QoS-Aware Spectrum Sharing in Cognitive Wireless Networks
|
|
- Sylvia Knight
- 7 years ago
- Views:
Transcription
1 QoS-Aware Spectrum Sharng n Cogntve reless Networks Long Le and Ekram Hossan Abstract e consder QoS-aware spectrum sharng n cogntve wreless networks where secondary users are allowed to access the spectrum owned by a prmary network provder. The nterference from secondary users to prmary users s constraned to be below the tolerable lmt. Also, sgnal to nterference plus nose rato (SINR) of each secondary user s mantaned hgher than a desred level for QoS nsurance. hen network load s hgh, admsson control needs to be performed to satsfy both QoS and nterference constrants. e propose an admsson control algorthm whch s performed jontly wth power control such that QoS requrements of all admtted secondary users are satsfed whle keepng the nterference to prmary users below the tolerable lmt. hen all secondary users can be supported at mnmum rates, we allow them to ncrease ther transmsson rates and share the spectrum n a far manner. e formulate the jont power/rate allocaton wth max-mn farness crteron as an optmzaton problem. e show how to transform t nto a convex optmzaton problem so that ts globally optmal soluton can be obtaned. Numercal results show that the proposed admsson control algorthm acheves performance very close to the optmal soluton. Also, mpacts of dfferent system and QoS parameters on the network performance are nvestgated for both admsson control and rate/power allocaton problems. I. INTRODUCTION Implementaton of emergng hgh-speed wreless applcatons requres exponental growth n spectrum demand. However, t has been reported that current utlzaton of allocated spectrum can be as low as 15 % [1]. Thus, there s an ncreasng nterest n developng effcent method for spectrum management and sharng whch s encouraged by both ndustry and FCC authorty [2]. Ths motvates to explot the spectrum opportuntes n space, tme, frequency whle protectng users of the prmary network owner from excessve nterference due to opportunstc spectrum access [3]. In fact, t s requred that an nterference lmt correspondng to an nterference temperature level be mantaned at the recevng ponts of the prmary network. The key challenge n cogntve rado networks s how to construct spectrum access/sharng schemes such that users of the prmary network (wll be called prmary users n the sequel) are protected from excessve nterference due to secondary spectrum access and QoS performance of secondary users are guaranteed. A graph-theoretc model for spectrum sharng/access among secondary users was proposed n [4] where dfferent objectve functons were nvestgated. The formulaton of channel allocaton problem usng game theory was proposed n [5]. In ths work, the proposed utlty functons capture the nterference perceved by one user on each channel and/or the nter- Long Le and Ekram Hossan are wth the Department of Electrcal and Computer Engneerng, Unversty of Mantoba, nnpeg, MB, Canada. E-mal: {long, ekram}@ee.umantoba.ca. ference ths user creates for neghborng ones. However, prmary users were not explctly protected from nterference due to spectrum access of secondary users. In [6], heurstc-based channel and power allocaton algorthm was proposed where nterference constrant for prmary users was consdered. In ths paper, we present a spectrum sharng framework for cogntve CDMA wreless networks wth explct nterference protecton for prmary users and QoS constrants for secondary users. Secondary users have mnmum transmsson rates wth requred QoS performance n terms of SINR (or equvalent bt error rate (BER)) and maxmum power constrants. hen the network load s hgh, an admsson control algorthm s proposed to guarantee QoS constrants for secondary users and nterference constrants for prmary users. hen all secondary users can be supported, we present a jont rate and power allocaton soluton wth QoS and nterference constrants. The rest of ths paper s organzed as follows. System models and problem defnton are presented n Secton II. Admsson control algorthm for spectrum access of secondary users s proposed n Secton III. The power/rate allocaton formulaton s presented n Secton IV. Numercal results are presented n Secton V. Secton VI concludes the paper. II. SYSTEM MODELS AND PROBLEM DEFINITION e consder the spectrum sharng problem among unlcensed users (secondary users) and lcensed users (prmary users). The problem consdered n ths paper apples to both centralzed networks (e.g., cellular networks) and dstrbuted networks (e.g., ad hoc and sensor networks). For ease of presentaton, we wll dscuss dfferent problem aspects n the context of centralzed settng most of the tme. e assume that there are a number of prmary and secondary users communcatng wth ther partners smultaneously. Here, the term user wll be used broadly where t can be a moble node or base staton/access pont n centralzed networks or smply a moble node n ad hoc networks. The CDMA technology wll be assumed although the model can be extended for other technologes as well. Smultaneous communcatons among users (.e., both prmary and secondary users) wll nterfere wth each other. The enttes we wll work wth are communcaton lnks each of whch s a par of users communcatng wth each other. e wll refer to communcaton lnks belongng to secondary networks as secondary lnks. e wll also consder the nterference constrants at the recevng nodes of prmary networks whch wll be referred to as prmary recevng ponts n the sequel. e assume that each prmary recevng pont can tolerate a maxmum nterference level. Also, secondary lnks have desred QoS performance n terms of BER. Fg. 1 llustrates the transmsson settng consdered n ths paper. One possble example for the 3563
2 where total nterference at the prmary recevng pont j should be smaller the tolerable lmt. e wll assume that transmsson rate of secondary lnk can be adjusted n an allowable range wth mnmum and maxmum values are R mn and R max, respectvely. Also, power of secondary lnk s constraned to be smaller than the maxmum lmt P max. Fg. 1. Secondary users Prmary users Communcaton lnk Interference to prmary user Spectrum sharng among prmary and secondary users. nvestgated network settng s where prmary users communcate wth ther BS n the uplnk drecton n a cellular network and secondary users communcate wth each other n an ad hoc mode. Here, the total nterference that secondary lnks create at each BS of the prmary network should be smaller that the tolerable level. A. QoS and Interference Constrant Modelng Assume that there are M prmary recevng ponts and N secondary communcaton lnks n the consdered geographcal area. Let us denote the channel gan from the transmttng node of secondary lnk to recevng node of secondary lnk j by j, whle the channel gan from the transmttng node of secondary lnk to prmary recevng pont j as j,. If N denotes the total nose and nterference at the recevng sde of secondary lnk, for wreless access based on CDMA, the correspondng effectve bt-energy-to-nose spectral densty rato can be wrtten as [9] µ = R P N j=1,j = g(s) P j + N (1) where s the spectrum bandwdth, R s the transmsson rate of secondary lnk. Here, /R s the processng gan whch s usually requred to be larger than a partcular value. The processng gan s smply equal to one for other multple access technologes such as FDMA and µ denotes the SINR. In the sequel, we wll abuse a bt by referrng µ as SINR n all cases. Now, f a partcular modulaton scheme s employed, there wll be an explct relaton between BER and SINR. Thus, for a specfc requred BER level of secondary lnk, µ s requred to be larger than a correspondng value γ. Hence, the QoS requrement for secondary lnk can be expressed as µ γ, =1, 2,,N. (2) Now, let T j be the maxmum nterference level tolerable by prmary recevng pont j. The nterference constrant for prmary recevng pont j can be wrtten as =1 j, P T j, j =1, 2,,M (3) B. Admsson Control Problem Here, we are nterested n the scenaro where a number of secondary lnks wsh to access the spectrum wth mnmum transmsson rate (.e., R = R mn ) and both the QoS requrements (n (2)) as well as the nterference constrants (n (3)) need to be satsfed. The problem s how to choose the subset of requestng lnks wth maxmum sze such that the constrants n (2) and (3) are both satsfed. C. Jont Rate and Power Allocaton Problem hen the network load s low, all requestng secondary lnks wth mnmum transmsson rates can be supported whle satsfyng both QoS and nterference constrants n (2), (3). If t s the case, secondary lnks would ncrease ther transmsson rates above the mnmum values and share the spectrum n a far manner. For farness ssue, we adopt the max-mn crteron whch ams to maxmze the transmsson rate of the secondary lnk wth a mnmum transmsson rate. e wll arrange power, rate and other quanttes of all secondary lnks nto the correspondng vectors for notatonal convenence. For example, P wll denote a column vector whose element P s the transmsson power of secondary lnk. The jont rate and power allocaton problem can be stated as maxmze {mn R } R mn R R max (4) P P max, and the constrants n (2), (3). e wll show how to solve both admsson control problem as well as jont rate and power allocaton problem n the followng sectons. III. ADMISSION CONTROL ALGORITHM As has been mentoned n Secton II, we wll consder the admsson control problem when the network load s hgh and all secondary lnks transmt wth ther mnmum rate (f admtted). Now, usng equaton (1), we can rewrte the QoS constrant n (2) as follows: P j=1,j = γ R mn P j + γr mn N, =1, 2,,N. (5) The constrants for all secondary lnks can be wrtten n the matrx form as follows: (I F )P u (6) where I s an dentty matrx of order N N, u s a column vector whch can be wrtten as ( ) γ 1 R1 mn N 1 u = g, γ2r 2 mn N 2 (s) 1,1 g,, γnr N mn N N (s) 2,2 N,N 3564
3 where (.) denotes the matrx/vector transpose. And F s an N N matrx whose (, j)-th element s γ R mn F =, f j. 0, f = j A. Constraned Power Control Recall that we are nterested n the scenaro where not all N secondary lnks can be admtted nto the network whle satsfyng both QoS and nterference constrants stated n (2), (3). e wll frst focus on the power allocaton problem under maxmum power constrant (.e., P P max ) and QoS constrants and gnore the nterference constrants for a whle. In [8], the authors proposed an effcent teratve power control algorthm whch can be mplemented dstrbutvely. Specfcally, let P (t) and P (t+ t) be the power levels of secondary lnk after two consecutve power updates at tme nstants t and t+ t, respectvely. The power of secondary lnk s updated as follows: { P (t + t) =mn P max,p (t) γ } (7) µ (t) where µ (t) s the nstantaneous SINR at the recevng sde of secondary lnk at tme nstant t whch can be wrtten as µ (t) = P (t) R N j=1,j = g(s) P j(t)+n It was shown n [8] that ths power control algorthm converges to the fxed pont soluton of P = mn {P max,fp + u} (8) whch wll be referred to as statonary power vector. Let Ω be the set of secondary lnks and P Ω be the statonary power vector when the power algorthm wth the rule as n (7) s run wth secondary lnk set Ω. From the results of [7], we have the followng facts: Fact 1: If all secondary lnks n Ω can be supported (.e., the power control algorthm n (7) results n a statonary power vector P Ω satsfyng QoS constrants n (2)), the QoS constrants wll be satsfed wth equalty. Fact 2: If a subset Ω 0 Ω s the set of secondary lnks whch are not supported wth statonary power vector P Ω, then P Ω = P max for Ω 0. Now, let us defne the followng nterference measures : α (P Ω ) = P Ω j, + N g(s) P Ω (9) γ R j=1,j = β (P Ω ) = j=1,j = P Ω j + N g(s) γ R P Ω (10) D Ω (P Ω ) = Ω β (P Ω ). (11) e can easly see that D Ω (P Ω )= β (P Ω )= α (P Ω ). (12) Ω Ω e can also see that f the QoS constrant for secondary lnk s satsfed wth equalty, then β (P Ω )=0. Also, D Ω (P Ω )=0 f and only f all secondary lnks n Ω are supported. In general, we have β (P Ω ) 0 and the value of β (P Ω ) reflects the degree n whch the QoS constrant for secondary lnk s volated. Also, t s ntutve that α (P Ω ) quantfes the aggregate relatve nterference that secondary lnk creates for other lnks n Ω. In [7], the authors proposed several removal algorthms whch am at maxmzng the number of lnks whch can be admtted nto the network whle satsfyng the QoS requrements. Among these proposed algorthms, SMIRA and SMART(R) are the two most effcent ones. e have observed through smulaton that these two algorthms acheve very close performance; therefore, we wll only descrbe the SMIRA algorthm here. Note that the nterference measures defned n (9)-(11) are not the same wth those n [7]. However, the sprt of the SMIRA algorthm remans the same n ths paper. In fact, SMIRA algorthm runs the power control algorthm n (7) and removes lnks from the network one by one and untl the remanng set of lnks can be supported. The removal crteron of SMIRA s as follows: = argmax Ω { max ( α (P Ω ),β (P Ω ) )}. (13) Intutvely, SMIRA algorthm removes the lnk whch volates QoS constrants the most and/or creates the largest amount of nterference to other lnks n each step. Thus, t can potentally remove the least number of lnks from the network. B. Admsson Control wth QoS and Interference Constrants In our spectrum sharng problem, besdes QoS constrant, admsson and power control should be done such that nterference constrants for prmary lnks stated n (3) are also satsfed. e have the followng result on the complexty of ths admsson control problem. Proposton 1: The admsson control problem wth QoS and nterference constrants s NP-hard. Proof: It was shown n [7] that the admsson control wth only QoS constrants s NP-hard. Because the admsson control wth QoS constrants s a specal case of that wth both QoS and nterference constrants (they become the same when I j for j =1,,M). Therefore, our nvestgated admsson control problem s also NP-hard. Because of the complexty of the problem, we propose a lowcomplexty admsson control algorthm s ths sub-secton. The proposed algorthm also removes the worst lnk one-by-one. In each step, we perform the power control algorthm as n (7) and remove one lnk untl the remanng set satsfes both QoS and nterference constrants. Here, the key ssue s to construct a removal crteron whch acheves good overall performance. Because there are two dfferent knds of constrants, we consder the followng cases n each removal step. Case 1: Interference constrants for all prmary recevng ponts stated n (3) are satsfed but QoS constrants n (2) are volated In ths case, we employ the SMIRA algorthm as presented n Secton III.A. 3565
4 Case 2: Interference constrants for prmary recevng ponts stated n (3) are volated Note that ths case covers both scenaros where QoS constrants n (2) are volated or not. In ths case, we would remove the lnk whch volates both QoS and nterference constrants the most n each step. Now, we defne the measure whch quantfes degree of volaton at prmary recevng pont j as follows: η j (Ω) = T j =1 j, P Ω. (14) e propose a removal algorthm wth the followng removal metrc M η j (Ω) = argmax Ω D Ω (P Ω )+ M k=1 η k(ω) g(p) j, P Ω j=1 D Ω (P Ω ) + D Ω (P Ω )+ M k=1 η k(ω) max j, P Ω, j Ω,j = g(s) j Ω,j = j Ω,j = P Ω j In fact, j, P Ω denotes the total nterference that secondary lnk creates to other secondary lnks whle j Ω,j = g(s) P j Ω s the total nterference receved at the recevng end of lnk. In addton, j, P Ω denotes the nterference that secondary lnk creates for prmary recevng pont j. Recall that D Ω (P Ω ) quantfes the degree of volaton for QoS constrants and η j (Ω) quantfes the degree of volaton for the nterference constrant of prmary recevng pont j. Therefore, the proposed crteron removes n each step the secondary lnk whch creates the largest amount of nterference for prmary recevng ponts and other secondary lnks n the weghted average sense. As a result, t would potentally remove the least number of secondary lnks from the network. e wll refer to ths algorthm as nterference-aware SMIRA (I-SMIRA) n the sequel. The computaton complexty of I-SMIRA s just O(N 2 ) whch s qute acceptable. IV. JOINT RATE AND POER ALLOCATION OPTIMIZATION hen the network load s low, all secondary lnks can be admtted nto the network and they would ncrease ther transmsson rates above the mnmum values. In essence, we wsh to solve the optmzaton problem stated n (4). The decson varables are transmsson rates R and powers P. e wll show how to transform ths problem nto a convex optmzaton problem where globally optmal soluton can be obtaned. e would lke to note that the jont rate and power allocaton for cellular CDMA networks has been an actve research topcs over the last several years. e refer the readers to [9] and references theren for exstng lterature on the problem. However, the work n [9] s one of the frst papers whch adapt the problem to the ad hoc network settng. Here, the objectve s to mnmze the maxmum servce tme on dfferent transmsson lnks. In ths paper, we proceed one step further by solvng the jont rate and power allocaton problem n the spectrum sharng context where nterference constrants for prmary recevng ponts are taken nto account. Now, the objectve functon n (4) s equvalent to mnmze {max 1/R }. By ntroducng a new varable t and wrtng down all the constrants explctly, the optmzaton problem (4) s equvalent to mnmze t 1/R t, =1, 2,,N R P P N γ, =1, 2,,N. j=1,j = g(s) Pj+N N =1 g(p) j, P T j, j =1, 2,,M R mn R R max, =1, 2,,N P P max, =1, 2,,N (15) The optmzaton problem n (15) s not convex. However, we can transform t nto a geometrc program whch can be solved effcently (chapter 4, [10]). Now, we show how to transform the optmzaton problem (15) nto a geometrc program whch can be transformed nto a convex optmzaton problem. Specfcally, optmzaton problem n (15) s equvalent to mnmze t t 1 R 1 1, =1, 2,,N R P 1 N j=1,j = g(s) γ N j, =1 R mn R 1 (R max (P max P j + γn R P 1 1, =1, 2,,N T j P 1, j =1, 2,,M 1, =1, 2,,N ) 1 R 1, =1, 2,,N ) 1 P 1, =1, 2,,N (16) Now, defnng P = e x, R = e y and t = e s, substtutng these new varables nto (16), and takng ln n both the objectve and the constrant functons, we acheve a convex optmzaton problem whch can be solved by the standard nteror pont algorthm [10]. e have the followng property on the soluton of jont rate and power allocaton problem. Proposton 2: The optmal soluton of the jont rate and power allocaton problem satsfes R = R j,, j. Proof: Ths can be proved by contradcton followng a procedure smlar to the one for proposton 3 n [9]. Hence, the rate and power allocaton problem acheves perfectly far rate for all secondary lnks n the sense that optmal transmsson rates for all lnks are the same. V. NUMERICAL RESULTS e present the numercal results for a smple network settng as shown n Fg. 1. Assume that prmary users communcate wth ts BS n the uplnk drecton (.e., a sngle cell s consdered). Transmttng nodes of secondary lnks are randomly located n a rectangular area and the BS of the prmary network s located at the center of the rectangular area. The sze of the rectangular area s 2000m 2000m. Also, recevng node of each secondary lnk s generated randomly n a 1000m 1000m rectangle wth ts transmttng node beng at the center
5 Number of addmtted lnks N = 5 N = 7 Optmal Removal 3.5 I SMIRA SMIRA Desred SINR (db) Fg. 2. Average number of accepted lnks versus desred SINR (for I = 5N 0 ). The channel gans are modeled as = K 0.µ (p).(d(p) ) 4, where d (s) = K 0.µ (s).(d(s) ) 4, are the corre- and d(p) spondng dstances, µ (s) and µ(p) are random Gaussan varables wth zero mean and standard devaton equal 6 db, K 0 = 10 3 whch captures system and transmsson effects such as antenna gan, carrer frequency, etc. The total nose and nterference at the recevng node of all secondary lnks s chosen to be N = N 0 = The maxmum transmsson power on secondary lnks s P max = 0.1. The spectrum bandwdth s = 5.12 MHz. e wll denote the tolerable nterference lmt at the prmary recevng pont (.e., BS) as I. The mnmum transmsson rate on secondary lnks s R mn = 64 Kbps and maxmum transmsson rate s R max = /PG where PG s the mnmum processng gan. For each smulaton run, the locatons of secondary lnks (.e., transmttng and recevng nodes) are generated randomly. The measure of nterest s obtaned by averagng over 10 3 smulaton runs. The average number of accepted lnk versus the desred SINR for each secondary lnk (.e., γ ) s shown n Fg. 2 for SMIRA, I-SMIRA algorthms and optmal removal. The result for optmal removal s obtaned by an exhaustve search wth the least number of removed lnks. As s evdent from ths fgure, the performance of I-SMIRA algorthm s very close to that of optmal removal. Also, I-SMIRA algorthm acheves much hgher performance than SMIRA algorthm. Ths s due to the fact that I-SMIRA captures both QoS and nterference constrants whle SMIRA only takes care of the QoS constrants. Note that I-SMIRA algorthm has much lower computatonal complexty than the optmal removal. In addton, the number of accepted lnks decreases wth the desred SINR. Ths s because a smaller number of lnks should be accepted to keep the congeston level low enough so that hgher desred SINR can be acheved. In Fg. 3, we show the total throughput versus the mnmum processng gan for dfferent sets of constrants. As expected, the more strngent the QoS and nterference constrants are, the lower the total throughput that can be acheved. Also, when the mnmum processng gan ncreases, the throughput gap between these two curves n Fg. 3 becomes smaller. In fact, when the mnmum processng gan ncreases, the maxmum transmsson rate decreases (because R max Total throughput (Kbps) Fg. 3. N=5) = /PG). Thus, when SINR = 10dB, I = 20N 0 SINR = 15dB, I = 5N Mnmum processng gan Throughput per secondary lnk versus mnmum processng gan (for the mnmum processng gan s hgh enough (e.g., close to 40), the throughput s more lmted by the maxmum transmsson rate so the mpacts of QoS and nterference constrants dmnsh. VI. CONCLUSIONS e have presented a soluton approach to the spectrum sharng problem n cogntve wreless networks. In partcular, an admsson control algorthm has been proposed whch ams to remove the least number of secondary lnks so that both QoS constrants n terms of desred SINR for accepted lnks and nterference constrants for prmary lnks are satsfed. e have also formulated the jont rate and power allocaton problem for the secondary lnks as an optmzaton problem wth both QoS and nterference constrants. Numercal results shown the superor performance of the proposed admsson control algorthm. Also, several nterestng mpacts of system, QoS and nterference constrant parameters on network performance were nvestgated and dscussed. REFERENCES [1] FCC. Spectrum polcy task force report, FCC Nov [2] FCC. Facltatng opportuntes for flexble, effcent, and relable spectrum use employng cogntve rado technologes, notce of proposed rule makng and order, FCC Dec [3] Q. Zhao and B. M. Sadler, A survey of dynamc spectrum access: Sgnal processng, networkng, and regulatory polcy, IEEE Sgnal Processng Mag., to appear. [4] H. Zheng and C. Peng, Collaboratve and farness n opportunstc spectrum access, n Proc. IEEE ICC 05. [5] N. Ne and C. Comancu, Adaptve channel allocaton spectrum etquette for cogntve rado networks, n Proc. IEEE DySPAN 05. [6] A. T. Hoang and Y. -C. Lang, A two-phase channel and power allocaton scheme for cogntve rado networks, n Proc. IEEE PIMRC 06. [7] M. Andersn, Z. Rosberg, and J. Zander, Gradual removals n cellular PCS wth constraned power control and nose, ACM/Baltzer reless Networks J., vol. 2, no. 1, pp , [8] S. A. Grandh and J. Zander, Constraned power control, reless Personal Commun., vol. 1, no. 4, [9] A. Muqattash, M. Krunz, and T. Shu, Performance enhancement of adaptve orthogonal modulaton n wreless CDMA systems, IEEE J. Sel. Areas Commun., vol. 24, no. 3, pp , Mar [10] S. Boyd and L. Vandenberge, Convex Optmzaton, Cambrdge Unversty Press,
INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
More informationDownlink Power Allocation for Multi-class. Wireless Systems
Downlnk Power Allocaton for Mult-class 1 Wreless Systems Jang-Won Lee, Rav R. Mazumdar, and Ness B. Shroff School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette, IN 47907, USA {lee46,
More informationAN optimization problem to maximize the up-link
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 57, NO. 8, AUGUST 29 2225 Power and Rate Control wth Outage Constrants n CDMA Wreless Networks C. Fschone, M. Butuss, K. H. Johansson, and M. D Angelo Abstract
More informationPAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
More informationSupport Vector Machines
Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.
More informationEnabling P2P One-view Multi-party Video Conferencing
Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationHow To Improve Delay Throughput In Wireless Networks With Multipath Routing And Channel Codeing
Delay-Throughput Enhancement n Wreless Networs wth Mult-path Routng and Channel Codng Kevan Ronas, Student Member, IEEE, Amr-Hamed Mohsenan-Rad, Member, IEEE, Vncent W.S. Wong, Senor Member, IEEE, Sathsh
More informationStochastic Games on a Multiple Access Channel
Stochastc Games on a Multple Access Channel Prashant N and Vnod Sharma Department of Electrcal Communcaton Engneerng Indan Insttute of Scence, Bangalore 560012, Inda Emal: prashant2406@gmal.com, vnod@ece.sc.ernet.n
More informationA User-Centric Approach for Dynamic Resource Allocation in CDMA systems based on Hopfield Neural Networks
A User-Centrc Approach for Dynamc esource Allocaton n CDA systems based on Hopfeld eural etworks. García. Agustí J. érez-omero Unverstat ompeu Fabra (UF) Unverstat oltècnca de Catalunya (UC) Barcelona
More informationCoordinated Denial-of-Service Attacks in IEEE 802.22 Networks
Coordnated Denal-of-Servce Attacks n IEEE 82.22 Networks Y Tan Department of ECE Stevens Insttute of Technology Hoboken, NJ Emal: ytan@stevens.edu Shamk Sengupta Department of Math. & Comp. Sc. John Jay
More informationROSA: Distributed Joint Routing and Dynamic Spectrum Allocation in Cognitive Radio Ad Hoc Networks
ROSA: Dstrbuted Jont Routng and Dynamc Spectrum Allocaton n Cogntve Rado Ad Hoc Networks Le Dng Tommaso Meloda Stella Batalama Mchael J. Medley Department of Electrcal Engneerng, State Unversty of New
More informationOn the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
More information"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
More informationEnergy Efficient Routing in Ad Hoc Disaster Recovery Networks
Energy Effcent Routng n Ad Hoc Dsaster Recovery Networks Gl Zussman and Adran Segall Department of Electrcal Engneerng Technon Israel Insttute of Technology Hafa 32000, Israel {glz@tx, segall@ee}.technon.ac.l
More informationThe OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
More informationData Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
More informationHow To Solve An Onlne Control Polcy On A Vrtualzed Data Center
Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu
More informationThe Greedy Method. Introduction. 0/1 Knapsack Problem
The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton
More informationMinimum Energy Coding in CDMA Wireless Sensor Networks
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO., FEBRUARY 009 985 Mnmum Energy Codng n CDMA Wreless Sensor Networks C. Fschone, Member, IEEE, K. H. Johansson, Member, IEEE, A. Sangovann-Vncentell,
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationOne-Shot Games for Spectrum Sharing among Co-Located Radio Access Networks
One-Shot Games for Spectrum Sharng among Co-Located Rado Access etwors Sofonas Halu, Alexs A. Dowhuszo, Olav Tronen and Lu We Department of Communcatons and etworng, Aalto Unversty, P.O. Box 3000, FI-00076
More informationEfficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,
More informationM3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS
M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty
More information8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
More informationEconomic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks
Economc-Robust Transmsson Opportunty Aucton n Mult-hop Wreless Networks Mng L, Pan L, Mao Pan, and Jnyuan Sun Department of Electrcal and Computer Engneerng, Msssspp State Unversty, Msssspp State, MS 39762
More informationPerformance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
More informationOptimization of Resource Allocation in Wireless Systems Based on Game Theory
Internatonal Journal of Computer Scences and Engneerng Open Access Research Paper Volume-4, Issue-1 E-ISSN: 347-693 Optmzaton of Resource Allocaton n Wreless Systems Based on Game Theory Sara Rah 1*, Al
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationJoint Dynamic Radio Resource Allocation and Mobility Load Balancing in 3GPP LTE Multi-Cell Network
288 FENG LI, LINA GENG, SHIHUA ZHU, JOINT DYNAMIC RADIO RESOURCE ALLOCATION AND MOBILITY LOAD BALANCING Jont Dynamc Rado Resource Allocaton and Moblty Load Balancng n 3GPP LTE Mult-Cell Networ Feng LI,
More information1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
More informationA generalized hierarchical fair service curve algorithm for high network utilization and link-sharing
Computer Networks 43 (2003) 669 694 www.elsever.com/locate/comnet A generalzed herarchcal far servce curve algorthm for hgh network utlzaton and lnk-sharng Khyun Pyun *, Junehwa Song, Heung-Kyu Lee Department
More informationResource Control for Elastic Traffic in CDMA Networks
Resource Control for Elastc Traffc n CDMA Networks Vaslos A. Srs Insttute of Computer Scence (ICS) Foundaton for Research and Technology - Hellas (FORTH) P.O. Box 1385, GR 711 1, Heraklon, Crete, Greece
More informationCooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing
Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationA New Paradigm for Load Balancing in Wireless Mesh Networks
A New Paradgm for Load Balancng n Wreless Mesh Networks Abstract: Obtanng maxmum throughput across a network or a mesh through optmal load balancng s known to be an NP-hard problem. Desgnng effcent load
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationA FRAMEWORK FOR EFFICIENT BANDWIDTH MANAGEMENT IN BROADBAND WIRELESS ACCESS SYSTEMS
A FRAMEWORK FOR EFFICIENT BANDWIDTH MANAGEMENT IN BROADBAND WIRELESS ACCESS SYSTEMS BY BADER S. AL-MANTHARI A thess submtted to the School of Computng n conformty wth the requrements for the degree of
More informationAN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION
The Medterranean Journal of Computers and Networks, Vol. 2, No. 1, 2006 57 AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION L. Bada 1,*, M. Zorz 2 1 Department of Engneerng,
More informationAvailability-Based Path Selection and Network Vulnerability Assessment
Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl
More informationPerformance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments
Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn
More informationA Lyapunov Optimization Approach to Repeated Stochastic Games
PROC. ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, OCT. 2013 1 A Lyapunov Optmzaton Approach to Repeated Stochastc Games Mchael J. Neely Unversty of Southern Calforna http://www-bcf.usc.edu/
More informationANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,
More informationAn MILP model for planning of batch plants operating in a campaign-mode
An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN yfumero@santafe-concet.gov.ar Gabrela Corsano Insttuto de Desarrollo y Dseño
More information行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告
行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 畫 類 別 : 個 別 型 計 畫 半 導 體 產 業 大 型 廠 房 之 設 施 規 劃 計 畫 編 號 :NSC 96-2628-E-009-026-MY3 執 行 期 間 : 2007 年 8 月 1 日 至 2010 年 7 月 31 日 計 畫 主 持 人 : 巫 木 誠 共 同
More informationAn Intelligent Policy System for Channel Allocation of Information Appliance
Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department
More informationVoIP over Multiple IEEE 802.11 Wireless LANs
SUBMITTED TO IEEE TRANSACTIONS ON MOBILE COMPUTING 1 VoIP over Multple IEEE 80.11 Wreless LANs An Chan, Graduate Student Member, IEEE, Soung Chang Lew, Senor Member, IEEE Abstract IEEE 80.11 WLAN has hgh
More informationMulti-Source Video Multicast in Peer-to-Peer Networks
ult-source Vdeo ultcast n Peer-to-Peer Networks Francsco de Asís López-Fuentes*, Eckehard Stenbach Technsche Unverstät ünchen Insttute of Communcaton Networks, eda Technology Group 80333 ünchen, Germany
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More informationHow To Improve Power Demand Response Of A Data Center Wth A Real Time Power Demand Control Program
Demand Response of Data Centers: A Real-tme Prcng Game between Utltes n Smart Grd Nguyen H. Tran, Shaole Ren, Zhu Han, Sung Man Jang, Seung Il Moon and Choong Seon Hong Department of Computer Engneerng,
More informationInstitute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
More informationAn Efficient Recovery Algorithm for Coverage Hole in WSNs
An Effcent Recover Algorthm for Coverage Hole n WSNs Song Ja 1,*, Wang Balng 1, Peng Xuan 1 School of Informaton an Electrcal Engneerng Harbn Insttute of Technolog at Weha, Shanong, Chna Automatc Test
More informationBERNSTEIN POLYNOMIALS
On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationJ. Parallel Distrib. Comput.
J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n
More informationSchedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems
Schedulablty Bound of Weghted Round Robn Schedulers for Hard Real-Tme Systems Janja Wu, Jyh-Charn Lu, and We Zhao Department of Computer Scence, Texas A&M Unversty {janjaw, lu, zhao}@cs.tamu.edu Abstract
More informationA Dynamic Load Balancing Algorithm in Heterogeneous Network
06 7th Internatonal Conference on Intellgent Systems Modellng and Smulaton A Dynamc Load Balancng Algorthm n Heterogeneous etwork Zhxong Dng Xngjun Wang and Wenmng Yang Shenzhen Key Lab of Informaton Securty
More informationv a 1 b 1 i, a 2 b 2 i,..., a n b n i.
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are
More informationDynamic Pricing for Smart Grid with Reinforcement Learning
Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,
More informationWhen Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services
When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu
More informationAn RFID Distance Bounding Protocol
An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not
More informationdenote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node
Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate
More informationHow To Plan A Network Wide Load Balancing Route For A Network Wde Network (Network)
Network-Wde Load Balancng Routng Wth Performance Guarantees Kartk Gopalan Tz-cker Chueh Yow-Jan Ln Florda State Unversty Stony Brook Unversty Telcorda Research kartk@cs.fsu.edu chueh@cs.sunysb.edu yjln@research.telcorda.com
More informationHow Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence
1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh
More informationAnswer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy
4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.
More informationJoint Scheduling of Processing and Shuffle Phases in MapReduce Systems
Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent
More informationDownlink Scheduling and Resource Allocation for OFDM Systems
288 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 1, JANUARY 2009 Downlnk Schedulng and Resource Allocaton for OFDM Systems Janwe Huang, Member, IEEE, Vjay G. Subramanan, Member, IEEE, Rajeev
More informationNMT EE 589 & UNM ME 482/582 ROBOT ENGINEERING. Dr. Stephen Bruder NMT EE 589 & UNM ME 482/582
NMT EE 589 & UNM ME 482/582 ROBOT ENGINEERING Dr. Stephen Bruder NMT EE 589 & UNM ME 482/582 7. Root Dynamcs 7.2 Intro to Root Dynamcs We now look at the forces requred to cause moton of the root.e. dynamcs!!
More informationEfficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing
Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of
More informationPower-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
More informationQoS-based Scheduling of Workflow Applications on Service Grids
QoS-based Schedulng of Workflow Applcatons on Servce Grds Ja Yu, Rakumar Buyya and Chen Khong Tham Grd Computng and Dstrbuted System Laboratory Dept. of Computer Scence and Software Engneerng The Unversty
More informationOn File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network
On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg
More informationOn the Interaction between Load Balancing and Speed Scaling
On the Interacton between Load Balancng and Speed Scalng Ljun Chen and Na L Abstract Speed scalng has been wdely adopted n computer and communcaton systems, n partcular, to reduce energy consumpton. An
More informationBlind Estimation of Transmit Power in Wireless Networks
Bln Estmaton of Transmt Power n Wreless Networks Murtaza Zafer (IBM Research), Bongjun Ko (IBM Research), Chatschk Bskan (IBM Research) an Ivan Ho (Imperal College, UK) Transmt-power Estmaton: Problem
More informationHeuristic Static Load-Balancing Algorithm Applied to CESM
Heurstc Statc Load-Balancng Algorthm Appled to CESM 1 Yur Alexeev, 1 Sher Mckelson, 1 Sven Leyffer, 1 Robert Jacob, 2 Anthony Crag 1 Argonne Natonal Laboratory, 9700 S. Cass Avenue, Argonne, IL 60439,
More informationMinimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
More informationDevice-to-Device (D2D) Communication in Cellular Network - Performance Analysis of Optimum and Practical Communication Mode Selection
Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subect matter experts for publcaton n the WCNC 2010 proceedngs. Devce-to-Devce (D2D) Communcaton n Cellular Network - Performance
More informationSPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background:
SPEE Recommended Evaluaton Practce #6 efnton of eclne Curve Parameters Background: The producton hstores of ol and gas wells can be analyzed to estmate reserves and future ol and gas producton rates and
More informationUTILIZING MATPOWER IN OPTIMAL POWER FLOW
UTILIZING MATPOWER IN OPTIMAL POWER FLOW Tarje Krstansen Department of Electrcal Power Engneerng Norwegan Unversty of Scence and Technology Trondhem, Norway Tarje.Krstansen@elkraft.ntnu.no Abstract Ths
More informationNetwork Services Definition and Deployment in a Differentiated Services Architecture
etwork Servces Defnton and Deployment n a Dfferentated Servces Archtecture E. kolouzou, S. Manats, P. Sampatakos,. Tsetsekas, I. S. Veners atonal Techncal Unversty of Athens, Department of Electrcal and
More informationTHE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek
HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo
More informationMAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11
Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 MAC Layer Servce Tme Dstrbuton of a Fxed Prorty Real Tme Scheduler over 80. Inès El Korb Ecole Natonale des Scences de
More informationAllocating Collaborative Profit in Less-than-Truckload Carrier Alliance
J. Servce Scence & Management, 2010, 3: 143-149 do:10.4236/jssm.2010.31018 Publshed Onlne March 2010 (http://www.scrp.org/journal/jssm) 143 Allocatng Collaboratve Proft n Less-than-Truckload Carrer Allance
More informationMaster s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks
Master s Thess Ttle Confgurng robust vrtual wreless sensor networks for Internet of Thngs nspred by bran functonal networks Supervsor Professor Masayuk Murata Author Shnya Toyonaga February 10th, 2014
More information8 Algorithm for Binary Searching in Trees
8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the
More informationAn Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems
STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part
More informationResearch Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization
Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy
More informationPricing Internet Access for Disloyal Users: A Game-Theoretic Analysis
Prcng Internet Access for Dsloyal Users: A Game-Theoretc Analyss Gergely Bczók, Sándor Kardos and Tuan Anh Trnh Hgh Speed Networks Lab, Dept. of Telecommuncatons & Meda Informatcs Budapest Unversty of
More informationOPTIMAL INVESTMENT POLICIES FOR THE HORSE RACE MODEL. Thomas S. Ferguson and C. Zachary Gilstein UCLA and Bell Communications May 1985, revised 2004
OPTIMAL INVESTMENT POLICIES FOR THE HORSE RACE MODEL Thomas S. Ferguson and C. Zachary Glsten UCLA and Bell Communcatons May 985, revsed 2004 Abstract. Optmal nvestment polces for maxmzng the expected
More informationTraffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,
More informationA Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
More informationTesting and Debugging Resource Allocation for Fault Detection and Removal Process
Internatonal Journal of New Computer Archtectures and ther Applcatons (IJNCAA) 4(4): 93-00 The Socety of Dgtal Informaton and Wreless Communcatons, 04 (ISSN: 0-9085) Testng and Debuggng Resource Allocaton
More informationEnergy Conserving Routing in Wireless Ad-hoc Networks
Energy Conservng Routng n Wreless Ad-hoc Networks Jae-Hwan Chang and Leandros Tassulas Department of Electrcal and Computer Engneerng & Insttute for Systems Research Unversty of Maryland at College ark
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationVOLTAGE stability issue remains a major concern in
Impacts of Mert Order Based Dspatch on Transfer Capablty and Statc Voltage Stablty Cuong P. guyen, Student Member, IEEE, and Alexander J. Flueck, Member, IEEE Abstract In ths paper, the goal s to nvestgate
More informationHow To Calculate The Accountng Perod Of Nequalty
Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.
More informationOptimal resource capacity management for stochastic networks
Submtted for publcaton. Optmal resource capacty management for stochastc networks A.B. Deker H. Mlton Stewart School of ISyE, Georga Insttute of Technology, Atlanta, GA 30332, ton.deker@sye.gatech.edu
More informationSlow Fading Channel Selection: A Restless Multi-Armed Bandit Formulation
Slow Fadng Channel Selecton: A Restless Mult-Armed Bandt Formulaton Konstantn Avrachenkov INRIA, Maestro Team BP95, 06902 Sopha Antpols, France Emal: k.avrachenkov@sopha.nra.fr Laura Cottatellucc, Lorenzo
More informationA Self-Organized, Fault-Tolerant and Scalable Replication Scheme for Cloud Storage
A Self-Organzed, Fault-Tolerant and Scalable Replcaton Scheme for Cloud Storage Ncolas Bonvn, Thanass G. Papaoannou and Karl Aberer School of Computer and Communcaton Scences École Polytechnque Fédérale
More information