Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks

Size: px
Start display at page:

Download "Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks"

Transcription

1 Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois 628 Eail: Abstract We consider optiizing the packet-sizes and the reuse factor to iniize the delay required to send a essage between two nodes in a linear ulti-hop wireless network subject to a reliability constraint. Initially assuing no re-use, we give a bound on the required delay. Next, in a infinite syste with re-use, we analyze the rate of growth of the delay as a function of the essage size. Two cases are considered: one in which packets are decoded/re-encoded on each hop and one in which this is concatenated with an end-to-end outer code. The later is shown to result in lower delays. I. INTRODUCTION Consider a wire-line network in which a essage is to be divided into several packets of equal size and sent over a sequence of error-free links with transission rate R. Furtherore, suppose that an entire packet ust be received over one link before it ay be sent over the next, and that the network is lightly loaded so that whenever this condition is true the packet ay be sent. Ignoring any overhead per packet, it is then well-known that the end-to-end delay of the essage is iniized by aking the packet-size as sall as possible so as to benefit fro pipelining. If overhead is not ignored, there is an optial packet-size which balances this pipelining effect with the aortization of overhead given by using larger packets. In this paper, we consider a siilar question in the context of a linear ulti-hop wireless network. Here, several new issues arise. First we assue that all nodes transit in a coon frequency-band and so ultiple links interfere with each other. Also, nodes are precluded fro sending and receiving at the sae tie i.e. they ust satisfy a half-duplex constraint. Finally, we assue that links are not error free and that a node has a constraint on the reliability i.e. probability of decoding error at which a essage ust be obtained. Given this odel we consider optiizing the packet-size as well as the schedule of transissions with the objective of iniizing the total delay for sending a packet fro a given source node to a given destination. In this setting for a given transission schedule packet sizes ust now balance the pipe-lining gains with both aortization of overhead as well as eeting the reliability constraint. We forulate a siple linear odel for a ulti-hop network in which all transissions transissions are sent hop-by-hop and interfering transissions are treated as noise. To odel the reliability constraint we use an error exponent odel derived fro the rando coding bound for a Gaussian channel. We initially consider a syste without spatial re-use, i.e. each link is scheduled in its own tie-slot, and derive an upper bound on the end-to-end delay. We then turn to a odel with spatial reuse consider the packet size and re-use distance which either axiize the throughput or iniize the total delay. In the later case, to gain insight we focus on the asyptotic growth of the total delay as the essage size increases to infinity. In this regie, we characterize the optial nuber of packets, for two different coding schees. In the first, each hop is coded individually. In the second, a concatenated coding schee is used to add end-to-end coding. In the first case, the optial nuber of packets satisfies 2 log = Θ, while in the second it satisfies 2 = Θ. In other words, with the concatenated coding schee we use saller packets. The delay under both schees grows at the sae first order rate, but the second order growth is saller with the concatenated schee. Finally we conclude with soe nuerical exaples. Related work includes [], which considers reliability bounds for ulti-hop networks but does not account for spatial reuse and thus pipe-lining as we do here, and [2], which addresses the re-use but focuses on throughput as opposed to delay. II. MODE We consider a one-diensional odel, where all nodes are regularly placed on a one-diensional line and labeled by an integer. One node x is assued to have nats of data to send to another node y. et D be the distance between node x and y, and let H be the nuber of nodes between x and y, each of which is assued to be a relay for the essage i.e. the nuber of hops is H. To siplify the analysis, we assue the queuing delay on each hop is zero. This is reasonable assuing that the given flow has higher priority over other flows in the network. All nodes are assued to transit in the sae frequency band with noralized bandwidth of and treat any interfering transission as noise. The channel between any pair of nodes is odeled by a distance dependent path-loss plus additive Gaussian noise. Furtherore, we assue that the nodes eploy a regular TDM-schedule of length so that In order to siplify the notations, we use nat as the unit for inforation in this paper.

2 in tie-slot t, the nodes n + t od are allowed to transit, for n =...,,,,.... Figure illustrates this space-tie reuse odel. Tie slot Tie slot 2 Tie slot + Node Node 2 Node + Node Node 2 Node +... Node Node 2 Node + Fig.. Space-tie reuse schee. To begin consider a siple odel where all the nodes have the sae transission rate. Assue the nats of inforation are transitted in equal-size packets, and there are h additional nats of overhead in each packet. et RH, denote the transission rate in ters of nats per channel use under certain H and and assue that all transissions are reliable. It follows that +h RH, is the length of the tie-slot for one packet. The end-to-end delay in channel uses is then DH, = + h + H + h RH, RH,, where the first ter is the tie for the source to send all the nats over the first hops, and the second ter is the tie required for the last packet to traverse the reaining H hops. Essentially, this is a pipe-lining calculation as described in the introduction, only now a packet ust traverse hops before a new packet ay be transitted. If H and are fixed, and we ignore the integer constraint on, then the delay is iniized if takes the value: H H, =, 2 h and the optial delay is: 2 + H h D H, = RH,. 3 Notice that if the overhead h is negligible, then the optial / goes to infinity, and so the optial packet size of RH, channel uses goes to zero. We are also interested in the case where each packet ust also eet a reliability constraint, in addition to overhead considerations, this will also prevent the use of arbitrarily sall packets. We next extend our odel to account for this. Specifically we assue that the end-to-end essage error probability for delivering the nats ust be no greater than a constant η. Given this constraint, we then want to iniize the end-to-end delay. Assuing that each node uses a rando Gaussian code, then fro [3], [4], the block error probability b of code with a block-length of N b channel uses is bounded by: b exp N b E, SINR, 4 for any [, ], where b is the nuber of inforation nats contained in one block, SIN R is the Signal-to-Noise-plus- Interference ratio at receiver, and E, SINR is the error exponent deterined by and SINR. For a coplex Gaussian channel with unit bandwidth, a siple expression for the error exponent E, SINR is given by: E, SINR = log + SINR. 5 Given an upper bound η hb on the block error probability b for a single hop, the iniu N hb satisfying N hb log + SINR b log η 6 is the iniu delay for sending a block of b nats over that hop for which we can use 5 to guarantee that the reliability constraint is et. In the rest of the paper, we this value of N hb as the iniu delay for each hop. III. DEAY WITHOUT SATIA REUSE IN FINITE ENGTH SYSTEM Now we return to proble of sending nats of data between two nodes x and y over H equal length hops, but include the reliability constraint. We assue that the distance D between the source and destination is noralized to. 2. Furtherore, there is no other node beyond x and y, and no other interference present. Here we consider the siplest case where only one transission is possible in each tie slot. et N denote the noise power spectru density. Notice that there is exactly one active transitter in each tie slot, we assue the transission power is for each transitter. We consider what are the optial nuber of hops H and what is the nuber of blocks containing the original nats. Before going into the details, we introduce following basic result. ea : In an optiized syste, the delay for each hop is the sae for each packet. This follows directly fro the assuptions that each packet has the sae size and that the channel for each hop is the sae and thus so is its SINR. Thus we assue that the delay is the sae for each hop and we denote this by N hb. et SINR = N H α be the SINR for a hop, where α is the path-loss factor 3. Then, 6 can be rewritten as: N N hb log + H α + h log η hb, 7 2 Changing this distance is equivalent to changing the transission power. Since our results are suitable for any power, we use the noralized distance to siplify our notation. 3 Here, /N is also noralized

3 where η hb is the per hop per block error constraint. Assuing no retransissions, and that coding is done independently over each hop then η hb and the end-to-end error constraint η will satisfy η = η hb H. 8 Considering that η < and N, we have η H H η, 9 which eans that setting η hb = H guarantees the end-to-end essage error probability is less than η. et N = N hb H denote the total delay, then the iniu N satisfying η N H + Hh H log η H log + N H α can be guaranteed to satisfy the reliability constraint. roposition : Without an integer constraint on H, the total delay is upper bounded by H + H h H log η H, log + N H α where H = zα /N α, and zα is the solution to + z log + z = α. roof: Notice that H and are positive integers. The right-hand-side of is onotonically increases with. Thus any given H, the that iniizes is. Note that H + Hh H log η < H + Hh H log η H. 2 log + N H α log + N H α Miniizing, the left-hand side of 2 with respect to H yields the desired result. IV. INFINITE ENGTH SYSTEM Now we consider the situation where siultaneous transissions are enabled so that the SINR includes the effect of interference. To calculate the interference, the knowledge of the sets of transitters in each tie slot is necessary, which coplicated the proble. To siplify this we assue there are infinitely any nodes regularly placed in a one-diensional line that each node in the line always has traffic to send. Thus, for a given transission schedule each node will see the sae SINR. In this section, we noralize the distance between adjacent nodes to be 4 and assue the nuber of hops H between the source node x and the destination node y is a constant. The nodes follow the space-tie reuse schedule as in Fig., so that for a schedule of length the distance between two adjacent transitters is hops. Each user has an average 4 Notice this is a different assuption than the one in previous sections. power constraint of 5 and so transits with power when scheduled. We are still assuing that the essage fro x can be sent to y via ulti-hop transission without queuing delay and are priarily interested in the case where the essage size is large. A. Throughput Optiization Before considering the optial delay proble, we address the related proble of optiizing the end-to-end throughput given a fixed block size of b nats and an end-to-end error constraint of η. et N hb be the one-hop iniu delay for nats of inforation which eets the corresponding per-hop reliability constraint in 6 The average throughput can then be written as R = b. 3 N hb We next consider axiizing this over b and. et γ, be the received SINR at each node, where γ N, = N + i= i + α +.4 j= j α Now, the reliability constraint 6 can be written as γ N hb log +, b log η H. 5 Substituting 5 into 3 yields log + γ N R log η H,. 6 The right-hand side of 6 can be decoposed into two parts, denoted by R and R respectively, Assuing a fixed value of, the first part R = only depends on, and log η H N γ, log+ the second part R = only depends on. It is clear that R is axiized if takes the largest possible value, and a finite axiizes R. To gain soe insight, we consider the optial when takes extree values. In the low SINR regie, where goes to, γ, goes to and optial is the sallest possible. On the other hand, if goes to, then the syste is in interference liited region and the optial is a bounded constant deterined by the syste paraeters. B. Optial Delay The analysis in Section IV-A shows that longer block lengths are preferred to axiize throughput. However, this prohibits pipe-lining and introduces longer delay. Now we return to the proble of iniizing the delay to send a essage of nats of inforation over H hops. As before this essage can be divided blocks of equal size b = +h, h 5 Notice this is also a slightly different noralization than in the previous section.

4 denotes the additional overhead needed per packet. The delay D of sending one block over one hop ust now satisfy D + h log η H, 7 log + γ N, to ensure the reliability constraint is et. Note that D is also the length of one tie-slot. Fro the discussion in Section II, the nuber of tie slots fro x sending out the first block until y receives the last block is H +. Thus the total delay satisfies should satisfy [ ] H + + h log η H D. 8 log + γ N, To gain insight into the paraeters which optiize this we next consider an asyptotic regie, where goes to. V. ASYMTOTIC ANAYSIS In this section, we consider study the asyptotic behavior of the optial paraeters, and as the total inforation goes to. A. Optial orders of and The right-hand side of 8 can be rewritten as D, = log + γ N, + b + log + h + b 2 + b log + b h + b 2, 9 where b = H, and b 2 = log η H. We next consider the behavior of this as for a fixed. roposition 2: et and iniize 9 over and. If, then and satisfy,, and 2 log = Θ. roof: On the right-hand-side of 9, note that + γ N, is bounded, no atter what value is used. The highest order ter is, and all the other ters are of saller orders than. This iplies that, and log = o. The coefficient of the highest order ter,, is + γ N,. It requires to iniize the delay. Therefore,,, and log = o. Now the candidates for the second highest order ters are b and log. These two ters should be asyptotically equivalent to iniize the total delay. Thus which yields the desired result. b log, 2 roposition 2 shows that 2 log increases linearly with, if is fixed. Suppose that there is no reliability constraint, i.e. the transission rate is deterined by SIN R and is independent of. In this case, fro 2, it follows that should increase at the order of Θ 2. This iplies that grows faster without a reliability constraint than when one is present. In other words, with the reliability constraint, an order larger block-size is preferred. B. Optial Fro the proof of roposition 2, the highest order-ter of D, as inf is D, = log + γ N, Furtherore, is shown to go to in roposition 2. Thus the optial is given by log+γ N = arg in k,. log 2 + γ,. as. Thus the optial is a bounded constant. Notice that 2 is the inverse of R in Section IV-A, and so the sae results are valid for the extree values of in high and low SINR regies. VI. CONCATENATED CODING SCHEME reviously, we considered that a essage containing nats is divided into blocks, and the essage is successfully received when there is no error for every block on every hop. Next we relax this assuption and consider a concatenated coding schee as in [5], in which an outer code is also used to correct issing packets which do not arrive at the destination. Assue that the inner code length is N i channel uses, and the outer code length is N out. Assue the diensional rate of the outer code is r, then N out = r N i. 22 Now, consider the error probability per block per hop, it is given by bh exp + h γ N i log +,. 23 Then the end-to-end block error, which is also the inner code error, can be upper bounded as b H bh exp{ N i E i }, 24 where E i = log + γ N, N i h N i log H N i can be interpreted as the error exponent of the inner code. Based on [5], the error exponent of the outer code can be expressed as E o R o = ax re i R i, 25 rr i=r o

5 where R i and R o are the rate for the inner and outer codes, respectively. And R i = N i and R o = N out. roposition 3: et and iniizes the total delay over and. With the concatenated coding schee, if, then the optial and satisfy,, and 2 = Θ. roof: The total essage error can be expressed as 6 e { [ γ exp ax r log +, rr i=r o h log H ] } N out N i N i N i = exp γ Nout log +, } 2 + h + log H, 26 where the optial r in the final step is r + h + log H =. 27 N out log + γ N, To satisfy the end-to-end error requireent η, we have γ Nout log +, + h + log H + log η. 28 Using the sae arguent as the previous section, the total end-to-end delay is D, = H + rn out. 29 lugging 27 and 28 into 29, and using the sae technique as in roposition 2, yield the result. Notice that the total end-to-end delay still grows linearly with. However, the second highest order ters now grow at a slower rate than the schee without concatenated coding, which iplies that this schee will have a order saller endto-end delay. VII. NUMERICA RESUT To illustrate the asyptotic, soe nuerical results are provided in this section. Figure 2 shows the growth order of the inial delays for both the schees with and without concatenated coding. It is clear that the highest order ter doinates the total delay, when the aount of inforation goes to infinity. It also illustrates the changes of optial according to different. Figure 3 are the optial and. The results shown in these two figures are consistent with our analysis. In all of above figures, α = 3, η =., N / =, h =, and H =. Delay Optial Optial Optial 8 6 Optial Delay w/o CC 4 First Order w/o CC Optial Delay with CC First Order with CC Fig. 2. Optial w/o CC Optial with CC Miniu delays and optial s Optial w/o CC Optial with CC Fig. 3. Optial s and s. REFERENCES Optial w/o CC Optial with CC [] O. Oyan, Reliability bounds for delay-constrained ulti-hop networks, in 44th Annual Allerton Conference, Illinois, Sept. 26. [2] M. Sikora, J. N. anean, M. Haenggi, D. J. Costello, and T. Fuja, On the Optiu Nuber of Hops in inear Ad Hoc Networks, in IEEE Inforation Theory Workshop ITW 4, San Antonio, TX, Oct 24. [3] R. G. Gallager, Inforation Theory and Reliable Counication. New York, NY, USA: John Wiley & Sons, Inc., 968. [4] I. E. Telatar and R. G. Gallager, Cobining queueing theory with inforation theory for ultiaccess, IEEE Journal on Selected Areas in Counications, vol. 3, no. 6, pp , August 995. [5] G. D. Forney, Concatenated Codes. M.I.T. ress, Notice E o is the actual error exponent when r is close to. We use E o to calculate the error probability since r indeed approaches when is large.

Resource Allocation in Wireless Networks with Multiple Relays

Resource Allocation in Wireless Networks with Multiple Relays Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0

More information

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,

More information

Searching strategy for multi-target discovery in wireless networks

Searching strategy for multi-target discovery in wireless networks Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,

More information

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In

More information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO., OCTOBER 23 2697 Capacity of Multiple-Antenna Systes With Both Receiver and Transitter Channel State Inforation Sudharan K. Jayaweera, Student Meber,

More information

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation Int J Counications, Network and Syste Sciences, 29, 5, 422-432 doi:14236/ijcns292547 Published Online August 29 (http://wwwscirporg/journal/ijcns/) Load Control for Overloaded MPLS/DiffServ Networks during

More information

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna vtlphuong@hciu.edu.vn

More information

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128 ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute

More information

Machine Learning Applications in Grid Computing

Machine Learning Applications in Grid Computing Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA gvc@dartouth.edu, guofei.jiang@dartouth.edu

More information

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State

More information

Halloween Costume Ideas for the Wii Game

Halloween Costume Ideas for the Wii Game Algorithica 2001) 30: 101 139 DOI: 101007/s00453-001-0003-0 Algorithica 2001 Springer-Verlag New York Inc Optial Search and One-Way Trading Online Algoriths R El-Yaniv, 1 A Fiat, 2 R M Karp, 3 and G Turpin

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1 Secure Wireless Multicast for Delay-Sensitive Data via Network Coding Tuan T. Tran, Meber, IEEE, Hongxiang Li, Senior Meber, IEEE,

More information

Reconnect 04 Solving Integer Programs with Branch and Bound (and Branch and Cut)

Reconnect 04 Solving Integer Programs with Branch and Bound (and Branch and Cut) Sandia is a ultiprogra laboratory operated by Sandia Corporation, a Lockheed Martin Copany, Reconnect 04 Solving Integer Progras with Branch and Bound (and Branch and Cut) Cynthia Phillips (Sandia National

More information

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1 International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi

More information

Data Set Generation for Rectangular Placement Problems

Data Set Generation for Rectangular Placement Problems Data Set Generation for Rectangular Placeent Probles Christine L. Valenzuela (Muford) Pearl Y. Wang School of Coputer Science & Inforatics Departent of Coputer Science MS 4A5 Cardiff University George

More information

Online Bagging and Boosting

Online Bagging and Boosting Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used

More information

An Approach to Combating Free-riding in Peer-to-Peer Networks

An Approach to Combating Free-riding in Peer-to-Peer Networks An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008

More information

Preference-based Search and Multi-criteria Optimization

Preference-based Search and Multi-criteria Optimization Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne ujunker@ilog.fr

More information

Information Processing Letters

Information Processing Letters Inforation Processing Letters 111 2011) 178 183 Contents lists available at ScienceDirect Inforation Processing Letters www.elsevier.co/locate/ipl Offline file assignents for online load balancing Paul

More information

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Airline Yield Manageent with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Integral Developent Corporation, 301 University Avenue, Suite 200, Palo Alto, California 94301 SHALER STIDHAM

More information

How To Get A Loan From A Bank For Free

How To Get A Loan From A Bank For Free Finance 111 Finance We have to work with oney every day. While balancing your checkbook or calculating your onthly expenditures on espresso requires only arithetic, when we start saving, planning for retireent,

More information

Equivalent Tapped Delay Line Channel Responses with Reduced Taps

Equivalent Tapped Delay Line Channel Responses with Reduced Taps Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ

More information

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava

More information

On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes

On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes On Coputing Nearest Neighbors with Applications to Decoding of Binary Linear Codes Alexander May and Ilya Ozerov Horst Görtz Institute for IT-Security Ruhr-University Bochu, Gerany Faculty of Matheatics

More information

6. Time (or Space) Series Analysis

6. Time (or Space) Series Analysis ATM 55 otes: Tie Series Analysis - Section 6a Page 8 6. Tie (or Space) Series Analysis In this chapter we will consider soe coon aspects of tie series analysis including autocorrelation, statistical prediction,

More information

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University

More information

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network 2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona

More information

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent Load balancing over redundant wireless sensor networks based on diffluent Abstract Xikui Gao Yan ai Yun Ju School of Control and Coputer Engineering North China Electric ower University 02206 China Received

More information

Lecture L9 - Linear Impulse and Momentum. Collisions

Lecture L9 - Linear Impulse and Momentum. Collisions J. Peraire, S. Widnall 16.07 Dynaics Fall 009 Version.0 Lecture L9 - Linear Ipulse and Moentu. Collisions In this lecture, we will consider the equations that result fro integrating Newton s second law,

More information

Use of extrapolation to forecast the working capital in the mechanical engineering companies

Use of extrapolation to forecast the working capital in the mechanical engineering companies ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance

More information

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.

More information

Factor Model. Arbitrage Pricing Theory. Systematic Versus Non-Systematic Risk. Intuitive Argument

Factor Model. Arbitrage Pricing Theory. Systematic Versus Non-Systematic Risk. Intuitive Argument Ross [1],[]) presents the aritrage pricing theory. The idea is that the structure of asset returns leads naturally to a odel of risk preia, for otherwise there would exist an opportunity for aritrage profit.

More information

Efficient Key Management for Secure Group Communications with Bursty Behavior

Efficient Key Management for Secure Group Communications with Bursty Behavior Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:

More information

An Innovate Dynamic Load Balancing Algorithm Based on Task

An Innovate Dynamic Load Balancing Algorithm Based on Task An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun

More information

Position Auctions and Non-uniform Conversion Rates

Position Auctions and Non-uniform Conversion Rates Position Auctions and Non-unifor Conversion Rates Liad Blurosen Microsoft Research Mountain View, CA 944 liadbl@icrosoft.co Jason D. Hartline Shuzhen Nong Electrical Engineering and Microsoft AdCenter

More information

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008 SOME APPLCATONS OF FORECASTNG Prof. Thoas B. Foby Departent of Econoics Southern Methodist University May 8 To deonstrate the usefulness of forecasting ethods this note discusses four applications of forecasting

More information

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach An Optial Tas Allocation Model for Syste Cost Analysis in Heterogeneous Distributed Coputing Systes: A Heuristic Approach P. K. Yadav Central Building Research Institute, Rooree- 247667, Uttarahand (INDIA)

More information

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES Int. J. Appl. Math. Coput. Sci., 2014, Vol. 24, No. 1, 133 149 DOI: 10.2478/acs-2014-0011 AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES PIOTR KULCZYCKI,,

More information

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking

More information

Dynamic Placement for Clustered Web Applications

Dynamic Placement for Clustered Web Applications Dynaic laceent for Clustered Web Applications A. Karve, T. Kibrel, G. acifici, M. Spreitzer, M. Steinder, M. Sviridenko, and A. Tantawi IBM T.J. Watson Research Center {karve,kibrel,giovanni,spreitz,steinder,sviri,tantawi}@us.ib.co

More information

Optimal Resource-Constraint Project Scheduling with Overlapping Modes

Optimal Resource-Constraint Project Scheduling with Overlapping Modes Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de

More information

Models and Algorithms for Stochastic Online Scheduling 1

Models and Algorithms for Stochastic Online Scheduling 1 Models and Algoriths for Stochastic Online Scheduling 1 Nicole Megow Technische Universität Berlin, Institut für Matheatik, Strasse des 17. Juni 136, 10623 Berlin, Gerany. eail: negow@ath.tu-berlin.de

More information

Image restoration for a rectangular poor-pixels detector

Image restoration for a rectangular poor-pixels detector Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2

More information

Implementation of Active Queue Management in a Combined Input and Output Queued Switch

Implementation of Active Queue Management in a Combined Input and Output Queued Switch pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University

More information

Exercise 4 INVESTIGATION OF THE ONE-DEGREE-OF-FREEDOM SYSTEM

Exercise 4 INVESTIGATION OF THE ONE-DEGREE-OF-FREEDOM SYSTEM Eercise 4 IVESTIGATIO OF THE OE-DEGREE-OF-FREEDOM SYSTEM 1. Ai of the eercise Identification of paraeters of the euation describing a one-degree-of- freedo (1 DOF) atheatical odel of the real vibrating

More information

arxiv:0805.1434v1 [math.pr] 9 May 2008

arxiv:0805.1434v1 [math.pr] 9 May 2008 Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of

More information

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou

More information

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters

More information

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong yongtong.chen@connect.polyu.hk

More information

Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization

Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization Ipact of Processing Costs on Service Chain Placeent in Network Functions Virtualization Marco Savi, Massio Tornatore, Giacoo Verticale Dipartiento di Elettronica, Inforazione e Bioingegneria, Politecnico

More information

IN THIS PAPER, we study the delay and capacity trade-offs

IN THIS PAPER, we study the delay and capacity trade-offs IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness

More information

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS Isaac Zafrany and Sa BenYaakov Departent of Electrical and Coputer Engineering BenGurion University of the Negev P. O. Box

More information

Applying Multiple Neural Networks on Large Scale Data

Applying Multiple Neural Networks on Large Scale Data 0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree

More information

PREDICTION OF MILKLINE FILL AND TRANSITION FROM STRATIFIED TO SLUG FLOW

PREDICTION OF MILKLINE FILL AND TRANSITION FROM STRATIFIED TO SLUG FLOW PREDICTION OF MILKLINE FILL AND TRANSITION FROM STRATIFIED TO SLUG FLOW ABSTRACT: by Douglas J. Reineann, Ph.D. Assistant Professor of Agricultural Engineering and Graee A. Mein, Ph.D. Visiting Professor

More information

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary

More information

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries

More information

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS 641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC arketa.zajarosova@vsb.cz Abstract Custoer relationship

More information

Endogenous Credit-Card Acceptance in a Model of Precautionary Demand for Money

Endogenous Credit-Card Acceptance in a Model of Precautionary Demand for Money Endogenous Credit-Card Acceptance in a Model of Precautionary Deand for Money Adrian Masters University of Essex and SUNY Albany Luis Raúl Rodríguez-Reyes University of Essex March 24 Abstract A credit-card

More information

Performance Analysis of Opportunistic Routing in Multi-Sink Mobile Ad Hoc Wireless Sensor Networks

Performance Analysis of Opportunistic Routing in Multi-Sink Mobile Ad Hoc Wireless Sensor Networks International Journal of Coputer Applications (0975 8887) Volue 54 No.7, Septeber 2012 Perforance Analysis of Opportunistic Routing in Multi-Sink Mobile Ad Hoc Wireless Sensor Networks Aandeep Singh Dhaliwal

More information

Near-Optimal Power Control in Wireless Networks: A Potential Game Approach

Near-Optimal Power Control in Wireless Networks: A Potential Game Approach Near-Optial Power Control in Wireless Networks: A Potential Gae Approach Utku Ozan Candogan, Ishai Menache, Asuan Ozdaglar and Pablo A. Parrilo Laboratory for Inforation and Decision Systes Massachusetts

More information

Presentation Safety Legislation and Standards

Presentation Safety Legislation and Standards levels in different discrete levels corresponding for each one to a probability of dangerous failure per hour: > > The table below gives the relationship between the perforance level (PL) and the Safety

More information

Budget-optimal Crowdsourcing using Low-rank Matrix Approximations

Budget-optimal Crowdsourcing using Low-rank Matrix Approximations Budget-optial Crowdsourcing using Low-rank Matrix Approxiations David R. Karger, Sewoong Oh, and Devavrat Shah Departent of EECS, Massachusetts Institute of Technology Eail: {karger, swoh, devavrat}@it.edu

More information

Managing Complex Network Operation with Predictive Analytics

Managing Complex Network Operation with Predictive Analytics Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory

More information

Method of supply chain optimization in E-commerce

Method of supply chain optimization in E-commerce MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent

More information

Partitioned Elias-Fano Indexes

Partitioned Elias-Fano Indexes Partitioned Elias-ano Indexes Giuseppe Ottaviano ISTI-CNR, Pisa giuseppe.ottaviano@isti.cnr.it Rossano Venturini Dept. of Coputer Science, University of Pisa rossano@di.unipi.it ABSTRACT The Elias-ano

More information

Stochastic Online Scheduling on Parallel Machines

Stochastic Online Scheduling on Parallel Machines Stochastic Online Scheduling on Parallel Machines Nicole Megow 1, Marc Uetz 2, and Tark Vredeveld 3 1 Technische Universit at Berlin, Institut f ur Matheatik, Strasse des 17. Juni 136, 10623 Berlin, Gerany

More information

Markovian inventory policy with application to the paper industry

Markovian inventory policy with application to the paper industry Coputers and Cheical Engineering 26 (2002) 1399 1413 www.elsevier.co/locate/copcheeng Markovian inventory policy with application to the paper industry K. Karen Yin a, *, Hu Liu a,1, Neil E. Johnson b,2

More information

Energy Proportionality for Disk Storage Using Replication

Energy Proportionality for Disk Storage Using Replication Energy Proportionality for Disk Storage Using Replication Jinoh Ki and Doron Rote Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720 {jinohki,d rote}@lbl.gov Abstract Energy

More information

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and igration algoriths Chaia Ghribi, Makhlouf Hadji and Djaal Zeghlache Institut Mines-Téléco, Téléco SudParis UMR CNRS 5157 9, Rue

More information

2. FINDING A SOLUTION

2. FINDING A SOLUTION The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS

More information

A Scalable Application Placement Controller for Enterprise Data Centers

A Scalable Application Placement Controller for Enterprise Data Centers W WWW 7 / Track: Perforance and Scalability A Scalable Application Placeent Controller for Enterprise Data Centers Chunqiang Tang, Malgorzata Steinder, Michael Spreitzer, and Giovanni Pacifici IBM T.J.

More information

Modeling operational risk data reported above a time-varying threshold

Modeling operational risk data reported above a time-varying threshold Modeling operational risk data reported above a tie-varying threshold Pavel V. Shevchenko CSIRO Matheatical and Inforation Sciences, Sydney, Locked bag 7, North Ryde, NSW, 670, Australia. e-ail: Pavel.Shevchenko@csiro.au

More information

SAMPLING METHODS LEARNING OBJECTIVES

SAMPLING METHODS LEARNING OBJECTIVES 6 SAMPLING METHODS 6 Using Statistics 6-6 2 Nonprobability Sapling and Bias 6-6 Stratified Rando Sapling 6-2 6 4 Cluster Sapling 6-4 6 5 Systeatic Sapling 6-9 6 6 Nonresponse 6-2 6 7 Suary and Review of

More information

Quality evaluation of the model-based forecasts of implied volatility index

Quality evaluation of the model-based forecasts of implied volatility index Quality evaluation of the odel-based forecasts of iplied volatility index Katarzyna Łęczycka 1 Abstract Influence of volatility on financial arket forecasts is very high. It appears as a specific factor

More information

Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks

Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Jia-Qi Jin, Tracey Ho California Institute of Technology Pasadena, CA Email: {jin,tho}@caltech.edu Harish Viswanathan

More information

Software Quality Characteristics Tested For Mobile Application Development

Software Quality Characteristics Tested For Mobile Application Development Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology

More information

The individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of

The individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of CHAPTER 4 ARTIFICIAL NEURAL NETWORKS 4. INTRODUCTION Artificial Neural Networks (ANNs) are relatively crude electronic odels based on the neural structure of the brain. The brain learns fro experience.

More information

HW 2. Q v. kt Step 1: Calculate N using one of two equivalent methods. Problem 4.2. a. To Find:

HW 2. Q v. kt Step 1: Calculate N using one of two equivalent methods. Problem 4.2. a. To Find: HW 2 Proble 4.2 a. To Find: Nuber of vacancies per cubic eter at a given teperature. b. Given: T 850 degrees C 1123 K Q v 1.08 ev/ato Density of Fe ( ρ ) 7.65 g/cc Fe toic weight of iron ( c. ssuptions:

More information

ASIC Design Project Management Supported by Multi Agent Simulation

ASIC Design Project Management Supported by Multi Agent Simulation ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously

More information

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University

More information

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2 Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,

More information

ADJUSTING FOR QUALITY CHANGE

ADJUSTING FOR QUALITY CHANGE ADJUSTING FOR QUALITY CHANGE 7 Introduction 7.1 The easureent of changes in the level of consuer prices is coplicated by the appearance and disappearance of new and old goods and services, as well as changes

More information

Fuzzy Sets in HR Management

Fuzzy Sets in HR Management Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic blanka.zekova@sezna.cz Jana Talašová Faculty of Science, Palacký Univerzity,

More information

Chapter 5. Principles of Unsteady - State Heat Transfer

Chapter 5. Principles of Unsteady - State Heat Transfer Suppleental Material for ransport Process and Separation Process Principles hapter 5 Principles of Unsteady - State Heat ransfer In this chapter, we will study cheical processes where heat transfer is

More information

Approximately-Perfect Hashing: Improving Network Throughput through Efficient Off-chip Routing Table Lookup

Approximately-Perfect Hashing: Improving Network Throughput through Efficient Off-chip Routing Table Lookup Approxiately-Perfect ing: Iproving Network Throughput through Efficient Off-chip Routing Table Lookup Zhuo Huang, Jih-Kwon Peir, Shigang Chen Departent of Coputer & Inforation Science & Engineering, University

More information

Multiple-relay selection in amplify-and-forward cooperative wireless networks with multiple source nodes

Multiple-relay selection in amplify-and-forward cooperative wireless networks with multiple source nodes Wu et al. EURASIP Journal on Wireless Counications and Networing 202, 202:256 RESEARCH Open Access Multiple-relay selection in aplify-and-forward cooperative wireless networs with ultiple source nodes

More information

Pricing Asian Options using Monte Carlo Methods

Pricing Asian Options using Monte Carlo Methods U.U.D.M. Project Report 9:7 Pricing Asian Options using Monte Carlo Methods Hongbin Zhang Exaensarbete i ateatik, 3 hp Handledare och exainator: Johan Tysk Juni 9 Departent of Matheatics Uppsala University

More information

Factored Models for Probabilistic Modal Logic

Factored Models for Probabilistic Modal Logic Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008 Factored Models for Probabilistic Modal Logic Afsaneh Shirazi and Eyal Air Coputer Science Departent, University of Illinois

More information

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance

Calculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance Calculating the Return on nvestent () for DMSMS Manageent Peter Sandborn CALCE, Departent of Mechanical Engineering (31) 45-3167 sandborn@calce.ud.edu www.ene.ud.edu/escml/obsolescence.ht October 28, 21

More information

The Fundamentals of Modal Testing

The Fundamentals of Modal Testing The Fundaentals of Modal Testing Application Note 243-3 Η(ω) = Σ n r=1 φ φ i j / 2 2 2 2 ( ω n - ω ) + (2ξωωn) Preface Modal analysis is defined as the study of the dynaic characteristics of a echanical

More information

Considerations on Distributed Load Balancing for Fully Heterogeneous Machines: Two Particular Cases

Considerations on Distributed Load Balancing for Fully Heterogeneous Machines: Two Particular Cases Considerations on Distributed Load Balancing for Fully Heterogeneous Machines: Two Particular Cases Nathanaël Cheriere Departent of Coputer Science ENS Rennes Rennes, France nathanael.cheriere@ens-rennes.fr

More information

Modified Latin Hypercube Sampling Monte Carlo (MLHSMC) Estimation for Average Quality Index

Modified Latin Hypercube Sampling Monte Carlo (MLHSMC) Estimation for Average Quality Index Analog Integrated Circuits and Signal Processing, vol. 9, no., April 999. Abstract Modified Latin Hypercube Sapling Monte Carlo (MLHSMC) Estiation for Average Quality Index Mansour Keraat and Richard Kielbasa

More information

Online Methods for Multi-Domain Learning and Adaptation

Online Methods for Multi-Domain Learning and Adaptation Online Methods for Multi-Doain Learning and Adaptation Mark Dredze and Koby Craer Departent of Coputer and Inforation Science University of Pennsylvania Philadelphia, PA 19104 USA {dredze,craer}@cis.upenn.edu

More information

A quantum secret ballot. Abstract

A quantum secret ballot. Abstract A quantu secret ballot Shahar Dolev and Itaar Pitowsky The Edelstein Center, Levi Building, The Hebrerw University, Givat Ra, Jerusale, Israel Boaz Tair arxiv:quant-ph/060087v 8 Mar 006 Departent of Philosophy

More information

A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials

A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials International Journal of Coputer Science & Inforation Technology (IJCSIT) Vol 6, No 1, February 2014 A Study on the Chain estaurants Dynaic Negotiation aes of the Optiization of Joint Procureent of Food

More information

Dynamic right-sizing for power-proportional data centers Extended version

Dynamic right-sizing for power-proportional data centers Extended version 1 Dynaic right-sizing for power-proportional data centers Extended version Minghong Lin, Ada Wieran, Lachlan L. H. Andrew and Eno Thereska Abstract Power consuption iposes a significant cost for data centers

More information

Modeling Nurse Scheduling Problem Using 0-1 Goal Programming: A Case Study Of Tafo Government Hospital, Kumasi-Ghana

Modeling Nurse Scheduling Problem Using 0-1 Goal Programming: A Case Study Of Tafo Government Hospital, Kumasi-Ghana Modeling Nurse Scheduling Proble Using 0-1 Goal Prograing: A Case Study Of Tafo Governent Hospital, Kuasi-Ghana Wallace Agyei, Willia Obeng-Denteh, Eanuel A. Andaa Abstract: The proble of scheduling nurses

More information

- 265 - Part C. Property and Casualty Insurance Companies

- 265 - Part C. Property and Casualty Insurance Companies Part C. Property and Casualty Insurance Copanies This Part discusses proposals to curtail favorable tax rules for property and casualty ("P&C") insurance copanies. The syste of reserves for unpaid losses

More information