Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications

Size: px
Start display at page:

Download "Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications"

Transcription

1 Vehicular Ad-hoc Networks using slotted Aloha: Point-to-Point, Emergency and Broadcast Communications Bartłomiej Błaszczyszyn Paul Muhlethaler Nadjib Achir INRIA/ENS INRIA Rocquencourt INRIA Rocquencourt and Paris XIII Abstract: The aim of this aer is to analyze the Aloha medium access (MAC scheme in one-dimensional, linear networks, which might be an aroriate assumtion for Vehicular Ad-hoc NETworks (VANETs. The locations of the vehicles are assumed to follow a homegeneous Poisson oint rocess. Assuming owerlaw mean ath-loss and indeendent oint-to-oint fading we study erformance metrics based on the signal-over-interference and noise ratio (SINR. In contrast to revious studies where the receivers are at a fixed distance from the transmitter, we assume here that the receivers are the nearest neighbors of the transmitters in the Poisson rocess and in a given direction. We derive closed formulas for the cature robability and for the density of rogress of a acket sent by a given node. We comute the mean delay to send a acket transmitted at each slot until successful recetion. We also evaluate an uer bound to discover the neighborhood within a given sace interval. We show that we can include noise in these models. Index Terms VANETs, slotted Alohaa, MAC (Medium Access Control Layer Otimization, erformance evaluation I. INTRODUCTION VANETs may well be the most romising alication of Mobile Ad hoc NETworks (MANETs. Promotors of VANETs believe that these networks will both increase safety on the road and rovide value-added services. Numerous challenging roblems must however be solved in oder to be able to roose these services e.g. efficient and robust hysical layers, reliable and flexible medium access rotocols, routing schemes and otimized alications. Although the medium access rotocols envisioned for VANETs are mostly based on Carrier Sense Multile Access (CSMA schemes e.g; IEEE 82., techniques using carrier sensing lead to comlex atterns of simultaneously transmitting nodes. Thus it is difficult to build analytical models for such schemes. Moreover carrier sensing introduces many arameters that must be otimized, such as the interframes, the defer threshold, the back-off window, etc. In contrast, slotted Aloha has only one arameter: the transmission robability (Medium Access Probability MAP and the attern of simultaneously transmitting nodes is very simle. Thus we chose to use Aloha as a medium access scheme. Aloha has received a lot of attention in the literature and most of the studies are for two-dimensional networks. Moreover these studies usually use the biolar model in which each node which can transmit has a receiver randomly ositioned at a fixed distance from the transmitter. In contrast to this assumtion, we are able to study a Signal-over-Interference and Noise Ratio (SINR model where both the transmitter and the receiver are in the intial Poisson oint rocess which models the locations of the vehicles. A. Main contributions The main contributions of this aer are the following For the two receiving models in this aer i.e. the nearestneighbor and the nearest-receiving neighbor in a given direction, we evaluate the robability of cature of a acket sent by a fixed node. With the same assumtion, we comute the density of rogress of such a acket and we study how to otimize this density. We then study the transmission delay for a safety acket which is sent by a given node and at each slot. We also derive an uer-bound of the delay to send a broadcast acket in a given sace interval. We show that the above analyses can take noise into account. B. Related Work There is abundant literature on the erformance evaluation of general MANETs under CSMA and Aloha. However, very few aers, such as [8, focus secifically on VANETs. To the best of our knowledge, most of these studies use simulations to evaluate the erformances of these networks and/or assume simlified interference models. Aloha can be analyzed more easily than CSMA, even in quite a realistic SINR scenario [5, 6, 9. However these studies assume lanar (two-dimensional networks and a Poisson oint rocess to model the location of the network nodes. This aroach was artially adated to linear VANETs in a study [7 where it is assumed that the nodes use slotted Aloha. Numerous studies [,, evaluate beaconing algorithms in VANETs. Another study [2 considers disconnected VANETs and evaluates DTN schemes to roagate the ackets within the network. In contrast to revious aers [5 7, 9, we comute the network erformances for receivers within the Poisson oint rocess which models the location of the network nodes, whereas the revious studies assume that each transmitter has its own receiver at given distance from it. C. Organization of the aer The remaining art of this aer is organized as follows: The network and roagation models are described resectively in Sections II-A, II-B. In Section II-C the SINR cature (nonoutage condition is described. In Section II-D the nearest neighbor models used throughout this aer are roosed. With these models we comute the robability of cature in Section II-E and the density of rogress in Section II-F. In /2/$3. 22 IEEE

2 section II-G we comute the nearest neighbor warning delay time and in Secion II-H we comute the neighborhood discovery time. We extend the results obtained to the case where we have constant noise. Section IV discusses the numerical examles, followed by the conclusion in Section V. II. LINEAR VANET MODEL WITH SLOTTED ALOHA AND NEAREST-NEIGHBOR TRANSMISSIONS A. Network model We assume a linear network toology, where (at a given time nodes (vehicles are randomly located on a straight line. The nodes are erfectly synchronized on time slots of the same duration and they try to access the channel according to the slotted Aloha scheme. For every time slot, each node, indeendently tosses a coin with some bias for heads, which will be referred to as the Aloha medium access robability (Aloha MAP. Nodes whose outcome is heads transmit their ackets in the time slot, and the others do not transmit. The locations of the nodes are assumed not to change during the transmission since the duration of a transmission is so short. The above situation will be modeled by the marked Poisson oint Φ = {(X i, e i } with intensity λ on the line R, where {X i } denotes the (instantaneous locations of vehicles; λ is the mean density of nodes er unit of (route distance, {e i } i is the medium access indicator of node i; e i = for the node which is allowed to emit and e i = for the node which is not allowed to emit. The random variables e i are indeendent, with P(e i = =. Sometimes we will use the notation e Xi = e i. Let us slit Φ into two oint rocesses: Φ = {X i : e i = } reresenting transmitters, and Φ = {X i : e i = } reresenting silent nodes. The latter are otential receivers. A basic fact from the theory of Point rocesses is that Φ and Φ are indeendent Poisson oint rocesses of intensity λ and λ( resectively. B. Signal roagation Each transmitting vehicle uses the same transmission ower S. The signal-ower ath-loss is modeled by the ower-law function l(r = (Ar β where r is the distance between the transmitter and the receiver; we will secify the receiver in section II-D. Our mathematical linear model of the network requires β > in order for the sum of all owers received at a given location to have a finite mean. Signal-ower is also erturbed by random fading F that is indeendently samled for each transmitter-receiver air. Thus, the actual signal-ower received at y from x is equal to SF (x,y /l( x y. If not secified, F is assumed to have a general distribution with finite moment E[F /β. In this section we will restrict ourselves to an imortant secial case when F is exonentially distributed, which corresonds to the situation of indeendent Rayleigh fading. By eventual renormalization of S we can assume without loss of generality that F has a mean of. Moreover in this section we do not consider external noise (W = but we kee W in the notation for the remaining art of this aer. C. Recetion When a vehicle located at x transmits a signal with ower S and this signal is being received by a vehicle located at y, then the success of this recetion deends on the signal-tointerference-and-noise ratio (SINR SINR (x,y = SF (x,y/l( x y, (2. W + I Φ (y where I Φ is the shot-noise rocess of Φ : I Φ (y = X i Φ SF (y,x i/l( y X i. In this aer we assume a fixed bit-rate coding, i.e., y successfully receives the signal from x if SINR (x,y T, (2.2 where SINR (x,y is given by (2. and T is the SINR-threshold related to the bit-rate given some articular coding scheme. D. Nearest neighbor receiver models A articular choice of receivers deends on the routing scheme imlemented in the network. Motivated by the usual routing mechanisms which tyically select relay nodes in the vicinity of the transmitters, in this section we consider the two following receiver models: Nearest Neighbor in a given Direction (NND. We assume that each transmitter in Φ (cf. the network model in Section II-A icks the nearest node to itself in Φ in the randomly selected direction (to the right or to the left on the line as its receiver, regardless of whether or not the latter is authorized to transmit at the same time. Successful recetion requires that this selected node is not authorized by Aloha to transmit (i.e, is in Φ, and that the SINR condition (2.2 for this transmitter-receiver air is satisfied. Nearest Receiver in a given Direction (NRD. Each transmitter in Φ icks the nearest node in Φ in a randomly selected direction, i.e., it icks a node that is not authorized by Aloha to transmit. Remark that the NND model corresonds to the usual searation of routing and MAC layers, while the NRD model might be seen as corresonding to an oortunistic routing. As we will see, in linear networks both models allow for quite exlicit erformance analysis and, in articular, an otimal tuning of the Aloha arameter, rovided the external noise can be ignored (W =. E. Cature robability For arbitrary a, b > denote C(a, b = a /(ub + du and π C(b = C(, b = b sin(π/b. (2.3 Moreover, for given T and β let us denote: C = C (T, β = T /β (C(T /β, β + C(β, C 2 = C 2 (T, β = 2T /β C(β = 2T /β π β sin(π/β. Proosition 2.: The robability of successful transmission for slotted Aloha with MAP in the NND receiver model with

3 exonential fading and negligible noise (W is equal to: P NND ( = + C (2.4 and in the NRD receiver model P NRD ( = + ( C 2. (2.5 Proof: Note directly from the form of the SINR in (2. that P NND ( and P NRD ( do not deend on S and A. Hence in the remaining art of the roof we take S = A =. Let us first consider the NND model. By symmetry, let us assume without loss of generality that a given transmitter (located at the origin sends a acket to its nearest neighbor to the right on the real line without knowing if this node is silent or not. By the known roerty of the Poisson oint rocess, the distance R to this node has an exonential distribution with arameter λ. Moreover given R = r, all other nodes form a Poisson oint rocess of intensity λ on (, (r,. Conditioning on R = r the robability of the SINR condition (2.2 is equal to: P{ F S T I Φ l(r R = r } = e st l(r dp(i Φ s R = r = ψ IΦ R=r(T l(r, where ψ IΦ R=r denotes the Lalace transform of the shot noise generated at the location of the receiver by a Poisson oint rocess of intensity λ on (, (r,. It is know (it can be derived from the formula for the Lalace functional of the Poisson.. (see e.g. [3: { ( ( } ψ IΦ R=r(ξ = ex λ + E[e ξf/l(s ds. r Plugging in the conditional robability of the SINR condition and unconditioning with resect to R we obtain: P NND ( = λ( { ( e λr ex λ + ( [ r E e l(rt F/l(s } ds dr, where ( in front of the first integral is due to the fact that successful recetion is ossible only if the nearest node is not authorized to transmit at the given time slot. Assuming exonential fading F and the ower law ath-loss l( we evaluate E[e l(rt F/l(s = and obtain +(s/r β /T ( P NND ( = λ( e λr +T /β (C(T /β,β+c(β dr, which boils down to the right hand side of (2.4. In order to obtain exression (2.5 for the N RD model we follow the same arguments, with the following modifications. The distance to the nearest receiver to the right has the exonential distribution of arameter λ(. Moreover the distribution of the oint rocess of emitters is Poisson with arameter λ and indeendent of the location of this receiver. Note also that by the very choice of the receiver, it is not authorized to emit during the given time slot, hence there is no ( factor in the numerator. Remark 2.2: It is easy to see that C 2 C and hence P NRD P NND, i.e., the oortunistic choice of the receiver ays off regarding the likelihood of successful transmission. F. Density of rogress Now we will calculate and otimize in the mean density of rogress d defined as the exected total rogress of all the successful transmissions er unit of road length; [ d = E X i Y i I(e Xi = I(e Yi = I(SINR (Xi,Y i T, X i [, where Y i is the receiver chosen by the transmitter X i in the given model (NND or NRD. The density of rogress, can also be seen as quantifying the number of bit-(or acket-meters umed er unit length of the VANET network. Thus we see it as a generic erformance metric of value-added services generating oint-to-oint traffic. Proosition 2.3: Under the assumtions of Proosition 2. the density of rogress in the NND receiver model is equal to: d = d NND ( = and is maximized for equal to: NND = C + C 2 2 C. ( ( + C 2 (2.6 Moreover, < NND <. Proof: Using Cambell s formula, the density of rogress in the NDD model can be exressed as: [ d NND ( = λ( E RP{ I(F S T I Φ l(r R = r } with the notation as in the roof of Proosition 2.. Following the same arguments as in this latter roof we obtain ( d NND ( = λ 2 ( re λr + C dr, which is equal to the right-hand side of (2.6. Taking the derivative of the latter exression in we find that its sign is equal to that of the olynomial P ( = (2+ C 2 2 C C 2. Note that P ( =, P ( =, P ( = C < and P ( =. Hence in the interval (,, P ( has a unique root: NND which maximizes d NND(. The exlicit exression for this root follows from the general formulas for the roots of cubic equations. Proosition 2.4: Under the assumtions of Proosition 2. the density of rogress in the NRD receiver model is equal to: d NRD ( = and is maximized for equal to: Moreover, < NRD <. ( ( + ( C 2 2. (2.7 NRD = C 2 + C C 2. I(Condition A is the indicator function. The value of this function is if Condition A is satisfied and otherwise.

4 Proof: Using the same reasoning as in the roof of Proosition 2.3 we find exression (2.7 and its otimization in goes along the same lines as for the NND model relacing C by C 2. G. Nearest neighbor warning delay time In this section we are interested in emergency broadcasting in VANETs. Suose that a tyical (tagged node needs to warn its nearest neighbor in a given direction by sending it a secific acket. Then P NND ( given by (2.4 is the robability that this task can be accomlished with a single transmission. However, a single transmission might not be sufficient. Hence, we assume that the tagged node does not have to resect the Aloha scheme and after the first unsuccessful transmission it is allowed to retransmit the acket in successive slots, ossibly several times, until it has been received successfully. Regarding the geograhic dislacement of nodes during this rocess, we assume that it is small enough to only imact on the fading conditions and not the average ath-loss conditions. In other words, we assume Poisson locations of nodes X i Φ unchanged and the fading F(x,y n, indeendently re-samled for every consecutive retransmission slot n =, 2,..., for every transmitter-receiver air (x, y. Let us denote by L the number of consecutive time slots needed for the tagged node to successfully transmit the emergency message to its nearest neighbor in Φ in a given direction. We call L emergency delay at the tagged node. Since we have assumed that fading is indeendent across the time slots, given Φ, L is a geometric random variable with mean /π(φ, where π(φ is the robability of successful recetion in a given time slot, given the location of nodes Φ. (This latter conditional robability regards only uncertainty due to fading conditions and MAC statuses of nodes in the network. In what follows we will give the exression for the unconditional exected emergency delay E[L (Φ, i.e.; average emergency delay at the tagged node, where the averaging regards all ossible Poisson configurations of other nodes Φ. As we will see, this exectation is finite only if is sufficiently small for any given T and β. Let us denote and D ( = D (; T, β = T /β( + T /β D 2 ( = D 2 (; T, β = 2T /β u β + du u β + du u β + du. Proosition 2.5: Under the assumtions of Proosition 2., the average emergency delay in the MMD model is equal to rovided E[L = and E[L = otherwise. ( ( D ( D ( < (2.8 Proof: We need to evaluate π(φ, i.e. the robability of successful recetion in a given time slot, given Φ. As reviously in the NND model, we suose that the receiver (nearest neigbour is at distance r from the tagged node. Following the same arguments as in the roof of Proosition 2., we find that π(φ given the receiver at distance r, which we denote by π(r, Φ is equal to ( E[e l(rt I(r,Φ Φ, where I(r, Φ is the interference at the receiver. Hence π(φ can be exressed as a conditional Lalace transform of the shot-noise given Φ. An exlicit exression for this is known (cf. the roof of [4, Lemma 7.3 and in our case gives { ( } π(r, Φ = ( ex log /T ( X i /r β. + X i Φ Taking the exectation of the inverse of the latter exression with resect to the distribution of the homogeneous Poisson rocess of intensity λ truncated to (, (r,, again by the known exression for the Lalace transform of a shotnoise, we obtain [ E ( /T (s/r β + R = r = { ( π(r, Φ ex λ + r } ds = ex{λr D (} Consequently E[L = = λ λ e λr e λr D( dr e λr( D( dr It is easy to see that this integral is infinite if D ( and /(( ( D ( otherwise. This comletes the roof. Remark 2.6: Note that D ( C with the equality reached when. Hence, for small we have D ( C, and the critical for which the average exected delay exlodes is aroximately / C. H. Neighborhood discovery time Let us now consider another imortant tye of communication in VANETs, related to osition broadcasting. Assume that each node uses a fraction of the time slots in which it is authorized by Aloha to transmit, to broadcast a secial acket to inform every other node being able to receive it about the transmitter s osition (and erhas other nodes arameters. More recisely, for each transmission slot, a given node transmits such a secial acket (called the localisation acket indeendently, with robability and other (usual traffic ackets sent with robability. We are interested in the mean time required for a given (tyical node to discover all nodes within a given distance R from it by receiving at least one localisation acket from each of them. We denote by D i the time (number of time slots until the recetion of the first localisation acket from node X i by the tyical node located at the origin. There is no exlicit exression for (the mean of the maximum max Xi [ R,R D i.

5 however, we can give an exlicit exression for the exectation of the sum L disc (R := X D i [ R,R i, which is in uer bounded by the aforementioned maximum. Proosition 2.7: Assume exonential fading and negligible noise (W =. Then for any R > E[L dics (R = 2 ( 2 D 2 ( R ( e λrd2(, where D 2 ( = D 2 (; T, β is as defined in Section II-G. Proof: By Cambell s formula R R [ E[L disc (R = λ E[D r dr = λ E R π(r, Φ dr, where π(r, Φ is given in the roof of Proosition 2.5. Consequently λ R E[L disc (R = e λrd2( dr. ( R Evaluation of the above integral concludes the roof. III. IMPACT OF EXTERNAL NOISE In the revious section we assumed that the external noise was negligible (W =. In this section we study the imact of a non-null external noise W. It is easy to extend the results of Proositions 2., 2.3 and 2.4 to the case with non-null noise. The otimisation of the density of rogress is however not exlicit. Proosition 3.: Under the assumtions of Proosition 2. for the NND receiver model, with an arbitrary noise distribution W, we have the followin robability of successful recetion: NND = λ( and the density of rogress: d NND = λ( e rλ(+ C T W (Arβ dr (3.9 re rλ(+ C T W (Arβ dr. (3. Relacing C by C in the two above exressions we obtain, resectively, the robability of successful transmission NRD and the density of rogress d NRD in the NRD receiver model with an arbitrary noise W. Proof: The roof follows the same lines as in the roofs of Proositions 2., 2.3 and 2.4. The introduction of noise into the comutation of the delay and the neighborhood discovery time is similar and is not carried out in this aer for reasons of sace. IV. NUMERICAL EXAMPLES The default arameters are λ =. vehicles er meter (the mean inter-vehicle distance is equal to meters, β = 4, T = and A =. The fading is exonentially distributed with rate. In Figure we show the cature robabilities for P NND and P NRD. We observe that the results obtained are close; for the same transmission robability, P NND is sligthly greater than P NRD. We also notice that these robabilities are greater for β = 4 than for β = 2. This is because when β is larger, then interference decays more raidly. In Figure 2 we resent the densities of rogress d NND and d NRD. We note that for the same transmission robability we have d NRD > d NND which confirms the inequality we show in general. For β = 2 the maximum of d is around 2.5% greater for the NRD scheme than for the NND scheme. For β = 4 the maximum of d is around 5% greater for the NRD scheme than for the NND scheme. Thus we can conclude that the oortunism of the NRD scheme has a limited imact. In Figure 3 we resent the value of which otimizes the density of rogress for both the NND and NRD schemes. We observe that there is a significant difference for this value of for the two schemes and this difference increases with β. In Figure 4 we resent the value of the average delay with resect to for β = 2, 3, 4 and 5 and T =. We note that there is a critical value of ( which deends on β for which this delay becomes infinite. Logically this critical value of is an increasing function of β. With less interference the transmission robability can be higher. Figure 5 also gives the value of the average delay with resect to for T =, 2, 5,. Of course for larger T the critical value of is smaller. In Figure 6 we resent the density of rogress d NND with resect to for W =,, 9, 8, 7, 6, 5. We note that the noise has a very great imact on the network erformances. For W 7 the density of rogress is more than times smaller than without noise. P NND,P NRD Cature robability P NND β=2 P NRD β=2 P NND β=4 P NRD β= Fig.. Cature robabilities P NND and P NRD for β = 2 and β = 4 P NND,P NRD Density of rogress d NND β=2 d NRD β=2 d NND β=4 d NRD β= Fig. 2. Density of successful transmissions for β = 2 and β = 4

6 .3.25 otimal value of for the density of rogress * NND T= * NRD T= Mean waiting time until successful recetion T= T=2 T=5 T=.2 E[L β Fig. 3. Otimal value of for the density of successful transmissions for 2 β 5 Fig. 5. Exected delay until successful recetion E[L for T =, 2, 5, Mean waiting time until successful recetion β=2 β=3 β=4 β= Density of rogress W= W= - W= - W= -9 W= -8 W= -7 W= -6 W= -5 E[L 8 d NND Fig. 4. Exected delay until successful recetion E[L for β = 2, 3, 4, Fig. 6. Exected delay until successful recetion E[L for various values of the noise. V. CONCLUSION In this aer we have studied the erformance of two simle NND and NRD relaying schemes in linear networks. We have derived closed formulas for the cature robability, the density of rogress and the average delay. These formulas allow the influence of the models arameters to be easily studied. We show how to introduce noise in our evaluation and we obtain other formulas that can be numerically evaluated. REFERENCES [ Vinel A, Vishnevsky V, and Koucheryavy Y. A simle analytical model for the eriodic broadcasting in vehicular ad-hoc networks. GLOBECOM Workshos, ages 5, 3 Dec 28. [2 Emmanuel Baccelli, Philie Jacquet, Bernard Mans, and Georgios Rodolakis. Highway Vehicular Delay Tolerant Networks: Information Proagation Seed Proerties. IEEE Transactions on Information Theory. Vol 58, No 3 ages , March 22. [3 F. Baccelli and B. Błaszczyszyn. Stochastic Geometry and Wireless Networks, Volume I Theory, volume 3, No 3 4 of Foundations and Trends in Networking. NoW Publishers, 29. [4 F. Baccelli and B. Błaszczyszyn. Stochastic Geometry and Wireless Networks, Volume II Alications, volume 4, No 2 of Foundations and Trends in Networking. NoW Publishers, 29. [5 F. Baccelli, B. Blaszczyszyn, and P. Mühlethaler. An Aloha Protocol for Multiho Mobile Wireless Networks. In Proceedings of the Allerton Conference, University of Illinois, Urbana Chamaign, November 23. And in IEEE Transactions on Information Theory, Vol 52, No 2: ages , February 26. [6 F. Baccelli, B. Błaszczyszyn, and P. Mühlethaler. Stochastic analysis of satial and oortunistic Aloha. IEEE JSAC, secial issue on Stochastic Geometry and Random Grahs for Wireless Networks, ages 5-9, 29. [7 B. Blaszczyszyn, P. Muhlethaler, and Y. Toor. Maximizing Throughut of Linear Vehicular Ad-hoc NETworks (VANETs - a Stochastic Aroach. In Proc. of Euroean Wireless 29, May 29. Aalborg, Denmark. [8 H.A. Cozzetti, R.M. Scoigno, L. Casone, and G. Barba. Comarative analysis of IEEE 82. and MS-Aloha in VANET scenarios. In Proc. of Services Comuting Conference (APSCC, ages 64 69, Singaore, Dec 29. [9 M. Haenggi. Outage, local throughut, and caacity of random wireless networks. IEEE Trans. Wireless Comm., Vol 8: ages , August 29. [ R. Reinders, E. M. van Eenennaam, G. Karagiannis, and G. J. Heijenk. Contention window analysis for beaconing in vanets. In Seventh IEEE International Wireless Communications and Mobile Comuting conference, IWCMC 2, Istanbul, Turkey, ages , Istanbul, July 2. IEEE Comuter Society. [ Razvan Stanica, Emmanuel Chaut, and Andr-Luc Beylot. Why VANET Beaconing is More than Simle Broadcast. In IEEE Vehicular Technology Conference (VTC, San Francisco, ages 5, Setember 2.

Spatial Outage Capacity of Poisson Bipolar Networks

Spatial Outage Capacity of Poisson Bipolar Networks Satial Outage Caacity of Poisson Biolar Networks Sanket S. Kalamkar and Martin Haenggi Deartment of Electrical Engineering, University of Notre Dame, Notre Dame, IN 46556, USA E-mail: skalamka@nd.edu,

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

An Analysis of TCP over Random Access Satellite Links

An Analysis of TCP over Random Access Satellite Links An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

Delay characterization of multi-hop transmission in a Poisson field of interference

Delay characterization of multi-hop transmission in a Poisson field of interference 1 Delay characterization of multi-ho transmission in a Poisson field of interference Kostas Stamatiou and Martin Haenggi, Senior Member, IEEE Abstract We evaluate the end-to-end delay of a multi-ho transmission

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

4. Score normalization technical details We now discuss the technical details of the score normalization method.

4. Score normalization technical details We now discuss the technical details of the score normalization method. SMT SCORING SYSTEM This document describes the scoring system for the Stanford Math Tournament We begin by giving an overview of the changes to scoring and a non-technical descrition of the scoring rules

More information

On Code Design for Simultaneous Energy and Information Transfer

On Code Design for Simultaneous Energy and Information Transfer On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging 1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014

More information

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4

s v 0 q 0 v 1 q 1 v 2 (q 2) v 3 q 3 v 4 Discrete Adative Transmission for Fading Channels Lang Lin Λ, Roy D. Yates, Predrag Sasojevic WINLAB, Rutgers University 7 Brett Rd., NJ- fllin, ryates, sasojevg@winlab.rutgers.edu Abstract In this work

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

General Linear Model Introduction, Classes of Linear models and Estimation

General Linear Model Introduction, Classes of Linear models and Estimation Stat 740 General Linear Model Introduction, Classes of Linear models and Estimation An aim of scientific enquiry: To describe or to discover relationshis among events (variables) in the controlled (laboratory)

More information

Vision Graph Construction in Wireless Multimedia Sensor Networks

Vision Graph Construction in Wireless Multimedia Sensor Networks University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln CSE Conference and Worksho Paers Comuter Science and Engineering, Deartment of 21 Vision Grah Construction in Wireless Multimedia

More information

Anytime communication over the Gilbert-Eliot channel with noiseless feedback

Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anytime communication over the Gilbert-Eliot channel with noiseless feedback Anant Sahai, Salman Avestimehr, Paolo Minero Deartment of Electrical Engineering and Comuter Sciences University of California

More information

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1

On the Relationship Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 On the Relationshi Between Packet Size and Router Performance for Heavy-Tailed Traffic 1 Imad Antonios antoniosi1@southernct.edu CS Deartment MO117 Southern Connecticut State University 501 Crescent St.

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell February 10, 2010 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

ECE 534 Information Theory - Midterm 2

ECE 534 Information Theory - Midterm 2 ECE 534 Information Theory - Midterm Nov.4, 009. 3:30-4:45 in LH03. You will be given the full class time: 75 minutes. Use it wisely! Many of the roblems have short answers; try to find shortcuts. You

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

arxiv: v1 [physics.data-an] 26 Oct 2012

arxiv: v1 [physics.data-an] 26 Oct 2012 Constraints on Yield Parameters in Extended Maximum Likelihood Fits Till Moritz Karbach a, Maximilian Schlu b a TU Dortmund, Germany, moritz.karbach@cern.ch b TU Dortmund, Germany, maximilian.schlu@cern.ch

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

Multi-Channel MAC Protocol for Full-Duplex Cognitive Radio Networks with Optimized Access Control and Load Balancing

Multi-Channel MAC Protocol for Full-Duplex Cognitive Radio Networks with Optimized Access Control and Load Balancing Multi-Channel MAC Protocol for Full-Dulex Cognitive Radio etworks with Otimized Access Control and Load Balancing Le Thanh Tan and Long Bao Le arxiv:.3v [cs.it] Feb Abstract In this aer, we roose a multi-channel

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System

Robust Predictive Control of Input Constraints and Interference Suppression for Semi-Trailer System Vol.7, No.7 (4),.37-38 htt://dx.doi.org/.457/ica.4.7.7.3 Robust Predictive Control of Inut Constraints and Interference Suression for Semi-Trailer System Zhao, Yang Electronic and Information Technology

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

Information collection on a graph

Information collection on a graph Information collection on a grah Ilya O. Ryzhov Warren Powell October 25, 2009 Abstract We derive a knowledge gradient olicy for an otimal learning roblem on a grah, in which we use sequential measurements

More information

Availability and Maintainability. Piero Baraldi

Availability and Maintainability. Piero Baraldi Availability and Maintainability 1 Introduction: reliability and availability System tyes Non maintained systems: they cannot be reaired after a failure (a telecommunication satellite, a F1 engine, a vessel

More information

Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems

Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Analyses of Orthogonal and Non-Orthogonal Steering Vectors at Millimeter Wave Systems Hsiao-Lan Chiang, Tobias Kadur, and Gerhard Fettweis Vodafone Chair for Mobile Communications Technische Universität

More information

A Bound on the Error of Cross Validation Using the Approximation and Estimation Rates, with Consequences for the Training-Test Split

A Bound on the Error of Cross Validation Using the Approximation and Estimation Rates, with Consequences for the Training-Test Split A Bound on the Error of Cross Validation Using the Aroximation and Estimation Rates, with Consequences for the Training-Test Slit Michael Kearns AT&T Bell Laboratories Murray Hill, NJ 7974 mkearns@research.att.com

More information

Optimal Spatial Reuse in Poisson Multi-hop Networks

Optimal Spatial Reuse in Poisson Multi-hop Networks Otimal Satial Reuse in Poisson Multi-ho Networks Kostas Stamatiou an Martin Haenggi Deartment of Electrical Engineering University of Notre Dame, Notre Dame, IN 46556 {kstamati,mhaenggi}@n.eu Abstract

More information

Finite-State Verification or Model Checking. Finite State Verification (FSV) or Model Checking

Finite-State Verification or Model Checking. Finite State Verification (FSV) or Model Checking Finite-State Verification or Model Checking Finite State Verification (FSV) or Model Checking Holds the romise of roviding a cost effective way of verifying imortant roerties about a system Not all faults

More information

Uniformly best wavenumber approximations by spatial central difference operators: An initial investigation

Uniformly best wavenumber approximations by spatial central difference operators: An initial investigation Uniformly best wavenumber aroximations by satial central difference oerators: An initial investigation Vitor Linders and Jan Nordström Abstract A characterisation theorem for best uniform wavenumber aroximations

More information

8 STOCHASTIC PROCESSES

8 STOCHASTIC PROCESSES 8 STOCHASTIC PROCESSES The word stochastic is derived from the Greek στoχαστικoς, meaning to aim at a target. Stochastic rocesses involve state which changes in a random way. A Markov rocess is a articular

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie Wireless Intelligent Networks Center WINC, Nile University,

More information

Mobility-Induced Service Migration in Mobile. Micro-Clouds

Mobility-Induced Service Migration in Mobile. Micro-Clouds arxiv:503054v [csdc] 7 Mar 205 Mobility-Induced Service Migration in Mobile Micro-Clouds Shiiang Wang, Rahul Urgaonkar, Ting He, Murtaza Zafer, Kevin Chan, and Kin K LeungTime Oerating after ossible Deartment

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

Age of Information: Whittle Index for Scheduling Stochastic Arrivals

Age of Information: Whittle Index for Scheduling Stochastic Arrivals Age of Information: Whittle Index for Scheduling Stochastic Arrivals Yu-Pin Hsu Deartment of Communication Engineering National Taiei University yuinhsu@mail.ntu.edu.tw arxiv:80.03422v2 [math.oc] 7 Ar

More information

A Simple Throughput Model for TCP Veno

A Simple Throughput Model for TCP Veno A Simle Throughut Model for TCP Veno Bin Zhou, Cheng Peng Fu, Dah-Ming Chiu, Chiew Tong Lau, and Lek Heng Ngoh School of Comuter Engineering, Nanyang Technological University, Singaore 639798 Email: {zhou00,

More information

Feedback-error control

Feedback-error control Chater 4 Feedback-error control 4.1 Introduction This chater exlains the feedback-error (FBE) control scheme originally described by Kawato [, 87, 8]. FBE is a widely used neural network based controller

More information

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO)

Combining Logistic Regression with Kriging for Mapping the Risk of Occurrence of Unexploded Ordnance (UXO) Combining Logistic Regression with Kriging for Maing the Risk of Occurrence of Unexloded Ordnance (UXO) H. Saito (), P. Goovaerts (), S. A. McKenna (2) Environmental and Water Resources Engineering, Deartment

More information

arxiv:cond-mat/ v2 25 Sep 2002

arxiv:cond-mat/ v2 25 Sep 2002 Energy fluctuations at the multicritical oint in two-dimensional sin glasses arxiv:cond-mat/0207694 v2 25 Se 2002 1. Introduction Hidetoshi Nishimori, Cyril Falvo and Yukiyasu Ozeki Deartment of Physics,

More information

Applications to stochastic PDE

Applications to stochastic PDE 15 Alications to stochastic PE In this final lecture we resent some alications of the theory develoed in this course to stochastic artial differential equations. We concentrate on two secific examles:

More information

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules

CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules CHAPTER-II Control Charts for Fraction Nonconforming using m-of-m Runs Rules. Introduction: The is widely used in industry to monitor the number of fraction nonconforming units. A nonconforming unit is

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies

Online Appendix to Accompany AComparisonof Traditional and Open-Access Appointment Scheduling Policies Online Aendix to Accomany AComarisonof Traditional and Oen-Access Aointment Scheduling Policies Lawrence W. Robinson Johnson Graduate School of Management Cornell University Ithaca, NY 14853-6201 lwr2@cornell.edu

More information

1 Probability Spaces and Random Variables

1 Probability Spaces and Random Variables 1 Probability Saces and Random Variables 1.1 Probability saces Ω: samle sace consisting of elementary events (or samle oints). F : the set of events P: robability 1.2 Kolmogorov s axioms Definition 1.2.1

More information

q-ary Symmetric Channel for Large q

q-ary Symmetric Channel for Large q List-Message Passing Achieves Caacity on the q-ary Symmetric Channel for Large q Fan Zhang and Henry D Pfister Deartment of Electrical and Comuter Engineering, Texas A&M University {fanzhang,hfister}@tamuedu

More information

Outline. Markov Chains and Markov Models. Outline. Markov Chains. Markov Chains Definitions Huizhen Yu

Outline. Markov Chains and Markov Models. Outline. Markov Chains. Markov Chains Definitions Huizhen Yu and Markov Models Huizhen Yu janey.yu@cs.helsinki.fi Det. Comuter Science, Univ. of Helsinki Some Proerties of Probabilistic Models, Sring, 200 Huizhen Yu (U.H.) and Markov Models Jan. 2 / 32 Huizhen Yu

More information

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations

Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations Characterizing the Behavior of a Probabilistic CMOS Switch Through Analytical Models and Its Verification Through Simulations PINAR KORKMAZ, BILGE E. S. AKGUL and KRISHNA V. PALEM Georgia Institute of

More information

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK

Towards understanding the Lorenz curve using the Uniform distribution. Chris J. Stephens. Newcastle City Council, Newcastle upon Tyne, UK Towards understanding the Lorenz curve using the Uniform distribution Chris J. Stehens Newcastle City Council, Newcastle uon Tyne, UK (For the Gini-Lorenz Conference, University of Siena, Italy, May 2005)

More information

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels

Quantitative estimates of propagation of chaos for stochastic systems with W 1, kernels oname manuscrit o. will be inserted by the editor) Quantitative estimates of roagation of chaos for stochastic systems with W, kernels Pierre-Emmanuel Jabin Zhenfu Wang Received: date / Acceted: date Abstract

More information

Sums of independent random variables

Sums of independent random variables 3 Sums of indeendent random variables This lecture collects a number of estimates for sums of indeendent random variables with values in a Banach sace E. We concentrate on sums of the form N γ nx n, where

More information

LINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL

LINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL LINEAR SYSTEMS WITH POLYNOMIAL UNCERTAINTY STRUCTURE: STABILITY MARGINS AND CONTROL Mohammad Bozorg Deatment of Mechanical Engineering University of Yazd P. O. Box 89195-741 Yazd Iran Fax: +98-351-750110

More information

1 Gambler s Ruin Problem

1 Gambler s Ruin Problem Coyright c 2017 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins

More information

Training sequence optimization for frequency selective channels with MAP equalization

Training sequence optimization for frequency selective channels with MAP equalization 532 ISCCSP 2008, Malta, 12-14 March 2008 raining sequence otimization for frequency selective channels with MAP equalization Imed Hadj Kacem, Noura Sellami Laboratoire LEI ENIS, Route Sokra km 35 BP 3038

More information

Optimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI

Optimal Power Control over Fading Cognitive Radio Channels by Exploiting Primary User CSI Otimal Power Control over Fading Cognitive Radio Channels by Exloiting Primary User CSI Rui Zhang Abstract arxiv:0804.67v2 [cs.it] 7 Feb 2009 This aer is concerned with sectrum sharing cognitive radio

More information

Estimating function analysis for a class of Tweedie regression models

Estimating function analysis for a class of Tweedie regression models Title Estimating function analysis for a class of Tweedie regression models Author Wagner Hugo Bonat Deartamento de Estatística - DEST, Laboratório de Estatística e Geoinformação - LEG, Universidade Federal

More information

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino

More information

t 0 Xt sup X t p c p inf t 0

t 0 Xt sup X t p c p inf t 0 SHARP MAXIMAL L -ESTIMATES FOR MARTINGALES RODRIGO BAÑUELOS AND ADAM OSȨKOWSKI ABSTRACT. Let X be a suermartingale starting from 0 which has only nonnegative jums. For each 0 < < we determine the best

More information

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle]

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle] Chater 5 Model checking, verification of CTL One must verify or exel... doubts, and convert them into the certainty of YES or NO. [Thomas Carlyle] 5. The verification setting Page 66 We introduce linear

More information

A Study of Active Queue Management for Congestion Control

A Study of Active Queue Management for Congestion Control A Study of Active Queue Management for Congestion Control Victor Firoiu vfiroiu@nortelnetworks.com Nortel Networks 3 Federal St. illerica, MA 1821 USA Marty orden mborden@tollbridgetech.com Tollridge Technologies

More information

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION

A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST BASED ON THE WEIBULL DISTRIBUTION O P E R A T I O N S R E S E A R C H A N D D E C I S I O N S No. 27 DOI:.5277/ord73 Nasrullah KHAN Muhammad ASLAM 2 Kyung-Jun KIM 3 Chi-Hyuck JUN 4 A MIXED CONTROL CHART ADAPTED TO THE TRUNCATED LIFE TEST

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

Keywords: pile, liquefaction, lateral spreading, analysis ABSTRACT

Keywords: pile, liquefaction, lateral spreading, analysis ABSTRACT Key arameters in seudo-static analysis of iles in liquefying sand Misko Cubrinovski Deartment of Civil Engineering, University of Canterbury, Christchurch 814, New Zealand Keywords: ile, liquefaction,

More information

On the capacity of the general trapdoor channel with feedback

On the capacity of the general trapdoor channel with feedback On the caacity of the general tradoor channel with feedback Jui Wu and Achilleas Anastasooulos Electrical Engineering and Comuter Science Deartment University of Michigan Ann Arbor, MI, 48109-1 email:

More information

On Wald-Type Optimal Stopping for Brownian Motion

On Wald-Type Optimal Stopping for Brownian Motion J Al Probab Vol 34, No 1, 1997, (66-73) Prerint Ser No 1, 1994, Math Inst Aarhus On Wald-Tye Otimal Stoing for Brownian Motion S RAVRSN and PSKIR The solution is resented to all otimal stoing roblems of

More information

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables

Improved Bounds on Bell Numbers and on Moments of Sums of Random Variables Imroved Bounds on Bell Numbers and on Moments of Sums of Random Variables Daniel Berend Tamir Tassa Abstract We rovide bounds for moments of sums of sequences of indeendent random variables. Concentrating

More information

COMMUNICATION BETWEEN SHAREHOLDERS 1

COMMUNICATION BETWEEN SHAREHOLDERS 1 COMMUNICATION BTWN SHARHOLDRS 1 A B. O A : A D Lemma B.1. U to µ Z r 2 σ2 Z + σ2 X 2r ω 2 an additive constant that does not deend on a or θ, the agents ayoffs can be written as: 2r rθa ω2 + θ µ Y rcov

More information

Analysis of M/M/n/K Queue with Multiple Priorities

Analysis of M/M/n/K Queue with Multiple Priorities Analysis of M/M/n/K Queue with Multile Priorities Coyright, Sanjay K. Bose For a P-riority system, class P of highest riority Indeendent, Poisson arrival rocesses for each class with i as average arrival

More information

Implementation and Validation of Finite Volume C++ Codes for Plane Stress Analysis

Implementation and Validation of Finite Volume C++ Codes for Plane Stress Analysis CST0 191 October, 011, Krabi Imlementation and Validation of Finite Volume C++ Codes for Plane Stress Analysis Chakrit Suvanjumrat and Ekachai Chaichanasiri* Deartment of Mechanical Engineering, Faculty

More information

Asymptotically Optimal Simulation Allocation under Dependent Sampling

Asymptotically Optimal Simulation Allocation under Dependent Sampling Asymtotically Otimal Simulation Allocation under Deendent Samling Xiaoing Xiong The Robert H. Smith School of Business, University of Maryland, College Park, MD 20742-1815, USA, xiaoingx@yahoo.com Sandee

More information

Fisher Information in Flow Size Distribution Estimation

Fisher Information in Flow Size Distribution Estimation 1 Fisher Information in Flow Size Distribution Estimation Paul Tune, Member, IEEE, and Darryl Veitch, Fellow, IEEE Abstract The flow size distribution is a useful metric for traffic modeling and management

More information

Uniform Law on the Unit Sphere of a Banach Space

Uniform Law on the Unit Sphere of a Banach Space Uniform Law on the Unit Shere of a Banach Sace by Bernard Beauzamy Société de Calcul Mathématique SA Faubourg Saint Honoré 75008 Paris France Setember 008 Abstract We investigate the construction of a

More information

Use of Transformations and the Repeated Statement in PROC GLM in SAS Ed Stanek

Use of Transformations and the Repeated Statement in PROC GLM in SAS Ed Stanek Use of Transformations and the Reeated Statement in PROC GLM in SAS Ed Stanek Introduction We describe how the Reeated Statement in PROC GLM in SAS transforms the data to rovide tests of hyotheses of interest.

More information

Generalized optimal sub-pattern assignment metric

Generalized optimal sub-pattern assignment metric Generalized otimal sub-attern assignment metric Abu Sajana Rahmathullah, Ángel F García-Fernández, Lennart Svensson arxiv:6005585v7 [cssy] 2 Se 208 Abstract This aer resents the generalized otimal subattern

More information

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting

On the Role of Finite Queues in Cooperative Cognitive Radio Networks with Energy Harvesting On the Role of Finite Queues in Cooerative Cognitive Radio Networks with Energy Harvesting Mohamed A. Abd-Elmagid, Tamer Elatt, and Karim G. Seddik Wireless Intelligent Networks Center (WINC), Nile University,

More information

Scaling Multiple Point Statistics for Non-Stationary Geostatistical Modeling

Scaling Multiple Point Statistics for Non-Stationary Geostatistical Modeling Scaling Multile Point Statistics or Non-Stationary Geostatistical Modeling Julián M. Ortiz, Steven Lyster and Clayton V. Deutsch Centre or Comutational Geostatistics Deartment o Civil & Environmental Engineering

More information

Coding Along Hermite Polynomials for Gaussian Noise Channels

Coding Along Hermite Polynomials for Gaussian Noise Channels Coding Along Hermite olynomials for Gaussian Noise Channels Emmanuel A. Abbe IG, EFL Lausanne, 1015 CH Email: emmanuel.abbe@efl.ch Lizhong Zheng LIDS, MIT Cambridge, MA 0139 Email: lizhong@mit.edu Abstract

More information

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES

RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES RANDOM WALKS AND PERCOLATION: AN ANALYSIS OF CURRENT RESEARCH ON MODELING NATURAL PROCESSES AARON ZWIEBACH Abstract. In this aer we will analyze research that has been recently done in the field of discrete

More information

Hidden Predictors: A Factor Analysis Primer

Hidden Predictors: A Factor Analysis Primer Hidden Predictors: A Factor Analysis Primer Ryan C Sanchez Western Washington University Factor Analysis is a owerful statistical method in the modern research sychologist s toolbag When used roerly, factor

More information

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Cooperative HARQ with Poisson Interference and Opportunistic Routing Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline

More information

Construction of High-Girth QC-LDPC Codes

Construction of High-Girth QC-LDPC Codes MITSUBISHI ELECTRIC RESEARCH LABORATORIES htt://wwwmerlcom Construction of High-Girth QC-LDPC Codes Yige Wang, Jonathan Yedidia, Stark Draer TR2008-061 Setember 2008 Abstract We describe a hill-climbing

More information

A Special Case Solution to the Perspective 3-Point Problem William J. Wolfe California State University Channel Islands

A Special Case Solution to the Perspective 3-Point Problem William J. Wolfe California State University Channel Islands A Secial Case Solution to the Persective -Point Problem William J. Wolfe California State University Channel Islands william.wolfe@csuci.edu Abstract In this aer we address a secial case of the ersective

More information

Finite Mixture EFA in Mplus

Finite Mixture EFA in Mplus Finite Mixture EFA in Mlus November 16, 2007 In this document we describe the Mixture EFA model estimated in Mlus. Four tyes of deendent variables are ossible in this model: normally distributed, ordered

More information

Optimism, Delay and (In)Efficiency in a Stochastic Model of Bargaining

Optimism, Delay and (In)Efficiency in a Stochastic Model of Bargaining Otimism, Delay and In)Efficiency in a Stochastic Model of Bargaining Juan Ortner Boston University Setember 10, 2012 Abstract I study a bilateral bargaining game in which the size of the surlus follows

More information

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel

Analysis of execution time for parallel algorithm to dertmine if it is worth the effort to code and debug in parallel Performance Analysis Introduction Analysis of execution time for arallel algorithm to dertmine if it is worth the effort to code and debug in arallel Understanding barriers to high erformance and redict

More information

Decoding Linear Block Codes Using a Priority-First Search: Performance Analysis and Suboptimal Version

Decoding Linear Block Codes Using a Priority-First Search: Performance Analysis and Suboptimal Version IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 3, MAY 1998 133 Decoding Linear Block Codes Using a Priority-First Search Performance Analysis Subotimal Version Yunghsiang S. Han, Member, IEEE, Carlos

More information

Tests for Two Proportions in a Stratified Design (Cochran/Mantel-Haenszel Test)

Tests for Two Proportions in a Stratified Design (Cochran/Mantel-Haenszel Test) Chater 225 Tests for Two Proortions in a Stratified Design (Cochran/Mantel-Haenszel Test) Introduction In a stratified design, the subects are selected from two or more strata which are formed from imortant

More information

Power Aware Wireless File Downloading: A Constrained Restless Bandit Approach

Power Aware Wireless File Downloading: A Constrained Restless Bandit Approach PROC. WIOP 204 Power Aware Wireless File Downloading: A Constrained Restless Bandit Aroach Xiaohan Wei and Michael J. Neely, Senior Member, IEEE Abstract his aer treats ower-aware throughut maximization

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm

On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm On Line Parameter Estimation of Electric Systems using the Bacterial Foraging Algorithm Gabriel Noriega, José Restreo, Víctor Guzmán, Maribel Giménez and José Aller Universidad Simón Bolívar Valle de Sartenejas,

More information

Notes on Instrumental Variables Methods

Notes on Instrumental Variables Methods Notes on Instrumental Variables Methods Michele Pellizzari IGIER-Bocconi, IZA and frdb 1 The Instrumental Variable Estimator Instrumental variable estimation is the classical solution to the roblem of

More information

On split sample and randomized confidence intervals for binomial proportions

On split sample and randomized confidence intervals for binomial proportions On slit samle and randomized confidence intervals for binomial roortions Måns Thulin Deartment of Mathematics, Usala University arxiv:1402.6536v1 [stat.me] 26 Feb 2014 Abstract Slit samle methods have

More information

Radial Basis Function Networks: Algorithms

Radial Basis Function Networks: Algorithms Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.

More information

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE)

Amin, Osama; Abediseid, Walid; Alouini, Mohamed-Slim. Institute of Electrical and Electronics Engineers (IEEE) KAUST Reository Outage erformance of cognitive radio systems with Imroer Gaussian signaling Item tye Authors Erint version DOI Publisher Journal Rights Conference Paer Amin Osama; Abediseid Walid; Alouini

More information

arxiv: v3 [cs.pf] 26 Jul 2011

arxiv: v3 [cs.pf] 26 Jul 2011 Forever Young: Aging Control For Smarthones in Hybrid Networks Eitan Altman INRIA & University of Avignon, France Rachid El-Azouzi University of Avignon, France arxiv:1009.4733v3 [cs.pf] 26 Jul 2011 Daniel

More information