Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks
|
|
- Margaret Burns
- 8 years ago
- Views:
Transcription
1 Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois 628 Eail: Abstract We consider optiizing the packet-sizes and the reuse factor to iniize the delay required to send a essage between two nodes in a linear ulti-hop wireless network subject to a reliability constraint. Initially assuing no re-use, we give a bound on the required delay. Next, in a infinite syste with re-use, we analyze the rate of growth of the delay as a function of the essage size. Two cases are considered: one in which packets are decoded/re-encoded on each hop and one in which this is concatenated with an end-to-end outer code. The later is shown to result in lower delays. I. INTRODUCTION Consider a wire-line network in which a essage is to be divided into several packets of equal size and sent over a sequence of error-free links with transission rate R. Furtherore, suppose that an entire packet ust be received over one link before it ay be sent over the next, and that the network is lightly loaded so that whenever this condition is true the packet ay be sent. Ignoring any overhead per packet, it is then well-known that the end-to-end delay of the essage is iniized by aking the packet-size as sall as possible so as to benefit fro pipelining. If overhead is not ignored, there is an optial packet-size which balances this pipelining effect with the aortization of overhead given by using larger packets. In this paper, we consider a siilar question in the context of a linear ulti-hop wireless network. Here, several new issues arise. First we assue that all nodes transit in a coon frequency-band and so ultiple links interfere with each other. Also, nodes are precluded fro sending and receiving at the sae tie i.e. they ust satisfy a half-duplex constraint. Finally, we assue that links are not error free and that a node has a constraint on the reliability i.e. probability of decoding error at which a essage ust be obtained. Given this odel we consider optiizing the packet-size as well as the schedule of transissions with the objective of iniizing the total delay for sending a packet fro a given source node to a given destination. In this setting for a given transission schedule packet sizes ust now balance the pipe-lining gains with both aortization of overhead as well as eeting the reliability constraint. We forulate a siple linear odel for a ulti-hop network in which all transissions transissions are sent hop-by-hop and interfering transissions are treated as noise. To odel the reliability constraint we use an error exponent odel derived fro the rando coding bound for a Gaussian channel. We initially consider a syste without spatial re-use, i.e. each link is scheduled in its own tie-slot, and derive an upper bound on the end-to-end delay. We then turn to a odel with spatial reuse consider the packet size and re-use distance which either axiize the throughput or iniize the total delay. In the later case, to gain insight we focus on the asyptotic growth of the total delay as the essage size increases to infinity. In this regie, we characterize the optial nuber of packets, for two different coding schees. In the first, each hop is coded individually. In the second, a concatenated coding schee is used to add end-to-end coding. In the first case, the optial nuber of packets satisfies 2 log = Θ, while in the second it satisfies 2 = Θ. In other words, with the concatenated coding schee we use saller packets. The delay under both schees grows at the sae first order rate, but the second order growth is saller with the concatenated schee. Finally we conclude with soe nuerical exaples. Related work includes [], which considers reliability bounds for ulti-hop networks but does not account for spatial reuse and thus pipe-lining as we do here, and [2], which addresses the re-use but focuses on throughput as opposed to delay. II. MODE We consider a one-diensional odel, where all nodes are regularly placed on a one-diensional line and labeled by an integer. One node x is assued to have nats of data to send to another node y. et D be the distance between node x and y, and let H be the nuber of nodes between x and y, each of which is assued to be a relay for the essage i.e. the nuber of hops is H. To siplify the analysis, we assue the queuing delay on each hop is zero. This is reasonable assuing that the given flow has higher priority over other flows in the network. All nodes are assued to transit in the sae frequency band with noralized bandwidth of and treat any interfering transission as noise. The channel between any pair of nodes is odeled by a distance dependent path-loss plus additive Gaussian noise. Furtherore, we assue that the nodes eploy a regular TDM-schedule of length so that In order to siplify the notations, we use nat as the unit for inforation in this paper.
2 in tie-slot t, the nodes n + t od are allowed to transit, for n =...,,,,.... Figure illustrates this space-tie reuse odel. Tie slot Tie slot 2 Tie slot + Node Node 2 Node + Node Node 2 Node +... Node Node 2 Node + Fig.. Space-tie reuse schee. To begin consider a siple odel where all the nodes have the sae transission rate. Assue the nats of inforation are transitted in equal-size packets, and there are h additional nats of overhead in each packet. et RH, denote the transission rate in ters of nats per channel use under certain H and and assue that all transissions are reliable. It follows that +h RH, is the length of the tie-slot for one packet. The end-to-end delay in channel uses is then DH, = + h + H + h RH, RH,, where the first ter is the tie for the source to send all the nats over the first hops, and the second ter is the tie required for the last packet to traverse the reaining H hops. Essentially, this is a pipe-lining calculation as described in the introduction, only now a packet ust traverse hops before a new packet ay be transitted. If H and are fixed, and we ignore the integer constraint on, then the delay is iniized if takes the value: H H, =, 2 h and the optial delay is: 2 + H h D H, = RH,. 3 Notice that if the overhead h is negligible, then the optial / goes to infinity, and so the optial packet size of RH, channel uses goes to zero. We are also interested in the case where each packet ust also eet a reliability constraint, in addition to overhead considerations, this will also prevent the use of arbitrarily sall packets. We next extend our odel to account for this. Specifically we assue that the end-to-end essage error probability for delivering the nats ust be no greater than a constant η. Given this constraint, we then want to iniize the end-to-end delay. Assuing that each node uses a rando Gaussian code, then fro [3], [4], the block error probability b of code with a block-length of N b channel uses is bounded by: b exp N b E, SINR, 4 for any [, ], where b is the nuber of inforation nats contained in one block, SIN R is the Signal-to-Noise-plus- Interference ratio at receiver, and E, SINR is the error exponent deterined by and SINR. For a coplex Gaussian channel with unit bandwidth, a siple expression for the error exponent E, SINR is given by: E, SINR = log + SINR. 5 Given an upper bound η hb on the block error probability b for a single hop, the iniu N hb satisfying N hb log + SINR b log η 6 is the iniu delay for sending a block of b nats over that hop for which we can use 5 to guarantee that the reliability constraint is et. In the rest of the paper, we this value of N hb as the iniu delay for each hop. III. DEAY WITHOUT SATIA REUSE IN FINITE ENGTH SYSTEM Now we return to proble of sending nats of data between two nodes x and y over H equal length hops, but include the reliability constraint. We assue that the distance D between the source and destination is noralized to. 2. Furtherore, there is no other node beyond x and y, and no other interference present. Here we consider the siplest case where only one transission is possible in each tie slot. et N denote the noise power spectru density. Notice that there is exactly one active transitter in each tie slot, we assue the transission power is for each transitter. We consider what are the optial nuber of hops H and what is the nuber of blocks containing the original nats. Before going into the details, we introduce following basic result. ea : In an optiized syste, the delay for each hop is the sae for each packet. This follows directly fro the assuptions that each packet has the sae size and that the channel for each hop is the sae and thus so is its SINR. Thus we assue that the delay is the sae for each hop and we denote this by N hb. et SINR = N H α be the SINR for a hop, where α is the path-loss factor 3. Then, 6 can be rewritten as: N N hb log + H α + h log η hb, 7 2 Changing this distance is equivalent to changing the transission power. Since our results are suitable for any power, we use the noralized distance to siplify our notation. 3 Here, /N is also noralized
3 where η hb is the per hop per block error constraint. Assuing no retransissions, and that coding is done independently over each hop then η hb and the end-to-end error constraint η will satisfy η = η hb H. 8 Considering that η < and N, we have η H H η, 9 which eans that setting η hb = H guarantees the end-to-end essage error probability is less than η. et N = N hb H denote the total delay, then the iniu N satisfying η N H + Hh H log η H log + N H α can be guaranteed to satisfy the reliability constraint. roposition : Without an integer constraint on H, the total delay is upper bounded by H + H h H log η H, log + N H α where H = zα /N α, and zα is the solution to + z log + z = α. roof: Notice that H and are positive integers. The right-hand-side of is onotonically increases with. Thus any given H, the that iniizes is. Note that H + Hh H log η < H + Hh H log η H. 2 log + N H α log + N H α Miniizing, the left-hand side of 2 with respect to H yields the desired result. IV. INFINITE ENGTH SYSTEM Now we consider the situation where siultaneous transissions are enabled so that the SINR includes the effect of interference. To calculate the interference, the knowledge of the sets of transitters in each tie slot is necessary, which coplicated the proble. To siplify this we assue there are infinitely any nodes regularly placed in a one-diensional line that each node in the line always has traffic to send. Thus, for a given transission schedule each node will see the sae SINR. In this section, we noralize the distance between adjacent nodes to be 4 and assue the nuber of hops H between the source node x and the destination node y is a constant. The nodes follow the space-tie reuse schedule as in Fig., so that for a schedule of length the distance between two adjacent transitters is hops. Each user has an average 4 Notice this is a different assuption than the one in previous sections. power constraint of 5 and so transits with power when scheduled. We are still assuing that the essage fro x can be sent to y via ulti-hop transission without queuing delay and are priarily interested in the case where the essage size is large. A. Throughput Optiization Before considering the optial delay proble, we address the related proble of optiizing the end-to-end throughput given a fixed block size of b nats and an end-to-end error constraint of η. et N hb be the one-hop iniu delay for nats of inforation which eets the corresponding per-hop reliability constraint in 6 The average throughput can then be written as R = b. 3 N hb We next consider axiizing this over b and. et γ, be the received SINR at each node, where γ N, = N + i= i + α +.4 j= j α Now, the reliability constraint 6 can be written as γ N hb log +, b log η H. 5 Substituting 5 into 3 yields log + γ N R log η H,. 6 The right-hand side of 6 can be decoposed into two parts, denoted by R and R respectively, Assuing a fixed value of, the first part R = only depends on, and log η H N γ, log+ the second part R = only depends on. It is clear that R is axiized if takes the largest possible value, and a finite axiizes R. To gain soe insight, we consider the optial when takes extree values. In the low SINR regie, where goes to, γ, goes to and optial is the sallest possible. On the other hand, if goes to, then the syste is in interference liited region and the optial is a bounded constant deterined by the syste paraeters. B. Optial Delay The analysis in Section IV-A shows that longer block lengths are preferred to axiize throughput. However, this prohibits pipe-lining and introduces longer delay. Now we return to the proble of iniizing the delay to send a essage of nats of inforation over H hops. As before this essage can be divided blocks of equal size b = +h, h 5 Notice this is also a slightly different noralization than in the previous section.
4 denotes the additional overhead needed per packet. The delay D of sending one block over one hop ust now satisfy D + h log η H, 7 log + γ N, to ensure the reliability constraint is et. Note that D is also the length of one tie-slot. Fro the discussion in Section II, the nuber of tie slots fro x sending out the first block until y receives the last block is H +. Thus the total delay satisfies should satisfy [ ] H + + h log η H D. 8 log + γ N, To gain insight into the paraeters which optiize this we next consider an asyptotic regie, where goes to. V. ASYMTOTIC ANAYSIS In this section, we consider study the asyptotic behavior of the optial paraeters, and as the total inforation goes to. A. Optial orders of and The right-hand side of 8 can be rewritten as D, = log + γ N, + b + log + h + b 2 + b log + b h + b 2, 9 where b = H, and b 2 = log η H. We next consider the behavior of this as for a fixed. roposition 2: et and iniize 9 over and. If, then and satisfy,, and 2 log = Θ. roof: On the right-hand-side of 9, note that + γ N, is bounded, no atter what value is used. The highest order ter is, and all the other ters are of saller orders than. This iplies that, and log = o. The coefficient of the highest order ter,, is + γ N,. It requires to iniize the delay. Therefore,,, and log = o. Now the candidates for the second highest order ters are b and log. These two ters should be asyptotically equivalent to iniize the total delay. Thus which yields the desired result. b log, 2 roposition 2 shows that 2 log increases linearly with, if is fixed. Suppose that there is no reliability constraint, i.e. the transission rate is deterined by SIN R and is independent of. In this case, fro 2, it follows that should increase at the order of Θ 2. This iplies that grows faster without a reliability constraint than when one is present. In other words, with the reliability constraint, an order larger block-size is preferred. B. Optial Fro the proof of roposition 2, the highest order-ter of D, as inf is D, = log + γ N, Furtherore, is shown to go to in roposition 2. Thus the optial is given by log+γ N = arg in k,. log 2 + γ,. as. Thus the optial is a bounded constant. Notice that 2 is the inverse of R in Section IV-A, and so the sae results are valid for the extree values of in high and low SINR regies. VI. CONCATENATED CODING SCHEME reviously, we considered that a essage containing nats is divided into blocks, and the essage is successfully received when there is no error for every block on every hop. Next we relax this assuption and consider a concatenated coding schee as in [5], in which an outer code is also used to correct issing packets which do not arrive at the destination. Assue that the inner code length is N i channel uses, and the outer code length is N out. Assue the diensional rate of the outer code is r, then N out = r N i. 22 Now, consider the error probability per block per hop, it is given by bh exp + h γ N i log +,. 23 Then the end-to-end block error, which is also the inner code error, can be upper bounded as b H bh exp{ N i E i }, 24 where E i = log + γ N, N i h N i log H N i can be interpreted as the error exponent of the inner code. Based on [5], the error exponent of the outer code can be expressed as E o R o = ax re i R i, 25 rr i=r o
5 where R i and R o are the rate for the inner and outer codes, respectively. And R i = N i and R o = N out. roposition 3: et and iniizes the total delay over and. With the concatenated coding schee, if, then the optial and satisfy,, and 2 = Θ. roof: The total essage error can be expressed as 6 e { [ γ exp ax r log +, rr i=r o h log H ] } N out N i N i N i = exp γ Nout log +, } 2 + h + log H, 26 where the optial r in the final step is r + h + log H =. 27 N out log + γ N, To satisfy the end-to-end error requireent η, we have γ Nout log +, + h + log H + log η. 28 Using the sae arguent as the previous section, the total end-to-end delay is D, = H + rn out. 29 lugging 27 and 28 into 29, and using the sae technique as in roposition 2, yield the result. Notice that the total end-to-end delay still grows linearly with. However, the second highest order ters now grow at a slower rate than the schee without concatenated coding, which iplies that this schee will have a order saller endto-end delay. VII. NUMERICA RESUT To illustrate the asyptotic, soe nuerical results are provided in this section. Figure 2 shows the growth order of the inial delays for both the schees with and without concatenated coding. It is clear that the highest order ter doinates the total delay, when the aount of inforation goes to infinity. It also illustrates the changes of optial according to different. Figure 3 are the optial and. The results shown in these two figures are consistent with our analysis. In all of above figures, α = 3, η =., N / =, h =, and H =. Delay Optial Optial Optial 8 6 Optial Delay w/o CC 4 First Order w/o CC Optial Delay with CC First Order with CC Fig. 2. Optial w/o CC Optial with CC Miniu delays and optial s Optial w/o CC Optial with CC Fig. 3. Optial s and s. REFERENCES Optial w/o CC Optial with CC [] O. Oyan, Reliability bounds for delay-constrained ulti-hop networks, in 44th Annual Allerton Conference, Illinois, Sept. 26. [2] M. Sikora, J. N. anean, M. Haenggi, D. J. Costello, and T. Fuja, On the Optiu Nuber of Hops in inear Ad Hoc Networks, in IEEE Inforation Theory Workshop ITW 4, San Antonio, TX, Oct 24. [3] R. G. Gallager, Inforation Theory and Reliable Counication. New York, NY, USA: John Wiley & Sons, Inc., 968. [4] I. E. Telatar and R. G. Gallager, Cobining queueing theory with inforation theory for ultiaccess, IEEE Journal on Selected Areas in Counications, vol. 3, no. 6, pp , August 995. [5] G. D. Forney, Concatenated Codes. M.I.T. ress, Notice E o is the actual error exponent when r is close to. We use E o to calculate the error probability since r indeed approaches when is large.
Resource Allocation in Wireless Networks with Multiple Relays
Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0
More informationThis paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive
MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed
More informationThe Application of Bandwidth Optimization Technique in SLA Negotiation Process
The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia
More informationPREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS
PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,
More informationSearching strategy for multi-target discovery in wireless networks
Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,
More informationAdaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel
Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In
More informationCapacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO., OCTOBER 23 2697 Capacity of Multiple-Antenna Systes With Both Receiver and Transitter Channel State Inforation Sudharan K. Jayaweera, Student Meber,
More informationLoad Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation
Int J Counications, Network and Syste Sciences, 29, 5, 422-432 doi:14236/ijcns292547 Published Online August 29 (http://wwwscirporg/journal/ijcns/) Load Control for Overloaded MPLS/DiffServ Networks during
More informationCooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks
Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna vtlphuong@hciu.edu.vn
More informationON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128
ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute
More informationMachine Learning Applications in Grid Computing
Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA gvc@dartouth.edu, guofei.jiang@dartouth.edu
More informationMedia Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation
Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State
More informationHalloween Costume Ideas for the Wii Game
Algorithica 2001) 30: 101 139 DOI: 101007/s00453-001-0003-0 Algorithica 2001 Springer-Verlag New York Inc Optial Search and One-Way Trading Online Algoriths R El-Yaniv, 1 A Fiat, 2 R M Karp, 3 and G Turpin
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1 Secure Wireless Multicast for Delay-Sensitive Data via Network Coding Tuan T. Tran, Meber, IEEE, Hongxiang Li, Senior Meber, IEEE,
More informationReconnect 04 Solving Integer Programs with Branch and Bound (and Branch and Cut)
Sandia is a ultiprogra laboratory operated by Sandia Corporation, a Lockheed Martin Copany, Reconnect 04 Solving Integer Progras with Branch and Bound (and Branch and Cut) Cynthia Phillips (Sandia National
More informationInternational Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1
International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi
More informationData Set Generation for Rectangular Placement Problems
Data Set Generation for Rectangular Placeent Probles Christine L. Valenzuela (Muford) Pearl Y. Wang School of Coputer Science & Inforatics Departent of Coputer Science MS 4A5 Cardiff University George
More informationOnline Bagging and Boosting
Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used
More informationAn Approach to Combating Free-riding in Peer-to-Peer Networks
An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008
More informationPreference-based Search and Multi-criteria Optimization
Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne ujunker@ilog.fr
More informationInformation Processing Letters
Inforation Processing Letters 111 2011) 178 183 Contents lists available at ScienceDirect Inforation Processing Letters www.elsevier.co/locate/ipl Offline file assignents for online load balancing Paul
More informationAirline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN
Airline Yield Manageent with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Integral Developent Corporation, 301 University Avenue, Suite 200, Palo Alto, California 94301 SHALER STIDHAM
More informationHow To Get A Loan From A Bank For Free
Finance 111 Finance We have to work with oney every day. While balancing your checkbook or calculating your onthly expenditures on espresso requires only arithetic, when we start saving, planning for retireent,
More informationEquivalent Tapped Delay Line Channel Responses with Reduced Taps
Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ
More informationMarkov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center
Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava
More informationOn Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes
On Coputing Nearest Neighbors with Applications to Decoding of Binary Linear Codes Alexander May and Ilya Ozerov Horst Görtz Institute for IT-Security Ruhr-University Bochu, Gerany Faculty of Matheatics
More information6. Time (or Space) Series Analysis
ATM 55 otes: Tie Series Analysis - Section 6a Page 8 6. Tie (or Space) Series Analysis In this chapter we will consider soe coon aspects of tie series analysis including autocorrelation, statistical prediction,
More informationRECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure
RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University
More informationExtended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network
2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona
More informationHow To Balance Over Redundant Wireless Sensor Networks Based On Diffluent
Load balancing over redundant wireless sensor networks based on diffluent Abstract Xikui Gao Yan ai Yun Ju School of Control and Coputer Engineering North China Electric ower University 02206 China Received
More informationLecture L9 - Linear Impulse and Momentum. Collisions
J. Peraire, S. Widnall 16.07 Dynaics Fall 009 Version.0 Lecture L9 - Linear Ipulse and Moentu. Collisions In this lecture, we will consider the equations that result fro integrating Newton s second law,
More informationUse of extrapolation to forecast the working capital in the mechanical engineering companies
ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance
More informationGenerating Certification Authority Authenticated Public Keys in Ad Hoc Networks
SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.
More informationFactor Model. Arbitrage Pricing Theory. Systematic Versus Non-Systematic Risk. Intuitive Argument
Ross [1],[]) presents the aritrage pricing theory. The idea is that the structure of asset returns leads naturally to a odel of risk preia, for otherwise there would exist an opportunity for aritrage profit.
More informationEfficient Key Management for Secure Group Communications with Bursty Behavior
Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:
More informationAn Innovate Dynamic Load Balancing Algorithm Based on Task
An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun
More informationPosition Auctions and Non-uniform Conversion Rates
Position Auctions and Non-unifor Conversion Rates Liad Blurosen Microsoft Research Mountain View, CA 944 liadbl@icrosoft.co Jason D. Hartline Shuzhen Nong Electrical Engineering and Microsoft AdCenter
More informationSOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008
SOME APPLCATONS OF FORECASTNG Prof. Thoas B. Foby Departent of Econoics Southern Methodist University May 8 To deonstrate the usefulness of forecasting ethods this note discusses four applications of forecasting
More informationAn Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach
An Optial Tas Allocation Model for Syste Cost Analysis in Heterogeneous Distributed Coputing Systes: A Heuristic Approach P. K. Yadav Central Building Research Institute, Rooree- 247667, Uttarahand (INDIA)
More informationAN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES
Int. J. Appl. Math. Coput. Sci., 2014, Vol. 24, No. 1, 133 149 DOI: 10.2478/acs-2014-0011 AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES PIOTR KULCZYCKI,,
More informationReal Time Target Tracking with Binary Sensor Networks and Parallel Computing
Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking
More informationDynamic Placement for Clustered Web Applications
Dynaic laceent for Clustered Web Applications A. Karve, T. Kibrel, G. acifici, M. Spreitzer, M. Steinder, M. Sviridenko, and A. Tantawi IBM T.J. Watson Research Center {karve,kibrel,giovanni,spreitz,steinder,sviri,tantawi}@us.ib.co
More informationOptimal Resource-Constraint Project Scheduling with Overlapping Modes
Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de
More informationModels and Algorithms for Stochastic Online Scheduling 1
Models and Algoriths for Stochastic Online Scheduling 1 Nicole Megow Technische Universität Berlin, Institut für Matheatik, Strasse des 17. Juni 136, 10623 Berlin, Gerany. eail: negow@ath.tu-berlin.de
More informationImage restoration for a rectangular poor-pixels detector
Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2
More informationImplementation of Active Queue Management in a Combined Input and Output Queued Switch
pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University
More informationExercise 4 INVESTIGATION OF THE ONE-DEGREE-OF-FREEDOM SYSTEM
Eercise 4 IVESTIGATIO OF THE OE-DEGREE-OF-FREEDOM SYSTEM 1. Ai of the eercise Identification of paraeters of the euation describing a one-degree-of- freedo (1 DOF) atheatical odel of the real vibrating
More informationarxiv:0805.1434v1 [math.pr] 9 May 2008
Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of
More informationAnalyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy
Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou
More informationAn Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking
International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters
More informationCLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY
CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong yongtong.chen@connect.polyu.hk
More informationImpact of Processing Costs on Service Chain Placement in Network Functions Virtualization
Ipact of Processing Costs on Service Chain Placeent in Network Functions Virtualization Marco Savi, Massio Tornatore, Giacoo Verticale Dipartiento di Elettronica, Inforazione e Bioingegneria, Politecnico
More informationIN THIS PAPER, we study the delay and capacity trade-offs
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 15, NO. 5, OCTOBER 2007 981 Delay and Capacity Trade-Offs in Mobile Ad Hoc Networks: A Global Perspective Gaurav Sharma, Ravi Mazumdar, Fellow, IEEE, and Ness
More informationA CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS
A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS Isaac Zafrany and Sa BenYaakov Departent of Electrical and Coputer Engineering BenGurion University of the Negev P. O. Box
More informationApplying Multiple Neural Networks on Large Scale Data
0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree
More informationPREDICTION OF MILKLINE FILL AND TRANSITION FROM STRATIFIED TO SLUG FLOW
PREDICTION OF MILKLINE FILL AND TRANSITION FROM STRATIFIED TO SLUG FLOW ABSTRACT: by Douglas J. Reineann, Ph.D. Assistant Professor of Agricultural Engineering and Graee A. Mein, Ph.D. Visiting Professor
More informationEvaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model
Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary
More informationA framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries
Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries
More informationCRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS
641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC arketa.zajarosova@vsb.cz Abstract Custoer relationship
More informationEndogenous Credit-Card Acceptance in a Model of Precautionary Demand for Money
Endogenous Credit-Card Acceptance in a Model of Precautionary Deand for Money Adrian Masters University of Essex and SUNY Albany Luis Raúl Rodríguez-Reyes University of Essex March 24 Abstract A credit-card
More informationPerformance Analysis of Opportunistic Routing in Multi-Sink Mobile Ad Hoc Wireless Sensor Networks
International Journal of Coputer Applications (0975 8887) Volue 54 No.7, Septeber 2012 Perforance Analysis of Opportunistic Routing in Multi-Sink Mobile Ad Hoc Wireless Sensor Networks Aandeep Singh Dhaliwal
More informationNear-Optimal Power Control in Wireless Networks: A Potential Game Approach
Near-Optial Power Control in Wireless Networks: A Potential Gae Approach Utku Ozan Candogan, Ishai Menache, Asuan Ozdaglar and Pablo A. Parrilo Laboratory for Inforation and Decision Systes Massachusetts
More informationPresentation Safety Legislation and Standards
levels in different discrete levels corresponding for each one to a probability of dangerous failure per hour: > > The table below gives the relationship between the perforance level (PL) and the Safety
More informationBudget-optimal Crowdsourcing using Low-rank Matrix Approximations
Budget-optial Crowdsourcing using Low-rank Matrix Approxiations David R. Karger, Sewoong Oh, and Devavrat Shah Departent of EECS, Massachusetts Institute of Technology Eail: {karger, swoh, devavrat}@it.edu
More informationManaging Complex Network Operation with Predictive Analytics
Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory
More informationMethod of supply chain optimization in E-commerce
MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent
More informationPartitioned Elias-Fano Indexes
Partitioned Elias-ano Indexes Giuseppe Ottaviano ISTI-CNR, Pisa giuseppe.ottaviano@isti.cnr.it Rossano Venturini Dept. of Coputer Science, University of Pisa rossano@di.unipi.it ABSTRACT The Elias-ano
More informationStochastic Online Scheduling on Parallel Machines
Stochastic Online Scheduling on Parallel Machines Nicole Megow 1, Marc Uetz 2, and Tark Vredeveld 3 1 Technische Universit at Berlin, Institut f ur Matheatik, Strasse des 17. Juni 136, 10623 Berlin, Gerany
More informationMarkovian inventory policy with application to the paper industry
Coputers and Cheical Engineering 26 (2002) 1399 1413 www.elsevier.co/locate/copcheeng Markovian inventory policy with application to the paper industry K. Karen Yin a, *, Hu Liu a,1, Neil E. Johnson b,2
More informationEnergy Proportionality for Disk Storage Using Replication
Energy Proportionality for Disk Storage Using Replication Jinoh Ki and Doron Rote Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720 {jinohki,d rote}@lbl.gov Abstract Energy
More informationEnergy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms
Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and igration algoriths Chaia Ghribi, Makhlouf Hadji and Djaal Zeghlache Institut Mines-Téléco, Téléco SudParis UMR CNRS 5157 9, Rue
More information2. FINDING A SOLUTION
The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS
More informationA Scalable Application Placement Controller for Enterprise Data Centers
W WWW 7 / Track: Perforance and Scalability A Scalable Application Placeent Controller for Enterprise Data Centers Chunqiang Tang, Malgorzata Steinder, Michael Spreitzer, and Giovanni Pacifici IBM T.J.
More informationModeling operational risk data reported above a time-varying threshold
Modeling operational risk data reported above a tie-varying threshold Pavel V. Shevchenko CSIRO Matheatical and Inforation Sciences, Sydney, Locked bag 7, North Ryde, NSW, 670, Australia. e-ail: Pavel.Shevchenko@csiro.au
More informationSAMPLING METHODS LEARNING OBJECTIVES
6 SAMPLING METHODS 6 Using Statistics 6-6 2 Nonprobability Sapling and Bias 6-6 Stratified Rando Sapling 6-2 6 4 Cluster Sapling 6-4 6 5 Systeatic Sapling 6-9 6 6 Nonresponse 6-2 6 7 Suary and Review of
More informationQuality evaluation of the model-based forecasts of implied volatility index
Quality evaluation of the odel-based forecasts of iplied volatility index Katarzyna Łęczycka 1 Abstract Influence of volatility on financial arket forecasts is very high. It appears as a specific factor
More informationComparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks
Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Jia-Qi Jin, Tracey Ho California Institute of Technology Pasadena, CA Email: {jin,tho}@caltech.edu Harish Viswanathan
More informationSoftware Quality Characteristics Tested For Mobile Application Development
Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology
More informationThe individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of
CHAPTER 4 ARTIFICIAL NEURAL NETWORKS 4. INTRODUCTION Artificial Neural Networks (ANNs) are relatively crude electronic odels based on the neural structure of the brain. The brain learns fro experience.
More informationHW 2. Q v. kt Step 1: Calculate N using one of two equivalent methods. Problem 4.2. a. To Find:
HW 2 Proble 4.2 a. To Find: Nuber of vacancies per cubic eter at a given teperature. b. Given: T 850 degrees C 1123 K Q v 1.08 ev/ato Density of Fe ( ρ ) 7.65 g/cc Fe toic weight of iron ( c. ssuptions:
More informationASIC Design Project Management Supported by Multi Agent Simulation
ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously
More informationProtecting Small Keys in Authentication Protocols for Wireless Sensor Networks
Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University
More informationExploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2
Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,
More informationADJUSTING FOR QUALITY CHANGE
ADJUSTING FOR QUALITY CHANGE 7 Introduction 7.1 The easureent of changes in the level of consuer prices is coplicated by the appearance and disappearance of new and old goods and services, as well as changes
More informationFuzzy Sets in HR Management
Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic blanka.zekova@sezna.cz Jana Talašová Faculty of Science, Palacký Univerzity,
More informationChapter 5. Principles of Unsteady - State Heat Transfer
Suppleental Material for ransport Process and Separation Process Principles hapter 5 Principles of Unsteady - State Heat ransfer In this chapter, we will study cheical processes where heat transfer is
More informationApproximately-Perfect Hashing: Improving Network Throughput through Efficient Off-chip Routing Table Lookup
Approxiately-Perfect ing: Iproving Network Throughput through Efficient Off-chip Routing Table Lookup Zhuo Huang, Jih-Kwon Peir, Shigang Chen Departent of Coputer & Inforation Science & Engineering, University
More informationMultiple-relay selection in amplify-and-forward cooperative wireless networks with multiple source nodes
Wu et al. EURASIP Journal on Wireless Counications and Networing 202, 202:256 RESEARCH Open Access Multiple-relay selection in aplify-and-forward cooperative wireless networs with ultiple source nodes
More informationPricing Asian Options using Monte Carlo Methods
U.U.D.M. Project Report 9:7 Pricing Asian Options using Monte Carlo Methods Hongbin Zhang Exaensarbete i ateatik, 3 hp Handledare och exainator: Johan Tysk Juni 9 Departent of Matheatics Uppsala University
More informationFactored Models for Probabilistic Modal Logic
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008 Factored Models for Probabilistic Modal Logic Afsaneh Shirazi and Eyal Air Coputer Science Departent, University of Illinois
More informationCalculating the Return on Investment (ROI) for DMSMS Management. The Problem with Cost Avoidance
Calculating the Return on nvestent () for DMSMS Manageent Peter Sandborn CALCE, Departent of Mechanical Engineering (31) 45-3167 sandborn@calce.ud.edu www.ene.ud.edu/escml/obsolescence.ht October 28, 21
More informationThe Fundamentals of Modal Testing
The Fundaentals of Modal Testing Application Note 243-3 Η(ω) = Σ n r=1 φ φ i j / 2 2 2 2 ( ω n - ω ) + (2ξωωn) Preface Modal analysis is defined as the study of the dynaic characteristics of a echanical
More informationConsiderations on Distributed Load Balancing for Fully Heterogeneous Machines: Two Particular Cases
Considerations on Distributed Load Balancing for Fully Heterogeneous Machines: Two Particular Cases Nathanaël Cheriere Departent of Coputer Science ENS Rennes Rennes, France nathanael.cheriere@ens-rennes.fr
More informationModified Latin Hypercube Sampling Monte Carlo (MLHSMC) Estimation for Average Quality Index
Analog Integrated Circuits and Signal Processing, vol. 9, no., April 999. Abstract Modified Latin Hypercube Sapling Monte Carlo (MLHSMC) Estiation for Average Quality Index Mansour Keraat and Richard Kielbasa
More informationOnline Methods for Multi-Domain Learning and Adaptation
Online Methods for Multi-Doain Learning and Adaptation Mark Dredze and Koby Craer Departent of Coputer and Inforation Science University of Pennsylvania Philadelphia, PA 19104 USA {dredze,craer}@cis.upenn.edu
More informationA quantum secret ballot. Abstract
A quantu secret ballot Shahar Dolev and Itaar Pitowsky The Edelstein Center, Levi Building, The Hebrerw University, Givat Ra, Jerusale, Israel Boaz Tair arxiv:quant-ph/060087v 8 Mar 006 Departent of Philosophy
More informationA Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials
International Journal of Coputer Science & Inforation Technology (IJCSIT) Vol 6, No 1, February 2014 A Study on the Chain estaurants Dynaic Negotiation aes of the Optiization of Joint Procureent of Food
More informationDynamic right-sizing for power-proportional data centers Extended version
1 Dynaic right-sizing for power-proportional data centers Extended version Minghong Lin, Ada Wieran, Lachlan L. H. Andrew and Eno Thereska Abstract Power consuption iposes a significant cost for data centers
More informationModeling Nurse Scheduling Problem Using 0-1 Goal Programming: A Case Study Of Tafo Government Hospital, Kumasi-Ghana
Modeling Nurse Scheduling Proble Using 0-1 Goal Prograing: A Case Study Of Tafo Governent Hospital, Kuasi-Ghana Wallace Agyei, Willia Obeng-Denteh, Eanuel A. Andaa Abstract: The proble of scheduling nurses
More information- 265 - Part C. Property and Casualty Insurance Companies
Part C. Property and Casualty Insurance Copanies This Part discusses proposals to curtail favorable tax rules for property and casualty ("P&C") insurance copanies. The syste of reserves for unpaid losses
More information