TAHES: Truthful Double Auction for Heterogeneous Spectrums

Size: px
Start display at page:

Download "TAHES: Truthful Double Auction for Heterogeneous Spectrums"

Transcription

1 The 31st Annual IEEE Internatonal Conference on Computer Communcatons: Mn-Conference TAHES: Truthful Double Aucton for Heterogeneous Spectrums Xaojun Feng, Yanjao Chen, Jn Zhang, Qan Zhang, and Bo L Department of Computer Scence and Engneerng, Hong Kong Unversty of Scence and Technology, Hong Kong {xfeng, chenyanjao, jnzh, qanzh, bl}@cse.ust.hk Abstract Aucton s wdely appled n wreless communcaton for spectrum allocaton. Most of pror works have assumed that spectrums are dentcal. In realty, however, spectrums provded by dfferent owners have dstnctve characterstcs n both spacal and frequency domans. Spectrum avalablty also vares n dfferent geo-locatons. Furthermore, frequency dversty may cause non-dentcal conflcts among spectrum buyers snce dfferent frequences have dstnct communcaton ranges. Under such realstc scenaro, exstng spectrum aucton schemes cannot provde truthfulness or effcency. In ths paper, we propose a Truthful double Aucton for HEterogeneous Spectrum, called TAHES. TAHES allows buyers to explctly express ther personalzed preferences for heterogeneous spectrums and also addresses the problem of nterference graph varaton. We prove that TAHES has nce economc propertes ncludng truthfulness, ndvdual ratonalty and budget balance. I. Introducton Spectrum s valuable resource for wreless communcaton. Measurement results have shown that spectrum utlzaton s hghly dynamc n dfferent geo-locatons[13]. In some places, spectrums may be under-utlzed and are usually referred to as whte spaces. More effcent utlzaton of whte spaces of dfferent frequences s consdered as a potental soluton for the next generaton of wreless networkng. A promsng way to better utlze whte spaces s to enable spectrum owners to lease ther spectrums to secondary servce provders n the geo-locatons where the prmary users wll not be nterfered. In return, the spectrum owners can get pad from secondary servce provders. Company such as SpectrumBrdge[1] has already launched an onlne platform called SpecEx for spectrum owners to sell ther unused spectrums to potental buyers. In such a new busness model, spectrums from multple sellers resde n dfferent frequency bands and have varous avalablty n dfferent locatons. Also, spectrum buyers may express dfferent preferences for dfferent spectrums. Another nterestng aspect n ths scenaro s the reusablty of spectrum. Two buyers that are far enough from each other may reuse the same spectrum concurrently. The problem of spectrum redstrbuton between multple spectrum owners and multple secondary servce provders can be modeled as a sngle round mult-tem double aucton. In our case, the spectrum owners are sellers; secondary servce provders are buyers; spectrums are goods; and the auctoneer can be a thrd party provdng the aucton platform such as SpectrumBrdge or regulators such as FCC. Although aucton has been wdely appled to spectrum allocaton n wreless communcaton, exstng double aucton schemes[6]-[9] cannot be drectly appled to our scenaro. There are three major challenges n our problem. The frst challenge s the spatal heterogenety of spectrum. Spectrums offered by dfferent spectrum owners are avalable to dfferent buyers. However, exstng works[6]-[9] consder only the scenaro where all spectrums are avalable to all buyers. The second challenge comes together wth frequency heterogenety and spectrum reusablty. The spectrums may resde n varous frequency bands. Lower-frequency bands have larger nterference ranges than hgher-frequency bands do. In ths case, dfferent buyers may have dfferent nterference relatonshps n dfferent frequences. Nevertheless, exstng works consderng spectrum reusablty[8][9] usually assume the same conflct relatonshp among all buyers throughout all frequences. The thrd challenge comes from the aucton mechansm desgn. A well desgned aucton scheme should preserve the most crtcal property: Truthfulness (or strategyproofness). A truthful aucton nctes all bdders to voluntarly reveal ther true valuaton for the tems they are bddng. The auctoned tems are fnally assgned to bdders who value t the most. Unfortunately, wth heterogenous tems, the truthfulness cannot be guaranteed when smply applyng exstng schemes. In ths paper, we propose TAHES, a Truthful double Aucton scheme for HEterogeneous Spectrum, to address the above-mentoned challenges. TAHES groups spectrum buyers consderng ther non-dentcal conflct relatonshps n heterogeneous spectrums to explore spectrum reusablty. To guarantee truthfulness, TAHES employs a matchng procedure between buyer groups and sellers. In summary, the man contrbutons of the paper are as follows: To the best of our knowledge, TAHES s the frst double aucton mechansm for heterogeneous spectrum transacton, allowng buyers to express dversfed preferences for spectrums of dfference frequences. TAHES mproves spectrum utlzaton by takng nto consderaton of the spectrum reusablty. As far as we know, TAHES s the frst aucton mechansm that can deal wth the problem of nterference graph varaton caused by spectrum frequency heterogenety. TAHES ensures that bddng truthfully s the domnant strategy for all bdders. Despte ths, TAHES also con /12/$ IEEE 3076

2 forms wth ndvdual ratonalty and budget balance. The rest of the paper s organzed as follows. Secton II presents the aucton model of heterogeneous spectrum tradng and then sets the desgn objectves for the proposed aucton mechansm. In secton III, challenges n heterogeneous aucton desgn are further explaned. We gve detaled descrpton of TAHES n secton IV. We brefly dscuss related works n SectonVandsummarzethewholeworknSectonVI. II. Model Descrpton and Desgn Targets In ths secton, we frst formulate the problem of heterogeneous spectrum exchange between spectrum owners and servce provders as a double aucton. Then, we overvew deal economc propertes of an aucton mechansm and state our aucton desgn target. A. Problem Formulaton We consder the scenaro where N secondary servce provders need to purchase spectrum resource from M spectrum owners. A sngle-round double aucton conssts of M seller and N buyers s held to serve ths purpose. Let S = {s 1, s 2,, s M } denotes the set of sellers and W = {w 1, w 2,, w N } denotes the set of buyers. A thrd-party acts as the auctoneer and decdes the wnnng bdders and the payment. Each seller contrbutes one dstnct channel. Each buyer would lke to purchase one channel, but they have dfferent valuatons for the channels. Therefore, the buyers bds are channel specfc. We assume that the aucton s sealedbd, prvate and colluson-free. In other words, n the aucton, all bdders smultaneously submt sealed bds so that no bdder knows the bd of any other partcpants. In addton, bdders do not collude wth each other to mprove the utlty of the coaltonal group. We use C to denote the bd of s. C = (C 1, C 2,, C M )s the bd matrx of all sellers and C denotes the bd matrx wth s s bd removed. We use b j to denote the bd of w for seller s j s channel. B = (b 1, b2,, bm ) s the bd vector of w. B = (B 1, B 2,, B N ) s the bd matrx of all buyers. Let B denote the bd matrx wth buyer w s bd B excluded. The true valuaton of s for ts channel s V s and the true valuaton of w for seller s j s channel s v j. Vw = (v 1, v2,, vm )sthe valuaton vector of buyer w.ifs j s channel s unavalable to w, v j s zero. The true valuaton of both buyers and sellers may or may not equal to ther bds. In the aucton, the auctoneer determnes the payment P s for seller s and the prce p w that buyer w should pay. P s and p w are not necessarly equal. Therefore, the utlty of the seller s s defned as: { P U s s = V s, f s wns (1) 0, Otherwse Smlarly, the utlty of buyer w s defned as: { u w V θ() = p w, f w wns 0, Otherwse n whch θ() s the channel that w wns. (2) B. Desgn Target Truthfulness, budget balance and system effcency cannot be acheved n any double aucton at the same tme, even wthout the consderaton of ndvdual ratonalty[5][19]. In our scenaro, we need to warrant that spectrum owners have ncentves to lease ther spectrum and also the thrd party (spectrum transacton platform, government) s wllng to partcpate as an auctoneer. Therefore, n ths paper, we set our desgn target as achevng truthfulness, ndvdual ratonalty and budget balance, whch are also selected by many exstng double auctons[9][19]: Truthfulness. Nether buyers nor sellers can get hgher utlty by msreportng ther true valuaton,.e., C j V s j or B V w. Indvdual ratonalty. A wnnng seller s pad more than ts bd and a wnnng buyer pays less than ts bd. Budget balance. The auctoneer s proft s non-negatve. Ths proft equals to the prce pad by the buyers mnus the payment to the sellers. III. Challenges of Heterogeneous Spectrum Aucton Desgn In ths secton, we brefly llustrate the challenges of desgnng a truthful aucton mechansm for heterogeneous spectrum. We wll frst ntroduce the heterogeneous nature of spectrum. Then we show that exstng mechansms are unsuccessful n meetng our desgn targets when drectly appled to heterogeneous spectrum aucton. A. Spatal Heterogenety Spatal heterogenety means that spectrum avalablty vares n dfferent locatons. For example, one TV channel s avalable only f there are no nearby TV statons or wreless mcrophones occupyng the same channel. Tradtonal aucton desgn nvolvng spectrum reusablty usually groups buyers by fndng ndependent sets on ther nterference graphs [8][9], and then set the group bd accordng to the mnmum bd n the group. However, f two buyers wth no common avalable channels are grouped together, the group bd should be 0 for all channels and ths group can never wn n the aucton. B. Frequency Heterogenety Frequency heterogenety means that dfferent frequences have dfferent transmsson ranges. Accordng to the propagaton model recommended by ITU[10], the center frequency of one spectrum band can mpact the path lose between two nodes: L = 10 log f 2 + γ log d + P f (n) 28 (3) where L s the total pass loss n decbel(db), f s the frequency of transmsson n megahertz(mhz), d s the dstance n meter(m), γ s the dstance power loss coeffcent and P f (n) s the floor loss penetraton factor. In our model, the spectrums offered by spectrum owners may consst of a wde range of frequences. For example, n the German spectrum aucton held n 2010, the hghest frequency (2.6GHz) are more than 3077

3 b 1 2 b 2 1 b 2 C1 C2 C3 C b3 b 4 Fg. 1: Buyer b 2 can manpulate ts non-wnnng bd to ncrease the utlty three tmes hgher than the lowest frequency (800MHz)[12]. Ths huge gap leads to non-dentcal nterference relatonshps among spectrum buyers n dfferent channels. However, based on our knowledge, no exstng aucton schemes address nonunform nterference relatonshps among buyers caused by frequency heterogenety. C. Market Manpulaton In double aucton for homogeneous tems, the two wellknown aucton algorthms VCG[2]-[4] and McAfee[11] can both ensure truthfulness. But truthfulness cannot be guaranteed f we drectly apply these algorthms for heterogeneous tems. In the McAfee double aucton, the auctoneer sorts the buyers bds n non-ncreasng order and the sellers bds n non-decreasng order: B 1 B 2 B N and C 1 C 2 C M. Then the auctoneer fnds the largest k such that B k C jk. The McAfee scheme dscard (B k, C jk )whchs the least proftable transacton and set the unform prce for buyers to be B k and the unform payment for sellers to be C jk. In double aucton for heterogeneous tems, although one buyer can wn at most one tem, t can manpulate ts bds to acheve hgher utlty. In Fg. 1, there are four buyers among whch buyer w 2 has two non-zero bds b 2 2 and b1 2. Both the buyers and sellers bds have been sorted accordng to the McAfee mechansm. We can see that the ndex of the least proftable transacton marked by the blue frame s k = 3. So the prce charged for the wnnng group s b 1 2 = 8. If the buyer w 2 lowers ts bd for seller s 1 to make b 1 2 < 8, say b 1 2 = 7, ths msconduct wll not change the results of the aucton, but can contort the prce from 8 to 7. As a result, the utlty of w 2 can be ncreased. Snce the VCG double aucton uses a smlar way to determne wnners and prces, t suffers the same defect. IV. Aucton Desgn: TAHES In ths secton, we propose TAHES, a Truthful double Aucton for HEterogeneous Spectrum. A. Overvew To handle both spectrum heterogenety and spectrum reusablty, we desgn three key steps n TAHES: (1) Buyer Groupng: Spectrum can be reused by non-conflct buyers n dfferent locatons. By non-conflct, we mean when two buyers w and w j are usng the same channel h, they are out of h s nterference range of each other. However, the conflct relatonshps between one par of buyers are non-dentcal n dfferent frequences. In ths step, the auctoneer uses a groupng algorthm consderng non-dentcal nterference graphs to form non-conflct buyer groups so that they can purchase the same channel. Our buyer groupng algorthm s bd-ndependent. The nput of the groupng algorthm s the channel avalablty nformaton of each buyer. Ths knd of nformaton can be calculated accordng to the path loss model gven the locatons of buyers and sellers or can be obtaned from a geo-locaton database[13]. We assume the auctoneer can get such locaton nformaton of buyers and sellers. The bd-ndependent property of the groupng algorthm s crtcal to ensure truthfulness n the aucton[9]. (2) Matchng: After the frst step, each buyer group may stll purchase channels from multple sellers f the buyers n a group have more than one common channel. Whle ndeed, each group can at most wn one channel. We have shown that only one bd n a bd vector should be kept for further wnner determnaton. Otherwse, the aucton can be vulnerable to market manpulaton. Some buyers can strategcally change some of ther bds to lower the group bds so that they can change the prce they need to pay and ncrease ther utlty. In ths matchng step, the auctoneer chooses one conventonal matchng algorthm to match each buyer group to only one buyer based on only the channel avalablty for each group. Therefore, the matchng step s also bd-ndependent. (3) Wnner Determnaton and Prcng: After buyer groupng and matchng, the remanng problem of wnner determnaton and prcng are smlar to that n the McAfee double aucton desgn. We can drectly apply the McAfee s scheme to use the k th par of buyer group and seller to determne the wnners. B. Aucton Procedure TAHES comprses the followng steps: 1) Buyer Groupng: Suppose the set of channels from sellers s H = {h 1, h 2,, h M }. h s communcaton range s R(h ). Wthout loss of generalty, we assume R(h 1 ) R(h 2 ) R(h M ). Let A = {a, j a, j {0, 1} N M }, an N by M matrx, represent the buyers channel avalablty. a, j = 1 means that channel h j s avalable for buyer w.let E = {e, j,k e, j,k {0, 1} M N N }, an M by N by N matrx, represent the conflct relatonshps between buyers n each channel. e, j,k = 1 means that buyers w j and w k are conflct n h. In ths step, the nputs are A and E, whch are both bdndependent. After groupng, we get a set of l (l n) buyer groups denoted as G = {g 1, g 2,, g l } and the canddate channel set for each group denoted as F = { f 1, f 2,, f l }. f contans the channels that g can purchase, whch s assgned by the auctoneer. G and F are the outputs of the groupng algorthm. The groupng algorthm should satsfy the followng constrants: Common Channel Exstence Constrant: There exsts at least one channel that s avalable for all buyers n the same 3078

4 Algorthm 1 Buyer-Groupng(A, E, H) 1: // L represents the set of grouped buyers 2: L =, G =, F = 3: whle L W do 4: for all h H do 5: Canddate buyers to be grouped: Q = 6: for all w j {w k A k, = 1 w k L} do 7: Q = Q w j 8: end for 9: Fnd ndependent set IS on buyer set Q based on E. 10: end for 11: Fnd IS, such that IS s maxmzed 12: g = 13: for all w j IS do 14: g = g w j, L = L w j 15: end for 16: f = 17: for all h j H do 18: f R(h j ) <= R(h ) then 19: f = f h j 20: end f 21: end for 22: G = G g, F = F f 23: end whle 24: return (G, F) group. g, h j, s.t. w k g h j f A k, j = 1 (4) Conflct Free Constrant: Any two buyers n the same group do not mutually nterferng wth each other n any channel n the canddate channel set. w j, w k g, h l f A j,l = A k,l = 1 E l, j,k = 0 (5) The groupng algorthm frst fnds an ndependent set of buyers n each channel. Then t selects one such set wth maxmum group sze and contnues to fnd the next group untl all buyers are classfed nto one group. The groupng procedure s shown n Algorthm 1. In Algorthm 1, we can use any exstng algorthms to fnd ndependent sets, for example, the algorthms descrbed n [14]. From the procedure of Algorthm 1, t s obvous that all buyers n IS have a common avalable channel h. And from lne 16-20, we only consder canddate channel wth smaller or equal communcaton range of h. Therefore, the groupng results G and F also satsfy the Conflct Free Constrant. Theorem 1. The buyer groups and canddate channel sets returned by Algorthm 1 satsfy the Common Channel Exstence Constrant and the Conflct Free Constrant. 2) Matchng: After step 1, we have formed a group set G. Suppose the number of buyers n group g s n and the group bd vector s δ = (δ 1,δ2,,δM ). We follow the dea n [9] Algorthm 2 Buyer-Group-Matchng(G, F, S ) 1: // Let Δ be an G by S matrx representng the weghted adjacent matrx between G and S 2: Δ={0} M N 3: for all g x G, s y S do 4: f δ y x > 0andh y f x then 5: Δ x,y =Δ y,x = g x 6: end f 7: end for 8: (G C, S C,σ) = MATCH(X, Y, Δ) 9: return (G C, S C,σ) and assgned the group bd to be the mnmum bd tmes the group sze as: δ j = mn{b j k w k g } n (6) Here, we can magne each buyer group as one super buyer. In δ, there may be more than one non-zero entres, say δ j 1 and δ j 2. If not well desgned, the aucton may be untruthful, as shown n Secton III-C. Such type of market manpulaton s caused by the multple non-zero group bds. To tackle ths challenge, n TAHES, we apply a channel matchng scheme to match one buyer group to an dentcal seller. We call the results after matchng the canddate wnnng group set G C and canddate wnnng sellers set S C. The matchng procedure s shownnalgorthm2. In ths algorthm, σ records the matchng result. For example, σ(g x ) = s y ndcates that buyer group g x s assgned wth seller s y. MATCH(X, Y, Δ) matches nodes set X to Y wth weghted edges n Δ. It can be any matchng algorthm for bpartte graphs specfed by the auctoneer, for example, maxmum matchng or maxmum weghted matchng. Ths matchng step here s also ndependent of bds of both buyers and sellers. 3) Wnner Determnaton and Prcng: In the wnnerdetermnaton and prcng stage, we can apply the mechansm used n McAfee and drectly use the buyer group-seller par (g k, s jk ) to determne wnners and prce. The detaled algorthm s shown n Algorthm 3. C. Economc propertes Theorem 2. TAHES s ndvdually ratonal. Proof: For each buyer w n wnnng group g k : p w = pw δσ(k) k b σ(k) For each wnnng seller s j : P s j C k P s Theorem 3. TAHES s budget-balanced. = b σ(k) Proof: Accordng to the sortng n the wnner determnaton algorthm, we have p w P s and G W = S W, therefore the budget for the auctoneer s: G W p w S W P s 0 Theorem 4. TAHES s truthful. 3079

5 Algorthm 3 Wnner-Determnaton-and-Prcng(G C, S C,σ) 1: G W =, S W = // The set of wnnng groups and sellers 2: // Sort all buyer groups n G C and sellers n S C 3: Construct X = {g 1, g 2,, g l }, such that δ σ( 1) 1 δ σ( 2) 2 δ σ( l) l 4: Construct Y = {s j1, s j2,, s jm }, such that C j1 C j2 C jm 5: Fnd the largest k, s.t.δ σ( k) 6: f k < 2 then 7: return (G W, S W, 0, 0) 8: end f 9: G W = groups δ 1 to δ k 1 k C jk 10: S W = sellers C j1 to C jk 1 11: // Determne the prce and payment 12: p w = δ σ( k) k, P s = C jk 13: for Any buyer w n g τ() G W do 14: p w = p w /n τ() 15: end for 16: for all Any seller s j S W do 17: P s j = Ps 18: end for 19: return (G W, S W, P S, p w ) Due to lmtaton of space, we do not present the proof n ths paper. V. Related Works Aucton has been extensvely studed n the scope of spectrum allocaton[6]-[9]. However, most exstng works faled to consder spectrums as non-dentcal tems. In [9], Zhou and Zheng frst address spectrum reusablty n ther aucton desgn: TRUST. In [8], the authors also consder spectrum reusablty for buyers, and they assume buyers can have multple rados. The proposed TAHES scheme also consder spectrum reusablty, moreover, TAHES can tackle the case when spectrums are heterogeneous. In [16], an aucton desgn for heterogeneous TV whte space spectrums s proposed. In that paper, the spectrum allocaton problem has been defned as an optmzaton problem where maxmum payoff of the central tradng entty (called spectrum broker) s the optmzaton goal. However, [16] s not a double aucton scheme and ts desgn goal s dfferent from TAHES. Recently, n [19], Yang et. proposed a double aucton desgn for cooperatve communcatons wth heterogeneous relay selectons. However, there s no reusablty n ther scenaro. Dfferent from our sngle-round aucton model, recently, there are also works consderng spectrum aucton n an onlne fashon[15][17]. In an onlne spectrum aucton, buyers may arrve n dfferent tme and they can request the spectrum for a partcular duraton. However, exstng onlne double aucton schemes consder only homogeneous spectrum. VI. Conclusons In ths paper, we have desgned TAHES, a truthful double aucton scheme for heterogeneous spectrums. TAHES allows multple spectrum owners wth avalable spectrums n dfferent locatons and dfferent frequency bands to partcpate n the spectrum leasng to secondary servce provders. TAHES can not only solve unque challenges caused by spectrum heterogenety but also perverse nce economc propertes: Truthfulness, Budget Balance and Indvdual Ratonalty. Acknowledgement Ths research was supported n part by Hong Kong RGC grants , , Huawe-HKUST jont lab, Natonal Natural Scence Foundaton of Chna wth grants no. as , , by a grant from NSFC/RGC under the contract N HKUST610/11, by grants from HKUST under the contract RPC11EG29, SRFI11EG17-C and SBI09/10.EG01- C, by a grant from Huawe Technologes Co. Ltd. under the contract HUAW18-15L /PN, by a grant from Guangdong Bureau of Scence and Technology under the contract GDST11EG06. References [1] Spectrum Brdge, Inc. [2] W. Vckrey, Counterspeculaton, auctons, and compettve sealed tenders, The Journal of Fnance, 16:8-37, [3] E. H. Clarke, Multpart prcng of publc goods, Publc Choce, 11:17-33, [4] T. Groves, Incentves n teams, Econometrca, 41(4):617-31, July [5] R. B. Myerson and M. A. Satterthwate, Effcent mechansms for blateral tradng, Journal of Economc Theory, 29(2): , Aprl [6] X. Zhou, S. Gandh, S. Sur, AND H. Zheng, ebay n the sky: Strategyproof wreless spectrum auctons, n ACM MobCom [7] J. Ja, Q. Zhang, Q. Zhang, and M. Lu, Revenue generaton for truthful spectrum aucton n dynamc spectrum access, n ACM Mobhoc [8] F. Wu and N. Vadya, SMALL: A Strategy-Proof Mechansm for Rado Spectrum Allocaton, n IEEE INFOCOM [9] X. Zhou and H. Zheng, Trust: A general framework for truthful double spectrum auctons, In IEEE INFOCOM [10] Propagaton Data and Predcton Methods for the Plannng of Indoor Radocomm. Systems and Rado Local Area Networks n the Frequency Range 900 MHz to 100 GHz. Recommendaton ITU-R P , [11] R. P. McAfee. A domnant strategy double aucton. Journal of Economc Theory 56, 2 (Aprl 1992), [12] German spectrum aucton ends but prces low, [13] X. Feng, J. Zhang, and Q. Zhang, Database-asssted mult-ap network on TV whte spaces: system archtecture, spectrum allocaton and AP dscovery, n IEEE DySPAN [14] S. Saka, M. Togasak, and K. Yamazak, A note on greedy algorthms for the maxmum weghted ndependent set problem, Dscrete Appled Mathematcs 126 (2003) [15] S. Wang, P. Xu, X. Xu, S. Tang, X. L, and X. Lu, TODA: Truthful Onlne Double Aucton for Spectrum Allocaton n Wreless Networks, n IEEE DySPAN [16] M. Parzy and H. Bogucka, Non-dentcal objects aucton for spectrum sharng n TV whte spaces C the perspectve of servce provders as secondary users, n IEEE DySPAN [17] L. Deek, X. Zhou, K. Almeroth, and H. Zheng, To Preempt or Not: Tacklng Bd and Tme-based Cheatng n Onlne Spectrum Auctons, n IEEE INFOCOM [18] M. Al-Ayyoub adn H. Gupta, Truthful Spectrum Auctons Wth Approxmate Revenue, n IEEE INFOCOM [19] D. Yang, X. Fang, and G. Xue, Truthful Aucton for Cooperatve Communcatons, n ACM Mobhc

SPECTRUM is a valuable resource for wireless communication

SPECTRUM is a valuable resource for wireless communication 4038 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 11, NO. 11, NOVEMBER 2012 TAHES: A Truthful Double Aucton Mechansm for Heterogeneous Spectrums Xaojun Feng, Student Member, IEEE, Yanjao Chen, Student

More information

Vickrey Auction VCG Combinatorial Auctions. Mechanism Design. Algorithms and Data Structures. Winter 2016

Vickrey Auction VCG Combinatorial Auctions. Mechanism Design. Algorithms and Data Structures. Winter 2016 Mechansm Desgn Algorthms and Data Structures Wnter 2016 1 / 39 Vckrey Aucton Vckrey-Clarke-Groves Mechansms Sngle-Mnded Combnatoral Auctons 2 / 39 Mechansm Desgn (wth Money) Set A of outcomes to choose

More information

Pricing Network Services by Jun Shu, Pravin Varaiya

Pricing Network Services by Jun Shu, Pravin Varaiya Prcng Network Servces by Jun Shu, Pravn Varaya Presented by Hayden So September 25, 2003 Introducton: Two Network Problems Engneerng: A game theoretcal sound congeston control mechansm that s ncentve compatble

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

Winter 2008 CS567 Stochastic Linear/Integer Programming Guest Lecturer: Xu, Huan

Winter 2008 CS567 Stochastic Linear/Integer Programming Guest Lecturer: Xu, Huan Wnter 2008 CS567 Stochastc Lnear/Integer Programmng Guest Lecturer: Xu, Huan Class 2: More Modelng Examples 1 Capacty Expanson Capacty expanson models optmal choces of the tmng and levels of nvestments

More information

An Admission Control Algorithm in Cloud Computing Systems

An Admission Control Algorithm in Cloud Computing Systems An Admsson Control Algorthm n Cloud Computng Systems Authors: Frank Yeong-Sung Ln Department of Informaton Management Natonal Tawan Unversty Tape, Tawan, R.O.C. ysln@m.ntu.edu.tw Yngje Lan Management Scence

More information

A Distributed Spectrum Sharing Algorithm in Cognitive Radio Networks

A Distributed Spectrum Sharing Algorithm in Cognitive Radio Networks A Dstrbuted Spectrum Sharng Algorthm n Cogntve Rado Networks We Sun, Tong Lu, Yanmn Zhu, Bo L Shangha Jao Tong Unversty Hong Kong Unversty of Scence and Technology Emal: {sunwt,lutong2569164,yzhu}@sjtu.edu.cn,

More information

Module 17: Mechanism Design & Optimal Auctions

Module 17: Mechanism Design & Optimal Auctions Module 7: Mechansm Desgn & Optmal Auctons Informaton Economcs (Ec 55) George Georgads Examples: Auctons Blateral trade Producton and dstrbuton n socety General Setup N agents Each agent has prvate nformaton

More information

Assortment Optimization under MNL

Assortment Optimization under MNL Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

COS 521: Advanced Algorithms Game Theory and Linear Programming

COS 521: Advanced Algorithms Game Theory and Linear Programming COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

Credit Card Pricing and Impact of Adverse Selection

Credit Card Pricing and Impact of Adverse Selection Credt Card Prcng and Impact of Adverse Selecton Bo Huang and Lyn C. Thomas Unversty of Southampton Contents Background Aucton model of credt card solctaton - Errors n probablty of beng Good - Errors n

More information

Pricing and Resource Allocation Game Theoretic Models

Pricing and Resource Allocation Game Theoretic Models Prcng and Resource Allocaton Game Theoretc Models Zhy Huang Changbn Lu Q Zhang Computer and Informaton Scence December 8, 2009 Z. Huang, C. Lu, and Q. Zhang (CIS) Game Theoretc Models December 8, 2009

More information

Hila Etzion. Min-Seok Pang

Hila Etzion. Min-Seok Pang RESERCH RTICLE COPLEENTRY ONLINE SERVICES IN COPETITIVE RKETS: INTINING PROFITILITY IN THE PRESENCE OF NETWORK EFFECTS Hla Etzon Department of Technology and Operatons, Stephen. Ross School of usness,

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

Game Theory Course: Jackson, Leyton-Brown & Shoham. Vickrey-Clarke-Groves Mechanisms: Definitions

Game Theory Course: Jackson, Leyton-Brown & Shoham. Vickrey-Clarke-Groves Mechanisms: Definitions Vckrey-Clarke-Groves Mechansms: Defntons Game Theory Course: Jackson, Leyton-Brown & Shoham A postve result Recall that n the quaslnear utlty settng, a drect mechansm conssts of a choce rule and a payment

More information

Kernel Methods and SVMs Extension

Kernel Methods and SVMs Extension Kernel Methods and SVMs Extenson The purpose of ths document s to revew materal covered n Machne Learnng 1 Supervsed Learnng regardng support vector machnes (SVMs). Ths document also provdes a general

More information

Lecture 4: November 17, Part 1 Single Buffer Management

Lecture 4: November 17, Part 1 Single Buffer Management Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input

More information

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography

CSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve

More information

Economics 101. Lecture 4 - Equilibrium and Efficiency

Economics 101. Lecture 4 - Equilibrium and Efficiency Economcs 0 Lecture 4 - Equlbrum and Effcency Intro As dscussed n the prevous lecture, we wll now move from an envronment where we looed at consumers mang decsons n solaton to analyzng economes full of

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

The Second Anti-Mathima on Game Theory

The Second Anti-Mathima on Game Theory The Second Ant-Mathma on Game Theory Ath. Kehagas December 1 2006 1 Introducton In ths note we wll examne the noton of game equlbrum for three types of games 1. 2-player 2-acton zero-sum games 2. 2-player

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

Lecture 14: Bandits with Budget Constraints

Lecture 14: Bandits with Budget Constraints IEOR 8100-001: Learnng and Optmzaton for Sequental Decson Makng 03/07/16 Lecture 14: andts wth udget Constrants Instructor: Shpra Agrawal Scrbed by: Zhpeng Lu 1 Problem defnton In the regular Mult-armed

More information

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method

Comparison of the Population Variance Estimators. of 2-Parameter Exponential Distribution Based on. Multiple Criteria Decision Making Method Appled Mathematcal Scences, Vol. 7, 0, no. 47, 07-0 HIARI Ltd, www.m-hkar.com Comparson of the Populaton Varance Estmators of -Parameter Exponental Dstrbuton Based on Multple Crtera Decson Makng Method

More information

CS286r Assign One. Answer Key

CS286r Assign One. Answer Key CS286r Assgn One Answer Key 1 Game theory 1.1 1.1.1 Let off-equlbrum strateges also be that people contnue to play n Nash equlbrum. Devatng from any Nash equlbrum s a weakly domnated strategy. That s,

More information

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling Real-Tme Systems Multprocessor schedulng Specfcaton Implementaton Verfcaton Multprocessor schedulng -- -- Global schedulng How are tasks assgned to processors? Statc assgnment The processor(s) used for

More information

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals

Simultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

Analysis of Queuing Delay in Multimedia Gateway Call Routing

Analysis of Queuing Delay in Multimedia Gateway Call Routing Analyss of Queung Delay n Multmeda ateway Call Routng Qwe Huang UTtarcom Inc, 33 Wood Ave. outh Iseln, NJ 08830, U..A Errol Lloyd Computer Informaton cences Department, Unv. of Delaware, Newark, DE 976,

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

Market structure and Innovation

Market structure and Innovation Market structure and Innovaton Ths presentaton s based on the paper Market structure and Innovaton authored by Glenn C. Loury, publshed n The Quarterly Journal of Economcs, Vol. 93, No.3 ( Aug 1979) I.

More information

Externalities in wireless communication: A public goods solution approach to power allocation. by Shrutivandana Sharma

Externalities in wireless communication: A public goods solution approach to power allocation. by Shrutivandana Sharma Externaltes n wreless communcaton: A publc goods soluton approach to power allocaton by Shrutvandana Sharma SI 786 Tuesday, Feb 2, 2006 Outlne Externaltes: Introducton Plannng wth externaltes Power allocaton:

More information

A new construction of 3-separable matrices via an improved decoding of Macula s construction

A new construction of 3-separable matrices via an improved decoding of Macula s construction Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula

More information

Revenue Maximization in a Spectrum Auction for Dynamic Spectrum Access

Revenue Maximization in a Spectrum Auction for Dynamic Spectrum Access Revenue Maxmzaton n a Spectrum Aucton for Dynamc Spectrum Access Al Kakhbod, Ashutosh Nayyar and Demosthens Teneketzs Department of Electrcal Engneerng and Computer Scence Unversty of Mchgan, Ann Arbor,

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

An Upper Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control

An Upper Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control An Upper Bound on SINR Threshold for Call Admsson Control n Multple-Class CDMA Systems wth Imperfect ower-control Mahmoud El-Sayes MacDonald, Dettwler and Assocates td. (MDA) Toronto, Canada melsayes@hotmal.com

More information

Incremental Mechanism Design

Incremental Mechanism Design Incremental Mechansm Desgn Vncent Contzer Duke Unversty Department of Computer Scence contzer@cs.duke.edu Abstract Mechansm desgn has tradtonally focused almost exclusvely on the desgn of truthful mechansms.

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

Chapter - 2. Distribution System Power Flow Analysis

Chapter - 2. Distribution System Power Flow Analysis Chapter - 2 Dstrbuton System Power Flow Analyss CHAPTER - 2 Radal Dstrbuton System Load Flow 2.1 Introducton Load flow s an mportant tool [66] for analyzng electrcal power system network performance. Load

More information

Vickrey Auctions with Reserve Pricing

Vickrey Auctions with Reserve Pricing Vckrey Auctons wth Reserve Prcng Lawrence M. Ausubel and Peter Cramton Unversty of Maryland 28 June 1999 Prelmnary and Incomplete Abstract We generalze the Vckrey aucton to allow for reserve prcng n a

More information

REAL-TIME DETERMINATION OF INDOOR CONTAMINANT SOURCE LOCATION AND STRENGTH, PART II: WITH TWO SENSORS. Beijing , China,

REAL-TIME DETERMINATION OF INDOOR CONTAMINANT SOURCE LOCATION AND STRENGTH, PART II: WITH TWO SENSORS. Beijing , China, REAL-TIME DETERMIATIO OF IDOOR COTAMIAT SOURCE LOCATIO AD STREGTH, PART II: WITH TWO SESORS Hao Ca,, Xantng L, Wedng Long 3 Department of Buldng Scence, School of Archtecture, Tsnghua Unversty Bejng 84,

More information

Truthful Spectrum Auction Design for Secondary Networks

Truthful Spectrum Auction Design for Secondary Networks Truthful Spectrum Aucton Desgn for Secondary Networks Yuefe Zhu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto Zongpeng L Department of Computer Scence Unversty of Calgary

More information

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing

Pop-Click Noise Detection Using Inter-Frame Correlation for Improved Portable Auditory Sensing Advanced Scence and Technology Letters, pp.164-168 http://dx.do.org/10.14257/astl.2013 Pop-Clc Nose Detecton Usng Inter-Frame Correlaton for Improved Portable Audtory Sensng Dong Yun Lee, Kwang Myung Jeon,

More information

EEL 6266 Power System Operation and Control. Chapter 3 Economic Dispatch Using Dynamic Programming

EEL 6266 Power System Operation and Control. Chapter 3 Economic Dispatch Using Dynamic Programming EEL 6266 Power System Operaton and Control Chapter 3 Economc Dspatch Usng Dynamc Programmng Pecewse Lnear Cost Functons Common practce many utltes prefer to represent ther generator cost functons as sngle-

More information

Copyright (C) 2008 David K. Levine This document is an open textbook; you can redistribute it and/or modify it under the terms of the Creative

Copyright (C) 2008 David K. Levine This document is an open textbook; you can redistribute it and/or modify it under the terms of the Creative Copyrght (C) 008 Davd K. Levne Ths document s an open textbook; you can redstrbute t and/or modfy t under the terms of the Creatve Commons Attrbuton Lcense. Compettve Equlbrum wth Pure Exchange n traders

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Remarks on the Properties of a Quasi-Fibonacci-like Polynomial Sequence

Remarks on the Properties of a Quasi-Fibonacci-like Polynomial Sequence Remarks on the Propertes of a Quas-Fbonacc-lke Polynomal Sequence Brce Merwne LIU Brooklyn Ilan Wenschelbaum Wesleyan Unversty Abstract Consder the Quas-Fbonacc-lke Polynomal Sequence gven by F 0 = 1,

More information

(1 ) (1 ) 0 (1 ) (1 ) 0

(1 ) (1 ) 0 (1 ) (1 ) 0 Appendx A Appendx A contans proofs for resubmsson "Contractng Informaton Securty n the Presence of Double oral Hazard" Proof of Lemma 1: Assume that, to the contrary, BS efforts are achevable under a blateral

More information

DUE: WEDS FEB 21ST 2018

DUE: WEDS FEB 21ST 2018 HOMEWORK # 1: FINITE DIFFERENCES IN ONE DIMENSION DUE: WEDS FEB 21ST 2018 1. Theory Beam bendng s a classcal engneerng analyss. The tradtonal soluton technque makes smplfyng assumptons such as a constant

More information

A Strategy-Proof Online Auction with Time Discounting Values

A Strategy-Proof Online Auction with Time Discounting Values A Strategy-Proof Onlne Aucton wth Tme Dscountng Values Fan Wu, Junmng Lu, Zhenzhe Zheng, and Guha Chen Shangha Key Laboratory of Scalable Computng and Systems Shangha Jao Tong Unversty, Chna {wu-fan, lu-jm,

More information

The L(2, 1)-Labeling on -Product of Graphs

The L(2, 1)-Labeling on -Product of Graphs Annals of Pure and Appled Mathematcs Vol 0, No, 05, 9-39 ISSN: 79-087X (P, 79-0888(onlne Publshed on 7 Aprl 05 wwwresearchmathscorg Annals of The L(, -Labelng on -Product of Graphs P Pradhan and Kamesh

More information

Perfect Competition and the Nash Bargaining Solution

Perfect Competition and the Nash Bargaining Solution Perfect Competton and the Nash Barganng Soluton Renhard John Department of Economcs Unversty of Bonn Adenauerallee 24-42 53113 Bonn, Germany emal: rohn@un-bonn.de May 2005 Abstract For a lnear exchange

More information

A Robust Method for Calculating the Correlation Coefficient

A Robust Method for Calculating the Correlation Coefficient A Robust Method for Calculatng the Correlaton Coeffcent E.B. Nven and C. V. Deutsch Relatonshps between prmary and secondary data are frequently quantfed usng the correlaton coeffcent; however, the tradtonal

More information

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm

Design and Optimization of Fuzzy Controller for Inverse Pendulum System Using Genetic Algorithm Desgn and Optmzaton of Fuzzy Controller for Inverse Pendulum System Usng Genetc Algorthm H. Mehraban A. Ashoor Unversty of Tehran Unversty of Tehran h.mehraban@ece.ut.ac.r a.ashoor@ece.ut.ac.r Abstract:

More information

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity

LINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have

More information

Equilibrium with Complete Markets. Instructor: Dmytro Hryshko

Equilibrium with Complete Markets. Instructor: Dmytro Hryshko Equlbrum wth Complete Markets Instructor: Dmytro Hryshko 1 / 33 Readngs Ljungqvst and Sargent. Recursve Macroeconomc Theory. MIT Press. Chapter 8. 2 / 33 Equlbrum n pure exchange, nfnte horzon economes,

More information

Supporting Information

Supporting Information Supportng Informaton The neural network f n Eq. 1 s gven by: f x l = ReLU W atom x l + b atom, 2 where ReLU s the element-wse rectfed lnear unt, 21.e., ReLUx = max0, x, W atom R d d s the weght matrx to

More information

Power law and dimension of the maximum value for belief distribution with the max Deng entropy

Power law and dimension of the maximum value for belief distribution with the max Deng entropy Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng

More information

Lecture 10: May 6, 2013

Lecture 10: May 6, 2013 TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,

More information

Complete subgraphs in multipartite graphs

Complete subgraphs in multipartite graphs Complete subgraphs n multpartte graphs FLORIAN PFENDER Unverstät Rostock, Insttut für Mathematk D-18057 Rostock, Germany Floran.Pfender@un-rostock.de Abstract Turán s Theorem states that every graph G

More information

An Interactive Optimisation Tool for Allocation Problems

An Interactive Optimisation Tool for Allocation Problems An Interactve Optmsaton ool for Allocaton Problems Fredr Bonäs, Joam Westerlund and apo Westerlund Process Desgn Laboratory, Faculty of echnology, Åbo Aadem Unversty, uru 20500, Fnland hs paper presents

More information

Smooth Games, Price of Anarchy and Composability of Auctions - a Quick Tutorial

Smooth Games, Price of Anarchy and Composability of Auctions - a Quick Tutorial Smooth Games, Prce of Anarchy and Composablty of Auctons - a Quck Tutoral Abhshek Snha Laboratory for Informaton and Decson Systems, Massachusetts Insttute of Technology, Cambrdge, MA 02139 Emal: snhaa@mt.edu

More information

Chapter 13: Multiple Regression

Chapter 13: Multiple Regression Chapter 13: Multple Regresson 13.1 Developng the multple-regresson Model The general model can be descrbed as: It smplfes for two ndependent varables: The sample ft parameter b 0, b 1, and b are used to

More information

On the Repeating Group Finding Problem

On the Repeating Group Finding Problem The 9th Workshop on Combnatoral Mathematcs and Computaton Theory On the Repeatng Group Fndng Problem Bo-Ren Kung, Wen-Hsen Chen, R.C.T Lee Graduate Insttute of Informaton Technology and Management Takmng

More information

Supplier Learning in Repeated Online Procurement Auctions

Supplier Learning in Repeated Online Procurement Auctions Suppler earnng n Repeated Onlne Procurement Auctons Vvan Zhong D.J. Wu College of Management, Georga Insttute of Technology Extended Abstract Submtted to WISE 2006. Introducton Repetton s the key aspect

More information

Integrated approach in solving parallel machine scheduling and location (ScheLoc) problem

Integrated approach in solving parallel machine scheduling and location (ScheLoc) problem Internatonal Journal of Industral Engneerng Computatons 7 (2016) 573 584 Contents lsts avalable at GrowngScence Internatonal Journal of Industral Engneerng Computatons homepage: www.growngscence.com/ec

More information

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane

A New Scrambling Evaluation Scheme based on Spatial Distribution Entropy and Centroid Difference of Bit-plane A New Scramblng Evaluaton Scheme based on Spatal Dstrbuton Entropy and Centrod Dfference of Bt-plane Lang Zhao *, Avshek Adhkar Kouch Sakura * * Graduate School of Informaton Scence and Electrcal Engneerng,

More information

Generalized Linear Methods

Generalized Linear Methods Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set

More information

829. An adaptive method for inertia force identification in cantilever under moving mass

829. An adaptive method for inertia force identification in cantilever under moving mass 89. An adaptve method for nerta force dentfcaton n cantlever under movng mass Qang Chen 1, Mnzhuo Wang, Hao Yan 3, Haonan Ye 4, Guola Yang 5 1,, 3, 4 Department of Control and System Engneerng, Nanng Unversty,

More information

A Lower Bound on the Competitive Ratio of Truthful Auctions

A Lower Bound on the Competitive Ratio of Truthful Auctions A Lower Bound on the Compettve Rato of Truthful Auctons Andrew V Goldberg 1, Jason D Hartlne 1, Anna R Karln 2, and Mchael Saks 3 1 Mcrosoft Research, SVC/5, 1065 La Avenda, Mountan Vew, CA 94043 {goldberg,hartlne}@mcrosoftcom

More information

Department of Quantitative Methods & Information Systems. Time Series and Their Components QMIS 320. Chapter 6

Department of Quantitative Methods & Information Systems. Time Series and Their Components QMIS 320. Chapter 6 Department of Quanttatve Methods & Informaton Systems Tme Seres and Ther Components QMIS 30 Chapter 6 Fall 00 Dr. Mohammad Zanal These sldes were modfed from ther orgnal source for educatonal purpose only.

More information

A FAST HEURISTIC FOR TASKS ASSIGNMENT IN MANYCORE SYSTEMS WITH VOLTAGE-FREQUENCY ISLANDS

A FAST HEURISTIC FOR TASKS ASSIGNMENT IN MANYCORE SYSTEMS WITH VOLTAGE-FREQUENCY ISLANDS Shervn Haamn A FAST HEURISTIC FOR TASKS ASSIGNMENT IN MANYCORE SYSTEMS WITH VOLTAGE-FREQUENCY ISLANDS INTRODUCTION Increasng computatons n applcatons has led to faster processng. o Use more cores n a chp

More information

Amiri s Supply Chain Model. System Engineering b Department of Mathematics and Statistics c Odette School of Business

Amiri s Supply Chain Model. System Engineering b Department of Mathematics and Statistics c Odette School of Business Amr s Supply Chan Model by S. Ashtab a,, R.J. Caron b E. Selvarajah c a Department of Industral Manufacturng System Engneerng b Department of Mathematcs Statstcs c Odette School of Busness Unversty of

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

Estimation: Part 2. Chapter GREG estimation

Estimation: Part 2. Chapter GREG estimation Chapter 9 Estmaton: Part 2 9. GREG estmaton In Chapter 8, we have seen that the regresson estmator s an effcent estmator when there s a lnear relatonshp between y and x. In ths chapter, we generalzed the

More information

CS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016

CS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016 CS 29-128: Algorthms and Uncertanty Lecture 17 Date: October 26, 2016 Instructor: Nkhl Bansal Scrbe: Mchael Denns 1 Introducton In ths lecture we wll be lookng nto the secretary problem, and an nterestng

More information

Queueing Networks II Network Performance

Queueing Networks II Network Performance Queueng Networks II Network Performance Davd Tpper Assocate Professor Graduate Telecommuncatons and Networkng Program Unversty of Pttsburgh Sldes 6 Networks of Queues Many communcaton systems must be modeled

More information

STAT 511 FINAL EXAM NAME Spring 2001

STAT 511 FINAL EXAM NAME Spring 2001 STAT 5 FINAL EXAM NAME Sprng Instructons: Ths s a closed book exam. No notes or books are allowed. ou may use a calculator but you are not allowed to store notes or formulas n the calculator. Please wrte

More information

Efficiency of (Revenue-)Optimal Mechanisms

Efficiency of (Revenue-)Optimal Mechanisms Effcency of Revenue-Optmal Mechansms Gagan Aggarwal Google Inc. Mountan Vew, CA gagana@google.com Gagan Goel Georga Tech Atlanta, GA gagan@gatech.edu Aranyak Mehta Google Inc. Mountan Vew, CA aranyak@google.com

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

Introduction to Vapor/Liquid Equilibrium, part 2. Raoult s Law:

Introduction to Vapor/Liquid Equilibrium, part 2. Raoult s Law: CE304, Sprng 2004 Lecture 4 Introducton to Vapor/Lqud Equlbrum, part 2 Raoult s Law: The smplest model that allows us do VLE calculatons s obtaned when we assume that the vapor phase s an deal gas, and

More information

= z 20 z n. (k 20) + 4 z k = 4

= z 20 z n. (k 20) + 4 z k = 4 Problem Set #7 solutons 7.2.. (a Fnd the coeffcent of z k n (z + z 5 + z 6 + z 7 + 5, k 20. We use the known seres expanson ( n+l ( z l l z n below: (z + z 5 + z 6 + z 7 + 5 (z 5 ( + z + z 2 + z + 5 5

More information

Revenue in Resource Allocation Games and Applications

Revenue in Resource Allocation Games and Applications Revenue n Resource Allocaton Games and Applcatons by Thanh Ten Nguyen Ths thess/dssertaton document has been electroncally approved by the followng ndvduals: Tardos,Eva (Charperson) Kozen,Dexter Campbell

More information

This column is a continuation of our previous column

This column is a continuation of our previous column Comparson of Goodness of Ft Statstcs for Lnear Regresson, Part II The authors contnue ther dscusson of the correlaton coeffcent n developng a calbraton for quanttatve analyss. Jerome Workman Jr. and Howard

More information

Joint Scheduling and Power-Allocation for Interference Management in Wireless Networks

Joint Scheduling and Power-Allocation for Interference Management in Wireless Networks Jont Schedulng and Power-Allocaton for Interference Management n Wreless Networks Xn Lu *, Edwn K. P. Chong, and Ness B. Shroff * * School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette,

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

Finding Dense Subgraphs in G(n, 1/2)

Finding Dense Subgraphs in G(n, 1/2) Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng

More information

Semi-supervised Classification with Active Query Selection

Semi-supervised Classification with Active Query Selection Sem-supervsed Classfcaton wth Actve Query Selecton Jao Wang and Swe Luo School of Computer and Informaton Technology, Beng Jaotong Unversty, Beng 00044, Chna Wangjao088@63.com Abstract. Labeled samples

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

Mixed Taxation and Production Efficiency

Mixed Taxation and Production Efficiency Floran Scheuer 2/23/2016 Mxed Taxaton and Producton Effcency 1 Overvew 1. Unform commodty taxaton under non-lnear ncome taxaton Atknson-Stgltz (JPubE 1976) Theorem Applcaton to captal taxaton 2. Unform

More information

A Lower Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control

A Lower Bound on SINR Threshold for Call Admission Control in Multiple-Class CDMA Systems with Imperfect Power-Control A ower Bound on SIR Threshold for Call Admsson Control n Multple-Class CDMA Systems w Imperfect ower-control Mohamed H. Ahmed Faculty of Engneerng and Appled Scence Memoral Unversty of ewfoundland St.

More information

Energy Efficiency in Colocation Data Centers: A Joint Incentive Mechanism Approach

Energy Efficiency in Colocation Data Centers: A Joint Incentive Mechanism Approach Energy Effcency n Colocaton Data Centers: A Jont Incentve Mechansm Approach Yoush Wang, Fa Zhang, Shaole Ren, Fangmng Lu, Ru Wang, and Zhyong Lu Unversty of Chnese Academy of Scences, Chna Bejng Key Laboratory

More information