Compact Routing on Internet-Like Graphs

Size: px
Start display at page:

Download "Compact Routing on Internet-Like Graphs"

Transcription

1 Compact Routing on Internet-Like Graphs Dmitri Krioukov Kevin Fall Intel Research, Berkeley Xiaowei Yang Massachusetts Institute of Technology Abstract The Thorup-Zwick (TZ) compact routing scheme is the first generic stretch-3 routing scheme elivering a nearly optimal per-noe memory upper boun. Using both irect analysis an simulation, we erive the stretch istribution of this routing scheme on Internet-like inter-omain topologies. By investigating the TZ scheme on ranom graphs with power-law noe egree istributions, P k k γ, we fin that the average TZ stretch is quite low an virtually inepenent of γ. In particular, for the Internet inter-omain graph with γ., the average TZ stretch is aroun., with up to 70% of all pairwise paths being stretch- (shortest possible). As the network grows, the average stretch slowly ecreases. We fin routing table sizes to be very small (aroun 50 recors for 0 4 -noe networks), well below their theoretical upper bouns. Furthermore, we fin that both the average shortest path length (i.e. istance) an with of the istance istribution σ observe in the real Internet inter- AS graph have values that are very close to the minimums of the average stretch in the - anσ-irections. This leas us to the iscovery of a unique critical point of the average TZ stretch as a function of an σ. The Internet s istance istribution is locate in a close neighborhoo of this point. This is remarkable given the fact that the Internet inter-omain topology has evolve without any irect attention pai to properties of the stretch istribution. It suggests the average stretch function may be an inirect inicator of the optimization criteria influencing the Internet s inter-omain topology evolution. Inex Terms Routing, Internet Topology, Simulations, Graph Theory, Combinatorics, Statistics. I. INTRODUCTION The question as to what rives the evolutionary process of the Internet s topology is of interest to many researchers. While various moels of its topological structure appear to escribe it reasonably well, most neither ai in unerstaning why the Internet s graph has evolve as it has, nor offer the metric which is effectively being optimize by its implementers as it grows. In aition, as the network grows, its global routing scalability is being stresse [], leaing several groups to explore alternatives to the present Internet routing system. We believe that a better unerstaning of the Internet s topological growth process, couple with knowlege of the theoretical unerpinnings of the routing problem on graphs, coul help in evaluating these proposals (or eveloping others). In particular, we are intereste in the performance of the most scalable theoretical routing algorithms on realistic topology graphs. To further investigate this relationship, we focus on the performance of compact routing schemes on scale-free graphs. Several authors are currently pursuing such moels, however. For one of the latest examples, see []. Compact routing schemes comprise a set of algorithms that aim to make a goo trae-off between stretch versus the amount of storage require at each vertex for routing tables. Stretch refers to the (usually worst-case) multiplicative factor increase of path length between a pair of vertices uner a particular routing scheme versus the length of the shortest existing path between the same pair. The most efficient stretch- 3 routing scheme for generic (arbitrary) graphs currently known is ue to Thorup-Zwick [3], which we will simply refer to as the TZ scheme. It is known to be optimal, up to a logarithmic factor, for per-noe memory utilization. We investigate the performance of the TZ scheme on scalefree graphs because these graphs represent our best current unerstaning of the Internet s inter-as topological structure. It is worth mentioning that although we base our analysis on properties of the real-worl Internet, we are not suggesting that the TZ scheme is ripe for use within the Internet to solve its scalability problems. Rather, we employ the TZ scheme as a tool to analyze the funamental limits for average stretch an routing table sizes on realistic graphs. The scheme is generic, so that it can be irectly applie to any graphs to scalefree graphs, in particular. As we are unaware of any routing schemes evelope specifically for scale-free graphs, we must turn to generic schemes to pursue our investigation. One might expect that for scale-free graphs, the majority of known generic routing schemes woul be very inefficient. Inee, many routing schemes (incluing the TZ scheme) incorporate locality by carefully ifferentiating between close an remote noes. This approach can make routing more efficient (in the stretch-versus-space trae-off sense, in particular) by keeping only approximate (non-shortest path) routing information for remote noes, while full (shortest path) routing information is kept for local noes. In scale-free graphs, with very low average istances an istance istribution withs, local noes comprise huge portions of all the noes in a network, so that one might suspect that locality-sensitive approaches might break for such networks. For a goo example emonstrating that this might be quite plausible, see the Appenix, where the stretch factor is foun to be very high for the Kleinrock-Kamoun (KK) routing scheme [4] applie to the scale-free networks. The choice of the KK scheme for such analysis is partially riven by the fact that many relatively recent routing architecture proposals [5], [6], aime at resolving the Internet routing scalability issues, have been base on the ieas of [4].

2 In analyzing the TZ scheme s performance for the Internet graph, however, we fin that the situation is quite opposite with respect to the KK schemes: the TZ scheme prouces extremely low average stretch values an succinct routing tables that turn out to be well below their theoretical upper bouns. A. Routing Backgroun The aim of compact routing schemes is to approach the optimal stretch- (shortest-path) routing but with significantly reuce memory requirements. It is shown in [7] that for any stretch- routing scheme, there exists a graph of size n an maximum noe egree, 3 <n, such that Ω(n log ) bits of memory are require at Θ(n) noes. Since the trivial upper boun for shortest path full-table routing is also O(n log ), this result effectively emonstrates incompressibility of generic shortest path routing. That is to say, if we must accommoate both graphs of arbitrary topology an with all paths being stretch-, we must be willing to have large routing tables. Although there are some results, [8], showing that the majority of graphs are better, very little can be sai conclusively regaring the practical implications of these results with respect to real-worl graphs. Thus, in orer to stuy compact routing on the Internet s graph, we must turn to the only existing tool we have for analyzing compact routing performance in all cases: generic routing schemes. Generic shortest path routing is incompressible, so if memory space is to be reuce, then the stretch must be increase. The memory space lower boun epenence on stretch is not continuous. As shown in [7], any generic routing scheme with stretch strictly less than.4 must use at least Ω(n log n) bits of memory on some noes of some graphs. In other wors, the lower boun for generic schemes with stretch s<.4 is the same as in the incompressible case of shortest path routing iscusse above (if one consiers graphs with = Θ(n)). Furthermore, as shown in [9], the lower boun for schemes with stretch strictly less than 3 is nearly the same as for shortest path routing Ω(n) bits of memory on some noes of some graphs. The minimum stretch factor that we must be prepare to accept in orer to significantly ecrease memory requirements below the incompressible limits is therefore 3. Cowen introuces a simple stretch-3 routing scheme with a local memory space upper boun of O(n /3 log 4/3 n) in [0]. Thorup an Zwick improve upon Cowen s result an eliver a per-noe space upper boun of O(n / log / n) in [3]. We call these two schemes the Cowen an TZ schemes, respectively. The local memory space upper boun provie by the TZ scheme is nearly optimal (up to a logarithmic factor) because, as emonstrate in [], any generic routing scheme with stretch strictly less than 5 must use at least Ω(n / ) bits of memory on some noes of some graphs. To the best of our knowlege, the TZ scheme is the only known generic stretch- 3 routing scheme elivering a nearly optimal local memory upper boun. For this reason, we use it as the basis for our analytic work an simulations below. They also show how to implement routing ecisions at constant time per noe. B. Scale-free networks Until fairly recently, most ranom graph analyses have been base on classical Erős-Réni ranom n-noe graphs [], which have links between every pair of vertices with the uniform probability p. The ensemble of such graphs is calle G n,p an their average vertex egree is k np.forlargen,the vertex egree probability istribution for these graphs is the quickly-ecaying Poisson istribution with an exponentially small number of high-egree noes, P k k k e k /k!, an average istance is log n/ log k [3]. These graphs are uncorrelate, 3 an their entire statistical properties can be erive from this vertex egree istribution. Almost all the networks observe in nature iffer rastically from the G n,p graphs. For our work, the most important ifference is an inconsistency between the average istance an average vertex egree preicte by the Erős-Réni moel for the Internet. In the real Internet inter-omain 000-noe graph, k 5.7 an 3.6 [4], while the G 000, graphs have 5.3. TheG n,p graphs of the same size with the right average istance 3.6 woul have to have the average egree k 4. The simultaneously small values of the average istance an average vertex egree in the Internet necessarily imply a larger portion of its noes are high-egree than in a comparably-size G n,p graph. In other wors, the vertex egree istribution must be fat-taile. The power-law istribution, P k k γ, one of such fat-taile istributions, is what has been observe in many real-worl networks, with the exponent γ ranging between an 3. For the Internet interomain graph, γ. [5], [4]. Both the G n,p graphs an graphs with fat-taile egree istributions are often sai to possess the small-worl property, [6], to emphasize that they have extremely low average istances (for networks of such size), even though average istances in G n,p graphs are only slightly higher. Networks with power-law egree istributions are also calle scale-free since their noe egree istribution lacks any characteristic scale, [7], in contrast to the G n,p graphs with the narrow Poisson egree istribution centere aroun the characteristic average value k np. The most popular moel for growing scale-free networks uses linear preferential attachment by Barabási an Albert (BA), [7]. The BA moel is very simple; it oes not have external parameters, an in its pure form, it preicts γ =3. The moel can be easily moifie to prouce other values of γ, but its ability to help explain the evolutionary processes influencing the growth of the Internet has been questione in [8], [9]. In particular, in [8], it is note that the BA moel an its erivatives are capable of reproucing what has been alreay measure but fail to preict correctly anything new about the Internet topology growth. 4 Construction of explanatory moels capturing elements of the actual factors 3 That is, vertex-vertex egree correlations are absent. 4 A goo example is the power-law ecay of the clustering coefficient. Moels reproucing this effect were constructe only after it ha been observe in real networks.

3 governing the Internet evolution is a hot topic of Internetrelate research these ays []. II. COMPACT ROUTING SCHEMES In this section, we briefly review the Cowen an TZ schemes an establish the terminology an notation we will require. Both schemes are very simple. They involve four separate components: the lanmark set (LS) construction proceure, routing table construction, labeling, an routing (message forwaring) function. The TZ scheme iffers from the Cowen scheme by improving only the LS construction proceure. Both schemes operate on any unirecte connecte graph G =(V,E) with positive ege weights. Let n = V be the graph size, δ(u, v) be the istance (in hops) between a pair of noes u, v V, L be the LS, L(v) be a lanmark noe closest to noe v V, an C(v) be v s cluster, efine for v V as the set of all noes c that are closer to v than to their closest lanmarks, C(v) = { c V } δ(c, v) <δ(c, L(c)). () Clusters are similar to Voronoi iagrams but they can intersect. If l L, then L(l) =l an C(l) = by efinition. If L is empty, then for v V, L(v) = an C(v) =V. The TZ LS construction algorithm iteratively selects lanmarks from the set of large-cluster noes T. At the first iteration, T = V an every noe t T is selecte to be a lanmark with a specific uniform probability q/n with q =(n/ log n) /. The expecte LS size after the first iteration is q. During subsequent iterations, T is reefine to be a set of noes that have clusters of size greater than a specific threshol q =4n/q, T = { t V } C(t) > q, () an aitional portions of lanmarks are selecte from T with a uniform probability q/ T. The iterations procee until T is empty. Every noe v V then calculates its outgoing port for the shortest path to every l L an every c C(v). This is the routing information that is store locally at v. As one can see, the essence of the LS construction proceure is the right balance between the LS an cluster sizes (or, effectively, between q an q). The cluster sizes are upper-boune by efinition (), an the involve part of the proof in [3] is to emonstrate that the algorithm terminates with a proper limit for the expecte LS size, which turns out to be q log n. This guarantees the overall local memory upper boun of O(n / log / n). The label of noe v (use as its estination aress in packet heaers) is then a triple of its ID, the ID of its closest lanmark L(v), an the local ID of the port at L(v) on the shortest path from L(v) to v. With these labels, routing of a packet estine to v at some (intermeiate) noe u occurs as follows: if v = u, one; if v L C(u), the outgoing port can be foun in the local routing table at u; ifu = L(v), the outgoing port is in the estination label in the packet; otherwise, the outgoing port for the packet is the outgoing port to L(v) the L(v) ID is in the label an the outgoing port for it can be foun in the local routing table. The emonstrations of correctness of the algorithm an that the maximum stretch is 3 are straightforwar ([0], [3]). III. ANALYTICAL RESULTS In this section, we provie analytical expressions for the TZ stretch istribution on a small-worl graph with a given istance istribution. To obtain our results we make a simplifying assumption: we consier only the first iteration of the TZ LS construction algorithm. There are two justifications making this assumption reasonable. First, as shown in [], the first iteration guarantees that the average cluster size is n/q; the subsequent iterations guarantee that all cluster sizes are no larger than 4n/q. Therefore, the error introuce by this assumption for the average stretch is small as we see in the next section. Seconly, we are concerne with small-worl graphs which have very short average istances an narrow istance istributions. Inee, if there are no long istances in a graph, then even after just the first iteration, the majority of clusters are small. For the rest of this section, we let q enote the actual size ofthels(q = L ) an D be the graph iameter (i.e. the maximum shortest path length in the graph). We also enote the istance p.m.f. an c..f. by f() an F (), respectively. With D being the graph iameter, {...D}. Let w an v be inepenently selecte ranom vertices from the ranom graph G =(V,E) corresponing to a source an estination noe, respectively. We introuce the following three ranom variables X, Y, an Z: X = δ(w, L(v)), p.m.f. p X (x), (3) Y = δ(v, L(v)), p.m.f. p Y (y), (4) Z = δ(w, v), p.m.f. p Z (z) =f(z). (5) These ranom variables correspon to the istances from some ranom noe w to the lanmark nearest another ranom noe v, the istance from that lanmark to v, an the actual shortest path between the two ranom noes. From these, we may construct another ranom variable, S, efine when w v to escribe the stretch value S = X + Y Z. (6) This expression for stretch is approximate for two reasons. First, it oes not account for stretch- paths to estinations in the local cluster of W. Secon, it oes not incorporate the shortcut effect. Recall that the Cowen routing algorithm is such that if estination v L an if a message on its way to L(v) passes some noe u v C(u), then the message never reaches L(v) but instea goes along the shortest path from u to v. To refine our approximation, we correct the above efinition of S to form S as follows: if Z<Y, if Z<X, S = S(X, Y, Z) = (7) if Z =0, X+Y Z otherwise.

4 Note that the first case on the r.h.s. of (7) accounts exactly for the stretch- paths to the estinations in the local cluster (cf. efinition ()), while the secon case accounts approximately for the shortcut effect as shown in []. With the above notations, the p.m.f. for the istance Y i between a ranom noe an its i th closest lanmark is very similar to the p..f. for orer statistics (see, for example, [0]). One can show (cf. []) that ( ) q p Yi () =i F () i f()( F ()) q i. (8) i The p.m.f. for the average istance to all lanmarks from a ranomly-selecte noe is p X () = q q p Yi (). (9) i= Since lanmarks are just q ranom noes, p X () is equivalent to f(), p X () =f() q = f(). q ( ) q i F () i ( F ()) q i i i= (0) Our problem now is to fin the p.m.f. p S (s) for the ranom variable S. If X, Y, an Z were inepenent an unconstraine then p S (s) woul be given by a simple sum over the joint istribution where p XY Z (x, y, z) =p X (x)p Y (y)p Z (z). They are not inepenent, however, because they are efine in equations (3)-(5) on the same ranom events. Furthermore, the form of their efinition results in the triangle inequality, X Y Z X + Y, () which causes some portions of the joint p.m.f to be zero. As such, the complete joint p.m.f. we require is erive in [] to be p XY Z (x, y, z) = p X(x)p Y (y)p Z (z)i t (x, y, z), () F (x + y) F ( x y ) where the enominator is positive an the triangle inicator function is efine as follows { if x y z x + y, I t (x, y, z) = (3) 0 otherwise. The intuition behin equation () is as follows. We are selecting three ranom noes on a graph. These noes form a triangle. The istance istribution of one of the triangle s sies p Y (y) is special (given by the LS construction proceure). The probability mass is therefore concentrate only in the feasible combinations of x, y an z (i.e. those for which the triangle inequality hols). The enominator normalizes the prouct to form a proper p.m.f. Using equation (), the stretch istribution p S (s) an the average stretch s are compute as follows: p S (s) = D D x= y= z= D p XY Z (x, y, z) S(x, y, z) =s (4) s = s p S (s) (5) s For the average stretch, the summation in equation (5) is over the finite set of rational stretch values s boune above by, as follows from equation (7). Equations (4) an (5) are our final analytical results that we require for the numerical evaluations of the next section. Of particular note is that the stretch istribution an average epen only on f() an q. IV. SIMULATION AND NUMERIC RESULTS We are now reay to substitute the Internet inter-as istance istribution into the analytical expressions of the previous section. Because the Internet is an evolving network, it contains vertex-vertex correlations [], an so to fully achieve our immeiate goal, we woul nee to know an analytic result for the istance istribution in correlate scale-free networks. Unfortunately, this problem has not yet been solve. 5 Surprisingly, the eterministic scale-free graph moel by Dorogovtsev, Goltsev, an Menes (the DGM moel) [4] analytically prouces the Gaussian istance istribution, which is very close to the istance istribution observe in the real Internet inter-omain graph []. Given this observation, we choose to parameterize istance istributions in small-worl graphs we consier in this section by Gaussian istributions. Using a iscrete form of the Gaussian istribution as the istance p.m.f. f() from the previous section transforms equations (4) an (5) into expressions that cannot be evaluate analytically, so that we retreat to numeric evaluations with f() taken to be an explicitly normalize Gaussian, ( ) f() =ce σ, (6) where c is s.t. D = f() =, an an σ are respectively the average istance an the with (stanar eviation) of the istance istribution. Distributions p X (x) an p Y (y) are also explicitly normalize. Variables X, Y, an Z, efine in (3)- (5), take integer values within the following ranges: D = [ ] + 0σ, (7) X, Y =...D, (8) Z = max (, X Y )...min (D, X + Y ), (9) where [ ] roun ( ) an iameter D becomes a istance istribution cutoff parameter, f(), > D since f(d)/f() e 00. The TZ LS size q (cf. Section II) is roune, q = [ (n/ log n) /]. 5 Although, there are some recent analytical results on istance istributions in uncorrelate scale-free graphs, [3].

5 For the following simulation results, we evelope our own TZ scheme simulator an use it on graphs prouce by the PLRG generator [5]. For a given parameter set, all the ata is average over 0 ranom graphs. All average graph sizes n are between 0, 000 an, 000 unless mentione otherwise. A. Distance istribution While the PLRG generator has been foun to prouce topologies largely consistent with those observe in the Internet inter-as graph [8], it outputs uncorrelate graphs, an, hence, there are some concerns regaring its capability of reproucing all the features of strongly correlate nets, such as the Internet. However, since the stretch istribution is a function of the istance istribution an the graph size only (Section III), all we nee from a graph generator for our purposes is that istance istributions in graphs prouce by it be close to istance istributions observe in real-worl graphs. Base on the experiments performe in [8], one can expect that the istance istribution in PLRG-generate graphs with the noe egree istribution exponent γ =. shoul be close to the one in the Internet. We fin that it is inee so. See Fig. (a) for etails. We then procee as follows. Paying special attention to the value of the noe egree istribution exponent γ equal to., which is observe in the Internet, we generate a series of graphs with γ ranging from to 3, an calculate their istance istributions. We fit these istributions by explicitly normalize Gaussians (6) yieling values of an σ that we use in numerical evaluations of our analytical results. For fitting, we use the stanar non-linear least squares metho. All fits are very goo: the maximum SSE we observe in our fits is an the minimum R-square is The values of an σ in fitte Gaussians are slightly off from the means an stanar eviations of istance istributions in generate graphs as epicte in Fig. (b). In fact, Fig. (b) is a parametric plot of σ() with γ being a parameter. We observe an almost linear relationship between an σ with such parametrization. Note that the almost linear relationship between the istance c..f. center an with parameterize by γ is analytically obtaine in [3] as well. We further iscuss this subject in Section V. In Fig. (c,), we show fitte an σ as functions of γ (cf. with the results in [3], [9]). Average graph sizes for ifferent values of γ are slightly ifferent, but the epenence of an σ on n (not shown) is negligible compare to their epenence on γ. Thisisin agreement with [3], [9]. B. Stretch istribution We obtain a very close match between the simulations an analysis of the average TZ stretch an stretch istribution. The average stretch as a function of γ isshowninfig.(a).forthe Internet-like graphs, γ =., the average stretch we observe in simulations is.09 an the average stretch given by (5) with f() in (6), with =3.4 an σ =0.9, is.4. Thus, we fin that the average stretch is very low. TABLE I THE TOP TEN STRETCH VALUES AND PERCENTAGE OF PATHS ASSOCIATED WITH THEM. Stretch Analysis (%) Simulations (%) / / / / / / / / Furthermore, while both the average istance an istance istribution with in power-law graphs o epen on γ (cf. Fig. (c,)), the average stretch oes not. We elay the iscussion of this topic until Section V. The stretch istributions obtaine both analytically, (4), an in simulations are shown in Fig. (b). The sets of significant stretch values (that is, stretch values having noticeable probabilities) match between the analysis an simulations. The top ten stretch values corresponing to virtually 00% of paths are presente in Table I. We notice that a majority of paths (up to 7% accoring to the simulations) are shortest. There are only a very few significant stretch values for the rest of paths. All the significant stretch values are below. The small amount of stretch values with noticeable probabilities is ue to the narrow with of the istance istribution. Inee, in 86% cases, two ranom noes are either 3 or 4 hops away from each other. That is, the probability for X or Z to be either 3 or 4 is 0.86, see Fig. (a). In 8% cases, a ranom noe is just one hop away from its closest lanmark, p Y () 0.8. This explains why stretch-4/3 (X =3, Y =, an Z =3) an stretch-5/4 (X =4, Y =, an Z =4) paths are most probable among stretch s> paths in Table I. In Fig. (c), the analytical results for the average stretch as a function of the graph size are shown. Note that epenence on n in (5) is only via the LS size q. We present ata for the case when an σ are fixe at their values observe in the Internet, an the case when they are allowe to scale as in the DGM moel. In both cases, the average stretch slowly ecreases as the network grows, although this ecrease is sprea over multiple orers of magnitue of n an the stretch change is confine to a narrow region between.3 an.. Wealso notice that after a certain point, the stretch stops ecreasing. Although it becomes very small, it oes not reach its minimal value. Finally, in Fig. (), we report the simulation ata on the average cluster an LS sizes. (Recall that the sum of the cluster an LS sizes in the TZ scheme is the number of recors in the local routing tables.) We notice that they are well below their theoretical bouns. Inee, for the Internet-like graphs we stuie, n 0 4, γ., this sum is 5, while the theoretical upper boun, 6(n log n) /,is 00.

6 AS ( = 3.7, σ = 0.9) PLRG with γ =. ( = 3.6, σ = 0.9) Gaussian fit of PLRG ( = 3.4, σ = 0.9) 3 PLRG graphs Gaussian fits Internet (γ =.) f() 0.5 σ a) b) σ c) 0.8 ) γ γ Fig.. a) The istance istributions. The circles represent the istance istribution from a typical AS (AS #) average over a perio of approximately March-May, 003. (The source of ata is [6]; for other measurements, see [4], [7].) The mean an stanar eviation is 3.7 an 0.9 respectively. The istance istribution in PLRG-generate graphs with γ =. is shown by squares. The stanar eviation is the same as before, the mean is 3.6. The soli line is the Gaussian fit of the PLRG istribution, =3.4 an σ =0.9. b) The means an stanar eviations (squares) of istance istributions in PLRG-generate graphs with γ =.0,.,..., 3.0 (from left to right), an the corresponing values of an σ (crosses) in their Gaussian fits. The fitte values of an σ as functions of γ are shown in (c) an () respectively. The Internet value of γ =. is circle in (b)-(). C. G n,p graphs Looking at Figs. (a,c), one may be tempte to assume that the average stretch just moerately epens on n an oes not epen on either or σ for a wie class of ranom graphs. To emonstrate that this is incorrect, we consier the most common class of ranom graphs, G n,p.wetaken 0 4 an choose p to match approximately the Internet average istance (p ) an average noe egree (p ). The analytical an simulation results for the average stretch in these two cases are presente in Table II. We fin that the average stretch is substantially higher than in the case of ranom graphs with power-law noe egree istributions. V. MINIMUM STRETCH AND THE INTERNET GRAPH Our investigation so far suggests that the average TZ stretch epens strongly on the characteristics of the graph istance istribution its average istance an with, in particular. Recall that now we are taking the istance istribution in a graph to be Gaussian, (6), an, hence, the average TZ stretch s in (5) is a function of the average istance an the with of the istance istribution σ, s s(, σ). At this point, we wish to explore the analytical structure of s(, σ) in more etail. The natural starting point is to fix either or σ to their observe values in the Internet, (3.4 an 0.9 respectively), an vary the other. This results of this exercise are illustrate in Figures 3(a,b). The left graph shows the stretch values when σ is fixe at 0.9 an is allowe to vary between 0 an 7. The right graph shows the stretch values when is fixe at 3.4 an the with σ is allowe to vary between 0 an 7. To our great surprise, we iscover that these two functions have unique minimums an that the point corresponing to the Internet istance istribution (the large ots, which we will call the Internet point ) are very close to them. In other wors, one may get an impression that the Internet topology has been carefully crafte to have a istance istribution that woul

7 3.8 simulations analysis Internet 0.9 simulations analysis s a) ρ(s) 0.5 b) γ s.3 = 3.4, σ = 0.9 ~ log n, σ ~ log / n s(n). c) q, C 30 ) n LS size cluster size γ Fig.. a) The analytical results (circles) an simulation ata (squares) for the average TZ stretch as a function of γ. b) The same for the TZ stretch istribution with γ =.. c) The analytical ata for the average stretch as a function of the graph size. The ashe line correspons to the case when the istance istribution parameters an σ are fixe to the values observe in the Internet. The soli line presents the ata when an σ scale accoring to the DGM moel. ) The simulation ata for the LS (circles) an cluster (squares) sizes. In the Internet case, γ =., the average graph size in simulations is 0,687, the average LS size is 50.0, an the average cluster size is.43. TABLE II THE AVERAGE TZ STRETCH ON THE G n,p GRAPHS. n p Avg. egree k (, σ) in graphs (, σ) in Gaussian fits s (analysis) s (simulations) (3.9, 0.6) (3.9, 0.5) (5.5, 0.9) (5.6, 0.8) (nearly) minimize the average TZ stretch. Of course, this can be only an impression an not an explanation since the Internet evolution, as we know it toay, has ha nothing to o with stretch. The next question we have to ask is if the minimums we observe in Fig. 3(a,b) correspon to a true local minimum of the stretch function. Our analytical results allow us to construct Fig. 3(c), where the stretch function is plotte against both an σ. Note that not all combinations of (, σ) correspon to Gaussian-like istance istributions. Inee, when σ>, f() from (6) looks more like an exponential ecay since it is cut off from the left by conition. Also, when σ is very small, (corresponing to highly regular graphs like complete graphs, stars, etc.), the peculiar peak formation in the σ 0 area in the picture occurs. In this region, accurate computation of the stretch requires etaile knowlege of the particular graph topology. 6 The region of primary interest to us, an which correspons to real-worl networks where our Gaussian moel is likely to be most accurate, is when σ is somewhat greater than 0 an somewhat less then. Here, we observe a concave area in a form of a channel between the other regions escribe above. This area, which we shall term the minimal stretch 6 Note, however, that for the complete network case, =, σ =0,we obtain the correct answer for the average stretch,. For etaile explanation of the peak structure, see [].

8 s(,0.9) Internet (s(3.4,0.9)).8.7 s(3.4,σ) Internet (s(3.4,0.9)) s(,0.9).5.4 s(3.4,σ).4.3 b).3.. a) σ irection mins σ irection mins Internet average stretch s c) σ σ S = { (,σ) s(,σ) ~ s(3.4,0.9) } I minimums in irection (ata) minimums in σ irection (ata) minimums in irection (fit) minimums in σ irection (fit) PLRG graphs (γ =.0,.,,.8) PLRG graphs (linear fit) Internet (γ =.) Internet with DGM σ =. G n,p with ~ 3.9 G n,p with k ~ 5.7 s minimums in irection minimums in σ irection PLRG graphs (γ =.0,.,,.8) Internet (γ =.) Internet with DGM σ =. G n,p with ~ 3.9 G n,p with k ~ 5.7 e) ) Fig. 3. a),b) The average stretch as functions of with σ =0.9 an of σ with =3.4 respectively. The Internet is represente by the ots. c) The average stretch as a function of an σ. The Internet is represente by the ot. The stretch minimums along the - anσ-axes, M an M σ, are the light-grey an black lines respectively. ) The projection of (c) onto the -σ plane. The soli bottom an top lines represent respectively M an M σ (the light-grey an black lines from (c)). The two ashe lines are their linear fits in the MSR. The crosses are the same as in Fig. (b), the bottom-most ashe line being their linear fit. The Internet, γ =., is circle. The shae area is M I from the text. The plus is the point with the average istance observe in the Internet an the Gaussian with preicte by the DGM moel, =3.4, σ =.. The iamon an square are the istance istributions of the G n,p graphs from Table II matching the Internet average istance an noe egree. e) The projection of (c) onto the -s plane. The notations are the same as in (). The graph sizes n 0 4 everywhere.

9 region (MSR), is characterize by particularly low stretch values. The with an epth of the MSR slowly increase as (, σ) grow. For small (, σ), the MSR has a unique critical point, which we call the MSR apex. The Internet point is locate very close to the apex, which is characterize by the shortest istance between the sets of minimums of the average stretch function s(, σ) along the - an σ-axes. We enote these two sets by M an M σ respectively. We fin that M an M σ almost touch each other at the apex. The MSR apex can be more easily observe in Fig. 3() showing a projection of Fig. 3(c) on the -σ plane. The soli lines represent the above two sets of minimums forming the MSR, an the Internet point is very near their closest segment. An opportunity to look at the apex from yet another angle is presente in Fig. 3(e) showing a projection of Fig. 3(c) on the -s plane. We see that starting from the apex, as increases, the minimum stretch values along the - an σ- irections become virtually equal an slowly ecrease as grows. We also note that G n,p graphs are far away from the apex an that they have average stretch values that are far from minimal. We can see now that the apex is inee a critical or phase transition point since it is locate at the bounary of the two regions of the average stretch function. The first region, the MSR, is characterize by lowest possible stretch values corresponing to istance istributions observe in real-worl graphs. The secon region, with substantially higher average stretch values, correspons to istance istributions in more regular graphs. To illustrate this point in more etail, we turn our attention back to Fig. 3(). We observe that the two sets of minimums, M an M σ, are linear when σ>. The ashe lines represent the linear fits of M an M σ in the area with σ>. The exact location of the intersection of these fits is (,σ )=(3.6, 0.97). If the linear form of M an M σ sustaine for σ < as well, then M an M σ woul intersect at (,σ ), where we woul observe a stationary 7 point of s(, σ), which we coul then test for the presence of an extremum of the stretch function. This oes not happen, however. Instea, as an σ become small, the linear behavior breaks near the apex ue to increasingly more iscrete structure of the istance istribution ([]). In the extene version of this paper [], we show that linearity of M an M σ can be analytically erive from the fact that the istance istribution is taken to be Gaussian. Of course, this oes not explain why the Internet is so close either to the MSR or to its apex. The linear form of M an M σ in the MSR shes some light on a closely relate issue of why the average stretch is virtually inepenent of γ. In Fig.3(),the shae area represents a set of (, σ), for which the average stretch is approximately the same as for the Internet, M I = { (, σ) s(, σ) s(3.4, 0.9) }. We see that in the 7 Recall that a function has a stationary point where all its first-orer partial erivatives are zero. Thus, we can call the apex a quasi- stationary point emphasizing that s/ an s/ σ are both nearly zero at the apex. MSR, the M I bounaries are almost parallel straight lines. Therefore, if the average stretch is to be inepenent of γ, which is observe in Section IV-B, then the points representing istance istributions in power-law graphs, ( γ,σ γ ) from Fig. (b), shoul lie along the M I bounaries, an this is what inee happens. Yet again, the linear relation between γ an σ γ in the power-law graphs, an the fact that this relation is just as require for the average TZ stretch being virtually inepenent of γ, come from two seemingly isjoint omains. To finish the list of various coinciences, we construct a linear fit of ( γ,σ γ ) (the bottom-most ashe line in Fig. 3()). This line is locate exactly at the MSR ege. Inee, in the area of higher values of σ (that is, in the MSR), the stretch function is completely concave, while for smaller σ, we observe multiple convex an concave regions cause by more iscrete structure of the istance istribution. In other wors, the line corresponing to scale-free graphs is right at the bounary between more ranom an more regular graphs. Furthermore, the Internet point, γ =., lies on this line, an our numeric analysis shows that the Internet value of γ =. minimizes the istance between the linear fit of ( γ,σ γ ) an (,σ ), which is the intersection of the linear fits of M an M σ. In other wors, the Internet istance istribution is the point that is closest to the MSR apex, compare to istance istributions in all other scale-free graphs with powerlaw noe egree istributions. VI. CONCLUSIONS We fin that the TZ routing scheme applie to the Internet inter-as graph results in a very low average stretch an succinct routing tables that are well below their upper bouns. The primary reason why the average stretch is of a great concern is that the TZ scheme is not a stretch- scheme, while Internet inter-omain routing is essentially shortest path routing. 8 Thus, any stretch s> routing scheme applie to the Internet woul involve augmentation, in one form or another, of the routing information provie by the scheme with the shortest path routing information for some (or all) non-shortest paths. Our principal fining, that the TZ stretch on the Internet graph is reasonably low, opens a well-efine path for future work in the area of applying relevant theoretical results obtaine for routing to realistic scale-free networks. One of the immeiate next problems on this path is the performance analysis of ynamic low-stretch routing schemes on scalefree graphs. The TZ scheme is not optimal for the ynamic case since it labels noes with topology-sensitive information. In other wors, it is not name-inepenent. As soon as the topology changes, noes nee to be relabele. Significant progress in construction of name-inepenent low-stretch routing schemes has been recently mae by Arias, Cowen, et al. in [30]. 8 A routing scheme that woul prevent, for example, a pair of ASs from utilizing a peering link between them is not realistic, of course.

10 More importantly, however, we fin that the Internet shortest path length istribution is at the minimal istance from the unique critical point of the average stretch function. At present we lack sufficient information to show cause for this effect, but we o believe it strongly suggests the average stretch function may be an inirect (or even irect) inicator of some yet-to-be iscovere process that has influence the Internet s topological evolution. In other wors, a rigorous explanation of this phenomenon woul probably require much eeper unerstaning of the Internet evolution principles an emonstration of a link between them an the TZ scheme. This question is of great interest, as the funamental laws governing the Internet evolution remain unclear. Therefore, a proper explanation of this effect may help us in our intent to move, perhaps along the lines of [], from purely escriptive Internet evolution moels to more explanatory ones, in the terminology of the program outline in [8]. REFERENCES [] H. Chang, S. Jamin, an W. Willinger, Internet connectivity at the AS level: An optimization riven moeling approach, in Proc. of MoMeTools, 003. [] G. Huston, Commentary on Inter-Domain Routing in the Internet, IETF, RFC 3, 00. [3] M. Thorup an U. Zwick, Compact routing schemes, in Proc. of the 3 th SPAA. ACM, 00. [4] L. Kleinrock an F. Kamoun, Hierarchical routing for large networks: Performance evaluation an optimization, Computer Networks, vol., 977. [5] I. Castineyra, N. Chiappa, an M. Steenstrup, The Nimro Routing Architecture, IETF, RFC 99, 996. [6] F. Kastenholz, ISLAY: A New Routing an Aressing Architecture, IETF, Internet Draft, 00. [7] C. Gavoille an S. Pérennès, Memory requirement for routing in istribute networks, in Proc. of the 5 th PODC. ACM, 996. [8] H. Buhrman, J.-H. Hoepman, an P. Vitány, Space-efficient routing tables for almost all networks an the incompressibility metho, SIAM J. on Comp., vol. 8, no. 4, 999. [9] C. Gavoille an M. Genegler, Space-efficiency for routing schemes of stretch factor three, J. of Parallel an Distribute Comp., vol. 6, no. 5, 00. [0] L. Cowen, Compact routing with minimum stretch, J. of Algorithms, vol. 38, no., 00. [] M. Thorup an U. Zwick, Approximate istance oracles, in Proc. of the 33 r STOC. ACM, 00. [] P. Erős an A. Réni, On ranom graphs, Publicationes Mathematicae, vol. 6, 959. [3] B. Bollobás, Ranom Graphs, Acaemic Press, New York, 985. [4] A. Vázquez, R. Pastor-Satorras, an A. Vespignani, Internet topology at the router an Autonomous System level, con-mat/ [5] M. Faloutsos, P. Faloutsos, an C. Faloutsos, On power-law relationships of the Internet topology, in Proc. of the ACM SIGCOMM, 999. [6] S. Milgram, The small worl problem, Psychology Toay, vol. 6, 967. [7] A.-L. Barabási an R. Albert, Emergence of scaling in ranom networks, Science, vol. 86, 999. [8] W. Willinger, R. Govinan, S. Jamin, V. Paxson, an S. Shenker, Scaling phenomena in the Internet: Critically examining criticality, PNAS, vol. 99, 00. [9] Q. Chen, H. Chang, R. Govinan, S. Jamin, S. J. Shenker, an W. Willinger, The origin of power laws in Internet topologies revisite, in Proc. of the IEEE INFOCOM, 00. [0] S. Ross, Introuction to Probabilty Moels (7th e), Acaemic Press, San Diego, 000. [] D. Krioukov, K. Fall, an X. Yang, Compact routing on Internet-like graphs, Tech. Report IRB-TR-03-00, Intel Research, 003. [] S. N. Dorogovtsev an J. F. F. Menes, Evolution of Networks: From Biological Nets to the Internet an WWW, Oxfor University Press, Oxfor, 003. [3] S. N. Dorogovtsev, J. F. F. Menes, an A. N. Samukhin, Metric structure of ranom networks, Nucl. Phys. B, vol. 653, no. 3, 003. [4] S. N. Dorogovtsev, A. V. Goltsev, an J. F. F. Menes, Pseuofractal scale-free web, Phys.Rev.E, vol. 65, 066, 00. [5] W. Aiello, F. Chung, an L. Lu, A ranom graph moel for massive graphs, in Proc. of the 3 n STOC. ACM, 000. [6] BGP Table Data, [7] A. Broio, E. Nemeth, an k claffy, Internet expansion, refinement, an churn, European Trans. on Telecommunications, vol. 3, no., 00. [8] H. Tangmunarunkit, R. Govinan, S. Jamin, S. Shenker, an W. Willinger, Network topology generators: Degree-base vs. structural, in Proc. of the ACM SIGCOMM, 00. [9] F. Chung an L. Lu, The average istance in a ranom graph with given expecte egrees, Internet Mathematics, vol., no., 003. [30] M. Arias, L. Cowen, K. A. Laing, R. Rajaraman, an O. Taka, Compact routing with name inepenence, in Proc. of the 5 th SPAA. ACM, 003. APPENDIX In this appenix, we calculate a rough estimate of the stretch factor of the Kleinrock-Kamoun (KK) hierarchical routing scheme, [4], applie to the observe Internet interomain topology. We fin that the stretch is very high, which is consistent with the observation mae in [4] that the approach use there works reasonably well only for sparsely connecte networks. The scale-free networks, on the contrary, are extremely ensely connecte. Recall that [4] assumes the existence of a hierarchical partitioning of a network of size n into m levels of clusters. Each k-level cluster consists of n /m (k )-level clusters, k =...m, 0-level clusters being noes. The optimal clustering is achieve when m log n. There are a few other fairly strong assumptions about the properties of the require partitioning. Neither an algorithm for its construction nor proof of its existence are elivere, but if it oes exist then the stretch factor is shown to be [ ] s =+ m n k m k, (0) n k= where is the network average istance an k is the iameter of a k-level cluster. It is further assume in [4] that both the network iameter an average istance are power-law functions of the network size. This is certainly not true for scale-free networks with power-law noe egree istributions. For recent results on the average istance in such networks, see [9], [3]. In the numerical evaluations in this appenix, we use the value of 3.6 observe in the Internet, [6]. As shown in [9], the iameter of networks with power-law noe egree istribution with exponent γ lying between an 3 scales almost surely as Θ(log n). For the Internet, γ., an since the Internet size n is relatively large, we may write the Internet iameter D as D c log n with some multiplicative coefficient c. The observe value of D, D 3 ([6]), efines c. Thesizeofak-level cluster is obviously n k/m but nothing rigorous can be sai about its egree istribution since there is

11 no proceure for its construction. Thus, it is natural to assume that its egree istribution is also power-law with <γ<3, which gives an estimate of the k-level cluster iameter as k c log n k/m Dk/m. Substituting this in (0) an performing summation gives s + D [ m n n n(n m ) (n )(n m ) + ] () n m. m (n m ) Using the numerical values for n,, D, an optimal m =0, we can see that the KK stretch factor on the Internet interomain topology is s 5. () Note that a 5-times path length increase in the Internet woul lea to AS path lengths of 55 an IP hop path lengths of 50. The stretch factor is a nearly linear function of the number of hierarchical levels m, which follows irectly from equation () since it can be rewritten for large n as s + D (m ). (3) Using D log n, log log n ([9]), an optimal m log n, we obtain the following estimate of the stretch factor as a function of the network size: s log n log log n. (4)

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION MAXIMUM-LIKELIHOOD ESTIMATION The General Theory of M-L Estimation In orer to erive an M-L estimator, we are boun to make an assumption about the functional form of the istribution which generates the

More information

Firewall Design: Consistency, Completeness, and Compactness

Firewall Design: Consistency, Completeness, and Compactness C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,

More information

On Adaboost and Optimal Betting Strategies

On Adaboost and Optimal Betting Strategies On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS Contents 1. Moment generating functions 2. Sum of a ranom number of ranom variables 3. Transforms

More information

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations This page may be remove to conceal the ientities of the authors An intertemporal moel of the real exchange rate, stock market, an international ebt ynamics: policy simulations Saziye Gazioglu an W. Davi

More information

Data Center Power System Reliability Beyond the 9 s: A Practical Approach

Data Center Power System Reliability Beyond the 9 s: A Practical Approach Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical

More information

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market RATIO MATHEMATICA 25 (2013), 29 46 ISSN:1592-7415 Optimal Control Policy of a Prouction an Inventory System for multi-prouct in Segmente Market Kuleep Chauhary, Yogener Singh, P. C. Jha Department of Operational

More information

Math 230.01, Fall 2012: HW 1 Solutions

Math 230.01, Fall 2012: HW 1 Solutions Math 3., Fall : HW Solutions Problem (p.9 #). Suppose a wor is picke at ranom from this sentence. Fin: a) the chance the wor has at least letters; SOLUTION: All wors are equally likely to be chosen. The

More information

State of Louisiana Office of Information Technology. Change Management Plan

State of Louisiana Office of Information Technology. Change Management Plan State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change

More information

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law Detecting Possibly Frauulent or Error-Prone Survey Data Using Benfor s Law Davi Swanson, Moon Jung Cho, John Eltinge U.S. Bureau of Labor Statistics 2 Massachusetts Ave., NE, Room 3650, Washington, DC

More information

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,

More information

Lagrangian and Hamiltonian Mechanics

Lagrangian and Hamiltonian Mechanics Lagrangian an Hamiltonian Mechanics D.G. Simpson, Ph.D. Department of Physical Sciences an Engineering Prince George s Community College December 5, 007 Introuction In this course we have been stuying

More information

Modelling and Resolving Software Dependencies

Modelling and Resolving Software Dependencies June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software

More information

10.2 Systems of Linear Equations: Matrices

10.2 Systems of Linear Equations: Matrices SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix

More information

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5 Binomial Moel Hull, Chapter 11 + ections 17.1 an 17.2 Aitional reference: John Cox an Mark Rubinstein, Options Markets, Chapter 5 1. One-Perio Binomial Moel Creating synthetic options (replicating options)

More information

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines EUROGRAPHICS 2000 / M. Gross an F.R.A. Hopgoo Volume 19, (2000), Number 3 (Guest Eitors) Unsteay Flow Visualization by Animating Evenly-Space Bruno Jobar an Wilfri Lefer Université u Littoral Côte Opale,

More information

A Data Placement Strategy in Scientific Cloud Workflows

A Data Placement Strategy in Scientific Cloud Workflows A Data Placement Strategy in Scientific Clou Workflows Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen Faculty of Information an Communication Technologies, Swinburne University of Technology Hawthorn, Melbourne,

More information

A New Evaluation Measure for Information Retrieval Systems

A New Evaluation Measure for Information Retrieval Systems A New Evaluation Measure for Information Retrieval Systems Martin Mehlitz martin.mehlitz@ai-labor.e Christian Bauckhage Deutsche Telekom Laboratories christian.bauckhage@telekom.e Jérôme Kunegis jerome.kunegis@ai-labor.e

More information

Optimal Energy Commitments with Storage and Intermittent Supply

Optimal Energy Commitments with Storage and Intermittent Supply Submitte to Operations Research manuscript OPRE-2009-09-406 Optimal Energy Commitments with Storage an Intermittent Supply Jae Ho Kim Department of Electrical Engineering, Princeton University, Princeton,

More information

Lecture L25-3D Rigid Body Kinematics

Lecture L25-3D Rigid Body Kinematics J. Peraire, S. Winall 16.07 Dynamics Fall 2008 Version 2.0 Lecture L25-3D Rigi Boy Kinematics In this lecture, we consier the motion of a 3D rigi boy. We shall see that in the general three-imensional

More information

CURRENCY OPTION PRICING II

CURRENCY OPTION PRICING II Jones Grauate School Rice University Masa Watanabe INTERNATIONAL FINANCE MGMT 657 Calibrating the Binomial Tree to Volatility Black-Scholes Moel for Currency Options Properties of the BS Moel Option Sensitivity

More information

Risk Management for Derivatives

Risk Management for Derivatives Risk Management or Derivatives he Greeks are coming the Greeks are coming! Managing risk is important to a large number o iniviuals an institutions he most unamental aspect o business is a process where

More information

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions A Generalization of Sauer s Lemma to Classes of Large-Margin Functions Joel Ratsaby University College Lonon Gower Street, Lonon WC1E 6BT, Unite Kingom J.Ratsaby@cs.ucl.ac.uk, WWW home page: http://www.cs.ucl.ac.uk/staff/j.ratsaby/

More information

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sewoong Oh an Anrea Montanari Electrical Engineering an Statistics Department Stanfor University, Stanfor,

More information

Answers to the Practice Problems for Test 2

Answers to the Practice Problems for Test 2 Answers to the Practice Problems for Test 2 Davi Murphy. Fin f (x) if it is known that x [f(2x)] = x2. By the chain rule, x [f(2x)] = f (2x) 2, so 2f (2x) = x 2. Hence f (2x) = x 2 /2, but the lefthan

More information

The one-year non-life insurance risk

The one-year non-life insurance risk The one-year non-life insurance risk Ohlsson, Esbjörn & Lauzeningks, Jan Abstract With few exceptions, the literature on non-life insurance reserve risk has been evote to the ultimo risk, the risk in the

More information

Notes on tangents to parabolas

Notes on tangents to parabolas Notes on tangents to parabolas (These are notes for a talk I gave on 2007 March 30.) The point of this talk is not to publicize new results. The most recent material in it is the concept of Bézier curves,

More information

Differentiability of Exponential Functions

Differentiability of Exponential Functions Differentiability of Exponential Functions Philip M. Anselone an John W. Lee Philip Anselone (panselone@actionnet.net) receive his Ph.D. from Oregon State in 1957. After a few years at Johns Hopkins an

More information

A Comparison of Performance Measures for Online Algorithms

A Comparison of Performance Measures for Online Algorithms A Comparison of Performance Measures for Online Algorithms Joan Boyar 1, Sany Irani 2, an Kim S. Larsen 1 1 Department of Mathematics an Computer Science, University of Southern Denmark, Campusvej 55,

More information

Modeling and Predicting Popularity Dynamics via Reinforced Poisson Processes

Modeling and Predicting Popularity Dynamics via Reinforced Poisson Processes Proceeings of the Twenty-Eighth AAAI Conference on Artificial Intelligence Moeling an Preicting Popularity Dynamics via Reinforce Poisson Processes Huawei Shen 1, Dashun Wang 2, Chaoming Song 3, Albert-László

More information

Sensitivity Analysis of Non-linear Performance with Probability Distortion

Sensitivity Analysis of Non-linear Performance with Probability Distortion Preprints of the 19th Worl Congress The International Feeration of Automatic Control Cape Town, South Africa. August 24-29, 214 Sensitivity Analysis of Non-linear Performance with Probability Distortion

More information

Cross-Over Analysis Using T-Tests

Cross-Over Analysis Using T-Tests Chapter 35 Cross-Over Analysis Using -ests Introuction his proceure analyzes ata from a two-treatment, two-perio (x) cross-over esign. he response is assume to be a continuous ranom variable that follows

More information

Measures of distance between samples: Euclidean

Measures of distance between samples: Euclidean 4- Chapter 4 Measures of istance between samples: Eucliean We will be talking a lot about istances in this book. The concept of istance between two samples or between two variables is funamental in multivariate

More information

Which Networks Are Least Susceptible to Cascading Failures?

Which Networks Are Least Susceptible to Cascading Failures? Which Networks Are Least Susceptible to Cascaing Failures? Larry Blume Davi Easley Jon Kleinberg Robert Kleinberg Éva Taros July 011 Abstract. The resilience of networks to various types of failures is

More information

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments 2012 IEEE Wireless Communications an Networking Conference: Services, Applications, an Business Game Theoretic Moeling of Cooperation among Service Proviers in Mobile Clou Computing Environments Dusit

More information

Optimizing Multiple Stock Trading Rules using Genetic Algorithms

Optimizing Multiple Stock Trading Rules using Genetic Algorithms Optimizing Multiple Stock Traing Rules using Genetic Algorithms Ariano Simões, Rui Neves, Nuno Horta Instituto as Telecomunicações, Instituto Superior Técnico Av. Rovisco Pais, 040-00 Lisboa, Portugal.

More information

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan mario.cagal@epfl.ch Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan

More information

The Quick Calculus Tutorial

The Quick Calculus Tutorial The Quick Calculus Tutorial This text is a quick introuction into Calculus ieas an techniques. It is esigne to help you if you take the Calculus base course Physics 211 at the same time with Calculus I,

More information

2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by,

2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by, Theorem Simple Containers Theorem) Let G be a simple, r-graph of average egree an of orer n Let 0 < δ < If is large enough, then there exists a collection of sets C PV G)) satisfying: i) for every inepenent

More information

A Universal Sensor Control Architecture Considering Robot Dynamics

A Universal Sensor Control Architecture Considering Robot Dynamics International Conference on Multisensor Fusion an Integration for Intelligent Systems (MFI2001) Baen-Baen, Germany, August 2001 A Universal Sensor Control Architecture Consiering Robot Dynamics Frierich

More information

Definition of the spin current: The angular spin current and its physical consequences

Definition of the spin current: The angular spin current and its physical consequences Definition of the spin current: The angular spin current an its physical consequences Qing-feng Sun 1, * an X. C. Xie 2,3 1 Beijing National Lab for Conense Matter Physics an Institute of Physics, Chinese

More information

How To Find Out How To Calculate Volume Of A Sphere

How To Find Out How To Calculate Volume Of A Sphere Contents High-Dimensional Space. Properties of High-Dimensional Space..................... 4. The High-Dimensional Sphere......................... 5.. The Sphere an the Cube in Higher Dimensions...........

More information

Option Pricing for Inventory Management and Control

Option Pricing for Inventory Management and Control Option Pricing for Inventory Management an Control Bryant Angelos, McKay Heasley, an Jeffrey Humpherys Abstract We explore the use of option contracts as a means of managing an controlling inventories

More information

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany Parameterize Algorithms for -Hitting Set: the Weighte Case Henning Fernau Trierer Forschungsberichte; Trier: Technical Reports Informatik / Mathematik No. 08-6, July 2008 Univ. Trier, FB 4 Abteilung Informatik

More information

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters ThroughputScheuler: Learning to Scheule on Heterogeneous Haoop Clusters Shehar Gupta, Christian Fritz, Bob Price, Roger Hoover, an Johan e Kleer Palo Alto Research Center, Palo Alto, CA, USA {sgupta, cfritz,

More information

Web Appendices to Selling to Overcon dent Consumers

Web Appendices to Selling to Overcon dent Consumers Web Appenices to Selling to Overcon ent Consumers Michael D. Grubb MIT Sloan School of Management Cambrige, MA 02142 mgrubbmit.eu www.mit.eu/~mgrubb May 2, 2008 B Option Pricing Intuition This appenix

More information

Mathematics Review for Economists

Mathematics Review for Economists Mathematics Review for Economists by John E. Floy University of Toronto May 9, 2013 This ocument presents a review of very basic mathematics for use by stuents who plan to stuy economics in grauate school

More information

An Introduction to Event-triggered and Self-triggered Control

An Introduction to Event-triggered and Self-triggered Control An Introuction to Event-triggere an Self-triggere Control W.P.M.H. Heemels K.H. Johansson P. Tabuaa Abstract Recent evelopments in computer an communication technologies have le to a new type of large-scale

More information

View Synthesis by Image Mapping and Interpolation

View Synthesis by Image Mapping and Interpolation View Synthesis by Image Mapping an Interpolation Farris J. Halim Jesse S. Jin, School of Computer Science & Engineering, University of New South Wales Syney, NSW 05, Australia Basser epartment of Computer

More information

Stock Market Value Prediction Using Neural Networks

Stock Market Value Prediction Using Neural Networks Stock Market Value Preiction Using Neural Networks Mahi Pakaman Naeini IT & Computer Engineering Department Islamic Aza University Paran Branch e-mail: m.pakaman@ece.ut.ac.ir Hamireza Taremian Engineering

More information

Search Advertising Based Promotion Strategies for Online Retailers

Search Advertising Based Promotion Strategies for Online Retailers Search Avertising Base Promotion Strategies for Online Retailers Amit Mehra The Inian School of Business yeraba, Inia Amit Mehra@isb.eu ABSTRACT Web site aresses of small on line retailers are often unknown

More information

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems *

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems * GPRS performance estimation in GSM circuit switche serices an GPRS share resource systems * Shaoji i an Sen-Gusta Häggman Helsinki Uniersity of Technology, Institute of Raio ommunications, ommunications

More information

How To Price Internet Access In A Broaban Service Charge On A Per Unit Basis

How To Price Internet Access In A Broaban Service Charge On A Per Unit Basis iqui Pricing for Digital Infrastructure Services Subhajyoti Banyopahyay * an sing Kenneth Cheng Department of Decision an Information Sciences Warrington College of Business Aministration University of

More information

Ch 10. Arithmetic Average Options and Asian Opitons

Ch 10. Arithmetic Average Options and Asian Opitons Ch 10. Arithmetic Average Options an Asian Opitons I. Asian Option an the Analytic Pricing Formula II. Binomial Tree Moel to Price Average Options III. Combination of Arithmetic Average an Reset Options

More information

Net Neutrality, Network Capacity, and Innovation at the Edges

Net Neutrality, Network Capacity, and Innovation at the Edges Net Neutrality, Network Capacity, an Innovation at the Eges Jay Pil Choi Doh-Shin Jeon Byung-Cheol Kim May 22, 2015 Abstract We stuy how net neutrality regulations affect a high-banwith content provier(cp)

More information

DIFFRACTION AND INTERFERENCE

DIFFRACTION AND INTERFERENCE DIFFRACTION AND INTERFERENCE In this experiment you will emonstrate the wave nature of light by investigating how it bens aroun eges an how it interferes constructively an estructively. You will observe

More information

Cost Efficient Datacenter Selection for Cloud Services

Cost Efficient Datacenter Selection for Cloud Services Cost Efficient Datacenter Selection for Clou Services Hong u, Baochun Li henryxu, bli@eecg.toronto.eu Department of Electrical an Computer Engineering University of Toronto Abstract Many clou services

More information

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND art I. robobabilystic Moels Computer Moelling an New echnologies 27 Vol. No. 2-3 ransport an elecommunication Institute omonosova iga V-9 atvia MOEING OF WO AEGIE IN INVENOY CONO YEM WIH ANOM EA IME AN

More information

How To Segmentate An Insurance Customer In An Insurance Business

How To Segmentate An Insurance Customer In An Insurance Business International Journal of Database Theory an Application, pp.25-36 http://x.oi.org/10.14257/ijta.2014.7.1.03 A Case Stuy of Applying SOM in Market Segmentation of Automobile Insurance Customers Vahi Golmah

More information

Web Appendices of Selling to Overcon dent Consumers

Web Appendices of Selling to Overcon dent Consumers Web Appenices of Selling to Overcon ent Consumers Michael D. Grubb A Option Pricing Intuition This appenix provies aitional intuition base on option pricing for the result in Proposition 2. Consier the

More information

A New Pricing Model for Competitive Telecommunications Services Using Congestion Discounts

A New Pricing Model for Competitive Telecommunications Services Using Congestion Discounts A New Pricing Moel for Competitive Telecommunications Services Using Congestion Discounts N. Keon an G. Ananalingam Department of Systems Engineering University of Pennsylvania Philaelphia, PA 19104-6315

More information

The most common model to support workforce management of telephone call centers is

The most common model to support workforce management of telephone call centers is Designing a Call Center with Impatient Customers O. Garnett A. Manelbaum M. Reiman Davison Faculty of Inustrial Engineering an Management, Technion, Haifa 32000, Israel Davison Faculty of Inustrial Engineering

More information

Product Differentiation for Software-as-a-Service Providers

Product Differentiation for Software-as-a-Service Providers University of Augsburg Prof. Dr. Hans Ulrich Buhl Research Center Finance & Information Management Department of Information Systems Engineering & Financial Management Discussion Paper WI-99 Prouct Differentiation

More information

f(x) = a x, h(5) = ( 1) 5 1 = 2 2 1

f(x) = a x, h(5) = ( 1) 5 1 = 2 2 1 Exponential Functions an their Derivatives Exponential functions are functions of the form f(x) = a x, where a is a positive constant referre to as the base. The functions f(x) = x, g(x) = e x, an h(x)

More information

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014 Consumer Referrals Maria Arbatskaya an Hieo Konishi October 28, 2014 Abstract In many inustries, rms rewar their customers for making referrals. We analyze the optimal policy mix of price, avertising intensity,

More information

Mathematics. Circles. hsn.uk.net. Higher. Contents. Circles 119 HSN22400

Mathematics. Circles. hsn.uk.net. Higher. Contents. Circles 119 HSN22400 hsn.uk.net Higher Mathematics UNIT OUTCOME 4 Circles Contents Circles 119 1 Representing a Circle 119 Testing a Point 10 3 The General Equation of a Circle 10 4 Intersection of a Line an a Circle 1 5 Tangents

More information

ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014

ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014 ISSN: 77-754 ISO 900:008 Certifie International Journal of Engineering an Innovative echnology (IJEI) Volume, Issue, June 04 Manufacturing process with isruption uner Quaratic Deman for Deteriorating Inventory

More information

Introduction to Integration Part 1: Anti-Differentiation

Introduction to Integration Part 1: Anti-Differentiation Mathematics Learning Centre Introuction to Integration Part : Anti-Differentiation Mary Barnes c 999 University of Syney Contents For Reference. Table of erivatives......2 New notation.... 2 Introuction

More information

Di usion on Social Networks. Current Version: June 6, 2006 Appeared in: Économie Publique, Numéro 16, pp 3-16, 2005/1.

Di usion on Social Networks. Current Version: June 6, 2006 Appeared in: Économie Publique, Numéro 16, pp 3-16, 2005/1. Di usion on Social Networks Matthew O. Jackson y Caltech Leeat Yariv z Caltech Current Version: June 6, 2006 Appeare in: Économie Publique, Numéro 16, pp 3-16, 2005/1. Abstract. We analyze a moel of i

More information

Modifying Gaussian term structure models when interest rates are near the zero lower bound. Leo Krippner. March 2012. JEL classi cation: E43, G12, G13

Modifying Gaussian term structure models when interest rates are near the zero lower bound. Leo Krippner. March 2012. JEL classi cation: E43, G12, G13 DP0/0 Moifying Gaussian term structure moels when interest rates are near the zero lower boun Leo Krippner March 0 JEL classi cation: E43, G, G3 www.rbnz.govt.nz/research/iscusspapers/ Discussion Paper

More information

Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks

Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks Low-Complexity an Distribute Energy inimization in ulti-hop Wireless Networks Longbi Lin, Xiaojun Lin, an Ness B. Shroff Center for Wireless Systems an Applications (CWSA) School of Electrical an Computer

More information

Professional Level Options Module, Paper P4(SGP)

Professional Level Options Module, Paper P4(SGP) Answers Professional Level Options Moule, Paper P4(SGP) Avance Financial Management (Singapore) December 2007 Answers Tutorial note: These moel answers are consierably longer an more etaile than woul be

More information

How To Connect Two Servers Together In A Data Center Network

How To Connect Two Servers Together In A Data Center Network DPillar: Scalable Dual-Port Server Interconnection for Data Center Networks Yong Liao ECE Department University of Massachusetts Amherst, MA 3, USA Dong Yin Automation Department Northwestern Polytech

More information

Here the units used are radians and sin x = sin(x radians). Recall that sin x and cos x are defined and continuous everywhere and

Here the units used are radians and sin x = sin(x radians). Recall that sin x and cos x are defined and continuous everywhere and Lecture 9 : Derivatives of Trigonometric Functions (Please review Trigonometry uner Algebra/Precalculus Review on the class webpage.) In this section we will look at the erivatives of the trigonometric

More information

Forecasting and Staffing Call Centers with Multiple Interdependent Uncertain Arrival Streams

Forecasting and Staffing Call Centers with Multiple Interdependent Uncertain Arrival Streams Forecasting an Staffing Call Centers with Multiple Interepenent Uncertain Arrival Streams Han Ye Department of Statistics an Operations Research, University of North Carolina, Chapel Hill, NC 27599, hanye@email.unc.eu

More information

Heat-And-Mass Transfer Relationship to Determine Shear Stress in Tubular Membrane Systems Ratkovich, Nicolas Rios; Nopens, Ingmar

Heat-And-Mass Transfer Relationship to Determine Shear Stress in Tubular Membrane Systems Ratkovich, Nicolas Rios; Nopens, Ingmar Aalborg Universitet Heat-An-Mass Transfer Relationship to Determine Shear Stress in Tubular Membrane Systems Ratkovich, Nicolas Rios; Nopens, Ingmar Publishe in: International Journal of Heat an Mass Transfer

More information

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection Towars a Framework for Enterprise Frameworks Comparison an Selection Saber Aballah Faculty of Computers an Information, Cairo University Saber_aballah@hotmail.com Abstract A number of Enterprise Frameworks

More information

Risk Adjustment for Poker Players

Risk Adjustment for Poker Players Risk Ajustment for Poker Players William Chin DePaul University, Chicago, Illinois Marc Ingenoso Conger Asset Management LLC, Chicago, Illinois September, 2006 Introuction In this article we consier risk

More information

arxiv:1309.1857v3 [gr-qc] 7 Mar 2014

arxiv:1309.1857v3 [gr-qc] 7 Mar 2014 Generalize holographic equipartition for Friemann-Robertson-Walker universes Wen-Yuan Ai, Hua Chen, Xian-Ru Hu, an Jian-Bo Deng Institute of Theoretical Physics, LanZhou University, Lanzhou 730000, P.

More information

5 Isotope effects on vibrational relaxation and hydrogen-bond dynamics in water

5 Isotope effects on vibrational relaxation and hydrogen-bond dynamics in water 5 Isotope effects on vibrational relaxation an hyrogen-bon ynamics in water Pump probe experiments HDO issolve in liqui H O show the spectral ynamics an the vibrational relaxation of the OD stretch vibration.

More information

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures

Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Greedy Routing on Hidden Metric Spaces as a Foundation of Scalable Routing Architectures Dmitri Krioukov, kc claffy, and Kevin Fall CAIDA/UCSD, and Intel Research, Berkeley Problem High-level Routing is

More information

A NATIONAL MEASUREMENT GOOD PRACTICE GUIDE. No.107. Guide to the calibration and testing of torque transducers

A NATIONAL MEASUREMENT GOOD PRACTICE GUIDE. No.107. Guide to the calibration and testing of torque transducers A NATIONAL MEASUREMENT GOOD PRACTICE GUIDE No.107 Guie to the calibration an testing of torque transucers Goo Practice Guie 107 Measurement Goo Practice Guie No.107 Guie to the calibration an testing of

More information

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY Jörg Felhusen an Sivakumara K. Krishnamoorthy RWTH Aachen University, Chair an Insitute for Engineering

More information

Calculating Viscous Flow: Velocity Profiles in Rivers and Pipes

Calculating Viscous Flow: Velocity Profiles in Rivers and Pipes previous inex next Calculating Viscous Flow: Velocity Profiles in Rivers an Pipes Michael Fowler, UVa 9/8/1 Introuction In this lecture, we ll erive the velocity istribution for two examples of laminar

More information

Reading: Ryden chs. 3 & 4, Shu chs. 15 & 16. For the enthusiasts, Shu chs. 13 & 14.

Reading: Ryden chs. 3 & 4, Shu chs. 15 & 16. For the enthusiasts, Shu chs. 13 & 14. 7 Shocks Reaing: Ryen chs 3 & 4, Shu chs 5 & 6 For the enthusiasts, Shu chs 3 & 4 A goo article for further reaing: Shull & Draine, The physics of interstellar shock waves, in Interstellar processes; Proceeings

More information

Example Optimization Problems selected from Section 4.7

Example Optimization Problems selected from Section 4.7 Example Optimization Problems selecte from Section 4.7 19) We are aske to fin the points ( X, Y ) on the ellipse 4x 2 + y 2 = 4 that are farthest away from the point ( 1, 0 ) ; as it happens, this point

More information

Analysis of Internet Topologies: A Historical View

Analysis of Internet Topologies: A Historical View Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,

More information

Digital barrier option contract with exponential random time

Digital barrier option contract with exponential random time IMA Journal of Applie Mathematics Avance Access publishe June 9, IMA Journal of Applie Mathematics ) Page of 9 oi:.93/imamat/hxs3 Digital barrier option contract with exponential ranom time Doobae Jun

More information

Given three vectors A, B, andc. We list three products with formula (A B) C = B(A C) A(B C); A (B C) =B(A C) C(A B);

Given three vectors A, B, andc. We list three products with formula (A B) C = B(A C) A(B C); A (B C) =B(A C) C(A B); 1.1.4. Prouct of three vectors. Given three vectors A, B, anc. We list three proucts with formula (A B) C = B(A C) A(B C); A (B C) =B(A C) C(A B); a 1 a 2 a 3 (A B) C = b 1 b 2 b 3 c 1 c 2 c 3 where the

More information

Analysis of Internet Topologies

Analysis of Internet Topologies Analysis of Internet Topologies Ljiljana Trajković ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British

More information

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES 1 st Logistics International Conference Belgrae, Serbia 28-30 November 2013 INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES Goran N. Raoičić * University of Niš, Faculty of Mechanical

More information

There are two different ways you can interpret the information given in a demand curve.

There are two different ways you can interpret the information given in a demand curve. Econ 500 Microeconomic Review Deman What these notes hope to o is to o a quick review of supply, eman, an equilibrium, with an emphasis on a more quantifiable approach. Deman Curve (Big icture) The whole

More information

Factoring Dickson polynomials over finite fields

Factoring Dickson polynomials over finite fields Factoring Dickson polynomials over finite fiels Manjul Bhargava Department of Mathematics, Princeton University. Princeton NJ 08544 manjul@math.princeton.eu Michael Zieve Department of Mathematics, University

More information

RUNESTONE, an International Student Collaboration Project

RUNESTONE, an International Student Collaboration Project RUNESTONE, an International Stuent Collaboration Project Mats Daniels 1, Marian Petre 2, Vicki Almstrum 3, Lars Asplun 1, Christina Björkman 1, Carl Erickson 4, Bruce Klein 4, an Mary Last 4 1 Department

More information

An introduction to the Red Cross Red Crescent s Learning platform and how to adopt it

An introduction to the Red Cross Red Crescent s Learning platform and how to adopt it An introuction to the Re Cross Re Crescent s Learning platform an how to aopt it www.ifrc.org Saving lives, changing mins. The International Feeration of Re Cross an Re Crescent Societies (IFRC) is the

More information

Security Vulnerabilities and Solutions for Packet Sampling

Security Vulnerabilities and Solutions for Packet Sampling Security Vulnerabilities an Solutions for Packet Sampling Sharon Golberg an Jennifer Rexfor Princeton University, Princeton, NJ, USA 08544 {golbe, jrex}@princeton.eu Abstract Packet sampling supports a

More information

Towards Modelling The Internet Topology The Interactive Growth Model

Towards Modelling The Internet Topology The Interactive Growth Model Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS

More information

Safety Stock or Excess Capacity: Trade-offs under Supply Risk

Safety Stock or Excess Capacity: Trade-offs under Supply Risk Safety Stock or Excess Capacity: Trae-offs uner Supply Risk Aahaar Chaturvei Victor Martínez-e-Albéniz IESE Business School, University of Navarra Av. Pearson, 08034 Barcelona, Spain achaturvei@iese.eu

More information

A Theory of Exchange Rates and the Term Structure of Interest Rates

A Theory of Exchange Rates and the Term Structure of Interest Rates Review of Development Economics, 17(1), 74 87, 013 DOI:10.1111/roe.1016 A Theory of Exchange Rates an the Term Structure of Interest Rates Hyoung-Seok Lim an Masao Ogaki* Abstract This paper efines the

More information

Inverse Trig Functions

Inverse Trig Functions Inverse Trig Functions c A Math Support Center Capsule February, 009 Introuction Just as trig functions arise in many applications, so o the inverse trig functions. What may be most surprising is that

More information