren and Shantanu Dutt Det. of ECE, University of Illinois-Chicago Abstract We roose a networ flow based algorithm for the area-constrained timing-driven discrete
More informationImpedance Transmission Conditions for the Electric Potential across a Highly Conductive Casing
Impedance Transmission Conditions for the Electric Potential across a Highly Conductive Casing Hélène Barucq, Aralar Erdozain, David Pardo, Victor Péron To cite this version: Hélène Barucq, Aralar Erdozain,
More informationJohn Weatherwax. Analysis of Parallel Depth First Search Algorithms
Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel
More informationDispersion relation results for VCS at JLab
Dispersion relation results for VCS at JLab G. Laveissiere To cite this version: G. Laveissiere. Dispersion relation results for VCS at JLab. Compton Scattering from Low to High Momentum Transfer, Mar
More informationA Novel Aggregation Method based on Graph Matching for Algebraic MultiGrid Preconditioning of Sparse Linear Systems
A Novel Aggregation Method based on Graph Matching for Algebraic MultiGrid Preconditioning of Sparse Linear Systems Pasqua D Ambra, Alfredo Buttari, Daniela Di Serafino, Salvatore Filippone, Simone Gentile,
More informationA Public-Key Cryptosystem Based on Lucas Sequences
Palestine Journal of Mathematics Vol. 1(2) (2012), 148 152 Palestine Polytechnic University-PPU 2012 A Public-Key Crytosystem Based on Lucas Sequences Lhoussain El Fadil Communicated by Ayman Badawi MSC2010
More informationEfficient Approximations for Call Admission Control Performance Evaluations in Multi-Service Networks
Efficient Aroximations for Call Admission Control Performance Evaluations in Multi-Service Networks Emre A. Yavuz, and Victor C. M. Leung Deartment of Electrical and Comuter Engineering The University
More informationAn Ant Colony Optimization Approach to the Probabilistic Traveling Salesman Problem
An Ant Colony Otimization Aroach to the Probabilistic Traveling Salesman Problem Leonora Bianchi 1, Luca Maria Gambardella 1, and Marco Dorigo 2 1 IDSIA, Strada Cantonale Galleria 2, CH-6928 Manno, Switzerland
More informationAn Analysis of Reliable Classifiers through ROC Isometrics
An Analysis of Reliable Classifiers through ROC Isometrics Stijn Vanderlooy s.vanderlooy@cs.unimaas.nl Ida G. Srinkhuizen-Kuyer kuyer@cs.unimaas.nl Evgueni N. Smirnov smirnov@cs.unimaas.nl MICC-IKAT, Universiteit
More informationOptimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI
Otimal Power Control over Fading Cognitive Radio Channels by Exloiting Primary User CSI Rui Zhang Abstract arxiv:0804.67v2 [cs.it] 7 Feb 2009 This aer is concerned with sectrum sharing cognitive radio
More informationUnbiased minimum variance estimation for systems with unknown exogenous inputs
Unbiased minimum variance estimation for systems with unknown exogenous inputs Mohamed Darouach, Michel Zasadzinski To cite this version: Mohamed Darouach, Michel Zasadzinski. Unbiased minimum variance
More informationRound-off Errors and Computer Arithmetic - (1.2)
Round-off Errors and Comuter Arithmetic - (.). Round-off Errors: Round-off errors is roduced when a calculator or comuter is used to erform real number calculations. That is because the arithmetic erformed
More informationThe Noise Power Ratio - Theory and ADC Testing
The Noise Power Ratio - Theory and ADC Testing FH Irons, KJ Riley, and DM Hummels Abstract This aer develos theory behind the noise ower ratio (NPR) testing of ADCs. A mid-riser formulation is used for
More informationAnalyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems
Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Hsiao-Lan Chiang, Tobias Kadur, and Gerhard Fettweis Vodafone Chair for Mobile Communications Technische Universität
More informationInfluence of a Rough Thin Layer on the Potential
Influence of a Rough Thin Layer on the Potential Ionel Ciuperca, Ronan Perrussel, Clair Poignard To cite this version: Ionel Ciuperca, Ronan Perrussel, Clair Poignard. Influence of a Rough Thin Layer on
More informationElectromagnetic characterization of magnetic steel alloys with respect to the temperature
Electromagnetic characterization of magnetic steel alloys with respect to the temperature B Paya, P Teixeira To cite this version: B Paya, P Teixeira. Electromagnetic characterization of magnetic steel
More informationA Simple Proof of P versus NP
A Simple Proof of P versus NP Frank Vega To cite this version: Frank Vega. A Simple Proof of P versus NP. 2016. HAL Id: hal-01281254 https://hal.archives-ouvertes.fr/hal-01281254 Submitted
More informationOptimal array pattern synthesis with desired magnitude response
Otimal array attern synthesis with desired magnitude resonse A.M. Pasqual a, J.R. Arruda a and P. erzog b a Universidade Estadual de Caminas, Rua Mendeleiev, 00, Cidade Universitária Zeferino Vaz, 13083-970
More informationWIRELESS energy transfer (WET), where receivers harvest
6898 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 10, OCTOBER 2016 User-Centric Energy Efficiency Maximization for Wireless Powered Communications Qingqing Wu, Student Member, IEEE, Wen Chen,
More informationWhen does vectored Multiple Access Channels (MAC) optimal power allocation converge to an FDMA solution?
When does vectored Multiple Access Channels MAC optimal power allocation converge to an FDMA solution? Vincent Le Nir, Marc Moonen, Jan Verlinden, Mamoun Guenach Abstract Vectored Multiple Access Channels
More informationOn the Chvatál-Complexity of Knapsack Problems
R u t c o r Research R e o r t On the Chvatál-Comlexity of Knasack Problems Gergely Kovács a Béla Vizvári b RRR 5-08, October 008 RUTCOR Rutgers Center for Oerations Research Rutgers University 640 Bartholomew
More informationTHE BAYESIAN ABEL BOUND ON THE MEAN SQUARE ERROR
THE BAYESIAN ABEL BOUND ON THE MEAN SQUARE ERROR Alexandre Renaux, Philippe Forster, Pascal Larzabal, Christ Richmond To cite this version: Alexandre Renaux, Philippe Forster, Pascal Larzabal, Christ Richmond
More informationA Study of the Regular Pentagon with a Classic Geometric Approach
A Study of the Regular Pentagon with a Classic Geometric Approach Amelia Carolina Sparavigna, Mauro Maria Baldi To cite this version: Amelia Carolina Sparavigna, Mauro Maria Baldi. A Study of the Regular
More informationTopic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar
15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider
More informationq-ary Symmetric Channel for Large q
List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu
More informationHetNets: what tools for analysis?
HetNets: what tools for analysis? Daniela Tuninetti (Ph.D.) Email: danielat@uic.edu Motivation Seven Ways that HetNets are a Cellular Paradigm Shift, by J. Andrews, IEEE Communications Magazine, March
More informationECE 534 Information Theory - Midterm 2
ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You
More informationA remark on a theorem of A. E. Ingham.
A remark on a theorem of A. E. Ingham. K G Bhat, K Ramachandra To cite this version: K G Bhat, K Ramachandra. A remark on a theorem of A. E. Ingham.. Hardy-Ramanujan Journal, Hardy-Ramanujan Society, 2006,
More informationTowards an active anechoic room
Towards an active anechoic room Dominique Habault, Philippe Herzog, Emmanuel Friot, Cédric Pinhède To cite this version: Dominique Habault, Philippe Herzog, Emmanuel Friot, Cédric Pinhède. Towards an active
More informationA Model for Randomly Correlated Deposition
A Model for Randomly Correlated Deosition B. Karadjov and A. Proykova Faculty of Physics, University of Sofia, 5 J. Bourchier Blvd. Sofia-116, Bulgaria ana@hys.uni-sofia.bg Abstract: A simle, discrete,
More informationExogenous input estimation in Electronic Power Steering (EPS) systems
Exogenous input estimation in Electronic Power Steering (EPS) systems Valentina Ciarla, Carlos Canudas de Wit, Franck Quaine, Violaine Cahouet To cite this version: Valentina Ciarla, Carlos Canudas de
More informationModeling Pointing Tasks in Mouse-Based Human-Computer Interactions
Modeling Pointing Tasks in Mouse-Based Human-Comuter Interactions Stanislav Aranovskiy, Rosane Ushirobira, Denis Efimov, Géry Casiez To cite this version: Stanislav Aranovskiy, Rosane Ushirobira, Denis
More information