Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks

Size: px
Start display at page:

Download "Low-Complexity and Distributed Energy Minimization in Multi-hop Wireless Networks"

Transcription

1 Low-Complexity an Distribute Energy inimization in ulti-hop Wireless Networks Longbi Lin, Xiaojun Lin, an Ness B. Shroff Center for Wireless Systems an Applications (CWSA) School of Electrical an Computer Engineering, Purue University West Lafayette, IN 47907, USA {llin, linx, Abstract In this work, we stuy the problem of minimizing the total power consumption in a multi-hop wireless network subject to a given offere loa. It is well-known that the total power consumption of multi-hop wireless networks can be substantially reuce by jointly optimizing power control, link scheuling, an routing. However, the known optimal crosslayer solution to this problem is centralize, an with high computational complexity. In this paper, we evelop a lowcomplexity an istribute algorithm that is provably powerefficient. In particular, uner the noe exclusive interference moel, we can show that the total power consumption of our algorithm is at most twice as large as the power consumption of the optimal (but centralize an complex) algorithm. Our algorithm is not only the first such istribute solution with provable performance boun, but its power-efficiency ratio is also tighter than that of another sub-optimal centralize algorithm in the literature. Inex Terms Energy Aware Routing, Duality, athematical Programming/Optimization, Cross-Layer Optimization, Simulations I. INTRODUCTION There has been significant recent interest in eveloping control protocols for multi-hop wireless networks. any applications can benefit from the eployment of these networks. For instance, sensors can form multi-hop wireless networks for such applications as habitat monitoring [], an the management of sewer overflow events []. Vehicles can form multihop wireless networks to exchange safety messages an traffic information [3]. Wireless LAN evices can form multi-hop mesh networks to provie wireless broaban access [4]. A key issue in eveloping control protocols for multihop wireless networks is to reuce the energy or power consumption. This is obviously an important issue for batterypowere networks since the power consumption often limits the lifetime of the network. Even for networks with access to power sources, the transmission power of the communication links may still nee to be properly controlle, e.g., ue to health or regulatory concerns. In this work, we are intereste in the problem of minimizing the total power consumption of a multi-hop wireless network, subject to a given offere loa. It is well-known that the total power consumption of multi-hop wireless networks can be substantially reuce by jointly optimizing power control, link scheuling, an routing. However, known optimal solutions require centralize computation an high computational complexity. In this paper, we propose a new low-complexity an istribute solution to this problem uner a wiely-use interference moel, calle the noe-exclusive interference moel. Using this moel, the work in [5] evelope a centralize solution that yiele a 3-approximation ratio (the resultant power consumption is within a factor of 3 from the optimal power consumption). In contrast, in this paper, we will obtain a ( + ε)-approximation algorithm that is fully istribute, where ε > 0 is an arbitrarily small constant. To the best of our knowlege, our propose algorithm is the first istribute solution in the literature with a provable performance boun. Our solution approach is inspire by the recent progress in using imperfect scheuling algorithms to evelop istribute cross-layer congestion control an scheuling algorithms in multi-hop wireless networks. We first formulate the energy minimization problem into a special form that naturally leas to a istribute solution. We then map the solution to corresponing components of the cross-layer control protocols, an rigorously establish the power-efficiency of the resulting algorithm. Our work is also relate to the stuy of energy-aware routing protocols for minimizing energy consumption an extening network lifetime [6] [0]. These works assume that the system capacity is battery-limite instea of interference-limite an therefore o not consier scheuling constraints. In contrast, our work explicitly consiers scheuling, jointly with power control an routing. The intellectual contribution of this work is summarize as follows: We evelop a low-complexity an istribute joint routing, power control, an scheuling algorithm for multihop wireless networks with provable power-efficiency ratio. Further, our algorithm can guarantee a better powerefficiency level than some existing centralize algorithms. Our solution cannot be obtaine by extening the known optimal solution in the literature [], []. Instea, we evelop an optimization approach to the energy minimization problem that naturally leas to istribute solutions. We also evelop rigorous techniques to ientify the

2 convergence properties an quantify the power-efficiency of the resulte control protocol. The rest of this paper is organize as follows: in Section II, we present the system moel an formulate the energy minimization problem. In Section III, we present our algorithm an iscuss its implications. In Section IV, we iscuss our main result on the convergence properties an the power-efficiency of the ual algorithm. Numerical results are provie in Section V. Concluing remarks are presente in Section VI. II. PROBLE FORULATION We moel a wireless multi-hop network by a irecte graph G(V, E), where V is the set of vertices representing the noes, an E is the set of eges representing the communication links. We use N o (v) an N i (v) to enote the sets of outgoing an incoming links of noe v, respectively. Their union N(v) forms the set of all links incient on noe v. The system is time-slotte. We aopt the following noeexclusive interference moel that is use to characterize FH- CDA an UWB system with perfect orthogonal spreaing coes an low power-spectrum ensity. Uner this moel, a noe can only receive from or transmit to at most one noe at any time-slot m. Further, each link is power-controlle. That is, if noe-exclusiveness is satisfie, we assume that the possible ata rate of link e is a result of its power assignment, p e. We use h( ) to enote the power consumption of supporting ata rate of. It is assume that h( ) is a nonecreasing, convex function satisfying h(0) = 0. An example of h( ) is the power-rate relationship in an Aitive White Gaussian Noise (AWGN) channel. Other interference moels can be incorporate in this formulation, an we will iscuss this in Section VI. Each packet may take multiple hops to be elivere from source to estination. Let T v enote the long-term average ata rate of the flow that nees to be supporte from source noe v to estination noe. We use D to enote the set of estinations. The joint energy minimization problem is now formulate as follows: (*) min f, R lim subject to h( (m)), () m= e E R(m) satisfies noe-exclusiveness, m, f e = lim (m), e, () m= fe fe T v 0,, an v, (3) where the quantity fe can be interprete as the average amount of ata rate on link e allocate for estination. The constraints in () require that the long-term average ata rate, etermine by the power allocation, shoul be able to support the total average ata rate ( f e ) on each link. The constraints in (3) require that the total outgoing flow of a noe shoul be able to support the total incoming an locally generate flow, for all estinations. Note that we use as a shorthan notation for all noes belonging to D, the set of estinations. We will refer to the above problem as Problem ( ). III. SOLUTION ETHODOLOGY A. Approximating the Energy inimization Problem The optimal solutions evelope in [], [] attempt to solve Problem ( ). However, their solutions contain a scheuling component with high computational complexity. In orer to compute at which power an at what time each link e shoul be activate, these solutions nee to solve a complex global optimization problem in each time-slot. In this paper, in orer to obtain a low-complexity an istribute solution, we take a ifferent approach. We first approximate ( ) by another optimization problem that is easier to solve. The following Lemma [5] provies the first step in this irection. Lemma : For all time-slot m when link e is activate, the instantaneous ata rate (m) is inepenent of m in any power-optimal scheme. It is worth noting that (m) = hols when link e is activate. As a result, lim m= (m) is equal to the prouct of an the frequency that link e is activate. Therefore, by (), the objective function of Problem ( ) can now be written as f e h( ), f e e E where is the fraction of time-slots that link e is activate. Further, using the results from low-complexity scheuling [3], we have Fact : In the optimal solution to ( ), we must have f e, v V. Fact : Uner the noe-exclusive interference moel, if f e η, v V, where η > 0 is an arbitrarily small number, then a maximal scheule can be compute such that each link is activate for f e fraction of time-slots [4], [5]. We will iscuss more about the role of maximal scheuling in our solution in Section III-D. Base on these two facts, in the rest of the paper, we will replace the scheuling constraints by f e β, v V. (4)

3 Problem ( ) can then be reformulate as the following problem: (A) min f e f, R h( ), (5) e E subject to (3) an (4) ( f, R) X, where X = {( f, R) : 0, f e 0, e, }. The formulation in (A) is not only easier to solve, but it also prouces natural bouns for proving the power efficiency ratio of our solution. Inee, solving (A) with β = provies a lower boun on the minimum power of ( ), while β = η provies an upper boun. Remark: This problem appears in the formulation of [5]. However, our solution is ifferent from this point on. As we mentione earlier, their solution is a centralize one with an approximation ratio of 3, while our solution is a istribute one with a better approximation ratio. B. Hanling the Non-Convexity In Problem (A), the objective function an constraints (4) are non-convex. Problems of this type are consiere to be ifficult in general. To overcome this ifficulty, the following change of variable is performe: t e = f e, e E. The physical meaning of t e is the fraction of time-slots that link e is activate. It can also be interprete as the loa on link e. The latter interpretation seems more appropriate when we eal with t e (m) for each time-slot in the ual solution. Note that t e = 0 implies that fe = 0 for any estination an any link e: if a link is not activate (or the loa is zero), it cannot support any non-zero ata rate. The long-term average power consumption Θ from link e can therefore be efine as { 0, Θ( f te = 0, e, t e ) = t e h( f (6) e t e ), t e > 0. Using the above notation, Problem (A) can be transforme into (B) min f, t subject to Θ( f e, t e ), (7) e E t e β, v V, (8) f e f e T v 0,, an v, (9) ( f, t) Y, where Y = {( f, t) : fe 0, e, ; 0 t e, f e at e, e, for some a 0}. Remark: The conition f e at e, for some a 0, in the efinition of Y is require to guarantee that the optimal solution from Problem (B) can be transforme to the optimal solution of Problem (A). Without this conition, Problem (B) can be trivially solve by setting t = 0 an f large enough for the flow constraint. Such a solution cannot be transforme to an optimal solution of Problem (A), since the instantaneous ata rate R must be finite. To show that there is no uality gap in solving Problem (B), we nee the following Lemma: Lemma : Let θ(f, t) = { 0, t = 0, th( f t ), t > 0. (0) If h( ) is a convex function on R +, then θ(f, t) is also convex on C = a [0,+ ) {(f, t) : 0 f at, t 0}. In our online technical report [6], we have inclue a proof of Lemma. Remark: A function of the form g(f, t) = th( f t ), where t > 0 is known as the perspective of function h(f). As shown in [7, p89], the perspective operation is one of the transformations that preserve convexity. The transformation in the above Lemma inclues the t = 0 case, an therefore can be viewe as a slightly generalize version of the perspective operation. Our proof in [6] takes a ifferent approach than [7]. Note that θ is non-convex over the entire R + R +. However, the convexity of θ over C is enough for our purpose, since ( f, t) Y in Problem (B). Due to Lemma, the objective function Θ( f, t) of (B) is convex, an the entire problem is a convex program. We can then use the uality approach to solve the problem. C. Distribute Algorithm Base on Lagrange Duality To use the uality approach to solve the above problem, we first form the Lagrangian: L( f, t, µ, q) µ v = Θ( f e, t e ) + e E v V qv fe v, t e β fe T v, where µ 0 an q 0 are the Lagrange multipliers, an f e = {fe } D. For ease of notation, we efine q = 0, for all. By rearranging the orer of summation, the above equation can be transforme into the following: = e E L( f, t, µ, q) c e ( f e, t e ) β v µ v + v, (q vt v ),

4 where c e ( f e, t e ) = Θ( f e, t e ) + (µ x(e) + µ r(e) )t e (q x(e) q r(e) )f e, () an x(e) an r(e) are the transmission noe an reception noe of link e, respectively. The ual objective function is = min D( µ, q) ( f, t) Y = e E [ L( f, t, µ, q), min c e ( f e, t e ) ( f e,t e) Y e ] β v µ v + v, (q vt v ), () where Y e enotes the constraint set on link e, namely Y e = {( f e, t e ) : 0 fe H, ; 0 t e ; fe at e, for some a 0}. (3) To ensure convergence, we have ae fe H, where H is a large constant to be etermine later. See the proof of Theorem 4 (in Appenix) for etails. The minimization of the Lagrangian can now be ecompose into a minimization on each link. Note that all the information neee in minimizing c e ( f e, t e ) is local to link e. The ual optimization problem is (C) max D( µ, q). (4) µ 0, q 0 As mentione before, the convexity of Θ( f, t) can be inferre from Lemma. Base on this, the following Theorem [6] establishes the relationship between the primal problem (B) an the ual problem (C) above. Due to space constraint, we state it without proof. Theorem 3: (Strong Duality) Problem (B) is feasible an its optimal value Θ is finite. Further, there is no uality gap: Θ can be foun by solving its ual optimization problem. The next step is to solve the ual problem in a istribute fashion. We can show that D( µ, q) is convex an its subgraient is given by D µ v = D q v = t e β, f e fe T v. We can then use the following subgraient metho to solve the ual problem. Distribute Energy inimization Algorithm At each iteration m, ) At link e, the ata rate f e an the link assignment t e are etermine by: ( f e (m), t e (m)) = argmin c e ( f e, t e, m) ( f e,t e) Y e = argmin ( f e,t e) Y e [ Θ( f e, t e ) + (µ x(e) (m) + µ r(e) (m))t e (q x(e) (m) q r(e) (m))f e ]. (5) ) At noe v, the ual variables are upate by: µ v (m + ) = µ v(m) + α m t e (m) β qv(m + ) = q v(m) α m f e (m) fe (m) T v + + (6). (7) Remark: At each iteration m, the ata rate an scheule are chosen to minimize the total cost c e, given the current implicit costs ( µ, q). To maximize the ual objective function, the ual variables are upate accoring to the subgraient ascent proceure in (6) an (7), where {α m } are the stepsizes. In the above algorithm, we use the same stepsize for µ an f at each iteration. This is simply for ease of notation: the stepsizes can be ifferent for each ual variable. Since the primal cost function is not strictly convex, the ual function may not be ifferentiable. The stepsizes nee to be chosen carefully to guarantee the convergence of the ual variables. We will iscuss this issue in the Section IV. The above exercise of using Lagrange uality is stanar. Nonetheless, there are some questions that are not answere by the above algorithm alone. One of them is how the algorithm maps to ifferent protocol components. We will now stuy this problem. D. apping to Network Protocol Components To ecie the routing an scheuling, each link solves (5) by minimizing c e ( f e, t e, m). Note that there are three components in c e ( f e, t e, m): The term Θ( f e, t e ) is the power cost, i.e., the power consumption of supporting an average ata rate of f e while link e being activate for t e fraction of time. The term (µ x(e) (m) + µ r(e) (m))t e is the scheuling cost. We will show that t e (m) will either be 0 or in orer for link e to minimize c e ( f e, t e ). If t e (m) is chosen to be, then µ x(e) (m + ) µ x(e) (m) from (6): scheuling the transmission on link e gives rise to increase (or at least the same) scheuling costs on the

5 transmission/reception noes. If t e (m) is chosen to be 0, then µ x(e) (m + ) µ x(e) (m): an ile link gives the system more flexibility in scheuling other links, which leas to a potential ecrease in the scheuling costs on the transmission/reception noes. The term (q x(e) (m) q r(e) (m))f e is the utility of supporting the total ata rate on link e. The term q v can be interprete as an approximation of the scale version of the queue length at noe v for estination if constant stepsizes are use [4], [8]. As in (7), if f e (m) > 0, it helps to reuce the workloa at the transmission noe, but a to the workloa at the reception noe. The following transformation leas to a better unerstaning of the minimization of c e ( f e, t e ): f e (m) = R e(m)t e (m), (8) where R e(m) is the instantaneous ata rate allocate on link e for estination, an f e (m) is the resultant average ata rate when transmitting for t e (m) fraction of the time. Substitute the above equation into c e ( f e, t e, m), we have (all time inex roppe for ease of notation): where l e ( ) is efine as l e ( ) = h( c e ( f e, t e ) = t e l e ( ), (9) R e) + (µ x(e) + µ r(e) ) [ ] (qx(e) q r(e) ). (0) Since t e 0, to minimize (9), we shoul first minimize l e ( ) as a function of. Note that function h( ) takes as input parameter the sum of the ata rates allocate for all the estinations on this link. In other wors, from the viewpoint of power consumption, it is inifferent which estination the ata rate is allocate for, as long as the total ata rate is the same. As a result, the minimum of l e ( ) is attaine when all the ata rates are allocate to the estination with the maximum positive backlog ifference. Let ˆ = argmax(qx(e) q r(e) ), () then R ˆ > 0 if (q ˆ x(e) q ˆ r(e) ) > 0, an R e = 0 for all ˆ. With this observation, the minimization of l e ( ) is relatively simple. For example, if h(x) = e x, an max (q x(e) qr(e) ) > 0, then R ˆ e = [log(q ˆ x(e) q ˆ r(e) )] +, an Re = 0 for all other estination. Now that R e has been chosen to minimize l e ( R e ) in (0), the next step is to etermine the value of t e over the interval [0, ] to minimize c e ( f e, t e ) = t e l e ( R e ). Clearly, the optimal t e value is ˆt e = {, if min Re l e ( R e ) 0, 0, if min Re l e ( R e ) > 0. () Remark: There are two possible scenarios where ˆt e = 0 (no loa is assigne in this time-slot): All backlog ifferences (qx(e) q r(e) ) are negative, which means the utility oes not increase by transporting ata to next hop on this link for any estination. Although some backlog ifferences (qx(e) q r(e) ) are positive, as in (0), the utility of transporting ata to next hop is not large enough to outweigh the importance of saving more energy (the h( ) term) an/or the nee to gain more flexibility in scheuling (the (µ x(e) + µ r(e) ) term). As a result, optimal l e ( R e ) is non-negative, an no loa is assigne to this link. To summarize, the minimization of c e ( f e, t e ) on each link naturally translates into the following protocol components: ) Routing: Choose only the flow ˆ with maximum positive backlog ifference (cf. ()). This is the flow that shoul receive service. ) Power control: Choose R e to minimize l e ( R e ). This is the power link e shoul use. 3) Link assignment: Choose t e to minimize t e l e ( R e ) in such a way that t e takes its maximum value if the optimal l e ( R e ) is less than or equal to 0; an 0 otherwise. This etermines the amount of time link e shoul be on. 4) aximal Scheuling: As mentione before, given the fraction of up-time, or loa, on each link, a scheuling component is neee to etermine the exact time-slots link e shoul be on. In other wors, the link assignment from previous step may have scheuling conflicts, an therefore cannot be use as a transmission scheule as it is. A scheuling component can resolve such conflicts by elaying the transmission by a certain number of time-slots. Clearly, given the link assignment t(m), the elay can be ifferent for ifferent links. With the noeexclusive interference moel, by choosing β = η, it can be shown that a scheuling policy base on maximal matching can stabilize the system (i.e., the elay of transmission mentione above is boune) [4], [5], [9] []. aximal scheules such as this can be implemente in a istribute fashion. We refer reaers to [3] for more etails on the istribute implementation of maximal scheules. As we have seen thus far, the uality approach exploits the problem structure an ecomposes the primal problem into sub-problems on each link that are much simpler. In aition, some of the quantities prouce/monitore by this algorithm actually help network engineering. For instance, the Lagrange multiplier qv can also be interprete as the shaow price of the corresponing constraint. If a small change occurs in the amount of supporte traffic from noe v to noe, qv measures the sensitivity of the optimal power consumption with respect to this perturbation. In a ifferent networking setting where the network has some control over the traffic matrix T, information such as q can be use as guielines to optimize power consumption.

6 IV. PERFORANCE ANALYSIS In this section, first we are intereste in the following question: Uner what conition o the ual variables in the Distribute Energy inimization algorithm converge? Furthermore, as we have seen in Section III, there is no guarantee that ( f(m), t(m)) will converge, even if the ual variables converge. For example, t e (m) is either 0 or from the istribute ual algorithm. A natural question to ask then is the following: In what sense is the primal solution optimal? The two Theorems below answer both of the above questions from two ifferent perspectives. A. Convergence Result with Constant Stepsizes The following theorem establishes the stability an the optimality of the propose ual algorithm. Theorem 4: (Stability an Optimality) Let the stepsizes in the Distribute Energy inimization algorithm be constant, i.e., α m = h, for all m. Let Φ be the set of ( µ, q) that maximizes D( µ, q), an (( µ, q), Φ) = min ( µ, q ) Φ ( µ, q) ( µ, q ). Given any ε > 0, there exists some h 0 > 0 such that, for any h h 0 an any initial implicit costs ( µ 0, q 0 ), there exists a time 0 such that for all m > 0, (( µ(m), q(m)), Φ) < ε, (3) an lim sup m m m Θ( f e (τ), t e (τ)) < Θ + ε. (4) τ= e E The proof of Theorem 4 is inclue in the Appenix. The above Theorem shows that, when stepsizes are small, the ual variables eventually converge to within a small neighborhoo of the optimal ual solution. Further, the power consumption from the istribute algorithm is asymptotically optimal: although the primal variables ( f(m), t(m)) may not converge, by using ( f(m), t(m)) for each time-slot m, the long-term average of the resultant power consumption is arbitrarily close to the optimal power consumption. B. Optimality of Primal Variables As shown in Theorem 4, with constant stepsizes, the ual variables eventually converge to within a small neighborhoo of the optimal ual solution. When appropriate iminishing stepsizes are use in the ual algorithm, the following Theorem shows that the entire sequence of the ual variables converges to one point. In this case, we also obtain a ifferent interpretation of the primal optimality. Theorem 5: (Primal Optimality with Diminishing Stepsizes) (a) Let the stepsizes {α m } in the Distribute Energy inimization algorithm satisfy the following conitions: αm < +, α m = +. (5) m= m= Then for any nonnegative starting point ( µ 0, q 0 ), the ynamics of the Distribute Energy inimization algorithm converges to the optimal value of Problem (B): lim m ( µ, q ), (6) lim m Θ, (7) where ( µ, q ) is a maximum point of D( µ, q). (b) Let the stepsizes {α m } be chosen as α m = κ m + ρ, (8) where κ an ρ are some positive scalars (note that the above efinition of {α m } satisfies the conitions (5)). If the longterm average of the vector ( f(m), t(m)) converges, i.e., lim f(m) = f, m= lim t(m) = t, (9) m= then the time-average version of ( f(m), t(m)) is the optimal solution to Problem (B): e E Θ( f e, t e) = Θ. The proof of Theorem 5 is inclue in our online technical report [6]. Remark: In the Distribute Energy inimization algorithm, t e (m), for example, can only be 0 or. From this perspective, our solution carries the same flavor as some of the relate work [], [4], namely, in the optimal solution, the resource, be it power or fraction of up-time, is use to the maximum extent, if the link is activate for the current time-slot. However, one woul expect the optimal solution of t e to Problem (B) to be a number anywhere from 0 to β for most of the links in a typical setting (cf. (8)). Theorem 5 reconciles the ifference between these two viewpoints. Although ( f(m), t(m)) is not a continuous mapping from the unerlying converging implicit costs (ual variables ( µ, q)), as long as the long-term average of primal variables ( f(m), t(m)) converges, the limit is an optimal solution to the primal problem. C. Power-Efficiency Ratio Setting β = or β = η in (4) gives necessary or sufficient conitions for scheulability, in terms of stabilizing the overall queueing system [4], [3]. From the necessary conition of β =, it is evient that the maximum loss in throughput uner the noe exclusive interference moel is η. This is the throughput loss ratio in approximating ( ) using Problem (B) with β = η. To erive the approximation ratio of our algorithm, the throughput loss nees to be translate into power loss. We apply the same first orer approximation of the rate-power function as in [5]. ore specifically, in an AWGN channel, the total power consumption can be approximate as B e e t e, where B e is a flow-relate constant inepenent of t e. Let ( f, t) be the optimal solution to Problem (B) with β =. It is evient that ( f, t +ε ), where ε is a small positive constant, is a feasible solution to Problem (B) with β = η. This feasible solution results in a power consumption that is at most (+ε)

7 TABLE I THE TWO FLOWS SUPPORTED BY THE NETWORK source estination ata rate paths flow 7 50 kbps -7, --7 flow kbps 3--6, Total Power (mw) Distribute Algorithm Offline Computation Time (secon) Power consumption from istribute algorithm an offline computa- Fig.. tion Fig.. Network topology that of the optimal value with β =. Since the optimal value of Problem (B) with β = is a lower boun on the minimum power from ( ), we conclue that the power-efficiency ratio of our algorithm is upper-boune by ( + ε). V. NUERICAL RESULTS In this illustrative example, we consier a 7-noe network, whose topology is epicte in Figure. The power-rate function is of the following form: [ = W log + σ ] ep e, N 0 W where W =.0 Hz is the available banwith, σ e = is the channel gain of link e, N 0 = mw/hz is the noise spectral ensity, p e is the transmission power, an is the resultant instantaneous ata rate of link e. This network supports two flows, as shown in Table I. The noe-exclusive interference moel is consiere, an β = ( ) in Problem (A). The length of each timeslot is secon. The results reporte in this section are the average over a moving time winow of length 0 secons. To show that the joint energy minimization algorithm can aapt to variations in the input parameters, we apply the following changes in the system setting. At time t = 4000s, the channel gain σ (,7) of the irect link between noe an noe 7 is ecrease from to At time t = 8000s, the ata rate of flow (from noe 3 to noe 6) is reuce from 500 kbps to 50 kbps. For each setting, offline computation is carrie out to fin the optimal value of Problem (A), which is given by the ashe line in Figure. The power consumption from the propose algorithm is shown as the soli line in the same figure. This simulation result shows that the Distribute Energy inimization algorithm is capable of computing the optimal solution to Problem (A) in a istribute manner, an Average Data Rate (kbps) Fig Link (,7): flow Link (,): flow Link (3,): flow Link (3,4): flow Time (secon) Average ata rates for ifferent flows on four links automatically tracking the optimal operating point once the system parameters change. Figure 3 shows the average ata rates f e for ifferent flows on four links. We now take a closer look at the routing of the flows. In the initial state, flow concentrates on the minimum energy path, namely, link (, 7). At t = 4000s, the channel gain σ (,7) reuces by 75%, an part of flow is shifte to path 7. Since the scheuling capacity of noe is saturate, a larger percentage of flow is then route through path At t = 8000s, the traffic that the network has to support between noe 3 an noe 6 reuces (flow is reuce to 50 kbps). As a consequence, part of the scheuling capacity of noe is free, an more of flow takes path 7 to reuce the overall power consumption. The above example shows that the interaction between routing, scheuling, an power control is relatively complex even in a wireless network of small size. The correct way to eal with such interaction is ifficult to summarize into general approaches such as minimum energy approach or loa balancing approach. In our Distribute Energy inimization algorithm, as shown in Figure an Figure 3, low-complexity

8 an istribute operation on each link accomplishes this joint optimization even in networks with non-stationarity. VI. CONCLUSION In this paper, we propose a joint power control, link scheuling, an routing algorithm to minimize the power consumption in multi-hop wireless networks. The known crosslayer solution to this problem is centralize, an with high computational complexity. In contrast, our algorithm is istribute, an with low computational complexity. We establish the power efficiency ratio of our istribute solution, an show that it is provably tighter than the power efficiency ratio of a centralize solution in the literature. We map our solution to corresponing components of the cross-layer control protocols, an iscuss the implication of our result on network protocol esign. The stability an optimality of our solution is verifie via simulations. In this work, we focus on the well-stuie noe exclusive interference moel. In a more general interference moel, we can efine Γ e to be the set of links that interfere with link e. (The noe-exclusive moel can be viewe as a special case with Γ e = N(x(e)) N(r(e)).) Let ω e enote the maximum number of links that can be scheule simultaneously in Γ e, an ωmax = max e ω e. It can be shown that a istribute maximal scheule can stabilize the system while the throughput is reuce by at most a factor of /ωmax. In this case, the left han sie of the scheuling constraint (8) in our problem formulation nee to be moifie accoringly [9] []. Nonetheless, the general methoology presente in this paper can be carrie through to this type of interference moel. APPENDIX Proof of Theorem 4: The proof technique here is similar to []. We first show the bouneness of the subgraient of the ual objective function. In (3), we choose H V max v T v, where V is the number of noes in the network. Let Ȳ enote the Cartesian prouct of all Y e in (3). It is clear that Ȳ Y, where Y is efine in Problem (B). Note that the introuction of H oes not change the solution. The optimal solution ( f, t ) to Problem (B) is in Ȳ for the following reason: Θ is a non-ecreasing function of fe, an therefore any ( f, t) with fe > H for some an e is clearly suboptimal even if all the traffic is route through link e. So the solution generate from the Distribute Energy inimization algorithm coincies with the optimal solution to Problem (B). The benefit from enforcing such an upper boun on fe is that the subgraient of the ual objective function is then boune. Given the subgraient of the ual objective function is boune, it can be shown [4] that, given any ε > 0, there exists some h > 0 such that, for any h h an any initial implicit costs ( µ 0, q 0 ), there exists a time 0 such that (3) hols for all m > 0. Therefore, as time inex m increases, ( µ(m), q(m)) converges to within a small neighborhoo of the set of the maximizer of D( µ, q) if the constant stepsize is chosen to be small enough. This implies that the sequence {( µ(m), q(m))} m is boune. To show (4), we consier the following Lyapunov function: V ( µ(m), q(m)) = [q v(m)] + µ v(m). v, The subgraient of D( µ, q) at time-slot m can be written as µ v (m) = t e (m) β, qv(m) = f e (m) v fe (m) T v. Using the above notation, the one-step rift of the Lyapunov function can be calculate as follows: V ( µ(m + ), q(m + )) V ( µ(m), q(m)) = { [ (µ v (m) + h µ v (m)) +] } µ v(m) v + { [(q v(m) + h qv(m) ) ] + [ q v (m) ] } v, (from (6) an (7)) { } [µ v (m) + h µ v (m)] µ v(m) v + { [q v (m) + h qv(m) ] [ q v (m) ] } h v v, µ v (m) µ v (m) + h v, q v(m) q v(m) + h W, where W is a constant large enough to guarantee the last inequality. It is possible to choose such a constant since the subgraient of D( µ, q) is boune. Aing h e E Θ( f e (m), t e (m)) to both sies of the above formula, we have V ( µ(m + ), q(m + )) V ( µ(m), q(m)) +h e E Θ( f e (m), t e (m)) h [ Θ( f e (m), t e (m)) + e E v + v, qv(m) q v(m) + h W = hd( µ(m), q(m)) + h W (from () an (5)) hd + h W = hθ + h W, µ v (m) µ v (m) where D is the maximum ual value, which is also equal to the minimum power Θ from the primal problem.

9 Summing the above inequality over m =,,...,, an iviing both sies by, we have V ( µ( + ), q( + )) V ( µ(), q()) + h Θ( f e (m), t e (m)) m= e E hθ + h W. (30) Note that all V ( ) is boune since the sequence {( µ(m), q(m))} m is boune. For any given ε > 0, the first term on the LHS of (30) can be boune by ε/ for large enough: Θ( f e (m), t e (m)) Θ + hw + ε. m= e E For any given ε > 0, there exist some h > 0 such that hw < ε/ for all h < h. Uner this conition, the following is evient: lim sup Θ( f e (m), t e (m)) < Θ + ε. m= e E Let h 0 = min(h, h ), an Theorem 4 follows. REFERENCES [] Intel Research Laboratory at Berkeley, Habitat monitoring on great uck islan, 00, available on [] T. P. Ruggaber an J. W. Talley, Detection an control of combine sewer overflow events using embee sensor network technology, in Worl Water Congress, Anchorage, Alaska, ay 005. [3] J. Luo an J.-P. Hubaux, A survey of inter-vehicle communication, EPFL, Lausanne, Switzerlan, Tech. Rep., 004. [4] I. F. Akyiliz, X. Wang, an W. Wang, Wireless mesh networks: a survey, Computer Networks, vol. 47, no. 4, pp , 005. [5] R. Bhatia an. Koialam, On power efficient communication over multi-hop wireless networks: Joint routing, scheuling an power control, in IEEE INFOCO 04, Hong Kong, ar [6] K. Kar,. Koialam, T. V. Lakshman, an L. Tassiulas, Routing for network capacity maximization in energy-constraine a-hoc networks, IEEE INFOCO 03, 003. [7] Q. Li, J. A. Aslam, an D. Rus, Online power-aware routing in wireless a-hoc networks, in Proc. the Seventh Annual International Conference on obile Computing an Networking (AC obicom 0), 00, pp [8] L. Lin, N. B. Shroff, an R. Srikant, Energy-aware routing in sensor networks: A large systems approach, in the Thir Annual Conference on Wireless On eman Network Systems an Services (WONS), Les enuires, France, Jan [9] C.-K. Toh, aximum battery life routing to support ubiquitous mobile computing in wireless a hoc networks, IEEE communications agazine, vol. 39, no. 6, pp , June 00. [0] Y. Xue, Y. Cui, an K. Nahrstet, A utility-base istribute maximum lifetime routing algorithm for wireless networks, in QSHINE, Los Alamitos, CA, USA, 005. [] R. L. Cruz an A. V. Santhanam, Optimal Routing, Link Scheuling an Power Control in ulti-hop Wireless Networks, in Proceeings of IEEE INFOCO, San Francisco, April 003. []. J. Neely, Energy Optimal Control for Time Varying Wireless Networks, IEEE Transactions on Information Theory, vol. 5, no., pp , July 006. [3] X. Lin, N. B. Shroff, an R. Srikant, A Tutorial on Cross-Layer Optimization in Wireless Networks, IEEE Journal on Selecte Areas in Communications, vol. 4, no. 8, pp , Aug [4] X. Lin an N. B. Shroff, The Impact of Imperfect Scheuling on Cross- Layer Rate Control in ultihop Wireless Networks, in Proceeings of IEEE INFOCO, iami, FL, arch 005. [5], The Impact of Imperfect Scheuling on Cross-Layer Congestion Control in Wireless Networks, IEEE/AC Transactions on Networking, vol. 4, no., pp , 006. [6] L. Lin, X. Lin, an N. B. Shroff, Low-complexity an istribute energy minimization in multi-hop wireless networks, Purue University, Tech. Rep., 006, available on llin/paper/ tech06.pf. [7] S. Boy an L. Vanenberghe, Convex Optimization. New York, NY, USA: Cambrige University Press, 004. [8] X. Lin an N. B. Shroff, Joint Rate Control an Scheuling in ultihop Wireless Networks, in Proceeings of the IEEE Conference on Decision an Control, Paraise Islan, Bahamas, December 004. [9] P. Chaporkar, K. Kar, an S. Sarkar, Throughput Guarantees in aximal Scheuling in Wireless Networks, in Proceeings of 43 Annual Allerton Conference on Communication, Control an Computing, onticello, IL, September 005. [0], Achieving Queue Length Stability Through aximal Scheuling in Wireless Networks, in Proceeings of Information Theory an Applications Inaugural Workshop, University of California, San Diego, February 006. [] X. Wu an R. Srikant, Bouns on the Capacity Region of ultihop Wireless Networks Uner Distribute Greey Scheuling, in Proceeings of IEEE INFOCO, Barcelona, Spain, April 006. [] X. Wu, R. Srikant, an J. R. Perkins, Queue-Length Stability of aximal Greey Scheules in Wireless Network, in Proceeings of Information Theory an Applications Inaugural Workshop, University of California, San Diego, February 006. [3] B. Hajek an G. Sasaki, Link Scheuling in Polynomial Time, IEEE Transactions on Information Theory, vol. 34, no. 5, pp , September 988. [4] D. Bertsekas, A. Neic, an A. E. Ozaglar, Convex Analysis an Optimization. Nashua, NH: Athena Scientific, 003.

On Adaboost and Optimal Betting Strategies

On Adaboost and Optimal Betting Strategies On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore

More information

10.2 Systems of Linear Equations: Matrices

10.2 Systems of Linear Equations: Matrices SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix

More information

Sensitivity Analysis of Non-linear Performance with Probability Distortion

Sensitivity Analysis of Non-linear Performance with Probability Distortion Preprints of the 19th Worl Congress The International Feeration of Automatic Control Cape Town, South Africa. August 24-29, 214 Sensitivity Analysis of Non-linear Performance with Probability Distortion

More information

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments 2012 IEEE Wireless Communications an Networking Conference: Services, Applications, an Business Game Theoretic Moeling of Cooperation among Service Proviers in Mobile Clou Computing Environments Dusit

More information

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION MAXIMUM-LIKELIHOOD ESTIMATION The General Theory of M-L Estimation In orer to erive an M-L estimator, we are boun to make an assumption about the functional form of the istribution which generates the

More information

Math 230.01, Fall 2012: HW 1 Solutions

Math 230.01, Fall 2012: HW 1 Solutions Math 3., Fall : HW Solutions Problem (p.9 #). Suppose a wor is picke at ranom from this sentence. Fin: a) the chance the wor has at least letters; SOLUTION: All wors are equally likely to be chosen. The

More information

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sewoong Oh an Anrea Montanari Electrical Engineering an Statistics Department Stanfor University, Stanfor,

More information

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions A Generalization of Sauer s Lemma to Classes of Large-Margin Functions Joel Ratsaby University College Lonon Gower Street, Lonon WC1E 6BT, Unite Kingom J.Ratsaby@cs.ucl.ac.uk, WWW home page: http://www.cs.ucl.ac.uk/staff/j.ratsaby/

More information

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations This page may be remove to conceal the ientities of the authors An intertemporal moel of the real exchange rate, stock market, an international ebt ynamics: policy simulations Saziye Gazioglu an W. Davi

More information

Web Appendices of Selling to Overcon dent Consumers

Web Appendices of Selling to Overcon dent Consumers Web Appenices of Selling to Overcon ent Consumers Michael D. Grubb A Option Pricing Intuition This appenix provies aitional intuition base on option pricing for the result in Proposition 2. Consier the

More information

A Data Placement Strategy in Scientific Cloud Workflows

A Data Placement Strategy in Scientific Cloud Workflows A Data Placement Strategy in Scientific Clou Workflows Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen Faculty of Information an Communication Technologies, Swinburne University of Technology Hawthorn, Melbourne,

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS Contents 1. Moment generating functions 2. Sum of a ranom number of ranom variables 3. Transforms

More information

Firewall Design: Consistency, Completeness, and Compactness

Firewall Design: Consistency, Completeness, and Compactness C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,

More information

Modelling and Resolving Software Dependencies

Modelling and Resolving Software Dependencies June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software

More information

Data Center Power System Reliability Beyond the 9 s: A Practical Approach

Data Center Power System Reliability Beyond the 9 s: A Practical Approach Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical

More information

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market RATIO MATHEMATICA 25 (2013), 29 46 ISSN:1592-7415 Optimal Control Policy of a Prouction an Inventory System for multi-prouct in Segmente Market Kuleep Chauhary, Yogener Singh, P. C. Jha Department of Operational

More information

State of Louisiana Office of Information Technology. Change Management Plan

State of Louisiana Office of Information Technology. Change Management Plan State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change

More information

Web Appendices to Selling to Overcon dent Consumers

Web Appendices to Selling to Overcon dent Consumers Web Appenices to Selling to Overcon ent Consumers Michael D. Grubb MIT Sloan School of Management Cambrige, MA 02142 mgrubbmit.eu www.mit.eu/~mgrubb May 2, 2008 B Option Pricing Intuition This appenix

More information

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.

This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination. IEEE/ACM TRANSACTIONS ON NETWORKING 1 A Greedy Link Scheduler for Wireless Networks With Gaussian Multiple-Access and Broadcast Channels Arun Sridharan, Student Member, IEEE, C Emre Koksal, Member, IEEE,

More information

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,

More information

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems *

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems * GPRS performance estimation in GSM circuit switche serices an GPRS share resource systems * Shaoji i an Sen-Gusta Häggman Helsinki Uniersity of Technology, Institute of Raio ommunications, ommunications

More information

Unbalanced Power Flow Analysis in a Micro Grid

Unbalanced Power Flow Analysis in a Micro Grid International Journal of Emerging Technology an Avance Engineering Unbalance Power Flow Analysis in a Micro Gri Thai Hau Vo 1, Mingyu Liao 2, Tianhui Liu 3, Anushree 4, Jayashri Ravishankar 5, Toan Phung

More information

An Introduction to Event-triggered and Self-triggered Control

An Introduction to Event-triggered and Self-triggered Control An Introuction to Event-triggere an Self-triggere Control W.P.M.H. Heemels K.H. Johansson P. Tabuaa Abstract Recent evelopments in computer an communication technologies have le to a new type of large-scale

More information

Search Advertising Based Promotion Strategies for Online Retailers

Search Advertising Based Promotion Strategies for Online Retailers Search Avertising Base Promotion Strategies for Online Retailers Amit Mehra The Inian School of Business yeraba, Inia Amit Mehra@isb.eu ABSTRACT Web site aresses of small on line retailers are often unknown

More information

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES 1 st Logistics International Conference Belgrae, Serbia 28-30 November 2013 INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES Goran N. Raoičić * University of Niš, Faculty of Mechanical

More information

Dynamic Network Security Deployment Under Partial Information

Dynamic Network Security Deployment Under Partial Information Dynamic Network Security Deployment Uner Partial nformation nvite Paper) George Theoorakopoulos EPFL Lausanne, Switzerlan Email: george.theoorakopoulos @ epfl.ch John S. Baras University of Marylan College

More information

The most common model to support workforce management of telephone call centers is

The most common model to support workforce management of telephone call centers is Designing a Call Center with Impatient Customers O. Garnett A. Manelbaum M. Reiman Davison Faculty of Inustrial Engineering an Management, Technion, Haifa 32000, Israel Davison Faculty of Inustrial Engineering

More information

Safety Stock or Excess Capacity: Trade-offs under Supply Risk

Safety Stock or Excess Capacity: Trade-offs under Supply Risk Safety Stock or Excess Capacity: Trae-offs uner Supply Risk Aahaar Chaturvei Victor Martínez-e-Albéniz IESE Business School, University of Navarra Av. Pearson, 08034 Barcelona, Spain achaturvei@iese.eu

More information

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan mario.cagal@epfl.ch Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan

More information

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection Towars a Framework for Enterprise Frameworks Comparison an Selection Saber Aballah Faculty of Computers an Information, Cairo University Saber_aballah@hotmail.com Abstract A number of Enterprise Frameworks

More information

Differentiability of Exponential Functions

Differentiability of Exponential Functions Differentiability of Exponential Functions Philip M. Anselone an John W. Lee Philip Anselone (panselone@actionnet.net) receive his Ph.D. from Oregon State in 1957. After a few years at Johns Hopkins an

More information

Coalitional Game Theoretic Approach for Cooperative Transmission in Vehicular Networks

Coalitional Game Theoretic Approach for Cooperative Transmission in Vehicular Networks Coalitional Game Theoretic Approach for Cooperative Transmission in Vehicular Networks arxiv:.795v [cs.gt] 8 Feb Tian Zhang, Wei Chen, Zhu Han, an Zhigang Cao State Key Laboratory on Microwave an Digital

More information

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany Parameterize Algorithms for -Hitting Set: the Weighte Case Henning Fernau Trierer Forschungsberichte; Trier: Technical Reports Informatik / Mathematik No. 08-6, July 2008 Univ. Trier, FB 4 Abteilung Informatik

More information

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5 Binomial Moel Hull, Chapter 11 + ections 17.1 an 17.2 Aitional reference: John Cox an Mark Rubinstein, Options Markets, Chapter 5 1. One-Perio Binomial Moel Creating synthetic options (replicating options)

More information

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines EUROGRAPHICS 2000 / M. Gross an F.R.A. Hopgoo Volume 19, (2000), Number 3 (Guest Eitors) Unsteay Flow Visualization by Animating Evenly-Space Bruno Jobar an Wilfri Lefer Université u Littoral Côte Opale,

More information

Cost Efficient Datacenter Selection for Cloud Services

Cost Efficient Datacenter Selection for Cloud Services Cost Efficient Datacenter Selection for Clou Services Hong u, Baochun Li henryxu, bli@eecg.toronto.eu Department of Electrical an Computer Engineering University of Toronto Abstract Many clou services

More information

ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014

ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014 ISSN: 77-754 ISO 900:008 Certifie International Journal of Engineering an Innovative echnology (IJEI) Volume, Issue, June 04 Manufacturing process with isruption uner Quaratic Deman for Deteriorating Inventory

More information

Lecture L25-3D Rigid Body Kinematics

Lecture L25-3D Rigid Body Kinematics J. Peraire, S. Winall 16.07 Dynamics Fall 2008 Version 2.0 Lecture L25-3D Rigi Boy Kinematics In this lecture, we consier the motion of a 3D rigi boy. We shall see that in the general three-imensional

More information

Option Pricing for Inventory Management and Control

Option Pricing for Inventory Management and Control Option Pricing for Inventory Management an Control Bryant Angelos, McKay Heasley, an Jeffrey Humpherys Abstract We explore the use of option contracts as a means of managing an controlling inventories

More information

Optimal Control Of Production Inventory Systems With Deteriorating Items And Dynamic Costs

Optimal Control Of Production Inventory Systems With Deteriorating Items And Dynamic Costs Applie Mathematics E-Notes, 8(2008), 194-202 c ISSN 1607-2510 Available free at mirror sites of http://www.math.nthu.eu.tw/ amen/ Optimal Control Of Prouction Inventory Systems With Deteriorating Items

More information

HOST SELECTION METHODOLOGY IN CLOUD COMPUTING ENVIRONMENT

HOST SELECTION METHODOLOGY IN CLOUD COMPUTING ENVIRONMENT International Journal of Avance Research in Computer Engineering & Technology (IJARCET) HOST SELECTION METHODOLOGY IN CLOUD COMPUTING ENVIRONMENT Pawan Kumar, Pijush Kanti Dutta Pramanik Computer Science

More information

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014 Consumer Referrals Maria Arbatskaya an Hieo Konishi October 28, 2014 Abstract In many inustries, rms rewar their customers for making referrals. We analyze the optimal policy mix of price, avertising intensity,

More information

Factoring Dickson polynomials over finite fields

Factoring Dickson polynomials over finite fields Factoring Dickson polynomials over finite fiels Manjul Bhargava Department of Mathematics, Princeton University. Princeton NJ 08544 manjul@math.princeton.eu Michael Zieve Department of Mathematics, University

More information

CURRENCY OPTION PRICING II

CURRENCY OPTION PRICING II Jones Grauate School Rice University Masa Watanabe INTERNATIONAL FINANCE MGMT 657 Calibrating the Binomial Tree to Volatility Black-Scholes Moel for Currency Options Properties of the BS Moel Option Sensitivity

More information

How To Find Out How To Calculate Volume Of A Sphere

How To Find Out How To Calculate Volume Of A Sphere Contents High-Dimensional Space. Properties of High-Dimensional Space..................... 4. The High-Dimensional Sphere......................... 5.. The Sphere an the Cube in Higher Dimensions...........

More information

A Comparison of Performance Measures for Online Algorithms

A Comparison of Performance Measures for Online Algorithms A Comparison of Performance Measures for Online Algorithms Joan Boyar 1, Sany Irani 2, an Kim S. Larsen 1 1 Department of Mathematics an Computer Science, University of Southern Denmark, Campusvej 55,

More information

Mathematics Review for Economists

Mathematics Review for Economists Mathematics Review for Economists by John E. Floy University of Toronto May 9, 2013 This ocument presents a review of very basic mathematics for use by stuents who plan to stuy economics in grauate school

More information

A Universal Sensor Control Architecture Considering Robot Dynamics

A Universal Sensor Control Architecture Considering Robot Dynamics International Conference on Multisensor Fusion an Integration for Intelligent Systems (MFI2001) Baen-Baen, Germany, August 2001 A Universal Sensor Control Architecture Consiering Robot Dynamics Frierich

More information

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND art I. robobabilystic Moels Computer Moelling an New echnologies 27 Vol. No. 2-3 ransport an elecommunication Institute omonosova iga V-9 atvia MOEING OF WO AEGIE IN INVENOY CONO YEM WIH ANOM EA IME AN

More information

Introduction to Integration Part 1: Anti-Differentiation

Introduction to Integration Part 1: Anti-Differentiation Mathematics Learning Centre Introuction to Integration Part : Anti-Differentiation Mary Barnes c 999 University of Syney Contents For Reference. Table of erivatives......2 New notation.... 2 Introuction

More information

Which Networks Are Least Susceptible to Cascading Failures?

Which Networks Are Least Susceptible to Cascading Failures? Which Networks Are Least Susceptible to Cascaing Failures? Larry Blume Davi Easley Jon Kleinberg Robert Kleinberg Éva Taros July 011 Abstract. The resilience of networks to various types of failures is

More information

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification 2.0 page 1 Recital The acceptance an introuction of serial communication to more an more applications

More information

On Power Efficient Communication over Multi-hop Wireless Networks: Joint Routing, Scheduling and Power Control

On Power Efficient Communication over Multi-hop Wireless Networks: Joint Routing, Scheduling and Power Control On Power Efficient Communication over Multi-hop Wireless Networks: Joint Routing, Scheduling and Power Control Randeep Bhatia Murali Kodialam Bell Laboratories Lucent Technologies 101 Crawfords Corner

More information

Cross-Over Analysis Using T-Tests

Cross-Over Analysis Using T-Tests Chapter 35 Cross-Over Analysis Using -ests Introuction his proceure analyzes ata from a two-treatment, two-perio (x) cross-over esign. he response is assume to be a continuous ranom variable that follows

More information

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law Detecting Possibly Frauulent or Error-Prone Survey Data Using Benfor s Law Davi Swanson, Moon Jung Cho, John Eltinge U.S. Bureau of Labor Statistics 2 Massachusetts Ave., NE, Room 3650, Washington, DC

More information

How To Price Internet Access In A Broaban Service Charge On A Per Unit Basis

How To Price Internet Access In A Broaban Service Charge On A Per Unit Basis iqui Pricing for Digital Infrastructure Services Subhajyoti Banyopahyay * an sing Kenneth Cheng Department of Decision an Information Sciences Warrington College of Business Aministration University of

More information

Net Neutrality, Network Capacity, and Innovation at the Edges

Net Neutrality, Network Capacity, and Innovation at the Edges Net Neutrality, Network Capacity, an Innovation at the Eges Jay Pil Choi Doh-Shin Jeon Byung-Cheol Kim May 22, 2015 Abstract We stuy how net neutrality regulations affect a high-banwith content provier(cp)

More information

Enterprise Resource Planning

Enterprise Resource Planning Enterprise Resource Planning MPC 6 th Eition Chapter 1a McGraw-Hill/Irwin Copyright 2011 by The McGraw-Hill Companies, Inc. All rights reserve. Enterprise Resource Planning A comprehensive software approach

More information

UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH

UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH UNIFIED BIJECTIONS FOR MAPS WITH PRESCRIBED DEGREES AND GIRTH OLIVIER BERNARDI AND ÉRIC FUSY Abstract. This article presents unifie bijective constructions for planar maps, with control on the face egrees

More information

Calibration of the broad band UV Radiometer

Calibration of the broad band UV Radiometer Calibration of the broa ban UV Raiometer Marian Morys an Daniel Berger Solar Light Co., Philaelphia, PA 19126 ABSTRACT Mounting concern about the ozone layer epletion an the potential ultraviolet exposure

More information

Optimal Energy Commitments with Storage and Intermittent Supply

Optimal Energy Commitments with Storage and Intermittent Supply Submitte to Operations Research manuscript OPRE-2009-09-406 Optimal Energy Commitments with Storage an Intermittent Supply Jae Ho Kim Department of Electrical Engineering, Princeton University, Princeton,

More information

The Quick Calculus Tutorial

The Quick Calculus Tutorial The Quick Calculus Tutorial This text is a quick introuction into Calculus ieas an techniques. It is esigne to help you if you take the Calculus base course Physics 211 at the same time with Calculus I,

More information

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY Jörg Felhusen an Sivakumara K. Krishnamoorthy RWTH Aachen University, Chair an Insitute for Engineering

More information

Tracking Control of a Class of Hamiltonian Mechanical Systems with Disturbances

Tracking Control of a Class of Hamiltonian Mechanical Systems with Disturbances Proceeings of Australasian Conference on Robotics an Automation, -4 Dec 4, The University of Melbourne, Melbourne, Australia Tracking Control of a Class of Hamiltonian Mechanical Systems with Disturbances

More information

View Synthesis by Image Mapping and Interpolation

View Synthesis by Image Mapping and Interpolation View Synthesis by Image Mapping an Interpolation Farris J. Halim Jesse S. Jin, School of Computer Science & Engineering, University of New South Wales Syney, NSW 05, Australia Basser epartment of Computer

More information

zupdate: Updating Data Center Networks with Zero Loss

zupdate: Updating Data Center Networks with Zero Loss zupate: Upating Data Center Networks with Zero Loss Hongqiang Harry Liu Yale University hongqiang.liu@yale.eu Lihua Yuan Microsoft lyuan@microsoft.com Xin Wu Duke University xinwu@cs.uke.eu Roger Wattenhofer

More information

Exponential Functions: Differentiation and Integration. The Natural Exponential Function

Exponential Functions: Differentiation and Integration. The Natural Exponential Function 46_54.q //4 :59 PM Page 5 5 CHAPTER 5 Logarithmic, Eponential, an Other Transcenental Functions Section 5.4 f () = e f() = ln The inverse function of the natural logarithmic function is the natural eponential

More information

Performance Analysis of Bandwidth Allocations for Multi-Services Mobile Wireless Cellular Networks *

Performance Analysis of Bandwidth Allocations for Multi-Services Mobile Wireless Cellular Networks * erformance Analysis of Banwith Allocations for Multi-Serices Mobile Wireless Cellular Networs * Lizhong Li Bin Li Bo Li Xi-Ren Cao Department of Computer Science Department of Electrical an Electronic

More information

How To Understand The Structure Of A Can (Can)

How To Understand The Structure Of A Can (Can) Thi t t ith F M k 4 0 4 BOSCH CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 50, D-7000 Stuttgart 1 The ocument as a whole may be copie an istribute without restrictions. However, the

More information

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud Bellini: Ferrying Application Traffic Flows through Geo-istribute Datacenters in the Clou Zimu Liu, Yuan Feng, an Baochun Li Department of Electrical an Computer Engineering, University of Toronto Department

More information

Interference Mitigation Techniques for Spectral Capacity Enhancement in GSM Networks

Interference Mitigation Techniques for Spectral Capacity Enhancement in GSM Networks I.J. Wireless an Microwave Technologies, 04,, 0-49 Publishe Online January 04 in MECS(http://www.mecs-press.net) OI: 0.585/ijwmt.04.0.03 Available online at http://www.mecs-press.net/ijwmt Interference

More information

Minimizing Makespan in Flow Shop Scheduling Using a Network Approach

Minimizing Makespan in Flow Shop Scheduling Using a Network Approach Minimizing Makespan in Flow Shop Scheuling Using a Network Approach Amin Sahraeian Department of Inustrial Engineering, Payame Noor University, Asaluyeh, Iran 1 Introuction Prouction systems can be ivie

More information

11 CHAPTER 11: FOOTINGS

11 CHAPTER 11: FOOTINGS CHAPTER ELEVEN FOOTINGS 1 11 CHAPTER 11: FOOTINGS 11.1 Introuction Footings are structural elements that transmit column or wall loas to the unerlying soil below the structure. Footings are esigne to transmit

More information

The one-year non-life insurance risk

The one-year non-life insurance risk The one-year non-life insurance risk Ohlsson, Esbjörn & Lauzeningks, Jan Abstract With few exceptions, the literature on non-life insurance reserve risk has been evote to the ultimo risk, the risk in the

More information

Answers to the Practice Problems for Test 2

Answers to the Practice Problems for Test 2 Answers to the Practice Problems for Test 2 Davi Murphy. Fin f (x) if it is known that x [f(2x)] = x2. By the chain rule, x [f(2x)] = f (2x) 2, so 2f (2x) = x 2. Hence f (2x) = x 2 /2, but the lefthan

More information

2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by,

2r 1. Definition (Degree Measure). Let G be a r-graph of order n and average degree d. Let S V (G). The degree measure µ(s) of S is defined by, Theorem Simple Containers Theorem) Let G be a simple, r-graph of average egree an of orer n Let 0 < δ < If is large enough, then there exists a collection of sets C PV G)) satisfying: i) for every inepenent

More information

A New Pricing Model for Competitive Telecommunications Services Using Congestion Discounts

A New Pricing Model for Competitive Telecommunications Services Using Congestion Discounts A New Pricing Moel for Competitive Telecommunications Services Using Congestion Discounts N. Keon an G. Ananalingam Department of Systems Engineering University of Pennsylvania Philaelphia, PA 19104-6315

More information

Safety Management System. Initial Revision Date: Version Revision No. 02 MANUAL LIFTING

Safety Management System. Initial Revision Date: Version Revision No. 02 MANUAL LIFTING Revision Preparation: Safety Mgr Authority: Presient Issuing Dept: Safety Page: Page 1 of 11 Purpose is committe to proviing a safe an healthy working environment for all employees. Musculoskeletal isorers

More information

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering

More information

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters ThroughputScheuler: Learning to Scheule on Heterogeneous Haoop Clusters Shehar Gupta, Christian Fritz, Bob Price, Roger Hoover, an Johan e Kleer Palo Alto Research Center, Palo Alto, CA, USA {sgupta, cfritz,

More information

Inverse Trig Functions

Inverse Trig Functions Inverse Trig Functions c A Math Support Center Capsule February, 009 Introuction Just as trig functions arise in many applications, so o the inverse trig functions. What may be most surprising is that

More information

A Tutorial on Cross-Layer Optimization in Wireless Networks

A Tutorial on Cross-Layer Optimization in Wireless Networks A Tutorial on Cross-Layer Optimization in Wireless Networks Xiaojun Lin, Member, IEEE, Ness B. Shroff, Senior Member, IEEE and R. Srikant, Fellow, IEEE Abstract This tutorial paper overviews recent developments

More information

A New Evaluation Measure for Information Retrieval Systems

A New Evaluation Measure for Information Retrieval Systems A New Evaluation Measure for Information Retrieval Systems Martin Mehlitz martin.mehlitz@ai-labor.e Christian Bauckhage Deutsche Telekom Laboratories christian.bauckhage@telekom.e Jérôme Kunegis jerome.kunegis@ai-labor.e

More information

Digital barrier option contract with exponential random time

Digital barrier option contract with exponential random time IMA Journal of Applie Mathematics Avance Access publishe June 9, IMA Journal of Applie Mathematics ) Page of 9 oi:.93/imamat/hxs3 Digital barrier option contract with exponential ranom time Doobae Jun

More information

Rate control for communication networks: shadow prices, proportional fairness and stability

Rate control for communication networks: shadow prices, proportional fairness and stability Rate control for communication networks: shaow prices, proportional fairness an stability F Kelly, AK Maulloo an DKH Tan University of Cambrige, UK This paper analyses the stability an fairness of two

More information

2.3 Convex Constrained Optimization Problems

2.3 Convex Constrained Optimization Problems 42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions

More information

On the Interaction and Competition among Internet Service Providers

On the Interaction and Competition among Internet Service Providers On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers

More information

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements International Journal of nowlege an Systems Science, 3(), -7, January-March 0 A lame-ase Approach to Generating Proposals for Hanling Inconsistency in Software Requirements eian Mu, Peking University,

More information

Forecasting and Staffing Call Centers with Multiple Interdependent Uncertain Arrival Streams

Forecasting and Staffing Call Centers with Multiple Interdependent Uncertain Arrival Streams Forecasting an Staffing Call Centers with Multiple Interepenent Uncertain Arrival Streams Han Ye Department of Statistics an Operations Research, University of North Carolina, Chapel Hill, NC 27599, hanye@email.unc.eu

More information

Supporting Adaptive Workflows in Advanced Application Environments

Supporting Adaptive Workflows in Advanced Application Environments Supporting aptive Workflows in vance pplication Environments Manfre Reichert, lemens Hensinger, Peter Daam Department Databases an Information Systems University of Ulm, D-89069 Ulm, Germany Email: {reichert,

More information

A Theory of Exchange Rates and the Term Structure of Interest Rates

A Theory of Exchange Rates and the Term Structure of Interest Rates Review of Development Economics, 17(1), 74 87, 013 DOI:10.1111/roe.1016 A Theory of Exchange Rates an the Term Structure of Interest Rates Hyoung-Seok Lim an Masao Ogaki* Abstract This paper efines the

More information

Ch 10. Arithmetic Average Options and Asian Opitons

Ch 10. Arithmetic Average Options and Asian Opitons Ch 10. Arithmetic Average Options an Asian Opitons I. Asian Option an the Analytic Pricing Formula II. Binomial Tree Moel to Price Average Options III. Combination of Arithmetic Average an Reset Options

More information

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Lost Sales

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Lost Sales IPA Derivatives for Make-to-Stock Prouction-Inventory Systems With Lost Sales Yao Zhao Benjamin Melame Rutgers University Rutgers Business School Newark an New Brunswick Department of MSIS 94 Rockafeller

More information

15.2. First-Order Linear Differential Equations. First-Order Linear Differential Equations Bernoulli Equations Applications

15.2. First-Order Linear Differential Equations. First-Order Linear Differential Equations Bernoulli Equations Applications 00 CHAPTER 5 Differential Equations SECTION 5. First-Orer Linear Differential Equations First-Orer Linear Differential Equations Bernoulli Equations Applications First-Orer Linear Differential Equations

More information

20. Product rule, Quotient rule

20. Product rule, Quotient rule 20. Prouct rule, 20.1. Prouct rule Prouct rule, Prouct rule We have seen that the erivative of a sum is the sum of the erivatives: [f(x) + g(x)] = x x [f(x)] + x [(g(x)]. One might expect from this that

More information

Product Differentiation for Software-as-a-Service Providers

Product Differentiation for Software-as-a-Service Providers University of Augsburg Prof. Dr. Hans Ulrich Buhl Research Center Finance & Information Management Department of Information Systems Engineering & Financial Management Discussion Paper WI-99 Prouct Differentiation

More information

RUNESTONE, an International Student Collaboration Project

RUNESTONE, an International Student Collaboration Project RUNESTONE, an International Stuent Collaboration Project Mats Daniels 1, Marian Petre 2, Vicki Almstrum 3, Lars Asplun 1, Christina Björkman 1, Carl Erickson 4, Bruce Klein 4, an Mary Last 4 1 Department

More information

Here the units used are radians and sin x = sin(x radians). Recall that sin x and cos x are defined and continuous everywhere and

Here the units used are radians and sin x = sin(x radians). Recall that sin x and cos x are defined and continuous everywhere and Lecture 9 : Derivatives of Trigonometric Functions (Please review Trigonometry uner Algebra/Precalculus Review on the class webpage.) In this section we will look at the erivatives of the trigonometric

More information

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition Mathematical Moels of Therapeutical Actions Relate to Tumour an Immune System Competition Elena De Angelis (1 an Pierre-Emmanuel Jabin (2 (1 Dipartimento i Matematica, Politecnico i Torino Corso Duca egli

More information

Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence

Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence Seeing the Unseen: Revealing Mobile Malware Hien Communications via Energy Consumption an Artificial Intelligence Luca Caviglione, Mauro Gaggero, Jean-François Lalane, Wojciech Mazurczyk, Marcin Urbanski

More information