Rate-Memory Trade-off for the Two-User Broadcast Caching Network with Correlated Sources

Size: px
Start display at page:

Download "Rate-Memory Trade-off for the Two-User Broadcast Caching Network with Correlated Sources"

Transcription

1 Rate-Memory Trade-off for the Two-User Broadcast Cachng Network wth Correlated Sources Parsa Hassanzadeh, Antona M. Tulno, Jame Llorca, Elza Erkp arxv: v [cs.it] May 07 Abstract Ths paper studes the fundamental lmts of cachng n a network wth two recevers and two fles generated by a two-component dscrete memoryless source wth arbtrary jont dstrbuton. Each recever s equpped wth a cache of equal capacty, and the requested fles are delvered over a shared errorfree broadcast lnk. Frst, a lower bound on the optmal peak rate-memory trade-off s provded. Then, n order to leverage the correlaton among the lbrary fles to allevate the load over the shared lnk, a two-step correlaton-aware cache-aded coded multcast CACM scheme s proposed. The frst step uses Gray- Wyner source codng to represent the lbrary va one common and two prvate descrptons, such that a second correlatonunaware multple-request CACM step can explot the addtonal coded multcast opportuntes that arse. It s shown that the rate acheved by the proposed two-step scheme matches the lower bound for a sgnfcant memory regme and t s wthn half of the condtonal entropy for all other memory values. I. INTRODUCTION AND SETUP The use of cachng at the wreless network edge has emerged as a promsng approach to effcently ncrease the capacty of wreless access networks. There have been extensve studes characterzng the fundamental rate-memory tradeoff n a broadcast cachng network wth a lbrary composed of ndependent content [] [3]. More recently, [4] [6] have studed the rate-memory trade-off when delverng correlated fles. In [4], the authors consder a sngle-recever multplefle network wth lossy reconstructons and characterze the trade-offs between rate, cache capacty, and reconstructon dstortons. They extend the analyss to a scenaro wth two recevers and one cache, n whch local cachng gans can be explored. The works n [5] and [6] consder a settng wth an arbtrary number of fles and recevers each havng a cache. A practcal correlaton-aware scheme s proposed n [5], n whch content s cached accordng to both the popularty of fles and ther correlaton wth the rest of the lbrary. Then, the requested content s delvered va a multcast codeword composed of compressed versons of the requested fles. Alternatvely, the work n [6] addresses the dependency among content fles by frst compressng the correlated lbrary, whch s then treated as a lbrary of ndependent fles by a conventonal cache-aded coded multcast scheme. Ths work has been supported by NSF grant #699. P. Hassanzadeh and E. Erkp are wth the ECE Department of New York Unversty, Brooklyn, NY. Emal: ph990, elza}@nyu.edu J. Llorca and A. Tulno are wth Bell Labs, Noka, Holmdel, NJ, USA. Emal: jame.llorca, a.tulno}@noka-bell-labs.com A. Tulno s wth the DIETI, Unversty of Naples Federco II, Italy. Emal: antonamara.tulno}@unna.t In ths paper, by focusng on a two-user two-fle settng, we are able to characterze the optmal peak rate-memory tradeoff of the broadcast cachng network wth correlated sources. To ths end, we frst provde a lower bound on the optmal peak rate-memory trade-off, whch s derved usng a cutset argument on the correspondng cache-demand augmented graph [7]. The lower bound mproves the best known bound for correlated sources gven n [8], and when partcularzed to ndependent sources, matches the correspondng best known bound derved n [9]. We then propose a two-step scheme, n whch the source fles are frst encoded based on the Gray- Wyner network [0], and n the second step, they are cached and delvered through a multple-request correlaton-unaware cache-aded coded multcast scheme. In the rest of the paper, we dscuss the optmalty of the proposed two-step scheme by characterzng a lower bound on the rate-memory tradeoff for ths class of schemes, and comparng t wth the lower bound on the optmal trade-off. We dentfy the set of operatng ponts n the Gray-Wyner regon [0], [], for whch a twostep scheme s optmal over a range of cache capactes, and approxmates the optmal rate to wthn half of the condtonal entropy for all cache szes. The paper s organzed as follows. Sec. II presents the nformaton-theoretc problem formulaton. In Sec. III, we ntroduce a class of two-step schemes based on the Gray- Wyner network. The lower bounds for the optmal and twostep schemes are provded n Sec. IV, and later used to establsh the optmalty of an achevable two-step scheme proposed n Sec. V. After analyzng an llustratve example n Sec. V-A, the paper s concluded n Sec. VI. II. NETWORK MODEL AND PROBLEM FORMULATION We consder a broadcast cachng network composed of one sender wth access to a lbrary of two fles generated by a -component dscrete memoryless source -DMS. The -DMS model X X, px, x conssts of two fnte alphabets X, X and a jont pmf px, x over X X. The -DMS generates and..d. random process X, X } wth X, X px, x. For a block length n, the two lbrary fles are represented by sequences X n = X,..., X n and X n = X,..., X n, respectvely, where X n X n and X n X n. The sender communcates wth two recevers r and r over a shared error-free broadcast lnk. Each recever s equpped wth a cache of sze nm bts, where M denotes the normalzed cache capacty. We assume that the system operates n two phases: a cachng phase and a delvery phase. Durng the cachng phase, whch

2 takes place at off-peak hours when network resources are abundant, the recever caches are flled wth functons of the lbrary fles, such that durng the delvery phase, when recever demands are revealed and resources are lmted, the sender broadcasts the shortest possble codeword that allows each recever to losslessy recover ts requested fle. We refer to the overall scheme as a cache-aded coded multcast scheme CACM. Gven a realzaton of the lbrary, X n, X n }, a CACM scheme conssts of the followng components: Cache Encoder: Durng the cachng phase, the cache encoder desgns the cache content of recever r usng a mappng fr C : X n X n [ : nm. The cache confguraton of recever r s denoted by Z r = fr C X n, X n. Multcast Encoder: Durng the delvery phase, each recever requests a fle from the lbrary. The demand realzaton, denoted by d = d r, d r D, }, where d r, } denotes the ndex of the fle requested by recever r, s revealed to the sender, whch then uses a fxed-to-varable mappng f M : D [ : nm [ : nm X n X n Y to generate and transmt a multcast codeword Y d = f M d, Z r, Z r }, X n, X n } over the shared lnk. The codeword Y d s desgned for each demand realzaton accordng to the cache content, lbrary fles, and jont dstrbuton px, x, to enable almost-lossless reconstructon of the requested fles. Multcast Decoders: Each recever r uses a mappng gr M : D Y [ : nm Xd n r to recover ts requested fle, Xd n r, usng the receved multcast codeword and ts cache content as X n d r = g M r d, Y d, Z dr. The worst-case probablty of error of a CACM scheme s gven by P n e = max d max P Xn dr Xd n r r. In ths paper, we focus on the peak multcast rate, correspondng to the worst-case demand, R n = max d E[LY d ], n where LY denotes the length n bts of the multcast codeword Y, and the expectaton s over the lbrary fles. Defnton : A peak rate-memory par R, M s achevable f there exsts a sequence of CACM schemes for cache capacty M and ncreasng block length n, such that lm n P e n = 0, and lm sup n R n R. Defnton : The peak rate-memory regon, R, s the closure of the set of achevable peak rate-memory pars R, M, and the optmal peak rate-memory functon s R M = nfr : R, M R }. III. GRAY-WYNER CACM SCHEME In ths secton, we descrbe a class of schemes based on a two-step lossless source codng setup, as depcted n Fg.. The frst step nvolves compressng the lbrary va Gray-Wyner We use to ndcate varable length. Source Lbrary Gray-Wyner Source Codng Encoder 0 X # ", X # % W " Encoder Encoder W 0 W % Correlaton- Unaware Multple-Request CACM Recever cache Recever cache Fg. : Gray-Wyner CACM scheme, composed of a frst Gray- Wyner source codng step, and a second correlaton-unaware multple-request CACM step. source codng, and the second step s a correlaton-unaware multple-request CACM scheme. We refer to ths scheme as Gray-Wyner Cache-Aded Coded Multcast -CACM. Gray-Wyner source codng, depcted n Fg., s a dstrbuted lossless source codng setup n whch a -DMS X, X s represented by three descrptons W 0, W, W }, where W 0 [ : nr0, W [ : nr, and W [ : nr. Fle d r can be losslessly recovered from descrptons W 0, W dr, and fle d r can be losslessly recovered from descrptons W 0, W dr, both asymptotcally, as n. As shown n [], the Gray-Wyner rate regon s the closure of the unon over U of S U, where S U denotes the set of rate trplets R 0, R, R such that R 0 IX, X ; U, 3 R HX U, 4 R HX U, 5 gven a condtonal pmf pu x, x wth U X. X +. For a gven U and a rate trplet R 0, R, R S U, a -CACM scheme conssts of: Gray-Wyner Encoder: Gven a lbrary realzaton X n, X n }, the Gray-Wyner encoder at the sender computes three descrptons W 0, W, W } usng a mappng f : X n X n [ : nr0 [ : nr [ : nr. Correlaton-Unaware Cache Encoder: Gven the descrptons W 0, W, W }, the cache encoder at the sender computes the Gray-Wyner based cache contents Z r = f C r W 0, W, W, r, }. Correlaton-Unaware Multcast Encoder: For any demand realzaton d revealed to the sender, the Gray- Wyner based multcast encoder generates and transmts the multcast codeword Y d = f M d, Z r, Z r }, W 0, W, W }. Multcast Decoder: Recever r decodes the descrptons correspondng to ts requested fle as Ŵ0, Ŵd r } = g M r d, Yd, Z. Gray-Wyner Decoder: Recever r decodes ts requested fle usng the descrptons recovered by the multcast

3 decoder, va a mappng gr : [ : nr0 [ : nr d X n, as Xn d = gr Ŵ0, Ŵd r. Notce that for the class of -CACM schemes, snce R 0, R, R S U and W 0, W dr s a Gray-Wyner descrpton of Xd n r, n order to have lm n P e n = 0, wth P n e as defned n, we only need lm max max P Ŵ0, n d r Ŵd r W 0, W dr = 0. As n, the peak -CACM multcast rate s R n R E[LYd ] 0, R, R = max, 6 d n where we explctly show the dependence on R 0, R, R. In lne wth Defntons and, for a gven U, the peak U-rate-memory regon for the class of - CACM schemes, R U, s defned as the closure of the unon of all the achevable pars R n R 0, R, R, M wth R 0, R, R S U. Analogously, the peak U-ratememory functon of -CACM, R M, U, s defned as R M, U = nfr : R, M R U}. We remark that R M, U s the rate acheved by a - CACM scheme wth the Gray-Wyner encoder operatng at the boundary of the regon S U. Fnally, optmzng over the choce of U, we obtan the peak rate-memory regon, R, and the peak rate-memory functon, R M, as } R = cl R U, R M = nf R M, U, where cls} denotes the closure of S, and the unon and nfmum are over all choces of U wth U X. X +. IV. LOWER BOUNDS In ths secton, we provde lower bounds for R M, the optmal peak rate-memory functon, and R M, U, the peak U-rate-memory functon of -CACM for a gven U. The latter bound can also be used to obtan a lower bound for R M. We then nvestgate condtons on the cache capacty M under whch the lower bounds for R M and R M meet. These condtons are then used n Secton V n order to establsh the optmalty of -CACM, and quantfy the rate gap from the lower bound as a functon of the cache capacty M. A. Lower bound on R M Theorem : For a broadcast cachng network wth two recevers, cache capacty M, and a lbrary composed of two fles wth jont dstrbuton px, x, a lower bound on R M, the optmal peak rate-memory functon, s gven by M = nf R : R HX, X M, R HX, X M, R } } HX, X + max HX, HX M. Proof: Theorem follows from combnng cut-set bounds on the cache-demand-augmented graph, and the tmereplcaton of the cache-demand-augmented graph as descrbed n [7], []. Remark : The outer bound n Theorem mproves the best known bound for correlated sources gven n [8, Theorem ], and when partcularzed to ndependent sources, matches the correspondng best known bound derved n [9]. B. Lower bounds on R M, U and R M Theorem : For a gven U, a lower bound on R M, U, the peak U-rate-memory functon of the -CACM scheme, s gven by R LB M, U = nf R : R IX, X ; U + HX U + HX U M, R IX, X ; U + HX U + HX U M, R IX, X ; U + HX U + HX U M, R IX, X ; U + } HX U + HX U M. Proof: The proof s smlar to that of Theorem ; now appled to Gray-Wyner descrptons at rates R 0, R, R S U. Corollary : A lower bound on R M, the peak ratememory functon of -CACM, s gven by M = nf M, U, where the nfmum s over all choces of U wth U X. X +. C. Where R LB M and RLB M meet By comparng the lower bounds n Theorems and, t M, U, and hence, M R LB M. In the followng, we derve condtons under whch M = R LB M. Theorem 3: Let } M max X U X mn HX U, HX U. s easy to see that M Then, for M [0, M ] [HX, X M, HX, X ], we have R LB M = RLB M. Proof: Theorem 3 follows from comparng M wth R LB M, U for a gven U, over dfferent regons of memory M. It s observed that when M [0, }] mn HX U, HX U [ } ] HX, X mn HX U, HX U, HX, X, M, U RLB M s ndependent from the cache capacty M, and becomes zero when IX, X ; U + HX U + HX U = HX, X. For the choce of U used to obtan M, the regon of memory over whch the two bounds meet s maxmzed.

4 Remark : The Markov chan X U X n Theorem 3 suggests that for the rate trplet R 0, R, R S U used n -CACM, we requre R 0 + R + R = HX, X. The same Markov chan s also used to defne Wyner s common nformaton []. Whle n Wyner s common nformaton the goal s to mnmze R 0 subject to R 0 +R +R = HX, X, for M n Theorem 3, the goal s to maxmze mnr, R. Corollary : If the fle lbrary X, X s such that } IX ; X, HX X, HX X cl S U, where the unon s over all choces of U wth U X. X +, then M = R LB M. Proof: See [3]. Example : Consder a -DMS whose jont pmf px, x s such that X, X can be represented as X = X, V and X = X, V, where X and X are condtonally ndependent gven V. Takng U = V, the pont R 0 = IX, X ; U = HV = IX ; X, R = HX U = HX V = HX X and R = HX U = HX V = HX X belongs to the Gray-Wyner rate regon. Then, by Theorem, M = M for any M. V. AN ACHIEVABLE SCHEME BASED ON -CACM AND ITS OPTIMALITY In ths secton, we present an achevable -CACM scheme, where the frst step conssts of a Gray-Wyner encoder restrcted to operate on the plane of the Gray-Wyner rate regon wth R = R = ρ, and the second step s a determnstc correlaton-unaware multple-request CACM scheme that combnes deas from conventonal cachng e.g., LFU and uncoded multcastng and correlaton-unaware CACM wth coded placement, as suggested by Tan and Chen n [4], and referred to as TC n the followng. We remark that jontly optmzng these two steps s the key to maxmzng the overall performance. We then refer to the overall scheme as -LFU-TC, whch works as follows: Gray-Wyner Encoder: generates three lbrary descrptons W 0, W, W } usng a condtonal pmf pu x, x such that px u = px u wth R 0, ρ, ρ S U. Cache Encoder: populates the recever caches as: If M [0, ρ, the common descrpton W 0 s not cached at ether recever, and descrptons W, W } are cached accordng to the cachng phase of TC. If M [ρ, R 0 + ρ, the frst nm ρ bts of descrpton W 0 are cached at both recevers as per LFU cachng, and descrptons W, W } are cached accordng to TC over the remanng cache capacty ρ. If M [R 0 +ρ, R 0 +ρ], the common descrpton W 0 s fully cached at both recevers, and descrptons W, W } are cached accordng to TC over the remanng cache capacty M R 0. LFU s a local cachng polcy that, n the settng of ths paper, leads to all recevers cachng the same part of the fle. Multcast Encoder: transmts the descrptons W, W } accordng to conventonal coded multcast schemes [] [3], [4], whle the porton of W 0 mssng at each recever cache s transmtted va uncoded nave multcast. Remark 3: Dfferently from the sngle-cache settng analyzed n [4], where cachng the common descrpton frst s always optmal, n our case, when the cache capacty s smaller than the prvate descrpton sze, ρ, t s optmal to frst cache the prvate descrptons. Theorem 4: Gven a condtonal pmf pu x, x such that px u = px u, a cache capacty M, and a rate trplet R 0, ρ, ρ S U, the peak U-rate acheved by -LFU- TC s gven by M, U = nf R ach R 0, ρ, 7 where the nfmum s over all rate trplets R 0, ρ, ρ S U, and R ach R 0, ρ s R 0 + ρ M, M [0, ρ R ach R 0, ρ = R ρ M, M [ ρ, R 0 + ρ R 0 + ρ M, M [R 0 + ρ, R 0 + ρ]. Furthermore, optmzng over U, the peak rate acheved by -LFU-TC s gven by M = nf M, U, where the nfmum s over all choces of U wth U X. X +. Proof: See [3]. A. Optmalty of -LFU-TC In order to prove the optmalty of the -LFU-TC scheme, we frst state the followng theorem: Theorem 5: For any U and M, M, U = R M, U. Proof: Smlar to the proof of Theorem 3, R UB M, U s compared to the lower bound R LB M, U n each memory regon, and for any U formng a Markov chan, X U X. Example : Assumng the same settng as n Example, snce M = R LB M for any M, t follows from Theorem 5 that the -LFU-TC scheme s optmal for all values of memory M. The followng theorem characterzes the performance of the -LFU-TC scheme for dfferent regons of M, and delneates the cache capacty regon for whch the scheme s optmal or near optmal. Theorem 6: Let M max X U X mn HX U, HX U }, where the max s over all choces of U such that px u = px u. Then, for M [0, M ] [HX, X M, HX, X ], the -LFU-TC scheme s optmal.e., M = R M.

5 Peak Rate In addton, for M M, HX, X M, we have R UB M R M } HX mn X, HX X M. Proof: See [3] B. Illustraton of Results: Doubly Symmetrc Bnary Source Consder, as a -DMS, a doubly symmetrc bnary source DSBS wth jont pmf px, x = p 0δ x,x + p 0 δ x,x, x, x 0, }, and parameter p 0 [0, ]. Then, HX = HX =, HX X = HX X = hp 0, HX, X = + hp 0, where hp = p logp p log p s the bnary entropy functon. As derved n [], an achevable Gray-Wyner rate regon of a DSBS restrcted to the plane R 0, R, R : R = R = ρ}, s descrbed by the set of rate trplets R 0, ρ, ρ wth R 0 gven by + hp 0 ρ, 0 ρ < hp R 0 fρ hp ρ, 8 where p = p 0, fρ + hp 0 + h ρ p 0 p0 p 0 log + h ρ p 0 log log h ρ p 0 + h ρ p 0 and h ρ s the nverse of the bnary entropy functon. We compare the performance of the proposed -LFU-TC scheme wth respect to: LFU cachng wth uncoded multcastng LFU-UM, the determnstc correlaton-unaware CACM n [4], referred to as TC, 3 the lower bound on the -CACM peak rate-memory functon R LB, and 4 the lower bound on the optmal peak rate-memory functon. Fg. dsplays the rate-memory trade-offs for p 0 = 0.. In lne wth Theorems 3 and 6, Fg. shows that the lower bound on the Gray-Wyner rate-memory functon R LB concdes wth the lower bound on the optmal rate-memory functon for M M = 0.5 and M HX, X M =., and -LFU-TC s optmal n ths regon, whle correlaton-unaware schemes, LFU-UM and TC, fall short. Furthermore, the gap between the rate acheved wth -LFU-TC and the optmal peak rate-memory functon s less than 0., whch s less than half of the condtonal entropy, Fnally, n lne wth Theorem 5, -LFU-TC acheves for any M. VI. CONCLUDING REMARKS In ths paper, we have studed the fundamental lmts of cache-aded communcaton systems under the assumpton of correlated content for a two-user two-fle network. We have derved a lower bound on the peak rate-memory functon for such systems and proposed a class of schemes based on a twostep source codng approach. Fles are frst compressed usng Gray-Wyner source codng, and then cached and delvered, Memory Fg. : Rate-memory trade-off for a DSBS wth p 0 = 0.. usng a combnaton of exstng correlaton-unaware cached aded coded multcast schemes. We have fully characterzed the rate-memory trade-off of such class of schemes, proposed an achevable two-step scheme, and proved ts optmalty for dfferent memory regmes. Fnally, n [3], we provde an extended analyss that ncludes the characterzaton of both peak and average rate-memory trade-offs n more general userfle settngs. ACKNOWLEDGEMENT The authors would lke to thank M. Wgger and D. Gündüz for ther useful dscussons on the Gray-Wyner network. REFERENCES [] M. A. Maddah-Al and U. Nesen, Fundamental lmts of cachng, IEEE Transactons on Informaton Theory, vol. 60, no. 5. [] M. J, A. Tulno, J. Llorca, and G. Care, Order-optmal rate of cachng and coded multcastng wth random demands, arxv:50.034, 05. [3], Cachng-aded coded multcastng wth multple random requests, n Proc. IEEE Informaton Theory Workshop ITW, 05. [4] R. Tmo, S. S. Bdokht, M. Wgger, and B. C. Geger, A rate-dstorton approach to cachng, arxv preprnt arxv: , 06. [5] P. Hassanzadeh, A. Tulno, J. Llorca, and E. Erkp, Cache-aded coded multcast for correlated sources, Proc. IEEE Internatonal Symposum on Turbo Codes and Iteratve Informaton Processng ISTC, 06. [6], Correlaton-aware dstrbuted cachng and coded delvery, Proc. IEEE Informaton Theory Workshop ITW, 06. [7] J. Llorca, A. M. Tulno, K. Guan, and D. Klper, Network-coded cachng-aded multcast for effcent content delvery, n Proc. IEEE Internatonal Conference on Communcatons ICC. [8] S. H. Lm, C.-Y. Wang, and M. Gastpar, Informaton theoretc cachng: The mult-user case, n Proc. IEEE Internatonal Symposum on Informaton Theory ISIT, 06, pp [9] H. Ghasem and A. Ramamoorthy, Improved lower bounds for coded cachng, n Proc. IEEE Internatonal Symposum on Informaton Theory ISIT, 05, pp [0] R. Gray and A. Wyner, Source codng for a smple network, Bell System Techncal Journal, 974. [] A. Wyner, The common nformaton of two dependent random varables, IEEE Transactons on Informaton Theory, 975. [] J. Llorca and A. M. Tulno, Mnmum cost cachng-aded multcast under arbtrary demand, n Proc. IEEE Aslomar Conference on Sgnals, Systems and Computers, 03, pp [3] P. Hassanzadeh, A. Tulno, J. Llorca, and E. Erkp, Rate-memory tradeoff for the broadcast cachng network wth correlated sources, preprnt at [4] C. Tan and J. Chen, Cachng and delvery va nterference elmnaton, n Proc. IEEE Internatonal Symposum on Informaton Theory ISIT, 06.

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

Lossy Compression. Compromise accuracy of reconstruction for increased compression.

Lossy Compression. Compromise accuracy of reconstruction for increased compression. Lossy Compresson Compromse accuracy of reconstructon for ncreased compresson. The reconstructon s usually vsbly ndstngushable from the orgnal mage. Typcally, one can get up to 0:1 compresson wth almost

More information

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem.

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem. Lecture 14 (03/27/18). Channels. Decodng. Prevew of the Capacty Theorem. A. Barg The concept of a communcaton channel n nformaton theory s an abstracton for transmttng dgtal (and analog) nformaton from

More information

Bounds on the Effective-length of Optimal Codes for Interference Channel with Feedback

Bounds on the Effective-length of Optimal Codes for Interference Channel with Feedback Bounds on the Effectve-length of Optmal Codes for Interference Channel wth Feedback Mohsen Hedar EECS Department Unversty of Mchgan Ann Arbor,USA Emal: mohsenhd@umch.edu Farhad Shran ECE Department New

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

Chapter 7 Channel Capacity and Coding

Chapter 7 Channel Capacity and Coding Wreless Informaton Transmsson System Lab. Chapter 7 Channel Capacty and Codng Insttute of Communcatons Engneerng atonal Sun Yat-sen Unversty Contents 7. Channel models and channel capacty 7.. Channel models

More information

Chapter 7 Channel Capacity and Coding

Chapter 7 Channel Capacity and Coding Chapter 7 Channel Capacty and Codng Contents 7. Channel models and channel capacty 7.. Channel models Bnary symmetrc channel Dscrete memoryless channels Dscrete-nput, contnuous-output channel Waveform

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006)

ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006) ECE 534: Elements of Informaton Theory Solutons to Mdterm Eam (Sprng 6) Problem [ pts.] A dscrete memoryless source has an alphabet of three letters,, =,, 3, wth probabltes.4,.4, and., respectvely. (a)

More information

Winter 2008 CS567 Stochastic Linear/Integer Programming Guest Lecturer: Xu, Huan

Winter 2008 CS567 Stochastic Linear/Integer Programming Guest Lecturer: Xu, Huan Wnter 2008 CS567 Stochastc Lnear/Integer Programmng Guest Lecturer: Xu, Huan Class 2: More Modelng Examples 1 Capacty Expanson Capacty expanson models optmal choces of the tmng and levels of nvestments

More information

Cache-Aided Content Delivery over Erasure Broadcast Channels

Cache-Aided Content Delivery over Erasure Broadcast Channels Cache-Aded Content Delvery over Erasure Broadcast Channels Mohammad Mohammad Amr and Denz Gündüz arxv:70205454v2 [csit] 3 May 207 Abstract A cache-aded broadcast network s studed, n whch a server delvers

More information

On the Correlation between Boolean Functions of Sequences of Random Variables

On the Correlation between Boolean Functions of Sequences of Random Variables On the Correlaton between Boolean Functons of Sequences of Random Varables Farhad Shran Chaharsoogh Electrcal Engneerng and Computer Scence Unversty of Mchgan Ann Arbor, Mchgan, 48105 Emal: fshran@umch.edu

More information

On Information Theoretic Games for Interference Networks

On Information Theoretic Games for Interference Networks On Informaton Theoretc Games for Interference Networks Suvarup Saha and Randall A. Berry Dept. of EECS Northwestern Unversty e-mal: suvarups@u.northwestern.edu rberry@eecs.northwestern.edu Abstract The

More information

Error Probability for M Signals

Error Probability for M Signals Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA 4 Analyss of Varance (ANOVA) 5 ANOVA 51 Introducton ANOVA ANOVA s a way to estmate and test the means of multple populatons We wll start wth one-way ANOVA If the populatons ncluded n the study are selected

More information

Lecture 10 Support Vector Machines II

Lecture 10 Support Vector Machines II Lecture 10 Support Vector Machnes II 22 February 2016 Taylor B. Arnold Yale Statstcs STAT 365/665 1/28 Notes: Problem 3 s posted and due ths upcomng Frday There was an early bug n the fake-test data; fxed

More information

Coded Caching with Heterogenous Cache Sizes

Coded Caching with Heterogenous Cache Sizes Coded Cachng wth Heterogenous Cache Szes Snong Wang Department of Electronc Engneerng, Shangha Jao Tong Unversty {snwang}@sjtueducn arxv:50403v [csit] 3 Jul 05 Abstract We nvestgate the coded cachng scheme

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

x = x 1 + :::+ x K and the nput covarance matrces are of the form ± = E[x x y ]. 3.2 Dualty Next, we ntroduce the concept of dualty wth the followng t

x = x 1 + :::+ x K and the nput covarance matrces are of the form ± = E[x x y ]. 3.2 Dualty Next, we ntroduce the concept of dualty wth the followng t Sum Power Iteratve Water-fllng for Mult-Antenna Gaussan Broadcast Channels N. Jndal, S. Jafar, S. Vshwanath and A. Goldsmth Dept. of Electrcal Engg. Stanford Unversty, CA, 94305 emal: njndal,syed,srram,andrea@wsl.stanford.edu

More information

Markov Chain Monte Carlo Lecture 6

Markov Chain Monte Carlo Lecture 6 where (x 1,..., x N ) X N, N s called the populaton sze, f(x) f (x) for at least one {1, 2,..., N}, and those dfferent from f(x) are called the tral dstrbutons n terms of mportance samplng. Dfferent ways

More information

P exp(tx) = 1 + t 2k M 2k. k N

P exp(tx) = 1 + t 2k M 2k. k N 1. Subgaussan tals Defnton. Say that a random varable X has a subgaussan dstrbuton wth scale factor σ< f P exp(tx) exp(σ 2 t 2 /2) for all real t. For example, f X s dstrbuted N(,σ 2 ) then t s subgaussan.

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

Pulse Coded Modulation

Pulse Coded Modulation Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal

More information

On Network Coding of Independent and Dependent Sources in Line Networks

On Network Coding of Independent and Dependent Sources in Line Networks On Network Codng of Independent and Dependent Sources n Lne Networks Mayank Baksh, Mchelle Effros, WeHsn Gu, Ralf Koetter Department of Electrcal Engneerng Department of Electrcal Engneerng Calforna Insttute

More information

EGR 544 Communication Theory

EGR 544 Communication Theory EGR 544 Communcaton Theory. Informaton Sources Z. Alyazcoglu Electrcal and Computer Engneerng Department Cal Poly Pomona Introducton Informaton Source x n Informaton sources Analog sources Dscrete sources

More information

Analysis of Discrete Time Queues (Section 4.6)

Analysis of Discrete Time Queues (Section 4.6) Analyss of Dscrete Tme Queues (Secton 4.6) Copyrght 2002, Sanjay K. Bose Tme axs dvded nto slots slot slot boundares Arrvals can only occur at slot boundares Servce to a job can only start at a slot boundary

More information

State Amplification and State Masking for the Binary Energy Harvesting Channel

State Amplification and State Masking for the Binary Energy Harvesting Channel State Amplfcaton and State Maskng for the Bnary Energy Harvestng Channel Kaya Tutuncuoglu, Omur Ozel 2, Ayln Yener, and Sennur Ulukus 2 Department of Electrcal Engneerng, The Pennsylvana State Unversty,

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

Amiri s Supply Chain Model. System Engineering b Department of Mathematics and Statistics c Odette School of Business

Amiri s Supply Chain Model. System Engineering b Department of Mathematics and Statistics c Odette School of Business Amr s Supply Chan Model by S. Ashtab a,, R.J. Caron b E. Selvarajah c a Department of Industral Manufacturng System Engneerng b Department of Mathematcs Statstcs c Odette School of Busness Unversty of

More information

Two-Way and Multiple-Access Energy Harvesting Systems with Energy Cooperation

Two-Way and Multiple-Access Energy Harvesting Systems with Energy Cooperation Two-Way and Multple-Access Energy Harvestng Systems wth Energy Cooperaton Berk Gurakan, Omur Ozel, Jng Yang 2, and Sennur Ulukus Department of Electrcal and Computer Engneerng, Unversty of Maryland, College

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.65/15.070J Fall 013 Lecture 1 10/1/013 Martngale Concentraton Inequaltes and Applcatons Content. 1. Exponental concentraton for martngales wth bounded ncrements.

More information

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U)

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U) Econ 413 Exam 13 H ANSWERS Settet er nndelt 9 deloppgaver, A,B,C, som alle anbefales å telle lkt for å gøre det ltt lettere å stå. Svar er gtt . Unfortunately, there s a prntng error n the hnt of

More information

Low Complexity Soft-Input Soft-Output Hamming Decoder

Low Complexity Soft-Input Soft-Output Hamming Decoder Low Complexty Soft-Input Soft-Output Hammng Der Benjamn Müller, Martn Holters, Udo Zölzer Helmut Schmdt Unversty Unversty of the Federal Armed Forces Department of Sgnal Processng and Communcatons Holstenhofweg

More information

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1]

Outline. Communication. Bellman Ford Algorithm. Bellman Ford Example. Bellman Ford Shortest Path [1] DYNAMIC SHORTEST PATH SEARCH AND SYNCHRONIZED TASK SWITCHING Jay Wagenpfel, Adran Trachte 2 Outlne Shortest Communcaton Path Searchng Bellmann Ford algorthm Algorthm for dynamc case Modfcatons to our algorthm

More information

A Lower Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control

A Lower Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control A ower Bound on SIR Threshold for Call Admsson Control n Multple-Class CDMA Systems w Imperfect ower-control Mohamed H. Ahmed Faculty of Engneerng and Appled Scence Memoral Unversty of ewfoundland St.

More information

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or Sgnal Compresson Sgnal Compresson Entropy Codng Entropy codng s also known as zero-error codng, data compresson or lossless compresson. Entropy codng s wdely used n vrtually all popular nternatonal multmeda

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

On mutual information estimation for mixed-pair random variables

On mutual information estimation for mixed-pair random variables On mutual nformaton estmaton for mxed-par random varables November 3, 218 Aleksandr Beknazaryan, Xn Dang and Haln Sang 1 Department of Mathematcs, The Unversty of Msssspp, Unversty, MS 38677, USA. E-mal:

More information

On the Multicriteria Integer Network Flow Problem

On the Multicriteria Integer Network Flow Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of

More information

Lecture 4: November 17, Part 1 Single Buffer Management

Lecture 4: November 17, Part 1 Single Buffer Management Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input

More information

Homework Assignment 3 Due in class, Thursday October 15

Homework Assignment 3 Due in class, Thursday October 15 Homework Assgnment 3 Due n class, Thursday October 15 SDS 383C Statstcal Modelng I 1 Rdge regresson and Lasso 1. Get the Prostrate cancer data from http://statweb.stanford.edu/~tbs/elemstatlearn/ datasets/prostate.data.

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

Power law and dimension of the maximum value for belief distribution with the max Deng entropy

Power law and dimension of the maximum value for belief distribution with the max Deng entropy Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng

More information

Secret Communication using Artificial Noise

Secret Communication using Artificial Noise Secret Communcaton usng Artfcal Nose Roht Neg, Satashu Goel C Department, Carnege Mellon Unversty, PA 151, USA {neg,satashug}@ece.cmu.edu Abstract The problem of secret communcaton between two nodes over

More information

An Upper Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control

An Upper Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control An Upper Bound on SINR Threshold for Call Admsson Control n Multple-Class CDMA Systems wth Imperfect ower-control Mahmoud El-Sayes MacDonald, Dettwler and Assocates td. (MDA) Toronto, Canada melsayes@hotmal.com

More information

Appendix B: Resampling Algorithms

Appendix B: Resampling Algorithms 407 Appendx B: Resamplng Algorthms A common problem of all partcle flters s the degeneracy of weghts, whch conssts of the unbounded ncrease of the varance of the mportance weghts ω [ ] of the partcles

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Approximately achieving Gaussian relay network capacity with lattice codes

Approximately achieving Gaussian relay network capacity with lattice codes Approxmately achevng Gaussan relay network capacty wth lattce codes Ayfer Özgür EFL, Lausanne, Swtzerland ayfer.ozgur@epfl.ch Suhas Dggav UCLA, USA and EFL, Swtzerland suhas@ee.ucla.edu Abstract Recently,

More information

Online Appendix: Reciprocity with Many Goods

Online Appendix: Reciprocity with Many Goods T D T A : O A Kyle Bagwell Stanford Unversty and NBER Robert W. Stager Dartmouth College and NBER March 2016 Abstract Ths onlne Appendx extends to a many-good settng the man features of recprocty emphaszed

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

Pricing and Resource Allocation Game Theoretic Models

Pricing and Resource Allocation Game Theoretic Models Prcng and Resource Allocaton Game Theoretc Models Zhy Huang Changbn Lu Q Zhang Computer and Informaton Scence December 8, 2009 Z. Huang, C. Lu, and Q. Zhang (CIS) Game Theoretc Models December 8, 2009

More information

Lecture 3: Probability Distributions

Lecture 3: Probability Distributions Lecture 3: Probablty Dstrbutons Random Varables Let us begn by defnng a sample space as a set of outcomes from an experment. We denote ths by S. A random varable s a functon whch maps outcomes nto the

More information

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers

Psychology 282 Lecture #24 Outline Regression Diagnostics: Outliers Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.

More information

A new construction of 3-separable matrices via an improved decoding of Macula s construction

A new construction of 3-separable matrices via an improved decoding of Macula s construction Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

Negative Binomial Regression

Negative Binomial Regression STATGRAPHICS Rev. 9/16/2013 Negatve Bnomal Regresson Summary... 1 Data Input... 3 Statstcal Model... 3 Analyss Summary... 4 Analyss Optons... 7 Plot of Ftted Model... 8 Observed Versus Predcted... 10 Predctons...

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

Power Allocation/Beamforming for DF MIMO Two-Way Relaying: Relay and Network Optimization

Power Allocation/Beamforming for DF MIMO Two-Way Relaying: Relay and Network Optimization Power Allocaton/Beamformng for DF MIMO Two-Way Relayng: Relay and Network Optmzaton Je Gao, Janshu Zhang, Sergy A. Vorobyov, Ha Jang, and Martn Haardt Dept. of Electrcal & Computer Engneerng, Unversty

More information

On Spatial Capacity of Wireless Ad Hoc Networks with Threshold Based Scheduling

On Spatial Capacity of Wireless Ad Hoc Networks with Threshold Based Scheduling On Spatal Capacty of Wreless Ad Hoc Networks wth Threshold Based Schedulng Yue Lng Che, Ru Zhang, Y Gong, and Lngje Duan Abstract arxv:49.2592v [cs.it] 9 Sep 24 Ths paper studes spatal capacty n a stochastc

More information

Exact-Regenerating Codes between MBR and MSR Points

Exact-Regenerating Codes between MBR and MSR Points Exact-Regeneratng Codes between BR SR Ponts arxv:1304.5357v1 [cs.dc] 19 Apr 2013 Abstract In ths paper we study dstrbuted storage systems wth exact repar. We gve a constructon for regeneratng codes between

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work

More information

Assortment Optimization under MNL

Assortment Optimization under MNL Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.

More information

6. Stochastic processes (2)

6. Stochastic processes (2) Contents Markov processes Brth-death processes Lect6.ppt S-38.45 - Introducton to Teletraffc Theory Sprng 5 Markov process Consder a contnuous-tme and dscrete-state stochastc process X(t) wth state space

More information

Economics 130. Lecture 4 Simple Linear Regression Continued

Economics 130. Lecture 4 Simple Linear Regression Continued Economcs 130 Lecture 4 Contnued Readngs for Week 4 Text, Chapter and 3. We contnue wth addressng our second ssue + add n how we evaluate these relatonshps: Where do we get data to do ths analyss? How do

More information

6. Stochastic processes (2)

6. Stochastic processes (2) 6. Stochastc processes () Lect6.ppt S-38.45 - Introducton to Teletraffc Theory Sprng 5 6. Stochastc processes () Contents Markov processes Brth-death processes 6. Stochastc processes () Markov process

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability

Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability Connectng Multple-uncast and Network Error Correcton: Reducton and Unachevablty Wentao Huang Calforna Insttute of Technology Mchael Langberg Unversty at Buffalo, SUNY Joerg Klewer New Jersey Insttute of

More information

Channel Encoder. Channel. Figure 7.1: Communication system

Channel Encoder. Channel. Figure 7.1: Communication system Chapter 7 Processes The model of a communcaton system that we have been developng s shown n Fgure 7.. Ths model s also useful for some computaton systems. The source s assumed to emt a stream of symbols.

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

CHAPTER-5 INFORMATION MEASURE OF FUZZY MATRIX AND FUZZY BINARY RELATION

CHAPTER-5 INFORMATION MEASURE OF FUZZY MATRIX AND FUZZY BINARY RELATION CAPTER- INFORMATION MEASURE OF FUZZY MATRI AN FUZZY BINARY RELATION Introducton The basc concept of the fuzz matr theor s ver smple and can be appled to socal and natural stuatons A branch of fuzz matr

More information

Uncertainty as the Overlap of Alternate Conditional Distributions

Uncertainty as the Overlap of Alternate Conditional Distributions Uncertanty as the Overlap of Alternate Condtonal Dstrbutons Olena Babak and Clayton V. Deutsch Centre for Computatonal Geostatstcs Department of Cvl & Envronmental Engneerng Unversty of Alberta An mportant

More information

The L(2, 1)-Labeling on -Product of Graphs

The L(2, 1)-Labeling on -Product of Graphs Annals of Pure and Appled Mathematcs Vol 0, No, 05, 9-39 ISSN: 79-087X (P, 79-0888(onlne Publshed on 7 Aprl 05 wwwresearchmathscorg Annals of The L(, -Labelng on -Product of Graphs P Pradhan and Kamesh

More information

Antenna Combining for the MIMO Downlink Channel

Antenna Combining for the MIMO Downlink Channel Antenna Combnng for the IO Downlnk Channel arxv:0704.308v [cs.it] 0 Apr 2007 Nhar Jndal Department of Electrcal and Computer Engneerng Unversty of nnesota nneapols, N 55455, USA Emal: nhar@umn.edu Abstract

More information

Asynchronous CSMA Policies in Multihop Wireless Networks with Primary Interference Constraints

Asynchronous CSMA Policies in Multihop Wireless Networks with Primary Interference Constraints Asynchronous CSMA Polces n Multhop Wreless Networks wth Prmary Interference Constrants Peter Marbach, Atlla Erylmaz, and Asu Ozdaglar Abstract We analyze Asynchronous Carrer Sense Multple Access (CSMA)

More information

The Quadratic Trigonometric Bézier Curve with Single Shape Parameter

The Quadratic Trigonometric Bézier Curve with Single Shape Parameter J. Basc. Appl. Sc. Res., (3541-546, 01 01, TextRoad Publcaton ISSN 090-4304 Journal of Basc and Appled Scentfc Research www.textroad.com The Quadratc Trgonometrc Bézer Curve wth Sngle Shape Parameter Uzma

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Exercises of Chapter 2

Exercises of Chapter 2 Exercses of Chapter Chuang-Cheh Ln Department of Computer Scence and Informaton Engneerng, Natonal Chung Cheng Unversty, Mng-Hsung, Chay 61, Tawan. Exercse.6. Suppose that we ndependently roll two standard

More information

Inductance Calculation for Conductors of Arbitrary Shape

Inductance Calculation for Conductors of Arbitrary Shape CRYO/02/028 Aprl 5, 2002 Inductance Calculaton for Conductors of Arbtrary Shape L. Bottura Dstrbuton: Internal Summary In ths note we descrbe a method for the numercal calculaton of nductances among conductors

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

CS 798: Homework Assignment 2 (Probability)

CS 798: Homework Assignment 2 (Probability) 0 Sample space Assgned: September 30, 2009 In the IEEE 802 protocol, the congeston wndow (CW) parameter s used as follows: ntally, a termnal wats for a random tme perod (called backoff) chosen n the range

More information

Linear Approximation with Regularization and Moving Least Squares

Linear Approximation with Regularization and Moving Least Squares Lnear Approxmaton wth Regularzaton and Movng Least Squares Igor Grešovn May 007 Revson 4.6 (Revson : March 004). 5 4 3 0.5 3 3.5 4 Contents: Lnear Fttng...4. Weghted Least Squares n Functon Approxmaton...

More information

Solutions HW #2. minimize. Ax = b. Give the dual problem, and make the implicit equality constraints explicit. Solution.

Solutions HW #2. minimize. Ax = b. Give the dual problem, and make the implicit equality constraints explicit. Solution. Solutons HW #2 Dual of general LP. Fnd the dual functon of the LP mnmze subject to c T x Gx h Ax = b. Gve the dual problem, and make the mplct equalty constrants explct. Soluton. 1. The Lagrangan s L(x,

More information

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling Real-Tme Systems Multprocessor schedulng Specfcaton Implementaton Verfcaton Multprocessor schedulng -- -- Global schedulng How are tasks assgned to processors? Statc assgnment The processor(s) used for

More information

APPROXIMATE PRICES OF BASKET AND ASIAN OPTIONS DUPONT OLIVIER. Premia 14

APPROXIMATE PRICES OF BASKET AND ASIAN OPTIONS DUPONT OLIVIER. Premia 14 APPROXIMAE PRICES OF BASKE AND ASIAN OPIONS DUPON OLIVIER Prema 14 Contents Introducton 1 1. Framewor 1 1.1. Baset optons 1.. Asan optons. Computng the prce 3. Lower bound 3.1. Closed formula for the prce

More information

The Second Anti-Mathima on Game Theory

The Second Anti-Mathima on Game Theory The Second Ant-Mathma on Game Theory Ath. Kehagas December 1 2006 1 Introducton In ths note we wll examne the noton of game equlbrum for three types of games 1. 2-player 2-acton zero-sum games 2. 2-player

More information

Chapter - 2. Distribution System Power Flow Analysis

Chapter - 2. Distribution System Power Flow Analysis Chapter - 2 Dstrbuton System Power Flow Analyss CHAPTER - 2 Radal Dstrbuton System Load Flow 2.1 Introducton Load flow s an mportant tool [66] for analyzng electrcal power system network performance. Load

More information

Natural Language Processing and Information Retrieval

Natural Language Processing and Information Retrieval Natural Language Processng and Informaton Retreval Support Vector Machnes Alessandro Moschtt Department of nformaton and communcaton technology Unversty of Trento Emal: moschtt@ds.untn.t Summary Support

More information

Managing Capacity Through Reward Programs. on-line companion page. Byung-Do Kim Seoul National University College of Business Administration

Managing Capacity Through Reward Programs. on-line companion page. Byung-Do Kim Seoul National University College of Business Administration Managng Caacty Through eward Programs on-lne comanon age Byung-Do Km Seoul Natonal Unversty College of Busness Admnstraton Mengze Sh Unversty of Toronto otman School of Management Toronto ON M5S E6 Canada

More information

Convergence of random processes

Convergence of random processes DS-GA 12 Lecture notes 6 Fall 216 Convergence of random processes 1 Introducton In these notes we study convergence of dscrete random processes. Ths allows to characterze phenomena such as the law of large

More information

Outline. Bayesian Networks: Maximum Likelihood Estimation and Tree Structure Learning. Our Model and Data. Outline

Outline. Bayesian Networks: Maximum Likelihood Estimation and Tree Structure Learning. Our Model and Data. Outline Outlne Bayesan Networks: Maxmum Lkelhood Estmaton and Tree Structure Learnng Huzhen Yu janey.yu@cs.helsnk.f Dept. Computer Scence, Unv. of Helsnk Probablstc Models, Sprng, 200 Notces: I corrected a number

More information

Edge Isoperimetric Inequalities

Edge Isoperimetric Inequalities November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

CHAPTER III Neural Networks as Associative Memory

CHAPTER III Neural Networks as Associative Memory CHAPTER III Neural Networs as Assocatve Memory Introducton One of the prmary functons of the bran s assocatve memory. We assocate the faces wth names, letters wth sounds, or we can recognze the people

More information