TAHES: Truthful Double Auction for Heterogeneous Spectrums
|
|
- Alaina Griffith
- 5 years ago
- Views:
Transcription
1 The 31st Annual IEEE Internatonal Conference on Computer Communcatons: Mn-Conference TAHES: Truthful Double Aucton for Heterogeneous Spectrums Xaojun Feng, Yanjao Chen, Jn Zhang, Qan Zhang, and Bo L Department of Computer Scence and Engneerng, Hong Kong Unversty of Scence and Technology, Hong Kong {xfeng, chenyanjao, jnzh, qanzh, bl}@cse.ust.hk Abstract Aucton s wdely appled n wreless communcaton for spectrum allocaton. Most of pror works have assumed that spectrums are dentcal. In realty, however, spectrums provded by dfferent owners have dstnctve characterstcs n both spacal and frequency domans. Spectrum avalablty also vares n dfferent geo-locatons. Furthermore, frequency dversty may cause non-dentcal conflcts among spectrum buyers snce dfferent frequences have dstnct communcaton ranges. Under such realstc scenaro, exstng spectrum aucton schemes cannot provde truthfulness or effcency. In ths paper, we propose a Truthful double Aucton for HEterogeneous Spectrum, called TAHES. TAHES allows buyers to explctly express ther personalzed preferences for heterogeneous spectrums and also addresses the problem of nterference graph varaton. We prove that TAHES has nce economc propertes ncludng truthfulness, ndvdual ratonalty and budget balance. I. Introducton Spectrum s valuable resource for wreless communcaton. Measurement results have shown that spectrum utlzaton s hghly dynamc n dfferent geo-locatons[13]. In some places, spectrums may be under-utlzed and are usually referred to as whte spaces. More effcent utlzaton of whte spaces of dfferent frequences s consdered as a potental soluton for the next generaton of wreless networkng. A promsng way to better utlze whte spaces s to enable spectrum owners to lease ther spectrums to secondary servce provders n the geo-locatons where the prmary users wll not be nterfered. In return, the spectrum owners can get pad from secondary servce provders. Company such as SpectrumBrdge[1] has already launched an onlne platform called SpecEx for spectrum owners to sell ther unused spectrums to potental buyers. In such a new busness model, spectrums from multple sellers resde n dfferent frequency bands and have varous avalablty n dfferent locatons. Also, spectrum buyers may express dfferent preferences for dfferent spectrums. Another nterestng aspect n ths scenaro s the reusablty of spectrum. Two buyers that are far enough from each other may reuse the same spectrum concurrently. The problem of spectrum redstrbuton between multple spectrum owners and multple secondary servce provders can be modeled as a sngle round mult-tem double aucton. In our case, the spectrum owners are sellers; secondary servce provders are buyers; spectrums are goods; and the auctoneer can be a thrd party provdng the aucton platform such as SpectrumBrdge or regulators such as FCC. Although aucton has been wdely appled to spectrum allocaton n wreless communcaton, exstng double aucton schemes[6]-[9] cannot be drectly appled to our scenaro. There are three major challenges n our problem. The frst challenge s the spatal heterogenety of spectrum. Spectrums offered by dfferent spectrum owners are avalable to dfferent buyers. However, exstng works[6]-[9] consder only the scenaro where all spectrums are avalable to all buyers. The second challenge comes together wth frequency heterogenety and spectrum reusablty. The spectrums may resde n varous frequency bands. Lower-frequency bands have larger nterference ranges than hgher-frequency bands do. In ths case, dfferent buyers may have dfferent nterference relatonshps n dfferent frequences. Nevertheless, exstng works consderng spectrum reusablty[8][9] usually assume the same conflct relatonshp among all buyers throughout all frequences. The thrd challenge comes from the aucton mechansm desgn. A well desgned aucton scheme should preserve the most crtcal property: Truthfulness (or strategyproofness). A truthful aucton nctes all bdders to voluntarly reveal ther true valuaton for the tems they are bddng. The auctoned tems are fnally assgned to bdders who value t the most. Unfortunately, wth heterogenous tems, the truthfulness cannot be guaranteed when smply applyng exstng schemes. In ths paper, we propose TAHES, a Truthful double Aucton scheme for HEterogeneous Spectrum, to address the above-mentoned challenges. TAHES groups spectrum buyers consderng ther non-dentcal conflct relatonshps n heterogeneous spectrums to explore spectrum reusablty. To guarantee truthfulness, TAHES employs a matchng procedure between buyer groups and sellers. In summary, the man contrbutons of the paper are as follows: To the best of our knowledge, TAHES s the frst double aucton mechansm for heterogeneous spectrum transacton, allowng buyers to express dversfed preferences for spectrums of dfference frequences. TAHES mproves spectrum utlzaton by takng nto consderaton of the spectrum reusablty. As far as we know, TAHES s the frst aucton mechansm that can deal wth the problem of nterference graph varaton caused by spectrum frequency heterogenety. TAHES ensures that bddng truthfully s the domnant strategy for all bdders. Despte ths, TAHES also con /12/$ IEEE 3076
2 forms wth ndvdual ratonalty and budget balance. The rest of the paper s organzed as follows. Secton II presents the aucton model of heterogeneous spectrum tradng and then sets the desgn objectves for the proposed aucton mechansm. In secton III, challenges n heterogeneous aucton desgn are further explaned. We gve detaled descrpton of TAHES n secton IV. We brefly dscuss related works n SectonVandsummarzethewholeworknSectonVI. II. Model Descrpton and Desgn Targets In ths secton, we frst formulate the problem of heterogeneous spectrum exchange between spectrum owners and servce provders as a double aucton. Then, we overvew deal economc propertes of an aucton mechansm and state our aucton desgn target. A. Problem Formulaton We consder the scenaro where N secondary servce provders need to purchase spectrum resource from M spectrum owners. A sngle-round double aucton conssts of M seller and N buyers s held to serve ths purpose. Let S = {s 1, s 2,, s M } denotes the set of sellers and W = {w 1, w 2,, w N } denotes the set of buyers. A thrd-party acts as the auctoneer and decdes the wnnng bdders and the payment. Each seller contrbutes one dstnct channel. Each buyer would lke to purchase one channel, but they have dfferent valuatons for the channels. Therefore, the buyers bds are channel specfc. We assume that the aucton s sealedbd, prvate and colluson-free. In other words, n the aucton, all bdders smultaneously submt sealed bds so that no bdder knows the bd of any other partcpants. In addton, bdders do not collude wth each other to mprove the utlty of the coaltonal group. We use C to denote the bd of s. C = (C 1, C 2,, C M )s the bd matrx of all sellers and C denotes the bd matrx wth s s bd removed. We use b j to denote the bd of w for seller s j s channel. B = (b 1, b2,, bm ) s the bd vector of w. B = (B 1, B 2,, B N ) s the bd matrx of all buyers. Let B denote the bd matrx wth buyer w s bd B excluded. The true valuaton of s for ts channel s V s and the true valuaton of w for seller s j s channel s v j. Vw = (v 1, v2,, vm )sthe valuaton vector of buyer w.ifs j s channel s unavalable to w, v j s zero. The true valuaton of both buyers and sellers may or may not equal to ther bds. In the aucton, the auctoneer determnes the payment P s for seller s and the prce p w that buyer w should pay. P s and p w are not necessarly equal. Therefore, the utlty of the seller s s defned as: { P U s s = V s, f s wns (1) 0, Otherwse Smlarly, the utlty of buyer w s defned as: { u w V θ() = p w, f w wns 0, Otherwse n whch θ() s the channel that w wns. (2) B. Desgn Target Truthfulness, budget balance and system effcency cannot be acheved n any double aucton at the same tme, even wthout the consderaton of ndvdual ratonalty[5][19]. In our scenaro, we need to warrant that spectrum owners have ncentves to lease ther spectrum and also the thrd party (spectrum transacton platform, government) s wllng to partcpate as an auctoneer. Therefore, n ths paper, we set our desgn target as achevng truthfulness, ndvdual ratonalty and budget balance, whch are also selected by many exstng double auctons[9][19]: Truthfulness. Nether buyers nor sellers can get hgher utlty by msreportng ther true valuaton,.e., C j V s j or B V w. Indvdual ratonalty. A wnnng seller s pad more than ts bd and a wnnng buyer pays less than ts bd. Budget balance. The auctoneer s proft s non-negatve. Ths proft equals to the prce pad by the buyers mnus the payment to the sellers. III. Challenges of Heterogeneous Spectrum Aucton Desgn In ths secton, we brefly llustrate the challenges of desgnng a truthful aucton mechansm for heterogeneous spectrum. We wll frst ntroduce the heterogeneous nature of spectrum. Then we show that exstng mechansms are unsuccessful n meetng our desgn targets when drectly appled to heterogeneous spectrum aucton. A. Spatal Heterogenety Spatal heterogenety means that spectrum avalablty vares n dfferent locatons. For example, one TV channel s avalable only f there are no nearby TV statons or wreless mcrophones occupyng the same channel. Tradtonal aucton desgn nvolvng spectrum reusablty usually groups buyers by fndng ndependent sets on ther nterference graphs [8][9], and then set the group bd accordng to the mnmum bd n the group. However, f two buyers wth no common avalable channels are grouped together, the group bd should be 0 for all channels and ths group can never wn n the aucton. B. Frequency Heterogenety Frequency heterogenety means that dfferent frequences have dfferent transmsson ranges. Accordng to the propagaton model recommended by ITU[10], the center frequency of one spectrum band can mpact the path lose between two nodes: L = 10 log f 2 + γ log d + P f (n) 28 (3) where L s the total pass loss n decbel(db), f s the frequency of transmsson n megahertz(mhz), d s the dstance n meter(m), γ s the dstance power loss coeffcent and P f (n) s the floor loss penetraton factor. In our model, the spectrums offered by spectrum owners may consst of a wde range of frequences. For example, n the German spectrum aucton held n 2010, the hghest frequency (2.6GHz) are more than 3077
3 b 1 2 b 2 1 b 2 C1 C2 C3 C b3 b 4 Fg. 1: Buyer b 2 can manpulate ts non-wnnng bd to ncrease the utlty three tmes hgher than the lowest frequency (800MHz)[12]. Ths huge gap leads to non-dentcal nterference relatonshps among spectrum buyers n dfferent channels. However, based on our knowledge, no exstng aucton schemes address nonunform nterference relatonshps among buyers caused by frequency heterogenety. C. Market Manpulaton In double aucton for homogeneous tems, the two wellknown aucton algorthms VCG[2]-[4] and McAfee[11] can both ensure truthfulness. But truthfulness cannot be guaranteed f we drectly apply these algorthms for heterogeneous tems. In the McAfee double aucton, the auctoneer sorts the buyers bds n non-ncreasng order and the sellers bds n non-decreasng order: B 1 B 2 B N and C 1 C 2 C M. Then the auctoneer fnds the largest k such that B k C jk. The McAfee scheme dscard (B k, C jk )whchs the least proftable transacton and set the unform prce for buyers to be B k and the unform payment for sellers to be C jk. In double aucton for heterogeneous tems, although one buyer can wn at most one tem, t can manpulate ts bds to acheve hgher utlty. In Fg. 1, there are four buyers among whch buyer w 2 has two non-zero bds b 2 2 and b1 2. Both the buyers and sellers bds have been sorted accordng to the McAfee mechansm. We can see that the ndex of the least proftable transacton marked by the blue frame s k = 3. So the prce charged for the wnnng group s b 1 2 = 8. If the buyer w 2 lowers ts bd for seller s 1 to make b 1 2 < 8, say b 1 2 = 7, ths msconduct wll not change the results of the aucton, but can contort the prce from 8 to 7. As a result, the utlty of w 2 can be ncreased. Snce the VCG double aucton uses a smlar way to determne wnners and prces, t suffers the same defect. IV. Aucton Desgn: TAHES In ths secton, we propose TAHES, a Truthful double Aucton for HEterogeneous Spectrum. A. Overvew To handle both spectrum heterogenety and spectrum reusablty, we desgn three key steps n TAHES: (1) Buyer Groupng: Spectrum can be reused by non-conflct buyers n dfferent locatons. By non-conflct, we mean when two buyers w and w j are usng the same channel h, they are out of h s nterference range of each other. However, the conflct relatonshps between one par of buyers are non-dentcal n dfferent frequences. In ths step, the auctoneer uses a groupng algorthm consderng non-dentcal nterference graphs to form non-conflct buyer groups so that they can purchase the same channel. Our buyer groupng algorthm s bd-ndependent. The nput of the groupng algorthm s the channel avalablty nformaton of each buyer. Ths knd of nformaton can be calculated accordng to the path loss model gven the locatons of buyers and sellers or can be obtaned from a geo-locaton database[13]. We assume the auctoneer can get such locaton nformaton of buyers and sellers. The bd-ndependent property of the groupng algorthm s crtcal to ensure truthfulness n the aucton[9]. (2) Matchng: After the frst step, each buyer group may stll purchase channels from multple sellers f the buyers n a group have more than one common channel. Whle ndeed, each group can at most wn one channel. We have shown that only one bd n a bd vector should be kept for further wnner determnaton. Otherwse, the aucton can be vulnerable to market manpulaton. Some buyers can strategcally change some of ther bds to lower the group bds so that they can change the prce they need to pay and ncrease ther utlty. In ths matchng step, the auctoneer chooses one conventonal matchng algorthm to match each buyer group to only one buyer based on only the channel avalablty for each group. Therefore, the matchng step s also bd-ndependent. (3) Wnner Determnaton and Prcng: After buyer groupng and matchng, the remanng problem of wnner determnaton and prcng are smlar to that n the McAfee double aucton desgn. We can drectly apply the McAfee s scheme to use the k th par of buyer group and seller to determne the wnners. B. Aucton Procedure TAHES comprses the followng steps: 1) Buyer Groupng: Suppose the set of channels from sellers s H = {h 1, h 2,, h M }. h s communcaton range s R(h ). Wthout loss of generalty, we assume R(h 1 ) R(h 2 ) R(h M ). Let A = {a, j a, j {0, 1} N M }, an N by M matrx, represent the buyers channel avalablty. a, j = 1 means that channel h j s avalable for buyer w.let E = {e, j,k e, j,k {0, 1} M N N }, an M by N by N matrx, represent the conflct relatonshps between buyers n each channel. e, j,k = 1 means that buyers w j and w k are conflct n h. In ths step, the nputs are A and E, whch are both bdndependent. After groupng, we get a set of l (l n) buyer groups denoted as G = {g 1, g 2,, g l } and the canddate channel set for each group denoted as F = { f 1, f 2,, f l }. f contans the channels that g can purchase, whch s assgned by the auctoneer. G and F are the outputs of the groupng algorthm. The groupng algorthm should satsfy the followng constrants: Common Channel Exstence Constrant: There exsts at least one channel that s avalable for all buyers n the same 3078
4 Algorthm 1 Buyer-Groupng(A, E, H) 1: // L represents the set of grouped buyers 2: L =, G =, F = 3: whle L W do 4: for all h H do 5: Canddate buyers to be grouped: Q = 6: for all w j {w k A k, = 1 w k L} do 7: Q = Q w j 8: end for 9: Fnd ndependent set IS on buyer set Q based on E. 10: end for 11: Fnd IS, such that IS s maxmzed 12: g = 13: for all w j IS do 14: g = g w j, L = L w j 15: end for 16: f = 17: for all h j H do 18: f R(h j ) <= R(h ) then 19: f = f h j 20: end f 21: end for 22: G = G g, F = F f 23: end whle 24: return (G, F) group. g, h j, s.t. w k g h j f A k, j = 1 (4) Conflct Free Constrant: Any two buyers n the same group do not mutually nterferng wth each other n any channel n the canddate channel set. w j, w k g, h l f A j,l = A k,l = 1 E l, j,k = 0 (5) The groupng algorthm frst fnds an ndependent set of buyers n each channel. Then t selects one such set wth maxmum group sze and contnues to fnd the next group untl all buyers are classfed nto one group. The groupng procedure s shown n Algorthm 1. In Algorthm 1, we can use any exstng algorthms to fnd ndependent sets, for example, the algorthms descrbed n [14]. From the procedure of Algorthm 1, t s obvous that all buyers n IS have a common avalable channel h. And from lne 16-20, we only consder canddate channel wth smaller or equal communcaton range of h. Therefore, the groupng results G and F also satsfy the Conflct Free Constrant. Theorem 1. The buyer groups and canddate channel sets returned by Algorthm 1 satsfy the Common Channel Exstence Constrant and the Conflct Free Constrant. 2) Matchng: After step 1, we have formed a group set G. Suppose the number of buyers n group g s n and the group bd vector s δ = (δ 1,δ2,,δM ). We follow the dea n [9] Algorthm 2 Buyer-Group-Matchng(G, F, S ) 1: // Let Δ be an G by S matrx representng the weghted adjacent matrx between G and S 2: Δ={0} M N 3: for all g x G, s y S do 4: f δ y x > 0andh y f x then 5: Δ x,y =Δ y,x = g x 6: end f 7: end for 8: (G C, S C,σ) = MATCH(X, Y, Δ) 9: return (G C, S C,σ) and assgned the group bd to be the mnmum bd tmes the group sze as: δ j = mn{b j k w k g } n (6) Here, we can magne each buyer group as one super buyer. In δ, there may be more than one non-zero entres, say δ j 1 and δ j 2. If not well desgned, the aucton may be untruthful, as shown n Secton III-C. Such type of market manpulaton s caused by the multple non-zero group bds. To tackle ths challenge, n TAHES, we apply a channel matchng scheme to match one buyer group to an dentcal seller. We call the results after matchng the canddate wnnng group set G C and canddate wnnng sellers set S C. The matchng procedure s shownnalgorthm2. In ths algorthm, σ records the matchng result. For example, σ(g x ) = s y ndcates that buyer group g x s assgned wth seller s y. MATCH(X, Y, Δ) matches nodes set X to Y wth weghted edges n Δ. It can be any matchng algorthm for bpartte graphs specfed by the auctoneer, for example, maxmum matchng or maxmum weghted matchng. Ths matchng step here s also ndependent of bds of both buyers and sellers. 3) Wnner Determnaton and Prcng: In the wnnerdetermnaton and prcng stage, we can apply the mechansm used n McAfee and drectly use the buyer group-seller par (g k, s jk ) to determne wnners and prce. The detaled algorthm s shown n Algorthm 3. C. Economc propertes Theorem 2. TAHES s ndvdually ratonal. Proof: For each buyer w n wnnng group g k : p w = pw δσ(k) k b σ(k) For each wnnng seller s j : P s j C k P s Theorem 3. TAHES s budget-balanced. = b σ(k) Proof: Accordng to the sortng n the wnner determnaton algorthm, we have p w P s and G W = S W, therefore the budget for the auctoneer s: G W p w S W P s 0 Theorem 4. TAHES s truthful. 3079
5 Algorthm 3 Wnner-Determnaton-and-Prcng(G C, S C,σ) 1: G W =, S W = // The set of wnnng groups and sellers 2: // Sort all buyer groups n G C and sellers n S C 3: Construct X = {g 1, g 2,, g l }, such that δ σ( 1) 1 δ σ( 2) 2 δ σ( l) l 4: Construct Y = {s j1, s j2,, s jm }, such that C j1 C j2 C jm 5: Fnd the largest k, s.t.δ σ( k) 6: f k < 2 then 7: return (G W, S W, 0, 0) 8: end f 9: G W = groups δ 1 to δ k 1 k C jk 10: S W = sellers C j1 to C jk 1 11: // Determne the prce and payment 12: p w = δ σ( k) k, P s = C jk 13: for Any buyer w n g τ() G W do 14: p w = p w /n τ() 15: end for 16: for all Any seller s j S W do 17: P s j = Ps 18: end for 19: return (G W, S W, P S, p w ) Due to lmtaton of space, we do not present the proof n ths paper. V. Related Works Aucton has been extensvely studed n the scope of spectrum allocaton[6]-[9]. However, most exstng works faled to consder spectrums as non-dentcal tems. In [9], Zhou and Zheng frst address spectrum reusablty n ther aucton desgn: TRUST. In [8], the authors also consder spectrum reusablty for buyers, and they assume buyers can have multple rados. The proposed TAHES scheme also consder spectrum reusablty, moreover, TAHES can tackle the case when spectrums are heterogeneous. In [16], an aucton desgn for heterogeneous TV whte space spectrums s proposed. In that paper, the spectrum allocaton problem has been defned as an optmzaton problem where maxmum payoff of the central tradng entty (called spectrum broker) s the optmzaton goal. However, [16] s not a double aucton scheme and ts desgn goal s dfferent from TAHES. Recently, n [19], Yang et. proposed a double aucton desgn for cooperatve communcatons wth heterogeneous relay selectons. However, there s no reusablty n ther scenaro. Dfferent from our sngle-round aucton model, recently, there are also works consderng spectrum aucton n an onlne fashon[15][17]. In an onlne spectrum aucton, buyers may arrve n dfferent tme and they can request the spectrum for a partcular duraton. However, exstng onlne double aucton schemes consder only homogeneous spectrum. VI. Conclusons In ths paper, we have desgned TAHES, a truthful double aucton scheme for heterogeneous spectrums. TAHES allows multple spectrum owners wth avalable spectrums n dfferent locatons and dfferent frequency bands to partcpate n the spectrum leasng to secondary servce provders. TAHES can not only solve unque challenges caused by spectrum heterogenety but also perverse nce economc propertes: Truthfulness, Budget Balance and Indvdual Ratonalty. Acknowledgement Ths research was supported n part by Hong Kong RGC grants , , Huawe-HKUST jont lab, Natonal Natural Scence Foundaton of Chna wth grants no. as , , by a grant from NSFC/RGC under the contract N HKUST610/11, by grants from HKUST under the contract RPC11EG29, SRFI11EG17-C and SBI09/10.EG01- C, by a grant from Huawe Technologes Co. Ltd. under the contract HUAW18-15L /PN, by a grant from Guangdong Bureau of Scence and Technology under the contract GDST11EG06. References [1] Spectrum Brdge, Inc. [2] W. Vckrey, Counterspeculaton, auctons, and compettve sealed tenders, The Journal of Fnance, 16:8-37, [3] E. H. Clarke, Multpart prcng of publc goods, Publc Choce, 11:17-33, [4] T. Groves, Incentves n teams, Econometrca, 41(4):617-31, July [5] R. B. Myerson and M. A. Satterthwate, Effcent mechansms for blateral tradng, Journal of Economc Theory, 29(2): , Aprl [6] X. Zhou, S. Gandh, S. Sur, AND H. Zheng, ebay n the sky: Strategyproof wreless spectrum auctons, n ACM MobCom [7] J. Ja, Q. Zhang, Q. Zhang, and M. Lu, Revenue generaton for truthful spectrum aucton n dynamc spectrum access, n ACM Mobhoc [8] F. Wu and N. Vadya, SMALL: A Strategy-Proof Mechansm for Rado Spectrum Allocaton, n IEEE INFOCOM [9] X. Zhou and H. Zheng, Trust: A general framework for truthful double spectrum auctons, In IEEE INFOCOM [10] Propagaton Data and Predcton Methods for the Plannng of Indoor Radocomm. Systems and Rado Local Area Networks n the Frequency Range 900 MHz to 100 GHz. Recommendaton ITU-R P , [11] R. P. McAfee. A domnant strategy double aucton. Journal of Economc Theory 56, 2 (Aprl 1992), [12] German spectrum aucton ends but prces low, [13] X. Feng, J. Zhang, and Q. Zhang, Database-asssted mult-ap network on TV whte spaces: system archtecture, spectrum allocaton and AP dscovery, n IEEE DySPAN [14] S. Saka, M. Togasak, and K. Yamazak, A note on greedy algorthms for the maxmum weghted ndependent set problem, Dscrete Appled Mathematcs 126 (2003) [15] S. Wang, P. Xu, X. Xu, S. Tang, X. L, and X. Lu, TODA: Truthful Onlne Double Aucton for Spectrum Allocaton n Wreless Networks, n IEEE DySPAN [16] M. Parzy and H. Bogucka, Non-dentcal objects aucton for spectrum sharng n TV whte spaces C the perspectve of servce provders as secondary users, n IEEE DySPAN [17] L. Deek, X. Zhou, K. Almeroth, and H. Zheng, To Preempt or Not: Tacklng Bd and Tme-based Cheatng n Onlne Spectrum Auctons, n IEEE INFOCOM [18] M. Al-Ayyoub adn H. Gupta, Truthful Spectrum Auctons Wth Approxmate Revenue, n IEEE INFOCOM [19] D. Yang, X. Fang, and G. Xue, Truthful Aucton for Cooperatve Communcatons, n ACM Mobhc
SPECTRUM is a valuable resource for wireless communication
4038 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 11, NO. 11, NOVEMBER 2012 TAHES: A Truthful Double Aucton Mechansm for Heterogeneous Spectrums Xaojun Feng, Student Member, IEEE, Yanjao Chen, Student
More informationVickrey Auction VCG Combinatorial Auctions. Mechanism Design. Algorithms and Data Structures. Winter 2016
Mechansm Desgn Algorthms and Data Structures Wnter 2016 1 / 39 Vckrey Aucton Vckrey-Clarke-Groves Mechansms Sngle-Mnded Combnatoral Auctons 2 / 39 Mechansm Desgn (wth Money) Set A of outcomes to choose
More informationPricing Network Services by Jun Shu, Pravin Varaiya
Prcng Network Servces by Jun Shu, Pravn Varaya Presented by Hayden So September 25, 2003 Introducton: Two Network Problems Engneerng: A game theoretcal sound congeston control mechansm that s ncentve compatble
More informationResource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud
Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal
More informationCOMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
More informationProblem Set 9 Solutions
Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem
More informationECE559VV Project Report
ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate
More informationWinter 2008 CS567 Stochastic Linear/Integer Programming Guest Lecturer: Xu, Huan
Wnter 2008 CS567 Stochastc Lnear/Integer Programmng Guest Lecturer: Xu, Huan Class 2: More Modelng Examples 1 Capacty Expanson Capacty expanson models optmal choces of the tmng and levels of nvestments
More informationAn Admission Control Algorithm in Cloud Computing Systems
An Admsson Control Algorthm n Cloud Computng Systems Authors: Frank Yeong-Sung Ln Department of Informaton Management Natonal Tawan Unversty Tape, Tawan, R.O.C. ysln@m.ntu.edu.tw Yngje Lan Management Scence
More informationA Distributed Spectrum Sharing Algorithm in Cognitive Radio Networks
A Dstrbuted Spectrum Sharng Algorthm n Cogntve Rado Networks We Sun, Tong Lu, Yanmn Zhu, Bo L Shangha Jao Tong Unversty Hong Kong Unversty of Scence and Technology Emal: {sunwt,lutong2569164,yzhu}@sjtu.edu.cn,
More informationModule 17: Mechanism Design & Optimal Auctions
Module 7: Mechansm Desgn & Optmal Auctons Informaton Economcs (Ec 55) George Georgads Examples: Auctons Blateral trade Producton and dstrbuton n socety General Setup N agents Each agent has prvate nformaton
More informationAssortment Optimization under MNL
Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationCOS 521: Advanced Algorithms Game Theory and Linear Programming
COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton
More informationGrover s Algorithm + Quantum Zeno Effect + Vaidman
Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the
More informationCredit Card Pricing and Impact of Adverse Selection
Credt Card Prcng and Impact of Adverse Selecton Bo Huang and Lyn C. Thomas Unversty of Southampton Contents Background Aucton model of credt card solctaton - Errors n probablty of beng Good - Errors n
More informationPricing and Resource Allocation Game Theoretic Models
Prcng and Resource Allocaton Game Theoretc Models Zhy Huang Changbn Lu Q Zhang Computer and Informaton Scence December 8, 2009 Z. Huang, C. Lu, and Q. Zhang (CIS) Game Theoretc Models December 8, 2009
More informationHila Etzion. Min-Seok Pang
RESERCH RTICLE COPLEENTRY ONLINE SERVICES IN COPETITIVE RKETS: INTINING PROFITILITY IN THE PRESENCE OF NETWORK EFFECTS Hla Etzon Department of Technology and Operatons, Stephen. Ross School of usness,
More informationMaximizing the number of nonnegative subsets
Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum
More informationGame Theory Course: Jackson, Leyton-Brown & Shoham. Vickrey-Clarke-Groves Mechanisms: Definitions
Vckrey-Clarke-Groves Mechansms: Defntons Game Theory Course: Jackson, Leyton-Brown & Shoham A postve result Recall that n the quaslnear utlty settng, a drect mechansm conssts of a choce rule and a payment
More informationKernel Methods and SVMs Extension
Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general
More informationLecture 4: November 17, Part 1 Single Buffer Management
Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input
More informationGames of Threats. Elon Kohlberg Abraham Neyman. Working Paper
Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017
More informationLecture Notes on Linear Regression
Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume
More informationCSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography
CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve
More informationEconomics 101. Lecture 4 - Equilibrium and Efficiency
Economcs 0 Lecture 4 - Equlbrum and Effcency Intro As dscussed n the prevous lecture, we wll now move from an envronment where we looed at consumers mang decsons n solaton to analyzng economes full of
More informationChapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems
Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons
More informationThe Second Anti-Mathima on Game Theory
The Second Ant-Mathma on Game Theory Ath. Kehagas December 1 2006 1 Introducton In ths note we wll examne the noton of game equlbrum for three types of games 1. 2-player 2-acton zero-sum games 2. 2-player
More informationModule 9. Lecture 6. Duality in Assignment Problems
Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept
More informationLecture 14: Bandits with Budget Constraints
IEOR 8100-001: Learnng and Optmzaton for Sequental Decson Makng 03/07/16 Lecture 14: andts wth udget Constrants Instructor: Shpra Agrawal Scrbed by: Zhpeng Lu 1 Problem defnton In the regular Mult-armed
More informationComparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method
Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method
More informationCS286r Assign One. Answer Key
CS286r Assgn One Answer Key 1 Game theory 1.1 1.1.1 Let off-equlbrum strateges also be that people contnue to play n Nash equlbrum. Devatng from any Nash equlbrum s a weakly domnated strategy. That s,
More informationReal-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling
Real-Tme Systems Multprocessor schedulng Specfcaton Implementaton Verfcaton Multprocessor schedulng -- -- Global schedulng How are tasks assgned to processors? Statc assgnment The processor(s) used for
More informationSimultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals
Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,
More informationNotes on Frequency Estimation in Data Streams
Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to
More informationAnalysis of Queuing Delay in Multimedia Gateway Call Routing
Analyss of Queung Delay n Multmeda ateway Call Routng Qwe Huang UTtarcom Inc, 33 Wood Ave. outh Iseln, NJ 08830, U..A Errol Lloyd Computer Informaton cences Department, Unv. of Delaware, Newark, DE 976,
More informationThe Study of Teaching-learning-based Optimization Algorithm
Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute
More informationMarket structure and Innovation
Market structure and Innovaton Ths presentaton s based on the paper Market structure and Innovaton authored by Glenn C. Loury, publshed n The Quarterly Journal of Economcs, Vol. 93, No.3 ( Aug 1979) I.
More informationExternalities in wireless communication: A public goods solution approach to power allocation. by Shrutivandana Sharma
Externaltes n wreless communcaton: A publc goods soluton approach to power allocaton by Shrutvandana Sharma SI 786 Tuesday, Feb 2, 2006 Outlne Externaltes: Introducton Plannng wth externaltes Power allocaton:
More informationA new construction of 3-separable matrices via an improved decoding of Macula s construction
Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula
More informationRevenue Maximization in a Spectrum Auction for Dynamic Spectrum Access
Revenue Maxmzaton n a Spectrum Aucton for Dynamc Spectrum Access Al Kakhbod, Ashutosh Nayyar and Demosthens Teneketzs Department of Electrcal Engneerng and Computer Scence Unversty of Mchgan, Ann Arbor,
More informationStructure and Drive Paul A. Jensen Copyright July 20, 2003
Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.
More informationAn Upper Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control
An Upper Bound on SINR Threshold for Call Admsson Control n Multple-Class CDMA Systems wth Imperfect ower-control Mahmoud El-Sayes MacDonald, Dettwler and Assocates td. (MDA) Toronto, Canada melsayes@hotmal.com
More informationIncremental Mechanism Design
Incremental Mechansm Desgn Vncent Contzer Duke Unversty Department of Computer Scence contzer@cs.duke.edu Abstract Mechansm desgn has tradtonally focused almost exclusvely on the desgn of truthful mechansms.
More informationNUMERICAL DIFFERENTIATION
NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the
More informationChapter - 2. Distribution System Power Flow Analysis
Chapter - 2 Dstrbuton System Power Flow Analyss CHAPTER - 2 Radal Dstrbuton System Load Flow 2.1 Introducton Load flow s an mportant tool [66] for analyzng electrcal power system network performance. Load
More informationVickrey Auctions with Reserve Pricing
Vckrey Auctons wth Reserve Prcng Lawrence M. Ausubel and Peter Cramton Unversty of Maryland 28 June 1999 Prelmnary and Incomplete Abstract We generalze the Vckrey aucton to allow for reserve prcng n a
More informationREAL-TIME DETERMINATION OF INDOOR CONTAMINANT SOURCE LOCATION AND STRENGTH, PART II: WITH TWO SENSORS. Beijing , China,
REAL-TIME DETERMIATIO OF IDOOR COTAMIAT SOURCE LOCATIO AD STREGTH, PART II: WITH TWO SESORS Hao Ca,, Xantng L, Wedng Long 3 Department of Buldng Scence, School of Archtecture, Tsnghua Unversty Bejng 84,
More informationTruthful Spectrum Auction Design for Secondary Networks
Truthful Spectrum Aucton Desgn for Secondary Networks Yuefe Zhu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto Zongpeng L Department of Computer Scence Unversty of Calgary
More informationPop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing
Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,
More informationEEL 6266 Power System Operation and Control. Chapter 3 Economic Dispatch Using Dynamic Programming
EEL 6266 Power System Operaton and Control Chapter 3 Economc Dspatch Usng Dynamc Programmng Pecewse Lnear Cost Functons Common practce many utltes prefer to represent ther generator cost functons as sngle-
More informationCopyright (C) 2008 David K. Levine This document is an open textbook; you can redistribute it and/or modify it under the terms of the Creative
Copyrght (C) 008 Davd K. Levne Ths document s an open textbook; you can redstrbute t and/or modfy t under the terms of the Creatve Commons Attrbuton Lcense. Compettve Equlbrum wth Pure Exchange n traders
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More informationRemarks on the Properties of a Quasi-Fibonacci-like Polynomial Sequence
Remarks on the Propertes of a Quas-Fbonacc-lke Polynomal Sequence Brce Merwne LIU Brooklyn Ilan Wenschelbaum Wesleyan Unversty Abstract Consder the Quas-Fbonacc-lke Polynomal Sequence gven by F 0 = 1,
More information(1 ) (1 ) 0 (1 ) (1 ) 0
Appendx A Appendx A contans proofs for resubmsson "Contractng Informaton Securty n the Presence of Double oral Hazard" Proof of Lemma 1: Assume that, to the contrary, BS efforts are achevable under a blateral
More informationDUE: WEDS FEB 21ST 2018
HOMEWORK # 1: FINITE DIFFERENCES IN ONE DIMENSION DUE: WEDS FEB 21ST 2018 1. Theory Beam bendng s a classcal engneerng analyss. The tradtonal soluton technque makes smplfyng assumptons such as a constant
More informationA Strategy-Proof Online Auction with Time Discounting Values
A Strategy-Proof Onlne Aucton wth Tme Dscountng Values Fan Wu, Junmng Lu, Zhenzhe Zheng, and Guha Chen Shangha Key Laboratory of Scalable Computng and Systems Shangha Jao Tong Unversty, Chna {wu-fan, lu-jm,
More informationThe L(2, 1)-Labeling on -Product of Graphs
Annals of Pure and Appled Mathematcs Vol 0, No, 05, 9-39 ISSN: 79-087X (P, 79-0888(onlne Publshed on 7 Aprl 05 wwwresearchmathscorg Annals of The L(, -Labelng on -Product of Graphs P Pradhan and Kamesh
More informationPerfect Competition and the Nash Bargaining Solution
Perfect Competton and the Nash Barganng Soluton Renhard John Department of Economcs Unversty of Bonn Adenauerallee 24-42 53113 Bonn, Germany emal: rohn@un-bonn.de May 2005 Abstract For a lnear exchange
More informationA Robust Method for Calculating the Correlation Coefficient
A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal
More informationDesign and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm
Desgn and Optmzaton of Fuzzy Controller for Inverse Pendulum System Usng Genetc Algorthm H. Mehraban A. Ashoor Unversty of Tehran Unversty of Tehran h.mehraban@ece.ut.ac.r a.ashoor@ece.ut.ac.r Abstract:
More informationLINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity
LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have
More informationEquilibrium with Complete Markets. Instructor: Dmytro Hryshko
Equlbrum wth Complete Markets Instructor: Dmytro Hryshko 1 / 33 Readngs Ljungqvst and Sargent. Recursve Macroeconomc Theory. MIT Press. Chapter 8. 2 / 33 Equlbrum n pure exchange, nfnte horzon economes,
More informationSupporting Information
Supportng Informaton The neural network f n Eq. 1 s gven by: f x l = ReLU W atom x l + b atom, 2 where ReLU s the element-wse rectfed lnear unt, 21.e., ReLUx = max0, x, W atom R d d s the weght matrx to
More informationPower law and dimension of the maximum value for belief distribution with the max Deng entropy
Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng
More informationLecture 10: May 6, 2013
TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,
More informationComplete subgraphs in multipartite graphs
Complete subgraphs n multpartte graphs FLORIAN PFENDER Unverstät Rostock, Insttut für Mathematk D-18057 Rostock, Germany Floran.Pfender@un-rostock.de Abstract Turán s Theorem states that every graph G
More informationAn Interactive Optimisation Tool for Allocation Problems
An Interactve Optmsaton ool for Allocaton Problems Fredr Bonäs, Joam Westerlund and apo Westerlund Process Desgn Laboratory, Faculty of echnology, Åbo Aadem Unversty, uru 20500, Fnland hs paper presents
More informationSmooth Games, Price of Anarchy and Composability of Auctions - a Quick Tutorial
Smooth Games, Prce of Anarchy and Composablty of Auctons - a Quck Tutoral Abhshek Snha Laboratory for Informaton and Decson Systems, Massachusetts Insttute of Technology, Cambrdge, MA 02139 Emal: snhaa@mt.edu
More informationChapter 13: Multiple Regression
Chapter 13: Multple Regresson 13.1 Developng the multple-regresson Model The general model can be descrbed as: It smplfes for two ndependent varables: The sample ft parameter b 0, b 1, and b are used to
More informationOn the Repeating Group Finding Problem
The 9th Workshop on Combnatoral Mathematcs and Computaton Theory On the Repeatng Group Fndng Problem Bo-Ren Kung, Wen-Hsen Chen, R.C.T Lee Graduate Insttute of Informaton Technology and Management Takmng
More informationSupplier Learning in Repeated Online Procurement Auctions
Suppler earnng n Repeated Onlne Procurement Auctons Vvan Zhong D.J. Wu College of Management, Georga Insttute of Technology Extended Abstract Submtted to WISE 2006. Introducton Repetton s the key aspect
More informationIntegrated approach in solving parallel machine scheduling and location (ScheLoc) problem
Internatonal Journal of Industral Engneerng Computatons 7 (2016) 573 584 Contents lsts avalable at GrowngScence Internatonal Journal of Industral Engneerng Computatons homepage: www.growngscence.com/ec
More informationA New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane
A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,
More informationGeneralized Linear Methods
Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set
More information829. An adaptive method for inertia force identification in cantilever under moving mass
89. An adaptve method for nerta force dentfcaton n cantlever under movng mass Qang Chen 1, Mnzhuo Wang, Hao Yan 3, Haonan Ye 4, Guola Yang 5 1,, 3, 4 Department of Control and System Engneerng, Nanng Unversty,
More informationA Lower Bound on the Competitive Ratio of Truthful Auctions
A Lower Bound on the Compettve Rato of Truthful Auctons Andrew V Goldberg 1, Jason D Hartlne 1, Anna R Karln 2, and Mchael Saks 3 1 Mcrosoft Research, SVC/5, 1065 La Avenda, Mountan Vew, CA 94043 {goldberg,hartlne}@mcrosoftcom
More informationDepartment of Quantitative Methods & Information Systems. Time Series and Their Components QMIS 320. Chapter 6
Department of Quanttatve Methods & Informaton Systems Tme Seres and Ther Components QMIS 30 Chapter 6 Fall 00 Dr. Mohammad Zanal These sldes were modfed from ther orgnal source for educatonal purpose only.
More informationA FAST HEURISTIC FOR TASKS ASSIGNMENT IN MANYCORE SYSTEMS WITH VOLTAGE-FREQUENCY ISLANDS
Shervn Haamn A FAST HEURISTIC FOR TASKS ASSIGNMENT IN MANYCORE SYSTEMS WITH VOLTAGE-FREQUENCY ISLANDS INTRODUCTION Increasng computatons n applcatons has led to faster processng. o Use more cores n a chp
More informationAmiri s Supply Chain Model. System Engineering b Department of Mathematics and Statistics c Odette School of Business
Amr s Supply Chan Model by S. Ashtab a,, R.J. Caron b E. Selvarajah c a Department of Industral Manufacturng System Engneerng b Department of Mathematcs Statstcs c Odette School of Busness Unversty of
More informationThe Minimum Universal Cost Flow in an Infeasible Flow Network
Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran
More informationEstimation: Part 2. Chapter GREG estimation
Chapter 9 Estmaton: Part 2 9. GREG estmaton In Chapter 8, we have seen that the regresson estmator s an effcent estmator when there s a lnear relatonshp between y and x. In ths chapter, we generalzed the
More informationCS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016
CS 29-128: Algorthms and Uncertanty Lecture 17 Date: October 26, 2016 Instructor: Nkhl Bansal Scrbe: Mchael Denns 1 Introducton In ths lecture we wll be lookng nto the secretary problem, and an nterestng
More informationQueueing Networks II Network Performance
Queueng Networks II Network Performance Davd Tpper Assocate Professor Graduate Telecommuncatons and Networkng Program Unversty of Pttsburgh Sldes 6 Networks of Queues Many communcaton systems must be modeled
More informationSTAT 511 FINAL EXAM NAME Spring 2001
STAT 5 FINAL EXAM NAME Sprng Instructons: Ths s a closed book exam. No notes or books are allowed. ou may use a calculator but you are not allowed to store notes or formulas n the calculator. Please wrte
More informationEfficiency of (Revenue-)Optimal Mechanisms
Effcency of Revenue-Optmal Mechansms Gagan Aggarwal Google Inc. Mountan Vew, CA gagana@google.com Gagan Goel Georga Tech Atlanta, GA gagan@gatech.edu Aranyak Mehta Google Inc. Mountan Vew, CA aranyak@google.com
More informationErrors for Linear Systems
Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch
More information5 The Rational Canonical Form
5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces
More informationIntroduction to Vapor/Liquid Equilibrium, part 2. Raoult s Law:
CE304, Sprng 2004 Lecture 4 Introducton to Vapor/Lqud Equlbrum, part 2 Raoult s Law: The smplest model that allows us do VLE calculatons s obtaned when we assume that the vapor phase s an deal gas, and
More information= z 20 z n. (k 20) + 4 z k = 4
Problem Set #7 solutons 7.2.. (a Fnd the coeffcent of z k n (z + z 5 + z 6 + z 7 + 5, k 20. We use the known seres expanson ( n+l ( z l l z n below: (z + z 5 + z 6 + z 7 + 5 (z 5 ( + z + z 2 + z + 5 5
More informationRevenue in Resource Allocation Games and Applications
Revenue n Resource Allocaton Games and Applcatons by Thanh Ten Nguyen Ths thess/dssertaton document has been electroncally approved by the followng ndvduals: Tardos,Eva (Charperson) Kozen,Dexter Campbell
More informationThis column is a continuation of our previous column
Comparson of Goodness of Ft Statstcs for Lnear Regresson, Part II The authors contnue ther dscusson of the correlaton coeffcent n developng a calbraton for quanttatve analyss. Jerome Workman Jr. and Howard
More informationJoint Scheduling and Power-Allocation for Interference Management in Wireless Networks
Jont Schedulng and Power-Allocaton for Interference Management n Wreless Networks Xn Lu *, Edwn K. P. Chong, and Ness B. Shroff * * School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette,
More information2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification
E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton
More informationFinding Dense Subgraphs in G(n, 1/2)
Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng
More informationSemi-supervised Classification with Active Query Selection
Sem-supervsed Classfcaton wth Actve Query Selecton Jao Wang and Swe Luo School of Computer and Informaton Technology, Beng Jaotong Unversty, Beng 00044, Chna Wangjao088@63.com Abstract. Labeled samples
More informationSpeeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem
H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence
More informationMixed Taxation and Production Efficiency
Floran Scheuer 2/23/2016 Mxed Taxaton and Producton Effcency 1 Overvew 1. Unform commodty taxaton under non-lnear ncome taxaton Atknson-Stgltz (JPubE 1976) Theorem Applcaton to captal taxaton 2. Unform
More informationA Lower Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control
A ower Bound on SIR Threshold for Call Admsson Control n Multple-Class CDMA Systems w Imperfect ower-control Mohamed H. Ahmed Faculty of Engneerng and Appled Scence Memoral Unversty of ewfoundland St.
More informationEnergy Efficiency in Colocation Data Centers: A Joint Incentive Mechanism Approach
Energy Effcency n Colocaton Data Centers: A Jont Incentve Mechansm Approach Yoush Wang, Fa Zhang, Shaole Ren, Fangmng Lu, Ru Wang, and Zhyong Lu Unversty of Chnese Academy of Scences, Chna Bejng Key Laboratory
More information