Economic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks

Size: px
Start display at page:

Download "Economic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks"

Transcription

1 Economc-Robust Transmsson Opportunty Aucton n Mult-hop Wreless Networks Mng L, Pan L, Mao Pan, and Jnyuan Sun Department of Electrcal and Computer Engneerng, Msssspp State Unversty, Msssspp State, MS Department of Computer Scence, Texas Southern Unversty, Houston, Texas Department of Electrcal Engneerng and Computer Scence, Unversty of Tennessee, Knoxvlle, TN Emal: ml845@msstate.edu, l@ece.msstate.edu, panm@tsu.edu, jysun@eecs.utk.edu Abstract The rapd growth of wreless devces and servces exacerbates the problem of spectrum scarcty n wreless networks. Recently, spectrum aucton has emerged as one of the most promsng technques to enhance spectrum utlzaton and mtgate ths problem. Although there exst some works studyng spectrum aucton, most of them are desgned for sngle-hop communcatons, and t s usually not clear whom a wnnng user communcates wth. Moreover, most prevous aucton schemes only focus on satsfyng the ncentve compatblty property, also called truthfulness, but gnore another two crtcal propertes: ndvdual ratonalty, and budget balance. Thus, they may not be economc-robust. In ths paper, we propose a transmsson opportunty aucton scheme, called TOA, whch can support mult-hop data traffc, ensure economc-robustness, and generate hgh revenue for the auctoneer. Specfcally, n TOA, nstead of spectrum bands as n tradtonal spectrum aucton schemes, users bd for transmsson opportuntes TOs). A TO s defned as the permt of data transmsson on a specfc lnk usng a certan band,.e., a lnk-band par. The TOA scheme s composed of three procedures: TO allocaton, TO schedulng, and prcng, whch are performed sequentally and teratvely untl the aforementoned goals are reached. We prove that TOA s economc-robust, and conduct extensve smulatons to show ts effectveness and effcency. I. INTRODUCTION The past few years have wtnessed substantal growth of wreless devces and servces, whch, on the other hand, makes spectrum an even more scare resource n wreless networks. Tradtonal spectrum allocaton was conducted n a statc manner, resultng n neffcent spectrum utlzaton. Recently, spectrum sharng through a dynamc real-tme secondary spectrum aucton market has been proposed to enhance spectrum utlzaton and mtgate the problem of spectrum scarcty. In such a market, a spectrum owner or prmary user PU) leases ts dle lcensed spectrum bands to secondary users SUs) to gan profts. SUs, who do not have ther own spectrums but need to delver data traffc, compete for spectrum bands and pay for them f they succeed n the spectrum aucton. In the lterature, there have been some works studyng spectrum aucton n wreless networks. Unfortunately, most of them [1] [11] are only sutable for sngle-hop data transmsson. In partcular, n these schemes, each user bds and s allowed to use the purchased spectrum for communcatons f t wns. However, there are two problems: frst, ths s only Ths work was partally supported by the U.S. Natonal Scence Foundaton under grants CNS CAREER), ECCS , CNS , and HRD for sngle-hop communcatons, and second, t s not clear whom a wnnng user communcates wth the recever s not clearly specfed). Thus, the network performance can be poor. Zhu et al. [12] dscuss spectrum aucton for mult-hop data delvery. But they assume that each secondary network only has one flow, and do not consder tme doman schedulng when utlzng the spectrums. Moreover, n addton to fulfllng SUs traffc demands, aucton schemes need to satsfy certan economc propertes. Specfcally, ncentve compatblty IC) also called truthfulness or strategy-proof), ndvdual ratonalty IR), and budget balance BB) are three of the most crtcal propertes n aucton desgn. An aucton s called economc-robust [8], [13] f all these three propertes are preserved. It has been shown both theoretcally and practcally that an aucton could be vulnerable to market manpulaton and produce very poor outcomes f those propertes are not guaranteed [14]. Most prevous aucton schemes focus on IC only, but do not necessarly satsfy the other two propertes. In ths paper, we am to desgn an economc-robust aucton scheme for mult-hop wreless networks. In partcular, we consder an aucton market where a PU acts as an auctoneer and leases ts dle lcensed spectrum bands to some SUs, whch are deployed by a secondary servce provder SSP) to fulfll certan purposes, such as data delvery, data collecton, and object trackng. SUs may need to transmt data to ther destnatons that are multple hops away. To delver the data traffc, the SSP asks all the SUs to submt bds to the auctoneer. If some SUs wn, they pay a prce to the auctoneer and relay data traffc for each other usng the spectrum purchased. The SSP fnally pays back all the wnnng SUs, and lets them gan some profts so that they are motvated to partcpate n the aucton. To support mult-hop data traffc, ensure economcrobustness, and generate hgh revenue for the auctoneer, we propose a transmsson opportunty aucton scheme, called TOA. In TOA, nstead of spectrum bands as n tradtonal spectrum aucton schemes, SUs bd for transmsson opportuntes TOs). A TO s defned as the permt of data transmsson on a specfc lnk usng a certan band,.e., a lnk-band par. The TOA scheme s manly composed of three procedures: TO allocaton, TO schedulng, and prcng. These three procedures are performed sequentally and teratvely untl the aforementoned goals are reached. Specfcally, n TO allocaton, n

2 each teraton the auctoneer solves a TO allocaton TO-AL) optmzaton problem to fnd out the lnk-band pars.e., TOs) that can be actve at the same tme and have the hghest total bd. It consders the set of the transmtters n these TOs as a wnnng vrtual bdder group VBG). In TO schedulng, the auctoneer formulates a mnmum length schedulng problem, called TO schedulng TO-SC), to see f the wnnng VBGs found so far can support the traffc demand n the network by explorng schedulng n both tme and frequency domans) and routng. If the mnmum schedulng length s larger than 1, t means that the current wnnng VBGs cannot support the traffc demand, and the auctoneer needs to fnd another VBG through TO-AL agan. Otherwse, the auctoneer can then determne the clearng prce for each wnnng VBG and SU, and computes ts own revenue. The auctoneer fnally chooses the teraton,.e., the wnnng VBGs, that can generate the hghest revenue among the results t obtans. Moreover, notce that our aucton scheme TOA s developed based on second-prce sealed-bd aucton [15]. We prove that TOA s economc-robust for VBGs and ndvdual SUs. The rest of ths paper s organzed as follows. We dscuss related work n Secton II. The problem formulaton s presented n Secton III. We detal the proposed transmsson opportunty aucton TOA) scheme n Secton IV, and prove the economcrobustness of TOA n Secton V, respectvely. We conduct smulatons n Secton VI to evaluate the performance of TOA. We fnally conclude ths paper n Secton VII. II. RELATED WORK Aucton has been employed by the Federal Communcatons Commsson FCC) to effcently allocate spectrum resources [16]. Based on ths dea, some works propose to apply aucton to spectrum sharng n wreless networks. Kloeck et al. [1] consder a mult-unt sealed-bd aucton for effcent spectrum allocaton. Huang et al. [11] propose an aucton mechansm whch allows users to bd for ther transmsson power to effcently share the spectrum. Gandh et al. [2] desgn an aucton scheme consderng spectrum reuse n wreless networks. However, all the above works gnore the possble strategc behavor of bdders. Zhou et al. [10] then propose a truthful spectrum aucton scheme VERITAS wth greedy channel assgnment and crtcal value based prcng. Ja et al. [3] dscuss how to generate maxmum expected revenue, whch s an alternate goal of maxmum socal welfare, n spectrum aucton whle satsfyng the truthfulness property. In order to further mprove the expected revenue, Al-Ayyoub et al. [6] desgn a color-based channel allocaton scheme. Takng farness n channel allocaton nto account, Gopnathan et al. [7] develop a truthful aucton protocol by applyng lnear programmng technques to balance the socal welfare and max-mn farness n secondary spectrum markets. In addton to sngle-sded aucton, some works employ double aucton n spectrum market, where multple spectrum owners compete wth each other to sell dle spectrums for proft. Zhou and Zheng [8] propose a framework TRUST for truthful double spectrum aucton enablng spectrum reuse. Wang et al. [9] desgn a truthful double aucton scheme consderng that spectrums are tradable only wthn ther lcensed areas. However, these two works assume each seller can only sell one channel and each buyer can buy one channel at most. Ths lmts the utlty of both buyers and sellers, as well as the revenue of the auctoneer. Most mportantly, all the above works are only sutable for sngle-hop data transmsson. Although Zhu et al. [12] dscuss spectrum aucton for mult-hop data delvery, they assume that each secondary network only has one flow, and do not consder tme doman schedulng when utlzng the spectrums. A. System Model III. PROBLEM FORMULATION We consder an aucton market where a spectrum owner or prmary user PU) acts as an auctoneer and leases ts dle lcensed spectrum bandsm = {1,2,...,m,...,M} to secondary users SUs) N = {1,2,...n,...,N}. The SUs are deployed by a secondary servce provder SSP) to fulfll some purposes such as data delvery, data collecton, and object trackng. In ths study, we assume that each SU s equpped wth one rado, whch means t cannot transmt and receve smultaneously. Suppose there are a set of L = {1,2,...,l,...L} sessons n the secondary network. We let sl), dl), and rl) denote the source node, destnaton node, and traffc demand of sesson l L, respectvely. To delver the traffcs, the SSP asks all the SUs to submt bds to the auctoneer for transmsson opportuntes TOs), each of whch s defned as the permt of data transmsson on a specfc lnk usng a certan band,.e., a lnk-band par. If some SUs wn, they pay a prce to the auctoneer and relay data traffc for each other wth obtaned TOs. The SSP fnally pays back all the wnnng SUs and lets them gan some profts. Gven the network topology, the PU can construct a conflct graph denoted by GV,E), where V s the vertex set and E s the edge set. In partcular, each vertex corresponds to a lnk-band par denoted by,j),m), where N, j T m, and m M. Here, T m s the set of SUs wthn SU s transmsson range on band m. Besdes, two vertces n V are connected wth an undrected edge f the correspondng lnk-band pars nterfere wth each other,.e., f any of the followng condtons s true: The recevng SU n one lnk-band par s wthn the nterference range of the transmttng SU n another lnkband par, gven that the both of them are usng the same band; The two lnk-band pars have at least one node n common. In ths conflct graph, an ndependent set IS) s a set n whch each element s a lnk-band par standng for a transmsson, and all the elements or transmssons) can be carred out successfully at the same tme. If addng any more lnk-band pars nto an IS results n a non-ndependent one, ths IS s defned as a maxmum ndependent set MIS). We denote the set of all the MISs by I = {I 1,I 2,...I q,...,i Q }, where Q = I, and I q V for 1 q Q. We wll show later that we do not really need to fnd all the MISs. We denote the

3 MIS I q s tme share out of unt tme 1) to be actve by λ q λ q 0). Therefore, f all the data traffcs n the network can be supported, we have Q λ q 1. Besdes, we let c m j I q) be the nstantaneous transmsson rate of the lnk-band par,j),m) when MIS I q s actve. Thus, c m j I q) s equal to 0 when,j),m) I q, and the capacty of,j),m),.e., c m j, otherwse, whch wll be ntroduced soon. Moreover, we denote an SU s real valuaton of and bd prce for unt nstantaneous transmsson rate by v and p, respectvely. Note that v can be the rewards SU receves from the SSP f t wns. In an aucton, SUs submt ther bds p s n a sealed manner, so that no one has access to any nformaton about the others bds. After the auctoneer receves all the bds, t dvdes the bdders nto dfferent vrtual bdder groups VBGs), each of whch s the set of transmtters of all lnk-band pars n one MIS. Smlarly, we denote the set of all the VBGs by G = {G 1,G 2,...,G q,...,g Q }. Obvously, we have I = G = Q. Then, wth SUs unt valuatons and unt bd prces, the auctoneer can then calculate SUs equvalent valuatons of and equvalent bds for dfferent TOs. Notce that n one MIS, any SU can have at most one TO. Let v q denote SU s equvalent valuaton of the TO t can obtan from I q. Then, we can have v q = v j T c m m j I q). Accordngly, SU s equvalent bd for the same TO, denoted by b q, can be calculated as bq = p j T c m m j I q). The auctoneer consders VBGs as vrtual bdders n the aucton.the vrtual bd from a VBG s the sum of all SUs equvalent bds n the group. In partcular, let B q denote the vrtual bd from VBG G q 1 q Q). Then, we have B q = G q b q. Denote by B q the vector of the vrtual bds from the other VBGs G/G q. Thus, the entre bd prce set, denoted by B, s B = B q,b q ). Besdes, denote by G W the set of the wnnng VBGs, and I W the set of the correspondng wnnng MISs. Notce that an SU can be nvolved n multple wnnng VBGs. Thus, SU s total equvalent bd for the TOs t obtans, denoted by b, s equal to b = G q G W b q. Note that b q = 0 f G q. B. Objectve of Aucton Desgn The desgn of aucton schemes heavly depends on the desred propertes. In ths paper, we assume that all SUs are strategc n the sense that they may manpulate ther bds to obtan favorable outcomes. Denote by c N ) the clearng prce the auctoneer charges SU for unt nstantaneous transmsson rate. We am to desgn an aucton scheme that can satsfy three of the most mportant economc requrements: Incentve Compatblty IC), Indvdual Ratonalty IR) and Budget Balance BB), whch are defned as follows: Incentve Compatblty IC): The utlty functon of SU N ), s a functon of all the bds: u p,p ) = [G q G W j T c m m j I q) ] v c ), f wns wth unt bd p, 0, otherwse. 1) where p denotes the vector of bds from the other SUs. Thus, an aucton s IC f for any SU N ) wth any p v whle the others bds are fxed, we have u p,p ) u v,p ). 2) Indvdual Ratonalty IR): An aucton s IR, f no bdder s charged hgher than ts bd n the aucton,.e., c p for all N. Budget Balanced BB): To make the aucton selfsustaned wthout any external subsdes, the generated revenue of the auctoneer,.e., the PU, s requred to be non-negatve. We say an aucton s economc-robust [8], [13] f t s ncentve compatble, ndvdually ratonal and budget balanced. Snce n ths paper, we consder that the PU leases ts own dle spectrum bands wthout causng qualty degradaton to ts own servces, the PU s revenue s the total payment receved from the wnnng SUs, whch s always non-negatve. Thus, our aucton scheme s always BB. We wll focus on achevng IC and IR n our aucton scheme desgn. Moreover, an aucton scheme s sad to be system-effcent f the revenue of auctoneer s maxmzed. Unfortunately, accordng to the mpossblty theorem demonstrated n [17], an aucton cannot be economc-robust and system-effcent at the same tme. Therefore, n ths study we am to desgn an economc-robust aucton, whle try to generate hgh revenue for the auctoneer. C. Transmsson Opportunty s Capacty Suppose the power spectral densty of SU on band m s a constant and denoted by P m. A wdely used model [18] for power propagaton gan between SU and SU j, denoted by g j, s g,j = C [d,j)] γ, where and j also denote the postons of SU and SU j, respectvely, d,j) refers to the Eucldean dstance between and j, γ s the path loss factor, and C s a constant related to the antenna profles of the transmtter and the recever, wavelength, and so on. We assume that the data transmsson s successful only f the receved power spectral densty at the recever exceeds a threshold PT m. Meanwhle, we assume nterference becomes non-neglgble only f t produces a power spectral densty over a threshold of PI m at the recever. Thus, the transmsson range of SU on band m s R,m T = CP m /PT m)1/γ, whch comes from CR,m T ) γ P m = PT m. Smlarly, based on the nterference threshold PI mpm I PT m ), the nterference range of SU s R,m I = CP m /PI m)1/γ, whch s no smaller than R,m T. Thus, dfferent SUs may have dfferent transmsson ranges/nterference ranges on dfferent channels wth dfferent transmsson power. In addton, accordng to the Shannon-Hartley theorem, f SU sends data to SU j on lnk,j) usng band m, the capacty of the TO,.e., lnk-band par,j),m), s c m j = W m log 2 1+ g jp m η ), 3) where η s the thermal nose at the recever. Note that the denomnator nsde the log functon only contans η. Ths s because of one of our nterference constrants,.e., when node s transmttng to node j on band m, all the other neghbors of node j wthn ts nterference range are prohbted from

4 usng ths band. We wll address the nterference constrants n detals n the followng secton. IV. TRANSMISSION OPPORTUNITY AUCTION In ths secton, we ntroduce our proposed transmsson opportunty aucton scheme, called TOA. Recall that n the network there are SUs who need to delver data traffc to ther destnatons that are multple hops away. Thus, the objectve of TOA s to choose MISs, and hence VBGs, whch can support such traffcs and brng hgh revenue to the auctoneer. Meanwhle, TOA should be economc-robust. In general, the TOA scheme s composed of three procedures: TO allocaton, TO schedulng, and prcng. These three procedures are performed sequentally and teratvely untl our goals are reached. In what follows, we detal the desgn of the three procedures, respectvely. A. Transmsson Opportunty Allocaton At the begnnng of TO aucton, each SU N ) submts ts unt bd prce p to the auctoneer. Then, as mentoned before, the auctoneer can calculate SU s equvalent bds b q for the TO t obtans from a VBG G q, and the vrtual bd from G q, whch s B q = b q = c m j I q) p. 4) G q G q Note that as explaned above, an aucton cannot be economcally robust and system-effcent at the same tme, and n ths study we am to desgn an economc-robust aucton. Thus, the objectve of TO allocaton s to fnd out one wnnng MIS, whch corresponds to a wnnng VBG, that maxmzes the vrtual bd B q n each teraton n a monotonc manner. In partcular, we wll fnd the VBG wth the hghest vrtual bd n the frst teraton, the one wth the second hghest vrtual bd n the second teraton, and so on and so forth untl the teraton ends. Such VBGs MISs) are consdered as wnnng VBGs MISs) denoted byg W I W ). We wll show n SectonV-A that a monotonc TO allocaton procedure s crtcal n achevng the IC and IR propertes. Before formulatng the optmzaton problem, we frst lst several constrants as follows. Notce that n the procedure of TO allocaton, we do not assume that we know all the MISs, fndng whch s n fact an NP-complete problem. We denote { s m 1, f can transmt to j on band m, j = 0, otherwse. Snce an SU s not able to transmt to or receve from multple SUs on the same frequency band, we have 1, and 1. 5) s m j { } Besdes, an SU cannot use the same frequency band for transmsson and recepton, due to self-nterference at physcal layer,.e., s m j + s m jq 1. 6) { } q T m j s m j Moreover, recall that n ths study, we consder each SU s only equpped wth a sngle rado, whch means each SU can only transmt or receve on one frequency band at a tme. Thus, we can have s m j + s m jq 1. 7) { } q T m j Notce that 5)-6) wll hold whenever 7) holds. In addton to the above constrants at a certan SU, there are also constrants due to potental nterference among the SUs. In partcular, for a frequency band m, f SU uses ths band for transmttng data to a neghborng SU j T m, then any other SUs that can nterfere wth SU j s recepton should not use ths band. To model ths constrant, we denote by Pj m the set of SUs that can nterfere wth SU j s recepton on band m,.e., Pj m = {p dp,j) R p,m I,p j,tp m }. The physcal meanng of Tp m n the above defnton s that SU p has at least one neghbor to whch t may transmt data and hence cause nterference to SU j s recepton. Therefore, we have s m j + s m pq 1 p Pm j ). 8) { } q T m p Moreover, recall that we need fnd the t-th hghest vrtual bd n the t-th teraton. Thus, n the t-th t 2) teraton, we need fnd the VBG gvng the hghest vrtual bd wth the prevously found t 1 VBGs beng excluded. Lettng I W,t and G W,t denote the MIS and the correspondng VBG that we fnd n the t-th teraton, respectvely, we have,j),m) I W,τ s m j < I W,τ, 1 τ t 1, 9),j),m) I W,τ s m j 1, 1 τ t 1, 10) where I W,τ s the number of elements contaned n I W,τ. 9) means that all the lnk-band pars n any of the prevously found t 1 MISs cannot be selected at the same tme n the t-th teraton, whch excludes the prevous t 1 MISs. 10) means that the newly found MIS should contan at least one dfferent lnk-band par from any of the prevously found t 1 MISs. Consequently, accordng to the above constrants, the TO allocaton TO-AL) optmzaton problem fndng the VBG wth the t-th hghest vrtual bd n the t-th teraton can be formulated as follows: TO-AL: Maxmze c m j sm j p N j T M j s.t. Equatons 7) 10) s m j = 0 or 1 where s m j s are the optmzaton varables, cm j s are calculated accordng to 3), p are known constants receved from the

5 SUs. Note that 9) and 10) make sure the newly found IS n t- th teraton s an MIS and t s dfferent from any MIS found n prevous t 1 teratons. Besdes, 9) s n fact always satsfed as long as 10) holds. Snce s m j can only take value of 0 or 1, TO-AL s a Bnary Integer Programmng BIP) problem, whch can be solved by applyng the tradtonal branch-andbound or branch-and-cut [19] approach. B. Transmsson Opportunty Schedulng In ths paper, we assume strct allocaton [3] n TO aucton,.e., a source node pays the auctoneer only f ts traffc demand s fully satsfed. Thus, the auctoneer needs to fnd an optmal way to utlze those wnnng MISs, tryng to delver all source nodes traffc by explorng jont schedulng and routng. Denote the set of the wnnng MISs found up to the t-th teraton by IW t = t τ=1 I W,τ. Note that IW t = t. Lettng f j l) denote the flow rate of traffcl over lnk,j), where N, l L, and j T gven T = T m, the schedulng of the MISs should satsfy the followng: t f j l) λ q c m j I q). 11) l L We then gve routng constrants n the followng. Recall that a source SU may need a number of relay nodes to relay ts data packets toward the ntended destnaton node. Snce routng packets along a sngle path may not be able to fully take advantage of the local avalable channels, n ths study, we employ mult-path routng to delver packets more effectvely and effcently. In partcular, f SU s the source of sesson l,.e., = sl), then we have the followng constrants: j sl),sl) T j f jsl) l) = 0, 12) j sl),j T sl) f sl)j l) = rl). 13) The frst constrant means that the ncomng data rate of sesson l at ts source node s 0. The second constrant means that the traffc for sesson l may be delvered through multple nodes on multple paths, and the total data rates on all outgong lnks are equal to the correspondng traffc demand rl). If SU s an ntermedate relay node for sesson l,.e., sl) and dl), then f j l) = f p l), 14) j sl),j T p dl), T p whch ndcates that the total ncomng data rates at a relay node are equal to ts total outgong data rates for the same sesson. Moreover, f SU s the destnaton node of sesson l,.e., = dl), then we have j dl),j T dl) f dl)j l) = 0, 15) p dl),dl) T p f pdl) l) = rl). 16) The frst constrant means the total outgong data rate for sessonlat ts destnatondl) s 0, whle the second constrant ndcates that the total ncomng data rate for sesson l at the destnaton dl) s equal to the correspondng traffc demand rl). Thus, based on the constrants mentoned above, the TO schedulng TO-SC) optmzaton problem n the t-th teraton can be formulated as follows: t TO-SC: Mnmze s.t. λ q Equatons 11) 16) λ q 0 1 q t) f j l) 0 N,j T,l L) The formulated optmzaton problem s a lnear programmng LP) problem, whch can be easly solved by usng the smplex method [20]. The optmal result of TO-SC ndcates whether the current wnnng MISs are enough to support the traffc demand. Specfcally, If the optmal objectve functon s no larger than 1, then the traffc can be supported. The soluton also shows how to schedule the MISs and route the traffcs. Then, the auctoneer contnues to perform prcng as ntroduced next. Otherwse, t means that the current wnnng MISs cannot satsfy the traffc demand. Thus, the auctoneer does not need to perform prcng and another wnnng MIS s needed from TO-AL. C. Prcng In an teraton, f the mnmum schedulng length t λ q s no larger than 1, gven the wnnng MISs I W and ther schedules, the auctoneer can then determne the clearng prce for each SU. The prcng procedure conssts of two steps: determnng the clearng prce for each wnnng VBG, and determnng the clearng prce for each wnnng SU. Denote the number of teratons the auctoneer takes to get t λ q 1 for the frst tme by T 0. To mantan the economc propertes and take spectrum utlzaton nto consderaton, we determne the clearng prce for each wnnng VBG n the t-th teraton, denoted by C t, as follows: { t C t = max B t λ q, B t+1 }, for t T 0, where B t s the vrtual bd from the VBG found n the t-th teraton,.e., the lowest bd among all the wnnng VBGs bds, and B t+1 s the vrtual bd from the VBG found n the t+1)-th teraton,.e., the hghest bd among all the losng VBGs bds. Notce that t λ q ndcates the spectrum utlzaton. When t s less than 1, t means that the auctoneer can launch another aucton to rent the unutlzed spectrum, and hence t s reasonable to consder t n the clearng prce. Wth each wnnng VBG s clearng prce defned as above, the prce a wnnng SU needs to pay, denoted by C t,, s gven as follows: t b q ) C t, = C t, for t T 0. B q

6 Note that bq B q C t s the prce SU needs to pay n VBG G W,q, and hence C t, s the total clearng prce for SU. Thus, a wnnng SU s clearng prce, denoted by c t,, s c t, = t C t, D. Iteraton Termnaton Condton j T c m m j I W,q), for t T 0. As mentoned before, the auctoneer performs the above three procedures sequentally and teratvely. Here, we dscuss when the auctoneer stops and fnshes the aucton process. Notce that the auctoneer s revenue obtaned n the t-th teraton, denoted by Rt), s Rt) = C t t. Accordng to Moon and Moser s result [21], any graph wth n vertces has at most 3 n 3 MISs. Thus, the number of teratons does not need to exceed 3 V 3, whch we denote by T a.e., t T a. Recall that we denote the number of teratons the auctoneer takes to get t λ q 1 for the frst tme by T 0. We also defne a control parameter T b to be the maxmum number of teratons the auctoneer runs beyond T 0 to calculate for ts maxmum revenue under the proposed aucton scheme. Therefore, we have t T 0 +T b, and hence t mn{t 0 +T b,t a }. We wll show n our smulatons that we usually only need a small number of teratons n practce. Moreover, n the case that the auctoneer fnds that the SUs traffc demands cannot be supported, the auctoneer wll drop one of them each tme untl the remanng traffc demands can be satsfed. After the teraton ends, the auctoneer fnds the optmal teraton t that gves the maxmum revenue Rt) among all the t T 0 +1 from T 0 to t) outcomes. Note that Rt) s not equal to the maxmum revenue the auctoneer can possbly get under system-effcent aucton scheme as we explaned before. Then, SU s clearng prce wll be c t,. V. PROOF OF ECONOMIC PROPERTIES In ths secton, we frst prove that our proposed aucton scheme TOA s IC and IR for VBGs, and then show that those two economc propertes also hold for ndvdual SUs. A. Proof of Economc-robustness for VBGs Accordng to Myerson s characterzaton of IC and IR sustaned aucton [22], f the tem n the aucton s monotoncally allocated and the wnners are charged wth crtcal value, then the aucton satsfes the IC and IR propertes. Defnton 1: Monotonc Allocaton: When others bds,.e., B q are fxed, f one bdder wns by bddng B q, then t also wns by bddng B q > B q. Defnton 2: Crtcal Value: Crtcal value s such a value that f bdders bd hgher than t, then they wn, and f bdders bd lower than t, then they lose. Lemma 1: The aucton tems,.e., TOs, are monotoncally allocated n our aucton scheme. Proof: Snce the TO allocaton procedure determnes a wnnng VBG each tme by fndng the one wth the hghest bd, the lemma drectly follows. Lemma 2: The clearng prce C t for each wnnng VBG s a crtcal value. Proof: Recall that B t s the vrtual bd from the VBG found n the t-th teraton,.e., the t-th wnnng VBG, and the clearng prce s C t = max{b t t λ q,b t+1 }. Frst, f B t t λ q B t+1, then C t s equal to B t+1, whch s obvously a crtcal value snce bdders wth hgher bds than B t+1 wn and those wth lower bds lose. Second, f B t t λ q > B t+1, then C t s equal to B t t λ q, whch s also a crtcal value. Thus, the clearng prce s always a crtcal value. Thus, from Lemma 1 and Lemma 2, we have the followng theorem. Theorem 1: The proposed aucton scheme TOA s IC and IR, and hence economcally robust for VBGs. B. Proof of Economc-robustness for Indvdual SUs Although n the prevous secton, we have shown that our proposed aucton scheme TOA preserves IC and IR propertes and hence s economcally robust for VBGs, we need further prove that t also has these propertes for ndvdual SUs. The followng lemma demonstrates the monotonc allocaton for SUs. Lemma 3: When the other SUs bds,.e., p are fxed, f SU wns by bddng p, then t also wns by bddng p > p. Proof: Consder an arbtrary teraton t. If SU s a wnner up to ths teraton wth bd p, t means that s n at least one of the t wnnng VBGs. Denote the wnnng VBG that contans SU and wns n the q-th teraton by G q 1 q t). Then, ts vrtual bd s B q = b q j = b q j +bq j G q j G q\) where b q = p j T c m m j I W,q). When SU bds p > p, the VBG G q s new vrtual bd, denoted by B q, s B q = b q j +p c m ji W,q ) > B q. j G q\) Denote the set of the wnnng VBGs found up to the q-th teraton by G q W,.e., Gq W = q τ=1 G W,τ. For any VBG G s that does not contan SU and loses n all q teratons when bds wth p,.e., G s and G s G \ G q W, we denote ts vrtual bd when SU bds wth p and wth p by B s and B s, respectvely. Snce the other SUs bds reman the same, we have B s = B s B q < B q. Therefore, the VBGs whch do not contan SU and lose n all q teratons when bds wth p wll stll lose when bds wth p. Consequently, when bds wth p, snce the vrtual bds of the VBGs contanng SU become larger, the number of VBGs contanng SU n the q wnng VBGs n all q teratons gets no smaller than that when bds wth p. Thus, SU stll wns. Usng the above lemma, we are able to prove the IC property for ndvdual SUs as follows. Theorem 2: The proposed aucton scheme TOA s IC for SUs.

7 Proof: Recall that to prove the IC property, we need to show that for any SU wth any p v whle the others bds are fxed, the condton n 2) holds. Let u p,p ) and u v,p ) denote SU s utlty when SU bdsp andv, respectvely. We frst consder the scenaro where p > v. Case 1: SU loses wth both v and p. In ths case, u p,p ) = u v,p ) = 0 accordng to our defnton n 1). Thus, 2) holds. Case 2: SU loses wth v but wns wth p. In ths case, obvously we have u v,p ) = 0. Snce SU wns wth p, n an arbtrary t-th teraton t T 0 ), we can obtan u p,p ) t = v c ) = v t = t j T m v q b q c m j I W,q) c m j I W,q) ), +bq t b q ) C t B q where b q = j G q,j bq j. Besdes, snce SU s a wnnng SU, there must be at least one out of the t wnnng VBGs that contans. Denote the set of the ndexes of such VBGs by H. Then, we get v q = bq = 0 for q H, and hence u p,p ) = v q b q ). q H +bq In addton, snce v < p, we can have that for any q H, v q < bq and thus b q v q < v q +bq. 17) +vq Furthermore, for any wnnng VBG that contans SU, say G q q H), ts vrtual bd satsfes B q = b q +bq C t. Due to the fact SUloses by bddngv, thetwnnng VBGs, denoted by G k 1 k t) wth vrtual bd B k, do not contan SU when SU bds v. Thus, we have b q +vq B t. Snce at least one VBG contanng SU becomes a wnner when SU bds p, G t must lose, and hence B t C t. Thus, we have C t b q +vq for q H. As a result, we fnally get u p,p ) < q Hv q v q ) < 0, +vq whch leads to u p,p ) u v,p ) as well. Case 3: SU wns wth v and loses wth p. Snce p > v, accordng to the monotoncty property we have proved n Lemma 3, ths wll not happen. Case 4: SU wns wth both v and p. In an arbtrary t-th teraton t T 0 ), we denote the set of the ndexes of the wnnng VBGs contanng SU when SU bds wth p and that when U bds wth v by H and H, v q respectvely. We also denote the clearng prces when bds wth p and v by C t and C t, respectvely. Notce that 1) f the set of wnnng VBGs when SU bds wth p and that when SU bds wth v, denoted by G q W p ) and G q W v ), respectvely, are the same, we have C t C t accordng to 17) snce the VBGs vrtual bds are larger when SU bds wth p and λ q s reman the same; 2) f G q W p ) and G q W v ) are dfferent, t means at least one of the wnnng VBGs when SU bds wth v loses when SU bds wth p. Snce ths VBG s vrtual bd when SU bds wth p, denoted by B x, s no smaller than that when when SU bds wth v, denoted by B x, we have C t B x B x C t. Consequently, we always have C t C t. Besdes, smlar to that n Case 2, we get u p,p ) = v q b q ) q H +bq u v,p ) = v q v q ) b q C +vq t q H When SU bds wth p, denote ts utlty attrbuted to the common VBGs between G q W p ) and G q W v ) by u 1 p,p ) and the utlty attrbuted to the other VBGs by u 2 p,p ). Smlarly, when SU bds wth v, denote ts utlty attrbuted to the common VBGs between G q W p ) andg q W v ) byu 1 v,p ) and the utlty attrbuted to the other VBGs by u 2 v,p ). Then, we have the followng results. Frst, for those common VBGs between G q W p ) and G q W v ), we have u 1 p,p ) u 1 v,p ) v q b q ) q H H ) +bq v q v q ) +vq q H H ) whch s less than 0 accordng to 17). Second, for any VBG n G q W p ) but not n G q W v ), we have b q v q < v q +bq. +vq Snce ths VBG loses when SU bds wth v, we have C t C t bq +vq. Thus, we get u 2 p,p ) = v q b q ) 0. +bq q H\H H ) Thrd, for any VBG n G q W v ) but not n G q W p ), we have v q vq C b q +vq t 0 snce ths VBG wns when SU bds wth v and C t bq +vq. Thus, we obtan u 2 v,p ) = v q b q ) 0. +bq q H \H H ) v q

8 As a result, we can get u p,p ) u v,p ) =u 1 p,p ) u 1 v,p )+u 2 p,p ) u 2 v,p ) 0. The proof s smlar when p < v, whch s omtted due to space lmt. In general, u p,p ) u v,p ) always holds, and hence the theorem drectly follows. Theorem 3: The proposed aucton scheme TOA s IR for SUs. Proof: In an arbtrary t-th teraton t T 0 ), snce TOA s IR for VBGs, we have C t B q for 1 q t, and hence t b q ) B q C t c = t c m j I W,q) = t t p t t bq j T m c m j I W,q) c m j I W,q) c m j I = p. W,q) Therefore, TOA s IR for SUs. From Theorem 2 and Theorem 3, we can have the followng theorem. Theorem 4: The proposed aucton scheme TOA s economc-robust for SUs. VI. SIMULATION RESULTS In ths secton, we conduct smulatons to evaluate the performance of our proposed aucton scheme TOA. Smulatons are carred out n CPLEX 12.4 on a computer wth a 2.27 GHz CPU and 24 GB RAM. We randomly deploy SUs n a square network of area 1000m 1000m. There are totally 5 mult-hop sessons n the network, each of whch has traffc demand of 1Mbps. We assume that each bdder s true valuaton of and hence ts bd for) unt nstantaneous transmsson rate s unformly dstrbuted over[10 6,10 5 ]. In addton, assume the PU has 3 dle spectrum bands to lease to the SUs, wth ther bandwdths beng 1.0MHz, 1.5MHz and 2.0MHz, respectvely. Some other mportant smulaton parameters are lsted as follows. The path loss exponent s 4 and C = The nose power spectral densty s η = W/Hz at all nodes. The transmsson power spectral densty of nodes s η, and the recepton threshold and nterference threshold are both 8.1η on each spectrum band. Thus, the transmsson range and the nterference range on each frequency band are both equal to 500m. Snce we have proved that our aucton scheme s economc-robust n the prevous secton, we demonstrate the aucton effcency and the auctoneer s revenue n what follows. Note that aucton effcency s defned as the rato of the number of fnally successfully delvered traffc flows to the total number of traffc flows demanded by the SUs. We frst compare the aucton effcency of the proposed TOA scheme wth those of two other aucton schemes: one for sngle-hop data transmsson [10], and the other for mult-hop Aucton Effcency Aucton Effcency hop Aucton, M=1 1 hop Aucton, M=3 TO Aucton, M=1 TO Aucton, M= Number of SUs Bdders) a) Smple Mult hop Aucton, M=1 Smple Mult hop Aucton, M=3 TO Aucton, M=1 TO Aucton, M= Number of SUs Bdders) b) Fg. 1. Aucton effcency comparson wth 1-hop aucton scheme and greedy mult-hop aucton scheme. a) Sngle-hop data transmsson scenaro. b) Mult-hop data transmsson scenaro. data transmsson [12] whch greedly assgns spectrum bands to lnks. We call these two schems 1-hop aucton and greedy mult-hop aucton, respectvely, n our smulatons. To make far comparsons, we compare TOA wth these two schemes n sngle-hop and mult-hop scenaros, respectvely. In the sngle-hop scenaro, each source SU can reach ts ntended destnaton SU n one hop, and hence the data traffc can be delvered n one-hop as well. Fg. 1a) gves the results when the number of SUs ranges from 10 to 30 and the number of avalable spectrums M s equal to 1 and 3. We can fnd that TOA can acheve much hgher aucton effcency than 1-hop aucton. Partcularly, n the case that there s only one avalable spectrum band, TOA can support two and three traffc flows when the number of SUs s 10 and 15, respectvely, whle 1- hop aucton cannot support any of the traffc flows. When there are more SUs n the network, TOA can support four traffc flows whle 1-hop aucton can only support one of them. In the case that there are three avalable spectrum bands, TOA can support four flows when there are 10 SUs and all the fve flows when there are more SUs, whle 1-hop aucton can only support one flow, two flows, and three flows, when there are 10, 15 and 20, and more SUs, respectvely. As we mentoned before, ths s because n 1-hop aucton, t s not clear whom a wnnng SU communcates wth and there can be a lot of collsons n the network. In the mult-hop scenaro, each source node needs to delver data to ts destnaton va multple hops. The aucton effcency s shown n Fg. 1b) when the number of SUs ranges from 10 to 30 and the number of avalable spectrums M s equal to 1 and 3. In partcular, n the case that there s only one avalable spectrum band, TOA can support three traffc flows when the

9 number of SUs s 10, and all the fve traffc flows when there are more SUs n the network. On the other hand, greedy multhop aucton cannot support any traffc flows when there are 10 SUs, and only two flows when there are more SUs. Besdes, n the case that there are three avalable spectrum bands, TOA can support four flows when there are 10 SUs and fve flows when there are more SUs, whle greedy mult-hop aucton can only support one flow, two flows, and three flows, when there are 10, 15, and more SUs, respectvely. Ths s because that we consder transmsson opportuntes n auctons as well as spectrum schedulng n both frequency and tme domans. Fg. 2. Revenue M=2 M= Iteraton Number t Computaton performance under dfferent number of spectrum band. We then llustrate the revenues TOA generates for the auctoneer. Note that n TOA, SUs bd for TOs based on unt nstantaneous transmsson rate, whle the other aucton schemes bd for spectrum bands based on bandwdth. Thus, SUs valuatons and bds have very dfferent meanngs from those n prevous schemes, and we cannot compare wth ther revenues here. In ths case, we consder the scenaros where there are 20 SUs and the number of avalable spectrum bands M s equal to 2 or 3. The results are shown n Fg. 2. We can see that the auctoneer s revenue frst grows and then declnes as the teraton number ncreases. We can also fnd that the number of teratons does not need to be very large. For example, when M = 2, T 0 s around 55, and the maxmum revenue s acheved when the teraton number s approxmately 310. When M = 4, the maxmum revenue s acheved when the teraton number s about 390. Moreover, the auctoneer s revenue s hgher when there are more spectrum bands, whch fts our ntuton snce t sells more resources. On the other hand, the revenue when M = 3 does not exceed much than that when M = 2 snce the auctoneer does not need to fully utlze all the spectrum resources to support the traffc and can save some for other applcatons. VII. CONCLUSIONS In ths paper, we have proposed a novel spectrum aucton scheme, called transmsson opportunty aucton TOA), based on TOs. The TOA scheme s manly composed of three procedures: TO allocaton, TO schedulng, and prcng. In TO allocaton, n each teraton the auctoneer fnds out the VBG that has the hghest vrtual bd. In TO schedulng, the auctoneer checks f the wnnng VBGs found so far can support the traffc demand n the network by solvng a mnmum length schedulng problem. In prcng, the auctoneer determnes the clearng prce for each wnnng VBG and SU, and computes ts own revenue. The auctoneer fnally chooses the wnnng VBGs whch can generate the hghest revenue among the results t obtans. We have proved that TOA s IC, IR, and BB, and hence economc-robust. We have also carred out extensve smulatons whch show that TOA leads to hgh spectrum utlzaton and effcently generates hgh profts for the auctoneer. REFERENCES [1] C. Kloeck, H. Jaekel, and F. K. Jondral, Dynamc and local combned prcng, allocaton and bllng system wth cogntve rados, n Proc. of IEEE DySPAN, Baltmore, MD, November [2] S. Gandh, C. Buragohan, L. Cao, H. Zheng, and S. Sur, A general framework for wreless spectrum auctons, n Proc. of IEEE DySPAN, Dubln, Ireland, Aprl [3] J. Ja, Q. Zhang, Q. Zhang, and M. Lu, Revenue generaton for truthful spectrum aucton n dynamc spectrum access, n Proceedng of ACM MobHoc, New Orleans, Lousana, US, May [4] L. Gao, X. Wang, Y. Xu, and Q. Zhang, Spectrum tradng n cogntve rado networks: A contract-theoretc modelng approach, IEEE Journal on Selected Areas n Communcatons, vol. 29, no. 4, pp , [5] G. Wang, Q. Lu, and J. Wu, Herarchcal attrbute-based encrypton for fne-graned access control n cloud storage servces, n Proceedngs of ACM CCS, New York, NY, USA, October [6] M. Al-Ayyoub and H. Gupta, Truthful spectrum auctons wth approxmate revenue, n Proceedng of IEEE INFOCOM, Shangha, Chna, Aprl [7] A. Gopnathan, Z. L, and C. Wu, Strategyproof auctons for balancng socal welfare and farness n secondary spectrum markets, n Proceedng of IEEE INFOCOM, Shangha, Chna, Aprl [8] X. Zhou and H. Zheng, Trust: A general framework for truthful double spectrum auctons, n Proceedng of IEEE INFOCOM, Ro de Janero, Brazl, Aprl [9] W. Wang, B. L, and B. Lang, Dstrct: Embracng local markets n truthful spectrum double auctons, n Proc. of IEEE SECON, Salt Lake, UT, June [10] X. Zhou, S. Gandh, S. Sur, and H. Zheng, ebay n the sky: Strategyproof wreless spectrum auctons, n Proceedngs of ACM MobCom, San Francsco, CA, USA, September [11] J. Huang, R. A. Berry, and M. L. Hong, Aucton-based spectrum sharng, Journal of Moble Networks and Applcatons, vol. 11, no. 3, pp , [12] Y. Zhu, B. L, and Z. L, Truthful spectrum aucton desgn for secondary networks, n Proceedng of IEEE INFOCOM, Orlando, FL, USA, March [13] M. Babaoff and W. E. Walsh, Incentve-compatble, budget-balanced, yet hghly effcent auctons for supply chan formaton, In Decson Support Systems. In, pp , [14] P. Klemperer, What really matters n aucton desgn, Journal of Economc Perspectves, vol. 16, no. 1, pp , [15] V. Krshna, Aucton Theory. Academc Press, [16] P. Cramton, Spectrum auctons, Handbook of Telecommuncatons Economcs, pp , [17] R. B. Myerson and M. A. Satterthwate, Effcent mechansms for blateral tradng, Journal of Economc Theory, vol. 29, no. 2, pp , [18] Y. T. Hou, Y. Sh, and H. D. Sheral, Spectrum sharng for mult-hop networkng wth cogntve rados, IEEE Journal on Selected Areas n Communcatons, vol. 26, no. 1, pp , January [19] Y. Pochet and L. Wolsey, Producton Plannng by Mxed Integer Programmng. Secaucus, [20] G. B. Dantzg, Lnear Programmng and Extensons. Prnceton Unversty Press, [21] J. W. Moon and L. Moser, On clques n graphs, Israel Journal of Mathematcs, vol. 3, no. 1, pp , [22] R. Myerson, Optmal aucton desgn, Mathematcs of Operatons Research, pp , 1981.

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

A Novel Auction Mechanism for Selling Time-Sensitive E-Services

A Novel Auction Mechanism for Selling Time-Sensitive E-Services A ovel Aucton Mechansm for Sellng Tme-Senstve E-Servces Juong-Sk Lee and Boleslaw K. Szymansk Optmaret Inc. and Department of Computer Scence Rensselaer Polytechnc Insttute 110 8 th Street, Troy, Y 12180,

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Energy Efficient Routing in Ad Hoc Disaster Recovery Networks

Energy Efficient Routing in Ad Hoc Disaster Recovery Networks Energy Effcent Routng n Ad Hoc Dsaster Recovery Networks Gl Zussman and Adran Segall Department of Electrcal Engneerng Technon Israel Insttute of Technology Hafa 32000, Israel {glz@tx, segall@ee}.technon.ac.l

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

An MILP model for planning of batch plants operating in a campaign-mode

An MILP model for planning of batch plants operating in a campaign-mode An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN yfumero@santafe-concet.gov.ar Gabrela Corsano Insttuto de Desarrollo y Dseño

More information

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems 1 Mult-Resource Far Allocaton n Heterogeneous Cloud Computng Systems We Wang, Student Member, IEEE, Ben Lang, Senor Member, IEEE, Baochun L, Senor Member, IEEE Abstract We study the mult-resource allocaton

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet 2008/8 An ntegrated model for warehouse and nventory plannng Géraldne Strack and Yves Pochet CORE Voe du Roman Pays 34 B-1348 Louvan-la-Neuve, Belgum. Tel (32 10) 47 43 04 Fax (32 10) 47 43 01 E-mal: corestat-lbrary@uclouvan.be

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

Energy Conserving Routing in Wireless Ad-hoc Networks

Energy Conserving Routing in Wireless Ad-hoc Networks Energy Conservng Routng n Wreless Ad-hoc Networks Jae-Hwan Chang and Leandros Tassulas Department of Electrcal and Computer Engneerng & Insttute for Systems Research Unversty of Maryland at College ark

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Ad-Hoc Games and Packet Forwardng Networks

Ad-Hoc Games and Packet Forwardng Networks On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

Optimal Bidding Strategies for Generation Companies in a Day-Ahead Electricity Market with Risk Management Taken into Account

Optimal Bidding Strategies for Generation Companies in a Day-Ahead Electricity Market with Risk Management Taken into Account Amercan J. of Engneerng and Appled Scences (): 8-6, 009 ISSN 94-700 009 Scence Publcatons Optmal Bddng Strateges for Generaton Companes n a Day-Ahead Electrcty Market wth Rsk Management Taken nto Account

More information

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid

Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid Feasblty of Usng Dscrmnate Prcng Schemes for Energy Tradng n Smart Grd Wayes Tushar, Chau Yuen, Bo Cha, Davd B. Smth, and H. Vncent Poor Sngapore Unversty of Technology and Desgn, Sngapore 138682. Emal:

More information

General Auction Mechanism for Search Advertising

General Auction Mechanism for Search Advertising General Aucton Mechansm for Search Advertsng Gagan Aggarwal S. Muthukrshnan Dávd Pál Martn Pál Keywords game theory, onlne auctons, stable matchngs ABSTRACT Internet search advertsng s often sold by an

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

ROSA: Distributed Joint Routing and Dynamic Spectrum Allocation in Cognitive Radio Ad Hoc Networks

ROSA: Distributed Joint Routing and Dynamic Spectrum Allocation in Cognitive Radio Ad Hoc Networks ROSA: Dstrbuted Jont Routng and Dynamc Spectrum Allocaton n Cogntve Rado Ad Hoc Networks Le Dng Tommaso Meloda Stella Batalama Mchael J. Medley Department of Electrcal Engneerng, State Unversty of New

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

A Lyapunov Optimization Approach to Repeated Stochastic Games

A Lyapunov Optimization Approach to Repeated Stochastic Games PROC. ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, OCT. 2013 1 A Lyapunov Optmzaton Approach to Repeated Stochastc Games Mchael J. Neely Unversty of Southern Calforna http://www-bcf.usc.edu/

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

Profit-Maximizing Virtual Machine Trading in a Federation of Selfish Clouds

Profit-Maximizing Virtual Machine Trading in a Federation of Selfish Clouds Proft-Maxmzng Vrtual Machne Tradng n a Federaton of Selfsh Clouds Hongxng L, Chuan Wu, Zongpeng L and Francs CM Lau Department of Computer Scence, The Unversty of Hong Kong, Hong Kong, Emal: hxl, cwu,

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Formulating & Solving Integer Problems Chapter 11 289

Formulating & Solving Integer Problems Chapter 11 289 Formulatng & Solvng Integer Problems Chapter 11 289 The Optonal Stop TSP If we drop the requrement that every stop must be vsted, we then get the optonal stop TSP. Ths mght correspond to a ob sequencng

More information

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,

More information

Second-Best Combinatorial Auctions The Case of the Pricing-Per-Column Mechanism

Second-Best Combinatorial Auctions The Case of the Pricing-Per-Column Mechanism Proceedngs of the 4th Hawa Internatonal Conference on System Scences - 27 Second-Best Combnatoral Auctons The Case of the Prcng-Per-Column Mechansm Drk Neumann, Börn Schnzler, Ilka Weber, Chrstof Wenhardt

More information

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 畫 類 別 : 個 別 型 計 畫 半 導 體 產 業 大 型 廠 房 之 設 施 規 劃 計 畫 編 號 :NSC 96-2628-E-009-026-MY3 執 行 期 間 : 2007 年 8 月 1 日 至 2010 年 7 月 31 日 計 畫 主 持 人 : 巫 木 誠 共 同

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

QoS-Aware Spectrum Sharing in Cognitive Wireless Networks

QoS-Aware Spectrum Sharing in Cognitive Wireless Networks QoS-Aware Spectrum Sharng n Cogntve reless Networks Long Le and Ekram Hossan Abstract e consder QoS-aware spectrum sharng n cogntve wreless networks where secondary users are allowed to access the spectrum

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Downlink Power Allocation for Multi-class. Wireless Systems

Downlink Power Allocation for Multi-class. Wireless Systems Downlnk Power Allocaton for Mult-class 1 Wreless Systems Jang-Won Lee, Rav R. Mazumdar, and Ness B. Shroff School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette, IN 47907, USA {lee46,

More information

A New Paradigm for Load Balancing in Wireless Mesh Networks

A New Paradigm for Load Balancing in Wireless Mesh Networks A New Paradgm for Load Balancng n Wreless Mesh Networks Abstract: Obtanng maxmum throughput across a network or a mesh through optmal load balancng s known to be an NP-hard problem. Desgnng effcent load

More information

Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous Servers

Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous Servers 1 Domnant Resource Farness n Cloud Computng Systems wth Heterogeneous Servers We Wang, Baochun L, Ben Lang Department of Electrcal and Computer Engneerng Unversty of Toronto arxv:138.83v1 [cs.dc] 1 Aug

More information

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT

Chapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT Chapter 4 ECOOMIC DISATCH AD UIT COMMITMET ITRODUCTIO A power system has several power plants. Each power plant has several generatng unts. At any pont of tme, the total load n the system s met by the

More information

Joint Optimization of Bid and Budget Allocation in Sponsored Search

Joint Optimization of Bid and Budget Allocation in Sponsored Search Jont Optmzaton of Bd and Budget Allocaton n Sponsored Search Wenan Zhang Shangha Jao Tong Unversty Shangha, 224, P. R. Chna wnzhang@apex.sjtu.edu.cn Yong Yu Shangha Jao Tong Unversty Shangha, 224, P. R.

More information

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION The Medterranean Journal of Computers and Networks, Vol. 2, No. 1, 2006 57 AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION L. Bada 1,*, M. Zorz 2 1 Department of Engneerng,

More information

Virtual Network Embedding with Coordinated Node and Link Mapping

Virtual Network Embedding with Coordinated Node and Link Mapping Vrtual Network Embeddng wth Coordnated Node and Lnk Mappng N. M. Mosharaf Kabr Chowdhury Cherton School of Computer Scence Unversty of Waterloo Waterloo, Canada Emal: nmmkchow@uwaterloo.ca Muntasr Rahan

More information

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg

More information

Multi-Source Video Multicast in Peer-to-Peer Networks

Multi-Source Video Multicast in Peer-to-Peer Networks ult-source Vdeo ultcast n Peer-to-Peer Networks Francsco de Asís López-Fuentes*, Eckehard Stenbach Technsche Unverstät ünchen Insttute of Communcaton Networks, eda Technology Group 80333 ünchen, Germany

More information

Dynamic Pricing for Smart Grid with Reinforcement Learning

Dynamic Pricing for Smart Grid with Reinforcement Learning Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,

More information

VoIP over Multiple IEEE 802.11 Wireless LANs

VoIP over Multiple IEEE 802.11 Wireless LANs SUBMITTED TO IEEE TRANSACTIONS ON MOBILE COMPUTING 1 VoIP over Multple IEEE 80.11 Wreless LANs An Chan, Graduate Student Member, IEEE, Soung Chang Lew, Senor Member, IEEE Abstract IEEE 80.11 WLAN has hgh

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen and Na L Abstract Speed scalng has been wdely adopted n computer and communcaton systems, n partcular, to reduce energy consumpton. An

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

How To Improve Power Demand Response Of A Data Center Wth A Real Time Power Demand Control Program

How To Improve Power Demand Response Of A Data Center Wth A Real Time Power Demand Control Program Demand Response of Data Centers: A Real-tme Prcng Game between Utltes n Smart Grd Nguyen H. Tran, Shaole Ren, Zhu Han, Sung Man Jang, Seung Il Moon and Choong Seon Hong Department of Computer Engneerng,

More information

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs Dstrbuted Optmal Contenton Wndow Control for Elastc Traffc n Wreless LANs Yalng Yang, Jun Wang and Robn Kravets Unversty of Illnos at Urbana-Champagn { yyang8, junwang3, rhk@cs.uuc.edu} Abstract Ths paper

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen, Na L and Steven H. Low Engneerng & Appled Scence Dvson, Calforna Insttute of Technology, USA Abstract Speed scalng has been wdely adopted

More information

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu

More information

Agile Traffic Merging for Data Center Networks. Qing Yi and Suresh Singh Portland State University, Oregon June 10 th, 2014

Agile Traffic Merging for Data Center Networks. Qing Yi and Suresh Singh Portland State University, Oregon June 10 th, 2014 Agle Traffc Mergng for Data Center Networks Qng Y and Suresh Sngh Portland State Unversty, Oregon June 10 th, 2014 Agenda Background and motvaton Power optmzaton model Smulated greedy algorthm Traffc mergng

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent

More information

A User-Centric Approach for Dynamic Resource Allocation in CDMA systems based on Hopfield Neural Networks

A User-Centric Approach for Dynamic Resource Allocation in CDMA systems based on Hopfield Neural Networks A User-Centrc Approach for Dynamc esource Allocaton n CDA systems based on Hopfeld eural etworks. García. Agustí J. érez-omero Unverstat ompeu Fabra (UF) Unverstat oltècnca de Catalunya (UC) Barcelona

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Dynamic Online-Advertising Auctions as Stochastic Scheduling

Dynamic Online-Advertising Auctions as Stochastic Scheduling Dynamc Onlne-Advertsng Auctons as Stochastc Schedulng Isha Menache and Asuman Ozdaglar Massachusetts Insttute of Technology {sha,asuman}@mt.edu R. Srkant Unversty of Illnos at Urbana-Champagn rsrkant@llnos.edu

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Backpressure Meets Taxes: Faithful Data Collection in Stochastic Mobile Phone Sensing Systems

Backpressure Meets Taxes: Faithful Data Collection in Stochastic Mobile Phone Sensing Systems Backpressure Meets Taxes: Fathful Data Collecton n Stochastc Moble Phone Sensng Systems Shusen Yang Imperal College Lodon Emal: s.yang9@mperal.ac.uk Usman Adeel Imperal College London Emal: u.adeel9@mperal.ac.uk

More information

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks Coordnated Denal-of-Servce Attacks n IEEE 82.22 Networks Y Tan Department of ECE Stevens Insttute of Technology Hoboken, NJ Emal: ytan@stevens.edu Shamk Sengupta Department of Math. & Comp. Sc. John Jay

More information

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management

More information

Optimization of Resource Allocation in Wireless Systems Based on Game Theory

Optimization of Resource Allocation in Wireless Systems Based on Game Theory Internatonal Journal of Computer Scences and Engneerng Open Access Research Paper Volume-4, Issue-1 E-ISSN: 347-693 Optmzaton of Resource Allocaton n Wreless Systems Based on Game Theory Sara Rah 1*, Al

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

Spectrum Trading with Insurance in Cognitive Radio Networks

Spectrum Trading with Insurance in Cognitive Radio Networks 212 Proceedngs IEEE INFOCOM Spectrum Tradng wth Insurance n Cogntve Rado Networks Hamng Jn, Gaofe Sun, Xnbng Wang Dept. of Electronc Engneerng Shangha Jao Tong Unversty, Chna Emal: {jnhamng, sgf hb, xwang8}@sjtu.edu.cn

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Fair Virtual Bandwidth Allocation Model in Virtual Data Centers

Fair Virtual Bandwidth Allocation Model in Virtual Data Centers Far Vrtual Bandwdth Allocaton Model n Vrtual Data Centers Yng Yuan, Cu-rong Wang, Cong Wang School of Informaton Scence and Engneerng ortheastern Unversty Shenyang, Chna School of Computer and Communcaton

More information

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks : An Adaptve, Anycast MAC Protocol for Wreless Sensor Networks Hwee-Xan Tan and Mun Choon Chan Department of Computer Scence, School of Computng, Natonal Unversty of Sngapore {hweexan, chanmc}@comp.nus.edu.sg

More information

On Robust Network Planning

On Robust Network Planning On Robust Network Plannng Al Tzghadam School of Electrcal and Computer Engneerng Unversty of Toronto, Toronto, Canada Emal: al.tzghadam@utoronto.ca Alberto Leon-Garca School of Electrcal and Computer Engneerng

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems Schedulablty Bound of Weghted Round Robn Schedulers for Hard Real-Tme Systems Janja Wu, Jyh-Charn Lu, and We Zhao Department of Computer Scence, Texas A&M Unversty {janjaw, lu, zhao}@cs.tamu.edu Abstract

More information

Complex Service Provisioning in Collaborative Cloud Markets

Complex Service Provisioning in Collaborative Cloud Markets Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European

More information

One-Shot Games for Spectrum Sharing among Co-Located Radio Access Networks

One-Shot Games for Spectrum Sharing among Co-Located Radio Access Networks One-Shot Games for Spectrum Sharng among Co-Located Rado Access etwors Sofonas Halu, Alexs A. Dowhuszo, Olav Tronen and Lu We Department of Communcatons and etworng, Aalto Unversty, P.O. Box 3000, FI-00076

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME, ISSUE, FEBRUARY ISSN 77-866 Logcal Development Of Vogel s Approxmaton Method (LD- An Approach To Fnd Basc Feasble Soluton Of Transportaton

More information

Priv-Code: Preserving Privacy Against Traffic Analysis through Network Coding for Multihop Wireless Networks

Priv-Code: Preserving Privacy Against Traffic Analysis through Network Coding for Multihop Wireless Networks Prv-Code: Preservng Prvacy Aganst Traffc Analyss through Networ Codng for Multhop Wreless Networs Zhguo Wan, Ka Xng, Yunhao Lu MOE Key Lab for Informaton System Securty, School of Software, Tsnghua Natonal

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks 2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

Online Auctions in IaaS Clouds: Welfare and Profit Maximization with Server Costs

Online Auctions in IaaS Clouds: Welfare and Profit Maximization with Server Costs Onlne Auctons n IaaS Clouds: Welfare and roft Maxmzaton wth Server Costs aox Zhang Dept. of Computer Scence The Unvety of Hong Kong xxzhang@cs.hku.hk Zongpeng L Dept. of Computer Scence Unvety of Calgary

More information

Wireless Inter-Session Network Coding - An Approach Using Virtual Multicasts

Wireless Inter-Session Network Coding - An Approach Using Virtual Multicasts Wreless Inter-Sesson Network Codng - An Approach Usng Vrtual Multcasts Mchael Hendlmaer,DesmondS.Lun,DanalTraskov,andMurelMédard Insttute for Communcatons Engneerng CCIB RLE Technsche Unverstät München

More information