Distributed Strategic Learning with Application to Network Security

Size: px
Start display at page:

Download "Distributed Strategic Learning with Application to Network Security"

Transcription

1 Amercan Control Conference on O'Farrell Street San Francsco CA USA June 9 - July Dstrbute Strategc Learnng wth Applcaton to Network Securty Quanyan Zhu Hamou Tembne an Tamer Başar Abstract We conser n ths paper a class of two-player nonzero-sum stochastc games wth ncomplete nformaton. We evelop fully strbute renforcement learnng algorthms whch requre for each player a mnmal amount of nformaton regarng the other player. At each tme each player can be n an actve moe or n a sleep moe. If a player s n an actve moe she upates her strategy an estmates of unknown quanttes usng a specfc pure or hybr learnng pattern. We use stochastc approxmaton technques to show that uner approprate contons the pure or hybr learnng schemes wth ranom upates can be stue usng ther etermnstc ornary fferental equaton ODE) counterparts. Convergence to state-nepenent equlbra s analyze uner specfc payoff functons. Results are apple to a class of securty games n whch the attacker an the efener aopt fferent learnng schemes an upate ther strateges at ranom tmes. I. INTRODUCTION In recent years game-theoretc methos have been apple to stuy resource allocaton problems n communcaton networks securty mechansms for network securty an prvacy [] an economc prcng n power networks [7]. Most frameworks have assume the ratonalty of the agents or the ecson-makers as well as complete nformaton about ther payoffs an strateges. However n practce ue to nose an uncertantes n the envronment agents often have nformaton lmtatons n ther knowlege not only of other players payoffs an strateges but also of ther own. For ths reason we must conser the learnng aspects of the ecsonmakers an aress ther estmaton an assessment of ther payoffs an strateges base on the nformaton avalable to them. Learnng n games has been nvestgate n many recent papers. In [9] [6] a fcttous-play algorthm s use to fn Nash equlbrum n a nonzero-sum game. Players observe opponents actons an upate ther strateges n reacton to others actons n a best-response fashon. The authors n [4] propose a mofe verson of the fcttous play calle jont fcttous play wth nerta for potental games n whch players alternate ther upates at fferent tme slots. In stanar fcttous play Brown 95 Robnson 95) players have to montor the actons of every other player an nee to know ther own payoff so as to fn ther optmal actons. In ths paper we are ntereste n fully strbute learnng proceures where players o not nee any nformaton about the actons or payoffs of the other players an moreover they o not nee to have complete Ths work was supporte n part by grants from AFOSR an DOE. Q. Zhu an T. Başar are wth Dept. ECE an CSL Unversty of Illnos 38 West Man Urbana IL 68 USA. Unversty of Illnos at Urbana-Champagn. {zhu3 basar}@llnos.eu. H. Tembne s wth Telecommuncaton Department Supelec France. E-mal: tembne@eee.org nformaton of ther own payoff structure. The focus of ths paper s on fnte games where the exstence of mxe Nash equlbrum s ensure by [5]. Some recent work has been one for nfnte or contnuous-kernel) games uner ncomplete nformaton where extremum-seekng methos have been use for local) convergence to pure-strategy Nash equlbra see [8] an several of the references theren). A smlar settng was aopte n [8] whch however ealt wth zero-sum games. Here we exten these results n a nontrval way to general-sum two-person games an ntrouce the new paragm of hybr learnng where players can choose fferent pure learnng schemes at fferent tmes base on ther ratonalty an preferences. The heterogenous learnng n [8] can be seen as a specal case of the generalze hybr learnng of ths paper. In orer to rener the learnng more practcal n the context of network securty we ntrouce atonal features of the game: F) In aton to exogenous envronment uncertantes we ntrouce nherent moe uncertantes n players. Each player can be n an actve moe or a sleepng moe. Players learn ther strateges an average payoffs only when they are n an actve moe. F) We allow the nteracton between the players to occur at ranom tmes unknown by the players. We use stochastc approxmaton technques to show that the hybr learnng schemes wth ranom upates can be stue usng ther etermnstc ornary fferental equaton ODE) counterparts. The ODE obtane for hybr learnng s a lnear combnaton of ODEs from pure learnng schemes. We show the convergence propertes of the learnng algorthms for specal classes of games namely games wth two actons as well as potental games an emonstrate ther applcablty n a network securty envronment. The paper s structure as follows. In Secton II we formulate the two-player nonzero-sum stochastc game wth ncomplete nformaton an ntrouce the soluton concept of state-nepenent Nash equlbrum. In Secton III we present a number of stnct learnng schemes an scuss ther propertes. In Secton IV we present man results on learnng for general-sum games. In Secton V we apply the learnng algorthms to a network securty applcaton. Secton VI conclues the paper. II. TWO-PERSON GAME In ths secton we conser a fnte twoperson nonzero-sum game NZSG) n whch each player has stochastc payoffs an the nteractons between the players are ranom. Let Ξ := N{S } N {Ω } N {A } N {U sb.)} s Sb B N be the stochastc NZSG where N = {} s the set of players P an P who maxmze ther payoffs an A A //$6. AACC 457

2 are the fnte sets of actons avalable to players P an P respectvely. The set S := [s s s N S ] comprses all possble NS external states of P whch escrbes the envronment where P reses. We assume that the state space S := N S an the probablty transton on the states are both unknown to the players. A state s s ranomly an nepenently chosen at each tme from the set S. We assume that the acton spaces are the same n each state. In aton players o not nteract at all tmes. A player can be n one of the two moes: actve moe or sleep moe enote by moe B = an B = respectvely. Let B N be an... ranom varable on Ω := {{} whose probablty mass functon s gven by ρ B = p B = p B N. The player moes can be = vewe as nternal states that are governe by the nherent ranomness of the player. The system moe B Ω := Ω Ω s a set of nepenent moes of the players an we enote by B N as the corresponng set of actve players to B. The NZSG s characterze by utlty functons U : S Ω A A R. P collects a payoff U sb a a ) when P chooses a A an P uses a A at state s S an moe B. Remark : The preceng game moel can be vewe as a specal class of stochastc games n whch the state transtons are nepenent of the player actons as well as the current state an we assume that the state processes an the actvtes of the players are... ranom varables. We have slotte tme t {...} when players pck ther mxe strateges as functons of what has transpre n the past to the extent the nformaton avalable to them allows. Towar ths en we let x t a ) enote the probabltes of P choosng a A at tme t an let x t = [x t a )] a A be the mxe strateges { of P at tme t where more precsely x t X := x R A : x a ) [] a A x a ) = }. In partcular we efne e a R A wth a A as unt vectors of szes A whose entry that correspons to a s whle others are zeros. We assume that the mxe strateges of the players are nepenent of the current state s an the player moe B. For any gven par of mxe strateges x x ) X X an for a fxe s S B Ω we efne the expecte utlty as expecte payoff to P) as U sb x x ) := E xx U sb a a ) where E xx U enotes expectaton of U over the acton sets of the players uner the gven mxe strateges. A further expectaton of ths quantty over the states s an B enote bye sb yels the performance nex of the expecte game. We now efne the equlbrum concept of nterest for ths game that s the equlbrum of the expecte game: Defnton State-nepenent equlbrum): A strategy profle x x ) X X s a state-nepenent equlbrum of the game Ξ f t s equlbrum of the expecte game.e. x X x X E sb U sb x x ) E sb U sb x x ) an E sb U sb x x ) E sb U sb x x ). Snce the expecte game s a two-player game wth fnte actons for each player the exstence of an equlbrum follows from Nash s exstence theorem [5] an hence we have the followng lemma. Lemma : The stochastc NSZG Ξ wth unknown states an changng moes amts a state-nepenent equlbrum. A. Learnng Proceures III. LEARNING IN NZSGS In many practcal applcatons players n two-person NZSGs o not have complete knowlege of each other s utlty functons an the state of ther envronment. Moreover they o not know whether they nteract wth the other player or not. Hence the equlbrum strategy has to be learne onlne by observng the realze payoffs urng each tme slot. A general learnng proceure s outlne as follows. At each tme slot t Z + each player generates an nternal moe B to etermne whether to partcpate n the game or not. If both players are actve they nteract an receve a payoff after the play. If only one of the players s actve then the actve player receves hs payoff as an outcome of hs acton at t only wthout nteracton wth the other player. If players o not have the knowlege of ther actve moe probablty p then each player keeps a count of ts nteracton wth others by upatng ts vectors θ jt R j {} as follows: θ jt = θ jt + l {Bj=} where θ jt s P s count of Pj s number of actvty snce t an the ntal conton s gven by θ j = j {}. The actve players choose an acton a t A at tme t an observe or measure an output u jt R as an outcome of ther actons. Players estmate ther payoffs by upatng the entry of the estmate payoff vector û t+ R A that correspons to the chosen acton a t. In a smlar way players upate ther strategy vectors x t+ base on a specfc learnng scheme to be ntrouce later). The upate of the strategy vectors can explot the payoff nformaton û t from the prevous tme step. In ths case we say the learnng s combne. The general combne learnng upates on the strategy an utlty vectors take the followng form: { xt+ = x t +Π t λ t a t u t û t x t ) ) û t+ = û t +Σ t ν t a t u t x t û t ) where Π t Σ t N are properly chosen functons for strategy an utlty upates respectvely. The parameters λ t ν t are learnng rates ncatng players capabltes of nformaton retreval an upate. The vectors x t X are mxe strateges of the players at tme t. û t N are estmate average payoffs upate at each teraton t an u t N are the observe payoffs receve by players at tme t. The learnng rates λ t ν t R + nee to satsfy the contons C) t λ t < t ν t < ; C) t λ t = + t ν t = +. The learnng rates of P are relatve to ther frequency of actvty. In general they are functons of θ N an can be wrtten as λ θt)ν θt). We nee to aopt a tme reference for the game usng maxmum learnng rates among 458

3 the actve players.e. λ t := max B t)λ θt) ν t := max B t)ν θt). It can be verfe that the reference learnng rates λ tν t satsfy C) an C) f λ t ν t satsfy the contons for every N. The learnng rates λ tν t as we wll see later affect the ODE approxmaton. We call the learnng n ) a COmbne DIstrbute PAyoff an Strategy Renforcement Learnng CODIPAS-RL) [8]. The players can have fferent learnng rates for ther utlty an strategy upates. The payoff learnng rate s on a faster tme scale than strategy learnng rate f λ t /ν t as t ; f t s the other way aroun ν t /λ t as t. In the former case the payoff learnng can be seen as quas-statc compare to the strategy learnng an vce versa for the latter. B. Learnng Schemes We ntrouce fferent learnng schemes n the form of ) for the stochastc NZSG. Let L = {L k k { 5}} be the set of fve pure learnng schemes. A player P chooses a learnng schemes P from the set L. We call the learnng homogeneous f both players use the same pure learnng schemes an heterogeneous f players use fferent learnng schemes.e. P P. ) Bush-Mosteller-base CODIPAS-RL L : Let Γ R be a reference level of P an Γ t := L s gven by u t Γ sup sb a U sb a) Γ. The learnng pattern x t+ a ) = x t a )+λ t l { B t)} Γ t l{at=a } x t a ) ) û t+ a ) = û t a )+ν t l {at=a B t)} The upates on the strategy an the estmate payoff are ecouple but they are mplctly epenent. The strategy upate oes not explot the knowlege of estmate payoff but only reles on the observe payoffs urng each tme slot. The strategy upate of L s wely stue n machne learnng an has been ntally propose by Bush an Mosteller n [6]. Combne wth the payoff upate we obtan a COPIDAS- RL base on Bush-Mosteller learnng. When Γ = we obtan the learnng schemes n [] [4]. ) Boltzmann-Gbbs-base CODIPAS-RL L : Let βǫ : R A R A be the Boltzmann-Gbbs B-G) strategy mappng gven by β e ǫ û t )a ) := ǫ ût a ) a A e ǫ ût a ) a A. It s also known as the soft-max functon. When ǫ the B-G strategy yels a pure) strategy that pcks the maxmum entry of the payoff vector û t. The learnng pattern L s gven by x t+ a ) = x t a )+λ t l { B t)} βǫ û t )a t ) x t a )) û t+ a ) = û t a )+ν t l {at=a B t)} The strategy an the estmate payoff are upate n a couple fashon. The numercal value of experment s use n the estmaton an the estmate payoffs are use to bult the strategy here the estmatons are crucal snce a player oes not know the numercal value of the payoff corresponng to hs other actons that he not use). The strategy upate s a B-G base renforcement learnng. Combne together one gets the B-G base CODIPAS-RL. The rest pont L can be seen as the equlbrum for a mofe game wth the perturbe payoff E sb U + ǫ H where H s the extra entropy term as scusse n [6]. 3) Imtatve B-G CODIPAS-RL L 3 : Let βǫt I : X R A R A be the mtatve B-G strategy mappng gven by β ǫt I x x tû t )a ) = ta )e ǫ ût a ) a A xta )e ǫ ût a ) a A. The learnng pattern L 3 s gven by x t+ a ) = x t a )+λ t l { B t)} βi ǫt û t )a ) x t a )) û t+ a ) = û t a )+ν t l {at=a B t)} The mtatve B-G learnng weghts the B-G strategy wth the current strategy vector x t an the strategy mappng β ǫt I s tme-epenent. It allows the learnng strateges to be attane at the bounary of the smplex X. 4) Weghte Imtatve B-G CODIPAS-RL L 4 : Let βw t : X R R A R A be the mtatve weghte B- G strategy mappng gven by β t Wx tλ t û t )a ) := x ta )+λ a t)ût ) a ) for every a A xta )+λt)ût a A. The learnng pattern L 4 s gven by x t+ a ) = x t a )+l { B t)} βw t x t λ t û t )a ) x t a )) û t+ a ) = û t a )+ν t l {at=a B t)} Note that the explotaton functon learnng β t W s tme epenent n L 4 an s nepenent of parameter ǫ. If the learnng yels an nteror pont as the equlbrum then t s the exact equlbrum of the expecte game whle the equlbrum n L s an approxmate one for the ǫ perturbe game. 5) Weakene Fcttous-Play L 5 : Let βf t : R A R A be a pont-to-set mappng corresponence) β t F û t) := ǫ)δ βû t) + ǫ A where R A s a vector wth all ts entres beng ; β : R A A s the best-response corresponence: β û t ) argmax a A û t a )an δ ZZ A enotes a set of unt vectors {e a a Z}. The learnng pattern L 5 s gven by x t+ a ) = x t a ) l { B t)} βf t û t ) x t a )) û t+ a ) = û t a )+ν t l {at=a B t)} The weakene fcttous play L 5 has been scusse n [] [4]. Dfferent from the classcal fcttous play a player 459

4 oes not observe the acton playe by the other player at the prevous step an the utlty functon s unknown. Each player estmates ts payoff by upatng û t usng perceve payoffs. The strategy upate equaton s compose of two parts. A player chooses one of hs optmal actons wth probablty ǫ) by optmzng the up-to-ate payoff estmaton û t an plays an arbtrary acton wth equal probablty ǫ. IV. MAIN RESULTS A. Stochastc approxmaton of the pure learnng schemes The pure learnng schemes ntrouce n Secton III share the same learnng structure for average utlty but ffer n ther strategy learnng. Denote by Π l) t the strategy learnng functon for l L n the general form ). Followng the multple tme-scale stochastc approxmaton framework evelope n [3] [5] [] [3] one can wrte the pure learnng schemes nto the form { ) x t+ x t q t f l) x t û t )+M l) t+ û t+ û t q t Esx tb U û t + M ) t+ where f l = E[Π l) t+ F t] l L s a learnng pattern n the form of stochastc approxmaton. q t s a tme-scalng factor whch s a functon of the learnng rates λ t an the probablty of P n actve moe at tme t enote by P B t)); q t s the tme-scalng factor for û t. To use ODE approxmaton we check frst the assumptons gven s a boune martngale fference because the strateges are n the prouct of smplces whch are convex an compact an the contonal expectaton of M t+ gven the sgma-algebra generate by the ranom varabless t x t u t û t t t s zero. Smlar propertes hol for Mt+. The functon f s a regular functon an hence Lpschtz over a compact set whch mples lnear growth. Note that the case of constant learnng rates can be analyze uner the same settng but the convergence result s weaker Thus the asymptotc pseuo-trajectores for the non-vanshng tme-scale rato.e. λ t /ν t γ for n the Appenx. The term M l) t+ some γ R ++ are { t x t g t f l) ) x t û t ) tût = ḡ t Esx tb U ) û t where g t resp. ḡ t ) are the asymptotc functons of q t λ t p resp. q t νt p ). If the learnng rates have the vanshng rato.e. λt µ t the asymptotc pseuo-trajectores are { ) t x t g t f l) x t E sx t U ) û t E sx B U. B. Stochastc approxmaton of the hybr learnng scheme Players can choose fferent patterns urng fferent tme slots. Conser the hybr an swtchng learnng { x t+ x t q t l L l {l t=l}f l) x t û t )+M l) t+ ) û t+ û t q t Esx t U û t + M ) t+ 46 TABLE I ASYMPTOTIC PSEUDO-TRAJECTORIES OF PURE LEARNING Learnng patterns L L L 3 L 4 L 5 Class of ODE Ajuste replcator ynamcs Smooth best response ynamcs Imtatve BG ynamcs -scale replcator ynamcs Perturbe best response ynamcs where l t L s the learnng pattern chosen by P at tme t. Theorem : Assume that each player P N aopts one of the CODIPAS-RLs n L wth probablty ω = [ω l ] l L L) an the learnng rates satsfy contons C) an C). Then the asymptotc pseuo-trajectores of the hybr an swtchng learnng can be wrtten nto the form { t x t ) g t l L ω lf l) x t û t ) ) tût = ḡ t Esx t U û t for the non-vanshng tme-scale learnng rato λ t /ν t ; an { ) t x t g t l L ω lf l) x t E U sx tb ) û t E U sx B for the vanshng learnng rato λ t /ν t. In Table we gve the asymptotc pseuotrajectory of the pure learnng when the rate of payoff learnng s faster than the strategy learnng. Let U j x) := E sb U j sb x)j N. In Table the replcator ynamcs are gven by ẋ j a j ) = q j x j a j ) [U j e aj x j ) ] a U je j Aj a x j j )x j a j ).The smooth best response ynamcs are gven by e ǫ ẋ j a j ) = q j U j ea j x j ) U a e ǫ j e a x j x ) j a j )). The mtatve j j Boltzman-Gbbs ynamcs are gven by ẋ j a j ) = x ja j)e ǫ U j ea j x j ) q j U a j xja j )e ǫ j e a x j x ) j a j )). The best response j ynamcs are gven byẋ j q j β j x j ) x j ) an the payoff ynamcs are tûja j ) = q j x j a j )U j e aj x j ) û j a j )). C. Connecton wth equlbra of the expecte game We stuy the convergence propertes of the ynamcs an ther connecton wth the state-nepenent Nash equlbrum for three specal classes of games. ) Games wth two actons: For two-player games wth two actons.e A = {a a }A = {a a } one can transform the system of ODEs of the strategy-learnng nto a planar system uner the form α = Q α α ) α = Q α α ) ) where we let α = x a ). The ynamcs for P can be expresse n terms of α α only as x a ) = x a ) an x a ) = x a ). We use the Poncaré-Benxson theorem an the Dulac crteron [] to establsh a convergence result for ).

5 Theorem []): Conser an autonomous planar vector fel as n ).Let γ.) be a scalar functon efne on the unt square []. If [γα)) α] α + [γα) α] α s not entcally zero an oes not change sgn n [] then there are no cycles lyng entrely n []. Corollary : Conser a two-player two-acton game. Assume that each player aopts the Boltzmann-Gbbs CODIPAS-RL wth λt ν t = λt ν t. Then the asymptotc pseuo-trajectory reuces to a planar system n the form α = β ǫ u e a α )) α ; α = β ǫ u α e a )) α. Moreover the system satsfes the contons of Theorem known as the Dulac s crteron). Note that for the replcator ynamcs the Dulac crteron reuces to α )U e a α ) U e a α )) + α )U α e a ) U α e a )) whch vanshes for α α ) = //). It s possble to have lmt cycles n replcator ynamcs an hence the Dulac crteron oes not apply. However the stablty of the replcator ynamcs can be rectly stue n the two-acton case by entfyng the game as belongng to one of the types: coornaton antcoornaton prsoner s lemma hawk-an-ove. The followng corollary now follows from Theorem. Corollary : CR) Heterogeneous learnng: If P s wth Boltzmann- Gbbs CODIPAS-RL an P s learnng leas to replcator ynamcs then the convergence conton reuces to α )u α e a ) u α e a )) < for all α α ). CR) Hybr learnng: If the players use an hybr learnng obtane by combnng Boltzmann-Gbbs CODIPAS- RL wth weght ω an the replcator ynamcs wth weght ω then the Dulac crteron reuces to ω [ α )u e a α ) u e a α ))] + ω [ α )u α e a ) u α e a ))] < w + w for all α α ). Remark Symmetrc games wth three actons): If the expecte game s a symmetrc game wth three actons per player then the symmetrc game ynamcs reuce to the two-mensonal ynamcal system. Ths allows us to apply the Dulac crteron. ) Lyapunov games: We say that the game Ξ s a Lyapunov game uner the hybr ynamcs f the resultng ynamcs has a Lyapunov functon. Theorem 3: Conser a Lyapunov game uner the learnng schemes L L 4. Then the learnng proceure has global convergence to the set of equlbra of the expecte robust game for all nteror ntal contons. Note that ths result hols also forn player stochastc games wth ranom upates. We say that the stochastc game Ξ s an expecte robust potental game f the expecte payoff erves from a potental functon. Potental games consttute a specal class of games where the payoff functons of the players are governe by a potental functon Φ : R N A R.e. U e a x ) = Φx) x Na a ) A. We use a Lyapunov approach to show the global convergence of hybr learnng for potental games. Lemma : Assume that the stochastc NZSG Φ has a potental functon Φ. Then there exsts a Lyapunov functon V R x x ) : R A + A R for learnng schemes L L 4 - assocate replcator ynamcs an t s gven by ts potental V R = Φ. Hence the replcator ynamcs converge to a rest pont. In aton f startng from an nteror pont of the smplex the ynamcs converge to the Nash equlbrum of the game Ξ. Lemma 3: Let V B x x ) : R A + A R be a Lyapunov functon for learnng pattern L l -assocate replcator ynamcs f l l = such that V B x x ) = Φx x ) + ǫ H x ) + ǫ H x )where H : R A R are strctly concave perturbaton functons whch can take fferent forms epenng on the pure learnng scheme l. The ODEs corresponng to the learnng schemes converge to a set of perturbe equlbra of the game Ξ. Theorem 4: Assume that the stochastc NZSG Ξ has a potental functon Φ. The hybr learnng wth L an L converges locally to a perturbe state-nepenent Nash equlbrum x x of the potental game Ξ for suffcently small ǫ. The proof of Lemmas 3 an Theorem 4 can be foun n the nternal techncal report [7]. V. SECURITY APPLICATION In ths secton we use the learnng algorthm to stuy a two-person securty game n a network between an ntruer an an amnstrator. An amnstrator P can use fferent levels of protecton. The ntruer P can launch an attack that can be of hgh or low ntensty. Let the acton sets for P an P be A := {HL} an A := {SW} respectvely. The network amnstrator s assume to be always on alert whle the ntruer attacks wth a probablty p. Hence the set B t) can be of two types.e. C) {P P} or C) {P}. The former case C) correspons to the scenaro where the ntruer an the amnstrator attack an efen respectvely whereas the latter C) suggests that the amnstrator faces no threat. We represent the payoff uner these two scenaros by M an M respectvely: [ H L S W ] M := H M :=. In L C) a successful efense aganst attack yels a payoff of for P whle a falure results n a payoff of -. A successful attack yels P a payoff of whle a fale attack yels a zero payoff. The employment of strong efense H) or strong attack S) costs an extra unt of effort as compare to the low efense L) an the weak attack W) for P an P respectvely. In C) P stays secure wthout the threat from the ntruer hence yels a payoff of. However the hgh securty level costs an extra unt of energy from the player. The payoffs n M an M are subject to exogenous nose whch epens on the envronmental state s. The state-nepenent equlbrum of the game s foun to be at x = [ ]T x = [ 3 3 ]T an the optmal average payoffs are û = [ 3 3 ]T û = []T. In Fgures an we show the payoffs an mxe strateges of both players when both players use the learnng pattern L. We can 46

6 5 5 Average s P Avg. of Choosng a: ûa).9 Mxe Strateges Prob. of P Choosng a: xa) Prob. of P Choosng a: xa) Average s.9 Mxe Strateges Prob. of P Choosng a: xa) Prob. of P Choosng a: xa).5 P Avg. of Choosng a: ûa) P Avg. of Choosng a: ûa) P Avg. of Choosng a: ûa).8.7 P Avg. of Choosng a: ûa) P Avg. of Choosng a: ûa) P Avg. of Choosng a: ûa) P Avg. of Choosng a: ûa) Fg.. The payoffs to the players wth both players usng L. Fg.. The mxe strateges of the players wth both players usng L. Fg. 3. The payoffs to the players wth both players usng L. Fg. 4. The mxe strateges of the players wth both players usng L..5 Average s P Avg. of Choosng a: ûa) P Avg. of Choosng a: ûa) P Avg. of Choosng a: ûa) P Avg. of Choosng a: ûa).9.8 Mxe Strateges Prob. of P Choosng a: xa) Prob. of P Choosng a: xa).5 Average s P Avg. of Choosng a: ûa) P Avg. of Choosng a: ûa) P Avg. of Choosng a: ûa) P Avg. of Choosng a: ûa).9.8 Mxe Strateges Prob. of P Choosng a: xa) Prob. of P Choosng a: xa) Fg. 5. The payoffs to the heterogeneous players wth P usng L an P usng L. Fg. 6. The mxe strateges of the heterogeneous players wth P usng L an P usng L. see that the replcator ynamcs from L o not converge. T However the tme average strateges lm T T x tt converges to x x respectvely an the tme average payoffs lm T T ûtt converges to û û respectvely. T In Fgures 3 an 4 we show the payoffs an mxe strateges of the players when they both aopt the learnng pattern L. We choose ǫ = /5 an observe that the mxe strateges converge to x = [77.473] T x = [ ] T an the payoffs converge to û = [ ] T û = [.7] T whch are n the close neghborhoo of û û. In Fgures 5 an 6 we show the convergence of the heterogeneous learnng scheme where P uses L an P uses L. Wth ǫ = /5 we fn the convergng strateges at x x an the payoffs at û û. In Fgures 7 an 8 we show the convergence of the hybr learnng scheme where P an P aopt L an L wth equal weghts. The strateges converge to [ ] T [ ] T for P an P respectvely whereas the payoffs converge to [ ] T [.459] T for P an P respectvely. VI. CONCLUSIONS AND FUTURE WORKS We have presente strbute strategc learnng algorthms for two-person nonzero-sum stochastc games along wth ther general convergence or non-convergence propertes. Interestng work that we leave for the future s to exten ths learnng framework to an arbtrary number of players each of them aoptng hybr learnng wth a ffuson term leang to stochastc fferental equatons. Another extenson wll be to more general stochastc games where the state evoluton epens on the actons use the players an ther states. Ths stuaton s more complcate because the noses are correlate an epen on states an actons an the convergence ssue n that case s a very challengng open problem. Fg. 7. The payoffs to the players wth both players usng hybr players wth both players usng hy- Fg. 8. The mxe strateges of the learnng scheme wth equal weghts br learnng scheme wth equal on L an L. weghts on L an L. REFERENCES [] T. Alpcan an T. Başar. Network Securty: A Decson an Game Theoretc Approach. Cambrge Unversty Press. [] W. B. Arthur. On esgnng economc agents that behave lke human agents. J. Evolutonary Econ. 3 pages 993. [3] M. Benaïm an M. Faure. Stochastc approxmatons cooperatve ynamcs an supermoular games. Preprnt avalable at [4] T. Borgers an R. Sarn. Learnng through renforcement an replcator ynamcs. Mmeo Unversty College Lonon [5] V. S. Borkar. Stochastc approxmaton: a ynamcal systems vewpont. 8. [6] R. Bush an F. Mosteller. Stochastc Moels of Learnng [7] R.W. Ferrero S.M. Shahehpour an V.C. Ramesh. Transacton analyss n eregulate power systems usng game theory. Power Systems IEEE Transactons on 3): Aug [8] P. Frhauf M. Krstc an T. Başar. Nash equlbrum seekng wth nfntely-many players. n Proceengs of Amercan Control Conference ACC). [9] D. Fuenberg an D. Levne. Learnng n Games [] J. Guckenhemer an P. Holmes. Nonlnear Oscllatons Dynamcal Systems an Bfurcatons of Vector Fels [] Kushner H. Stochastc approxmaton: a survey. Wley Interscplnary Revews: Computatonal Statstcs : [] D. Lesle an E. Collns. Invual q-learnng n normal form games. SIAM J. Control Optm. 44: [3] D. S. Lesle an E. J. Collns. Convergent multple tmescales renforcement learnng algorthms n normal form games. The Annals of Apple 34): [4] J. R. Maren G. Arslan an J. S. Shamma. Jont strategy fcttous play wth nerta for potental games. n Proc. 44th IEEE Conf. Decson Control pages Dec. 5. [5] J. Nash. Equlbrum ponts n n-person games. Proceengs of the Natonal Acaemy of Scences 36): [6] J. S. Shamma an G. Arslan. Dynamc fcttous play ynamc graent play an strbute convergence to Nash equlbra. IEEE Trans Automatc Control 53):3 37 March 5. [7] Q. Zhu T. Hamou an T. Başar. Dstrbute strategc learnng wth applcaton to network securty. Internal Techncal Report CSL UIUC. [8] Q. Zhu H. Tembne an T. Başar. Heterogeneous learnng n zero-sum stochastc games wth ncomplete nformaton. n 49th IEEE Conf. on Decson an Control Atlanta GA USA. 46

DEGREES OF EQUIVALENCE IN A KEY COMPARISON 1 Thang H. L., Nguyen D. D. Vietnam Metrology Institute, Address: 8 Hoang Quoc Viet, Hanoi, Vietnam

DEGREES OF EQUIVALENCE IN A KEY COMPARISON 1 Thang H. L., Nguyen D. D. Vietnam Metrology Institute, Address: 8 Hoang Quoc Viet, Hanoi, Vietnam DEGREES OF EQUIVALECE I A EY COMPARISO Thang H. L., guyen D. D. Vetnam Metrology Insttute, Aress: 8 Hoang Quoc Vet, Hano, Vetnam Abstract: In an nterlaboratory key comparson, a ata analyss proceure for

More information

On the Optimal Marginal Rate of Income Tax

On the Optimal Marginal Rate of Income Tax On the Optmal Margnal Rate of Income Tax Gareth D Myles Insttute for Fscal Stues an Unversty of Exeter June 999 Abstract: The paper shows that n the quas-lnear moel of ncome taxaton, the optmal margnal

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

A Binary Quantum-behaved Particle Swarm Optimization Algorithm with Cooperative Approach

A Binary Quantum-behaved Particle Swarm Optimization Algorithm with Cooperative Approach IJCSI Internatonal Journal of Computer Scence Issues, Vol., Issue, No, January 3 ISSN (Prnt): 694-784 ISSN (Onlne): 694-84 www.ijcsi.org A Bnary Quantum-behave Partcle Swarm Optmzaton Algorthm wth Cooperatve

More information

A Lyapunov Optimization Approach to Repeated Stochastic Games

A Lyapunov Optimization Approach to Repeated Stochastic Games PROC. ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, OCT. 2013 1 A Lyapunov Optmzaton Approach to Repeated Stochastc Games Mchael J. Neely Unversty of Southern Calforna http://www-bcf.usc.edu/

More information

Blind Estimation of Transmit Power in Wireless Networks

Blind Estimation of Transmit Power in Wireless Networks Bln Estmaton of Transmt Power n Wreless Networks Murtaza Zafer (IBM Research), Bongjun Ko (IBM Research), Chatschk Bskan (IBM Research) an Ivan Ho (Imperal College, UK) Transmt-power Estmaton: Problem

More information

Decomposition Methods for Large Scale LP Decoding

Decomposition Methods for Large Scale LP Decoding Decomposton Methos for Large Scale LP Decong Sharth Barman Xshuo Lu Stark Draper Benjamn Recht Abstract Felman et al. IEEE Trans. Inform. Theory, Mar. 2005) showe that lnear programmng LP) can be use to

More information

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Stock Profit Patterns

Stock Profit Patterns Stock Proft Patterns Suppose a share of Farsta Shppng stock n January 004 s prce n the market to 56. Assume that a September call opton at exercse prce 50 costs 8. A September put opton at exercse prce

More information

On the computation of the capital multiplier in the Fortis Credit Economic Capital model

On the computation of the capital multiplier in the Fortis Credit Economic Capital model On the computaton of the captal multpler n the Forts Cret Economc Captal moel Jan Dhaene 1, Steven Vuffel 2, Marc Goovaerts 1, Ruben Oleslagers 3 Robert Koch 3 Abstract One of the key parameters n the

More information

The Design of Efficiently-Encodable Rate-Compatible LDPC Codes

The Design of Efficiently-Encodable Rate-Compatible LDPC Codes The Desgn of Effcently-Encoable Rate-Compatble LDPC Coes Jaehong Km, Atya Ramamoorthy, Member, IEEE, an Steven W. McLaughln, Fellow, IEEE Abstract We present a new class of rregular low-ensty party-check

More information

Distributed Multi-Target Tracking In A Self-Configuring Camera Network

Distributed Multi-Target Tracking In A Self-Configuring Camera Network Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu

More information

EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR

EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR EXAMPLE PROBLEMS SOLVED USING THE SHARP EL-733A CALCULATOR 8S CHAPTER 8 EXAMPLES EXAMPLE 8.4A THE INVESTMENT NEEDED TO REACH A PARTICULAR FUTURE VALUE What amount must you nvest now at 4% compoune monthly

More information

Stochastic Games on a Multiple Access Channel

Stochastic Games on a Multiple Access Channel Stochastc Games on a Multple Access Channel Prashant N and Vnod Sharma Department of Electrcal Communcaton Engneerng Indan Insttute of Scence, Bangalore 560012, Inda Emal: prashant2406@gmal.com, vnod@ece.sc.ernet.n

More information

An Efficient Recovery Algorithm for Coverage Hole in WSNs

An Efficient Recovery Algorithm for Coverage Hole in WSNs An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Exact GP Schema Theory for Headless Chicken Crossover and Subtree Mutation

Exact GP Schema Theory for Headless Chicken Crossover and Subtree Mutation Exact GP Schema Theory for Healess Chcken Crossover an Subtree Mutaton Rccaro Pol School of Computer Scence The Unversty of Brmngham Brmngham, B5 TT, UK R.Pol@cs.bham.ac.uk Ncholas F. McPhee Dvson of Scence

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

Dynamic Cost-Per-Action Mechanisms and Applications to Online Advertising

Dynamic Cost-Per-Action Mechanisms and Applications to Online Advertising Dynamc Cost-Per-Acton Mechansms and Applcatons to Onlne Advertsng Hamd Nazerzadeh Amn Saber Rakesh Vohra Abstract We examne the problem of allocatng a resource repeatedly over tme amongst a set of agents.

More information

Incentive Compatible Mechanisms for Group Ticket Allocation in Software Maintenance Services

Incentive Compatible Mechanisms for Group Ticket Allocation in Software Maintenance Services 14th Asa-Pacfc Software Engneerng Conference Incentve Compatble Mechansms for Group Tcket Allocaton n Software Mantenance Servces Karthk Subban, Ramakrshnan Kannan IBM R Ina Software Lab, EGL D Block,

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

An algorithm of choosing LSPs in the MPLS network with unreliable links

An algorithm of choosing LSPs in the MPLS network with unreliable links Ireneusz OLSZESKI Unversty of Technology an Lfe Scences n Bygoszcz, Faculty of Telecommuncatons an Electrcal Engneerng An algorthm of choosng LSPs n the MPLS network wth unrelable lnks Streszczene. pracy

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Dynamic Cost-Per-Action Mechanisms and Applications to Online Advertising

Dynamic Cost-Per-Action Mechanisms and Applications to Online Advertising Dynamc Cost-Per-Acton Mechansms and Applcatons to Onlne Advertsng Hamd Nazerzadeh Amn Saber Rakesh Vohra September 9, 2008 Abstract We examne the problem of allocatng a resource repeatedly over tme amongst

More information

A Practical Study of Regenerating Codes for Peer-to-Peer Backup Systems

A Practical Study of Regenerating Codes for Peer-to-Peer Backup Systems A Practcal Stuy of Regeneratng Coes for Peer-to-Peer Backup Systems Alessanro Dumnuco an Ernst Bersack EURECOM Sopha Antpols, France {umnuco,bersack}@eurecom.fr Abstract In strbute storage systems, erasure

More information

ON CYCLOTOMIC POLYNOMIALS WITH ±1 COEFFICIENTS

ON CYCLOTOMIC POLYNOMIALS WITH ±1 COEFFICIENTS ON CYCLOTOMIC POLYNOMIALS WITH ±1 COEFFICIENTS PETER BORWEIN AND KWOK-KWONG STEPHEN CHOI Abstract. We characterze all cyclotomc polynomals of even egree wth coeffcents restrcte to the set {+1, 1}. In ths

More information

Present Values and Accumulations

Present Values and Accumulations Present Values an Accumulatons ANGUS S. MACDONALD Volume 3, pp. 1331 1336 In Encyclopea Of Actuaral Scence (ISBN -47-84676-3) Ete by Jozef L. Teugels an Bjørn Sunt John Wley & Sons, Lt, Chchester, 24 Present

More information

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks Coordnated Denal-of-Servce Attacks n IEEE 82.22 Networks Y Tan Department of ECE Stevens Insttute of Technology Hoboken, NJ Emal: ytan@stevens.edu Shamk Sengupta Department of Math. & Comp. Sc. John Jay

More information

The Investment Decision-Making Index System and the Grey Comprehensive Evaluation Method under Hybrid Cloud

The Investment Decision-Making Index System and the Grey Comprehensive Evaluation Method under Hybrid Cloud The Investment Decson-Makn Inex System an the Grey Comprehensve Evaluaton Metho uner Hybr Clou Donln Chen 1, Mn Fu 1, Xueron Jan 2, an Dawe Son 1 1 School o Economcs, WHUT, Wuhan, Chna 2 School o Manaement,

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Solving Factored MDPs with Continuous and Discrete Variables

Solving Factored MDPs with Continuous and Discrete Variables Solvng Factored MPs wth Contnuous and screte Varables Carlos Guestrn Berkeley Research Center Intel Corporaton Mlos Hauskrecht epartment of Computer Scence Unversty of Pttsburgh Branslav Kveton Intellgent

More information

PROBABILISTIC DECISION ANALYSIS FOR SEISMIC REHABILITATION OF A REGIONAL BUILDING SYSTEM

PROBABILISTIC DECISION ANALYSIS FOR SEISMIC REHABILITATION OF A REGIONAL BUILDING SYSTEM 3 th Worl Conference on Earthquake Engneerng Vancouver, B.C., Canaa August -6, 4 Paper No. 54 PROBABILISTIC DECISION ANALYSIS FOR SEISMIC REHABILITATION OF A REGIONAL BILDING SYSTEM Joonam PARK, Barry

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008 Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn

More information

The Stock Market Game and the Kelly-Nash Equilibrium

The Stock Market Game and the Kelly-Nash Equilibrium The Stock Market Game and the Kelly-Nash Equlbrum Carlos Alós-Ferrer, Ana B. Ana Department of Economcs, Unversty of Venna. Hohenstaufengasse 9, A-1010 Venna, Austra. July 2003 Abstract We formulate the

More information

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES The goal: to measure (determne) an unknown quantty x (the value of a RV X) Realsaton: n results: y 1, y 2,..., y j,..., y n, (the measured values of Y 1, Y 2,..., Y j,..., Y n ) every result s encumbered

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

A General and Practical Datacenter Selection Framework for Cloud Services

A General and Practical Datacenter Selection Framework for Cloud Services 212 IEEE Ffth Internatonal Conference on Clou Computng A General an Practcal Datacenter Selecton Framework for Clou Servces Hong Xu, Baochun L henryxu, bl@eecg.toronto.eu Department of Electrcal an Computer

More information

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification Lecture 4: More classfers and classes C4B Machne Learnng Hlary 20 A. Zsserman Logstc regresson Loss functons revsted Adaboost Loss functons revsted Optmzaton Multple class classfcaton Logstc Regresson

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Efficient Algorithms for Computing the Triplet and Quartet Distance Between Trees of Arbitrary Degree

Efficient Algorithms for Computing the Triplet and Quartet Distance Between Trees of Arbitrary Degree Effcent Algorthms for omputng the Trplet an Quartet Dstance Between Trees of Arbtrary Degree Gerth Støltng Broal, Rolf Fagerberg Thomas Malun hrstan N. S. Peersen, Anreas San, Abstract The trplet an quartet

More information

Production. 2. Y is closed A set is closed if it contains its boundary. We need this for the solution existence in the profit maximization problem.

Production. 2. Y is closed A set is closed if it contains its boundary. We need this for the solution existence in the profit maximization problem. Producer Theory Producton ASSUMPTION 2.1 Propertes of the Producton Set The producton set Y satsfes the followng propertes 1. Y s non-empty If Y s empty, we have nothng to talk about 2. Y s closed A set

More information

Product-Form Stationary Distributions for Deficiency Zero Chemical Reaction Networks

Product-Form Stationary Distributions for Deficiency Zero Chemical Reaction Networks Bulletn of Mathematcal Bology (21 DOI 1.17/s11538-1-9517-4 ORIGINAL ARTICLE Product-Form Statonary Dstrbutons for Defcency Zero Chemcal Reacton Networks Davd F. Anderson, Gheorghe Cracun, Thomas G. Kurtz

More information

Fair and Efficient User-Network Association Algorithm for Multi-Technology Wireless Networks

Fair and Efficient User-Network Association Algorithm for Multi-Technology Wireless Networks Far and Effcent User-Network Assocaton Algorthm for Mult-Technology Wreless Networks Perre Coucheney, Cornne Touat and Bruno Gaujal INRIA Rhône-Alpes and LIG, MESCAL project, Grenoble France, {perre.coucheney,

More information

Price Competition in an Oligopoly Market with Multiple IaaS Cloud Providers

Price Competition in an Oligopoly Market with Multiple IaaS Cloud Providers Prce Competton n an Olgopoly Market wth Multple IaaS Cloud Provders Yuan Feng, Baochun L, Bo L Department of Computng, Hong Kong Polytechnc Unversty Department of Electrcal and Computer Engneerng, Unversty

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Cluster Analysis. Cluster Analysis

Cluster Analysis. Cluster Analysis Cluster Analyss Cluster Analyss What s Cluster Analyss? Types of Data n Cluster Analyss A Categorzaton of Maor Clusterng Methos Parttonng Methos Herarchcal Methos Densty-Base Methos Gr-Base Methos Moel-Base

More information

The Application of Fractional Brownian Motion in Option Pricing

The Application of Fractional Brownian Motion in Option Pricing Vol. 0, No. (05), pp. 73-8 http://dx.do.org/0.457/jmue.05.0..6 The Applcaton of Fractonal Brownan Moton n Opton Prcng Qng-xn Zhou School of Basc Scence,arbn Unversty of Commerce,arbn zhouqngxn98@6.com

More information

Equlbra Exst and Trade S effcent proportionally

Equlbra Exst and Trade S effcent proportionally On Compettve Nonlnear Prcng Andrea Attar Thomas Marott Franços Salané February 27, 2013 Abstract A buyer of a dvsble good faces several dentcal sellers. The buyer s preferences are her prvate nformaton,

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen and Na L Abstract Speed scalng has been wdely adopted n computer and communcaton systems, n partcular, to reduce energy consumpton. An

More information

The literature on many-server approximations provides significant simplifications toward the optimal capacity

The literature on many-server approximations provides significant simplifications toward the optimal capacity Publshed onlne ahead of prnt November 13, 2009 Copyrght: INFORMS holds copyrght to ths Artcles n Advance verson, whch s made avalable to nsttutonal subscrbers. The fle may not be posted on any other webste,

More information

Dynamic Pricing for Smart Grid with Reinforcement Learning

Dynamic Pricing for Smart Grid with Reinforcement Learning Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Addendum to: Importing Skill-Biased Technology

Addendum to: Importing Skill-Biased Technology Addendum to: Importng Skll-Based Technology Arel Bursten UCLA and NBER Javer Cravno UCLA August 202 Jonathan Vogel Columba and NBER Abstract Ths Addendum derves the results dscussed n secton 3.3 of our

More information

Ad-Hoc Games and Packet Forwardng Networks

Ad-Hoc Games and Packet Forwardng Networks On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Substitution Effects in Supply Chains with Asymmetric Information Distribution and Upstream Competition

Substitution Effects in Supply Chains with Asymmetric Information Distribution and Upstream Competition Substtuton Effects n Supply Chans wth Asymmetrc Informaton Dstrbuton and Upstream Competton Jochen Schlapp, Mortz Fleschmann Department of Busness, Unversty of Mannhem, 68163 Mannhem, Germany, jschlapp@bwl.un-mannhem.de,

More information

Combinatorial Agency of Threshold Functions

Combinatorial Agency of Threshold Functions Combnatoral Agency of Threshold Functons Shal Jan Computer Scence Department Yale Unversty New Haven, CT 06520 shal.jan@yale.edu Davd C. Parkes School of Engneerng and Appled Scences Harvard Unversty Cambrdge,

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

+ + + - - This circuit than can be reduced to a planar circuit

+ + + - - This circuit than can be reduced to a planar circuit MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to

More information

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things A Game-Theoretc Approach for Mnmzng Securty Rsks n the Internet-of-Thngs George Rontds, Emmanoul Panaouss, Aron Laszka, Tasos Daguklas, Pasquale Malacara, and Tansu Alpcan Hellenc Open Unversty, Greece

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

OPTIMAL INVESTMENT POLICIES FOR THE HORSE RACE MODEL. Thomas S. Ferguson and C. Zachary Gilstein UCLA and Bell Communications May 1985, revised 2004

OPTIMAL INVESTMENT POLICIES FOR THE HORSE RACE MODEL. Thomas S. Ferguson and C. Zachary Gilstein UCLA and Bell Communications May 1985, revised 2004 OPTIMAL INVESTMENT POLICIES FOR THE HORSE RACE MODEL Thomas S. Ferguson and C. Zachary Glsten UCLA and Bell Communcatons May 985, revsed 2004 Abstract. Optmal nvestment polces for maxmzng the expected

More information

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs Dstrbuted Optmal Contenton Wndow Control for Elastc Traffc n Wreless LANs Yalng Yang, Jun Wang and Robn Kravets Unversty of Illnos at Urbana-Champagn { yyang8, junwang3, rhk@cs.uuc.edu} Abstract Ths paper

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid Feasblty of Usng Dscrmnate Prcng Schemes for Energy Tradng n Smart Grd Wayes Tushar, Chau Yuen, Bo Cha, Davd B. Smth, and H. Vncent Poor Sngapore Unversty of Technology and Desgn, Sngapore 138682. Emal:

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Supply network formation as a biform game

Supply network formation as a biform game Supply network formaton as a bform game Jean-Claude Hennet*. Sona Mahjoub*,** * LSIS, CNRS-UMR 6168, Unversté Paul Cézanne, Faculté Sant Jérôme, Avenue Escadrlle Normande Némen, 13397 Marselle Cedex 20,

More information

PERRON FROBENIUS THEOREM

PERRON FROBENIUS THEOREM PERRON FROBENIUS THEOREM R. CLARK ROBINSON Defnton. A n n matrx M wth real entres m, s called a stochastc matrx provded () all the entres m satsfy 0 m, () each of the columns sum to one, m = for all, ()

More information

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent

More information

Stability, observer design and control of networks using Lyapunov methods

Stability, observer design and control of networks using Lyapunov methods Stablty, observer desgn and control of networks usng Lyapunov methods von Lars Naujok Dssertaton zur Erlangung des Grades enes Doktors der Naturwssenschaften - Dr. rer. nat. - Vorgelegt m Fachberech 3

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

Title Language Model for Information Retrieval

Title Language Model for Information Retrieval Ttle Language Model for Informaton Retreval Rong Jn Language Technologes Insttute School of Computer Scence Carnege Mellon Unversty Alex G. Hauptmann Computer Scence Department School of Computer Scence

More information

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

APPLICATION OF BINARY DIVISION ALGORITHM FOR IMAGE ANALYSIS AND CHANGE DETECTION TO IDENTIFY THE HOTSPOTS IN MODIS IMAGES

APPLICATION OF BINARY DIVISION ALGORITHM FOR IMAGE ANALYSIS AND CHANGE DETECTION TO IDENTIFY THE HOTSPOTS IN MODIS IMAGES APPLICATION OF BINARY DIVISION ALGORITHM FOR IMAGE ANALYSIS AND CHANGE DETECTION TO IDENTIFY THE HOTSPOTS IN MODIS IMAGES Harsh Kumar G R * an Dharmenra Sngh (hargrec@tr.ernet.n, harmfec@tr.ernet.n) Department

More information

Optimal Bidding Strategies for Generation Companies in a Day-Ahead Electricity Market with Risk Management Taken into Account

Optimal Bidding Strategies for Generation Companies in a Day-Ahead Electricity Market with Risk Management Taken into Account Amercan J. of Engneerng and Appled Scences (): 8-6, 009 ISSN 94-700 009 Scence Publcatons Optmal Bddng Strateges for Generaton Companes n a Day-Ahead Electrcty Market wth Rsk Management Taken nto Account

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

L10: Linear discriminants analysis

L10: Linear discriminants analysis L0: Lnear dscrmnants analyss Lnear dscrmnant analyss, two classes Lnear dscrmnant analyss, C classes LDA vs. PCA Lmtatons of LDA Varants of LDA Other dmensonalty reducton methods CSCE 666 Pattern Analyss

More information

An Intelligent Policy System for Channel Allocation of Information Appliance

An Intelligent Policy System for Channel Allocation of Information Appliance Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department

More information

A Two Stage Stochastic Equilibrium Model for Electricity Markets with Two Way Contracts

A Two Stage Stochastic Equilibrium Model for Electricity Markets with Two Way Contracts A Two Stage Stochastc Equlbrum Model for Electrcty Markets wth Two Way Contracts Dal Zhang and Hufu Xu School of Mathematcs Unversty of Southampton Southampton SO17 1BJ, UK Yue Wu School of Management

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen, Na L and Steven H. Low Engneerng & Appled Scence Dvson, Calforna Insttute of Technology, USA Abstract Speed scalng has been wdely adopted

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS Novella Bartoln 1, Imrch Chlamtac 2 1 Dpartmento d Informatca, Unverstà d Roma La Sapenza, Roma, Italy novella@ds.unroma1.t 2 Center for Advanced

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information