Efficient Medium Access Control Design A Game Theoretical Approach
|
|
- Maryann Charles
- 6 years ago
- Views:
Transcription
1 Effent Medum Aess Control Desgn A Game Theoretal Approah Ln Chen, Jean Leneutre Department of Computer Sene and Networkng Éole Natonale Supéreure des Téléommunatons {Ln.Chen, Jean.Leneutre}@enst.fr Abstrat In ths paper, we address the queston that how to desgn effent MAC protools n selfsh and nonooperatve networks, whh s rual n nowadays open envronments. We model the medum aess ontrol problem as a non-ooperatve game n whh the MAC protool an be regarded as dstrbuted strategy update sheme approahng the equlbrum pont. Under suh game theoretal framework, three MAC protools, the aggressve, onservatve and heat-proof MAC protool, are then proposed wth tunable parameters allowng them to onverge to desred soal optmal pont. The frst two MAC protools requre network partpants to follow the rules, whle the heat-proof MAC protool an survve the selfsh envronments where nodes are pure self-nterested. Based on our game theoretal analyss, we provde a general methodology for desgnng effent MAC protools n non-ooperatve and selfsh envronments. We beleve that the proposed methodology not only provdes a general way of desgnng stable and ontrollable MAC protools ahevng hgh performane even n selfsh envronments, but also provdes a general framework that an be extended to desgn effent protools n other non-ooperatve and selfsh envronments. I. Introduton Medum Aess Control (MAC) s rual for networks where the ommunaton medum s shared by network partpants ompetng for the hannel aess. Desgnng effent MAC protools s a hallengng task, espeally n wreless envronments where hannel sensng s muh less effetve than n wred medum. IEEE 82. DCF (Dstrbuted Coordnaton Funton), the most popular MAC protool for WLANs, uses the exponental bakoff (EB) mehansm where eah node doubles ts ontenton wndow (CW) upon a ollson untl CW max and sets t to the bas value CW mn upon a suessful transmsson. Ths MAC protool results n too many ollsons and thus leads to network sub-optmalty when the network sales. Moreover, t has short-term farness problem due to the EB mehansm appled after the ollson. Ths motvates us to address the fundamental queston that how to desgn effent MAC protools, what are the methodology and gudelnes to follow? An effent MAC protool should satsfy the followng propertes: ) Convergene and stablty: the protool should onverge to a stable equlbrum; 2) Soal optmalty and farness: the onverged equlbrum should be network-wde optmal or at least quas-optmal and eah partpant should get a far share of payoff at ths pont. Besdes the above requrements on performane, we pose another requrement: the survvablty of the MAC protool n selfsh envronments. Nowadays, networks beome more and more open. Hene network partpants may behave selfshly rather than ooperatvely,.e., they adapt the strategy that maxmzes ther own utlty, regardless of others. Thus we an not mpltly assume all partpants at ooperatvely by followng the desgned protools. Under suh rumstane, we requre an effent MAC protool to be survvable suh that t an gude the ndvdual nodes to operate on the desgned equlbrum pont even they are purely self-nterested and non-ooperatve. In other words, the MAC protool onssts of a strategy that eah selfsh ndvdual node has no nentve to devate. We ondut our work usng game theory, a powerful tool to study the nteraton among deson makers wth onfltng objetves. Our motvaton of usng game theoretal approah rather than global optmzaton approah s two-fold: ) Game theory s a powerful tool to model selfsh behavors and ther mpat on the system performane n dstrbuted envronments wth self-nterested players; 2) Game theory an model the features or onstrants suh as lak of oordnaton and network feedbak n dstrbuted envronments. In fat n suh envronments, selfsh behavor s often muh more robust and salable than any entralzed ooperatve ontrol, whh s very expensve or even mpossble to mplement. We begn by modellng the medum aess ontrol problem as a non-ooperatve game G MAC, where eah player hooses ts strategy, the hannel aess probablty, to maxmze ts utlty funton, defned as the dfferene between ts throughput and transmsson ost. In suh nonooperatves games, a Nash equlbrum (NE) s the strategy profle where no player has nentve to devate unlaterally. The MAC protool an be vewed as the dstrbuted strategy update mehansm approahng the NE. We then ondut an n-depth study on the NE of G MAC. We fnd that there always exsts a based NE and that under ertan ondton, there also exsts a unque nonbased NE, n whh we are speally nterested sne at the non-based NE, the farness s ensured among players. However, by studyng the network-wde utlty on the nonbased NE and the soal optmal pont, we fnd that the non-based NE s neffent. We then propose two prng shemes to mprove the effeny of the non-based NE. We show that by wsely hoosng the prng fators, the non-based NE an be approahed to the soal optmal pont. We then seek the MAC protool that an lead the network to onverge to the soal optmal pont. However, the onvergene s not guaranteed under the best response
2 2 and subgradent ontrol, the two bas dynam ontrol mehansms n game theory. We thus turn to more sophstated ontrol mehansms under whh the game s provably onvergent to the soal optmal pont. We propose three MAC protools: aggressve, onservatve and heat-proof MAC protool. We show that the proposed MAC protools have the followng desrable propertes: ) They onsst of nature aess probablty update shemes for ratonal players; 2) They provde tunable parameters wth whh one an ontrol the onvergent pont of the network; 3) They lead the network to a stable state where both the onvergene and the soal optmalty are ensured. The aggressve and the onservatve MAC protool requre network partpants to respet ther rules. In ontrast, the heat-proof MAC protool wth the orrespondent prng funton based on observable nformaton s desgned suh that the hannel aess probablty update sheme s the best response for the ratonal selfsh players when maxmzng ther utlty. Hene no player has nentve to devate from the heatproof MAC protool. As a result, the heat-proof MAC protool an survve the selfsh envronments where players are purely self-nterested and may break any protool rules f they an get more payoff than obeyng the rules. Based on our game theoretal analyss, we answer the posed queston by provdng the followng methodology n desgnng effent MAC protools n non-ooperatve and selfsh envronments: ) hoosng a natural hannel aess update sheme; 2) onfgurng the parameters n the hosen update sheme to ensure that the network onverges to the desgned optmal equlbrum under the update sheme; 3) dervng approprate prng funtons based on observable nformaton suh that no player has nentve to devate from the MAC protool. Our man ontrbutons an be summarzed as follows: We formulate the medum aess ontrol as a nonooperatve game and perform an n-depth analyss on the game, nludng the exstene, unqueness, onvergene and effeny of the NE; Three MAC protools, the aggressve, onservatve and heat-proof MAC protool, are proposed wth tunable parameters allowng them to onverge to desred soal optmal pont. The frst two MAC protools requre network partpants to follow the rules, whle the heat-proof MAC protool an survve the non-ooperatve and selfsh envronments. Based on our game theoretal analyss, we provde a general methodology for desgnng effent MAC protools n non-ooperatve and selfsh envronments. We beleve these ontrbutons are very relevant for the medum aess ontrol desgn ahevng hgh effeny and survvablty n selfsh and non-ooperatve envronments. II. Related Work Game theory has been employed wdely to study the non-ooperatve behavors at MAC layer. [6] studes the non-ooperatve equlbra of Aloha for heterogeneous users. [5] studes the stablty of mult-paket slotted Aloha wth selfsh users and perfet nformaton. [7] shows that the 82. MAC protool leads to neffent equlbra f users onfgure ther paket sze and data rate to maxmze ther own throughput. [8] shows that the exstene of small populaton of selfsh nodes leads to network ollapse. The authors thus propose a penalzng sheme to prevent the network from beng paralyzed. [2] reverse-engneers bnary exponental bakoff algorthm n game theory framework. In the feld of MAC protool desgn, muh reent work [] [] apples the network utlty maxmzaton (NUM) framework by vewng the network as an optmzaton solver and the MAC protools as dstrbuted algorthms solvng some global network utlty maxmzaton problem. Our work, however, s based on a game theoretal framework under whh the medum aess ontrol problem s modeled as a non-ooperatve game and the MAC protool s regarded as the dstrbuted strategy update sheme approahng the equlbrum. We argue that our work s more suted n selfsh non-ooperatve envronments suh as nowadays open aessed networks where partpants are purely self-nterested. [] also studes the MAC desgn from a game theoretal angle. It s foused on modellng a large lass of system-wde qualty of serves models va utlty funtons and dervng dstrbuted ontenton resoluton algorthm based on ontnuous feedbak sgnal rather than bnary ontenton sgnal to approah the NE (may not be soal optmal). In ontrast, our work fouses on provdng a methodology on how to desgn effent MAC protools n selfsh envronments that an gude the network to a stable equlbrum whh s network-wde optmal and at whh eah partpant gets a far share of payoff. III. System Model We onsder a LAN onsstng of a set N = {,2,,n} of nodes sharng the ommon medum. We base our study on a general and bas MAC layer model: Tme s dvded nto synhronzed slots. Eah node an send one paket n a slot. If a node has a new paket to send, t attempts transmsson durng the next slot wth probablty p alled hannel aess probablty. The hannel aess probablty p an be realzed va ontenton wndow n the ase where a bakoff mehansm s mplemented suh as CSMA. In the above smple model, we do not assume any ollson avodane or deteton mehansm although suh mehansms may faltate the MAC protool desgn. Bult on a bas MAC layer model wthout any added funtonaltes, our proposed MAC protools an be mplemented n almost all nowadays network systems, from slotted Aloha to CSMA. IV. Non-ooperatve Medum Aess Control Game In game theory, the utlty funton desrbes the satsfaton level of the player as the result of ther strateges. In our study, we onsder a utlty funton as follows U = p ( p j ) p
3 3 In the above defned utlty funton, node gets payoff for a suessful frame transmsson and no payoff f the transmsson fals due to a ollson. On the other hand, the transmsson of a frame also nurs the transmsson ost ( s normalzed), e.g., n terms of energy. In ths paper, for the reason of smplty, we assume that =. The utlty funton U thus represents the net beneft of a node when operatng on p. We now formulate the medum aess ontrol problem as a non-ooperatve game G MAC. Defnton : The non-ooperatve medum aess game G MAC s a trple (N,{A },{U }), where N s the player set, A s the strategy set of player, U s the utlty funton of player defned prevously. Eah player selets ts hannel aess probablty p A = [,] to maxmze ts utlty U. Formally, G MAC s expressed as: G MAC : max U (p, p ), p A A. Nash Equlbrum Analyss N For non-ooperatve games as G MAC, the most mportant onept s the Nash equlbrum (NE), where no player has nentve to devate from ts urrent strategy. The NE an be seen as optmal agreements between the opponents of the game. In the ase of the G MAC, we have the followng defnton of NE. Defnton 2: A hannel aess probablty vetor p = (p,,p n) s a NE of G MAC f no player an mprove ts utlty by unlaterally devatng from p : U (p, p ) U (p, p ), p, N We use the onept of Pareto-optmalty and soal welfare optmalty to haraterze the effeny of dfferent strategy profles. Defnton 3: The strategy profle s s Pareto-optmal f there does not exst another strategy profle s suh that for eah player, t holds that U (s ) > U (s). Defnton 4: The strategy profle s s soal welfare optmal f t maxmzes the aggregated payoff N U. Theorem studes the NE of G MAC. Theorem : G NP C admts at least one NE. Proof: It an be verfed that the strategy set of eah player A = [, ] s a nonempty ompat onvex subset of Euldan spae. The utlty funton U s ontnuous and onave w.r.t. p on A. Hene, by Theorem n [3], there exsts at least one NE. Sne the utlty funton U s onave, p s ether on the border of the strategy spae or satsfes U =. We p all a NE p a non-based equlbrum f, for all nodes, p satsfes U =, and based equlbrum otherwse. p Theorem 2 provdes a more n-depth nsght on the NE of G MAC. The proof s straghtforward and s omtted here. Theorem 2: If, then G MAC has only one based NE {p = } and no non-based NE; If <, then G MAC has n based NE NE = {p =,p j = (j )}( =,,n) and one non-based NE {p = n }. Remark : s the trval ase where the transmsson ost s so expensve that all players hoose to keep slent. If <, the based NE orresponds to the stuaton that one player aptures the hannel and others always defer ther transmsson. The non-based NE s the ase where eah player gets a far share of the hannel. We are manly nterested n the non-based NE n our study and any effent MAC protool should not lead the network to the based NE. In the rest of the paper, we fous on the non-trval ase where <. Remark 2: We an analyze the non-based NE from another angle: onsder eah player has two pure strateges: transmt or wat. The non-based NE s thus the mxed strategy NE of G MAC and suh NE s guaranteed to exst. Remark 3: From an eonom pont of vew, an be regarded as the pre for player operatng on p. The NE s thus the pont where the margnal gan p ( p j) equals to the pre. From the players s pont of vew, operatng at hgher p nreases the gan p at the expense of payng more n terms of pre. Hene, to searh the NE s atually to seek a ompromsed pont between the gan and the ost. V. Ineffeny of the Non-based NE of G MAC The non-based NE dsussed n last seton provdes a soluton where no player an nrease ts utlty any further through ndvdual effort. A natural queston we pose s that whether the non-based NE s effent,.e., Paretooptmal and soal welfare optmal. In ths seton, we answer ths queston by omparng the utlty at above nonbased NE and the soal welfare optmal pont. Let P = { p } denote the soal welfare optmal pont of G MAC maxmzng the global network utlty N U, we nvestgate the far soal welfare optmal pont where p = p for all N n the followng lemma. Lemma : Under the ondton that n 2 and < <, there s a unque far soal welfare optmal pont where p = p for all N. Moreover, t holds that. p s the root of n( p) n (n )( p) n 2 =. 2. < p < /n 3. p < p Proof: It s easy to verfy the ase where n = 2. We onsder the ase where n 3. Let Q(p) = N U ({p = p}), by mposng Q(p) =, we get p Q(p) = n( p) n (n )( p) n 2 =. It follows Q (p) = n(n )( p) n 2 + (n )(n 2)( p) n 3 Hene Q(p) s monotonously dereasng w.r.t. p n (, 2 n ) and monotonously nreasng n ( 2 n, ). Notng that Q() = <, Q( ) = < and Q() = >, we n obtan that Q(p) = admts a unque soluton p (, n ). Moreover, Q(p) < when p ( p, ) and Q(p) > when p (, p). Hene, p s the unque maxmzer of N U.
4 4 On the other hand, followng < <, we have Q(p ) = (n )( n ) <. Ths leads to p > p. Consder the utlty funton at the non-based NE p, we have U (p ) = for all player. Sne all players are self-nterested and ratonal and would never aept a negatve payoff, operatng at p atually mnmzes both the ndvdual and network-wde utlty. On the other hand, at P, we have N U = n ( p( p) n p ). By expressng by p, after some mathemat operatons, we get N U = n(n )( p) n 2 p 2 >. The non-based NE s not Pareto optmal ether. If all players swth from the non-based NE to the soal optmal pont, both the ndvdual and the network utlty nrease. Ths s due to the fat of lak of ooperaton and the nentve to operate at soal optmal pont. The followng theorem summarzes our result of ths seton. Theorem 3: The non-based NE of G MAC s neffent,.e., nether Pareto-optmal nor soal welfare optmal. Fgure and Fgure 2 show the non-based NE and the soal optmal pont p as a funton of. poly. The non-ooperatve medum aess game wth ths prng sheme G MACP s thus formally expressed as G MACP : max p U (p, p ) = U (p, p ) b p, N We rewrte the utlty funton as U = p ( p j ) p, where = + b. It an be shown that f <, G MACP admts n based NEs and a unque non-based NE {p = p = ( ) n }. By mposng p = p, the nonbased NE ondes to the soal optmal pont. Theorem 4: By settng the prng fator b = ( p) n, G MACP admts a unque effent non-based NE whh s also the soal optmal pont. In the analyss of G MAC, we an nterpret as the pre for player operatng on p. Here n G MACP, the above pre beomes + b = ( p) n. As the pre nreases, eah player tends to derease ts p at the non-based NE. Fgure 3 and Fgure 4 show b as a funton of (n = ) and n (=.). non-based Nash equlbrum Fg n= n= p as a funton of soal welfare pont Fg n= n= bp as a funton of prng fator Fg b as a funton of prng fator Fg b as a funton of n n VI. Non-ooperatve Medum Control Aess Game Wth Prng Prng s a powerful tehnque n game theory to motvate selfsh players to adopt desrable behavors. In our ontext, we turn to prng to let the network onverge to the soal optmal pont. From Lemma, at the NE, players tend to operate at hgher p than the optmal pont p, we enourage the players to derease ther p va prng to approah the soal optmal pont. In ths new ontext, we develop a non-ooperatve game wth prng denoted by G MACP = ( N, {A }, {U } ), where the utlty funton U ( ) s defned as U = U + τ (p ), where τ : A R s the general form of the prng funton. In ths paper, we nvestgate the followng two prng shemes. A. Prng Sheme Motvated by the fat that, at the non-based NE of G MAC, players operate at hgher p than the soal optmal ase, we mpose a lnear prng funton τ = b p whh s monotonously dereasng w.r.t. p by settng b > to enourage the players to derease ther p. b p an be regarded as extra pre to players mposed by the prng Under our model, when =, we get bp = /n, the aggregated utlty beomes the network throughput S. From Lemma we have S = P N U = ( /n) n < /e and lm n S = /e. The result s oherent to the tradtonal performane bound of slotted-aloha. B. Prng Sheme 2 In ths prng sheme, we mpose a gan dsount on the utlty funton. Under ths rumstane, U 2 = d p ( p j) p, where d < s the dsountng fator appled to dsourage players to nrease ther p. The non-ooperatve medum aess game wth ths prng sheme G 2 MACP s formally expressed as G 2 MACP : max U 2 (p, p ) = d p ( p j ) p, N p For G 2 MACP, n based NEs and a unque non-based NE {p = p 2 = ( ) n } exst f <. By mposng p 2 = d d p, the non-based NE ondes to the soal optmal pont. Theorem 5: By settng the prng fator d = ( p) n, G2 MACP admts a unque effent non-based NE whh s also the soal optmal pont. Fgure 5 and Fgure 6 show d as a funton of (n = ) and n (=.2). Dfferent from the frst prng sheme ahevng the goal by nreasng the ost of the transmsson from to, the seond prng sheme attans the same goal by dereasng the gan of the suessful transmsson from p ( p j) to d p ( p j).
5 5 prng fator Fg d as a funton of prng fator Fg d as a funton of n VII. Approahng the Non-based NE Untl now, we have studed the NE of G MAC and two prng shemes to mprove the effeny of the non-based NE. The MAC protool an be vewed as the dstrbuted strategy update mehansm to onverge to the NE. To study suh game dynams, we onsder the repeated play of G MAC, and look for update mehansm n whh players repeatedly adjust strateges n response to observatons of other player atons so as to approah the non-based NE. In ths seton, we study the onvergene of two bas strategy update mehansms wdely used n game theory: the best response update and the subgradent update. A. Best Response Update In game theory, the smplest strategy update mehansm s best response update: at eah teraton, every node hooses the best response to the atons of all the other nodes n prevous teraton. Mathematally, at teraton t +, player updates ts hannel aess probablty as = r(p t ) := argmax U (p, p t ) p Clearly, f the above dynam reahes a stable state, ths state s a NE. The onvergene to the NE under best response update s also guaranteed. For our medum aess game wthout or wth prng, the onvergene under the best response update s not guaranteed. Take G MAC as an example, the best response s = r(p t ( p j) > ) = ( p j) < p [,] ( p j) = Starng by p =, N, we have pt = f t s even, pt = f t s odd. Hene, the best response update of the medum aess games may not onverge to the NE. B. Subgradent Update An alternatve strategy s the subgradent update. Compared to the best response update, subgradent update an be vewed as the better response update n whh every player adjusts ts hannel aess probablty n the gradent dreton suggested by observatons of other player atons. Mathematally, player updates ts strategy aordng to = p t + λ t U p=p p t where λ t > s the stepsze of player at teraton t. The subgradent update sheme an be nterpreted from an eonom pont of vew. If the margnal gan s greater than n ontenton pre,.e., U p=p >, nreases the aess probablty p, otherwse, dereases p. Sne at eah p t teraton, players update hannel aess probabltes by a small amount, they usually experene smooth trajetores. We take G MAC as an example to study the onvergene to the NE under the above subgradent update sheme. For G MAC, the subgradent update an be derved as = p t + λ t ( p t j) where the fxed pont of the subgradent update s p = n whh s also the non-based NE. Consder a smple ase where n = 2, startng from p = (p, p 2 ) = ( + ɛ, ɛ) where ɛ s a small postve value, we have p t (,) as t + ; startng from p = ( ɛ, + ɛ), p t (, ) as t +. Hene, the subgradent update may not onverge to the non-based NE. VIII. Medum Aess Control Desgn Gven the fat that the two bas update shemes studed above do not guarantee the onvergene to the non-based NE n the medum aess game wth or wthout prng, we nvestgate more sophstated medum aess ontrol mehansms and propose the followng three medum aess ontrol shemes wth provable onvergene to the desred equlbrum. A. Medum Aess Control Sheme : Aggressve Control The frst medum aess ontrol sheme s defned as: = ( p t j) + βp t ( p t j) () where < <, β <. One nterpretaton of the sheme s that at eah teraton player sets ts hannel aess probablty p to the maxmum value wth probablty ( pt j ) dependng on the hannel aess probablty of other players n the last teraton, whle redues p by a fator β otherwse. If one teraton orresponds to one slot, s the expeted hannel aess probablty of the followng update sheme based on hannel ondton: f the hannel s not ouped by other players durng the last slot, then player sets p to for the omng slot; otherwse t redues p by β. We refer ths sheme as the aggressve medum aess ontrol as players set ther hannel aess probablty to the maxmum value one the hannel s not ouped by others. The followng theorem studes the dynams under the aggressve medum aess ontrol { sheme. Theorem 6: If max (n ), β + ( ( ) (n ) n )pmax } β <, the update sheme defned n () admts a unque fxed pont p f = {p f } and t holds that:) < p f < ; 2) Startng from any
6 6 ntal pont p = {p } where < p <, the teraton defned by () onverges to p f. Proof: We frst show that wth any ntal pont < p <, t holds that < p t <, N, t >. We prove t by showng that f < p t <, t, then < <, N. Notng that ( < βp t < pt <, we get < < ( pt j ) + ) ( pt j ) =. We then show that () admts a unque fxed pont by usng the followng lemma onernng the fxed pont of a ontraton [4]: Lemma 2: If the update sheme defned n () s a ontraton, then t admts a unque fxed pont; Moreover, startng from any ntal pont, the teraton under t onverges to the unque fxed pont. The ontraton s defned n [4] as follows: let (X,d) be a metr spae, f: X X s a ontraton f there exsts a onstant k wth k < suh that d(f(x), f(y)) kd(x, y) x, y X where d(x,y) = x y = max x y. The key pont to establsh the unqueness of the fxed pont s thus to show the update sheme defned n () s a ontraton. We have d(f(x),f(y)) = f(x) f(y) f x y = f x x d(x,y) If the Jaoban f k <, f s a ontraton. In our x ontext, we show that the update sheme of () s a ontraton by provng J k, where J = {J j } s the Jaoban of the update sheme of () defned by J j = pt+ At teraton t (t ), we have { (βp t J j = ) l N,l,l j ( pt l ) j β( l N,l ( pt l )) = j Notng that < βp t < pt <, we have J = max J j = β( ( p t l)) N j N l N,l (βp t ) ( p t l) p t l) l N,l,l j < β( ( p t l)) + l N,l = β + l N,l ( p t l) l N,l,l j l N,l p t j ( p t l) p t β l Let p t = {p t }, Q(pt ) = β + l N,l l N,l. ( p t β, l we bound Q(p t ) by Q max. To ths end, we rewrte Q as Q(p t j) = β + ( p t l) l N,l,l j l N,l,l j p t β ( p t j) + l It follows that Q attans Q max when p t j = or pt j =. Performng the same analyss for all j N, we show that Q attans Q max at the border of the strategy spae. Let N( N n ) be the number of players wth the aess probablty at Q max, t follows that Q(N) = β+( ) N ( ( Imposng Q =, we obtan N N 2 + ( n β N + n N ) N ( ) = ) ) β Q We an further verfy that N = at N = ( ) ( ) 2 n β + β + 4pmax 2 ( ), If N n, Q N < n [, N Q ), N > n (N, n ]. Hene Q s mnmzed at N = N and maxmzed at N = or N = n. If N < or N > n, Q has no loal maxmzer n (, n ) and attans ts maxmum { at border. } In both ases, we have Q max = max Q(), Q(n ) = { ( ) (n max (n ),β + ( ) n )pmax } β { Let k = max (n ), β + ( ( ) (n ) n )pmax } β, f the ondton n the theorem holds,.e., k <, we have J k <. The update defned n () s a ontraton. It admts a unque fxed pont and the update onverges to the fxed pont,.e., lm p t = p f t. Sne we have shown that < p t <, we have < p f <. Ths onludes our proof. Reall that our goal of the medum aess ontrol desgn s to enourage the players to operate stably at the soal optmal pont, to ths end, we mpose p = p f. The followng theorem s mmedate. Theorem 7: Under the ondton of Theorem 6, by tunng β and suh that p = p f, or p = ( p) n + β p ( ( p) n ), the proposed aggressve medum ontrol sheme s onvergent to the soal optmal pont, whh s also the non-based NE of the medum aess game wth prng. Theorem 6 and Theorem 7 provde gudelnes for hoosng parameters for aggressve MAC sheme. From Theorem 6, we an see that small and large β help the
7 7 network operate at a stable pont. Theorem 7 further quantfes and β to approah the stable onvergent pont to the soal optmal pont. As an example, f n s large (( n )n e ),, then = n + ɛ where ɛ s a postve small number, e.g. ɛ = O(n 2 ), β = nɛ (e ) s a possble settng. B. Medum Aess Control Sheme 2:Conservatve Control In ths seton, we propose a more onservatve medum aess ontrol sheme defned as: = p t f(p t ) ( p t j) + p mn ( p t j) (2) where f(p t ) = + p t δ, < p mn < <, < p mn δ p mn. We pose the above onstrant of δ to en- sure that wth any p mn p t, t holds that p mn p t f(pt ). One nterpretaton of the above update sheme s that at eah teraton player sets p to the mnmum value p mn wth probablty ( pt j ), whle nreases p by a fator f(p t ) otherwse. f(pt ) s speally desgned suh that f(p t ) = + δ at p mn, f(p t ) = at, < f(p t ) < + δ and s lnearly dereasng w.r.t. p t n (p mn, ). The nreasng fator s thus adaptable based on the urrent hannel aess probablty p t. If one teraton onssts of one slot, beomes the expeted hannel aess probablty of the followng update sheme: f the hannel s ouped by other players durng the last slot, then sets p to p mn for the omng slot; otherwse t nrease p by + δ. We refer ths sheme as the onservatve medum aess ontrol as players set the hannel aess probablty to the mnmum value one the hannel s sensed ouped by others. We next nvestgate the dynams under the above onservatve medum aess ontrol sheme. Theorem 8: If < δ p mn and (n )( ( ) p mn )( p mn ) n 2 δ + ( p mn ) n < p mn, the update sheme defned n (2) admts a unque fxed pont p f2 = {p f2 } and t holds that:) p mn < p f2 < ; 2) Startng from any ntal pont p where p mn < p <, the teraton defned by (2) onverges to p f2. Proof: We follow the same way as the proof of Theorem 6 by showng that the Jaoban for (2) J k <. To ths end, we ompute J j as ( ( p mn p t + δ p t )) p mn ( p t l) j J j = ( l N,l,l j + δ 2p t p mn ) l N,l ( p t l) = j Notng that < δ p mn, we an show that J = max N j N J j s maxmzed at p t =, p t j = p mn for j, we thus have J (n )( p mn )( p mn ) n 2 + ( ) δ ( p mn ) n p mn If the ondton n the theorem( holds,.e., k = ) (n )( p mn )( p mn ) n 2 δ + ( p mn p mn ) n <, J k <. (2) s a ontraton. Both the unqueness of the fxed pont and the onvergene are guaranteed. It s further easy to show that the fxed pont p mn < p f2 <. We then study the onvergene of the onservatve medum aess ontrol to the soal optmal pont. Theorem 9: Under the ondton of Theorem 8, by tunng δ, and ( p mn suh that p = p f2, or p = pf( p)( p) n + p ) mn ( p) n, the onservatve medum ontrol sheme s onvergent to the soal optmal pont. C. Medum Aess Control Sheme 3: Cheat-proof Control The above MAC protools have followng desrable propertes: ) they onsst of natural aess probablty update shemes for ratonal players; 2) they provde tunable parameters wth whh one an ontrol the onvergent pont of the network; 3) they lead the network to a stable state where both farness and soal optmalty are ensured; The above MAC protools meet the requrements for effent MAC protools n terms of performane. However, they both requre network partpants to respet the rules. Hene, they annot survve selfsh and nonooperatve envronments beause n suh envronments, players only adopt strateges that brng the most benefts to them, regardless of the fat that the adopted strategy leads to soal optmalty or not. In suh envronments, we an not mpltly assume that all partpants at ooperatvely by followng the desgned MAC protools. Under suh rumstane, we requre an effent MAC protool to be survvable suh that t an gude the ndvdual nodes to operate on the desgned optmal equlbrum even they are purely self-nterested and non-ooperatve. In other words, the MAC protool onssts of a set of strateges that eah selfsh ndvdual node has no nentve to devate. To ths end, we apply the prng tehnque agan. On one hand, the prng sheme approahes the non-based NE to the soal optmal pont; on the other hand, the prng sheme enourages the ndvdual selfsh players to follow the MAC protool. In the followng part of ths seton, we propose the heat-proof MAC protool. The above desrable propertes are mantaned n the heat-proof MAC protool. Moreover, the mposed prng funton an enourage the players to follow the proposed protool. The hannel aess probablty update sheme n the heat-proof MAC protool s defned as = ( p t j) + p mn ( p t j) (3)
8 8 One nterpretaton of the above update sheme s that at eah teraton player sets ts aess probablty p to wth probablty ( pt j ) and p mn otherwse. If one teraton orresponds to one slot, p t beomes the expeted hannel aess probablty of the followng update sheme: f the hannel s ouped by other players durng the last slot, then player sets p to p mn for the omng slot; otherwse t sets p to. In ths sheme, s deoupled wth p t, whh s a neessary ondton for the followng demonstraton. (3) an not only be regarded as the update sheme for the hannel aess probablty, but also be vewed as the strategy update that mpltly maxmzes some utlty funton, as studed n the followng theorem. Theorem : Regard (3) as the best response funton for eah player N at eah teraton, the underlyng utlty funton that eah player tres to maxmze s U C = (p p mn ( p mn ) 2 ( p j )) + C where C > max {( p mn ( p mn )( ) 2, ( ) 2 } ) n ( p mn )( p mn ) n s a onstant large enough to avod the negatve utlty value. Proof: The proof s straghtforward notng (3) an be wrtten as = p mn + ( p mn ) ( p t j) Reall that n G MAC, the utlty funton U s U = p ( p j ) p We mpose the followng prng funton τ (p ) = U C U = (p p mn ( p mn ) + C p ( p j ) p ( p j )) 2 Next we defne the non-ooperatve game wth the above prng funton as G C MACP : max U C (p, p ), p N The above proposed MAC sheme wth prng s heatproof n that the aess probablty update sheme orresponds to the best response strategy of G C MAC, thus a ratonal player wll follow (3) to maxmze ts payoff. The followng theorem establshes the exstene, unqueness of the NE n G C MACP and the onvergene to the unque NE under the heat-proof MAC sheme. Theorem : Under the ondton that (n )( p mn )( p mn ) n <, G C MACP admts a unque NE. Startng from any ntal pont p, the heat-proof MAC sheme s onvergent to the unque NE. Proof: We use the followng theorem n game theory onernng the unqueness of NE [4]: Lemma 3: If the best response funton s a ontraton, then the game admts a unque NE; Moreover, startng from any ntal pont, the teraton under the best response onverges to the unque NE. The above lemma shows that atually the NE onssts of the fxed pont of the best response funton. We now prove that the update sheme (3) s a ontraton. Ths an be shown by notng that { Jj C (pmax p = mn ) ( pt j ) j = j J C = (n )( p mn ) ( p t j) (n )( p mn )( p mn ) n < Thus (3) s a ontraton. The theorem s proven Furthermore, f the ondton n Theorem s satsfed, let p C = {p C } be the unque NE, we an show that p mn < p C <. The followng theorem studes the effeny of the unque NE of G C MAC. Theorem 2: If p = p mn + ( p mn )( p) n, the unque NE s effent,.e., p C = p. Theorem and 2 provde suffent ondton on the onvergene to the NE under (3), whh an be regarded as the best response update. One draw bak s that the best response update often leads to large flutuatons that may ause temporary system nstablty. We address ths ssue by studyng the subgradent update n G C MACP. By settng the step sze suffently small, the subgradent update sheme experenes a smooth trajetory. Theorem 3 gves the suffent ondton on the onvergene of the subgradent update to the NE of G C MACP. The proof follows the smlar way as that of Theorem 6 and s omtted here. Theorem 3: Consder the subgradent update for heatproof MAC sheme defned as = p t + λ U C p = p t 2λ p t p mn ( p mn ) ( p t j) under the same ondton as Theorem 2, the subgradent update sheme onverges to the unque NE. The above subgradent update sheme s atually a mld verson of the heat-proof MAC sheme n (3). By ontrollng the step sze λ, players experene less varaton n ther strateges than the best response update (3). The system s thus more stable. As pre, the onvergene delay nreases. D. Implementaton Issues In the pratal mplementaton of the proposed MAC protools, players usually do not have aess to the aess probablty of others, so they an not dretly alulate ( pt j ) whh s needed to update pt.
9 9 To solve ths problem, we apply the Idle Sense approah proposed n [9] allowng a player to estmate the hannel ondton by observng the average number of onseutve dle slots between two transmsson attempts. Let Pdle t = j N ( pt j ) be the probablty of an dle slot and n t dle be the number of average onseutve dle slots between two transmsson attempts durng teraton t, t holds that n t dle = P dle t Pdle t. It follows that ( p t j) = nt dle n t dle + p t. Thus eah player an update p t by observng n t dle. Another desrable feature of usng Idle Sense approah s that our MAC protools deouple aess ontrol from ollson perepton, thus are mmune to problems nurred by paket ollson perepton. Algorthm shows the derved heat-proof MAC protool. The aggressve and onservatve MAC protools an be derved smlarly. In the protool, a transmsson orresponds to an ouped hannel slot when only one player transmts (a suessful transmsson) or multple players transmt smultaneously (a ollson). Algorthm Cheat proof MAC Protool After eah transmsson do sum sum + n, ntrans ntrans + /* Idle sense: the player observes n dle slots before the transmsson */ f ntrans ntrans max then n t dle sum ntrans /* estmate nt dle */ n t dle p mn + ( p mn ) n t dle + p t /* update p */ sum, ntrans /* reset varables */ end f end In our work, we do not address how to realze the prng, whh s not trval at all. An approprate prng sheme n our ontext should be dstrbuted and heat-proof n ase where players may provde forged nformaton to get extra gan. In prevous part of ths seton, we have shown how to estmate ( pt j ) based on nt dle, whh s observable to all players. Next we provde a mehansm to estmate p t based on only observable nformaton. Ths s a rual ssue to mplement any prng sheme. The mehansm s extended from the Idle Sense approah. Let Pdle, t = ( pt j ) and nt dle, be the number of average onseutve dle slots between two transmssons durng teraton t, where -transmsson orresponds to an ouped hannel slot when only one player exept transmts or multple players transmt smultaneously. Pdle, t s n fat the probablty of the slot wth no -transmsson. It holds that n t dle, = P dle,. P dle, It follows that p t = P dle P dle, = nt dle, nt dle n t dle, ( + Hene, nt dle ). p t an be estmated based on nt dle whh s observable to all players, and n t dle, whh s observable to all players exept ( knows p t ). By employng the above mehansm, the prng sheme an be realzed n a dstrbuted and heat-proof way based on only observable nformaton. E. Methodology for Effent MAC Protool Desgn Based on the analyss on the medum aess game and the three proposed MAC protools, we ntrodue the followng methodology for desgnng effent MAC protools for non-ooperatve and selfsh envronments:. Choosng a natural hannel aess update sheme; 2. Confgurng the parameters n the hosen update sheme to ensure that the network onverges to the global optmal pont under the update sheme; 3. Dervng approprate prng funtons based on observable nformaton suh that no player has nentve to devate from the desgned MAC protool. We beleve that the proposed methodology not only provdes a general way of desgnng stable and ontrollable MAC protools ahevng hgh performane even n selfsh envronments, but also provdes a general framework that an be extended to desgn effent protools n other non-ooperatve and selfsh envronments. IX. Numeral Results In ths seton, we provde numeral results on the performane of the proposed MAC protools. Frst, we onsder a network of nodes. We set =.25, ntrans max =. We alulate the soal optmal pont to be p =.58. Based on Theorem 6 and Theorem 7, we set =.8, β =.33. The orrespondent aggressve MAC protool leads the network to the soal optmal pont. Smlarly, for the onservatve MAC protool, we set δ =.33, =.8, p mn =.5. For the heat-proof MAC protool, we set p mn =. and =.5. Under these parameter settngs, based on our analytal model, the network onverges to the soal optmal pont under the proposed three MAC protools. Ths s onfrmed by the numeral result shown n Fgure 7-9, whh plot the hannel aess probablty trajetores of eah player. Fgure plots the trajetores of the aess probablty under subgradent update, a mld verson of the heat-proof MAC protool. The trajetory onverges n a smoother way wth longer onvergene delay. hannel aess probablty Fg teraton Aggressve MAC hannel aess probablty Fg teraton Conservatve MAC We then fous on the heat-proof MAC protool. In the protool mplementaton, the number of network partpants n s requred to onfgure the protool parameters.
10 hannel aess probablty teraton Fg. 9. Cheat-proof MAC Fg.. Cheat-proof MAC: mld verson We now study the mpat of the estmaton error of n on the protool performane by allowng ertan estmaton error on n and studyng the performane under suh estmaton error. Fgure plots U at /U opt under estmaton error % 5%, where U at s the atual global utlty wth estmaton error, U opt s the optmal global utlty wthout error. We an see that our protool s qute robust n that the global utlty does not degrade dramatally w.r.t. the estmaton error of n, even when the estmaton error reahes 5%. Ths s a dsable feature when runnng the protool n dynamal envronments. U at /U opt est err=%.6 est err=3%.5 est err=5% hannel aess probablty n Fg. 2. Fg.. Cheat-proof MAC: performane wth estmaton error of n aggregated utlty teraton exponental bakoff heat-proof MAC X N U as funton of Fnally, we ompare the performane of our protool wth the EB based MAC protool wdely employed n nowadays WLANs. We set n = 5, =.. Sne the performane of the EB protool hghly depends on and p mn, we smulate the EB protool wth dfferent and p mn values and plot the maxmum aggregated utlty wth the aggregated utlty aheved by the heat-proof protool n Fgure 2. We also ompares the farness of the two protools by plottng the normalzed Jan farness ndex [2] n Fgure 3. We an see that our protool aheves hgher utlty wth better short-term farness. The result s due to the fat that the EB protool reles on an neffent ollson resoluton mehansm whh auses both network sub-optmalty on performane and the short-term farness problem. However, the heat-proof MAC protool deouples the aess ontrol from ollson perepton and players have muh less varaton n hannel aess probablty around the soal optmal pont. Hene t s not surprsng that the proposed MAC protool outperforms the EB protool n both performane and farness. X. Conluson and Future Work In ths paper, we address the queston that how to desgn effent MAC protools n selfsh and non-ooperatve networks, whh s rual n nowadays open envronments. To ths end, we ondut an n-depth study on the medum Jan ndex Fg heat-proof MAC.2 exponental bakoff normalzed wndow sze Farness omparson aess ontrol under game theoretal framework. Three MAC protools, the aggressve, the onservatve and the heat-proof MAC protools, are then proposed wth tunable parameters allowng them to onverge to desred optmal pont. The frst two MAC protools requre network partpants to follow the rules, whle the heat-proof MAC protool an survve the selfsh envronments where nodes are purely self-nterested. Based on our game theoretal analyss, we provde a general methodology for desgnng effent MAC protools for non-ooperatve and selfsh envronments. We beleve that the proposed methodology not only provdes a general way of desgnng stable and ontrollable MAC protools ahevng hgh performane even n selfsh envronments, but also provdes a general framework that an be extended to desgn effent protools n other non-ooperatve and selfsh envronments. As future work, we plan to develop a general pratal prng sheme to gude selfsh players at ooperatvely. Another dreton s to apply the methodology proposed n ths paper to the network and transport layers. Referenes [] L. Chen, S. H. Low and J. C. Doyle, Random aess game and medum aess ontrol desgn, Tehnal Report, hen/papers/rama.pdf [2] A. Tang, J.-W. Lee, J. Huang, M. Chang and A. R. Calderbank, Reverse Engneerng MAC, Workshop on Modelng and Optmzaton n Moble, Ad Ho and Wreless Networks (WOpt), Boston, Massahusetts, Aprl 26 [3] J.B. Rosen, Exstene and unqueness of equlbrum ponts for onave n-person games. Eonometra, vol. 33, July 965. [4] E. Anell and E.J.S. Carrera, Contraton of Best Response Funtons and Unqueness of Nash-Cournot Equlbrum (November 25). Avalable at SSRN: [5] A.B. MaKenze and S. B. Wher, Stablty of Multpaket Slotted Aloha wth Selfsh Users and Perfet Informaton. In Pro IEEE INFOCOM, 23. [6] Y. Jn, G. Kesds, Equlbra of a nonooperatve game for heterogeneous users of an ALOHA network. IEEE Comm. Letters, vol. 6, 22. [7] G. Tan, J. Guttag, The 82. MAC protool leads to neffent equlbra. In Pro IEEE INFOCOM, 25 [8] M. Cagalj, S. Ganerwal, I. Aad and J.-P. Hubaux, On Selfsh Behavor n CSMA/CA Networks. IEEE INFOCOM, 25. [9] M. Heusse, F. Rousseau, R. Guller and A. Dula, Idle sense: An optmal aess method for hgh throughput and farness n rate dverse wreless LANS, Pro. ACM Sgomm, 25. [] J.-W. Lee, M. Chang, and A. R. Calderbank, Utlty-optmal medum aess ontrol reverse and forward engneerng, IEEE Inforom 26, Apr. 26. [] J.-W. Lee, M. Chang and R. A. Calderbank, Utlty-optmal random aess ontrol, to appear n IEEE Trans. Wreless Comm., 27. [2] R. Jan,D. Chu,an d W. Hawe. A Quanttatve Measure of Farness and Dsrmnaton for Resoure Alloaton n Shared Computer Systems, DEC Researh Report TR-3, 984.
Controller Design for Networked Control Systems in Multiple-packet Transmission with Random Delays
Appled Mehans and Materals Onlne: 03-0- ISSN: 66-748, Vols. 78-80, pp 60-604 do:0.408/www.sentf.net/amm.78-80.60 03 rans eh Publatons, Swtzerland H Controller Desgn for Networed Control Systems n Multple-paet
More informationIncentivizing High-quality Content from Heterogeneous Users
Inentvzng Hgh-qualty Content from Heterogeneous Users Inentvzng Hgh-qualty Content from Heterogeneous Users Ynge Xa Unversty of Sene and Tehnology of Chna, Hefe, Chna, 230027 Tao Qn Mrosoft esearh, Bejng,
More informationBrander and Lewis (1986) Link the relationship between financial and product sides of a firm.
Brander and Lews (1986) Lnk the relatonshp between fnanal and produt sdes of a frm. The way a frm fnanes ts nvestment: (1) Debt: Borrowng from banks, n bond market, et. Debt holders have prorty over a
More informationAssortment Optimization under MNL
Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.
More informationWhich Protocol? Mutual Interaction of Heterogeneous Congestion Controllers
Whh Protool? Mutual Interaton of Heterogeneous Congeston Controllers Vnod Ramaswamy, Dganto Choudhury, and Srnvas Shakkotta Dept of ECE, Texas A&M Unversty, Emal: {vnod83, dhoudhury, sshakkot}@tamuedu
More informationMachine Learning: and 15781, 2003 Assignment 4
ahne Learnng: 070 and 578, 003 Assgnment 4. VC Dmenson 30 onts Consder the spae of nstane X orrespondng to all ponts n the D x, plane. Gve the VC dmenson of the followng hpothess spaes. No explanaton requred.
More informationECE559VV Project Report
ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate
More informationJSM Survey Research Methods Section. Is it MAR or NMAR? Michail Sverchkov
JSM 2013 - Survey Researh Methods Seton Is t MAR or NMAR? Mhal Sverhkov Bureau of Labor Statsts 2 Massahusetts Avenue, NE, Sute 1950, Washngton, DC. 20212, Sverhkov.Mhael@bls.gov Abstrat Most methods that
More informationPhase Transition in Collective Motion
Phase Transton n Colletve Moton Hefe Hu May 4, 2008 Abstrat There has been a hgh nterest n studyng the olletve behavor of organsms n reent years. When the densty of lvng systems s nreased, a phase transton
More informationSTK4900/ Lecture 4 Program. Counterfactuals and causal effects. Example (cf. practical exercise 10)
STK4900/9900 - Leture 4 Program 1. Counterfatuals and ausal effets 2. Confoundng 3. Interaton 4. More on ANOVA Setons 4.1, 4.4, 4.6 Supplementary materal on ANOVA Example (f. pratal exerse 10) How does
More informationFAULT DETECTION AND IDENTIFICATION BASED ON FULLY-DECOUPLED PARITY EQUATION
Control 4, Unversty of Bath, UK, September 4 FAUL DEECION AND IDENIFICAION BASED ON FULLY-DECOUPLED PARIY EQUAION C. W. Chan, Hua Song, and Hong-Yue Zhang he Unversty of Hong Kong, Hong Kong, Chna, Emal:
More informationWhich Protocol? Mutual Interaction of Heterogeneous Congestion Controllers. Vinod Ramaswamy, Diganto Choudhury and Srinivas Shakkottai Member, IEEE
Whh Protool? Mutual Interaton of Heterogeneous Congeston Controllers Vnod Ramaswamy, Dganto Choudhury and Srnvas Shakkotta Member, IEEE Abstrat A large number of ongeston ontrol protools have been proposed
More informationEdge Isoperimetric Inequalities
November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary
More informationTHE mandatory distributed coordination function (DCF) in
4 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 6, NO. 6, JUNE 7 A Dstrbuted Channel Aess Sheme wth Guaranteed Prorty and Enhaned Farness Ha Jang, Member, IEEE, Png Wang, and Wehua Zhuang, Senor Member,
More informationSocially-aware Multiagent Learning towards Socially Optimal Outcomes
Soally-aware Multagent Learnng towards Soally Optmal Outomes Xaohong L and hengwe Zhang and Janye Hao and Karl Tuyls and Sq hen 3 Abstrat. In multagent envronments, the apablty of learnng s mportant for
More informationResearch on dynamic adjustment of cooperation in price duopoly game
3rd Internatonal Conferene on Mehatrons and Informaton Tehnology (ICMIT 06 Researh on dynam adjustment of ooeraton n re duooly game Gung ShaDehang XabYujng gao3bentu L4dDehua Wang5e 345 Shandong Voatonal
More informationHorizontal mergers for buyer power. Abstract
Horzontal mergers for buyer power Ramon Faul-Oller Unverstat d'alaant Llus Bru Unverstat de les Illes Balears Abstrat Salant et al. (1983) showed n a Cournot settng that horzontal mergers are unproftable
More informationThe Second Anti-Mathima on Game Theory
The Second Ant-Mathma on Game Theory Ath. Kehagas December 1 2006 1 Introducton In ths note we wll examne the noton of game equlbrum for three types of games 1. 2-player 2-acton zero-sum games 2. 2-player
More informationProblem Set 9 Solutions
Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem
More informationCOS 521: Advanced Algorithms Game Theory and Linear Programming
COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton
More informationA Game-Theoretic Framework for Medium Access Control
IEEE JOURNAL ON SELECTED AREAS OF COMMUNICATIONS, VOL. XX, NO. XX, DECEMBER 28 A Game-Theoretc Framework for Medum Access Control Tao Cu, Ljun Chen, Member, IEEE, and Steven H. Low, Fellow, IEEE Abstract
More informationCS286r Assign One. Answer Key
CS286r Assgn One Answer Key 1 Game theory 1.1 1.1.1 Let off-equlbrum strateges also be that people contnue to play n Nash equlbrum. Devatng from any Nash equlbrum s a weakly domnated strategy. That s,
More informationFree-riding Analysis Via Dynamic Game with Incomplete Information
Avalable onlne at www.senedret.om Proeda Computer Sene 9 (2012 ) 1345 1353 Internatonal Conferene on Computatonal Sene, ICCS 2012 Free-rdng Analyss Va Dynam Game wth Inomplete Informaton Guo-yong Ca, Guo-bn
More informationDynamics of social networks (the rise and fall of a networked society)
Dynams of soal networks (the rse and fall of a networked soety Matteo Marsl, ICTP Treste Frantsek Slanna, Prague, Fernando Vega-Redondo, Alante Motvaton & Bakground Soal nteraton and nformaton Smple model
More informationSome modelling aspects for the Matlab implementation of MMA
Some modellng aspects for the Matlab mplementaton of MMA Krster Svanberg krlle@math.kth.se Optmzaton and Systems Theory Department of Mathematcs KTH, SE 10044 Stockholm September 2004 1. Consdered optmzaton
More informationOnline Appendix. t=1 (p t w)q t. Then the first order condition shows that
Artcle forthcomng to ; manuscrpt no (Please, provde the manuscrpt number!) 1 Onlne Appendx Appendx E: Proofs Proof of Proposton 1 Frst we derve the equlbrum when the manufacturer does not vertcally ntegrate
More informationEconomics 101. Lecture 4 - Equilibrium and Efficiency
Economcs 0 Lecture 4 - Equlbrum and Effcency Intro As dscussed n the prevous lecture, we wll now move from an envronment where we looed at consumers mang decsons n solaton to analyzng economes full of
More informationThe corresponding link function is the complementary log-log link The logistic model is comparable with the probit model if
SK300 and SK400 Lnk funtons for bnomal GLMs Autumn 08 We motvate the dsusson by the beetle eample GLMs for bnomal and multnomal data Covers the followng materal from hapters 5 and 6: Seton 5.6., 5.6.3,
More informationprinceton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg
prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there
More informationLecture Notes on Linear Regression
Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume
More informationHorizontal Mergers for Buyer Power
Horzontal Mergers for Buyer Power Lluís Bru a and Ramon Faulí-Oller b* Marh, 004 Abstrat: Salant et al. (1983) showed n a Cournot settng that horzontal mergers are unproftable beause outsders reat by nreasng
More informationLecture 4. Instructor: Haipeng Luo
Lecture 4 Instructor: Hapeng Luo In the followng lectures, we focus on the expert problem and study more adaptve algorthms. Although Hedge s proven to be worst-case optmal, one may wonder how well t would
More informationChapter Newton s Method
Chapter 9. Newton s Method After readng ths chapter, you should be able to:. Understand how Newton s method s dfferent from the Golden Secton Search method. Understand how Newton s method works 3. Solve
More informationClustering. CS4780/5780 Machine Learning Fall Thorsten Joachims Cornell University
Clusterng CS4780/5780 Mahne Learnng Fall 2012 Thorsten Joahms Cornell Unversty Readng: Mannng/Raghavan/Shuetze, Chapters 16 (not 16.3) and 17 (http://nlp.stanford.edu/ir-book/) Outlne Supervsed vs. Unsupervsed
More informationCHAPTER 17 Amortized Analysis
CHAPTER 7 Amortzed Analyss In an amortzed analyss, the tme requred to perform a sequence of data structure operatons s averaged over all the operatons performed. It can be used to show that the average
More informationCalculation of time complexity (3%)
Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add
More informationVoltammetry. Bulk electrolysis: relatively large electrodes (on the order of cm 2 ) Voltammetry:
Voltammetry varety of eletroanalytal methods rely on the applaton of a potental funton to an eletrode wth the measurement of the resultng urrent n the ell. In ontrast wth bul eletrolyss methods, the objetve
More informationOutline. Clustering: Similarity-Based Clustering. Supervised Learning vs. Unsupervised Learning. Clustering. Applications of Clustering
Clusterng: Smlarty-Based Clusterng CS4780/5780 Mahne Learnng Fall 2013 Thorsten Joahms Cornell Unversty Supervsed vs. Unsupervsed Learnng Herarhal Clusterng Herarhal Agglomeratve Clusterng (HAC) Non-Herarhal
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationfind (x): given element x, return the canonical element of the set containing x;
COS 43 Sprng, 009 Dsjont Set Unon Problem: Mantan a collecton of dsjont sets. Two operatons: fnd the set contanng a gven element; unte two sets nto one (destructvely). Approach: Canoncal element method:
More informationCollege of Computer & Information Science Fall 2009 Northeastern University 20 October 2009
College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:
More informationSome Results on the Counterfeit Coins Problem. Li An-Ping. Beijing , P.R.China Abstract
Some Results on the Counterfet Cons Problem L An-Png Bejng 100085, P.R.Chna apl0001@sna.om Abstrat We wll present some results on the ounterfet ons problem n the ase of mult-sets. Keywords: ombnatoral
More information2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification
E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton
More informationComplement of an Extended Fuzzy Set
Internatonal Journal of Computer pplatons (0975 8887) Complement of an Extended Fuzzy Set Trdv Jyot Neog Researh Sholar epartment of Mathemats CMJ Unversty, Shllong, Meghalaya usmanta Kumar Sut ssstant
More informationprinceton univ. F 13 cos 521: Advanced Algorithm Design Lecture 3: Large deviations bounds and applications Lecturer: Sanjeev Arora
prnceton unv. F 13 cos 521: Advanced Algorthm Desgn Lecture 3: Large devatons bounds and applcatons Lecturer: Sanjeev Arora Scrbe: Today s topc s devaton bounds: what s the probablty that a random varable
More informationInterval Valued Neutrosophic Soft Topological Spaces
8 Interval Valued Neutrosoph Soft Topologal njan Mukherjee Mthun Datta Florentn Smarandah Department of Mathemats Trpura Unversty Suryamannagar gartala-7990 Trpura Indamal: anjan00_m@yahooon Department
More informationGeneralized Linear Methods
Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set
More informationMarkov Chain Monte Carlo Lecture 6
where (x 1,..., x N ) X N, N s called the populaton sze, f(x) f (x) for at least one {1, 2,..., N}, and those dfferent from f(x) are called the tral dstrbutons n terms of mportance samplng. Dfferent ways
More informationGeneral Nonlinear Programming (NLP) Software
General Nonlnear Programmng NLP Software CAS 737 / CES 735 Krstn Daves Hamd Ghaffar Alberto Olvera-Salazar Vou Chs January 2 26 Outlne Intro to NLP Eamnaton of: IPOPT PENNON CONOPT LOQO KNITRO Comparson
More informationTradable Emission Permits Regulations: The Role of Product Differentiation
Internatonal Journal of Busness and Eonoms, 005, Vol. 4, No. 3, 49-6 radable Emsson Permts Regulatons: he Role of Produt Dfferentaton Sang-Ho Lee * Department of Eonoms, Chonnam Natonal Unversty, Korea
More informationCHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE
CHAPTER 5 NUMERICAL EVALUATION OF DYNAMIC RESPONSE Analytcal soluton s usually not possble when exctaton vares arbtrarly wth tme or f the system s nonlnear. Such problems can be solved by numercal tmesteppng
More informationEEE 241: Linear Systems
EEE : Lnear Systems Summary #: Backpropagaton BACKPROPAGATION The perceptron rule as well as the Wdrow Hoff learnng were desgned to tran sngle layer networks. They suffer from the same dsadvantage: they
More informationComputing Correlated Equilibria in Multi-Player Games
Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,
More informationSection 8.3 Polar Form of Complex Numbers
80 Chapter 8 Secton 8 Polar Form of Complex Numbers From prevous classes, you may have encountered magnary numbers the square roots of negatve numbers and, more generally, complex numbers whch are the
More informationPOWER ON DIGRAPHS. 1. Introduction
O P E R A T I O N S R E S E A R H A N D D E I S I O N S No. 2 216 DOI: 1.5277/ord1627 Hans PETERS 1 Judth TIMMER 2 Rene VAN DEN BRINK 3 POWER ON DIGRAPHS It s assumed that relatons between n players are
More informationWelfare Properties of General Equilibrium. What can be said about optimality properties of resource allocation implied by general equilibrium?
APPLIED WELFARE ECONOMICS AND POLICY ANALYSIS Welfare Propertes of General Equlbrum What can be sad about optmalty propertes of resource allocaton mpled by general equlbrum? Any crteron used to compare
More informationChapter 13: Multiple Regression
Chapter 13: Multple Regresson 13.1 Developng the multple-regresson Model The general model can be descrbed as: It smplfes for two ndependent varables: The sample ft parameter b 0, b 1, and b are used to
More informationSupplement: Proofs and Technical Details for The Solution Path of the Generalized Lasso
Supplement: Proofs and Techncal Detals for The Soluton Path of the Generalzed Lasso Ryan J. Tbshran Jonathan Taylor In ths document we gve supplementary detals to the paper The Soluton Path of the Generalzed
More informationEndogenous timing in a mixed oligopoly consisting of a single public firm and foreign competitors. Abstract
Endogenous tmng n a mxed olgopoly consstng o a sngle publc rm and oregn compettors Yuanzhu Lu Chna Economcs and Management Academy, Central Unversty o Fnance and Economcs Abstract We nvestgate endogenous
More informationStanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011
Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected
More informationLecture 4: November 17, Part 1 Single Buffer Management
Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input
More informationPricing and Resource Allocation Game Theoretic Models
Prcng and Resource Allocaton Game Theoretc Models Zhy Huang Changbn Lu Q Zhang Computer and Informaton Scence December 8, 2009 Z. Huang, C. Lu, and Q. Zhang (CIS) Game Theoretc Models December 8, 2009
More informationOn Adaptive Control of Simulated Moving Bed Plants. Plants Using Comsol s Simulink Interface. Speaker: Marco Fütterer
daptve Smulated Movng ed Plants Usng Comsol s Smulnk Interfae Speaker: Maro Fütterer Insttut für utomatserungstehnk Otto-von-Guerke Unverstät Unverstätsplatz, D-39106 Magdeburg Germany e-mal: maro.fuetterer@ovgu.de
More information(1 ) (1 ) 0 (1 ) (1 ) 0
Appendx A Appendx A contans proofs for resubmsson "Contractng Informaton Securty n the Presence of Double oral Hazard" Proof of Lemma 1: Assume that, to the contrary, BS efforts are achevable under a blateral
More informationSolutions to exam in SF1811 Optimization, Jan 14, 2015
Solutons to exam n SF8 Optmzaton, Jan 4, 25 3 3 O------O -4 \ / \ / The network: \/ where all lnks go from left to rght. /\ / \ / \ 6 O------O -5 2 4.(a) Let x = ( x 3, x 4, x 23, x 24 ) T, where the varable
More informationCharged Particle in a Magnetic Field
Charged Partle n a Magnet Feld Mhael Fowler 1/16/08 Introduton Classall, the fore on a harged partle n eletr and magnet felds s gven b the Lorentz fore law: v B F = q E+ Ths velot-dependent fore s qute
More informationOutline and Reading. Dynamic Programming. Dynamic Programming revealed. Computing Fibonacci. The General Dynamic Programming Technique
Outlne and Readng Dynamc Programmng The General Technque ( 5.3.2) -1 Knapsac Problem ( 5.3.3) Matrx Chan-Product ( 5.3.1) Dynamc Programmng verson 1.4 1 Dynamc Programmng verson 1.4 2 Dynamc Programmng
More informationA Game Theoretic Approach to Distributed Opportunistic Scheduling
A Game Theoretc Approach to Dstrbuted Opportunstc Schedulng Albert Banchs, Senor Member, IEEE, Andres Garca-Saavedra, Pablo Serrano, Member, IEEE, and Joerg Wdmer, Senor Member, IEEE. Banchs et al.: A
More informationOn High Spatial Reuse Broadcast Scheduling in STDMA Wireless Ad Hoc Networks
On Hgh Spatal Reuse Broadast Shedulng n STDMA Wreless Ad Ho Networks Ashutosh Deepak Gore Abhay Karandkar Informaton Networks Laboratory Department of Eletral Engneerng Indan Insttute of Tehnology - Bombay
More informationModeling Mobility-Assisted Data Collection in Wireless Sensor Networks
Modelng Moblty-Asssted Data Colleton n Wreless Sensor Networks Hsham M. Almasaed and Ahmed E. Kamal Dept. of Eletral and Computer Eng., Iowa State Unversty, Ames, IA 11, USA E-mal:{hsham,kamal}@astate.edu
More informationAdaptive Multilayer Neural Network Control of Blood Pressure
Proeedng of st Internatonal Symposum on Instrument Sene and Tenology. ISIST 99. P4-45. 999. (ord format fle: ISIST99.do) Adaptve Multlayer eural etwork ontrol of Blood Pressure Fe Juntao, Zang bo Department
More informationPrice discrimination
1 Pre dsrmnaton Types of pre dsrmnaton The (ambguous welfare effets of pre dsrmnaton Parallel mports: not justfed the EU per se prohbton of lauses whh preent parallel mports. Pre dsrmnaton as monopolsaton
More informationNotes on Frequency Estimation in Data Streams
Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to
More informationMMA and GCMMA two methods for nonlinear optimization
MMA and GCMMA two methods for nonlnear optmzaton Krster Svanberg Optmzaton and Systems Theory, KTH, Stockholm, Sweden. krlle@math.kth.se Ths note descrbes the algorthms used n the author s 2007 mplementatons
More informationLecture 3: Probability Distributions
Lecture 3: Probablty Dstrbutons Random Varables Let us begn by defnng a sample space as a set of outcomes from an experment. We denote ths by S. A random varable s a functon whch maps outcomes nto the
More informationOn the Multicriteria Integer Network Flow Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of
More informationUniform Price Mechanisms for Threshold Public Goods Provision with Private Value Information: Theory and Experiment
Unform Pre Mehansms for Threshold Publ Goods Provson wth Prvate Value Informaton: Theory and Experment Zh L *, Chrstopher Anderson, and Stephen Swallow Abstrat Ths paper ompares two novel unform pre mehansms
More informationPerformance Modeling of Hierarchical Memories
Performane Modelng of Herarhal Memores Marwan Sleman, Lester Lpsky, Kshor Konwar Department of omputer Sene and Engneerng Unversty of onnetut Storrs, T 0669-55 Emal: {marwan, lester, kshor}@engr.uonn.edu
More informationELG4179: Wireless Communication Fundamentals S.Loyka. Frequency-Selective and Time-Varying Channels
Frequeny-Seletve and Tme-Varyng Channels Ampltude flutuatons are not the only effet. Wreless hannel an be frequeny seletve (.e. not flat) and tmevaryng. Frequeny flat/frequeny-seletve hannels Frequeny
More informationEmbedded Systems Development
Embedded Systems Development Leture eal-tme Shedulng Dr. Danel Kästner AbsInt Angewandte Informat GmbH aestner@absnt.om Leture Evaluaton Please do leture evaluaton Deadlne tomorrow! http://www.lx.un-saarland.de
More information1 Convex Optimization
Convex Optmzaton We wll consder convex optmzaton problems. Namely, mnmzaton problems where the objectve s convex (we assume no constrants for now). Such problems often arse n machne learnng. For example,
More informationVQ widely used in coding speech, image, and video
at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng
More informationBézier curves. Michael S. Floater. September 10, These notes provide an introduction to Bézier curves. i=0
Bézer curves Mchael S. Floater September 1, 215 These notes provde an ntroducton to Bézer curves. 1 Bernsten polynomals Recall that a real polynomal of a real varable x R, wth degree n, s a functon of
More informationSplit alignment. Martin C. Frith April 13, 2012
Splt algnment Martn C. Frth Aprl 13, 2012 1 Introducton Ths document s about algnng a query sequence to a genome, allowng dfferent parts of the query to match dfferent parts of the genome. Here are some
More informationStat 543 Exam 2 Spring 2016
Stat 543 Exam 2 Sprng 2016 I have nether gven nor receved unauthorzed assstance on ths exam. Name Sgned Date Name Prnted Ths Exam conssts of 11 questons. Do at least 10 of the 11 parts of the man exam.
More informationDOAEstimationforCoherentSourcesinBeamspace UsingSpatialSmoothing
DOAEstmatonorCoherentSouresneamspae UsngSpatalSmoothng YnYang,ChunruWan,ChaoSun,QngWang ShooloEletralandEletronEngneerng NanangehnologalUnverst,Sngapore,639798 InsttuteoAoustEngneerng NorthwesternPoltehnalUnverst,X
More informationPsychology 282 Lecture #24 Outline Regression Diagnostics: Outliers
Psychology 282 Lecture #24 Outlne Regresson Dagnostcs: Outlers In an earler lecture we studed the statstcal assumptons underlyng the regresson model, ncludng the followng ponts: Formal statement of assumptons.
More informationResource Allocation with Flexible Channel Cooperation in Cognitive Radio Networks
Resoure Alloaton wth Flexble Channel Cooperaton n Cogntve Rado Networks Hong Xu, Student Member, IEEE, Baohun L, Senor Member, IEEE Abstrat We study the resoure alloaton problem n an OFDMA based ooperatve
More informationTHE ARIMOTO-BLAHUT ALGORITHM FOR COMPUTATION OF CHANNEL CAPACITY. William A. Pearlman. References: S. Arimoto - IEEE Trans. Inform. Thy., Jan.
THE ARIMOTO-BLAHUT ALGORITHM FOR COMPUTATION OF CHANNEL CAPACITY Wllam A. Pearlman 2002 References: S. Armoto - IEEE Trans. Inform. Thy., Jan. 1972 R. Blahut - IEEE Trans. Inform. Thy., July 1972 Recall
More informationResource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud
Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal
More informationk t+1 + c t A t k t, t=0
Macro II (UC3M, MA/PhD Econ) Professor: Matthas Kredler Fnal Exam 6 May 208 You have 50 mnutes to complete the exam There are 80 ponts n total The exam has 4 pages If somethng n the queston s unclear,
More informationMaximizing Overlap of Large Primary Sampling Units in Repeated Sampling: A comparison of Ernst s Method with Ohlsson s Method
Maxmzng Overlap of Large Prmary Samplng Unts n Repeated Samplng: A comparson of Ernst s Method wth Ohlsson s Method Red Rottach and Padrac Murphy 1 U.S. Census Bureau 4600 Slver Hll Road, Washngton DC
More informationLecture 20: November 7
0-725/36-725: Convex Optmzaton Fall 205 Lecturer: Ryan Tbshran Lecture 20: November 7 Scrbes: Varsha Chnnaobreddy, Joon Sk Km, Lngyao Zhang Note: LaTeX template courtesy of UC Berkeley EECS dept. Dsclamer:
More informationStat 543 Exam 2 Spring 2016
Stat 543 Exam 2 Sprng 206 I have nether gven nor receved unauthorzed assstance on ths exam. Name Sgned Date Name Prnted Ths Exam conssts of questons. Do at least 0 of the parts of the man exam. I wll score
More informationGame Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India February 2008
Game Theory Lecture Notes By Y. Narahar Department of Computer Scence and Automaton Indan Insttute of Scence Bangalore, Inda February 2008 Chapter 10: Two Person Zero Sum Games Note: Ths s a only a draft
More information4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA
4 Analyss of Varance (ANOVA) 5 ANOVA 51 Introducton ANOVA ANOVA s a way to estmate and test the means of multple populatons We wll start wth one-way ANOVA If the populatons ncluded n the study are selected
More informationNumerical Heat and Mass Transfer
Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and
More informationOn the unconditional Security of QKD Schemes quant-ph/
On the unondtonal Seurty of QKD Shemes quant-ph/9953 alk Outlne ntroduton to Quantum nformaton he BB84 Quantum Cryptosystem ve s attak Boundng ve s nformaton Seurty and Relalty Works on Seurty C.A. Fuhs
More informationAPPENDIX A Some Linear Algebra
APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,
More informationEstimation: Part 2. Chapter GREG estimation
Chapter 9 Estmaton: Part 2 9. GREG estmaton In Chapter 8, we have seen that the regresson estmator s an effcent estmator when there s a lnear relatonshp between y and x. In ths chapter, we generalzed the
More information