Perturbation Analysis and Optimization of Stochastic Flow Networks

Size: px
Start display at page:

Download "Perturbation Analysis and Optimization of Stochastic Flow Networks"

Transcription

1 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. XX, NO. Y, MMM Perturbation Analysis an Optimization of Stochastic Flow Networks Gang Sun, Christos G. Cassanras, Yorai Wari, Christos G. Panayiotou, an George Riley Abstract We consier a Stochastic Flui Moel (SFM) of a network consisting of several single-class noes in tanem an perform perturbation analysis for the noe queue contents an associate event times with respect to a threshol parameter at the first noe. We then erive Infinitesimal Perturbation Analysis (IPA) erivative estimators for loss an buffer occupancy performance metrics with respect to this parameter an show that these estimators are unbiase. We also show that the estimators epen only on ata irectly observable from a sample path of the actual unerlying iscrete event system, without any knowlege of the stochastic characteristics of the ranom processes involve. This reners them computable in on-line environments an easily implementable for network management an optimization. This is illustrate by combining the IPA estimators with stanar graient base stochastic optimization methos an proviing simulation examples. Keywors Infinitesimal Perturbation Analysis, Stochastic Flui Moels, Non-linear Optimization. I. Introuction Stochastic Flui Moels (SFM) have recently been aopte as an alternative moeling paraigm to queueing networks for telecommunication applications, as well as other complex iscrete event systems. Introuce in [1] an then in [2] for the purpose of analysis, flui moels have also been consiere for simulation an control [3],[4],[5],[6],[7],[8],[9]. Using this moeling framework, a new approach for network congestion management has been propose, base on Infinitesimal Perturbation Analysis (IPA) [10],[11],[12],[13]. The cornerstone of this approach is the on-line estimation of graients (sensitivities) of certain congestion-relate performance measures (e.g., loss rates, average buffer levels) as functions of various controllable parameters. These graient estimates are use in conjunction with stanar stochastic approximation algorithms to optimize the parameter settings. As operating conitions change, the graient estimates change, therefore, this approach aims at continuously seeking to optimize The work of G. Sun an C.G. Cassanras was supporte in part by the National Science Founation uner Grants ACI , by AFOSR uner contract F , an by ARO uner grant DAAD The work of Y. Wari was supporte in part by the National Science Founation uner grant DMI an by DARPA uner contract F G. Sun an C.G. Cassanras are with the Dept. of Manufacturing Engineering, Boston University, MA gsun@bu.eu, cgc@bu.eu. Y. Wari is with the School of Electrical Engineering, Georgia Institute of Technology, Atlanta, GA. wari@ee.gatech.eu C.G. Panayiotou is with the Dept. of Electrical an Computer Engineering, University of Cyprus, Nicosia, Cyprus. christosp@ucy.ac.cy. G. Riley is with the School of Electr. an Computer Engin., Georgia Institute of Technology, Atlanta, GA. riley@ece.gatech.eu a generally time-varying performance metric. All work to ate has been limite to a single noe SFM. In this paper, we exten the approach to networks of noes connecte in tanem an, in the process, stuy how a buffer level perturbation in one noe in a network can propagate to other noes an how local congestion control may affect the rest of a network. To ate, many implementations of network control mechanisms have relie on ajusting traffic parameters (e.g., inflow rates) by monitoring an measuring certain performance measures (e.g., average buffer levels, elay jitter, an loss rates). Arguably, control algorithms that rely on both performance measures an their graients with respect to controllable parameters will perform better. In fact, some erivative-base congestion control algorithms have been propose in [14],[15]. Our approach is centere aroun the on-line estimation of such erivatives an it relies on the use of IPA. IPA has been evelope in the general setting of Discrete Event Dynamic Systems (DEDS), an queueing moels in particular. However, in the setting of queueing networks, IPA cannot usually provie unbiase graient estimators outsie the realm of simple moels with a single customer class, infinite buffers, an stateinepenent routing [16],[17]. These limitations exclue many telecommunication application features such as ifferentiate services, packet loss ue to buffer capacity limitations, an virtual-path routing. However, in the context of SFMs, as oppose to queueing systems, recent work [10] has shown that IPA graient estimators for important performance metrics are enowe with the following crucial properties: (i) They are unbiase, (ii) They are nonparametric, i.e., they are computable by expressions that are inepenent of the probability laws of the unerlying traffic processes, an (iii) They are extremely simple an easy to implement. The first property implies that the IPA graient estimators can be truste in performance preiction; the secon implies that the IPA estimators can be compute from fiel measurements instea of merely simulation environments; an the thir property points to the possibility of real-time computation. The use of IPA in single-noe SFMs has been stuie in [18],[10],[11],[12]. In [10], a SFM was aopte for a single traffic class network noe in which threshol-base buffer control is exercise. For the problem of etermining a threshol that minimizes a weighte sum of loss volume an buffer content, it was shown that IPA yiels remarkably simple nonparametric sensitivity estimators for this performance metric with respect to a threshol parameter, which, in aition, are unbiase uner very weak structural assumptions on the efining traffic processes. More-

2 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. XX, NO. Y, MMM over, a solution of the performance optimization problem base on the IPA-base approach outline above recovers or gives close approximations to the solution of the associate queueing moel. Extensions of the results erive in [10],[11] to general networks have ha to procee in two irections: the incorporation of multiple traffic classes an the analysis of general topology networks. The former irection has been pursue in [12],[19], where results analogous to those in [10] were obtaine. The latter irection is pursue in the present paper, whose primary focus is on tanem networks; some early results for the two-noe case may be foun in [20]. The main contributions are as follows. First, we consier a SFM consisting of M 2 single-class noes in tanem an evelop IPA erivative estimators of loss an buffer occupancy performance metrics with respect to a threshol parameter at the first noe. We show that these estimators are unbiase an iscuss their applicability to general-topology networks. Despite the inevitable burensome notation necessary to erive an analyze the estimators, their implementation is simple an rests on two intuitively appealing perturbation propagation rules : (i) A queue content perturbation at noe m propagates ownstream whenever the buffer at m becomes empty, an (ii) A perturbation at noe m is eliminate after its buffer becomes either empty or full. Finally, we emonstrate the use of the IPA estimators for network performance optimization purposes through simulation experiments. The rest of the paper is organize as follows. Section 2 presents the stochastic flow moeling framework for a network of noes in tanem. In Section 3 we carry out perturbation analysis of the network with respect to a threshol parameter at noe 1 an erive explicit IPA estimators for loss an queue content metrics. We also prove the unbiaseness of these estimators. Section 4 presents some simulation results illustrating the use of the estimators in network performance optimization. Section 5 conclues the paper an outlines relate ongoing work. II. Tanem Network SFM an Preliminary Results Consier a tanem network viewe as a Stochastic Flui Moel (SFM) as shown in Fig. 1 with M noes inexe by m = 1,..., M. The outflow of noe m is the inflow to noe m + 1, an we assume there is no feeback in the system. In the context of communication network applications, this implies that we limit ourselves here to network settings operating with protocols such as the User Datagram Protocol (UDP), but not the Transmission Control Protocol (TCP); the inclusion of feeback information that affects the incoming flow is a separate problem we aress elsewhere (see [21]) an it has not yet been incorporate in this multinoe analysis. Let b m enote the buffer size of noe m, m = 1,..., M, where b m > 0. At the first noe, we consier the buffer size as a controllable parameter; equivalently, we view it as a threshol enote by θ = b 1 which is ajustable for the purpose of congestion control. We will assume that the real-value parameter θ is confine to a close an boune (compact) interval Θ. The inflow rate of each noe m = 2,..., M is enote by α m (θ; t), to inicate the fact that it generally epens on θ, whereas α 1 (t) is an external process inepenent of θ. The processing rate of noe m = 1,..., M at time t is enote by β m (t) an is inepenent of θ. The buffer level is enote by x m (θ; t), the outflow rate is enote by δ m (θ; t) an the overflow rate is enote by γ m (θ; t). The external processes {α 1 (t)} an {β m (t)}, m = 1,..., M, which are inepenent of θ, can have a very general form for the purpose of our analysis; in particular, they nee not be statistically inepenent. We are intereste in stuying sample paths of this SFM over a time interval [0, T ] for a given fixe 0 < T <. The ynamics of the buffer level x m (θ; t), m = 1,..., M, are escribe by the following one-sie ifferential equation: x m (θ; t) t + = 0, if x m (θ; t) = 0 an α m (θ; t) β m (t) 0, 0, if x m (θ; t) = b m an α m (θ; t) β m (t) 0, α m (θ; t) β m (t), otherwise. (1) where, to maintain uniformity in the notation, it is unerstoo that α 1 (θ; t) = α 1 (t). With this convention in min, the outflow rate from noe m = 1,..., M 1 is the inflow rate to the ownstream noe m + 1, so that for all m = 2,..., M we have α m (θ; t) = { βm 1 (t), if x m 1 (θ; t) > 0 α m 1 (θ; t), if x m 1 (θ; t) = 0. (2) Finally, the overflow rate γ m (θ; t) at noe m ue to a full buffer is efine by α m (θ; t) β m (t), if x m (θ; t) = b m an γ m (θ; t) = α m (θ; t) β m (t) 0, 0, otherwise. (3) For convenience, we efine A m (θ; t) := α m (θ; t) β m (t). (4) We stress again that in this SFM the flow rates {α 1 (t)} an {β m (t)}, m = 1,..., M, are treate as stochastic processes representing the ranom instantaneous rates of the arriving traffic an of the noe processing rates. This is why in consiering a typical sample path of the SFM (as in Fig. 2) the buffer content is shown not as piecewise linear (which correspons to fixe flow rates over specific intervals), but only as piecewise analytic. α1(t) γ1(t) θ β1(t) α2(t) γ2(t) b2 Fig. 1. β2(t) System Moel αm(t) γm(t) bm βm(t)

3 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. XX, NO. Y, MMM Let us now take a closer look at (2) which escribes the only connection between noe m an its upstream noes. The value of α m (θ; t), m > 1, is given by either β m 1 (t), which is inepenent of θ, or by α m 1 (θ; t). In turn, the value of α m 1 (θ; t) is given by either β m 2 (t) or by α m 2 (θ; t). Proceeing recursively, we fin that the value of α 2 (θ; t) is either β 1 (t) or α 1 (t) which are both inepenent of θ. Thus, the value of α m (θ; t) is ultimately given by one of the processes {α 1 (t)} an {β i (t), i = 1,..., m} which are all inepenent of θ; the way in which α m (θ; t) switches among them epens on θ through the states x i (θ; t), i = 1,..., m 1 an the points in time when this switching occurs efines the switchover points iscusse in the sequel. Focusing on noe m, the inflow process {α m (θ; t)} an the service process {β m (t)} are referre as efining processes of noe m, since they efine the local ynamics at that noe. The buffer level {x m (θ; t)}, outflow process {δ m (θ; t)} an overflow process {γ m (θ; t)} are referre as erive processes, since they can be erive from the efining processes via (1)-(3). Viewing the network as a iscrete event system, the SFM ynamics are epenent on a number of events. For the purpose of our analysis, we efine an event of noe m = 1,..., M to be one of the following: e 1 - A jump (iscontinuity) in either α m (θ; t) or β m (t). e 2 - A time instant when A m (θ; t) becomes 0 with no iscontinuity in A m (θ; t) at t. e 3 - A time instant when the buffer level x m (θ; t) becomes full or empty. Two types of sample performance metrics will be consiere throughout this paper, both over the time interval [0, T ]. The loss volume at noe m = 1,..., M, enote by L m (θ; T ), is efine by L m (θ; T ) = T 0 γ m (θ; t)t, (5) an the work at noe m = 1,..., M, enote by Q m (θ; T ), is efine by Q m (θ; T ) = T 0 x m (θ; t)t. (6) IPA provies the erivatives (graient) of the sample performance functions with respect to various control parameters. In our case, we concentrate on the erivatives L m(θ; T ) an Q m(θ; T ), where we shall use the prime notation to enote a erivative with respect to θ throughout the rest of the paper. Consiering a typical sample path of the buffer level x m (θ; t) in this SFM, as shown in Fig. 2, we observe that it can be ecompose into Bounary Perios (BP) an Non-Bounary Perios (NBP). A BP is one uring which x m (θ; t) = 0 or x m (θ; t) = b m, whereas a NBP is one uring which 0 < x m (θ; t) < b m. A BP is further categorize as either an Empty Perio (EP) uring which x m (θ; t) = 0 or as a Full Perio (FP) uring which x m (θ; t) = b m. Since the function x m (θ; t) is generally continuous in t for a fixe θ, we will consier EPs an FPs to be close intervals an NBPs to be open intervals in the relative topology inuce by [0, T ]. Let B m,n = [τ m,n (θ), σ m,n (θ)] enote the nth BP, n = 1,..., N m, where N m is the total (ranom) number of BPs in [0, T ]. Note that the start of B m,n, τ m,n (θ), is an e 3 event of noe m. For notational economy, we will omit θ in τ m,n (θ) an σ m,n (θ) in what follows, but will keep in min that τ m,n an σ m,n are generally functions of θ. Next, observe that NBPs an BPs appear alternately throughout [0, T ] an let B m,n = (σ m,n 1, τ m,n ) enote the NBP that precees B m,n. For convenience, we shall set σ m,0 = 0 an σ m,nm = T. Depening on the value of x m (θ; t) at the starting an ening points of a NBP B m,n = (σ m,n 1, τ m,n ), we can efine four types of NBPs ( E stans for Empty an F stans for Full ): 1. (E, E): x m (θ; σ m,n 1 ) = 0 an x m (θ; τ m,n ) = (E, F ): x m (θ; σ m,n 1 ) = 0 an x m (θ; τ m,n ) = b m. 3. (F, E): x m (θ; σ m,n 1 ) = b m an x m (θ; τ m,n ) = (F, F ): x m (θ; σ m,n 1 ) = b m an x m (θ; τ m,n ) = b m. In the example shown in Fig. 2, the BPs B m,n 1 = [τ m,n 1, σ m,n 1 ], an B m,n = [τ m,n, σ m,n ] are both FPs, whereas B m,n+1 = [τ m,n+1, σ m,n+1 ] is an EP. The NBP B m,n 1 = (σ m,n 2, τ m,n 1 ) is of type (E, F ), B m,n = (σ m,n 1, τ m,n ) is of type (F, F ), B m,n+1 = (σ m,n, τ m,n+1 ) is of type (F, E), an B m,n+2 = (σ m,n+1, τ m,n+2 ) is of type (E, E). b m σ m,n-2 τ m,n-1 σ m,n-1 τ m,n σ m,n τ m,n+1 σ m,n+1 τ m,n+2 Fig. 2. Typical Sample Path of Noe m The switchover points of α m (θ; t) for m > 1, as seen in (2), occur as follows: (i) Just before an EP of noe m 1 starts, we have α m (θ; t) = β m 1 (t). When the EP starts, the output of m 1 switches from β m 1 (t) to α m 1 (θ; t). (ii) When the EP of noe m 1 ens, the output of m 1 switches once again from α m 1 (θ; t) to β m 1 (t). (iii) The thir instance is less obvious. During the EP at noe m 1, it is possible that an EP at noe m 2 starts, in which case α m 1 (θ; t) switches from β m 2 (t) to α m 2 (θ; t). When this happens, the output of m 1 switches from α m 1 (t) to α m 2 (θ; t), therefore, α m (θ; t) = α m 1 (t) = α m 2 (t). Clearly, it is possible that a sequence of j such events occurs so that α m (θ; t) = α m 1 (t) =... = α m j (t), where j = 1,..., m 1. In this case, all noes m j,..., m 1 are empty an m inherits all switchovers experience by these upstream noes as each one starts an EP. For switchover points of α m (θ; t) uner case (ii) above, we next prove that they are locally inepenent of θ.

4 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. XX, NO. Y, MMM Lemma II.1: Let σ m 1, m > 1, be a switchover point of α m (θ; t) with α m (θ; σm 1 ) = α m 1(θ; σm 1 ) an α m (θ; σ m 1 + ) = β m 1(σ m 1 + ). Then, σ m 1 is locally inepenent of θ. It immeiately follows from Lemma II.1 that the en of an EP is inepenent of θ. Moreover, for m > 2, uring an EP of noe m 1 we can see in (2) that α m (θ; t) = α m 1 (θ; t), which implies that if a switchover occurs at α m 1 (θ; t), this switchover will be inherite by α m (θ; t), as well as the θ-epenence of it. This iscussion motivates our efinition of an active switchover point, which is generally a function of θ an is enote by s m,i (θ), m > 2, i = 1, 2,...: Definition 1. A switchover point of α m (θ; t) is terme active, if: 1. s m,i (θ) is the time when an EP at noe m 1 starts; or 2. s m,i (θ) is the time when α m 1 (θ; t) experiences an active switchover within an EP of noe m 1. In Fig. 2, assuming m > 2, the points τ m,n+1 an τ m,n+2 both start EPs an are, therefore, active switchover points of α m+1 (θ; t). In aition, any point in [τ m,n+1, σ m,n+1 ] is potentially an active switchover point of α m+1 (θ; t) if it happens to be an active switchover point of α m (θ; t). An active switchover point s m,i (θ) at noe m may belong to a BP B m,n or to a NBP B m,n. We efine the following inex sets that will help ifferentiating between ifferent types of active switchover points epening on the type of interval they belong to: Ψ m,n := {i : s m,i B m,n } (7) Ψ o m,n := {i : s m,i (τ m,n, σ m,n )} (8) Ψ m,n := { } i : s m,i B m,n (9) Note that B m,n = [τ m,n, σ m,n ], so we ifferentiate between open an close intervals that efine BPs in efining the sets Ψ m,n an Ψ o m,n. As we will see, of particular interest are active switchover points that coincie with the en of a FP, so we efine the set of all BP inices that inclue such a point, Φ m, as well as Γ m Φ m, a subset that inclues those FPs that are followe by a NBP of type (F, E): Φ m := {n : σ m,n is an active switchover point, n = 1,..., N m } (10) Γ m := {n : n Φ m an B m,n+1 is of type (F, E)}. (11) III. Infinitesimal Perturbation Analysis (IPA) Our objective is to estimate the erivatives of the performance metrics E[L m (θ; t)] an E[Q m (θ; t)], where L m (θ; t) an Q m (θ; t) were efine in (5) an (6), through the sample erivative L m(θ; T ) an Q m(θ; T ), which is commonly referre to as the Infinitesimal Perturbation Analysis (IPA) estimators; comprehensive iscussions of IPA an its applications can be foun in [16],[17]. The IPA erivative-estimation technique computes the sample erivative L T (θ) of some performance metric L T (θ) along an observe sample path ω. An IPA-base estimate L T (θ) of a performance metric erivative E[L T (θ)]/ θ is unbiase if E[L T (θ)]/ θ = E[L T (θ)]. Unbiaseness is the principal conition for making the application of IPA useful in practice, since it enables the use of the sample (IPA) erivative in control an optimization methos that employ stochastic graient-base techniques. The case of a single noe where we are intereste in L 1(θ; T ) an Q 1(θ; T ) has been stuie in [10], so here we aress the inter-noe effects an stuy the resulting IPA estimators L m(θ; T ) an Q m(θ; T ) for m > 1. Due to the tanem topology an the absence of feeback between noes, the inter-noe effects have only one irection: from upstream to ownstream. Therefore, our analysis is base on the impact of the threshol parameter at the first noe on performance metrics at the ownstream noes. Since we are concerne with the sample erivatives L m(θ; T ) an Q m(θ; T ) we have to ientify conitions uner which they exist. As we will see, these erivatives epen on the erivatives of the active switchover points, i.e., specific event times, with respect to θ. Excluing the possibility of the simultaneous occurrence of two events (e 1, e 2, or e 3 as efine earlier), the only situation preventing the existence of these erivatives involves some t such that A m (θ; t) = α m (θ; t) β m (t) = 0; in such cases, the one-sie erivatives exist an can be obtaine through a finite ifference analysis (as in [10]). However, to keep the analysis simple, we focus only on the ifferentiable case by proceeing uner the following technical conitions: Assumption 1. a. W.p.1, the functions α 1 (t), an β m (t), m = 1,..., M are piecewise analytic in the interval [0, T ]. b. For every θ Θ, w.p.1 no two events of a certain noe m occur at the same time. c. W.p.1, no two processes {α 1 (t)}, {β m (t), m = 1,..., M} have ientical values uring any open subinterval of [0, T ]. All three parts of Assumption 1 are mil technical conitions. Regaring part c, note that α m (θ; t), through (2), ultimately epens on one or more of the processes {α 1 (t)}, {β i (t)}, i = 1,..., m, therefore the requirement A m (θ; t) 0 is reflecte by the general statement uner c. Recall that a switchover point of α m (θ; t) is the time it switches among {α 1 (t)} an {β i (t)}, i = 1,..., m. It is possible that a switchover may not cause a jump (iscontinuity) in α m (θ; t); for example, at t = s, α m (θ; t) switches from α m 1 (θ; t) to β m 1 (t) while α m 1 (θ; s) = β m 1 (s) an such a switchover is not qualifie as a noe m event (e 1, e 2, or e 3 as efine earlier). The following lemma is a consequence of Assumption 1 an shows that for an active switchover point, α m (θ; t) must experience a jump. Recall that an active switchover point s m,i (θ) is generally a function of θ, but, for the sake of notational simplicity, we shall simply write s m,i. Lemma III.1: If an active switchover point of α m (θ; t) occurs at t = s m,i, then w.p. 1 it is an e 1 event of noe m.

5 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. XX, NO. Y, MMM A. Queue Content Derivatives We shall procee by etermining the erivative x m(θ; t) of a buffer level in the SFM with respect to the controllable parameter θ an will show that it epens exclusively on the way that θ affects the switchover points of α m (θ; t) that were terme active in Definition 1. Focusing on active switchover points s m,i, i = 1, 2,... we efine the following two quantities for m > 1 that turn out to be crucial in our analysis: an, for n Φ m : ψ m,i := [α m (θ; s + m,i ) α m(θ; s m,i )]s m,i, (12) φ m,n := [α m (θ; σ + m,n) β m (σ m,n )]σ m,n. (13) Let us now consier the erivative x m(θ; t) of a buffer level in the network with respect to the controllable parameter θ. The case m = 1 was consiere in [10], so we shall focus on cases with m > 1. The following establishes the connection between x m(θ; t) an the two crucial quantities efine above. Note that 1 [ ] is the usual inicator function. Lemma III.2: If m = 1, for n = 1,..., N 1 { x 1 1(θ; t) = 0 If m > 1, then for n = 1,..., N m if t B 1,n or t B 1,n+1, x 1 (θ; σ 1,n ) = θ otherwise (14) x m(θ; t) = { 0 if t Bm,n K m,n(t) ψ m,k 1 [n Φ m ] φ m,n if t B m,n+1 (15) where K m,n (t) is the number of active switchover points in the interval (σ m,n, t) B m,n+1. It is now clear from (15) that ψ m,k an φ m,n are crucial quantities associate with noe m. In the next two lemmas, we show that they provie the means to connect x m(θ; t) to x m 1(θ; t) an hence she light into the way in which buffer level perturbations propagate across noes. Lemma III.3: For m > 1, let s m,i be an active switchover point of α m (θ; t). If it is the start of an EP at noe m 1, then ψ m,i = x m 1(θ; s m,i ) (16) Otherwise, if s m,i occurs uring an EP of noe m 1, then for some j such that s m,i = s m 1,j. Next for m > 1, we efine: ψ m,i = ψ m 1,j (17) R m,n (θ) := α m(θ; σ + m,n) β m (σ m,n ) α m (θ; σ + m,n) α m (θ; σ m,n) (18) By efinition, σ m,n is the en of a BP at noe m. We will make use of R m,n (θ) when n Φ m, i.e., when σ m,n happens to be an active switchover point. If this is the case, then it follows from Lemma III.1 an Assumption 1(b) that β m (t) is continuous at t = σ m,n. Note that this quantity involves the processing rate information β m (σ m,n ) (typically known, otherwise measurable) at t = σ m,n, an the values of the incoming traffic rates before an after a BP ens at t = σ m,n. Using this efinition, the next lemma allows us to obtain a simple relationship between the two crucial quantities ψ m,i an φ m,n. Lemma III.4: Let n Φ m an σ m,n = s m,i for some active switchover point of α m (θ; t). Then, φ m,n = R m,n (θ) ψ m,i (19) where 0 < R m,n (θ) 1. (20) Combining Lemmas III.2-III.4 we obtain the following: Theorem III.1: For m > 1 an n = 1,..., N m : x m(θ; t) = 0 if t B m,n Km,n (t) x m i (θ; s m,k ) + 1 [n Φ m ] R m,n (θ)x m i (θ; σ m,n) if t B m,n+1 (21) where i := min {j : x m j(θ; s m,k ) > 0} (22) j=1,...,m 1 an K m,n (t) is the number of active switchover points in the interval (σ m,n, t) B m,n+1. Taking a closer look at (21) we get significant insight regaring the process through which changes in the buffer level of one noe affect the buffer levels of ownstream noes. Let us view x m(θ; t) as a perturbation in x m (θ; t). For simplicity, let us initially ignore the case where n Φ m an assume i = 1. Thus, we have x m(θ; t) = Km,n (t) x m 1(θ; s m,k ) if t B m,n+1. We can see that noe m 1 only affects noe m at time s m,k when an EP at noe m 1 starts (recalling Definition 1). In simple terms: whenever noe m 1 becomes empty, it propagates ownstream to m its current perturbation. These perturbations accumulate at m over all K m,n (t) active switchover points containe in a NBP B m,n+1. For example, in Fig. 3, s m,i+1 is a point where an EP ens at noe m 1 while noe m is in a NBP; at that time we get x m(θ; t) = x m 1(θ; s m,i+1 ). Moreover, when the NBP ens at τ m,n+1, the value of x m(θ; τm,n+1 ) is in turn propagate ownstream to m + 1, before setting x m(θ; τ + m,n+1 ) = 0 at the start of the ensuing EP at m. Any cumulative perturbation at m is eliminate by the presence of any BP, i.e., when t B m,n as inicate by (21). For example, in Fig. 3, s m,i is a point where an EP ens at noe m 1 while noe m is in a FP; therefore, it has no effect on x m (θ; t), i.e., x m(θ; t) = 0. The conclusion is that in orer for a noe to have a chance to propagate a

6 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. XX, NO. Y, MMM b m-1 s m,i-1 s m,i s m,i+1 concentrate on the sample erivatives of the two performance metrics we have ientifie, L m (θ; T ) an Q m (θ; T ) efine in (5) an (6). The case of L 1 (θ; T ) an Q 1 (θ; T ) was consiere in [10], so we will focus on m > 1 in what follows. b m σ m,n-1 τ m,n σ m,n τ m,n+1 Fig. 3. A sample path example with two ajacent noes an three active switchover points for α m(θ; t) perturbation ownstream, it must become empty before it becomes full. In view of this fact, we can argue that control at the ege of a tanem network is generally expecte to have a limite impact on noes that are several hops away, since propagating perturbations requires the combination of several events: a perturbation to be present an to be propagate at the start of an EP before it is eliminate by a FP; moreover this has to be true for a sequence of noes. The probability of such a joint event is likely to be small as the number of hops increases. This provies an analytical substantiation to the conjecture that congestion in a network cannot be easily regulate through control exercise several hops away, unless the intermeiate noes experience frequent EPs proviing the opportunity for perturbation propagation events. Let us now look at the two aspects that were ignore in the iscussion above. First, suppose that i > 1. This means that an EP occurs not just at noe m 1, but also noes m 2,..., m i, all at the same time. Thus, instea of propagating a perturbation from m 1 to m, the propagation now takes place from m i to m. Secon, let us consier the case where n Φ m in (21). This allows an EP that starts at m 1 to cause the en of a FP at noe m. When this occurs, only a fraction, given by R m,n (θ), of the perturbation at m 1 is propagate to noe m. For example, in Fig. 3, the point s m,i coincies with σ m,n an it therefore contributes another term scale by R m,n as seen in (21). Finally, note that the iscussion above is inepenent of the way in which the controllable parameter affects the buffer content at m = 2 an subsequently all ownstream noes through (21). In the particular case we are consiering, however, we can see from (14) that the erivatives at noe 1 are always given by 1. Thus, the entire perturbation analysis process here reuces to counting EP events at all noes that cause propagations through (21). The only exception is for those events that en an EP at some m 1 an at the same time a FP at m; in this case, the erivative at noe m is affecte by some amount epenent on R m,n (θ) (0, 1].Up to this point, we have characterize the mechanism through which x m(θ; t) can be evaluate recursively for all m = 1,..., M, making use of the quantities ψ m (s m,i ) an φ m (s m,i ). In the next two sections, we B. The IPA Derivative L m(θ; T ) Our objective here is to estimate the erivative of the expecte loss volume E[L m (θ; T )] at noe m = 2,..., M through the sample erivative L m(θ; T ). Let us efine Ϝ m to be the set of all inices of BPs that happen to be FPs at noe m over [0, T ], i.e., Ϝ m := {n : x m (θ; t) = b m for all t B m,n, n = 1,..., N m }. Observing that only FPs at noe m will experience loss, we have an L m (θ; T ) = L m(θ; T ) = σm,n τ m,n γ m (θ; t)t, σm,n γ m (θ; t)t. (23) θ τ m,n By Lemma III.1 an Assumption 1(b), τ m,n cannot be an active switchover point, since at τ m,n a noe m event of type e 3 must occur. Therefore, for any n Ϝ m, active switchover points can occur either in the open FP interval (τ m,n, σ m,n ) or they may coincie with the en of the FP at time σ m,n. To establish an expression for L m(θ; T ) in terms of observable sample path ata we nee three preliminary results, state below as Lemmas III.5-III.7. Since we focus on noe m, we rop the subscript m for notational convenience in presenting these results. Lemma III.5: For n Ϝ, σn [ ] γ(θ; t)t = A(θ; σn )σ n A(θ; τ n )τ n ψ k θ τ n k Ψ o n (24) Lemma III.6: For n Ϝ, A(θ; τ n )τ n(θ) = ψ k + A(θ; σ n 1 + )σ n 1 (25) k Ψ n The next result concerns the en point σ n of a FP. Lemma III.7: For n Ϝ, { [A(θ; σ n + ) A(θ; σn )]σ ψi, if n Φ with σ n = n = s i 0, if n / Φ (26) We can now obtain the IPA erivative L m(θ; T ), using once again the subscript m. We will also introuce the set Ω m,n = Ψ m,n Ψ m,n (27)

7 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. XX, NO. Y, MMM which, recalling (7) an (9), inclues the inices i of all active switchover points in the BP B m,n = [τ m,n (θ), σ m,n (θ)] an the NBP that precees it B m,n = (σ m,n 1, τ m,n ). Theorem III.2: The loss volume IPA erivative, L m(θ; T ), m = 2,..., M, has the following form: L m(θ; T ) = i Ω m,n ψ m,i + φ m,n (28) where ψ m,i an φ m,n are given by (16)-(17) an (19). In simple terms, to obtain L m(θ; T ) we accumulate terms ψ m,i over all active switchover points s m,i for each interval (σ m,n 1, σ m,n ], n = 1, 2,... However, the result contributes to L m(θ; T ) only if σ m,n ens a FP. The secon term of (28) moifies the accumulation process as follows: Occasionally, σ m,n is followe by a NBP (σ m,n, τ m,n+1 ) of type (F, E), i.e., the buffer at noe m becomes empty. When this event takes place, the contribution ψ m,i for s m,i = σ m,n is moifie by aing φ m,n to it. In the example shown in Fig. 3, there are two active switchover points in the interval (σ m,n 1, σ m,n ] at s m,i 1 an at s m,i. These contribute terms ψ m,i 1 an ψ m,i to L m(θ; T ) since the BP that ens at σ m,n is a FP. The secon one happens to coincie with the en of the FP, i.e., s m,i = σ m,n. Since the next NBP is of type (F, E), we have n Γ m an a term φ m,n is contribute to L m(θ; T ). In aition, the active switchover point at s m,i+1 oes not contribute to L m(θ; T ). The terms ψ m,i an φ m,n are given in Lemmas III.3 an III.4, where we can see that they epen on the erivatives x m 1(θ; s m,i ) propagate from the upstream noe m 1 through every EP event that occurs at m 1. These erivatives are in turn provie by (21) in Theorem III.1. We emphasize the fact that, as in earlier work for a single noe SFM [10], the IPA estimator oes not involve any knowlege of the stochastic processes characterizing arriving traffic or noe processing an allows for the possibility of correlations. The only information involve is the one require to calculate R m,n in (21), which, incientally, occurs only when the en of a FP happens to be an active switchover point; one can argue that uner certain loaing conitions such contributions (recall also that 0 < R m,n 1) are minimal an coul be ignore for the benefit of obtaining computationally efficient approximations; in this case, (28) becomes a simple counter, since the values of ψ m,i are originally given by 1 at noe 1, as seen in (14). This is further iscusse in Section 4. Theorem III.3: The IPA erivative, L m(θ; T ), m = 2,..., M, is unbiase, i.e., Proof: [ ] E L m(θ; T ) = E[L m(θ; T )] θ See Appenix II. C. The IPA Derivative Q m(θ; T ) Recall the efinition of Q m (θ; T ) in (6). By partioning [0, T ] into NBPs an BPs an recalling that N m was efine as the total number of BPs in [0, T ], we have Q m (θ; T ) = N m n=1 [ τm,n σ m,n 1 x m (θ; t)t + σm,n τ m,n x m (θ; t)t Upon taking erivatives with respect to θ an in view of the fact that x m (θ; t) is continuous in t, we obtain Q m(θ; T ) = N m τm,n n=1 N m n=1 N m σm,n n=1 N m n=1 σ m,n 1 x m(θ; t)t { } x m (θ; τ m,n )τ m,n x m (θ; σ m,n 1 )σ m,n 1 τ m,n x m(θ; t)t { } x m (θ; σ m,n )σ m,n x m (θ; τ m,n )τ m,n After taking into account the cancellation of several terms an in view of the fact that σ m,0 = σ m,n m = 0, this reuces to [ N m τm,n ] σm,n Q m(θ; T ) = x m(θ; t)t + x m(θ; t)t. n=1 σ m,n 1 τ m,n (29) We can now make use of the expression for x m(θ; t) erive in Lemma III.2 an Theorem III.1 to obtain the IPA estimator Q m(θ; T ) for m = 2,..., M. Theorem III.4: The workloa IPA erivative, Q m(θ; T ), m = 2,..., M, has the following form: Q m(θ; T ) = N m [τ m,n s m,i ]ψ m,i n=1 i Ψ m,n [τ m,n+1 σ m,n ]φ m,n (30) n Φ m where ψ m,i an φ m,n are given by (16)-(17) an (19). For a simple interpretation of the IPA estimator (30), note that, similar to the IPA estimator in (28), it involves accumulating terms ψ m,i over active switchover points s m,i. In this case, however, we are only intereste in s m,i containe in NBPs (σ m,n 1, τ m,n ), n = 1,..., N m. The accumulation is one at τ m,n with each such term scale by [τ m,n s m,i ] measuring the time elapse since the switchover point took place. The secon term in (30) as similar contributions mae at the en of a NBP of type (F, E) ue to active switchover points that coincie with the en of a FP at some time σ m,n. Theorem III.5: The IPA erivative, Q m(θ; T ), m = 2,..., M, is unbiase, i.e., Proof. [ ] E Q m(θ; T ) = E[Q m(θ; T )] θ See Appenix II. ]

8 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. XX, NO. Y, MMM IV. Experimental Network Optimization Results This section presents results of simulation experiments in which we optimize a weighte sum of loss an workloa in the two-queue tanem system shown in Fig. 4, as a function of the buffer limits (buffer sizes) at the two queues. All of the experiments were performe using the Georgia Tech Network Simulator (GTNetS) [22], moifie to inclue the requisite IPA erivative calculations. λs n1 Sources Backgroun Generator Fig. 4. λ b β 1 β2 θ 1 S1 θ 2 S2 Topology: Two-Stage Simulations n Sinks The approach we have taken here is to purposefully aopt a very practical engineering point of view in trying to integrate the analytical results of the previous section with a stochastic optimization methoology. We have mae several simplifications, our goal being to test the practical value of using IPA estimates to ynamically improve (in an acceptable time scale) network performance within an optimization framework. First of all, because of the simple form of the IPA estimators of the erivatives of loss (28) an work (30) for the SFM, all ata require for their evaluation can be irectly obtaine from a sample path of the actual queueing system, as was also one an explaine in etail in our earlier work [10]. In other wors, the form of the IPA estimators is obtaine by analyzing the system as a SFM, but the associate values are base on real ata. This provies a goo approximation of the performance erivative estimates of the queueing system (which, if obtaine irectly from the queueing system, woul be biase). Seconly, we implemente a stanar stochastic approximation technique (e.g., see [23]) in conjunction with the IPA erivatives obtaine in Section 3, but inclue some simple heuristics that are empirically known to accelerate convergence, at the expense of staying within the bouns of the usual technical conitions require to guarantee convergence. In aition, although all our analysis is base on the assumption that all observe sample paths start with all queues at the empty state, we have nonetheless applie the IPA estimates at the nth iteration of the optimization algorithm using the ening state of the (n 1)th iteration. The final simplifying step we have taken concerns the contribution of the term involving φ m,n in the IPA estimators (28) an (30). As alreay argue, base on (14), (16)- (17), an (19)-(20), each instance of this term is boune by [0, 1]. Moreover, the term is nonzero only when an active switchover point coincies with the en of a FP at noe 2, i.e., an EP starts at noe 1 causing a FP to en at noe 2. This is likely to occur only when the buffer limits are largely imbalance (that of noe 2 is too small), in which case the performance sensitivity with respect to the buffer limit of noe 2 is expecte to be large (hence, the buffer limit of noe 2 will be increase at the next algorithm iteration), making the contribution of a term boune by [0, 1] likely to be negligible. Since this argument is obviously not rigorous, we proceee by performing the optimization process twice: once with all these terms ignore, an once with the values of these terms, whenever they arise, set to their maximum value of 1. We foun the results numerically inistinguishable, substantiating this approximation. The significance of the approximation cannot be overemphasize: without the inclusion of the term involving φ m,n in the IPA estimators, these estimators are fully nonparameteric, i.e., they require only simple event counters an timers an no traffic rate information whatsoever, since R m,n in (18) is no longer involve. In the system of Fig. 4, intene to represent the operation of a communication network, the inflow process at the first queue consists of n 1 multiplexe on off ata sources generating bursty traffic. When in the on state, each source generates a continuous ata stream at the rate of α bits per secon. These ata streams are use to construct 554-byte UDP packets which are forware to the buffer at the first queue an thence across the rest of the network. The on times an off times are ii ranom variables sample from the exponential istribution with mean 0.1 secons. The channel transporting packets from the first queue to the secon queue has a capacity of β 1 bps. The inflow process to the secon queue consists of the outflow process from the first queue an of traffic from the backgroun generator. The backgron traffic consists of n 2 inepenent sources. Each one of these sources has the same statistical characteristics as the sources to the first queue. The outgoing channel from the secon queue has a capacity of β 2 bps. Note that the average bit rate from either one of the inepenent sources is α/2 bps, since the expecte urations of the off perios an the on perios are ientical. Therefore, the expecte bit rate of the aggregate flow to the first queue is (n 1 α/2) (554/512), where the latter term accounts for the insertion of the heaers. Consequently, the traffic intensity at the first queue, enote by ρ 1, is given by ρ 1 = n 1 α (31) β 1 Similarly, the traffic intensity of the secon queue is enote by ρ 2. In our simulation experiments we set n 1 = n 2 = 100, β 1 = 10 Mbps, an β 2 = 20 Mbps. Our simulation program was esigne to utilize the traffic intensities as simulation input, an we set ρ 1 = ρ 2 = The program then calculate α accoring to (31). Let θ = (θ 1, θ 2 ) enote the two-imensional parameter vector consisting of the buffer limits at the first an secon queue respectively. Recall that the loss volumes an workloas at the two queues are enote by L j (θ; T) an Q j (θ; T), j = 1, 2. Let us efine the cost function F (θ; T) as the following weighte sum of the average loss rate an

9 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. XX, NO. Y, MMM workloa rate. F (θ; T) = 1 T [L 1(θ; T) + 10Q 1 (θ; T) +L 2 (θ; T) + 20Q 2 (θ; T)]. (32) We set the value of T to T = 1. We seek to minimize this function using a stanar stochastic approximation technique (e.g., see [23]) in conjunction with the IPA erivatives obtaine in Section 3. The optimization algorithm iteratively computes a sequence of points, θ(i) = (θ(i) 1, θ(i) 2 ), i = 1, 2,...,. Its basic iteration step has the form: θ(i + 1) = θ(i) ζ(i)h(i), (33) where ζ(i) 0 is the ith stepsize (we aopte ζ(i) = 10/i 0.6 ), an h(i) is an estimate of the graient of F (θ(i); T) obtaine via IPA. As alreay pointe out, because of the simple form of the IPA estimators (28) an (30) for the SFM, all ata require for their evaluation can be irectly obtaine from a sample path of the actual queueing system. In aition, we use a simple heuristic to boun the isplacement θ(i + 1) θ(i) along each coorinate by moifying the vector h(i) = (h(i) 1, h(i) 2 ) as follows. We first compute the partial erivatives F (θ(i);t) F (θ(i);t) θ(i) j, j = 1, 2. If ζ(i) 5 then we set h(i) j = F (θ(i);t) θ(i) j h(i) j = 5sgn( F(θ(i);T) θ(i) j, an if ζ(i) θ(i) j F (θ(i);t) θ(i) j > 5 then we set )/ζ(i). The parameters θ(i) j (j = 1, 2) were consiere as real numbers, but the simulation runs were performe at the respective integer values closest to them. Recall that the simulation time horizon at each iteration point θ(i) was T = 1.0 secon. The simulation state at the en of each iteration was preserve, an use as the initial state for the simulation at the next iteration point, θ(i + 1). Likewise, we preserve the final state of the process of computing the IPA erivative, an use it as the initial state for the IPA erivative process at the next iteration. Note that only one ranom see is calle for each optimization experiment. Queue 1 Limit Fig. 5. Time Initial Limit 5 Initial Limit 40 θ(i) 1 Ajustments vs. Time We ran the optimization algorithm twice, with two ifferent initial parameters: first with θ(1) = (5, 5), an then Queue 2 Limit Fig. 6. Time Initial Limit 5 Initial Limit 40 θ(i) 2 Ajustments vs. Time with θ(1) = (40, 40). In either case we ran the algorithm for 100 iterations (i.e., 100 secons). For each experiment, we plotte the evolution of θ(i) 1 an θ(i) 2 as a function of i, an show the results in Figs. 5 an 6 respectively. Each of the figures shows one trajectory for the θ(1) = (5, 5) initial conition, an a secon one for the θ(1) = (40, 40) initial conition. The results inicate asymptotic convergence to approximately ˆθ = (15, 14) within approximately 20 secons. As alreay mentione, this optimization process was performe without the term involving φ m,n in the IPA estimators (28) an (30); it was then repeate with the inclusion of this term set to 1 (its upper boun) in all instances when it arises an the results obtaine corresponing to Figs. 5 an 6 were numerically inistinguishable Q2 Limit Q1 Limit Fig. 7. Cost Function F (θ 1, θ 2 ; T ) Finally, to a valiity to these results, we plotte the graph of F (θ 1, θ 2 ; T ) as shown in Fig. 7. Each point on the plot is the average of 10 separate simulation experiments with T = 100 secons, each with a ifferent see for the ranom number generators. However, each set of the 10 simulation experiments uses the same set of 10 ranom sees as all other sets of experiments. This graph clearly

10 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. XX, NO. Y, MMM corroborates the results obtaine by the optimization runs, i.e., it shows that ˆθ = (15, 14) is inee optimal. V. Conclusions an Future Work We have consiere in this paper a Stochastic Flow Moel (SFM) for a communication network of multiple noes in tanem. Our objective is to control threshol parameters at network noes so as to optimize performance capture by combining loss an workloa metrics. We have evelope IPA estimators for these metrics with respect to the threshol an shown them to be unbiase. The simplicity of the estimators erive an the fact they are not epenent on knowlege of the traffic arrival or service processes makes them attractive for on-line control an optimization. This work has extene results applicable to a single-noe, single-class SFM in [10], an the next step is to incorporate multiple traffic classes at various noes, along the lines of [12]. Our ongoing work is also investigating the use of this approach in general topology networks, which we believe to be possible. For example, the presence of cross-traffic at noe m in our SFM can be capture by varying the processing rate β m (t) at that noe. Finally, an very importantly, ongoing work is also consiering how to evelop IPA an relate control an optimization methos that inclue network feeback effects (i.e., allowing arriving traffic processes to epen on the buffer content in ifferent ways); some relate initial results are reporte in [21]. Appenix I Proof of Lemma II.1 Recalling (2), we have x m 1 (θ; σm 1 ) = 0 an x m 1 (θ; σ m 1 + ) > 0, which implies that at σ m 1 there is a change of sign in A m 1 (θ; t) = α m 1 (θ; t) β m 1 (t) from non-positive to positive. For m = 2, since α 1 (t) an β 1 (t) are inepenent of θ, the time of the sign change of A 1 (t) is inepenent of θ too, an it follows that σ 1 is locally inepenent of θ. For m > 2, there are two ways in which a sign change in A m 1 (σ m 1 ) can take place: continuously or as a result of a jump in either α m 1 (θ; t) or β m 1 (t) at t = σ m 1. Let us consier each of these two cases next. If no iscontinuity occurs at t = σ m 1, then by (2), we have either α m 1 (θ; t) = α m 2 (θ; t) or α m 1 (θ; t) = β m 2 (t). In the latter case, A m 1 (θ; σ m 1 ) = β m 2 (σ m 1 ) β m 1 (σ m 1 ) is clearly inepenent of θ. In the former case, we have A m 1 (θ; σ m 1 ) = α m 2 (θ; σ m 1 ) β m 1 (σ m 1 ) where, once again, either α m 2 (θ; t) = α m 3 (θ; t) or α m 2 (θ; t) = β m 3 (t) at t = σ m 1. In the latter case, A m 1 (θ; σ m 1 ) = β m 3 (σ m 1 ) β m 1 (σ m 1 ) is inepenent of θ. In the former case, we have A m 1 (θ; σ m 1 ) = α m 3 (θ; σ m 1 ) β m 1 (σ m 1 ) an the process repeats until we get A m 1 (θ; σ m 1 ) = α 1 (σ m 1 ) β m 1 (σ m 1 ) which is inepenent of θ. Thus, if the change in sign occurs continuously, we conclue that σ m 1 is inepenent of θ. This leaves only the possibility that the sign change occurs as a result of a jump in either α m 1 (θ; t) or β m 1 (t) at t = σ m 1. Note that α m 1 (θ; t) an β m 1 (t) may jump simultaneously at t = σ m 1, but only one of them ominates the sign change, i.e., the jump in the other one alone woul not have cause the sign change. The ominating jump in β m 1 (t) is obviously inepenent of θ. Therefore, the only possibility is that α m 1 (θ; t) experiences a ominating jump at t = σ m 1. Moreover, since α m 1 (θ; t) β m 1 (t) experiences a sign change from non-positive to positive, α m 1 (θ; t) must switch to a larger value at σ m 1, i.e., α m 1 (θ; σm 1 ) < α m 1(θ; σ m 1 + ). The jump of α m 1 (θ; t) has three possible ways of occurring: (i) switching from β m 2 (t) to α m 2 (θ; t), (ii) switching from α m 2 (θ; t) to β m 2 (t), or (iii) having α m 1 (θ; t) = α m 2 (θ; t) because x m 2 (θ; t) = 0, an inheriting a jump of α m 2 (θ; t) at that time. Case (i) is infeasible by the following argument: if σ m 1 is a switchover point of α m 1 (θ; t) from β m 2 (t) to α m 2 (θ; t), then the buffer at noe m 2 becomes empty at that time, which implies that β m 2 (σ m 1 ) α m 2 (θ; σ m 1 ) > 0; this contraicts the fact that α m 1 (θ; t) must switch to a larger value at σ m 1. If case (iii) applies, then α m 2 (θ; t) must switch to a larger value at σ m 1, an we repeat the same argument as the one use above for α m 1 (θ; t) until either case (ii) applies for some α m i (θ; t) with m i > 2 or we reach noe 2, in which case only case (ii) is possible. Thus, the proof reuces to consiering case (ii), i.e., showing that if σ m 1 is a switchover point of α m 1 (θ; t) with α m 1 (θ; σm 1 ) = α m 2(θ; σm 1 ) an α m 1 (θ; σ m 1 + ) = β m 2(σ m 1 + ) then, σ m 1 is locally inepenent of θ. Observe that this is precisely the statement of the lemma with m replace by m 1 in α m (θ; t) an β m 1 (t). Therefore, using the same argument as above, this process is repeate until the proof is reuce to showing that if σ m 1 is a switchover point of α 2 (θ; t) with α 2 (θ; σm 1 ) = α 1(σm 1 ) an α 2(θ; σ m 1 + ) = β 1(σ m 1 + ) then σ m 1 is locally inepenent of θ. This, however, was alreay establishe above base on the fact that α 1 (t) an β 1 (t) are both efining processes inepenent of θ. Proof of Lemma III.1 If s m,i is an active switchover point of α m (θ; t), it follows from (2) an Definition 1 that there are two possible cases: (i) an EP starts at noe m 1, or (ii) s m,i lies within an EP of noe m 1 an is an active switchover point of α m 1 (θ; t). In case (i), an event e 3 occurs at noe m 1. By Assumption 1(c), we can only have β m 1 (t) = α m 1 (θ; t) at a single time instant an by Assumption 1(b) that cannot coincie with another event at noe m 1. Therefore, α m (θ; t) must experience a jump from β m 1 (t) to α m 1 (θ; t) at t = s m,i, which is an e 1 event at noe m. In case (ii), s m,i is an active switchover point of α m 1 (θ; t), so either it starts an EP at noe m 2 or it

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Backorders Under the (R,r) Policy

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Backorders Under the (R,r) Policy IPA Derivatives for Make-to-Stock Prouction-Inventory Systems With Backorers Uner the (Rr) Policy Yihong Fan a Benamin Melame b Yao Zhao c Yorai Wari Abstract This paper aresses Infinitesimal Perturbation

More information

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5

More information

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device Close an Open Loop Optimal Control of Buffer an Energy of a Wireless Device V. S. Borkar School of Technology an Computer Science TIFR, umbai, Inia. borkar@tifr.res.in A. A. Kherani B. J. Prabhu INRIA

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

On Characterizing the Delay-Performance of Wireless Scheduling Algorithms

On Characterizing the Delay-Performance of Wireless Scheduling Algorithms On Characterizing the Delay-Performance of Wireless Scheuling Algorithms Xiaojun Lin Center for Wireless Systems an Applications School of Electrical an Computer Engineering, Purue University West Lafayette,

More information

The total derivative. Chapter Lagrangian and Eulerian approaches

The total derivative. Chapter Lagrangian and Eulerian approaches Chapter 5 The total erivative 51 Lagrangian an Eulerian approaches The representation of a flui through scalar or vector fiels means that each physical quantity uner consieration is escribe as a function

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

Switching Time Optimization in Discretized Hybrid Dynamical Systems

Switching Time Optimization in Discretized Hybrid Dynamical Systems Switching Time Optimization in Discretize Hybri Dynamical Systems Kathrin Flaßkamp, To Murphey, an Sina Ober-Blöbaum Abstract Switching time optimization (STO) arises in systems that have a finite set

More information

6 General properties of an autonomous system of two first order ODE

6 General properties of an autonomous system of two first order ODE 6 General properties of an autonomous system of two first orer ODE Here we embark on stuying the autonomous system of two first orer ifferential equations of the form ẋ 1 = f 1 (, x 2 ), ẋ 2 = f 2 (, x

More information

Math 342 Partial Differential Equations «Viktor Grigoryan

Math 342 Partial Differential Equations «Viktor Grigoryan Math 342 Partial Differential Equations «Viktor Grigoryan 6 Wave equation: solution In this lecture we will solve the wave equation on the entire real line x R. This correspons to a string of infinite

More information

Equilibrium in Queues Under Unknown Service Times and Service Value

Equilibrium in Queues Under Unknown Service Times and Service Value University of Pennsylvania ScholarlyCommons Finance Papers Wharton Faculty Research 1-2014 Equilibrium in Queues Uner Unknown Service Times an Service Value Laurens Debo Senthil K. Veeraraghavan University

More information

Perturbation Analysis and Control of Two-Class Stochastic Fluid Models for Communication Networks

Perturbation Analysis and Control of Two-Class Stochastic Fluid Models for Communication Networks 770 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 48, NO. 5, MAY 2003 Perturbation Analysis Control of Two-Class Stochastic Fluid Models for Communication Networks Christos G. Cassras, Fellow, IEEE, Gang

More information

θ x = f ( x,t) could be written as

θ x = f ( x,t) could be written as 9. Higher orer PDEs as systems of first-orer PDEs. Hyperbolic systems. For PDEs, as for ODEs, we may reuce the orer by efining new epenent variables. For example, in the case of the wave equation, (1)

More information

Lyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering,

Lyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering, On the Queue-Overflow Probability of Wireless Systems : A New Approach Combining Large Deviations with Lyapunov Functions V. J. Venkataramanan an Xiaojun Lin Center for Wireless Systems an Applications

More information

Agmon Kolmogorov Inequalities on l 2 (Z d )

Agmon Kolmogorov Inequalities on l 2 (Z d ) Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,

More information

An M/G/1 Retrial Queue with Priority, Balking and Feedback Customers

An M/G/1 Retrial Queue with Priority, Balking and Feedback Customers Journal of Convergence Information Technology Volume 5 Number April 1 An M/G/1 Retrial Queue with Priority Balking an Feeback Customers Peishu Chen * 1 Yiuan Zhu 1 * 1 Faculty of Science Jiangsu University

More information

JUST THE MATHS UNIT NUMBER DIFFERENTIATION 2 (Rates of change) A.J.Hobson

JUST THE MATHS UNIT NUMBER DIFFERENTIATION 2 (Rates of change) A.J.Hobson JUST THE MATHS UNIT NUMBER 10.2 DIFFERENTIATION 2 (Rates of change) by A.J.Hobson 10.2.1 Introuction 10.2.2 Average rates of change 10.2.3 Instantaneous rates of change 10.2.4 Derivatives 10.2.5 Exercises

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

Introduction to the Vlasov-Poisson system

Introduction to the Vlasov-Poisson system Introuction to the Vlasov-Poisson system Simone Calogero 1 The Vlasov equation Consier a particle with mass m > 0. Let x(t) R 3 enote the position of the particle at time t R an v(t) = ẋ(t) = x(t)/t its

More information

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21 Large amping in a structural material may be either esirable or unesirable, epening on the engineering application at han. For example, amping is a esirable property to the esigner concerne with limiting

More information

Lecture XII. where Φ is called the potential function. Let us introduce spherical coordinates defined through the relations

Lecture XII. where Φ is called the potential function. Let us introduce spherical coordinates defined through the relations Lecture XII Abstract We introuce the Laplace equation in spherical coorinates an apply the metho of separation of variables to solve it. This will generate three linear orinary secon orer ifferential equations:

More information

Table of Common Derivatives By David Abraham

Table of Common Derivatives By David Abraham Prouct an Quotient Rules: Table of Common Derivatives By Davi Abraham [ f ( g( ] = [ f ( ] g( + f ( [ g( ] f ( = g( [ f ( ] g( g( f ( [ g( ] Trigonometric Functions: sin( = cos( cos( = sin( tan( = sec

More information

BEYOND THE CONSTRUCTION OF OPTIMAL SWITCHING SURFACES FOR AUTONOMOUS HYBRID SYSTEMS. Mauro Boccadoro Magnus Egerstedt Paolo Valigi Yorai Wardi

BEYOND THE CONSTRUCTION OF OPTIMAL SWITCHING SURFACES FOR AUTONOMOUS HYBRID SYSTEMS. Mauro Boccadoro Magnus Egerstedt Paolo Valigi Yorai Wardi BEYOND THE CONSTRUCTION OF OPTIMAL SWITCHING SURFACES FOR AUTONOMOUS HYBRID SYSTEMS Mauro Boccaoro Magnus Egerstet Paolo Valigi Yorai Wari {boccaoro,valigi}@iei.unipg.it Dipartimento i Ingegneria Elettronica

More information

Sliding mode approach to congestion control in connection-oriented communication networks

Sliding mode approach to congestion control in connection-oriented communication networks JOURNAL OF APPLIED COMPUTER SCIENCE Vol. xx. No xx (200x), pp. xx-xx Sliing moe approach to congestion control in connection-oriente communication networks Anrzej Bartoszewicz, Justyna Żuk Technical University

More information

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Lost Sales I. INTRODUCTION

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Lost Sales I. INTRODUCTION IEEE RANSACIONS ON AOMAIC CONROL, VOL. 52, NO. 8, AGS 27 1491 [2]. Zaborzsky, G. Huang, B. Zheng, an. C. Leung, On the phaseportrait of a class of large nonlinear ynamic systems such as the power system,

More information

The derivative of a function f(x) is another function, defined in terms of a limiting expression: f(x + δx) f(x)

The derivative of a function f(x) is another function, defined in terms of a limiting expression: f(x + δx) f(x) Y. D. Chong (2016) MH2801: Complex Methos for the Sciences 1. Derivatives The erivative of a function f(x) is another function, efine in terms of a limiting expression: f (x) f (x) lim x δx 0 f(x + δx)

More information

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION The Annals of Statistics 1997, Vol. 25, No. 6, 2313 2327 LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION By Eva Riccomagno, 1 Rainer Schwabe 2 an Henry P. Wynn 1 University of Warwick, Technische

More information

12.11 Laplace s Equation in Cylindrical and

12.11 Laplace s Equation in Cylindrical and SEC. 2. Laplace s Equation in Cylinrical an Spherical Coorinates. Potential 593 2. Laplace s Equation in Cylinrical an Spherical Coorinates. Potential One of the most important PDEs in physics an engineering

More information

Schrödinger s equation.

Schrödinger s equation. Physics 342 Lecture 5 Schröinger s Equation Lecture 5 Physics 342 Quantum Mechanics I Wenesay, February 3r, 2010 Toay we iscuss Schröinger s equation an show that it supports the basic interpretation of

More information

Laplacian Cooperative Attitude Control of Multiple Rigid Bodies

Laplacian Cooperative Attitude Control of Multiple Rigid Bodies Laplacian Cooperative Attitue Control of Multiple Rigi Boies Dimos V. Dimarogonas, Panagiotis Tsiotras an Kostas J. Kyriakopoulos Abstract Motivate by the fact that linear controllers can stabilize the

More information

Transmission Line Matrix (TLM) network analogues of reversible trapping processes Part B: scaling and consistency

Transmission Line Matrix (TLM) network analogues of reversible trapping processes Part B: scaling and consistency Transmission Line Matrix (TLM network analogues of reversible trapping processes Part B: scaling an consistency Donar e Cogan * ANC Eucation, 308-310.A. De Mel Mawatha, Colombo 3, Sri Lanka * onarecogan@gmail.com

More information

Control of Communication Networks Using Infinitesimal Perturbation Analysis of Stochastic Fluid Models

Control of Communication Networks Using Infinitesimal Perturbation Analysis of Stochastic Fluid Models Control of Communication Networks Using Infinitesimal Perturbation Analysis of Stochastic Fluid Models Christos Panayiotou 1, Christos G. Cassandras 2, Gang Sun 3, and Yorai Wardi 4 1 Dept. of Electrical

More information

Role of parameters in the stochastic dynamics of a stick-slip oscillator

Role of parameters in the stochastic dynamics of a stick-slip oscillator Proceeing Series of the Brazilian Society of Applie an Computational Mathematics, v. 6, n. 1, 218. Trabalho apresentao no XXXVII CNMAC, S.J. os Campos - SP, 217. Proceeing Series of the Brazilian Society

More information

APPROXIMATE SOLUTION FOR TRANSIENT HEAT TRANSFER IN STATIC TURBULENT HE II. B. Baudouy. CEA/Saclay, DSM/DAPNIA/STCM Gif-sur-Yvette Cedex, France

APPROXIMATE SOLUTION FOR TRANSIENT HEAT TRANSFER IN STATIC TURBULENT HE II. B. Baudouy. CEA/Saclay, DSM/DAPNIA/STCM Gif-sur-Yvette Cedex, France APPROXIMAE SOLUION FOR RANSIEN HEA RANSFER IN SAIC URBULEN HE II B. Bauouy CEA/Saclay, DSM/DAPNIA/SCM 91191 Gif-sur-Yvette Ceex, France ABSRAC Analytical solution in one imension of the heat iffusion equation

More information

Lower Bounds for the Smoothed Number of Pareto optimal Solutions

Lower Bounds for the Smoothed Number of Pareto optimal Solutions Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.

More information

Slide10 Haykin Chapter 14: Neurodynamics (3rd Ed. Chapter 13)

Slide10 Haykin Chapter 14: Neurodynamics (3rd Ed. Chapter 13) Slie10 Haykin Chapter 14: Neuroynamics (3r E. Chapter 13) CPSC 636-600 Instructor: Yoonsuck Choe Spring 2012 Neural Networks with Temporal Behavior Inclusion of feeback gives temporal characteristics to

More information

Acute sets in Euclidean spaces

Acute sets in Euclidean spaces Acute sets in Eucliean spaces Viktor Harangi April, 011 Abstract A finite set H in R is calle an acute set if any angle etermine by three points of H is acute. We examine the maximal carinality α() of

More information

Generalization of the persistent random walk to dimensions greater than 1

Generalization of the persistent random walk to dimensions greater than 1 PHYSICAL REVIEW E VOLUME 58, NUMBER 6 DECEMBER 1998 Generalization of the persistent ranom walk to imensions greater than 1 Marián Boguñá, Josep M. Porrà, an Jaume Masoliver Departament e Física Fonamental,

More information

Permanent vs. Determinant

Permanent vs. Determinant Permanent vs. Determinant Frank Ban Introuction A major problem in theoretical computer science is the Permanent vs. Determinant problem. It asks: given an n by n matrix of ineterminates A = (a i,j ) an

More information

Fluid model for a data network with α-fair bandwidth sharing and general document size distributions: two examples of stability

Fluid model for a data network with α-fair bandwidth sharing and general document size distributions: two examples of stability IMS Lecture Notes Monograph Series??? Vol. 0 (0000) 1 c Institute of Mathematical Statistics, 0000 Flui moel for a ata network with α-fair banwith sharing an general ocument size istributions: two examples

More information

Quantum mechanical approaches to the virial

Quantum mechanical approaches to the virial Quantum mechanical approaches to the virial S.LeBohec Department of Physics an Astronomy, University of Utah, Salt Lae City, UT 84112, USA Date: June 30 th 2015 In this note, we approach the virial from

More information

Perturbation Analysis for Online Control and Optimization of Stochastic Fluid Models

Perturbation Analysis for Online Control and Optimization of Stochastic Fluid Models 1234 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 47, NO 8, AUGUST 2002 Perturbation Analysis for Online Control Optimization of Stochastic Fluid Models Christos G Cassras, Fellow, IEEE, Yorai Wardi, Member,

More information

Improved Rate-Based Pull and Push Strategies in Large Distributed Networks

Improved Rate-Based Pull and Push Strategies in Large Distributed Networks Improve Rate-Base Pull an Push Strategies in Large Distribute Networks Wouter Minnebo an Benny Van Hout Department of Mathematics an Computer Science University of Antwerp - imins Mielheimlaan, B-00 Antwerp,

More information

A Sketch of Menshikov s Theorem

A Sketch of Menshikov s Theorem A Sketch of Menshikov s Theorem Thomas Bao March 14, 2010 Abstract Let Λ be an infinite, locally finite oriente multi-graph with C Λ finite an strongly connecte, an let p

More information

Calculus of Variations

Calculus of Variations 16.323 Lecture 5 Calculus of Variations Calculus of Variations Most books cover this material well, but Kirk Chapter 4 oes a particularly nice job. x(t) x* x*+ αδx (1) x*- αδx (1) αδx (1) αδx (1) t f t

More information

arxiv: v1 [physics.flu-dyn] 8 May 2014

arxiv: v1 [physics.flu-dyn] 8 May 2014 Energetics of a flui uner the Boussinesq approximation arxiv:1405.1921v1 [physics.flu-yn] 8 May 2014 Kiyoshi Maruyama Department of Earth an Ocean Sciences, National Defense Acaemy, Yokosuka, Kanagawa

More information

MAKE-TO-STOCK SYSTEMS WITH BACKORDERS: IPA GRADIENTS. Yao Zhao Benjamin Melamed

MAKE-TO-STOCK SYSTEMS WITH BACKORDERS: IPA GRADIENTS. Yao Zhao Benjamin Melamed Proceeings of the 24 Winter Simulation Conference R. Ingalls, M. Rossetti, J. Smith, B.Peters, es. MAKE-TO-STOCK SYSTEMS WITH BACKORDERS: IPA GRADIENTS Yao Zhao Benjamin Melame Department of Management

More information

Balancing Expected and Worst-Case Utility in Contracting Models with Asymmetric Information and Pooling

Balancing Expected and Worst-Case Utility in Contracting Models with Asymmetric Information and Pooling Balancing Expecte an Worst-Case Utility in Contracting Moels with Asymmetric Information an Pooling R.B.O. erkkamp & W. van en Heuvel & A.P.M. Wagelmans Econometric Institute Report EI2018-01 9th January

More information

Lecture 2 Lagrangian formulation of classical mechanics Mechanics

Lecture 2 Lagrangian formulation of classical mechanics Mechanics Lecture Lagrangian formulation of classical mechanics 70.00 Mechanics Principle of stationary action MATH-GA To specify a motion uniquely in classical mechanics, it suffices to give, at some time t 0,

More information

On the Aloha throughput-fairness tradeoff

On the Aloha throughput-fairness tradeoff On the Aloha throughput-fairness traeoff 1 Nan Xie, Member, IEEE, an Steven Weber, Senior Member, IEEE Abstract arxiv:1605.01557v1 [cs.it] 5 May 2016 A well-known inner boun of the stability region of

More information

05 The Continuum Limit and the Wave Equation

05 The Continuum Limit and the Wave Equation Utah State University DigitalCommons@USU Founations of Wave Phenomena Physics, Department of 1-1-2004 05 The Continuum Limit an the Wave Equation Charles G. Torre Department of Physics, Utah State University,

More information

inflow outflow Part I. Regular tasks for MAE598/494 Task 1

inflow outflow Part I. Regular tasks for MAE598/494 Task 1 MAE 494/598, Fall 2016 Project #1 (Regular tasks = 20 points) Har copy of report is ue at the start of class on the ue ate. The rules on collaboration will be release separately. Please always follow the

More information

Situation awareness of power system based on static voltage security region

Situation awareness of power system based on static voltage security region The 6th International Conference on Renewable Power Generation (RPG) 19 20 October 2017 Situation awareness of power system base on static voltage security region Fei Xiao, Zi-Qing Jiang, Qian Ai, Ran

More information

Proof of SPNs as Mixture of Trees

Proof of SPNs as Mixture of Trees A Proof of SPNs as Mixture of Trees Theorem 1. If T is an inuce SPN from a complete an ecomposable SPN S, then T is a tree that is complete an ecomposable. Proof. Argue by contraiction that T is not a

More information

Quantum Mechanics in Three Dimensions

Quantum Mechanics in Three Dimensions Physics 342 Lecture 20 Quantum Mechanics in Three Dimensions Lecture 20 Physics 342 Quantum Mechanics I Monay, March 24th, 2008 We begin our spherical solutions with the simplest possible case zero potential.

More information

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes Leaving Ranomness to Nature: -Dimensional Prouct Coes through the lens of Generalize-LDPC coes Tavor Baharav, Kannan Ramchanran Dept. of Electrical Engineering an Computer Sciences, U.C. Berkeley {tavorb,

More information

Iterated Point-Line Configurations Grow Doubly-Exponentially

Iterated Point-Line Configurations Grow Doubly-Exponentially Iterate Point-Line Configurations Grow Doubly-Exponentially Joshua Cooper an Mark Walters July 9, 008 Abstract Begin with a set of four points in the real plane in general position. A to this collection

More information

Thermal conductivity of graded composites: Numerical simulations and an effective medium approximation

Thermal conductivity of graded composites: Numerical simulations and an effective medium approximation JOURNAL OF MATERIALS SCIENCE 34 (999)5497 5503 Thermal conuctivity of grae composites: Numerical simulations an an effective meium approximation P. M. HUI Department of Physics, The Chinese University

More information

Online Appendix for Trade Policy under Monopolistic Competition with Firm Selection

Online Appendix for Trade Policy under Monopolistic Competition with Firm Selection Online Appenix for Trae Policy uner Monopolistic Competition with Firm Selection Kyle Bagwell Stanfor University an NBER Seung Hoon Lee Georgia Institute of Technology September 6, 2018 In this Online

More information

ELEC3114 Control Systems 1

ELEC3114 Control Systems 1 ELEC34 Control Systems Linear Systems - Moelling - Some Issues Session 2, 2007 Introuction Linear systems may be represente in a number of ifferent ways. Figure shows the relationship between various representations.

More information

REFERENCES. Minimal Communication for Essential Transitions in a Distributed Discrete-Event System V. DISCUSSION

REFERENCES. Minimal Communication for Essential Transitions in a Distributed Discrete-Event System V. DISCUSSION IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 52, NO. 8, AUGUST 2007 1495 Theorem 5: W.p.1, the IPA erivatives of the lost-sales time average with respect to the prouction rate parameter are given for all

More information

A Path Planning Method Using Cubic Spiral with Curvature Constraint

A Path Planning Method Using Cubic Spiral with Curvature Constraint A Path Planning Metho Using Cubic Spiral with Curvature Constraint Tzu-Chen Liang an Jing-Sin Liu Institute of Information Science 0, Acaemia Sinica, Nankang, Taipei 5, Taiwan, R.O.C., Email: hartree@iis.sinica.eu.tw

More information

Convergence of Random Walks

Convergence of Random Walks Chapter 16 Convergence of Ranom Walks This lecture examines the convergence of ranom walks to the Wiener process. This is very important both physically an statistically, an illustrates the utility of

More information

Relative Entropy and Score Function: New Information Estimation Relationships through Arbitrary Additive Perturbation

Relative Entropy and Score Function: New Information Estimation Relationships through Arbitrary Additive Perturbation Relative Entropy an Score Function: New Information Estimation Relationships through Arbitrary Aitive Perturbation Dongning Guo Department of Electrical Engineering & Computer Science Northwestern University

More information

The canonical controllers and regular interconnection

The canonical controllers and regular interconnection Systems & Control Letters ( www.elsevier.com/locate/sysconle The canonical controllers an regular interconnection A.A. Julius a,, J.C. Willems b, M.N. Belur c, H.L. Trentelman a Department of Applie Mathematics,

More information

On the number of isolated eigenvalues of a pair of particles in a quantum wire

On the number of isolated eigenvalues of a pair of particles in a quantum wire On the number of isolate eigenvalues of a pair of particles in a quantum wire arxiv:1812.11804v1 [math-ph] 31 Dec 2018 Joachim Kerner 1 Department of Mathematics an Computer Science FernUniversität in

More information

The Sokhotski-Plemelj Formula

The Sokhotski-Plemelj Formula hysics 25 Winter 208 The Sokhotski-lemelj Formula. The Sokhotski-lemelj formula The Sokhotski-lemelj formula is a relation between the following generalize functions (also calle istributions), ±iǫ = iπ(),

More information

A Simple Model for the Calculation of Plasma Impedance in Atmospheric Radio Frequency Discharges

A Simple Model for the Calculation of Plasma Impedance in Atmospheric Radio Frequency Discharges Plasma Science an Technology, Vol.16, No.1, Oct. 214 A Simple Moel for the Calculation of Plasma Impeance in Atmospheric Raio Frequency Discharges GE Lei ( ) an ZHANG Yuantao ( ) Shanong Provincial Key

More information

Modeling the effects of polydispersity on the viscosity of noncolloidal hard sphere suspensions. Paul M. Mwasame, Norman J. Wagner, Antony N.

Modeling the effects of polydispersity on the viscosity of noncolloidal hard sphere suspensions. Paul M. Mwasame, Norman J. Wagner, Antony N. Submitte to the Journal of Rheology Moeling the effects of polyispersity on the viscosity of noncolloial har sphere suspensions Paul M. Mwasame, Norman J. Wagner, Antony N. Beris a) epartment of Chemical

More information

Node Density and Delay in Large-Scale Wireless Networks with Unreliable Links

Node Density and Delay in Large-Scale Wireless Networks with Unreliable Links Noe Density an Delay in Large-Scale Wireless Networks with Unreliable Links Shizhen Zhao, Xinbing Wang Department of Electronic Engineering Shanghai Jiao Tong University, China Email: {shizhenzhao,xwang}@sjtu.eu.cn

More information

All s Well That Ends Well: Supplementary Proofs

All s Well That Ends Well: Supplementary Proofs All s Well That Ens Well: Guarantee Resolution of Simultaneous Rigi Boy Impact 1:1 All s Well That Ens Well: Supplementary Proofs This ocument complements the paper All s Well That Ens Well: Guarantee

More information

Sturm-Liouville Theory

Sturm-Liouville Theory LECTURE 5 Sturm-Liouville Theory In the three preceing lectures I emonstrate the utility of Fourier series in solving PDE/BVPs. As we ll now see, Fourier series are just the tip of the iceberg of the theory

More information

TCP throughput and timeout steady state and time-varying dynamics

TCP throughput and timeout steady state and time-varying dynamics TCP throughput an timeout steay state an time-varying ynamics Stephan Bohacek an Khushboo Shah Dept. of Electrical an Computer Engineering Dept. of Electrical Engineering University of Delaware University

More information

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Ashish Goel Michael Kapralov Sanjeev Khanna Abstract We consier the well-stuie problem of fining a perfect matching in -regular bipartite

More information

arxiv:hep-th/ v1 3 Feb 1993

arxiv:hep-th/ v1 3 Feb 1993 NBI-HE-9-89 PAR LPTHE 9-49 FTUAM 9-44 November 99 Matrix moel calculations beyon the spherical limit arxiv:hep-th/93004v 3 Feb 993 J. Ambjørn The Niels Bohr Institute Blegamsvej 7, DK-00 Copenhagen Ø,

More information

Vectors in two dimensions

Vectors in two dimensions Vectors in two imensions Until now, we have been working in one imension only The main reason for this is to become familiar with the main physical ieas like Newton s secon law, without the aitional complication

More information

Tutorial Test 5 2D welding robot

Tutorial Test 5 2D welding robot Tutorial Test 5 D weling robot Phys 70: Planar rigi boy ynamics The problem statement is appene at the en of the reference solution. June 19, 015 Begin: 10:00 am En: 11:30 am Duration: 90 min Solution.

More information

The Exact Form and General Integrating Factors

The Exact Form and General Integrating Factors 7 The Exact Form an General Integrating Factors In the previous chapters, we ve seen how separable an linear ifferential equations can be solve using methos for converting them to forms that can be easily

More information

Sharp Thresholds. Zachary Hamaker. March 15, 2010

Sharp Thresholds. Zachary Hamaker. March 15, 2010 Sharp Threshols Zachary Hamaker March 15, 2010 Abstract The Kolmogorov Zero-One law states that for tail events on infinite-imensional probability spaces, the probability must be either zero or one. Behavior

More information

Nested Saturation with Guaranteed Real Poles 1

Nested Saturation with Guaranteed Real Poles 1 Neste Saturation with Guarantee Real Poles Eric N Johnson 2 an Suresh K Kannan 3 School of Aerospace Engineering Georgia Institute of Technology, Atlanta, GA 3332 Abstract The global stabilization of asymptotically

More information

Throughput Optimal Control of Cooperative Relay Networks

Throughput Optimal Control of Cooperative Relay Networks hroughput Optimal Control of Cooperative Relay Networks Emun Yeh Dept. of Electrical Engineering Yale University New Haven, C 06520, USA E-mail: emun.yeh@yale.eu Ranall Berry Dept. of Electrical an Computer

More information

A Review of Multiple Try MCMC algorithms for Signal Processing

A Review of Multiple Try MCMC algorithms for Signal Processing A Review of Multiple Try MCMC algorithms for Signal Processing Luca Martino Image Processing Lab., Universitat e València (Spain) Universia Carlos III e Mari, Leganes (Spain) Abstract Many applications

More information

DIFFERENTIAL GEOMETRY, LECTURE 15, JULY 10

DIFFERENTIAL GEOMETRY, LECTURE 15, JULY 10 DIFFERENTIAL GEOMETRY, LECTURE 15, JULY 10 5. Levi-Civita connection From now on we are intereste in connections on the tangent bunle T X of a Riemanninam manifol (X, g). Out main result will be a construction

More information

1 dx. where is a large constant, i.e., 1, (7.6) and Px is of the order of unity. Indeed, if px is given by (7.5), the inequality (7.

1 dx. where is a large constant, i.e., 1, (7.6) and Px is of the order of unity. Indeed, if px is given by (7.5), the inequality (7. Lectures Nine an Ten The WKB Approximation The WKB metho is a powerful tool to obtain solutions for many physical problems It is generally applicable to problems of wave propagation in which the frequency

More information

Delocalization of boundary states in disordered topological insulators

Delocalization of boundary states in disordered topological insulators Journal of Physics A: Mathematical an Theoretical J. Phys. A: Math. Theor. 48 (05) FT0 (pp) oi:0.088/75-83/48//ft0 Fast Track Communication Delocalization of bounary states in isorere topological insulators

More information

Harmonic Modelling of Thyristor Bridges using a Simplified Time Domain Method

Harmonic Modelling of Thyristor Bridges using a Simplified Time Domain Method 1 Harmonic Moelling of Thyristor Briges using a Simplifie Time Domain Metho P. W. Lehn, Senior Member IEEE, an G. Ebner Abstract The paper presents time omain methos for harmonic analysis of a 6-pulse

More information

Chapter 6: Energy-Momentum Tensors

Chapter 6: Energy-Momentum Tensors 49 Chapter 6: Energy-Momentum Tensors This chapter outlines the general theory of energy an momentum conservation in terms of energy-momentum tensors, then applies these ieas to the case of Bohm's moel.

More information

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs

Lectures - Week 10 Introduction to Ordinary Differential Equations (ODES) First Order Linear ODEs Lectures - Week 10 Introuction to Orinary Differential Equations (ODES) First Orer Linear ODEs When stuying ODEs we are consiering functions of one inepenent variable, e.g., f(x), where x is the inepenent

More information

Euler equations for multiple integrals

Euler equations for multiple integrals Euler equations for multiple integrals January 22, 2013 Contents 1 Reminer of multivariable calculus 2 1.1 Vector ifferentiation......................... 2 1.2 Matrix ifferentiation........................

More information

II. First variation of functionals

II. First variation of functionals II. First variation of functionals The erivative of a function being zero is a necessary conition for the etremum of that function in orinary calculus. Let us now tackle the question of the equivalent

More information

Systems & Control Letters

Systems & Control Letters Systems & ontrol Letters ( ) ontents lists available at ScienceDirect Systems & ontrol Letters journal homepage: www.elsevier.com/locate/sysconle A converse to the eterministic separation principle Jochen

More information

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k A Proof of Lemma 2 B Proof of Lemma 3 Proof: Since the support of LL istributions is R, two such istributions are equivalent absolutely continuous with respect to each other an the ivergence is well-efine

More information

Exponential Tracking Control of Nonlinear Systems with Actuator Nonlinearity

Exponential Tracking Control of Nonlinear Systems with Actuator Nonlinearity Preprints of the 9th Worl Congress The International Feeration of Automatic Control Cape Town, South Africa. August -9, Exponential Tracking Control of Nonlinear Systems with Actuator Nonlinearity Zhengqiang

More information

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy,

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy, NOTES ON EULER-BOOLE SUMMATION JONATHAN M BORWEIN, NEIL J CALKIN, AND DANTE MANNA Abstract We stuy a connection between Euler-MacLaurin Summation an Boole Summation suggeste in an AMM note from 196, which

More information

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS Yannick DEVILLE Université Paul Sabatier Laboratoire Acoustique, Métrologie, Instrumentation Bât. 3RB2, 8 Route e Narbonne,

More information

arxiv:physics/ v2 [physics.ed-ph] 23 Sep 2003

arxiv:physics/ v2 [physics.ed-ph] 23 Sep 2003 Mass reistribution in variable mass systems Célia A. e Sousa an Vítor H. Rorigues Departamento e Física a Universiae e Coimbra, P-3004-516 Coimbra, Portugal arxiv:physics/0211075v2 [physics.e-ph] 23 Sep

More information

Optimal Control of Spatially Distributed Systems

Optimal Control of Spatially Distributed Systems Optimal Control of Spatially Distribute Systems Naer Motee an Ali Jababaie Abstract In this paper, we stuy the structural properties of optimal control of spatially istribute systems. Such systems consist

More information

ensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y

ensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y Ph195a lecture notes, 1/3/01 Density operators for spin- 1 ensembles So far in our iscussion of spin- 1 systems, we have restricte our attention to the case of pure states an Hamiltonian evolution. Toay

More information

Dot trajectories in the superposition of random screens: analysis and synthesis

Dot trajectories in the superposition of random screens: analysis and synthesis 1472 J. Opt. Soc. Am. A/ Vol. 21, No. 8/ August 2004 Isaac Amiror Dot trajectories in the superposition of ranom screens: analysis an synthesis Isaac Amiror Laboratoire e Systèmes Périphériques, Ecole

More information