Fair and Efficient User-Network Association Algorithm for Multi-Technology Wireless Networks

Size: px
Start display at page:

Download "Fair and Efficient User-Network Association Algorithm for Multi-Technology Wireless Networks"

Transcription

1 Far and Effcent User-Network Assocaton Algorthm for Mult-Technology Wreless Networks Perre Coucheney, Cornne Touat and Bruno Gaujal INRIA Rhône-Alpes and LIG, MESCAL project, Grenoble France, {perre.coucheney, cornne.touat, Abstract Recent moble equpment (as well as the norm IEEE 802.2) offers the possblty for users to swtch from one technology to another (vertcal handover). Ths allows flexblty n resource assgnments and, consequently, ncreases the potental throughput allocated to each user. In ths paper, we desgn a fully dstrbuted algorthm based on tral and error mechansms that explots the benefts of vertcal handover by fndng far and effcent assgnment schemes. On the one hand, mobles gradually update the fracton of data packets they send to each network based on the rewards they receve from the statons. On the other hand, network statons send rewards to each moble that represent the mpact each moble has on the cell throughput. Ths reward functon s closely related to the concept of margnal cost n the prcng lterature. Both the staton and the moble algorthms are smple enough to be mplemented n current standard equpment. Based on tools from evolutonary games, potental games and replcator dynamcs, we analytcally show the convergence of the algorthm to far and effcent solutons. Moreover, we show that after convergence, each user s connected to a sngle network cell whch avods costly repeated vertcal handovers. To acheve fast convergence, several smple heurstcs based on ths algorthm are proposed and tested. Indeed, for mplementaton purposes, the number of teratons should reman n the order of a few tens. I. INTRODUCTION The overall wreless market s expected to be served by sx or more major technologes (GSM, UMTS, HSDPA, WF, WMAX, LTE). Each technology has ts own advantages and drawbacks and none s expected to elmnate the rest. Moreover, rado access equpment s becomng more and more mult-standard, offerng the possblty of connectng through two or more technologes concurrently, usng norm IEEE Swtchng between networks usng dfferent technology s referred to as vertcal handover. Ths s currently done n UMA, for nstance, whch gves an absolute prorty to WF over UMTS whenever a WF connecton s avalable. In ths paper, n contrast, we address the problem of computng an optmal and far assocaton through a dstrbuted algorthm. The contrbutons of the paper are: - We propose an teratve dstrbuted algorthm wth guaranteed convergence to a Nash equlbrum, based on real-tme measurements (as opposed to off-lne data). - Based on tools from potental games, we show that, by approprately settng up the reward measure, the resultng equlbra can be made Pareto effcent (optmal for the prce of anarchy [] and the SDF (Selfsh Degradaton Factor) [2]), and can correspond to any α-far pont (defned n cooperatve game theory [3]), for arbtrary chosen value of the parameter α. Ths wde famly of farness crtera ncludes Ths work was performed at the INRIA -ALU Bell Labs. jont laboratory. n partcular max-mn farness and proportonal farness and can be generalzed to cover the Nash Barganng Soluton [4]. - We show that the obtaned equlbrum s always pure: after convergence each user s assocated to a sngle technology. - We valdate our results through extensve smulatons of several mplementatons of the algorthm n the practcal settng of a geographcal area covered by a global WMAX network overlappng wth several local WF cells. Evolutonary games [5], [6], or the closely-related populaton games, are based on Darwnan-lke dynamcs. The evolutonary game lterature ncludes several so-called populaton dynamcs, whch model the evoluton of each populaton as tme goes by. In our context, a populaton could be a set of ndvduals adoptng the same strategy (.e. connected to the same network cell and adoptng dentcal network parameters). Recent work [7] have shown that, consderng the so-called replcator dynamcs, an approprate choce of the ftness functon (that determnes how well a populaton s adapted to ts envronment) leads to effcent equlbra. However they do not provde wth algorthms that follow the replcator dynamcs (and hence converge to the equlbra). Addtonally they do not justfy the use of evolutonary games. Indeed, such games assume a large number of ndvduals, each of them havng a neglgble mpact on the envronment and the ftness of others. Ths assumpton s not satsfed here, where the number of actve users n a gven cell s on the order of a few tens. The arrval or departure of a sngle one of them hence sgnfcantly mpacts the throughput allocated to others. As the number of players s lmted, we are hence dealng wth another knd of equlbra, namely the Nash Equlbra. In the context of load balancng, a few algorthms (see, for nstance [8], [9]) have been shown to converge to Nash Equlbra. It has been ponted out that ths class of algorthms has smlar behavor and convergence propertes as replcator dynamcs n evolutonary game theory. Yet, such algorthms may converge to mxed strategy Nash equlbra, where each user randomly pcks up a decson at each tme epoch. Such equlbra are unfortunately not nterestng n our case, as they amount to perpetual handover between networks. In the present paper, we revst prevous works n evolutonary games, wth addtonal farness consderatons, whle proposng an Nash learnng algorthm that can be mplemented on future moble equpments. In addton, our work present a novel result whch s that our algorthm converges to pure (as opposed to mxed) equlbra, preventng undesred repeated handovers between statons. Due to space lmtaton, the proofs of ths work have been omtted. The nterested reader should refer to [0] for the full verson.

2 II. FRAMEWORK AND MODEL We present below the model and notatons of the paper. A. Interconnecton of Heterogeneous wreless networks We consder a set C of network cells, that can be of varous technologes, and a fxed set I of actve users. Any of the I users can connect to a specfc subset of these cells and network technologes, dependng on her geographcal locaton, wreless equpment and operator subscrpton. B. User throughput and cell load By throughput, we refer to the rate of useful nformaton avalable for a user, n a gven network, sometmes also called goodput n the lterature. It depends on both the user s own parameters and the ones of others. These parameters nclude geographcal poston (nterference and attenuaton level) as well as wreless card settngs (codng schemes, TCP verson,...). As done n prevous papers [], we dscretze the cells of networks nto zones of dentcal throughput. Ths means that users n the same zone wll receve the same throughput. We denote by Z c the set of zones n cell c. The dstrbuton of users and ther number n the zones of a network s called load of the network (see Fg ). Zone separator B Zone 2 Zone WF cell WMAX cell Fg. : Heterogeneous system made of a wde WMAX cell and several WF hot-spots (n grey). As user B (n zone ) s closer to the WMAX antenna, she uses a more effcent codng scheme than A (n zone 2) (eg QAM nstead of QPSK). More formally, we suppose that each user has a set of network cells she can connect to, and a specfc zone assocated to each of them. An admssble choce a for user s a par a = (a c, az ) A. The set of all possble choces s A def = I A. The user s decson s denoted def by A = (A c, Az ). Then, we denote A the vector of users decsons A def = (A ) I, and call t an admssble assocaton. Hence, an assocaton s a functon from the set of users to the set of possble choces. For each assocaton A, the load on zone z of network c s denoted by l (c,z) (A), and s the number of users n ths zone usng cell c: c C, z Z c, l c,z (A) def = δ A,(c,z), wth δ the Kronecker delta I (δ a,b = f a = b and 0 otherwse). Hence, the load l c on cell c s a vector of sze Z c whose components correspond to the load on a partcular zone: l c (A) def = (l c,z (A)) z Zc. Assumpton : The throughput t c,z of cell c n zone z s a functon dependng only of the vector load l c (A) of cell c. Wth ths notatons, the throughput receved by user when she takes decson A = a s t a (l a c (A)). A III. NASH LEARNING ALGORITHM In ths secton, we buld an teratve algorthm wth guaranteed convergence to the Nash equlbrum of the system. A. Nash Equlbra (NE): Defntons Let x be a vector. We denote by x s the s th component of vector x, and by x s the set of the other components. It follows that up to some re-orderng, x = (x s, x s ). We also ntroduce e a a vector of sze Z a c defned by e a [s] def = f s = a z, and 0 otherwse. Defnton (Pure strategy NE): An assocaton scheme A = (A ) I s.t., A = a s a pure strategy NE for reward r f, I, a a, r a (l a c (A)) r a (l a c (A) + e a ). A mxed strategy for user s the choce of a vector probablty q over her possble choces. Each q,a s the probablty wth whch she takes acton a A. Equvalently, a mxed strategy of a user s the choce of the percentage of packets or sessons she sends to each network she has access to. Let S be the set of strateges for user : S = {q [0, ] A s.t. a A q,a = }, and Q S = I S the strategy matrx for all users, Q = (q ) I. When A = a, we denote by r a (l a c (A)) the reward receved by user (as for the throughput, t depends on the choces of the other mobles of the system, reflected n the assocaton vector A). For mxed strateges, R s the random varable correspondng to the reward of user (dependng on probabltes Q). Its mean s E Q [R ] def = E[R (A(Q)) Q = Q]. Defnton 2 (Mxed strateges NE): A set of I probablty vectors q of sze C s a NE f for reward R,, q q, E q,q [ R ] E q,q [ R ]. As the number of users and ther set of choces (networks) s fnte, ths s a fnte game and t admts (at least one) mxed strategy NE [2]. A and T are random varables correspondng respectvely to the decson and the throughput of user (dependng on probabltes Q). Then, the expected throughput for user s wrtten E Q [T ]. (Strctly speakng, T s a functon of the load, tself dependng on the strategy Q. For smplcty however, we omt the load L n the notatons.) B. Our Nash Learnng Algorthm A Nash learnng algorthm s an teratve algorthm on the strategy set that converges to a NE. Based on [8], we consder Algorthm, where b (σ) R s the step of user at tme σ. Snce I, q must reman n the strategy space S, the step sze s constraned by: m b (σ)r c,z (σ), where m = max a ( max( q,a, q ),a ) 0. q,a q,a Algorthm Learnng Algorthm Intalze arbtrarly vectors q (0) for all users At each tme epoch σ, forall user do Take decson â def = A (σ) wth probablty q (σ) Receve reward râ (lâ (A(σ))) Update strategy vector: a A, q,a (σ + ) q,a (σ) + b (σ)r a (l a (A(σ)))(δâc,a c q,a (σ)) () In the followng we use the term users and mobles nterchangeably.

3 Eq. determnes the update mechansm, whch we call system dynamcs. Reward functon: Selfsh behavor may lead to neffcent use. To crcumvent ths, we ntroduce some rewards that are notfed to users. Thus, nstead of competng for throughput, we consder an algorthm reflectng a non-cooperatve game between users that compete for maxmzng ther rewards. We consder the margnal cost prcng [3], whch asserts that each user on a network should pay a tax balancng the loss of throughput caused by her presence. Accordng to the random decson A, we defne the reward functon for user as: r A (l A c (A)) = G ( t a (l A c (A)) ) ( ) G(u,j (A)) G(v j (A)), wth (2) j δ A c j,a c u,j (A) = t Aj (l A c j (A) e A ), and v j (A) = t Aj (l A c j (A)). IV. ALGORITHM PROPERTIES In ths secton, we study the convergence propertes of our Nash learnng algorthm. A. Convergence Consder b def = sup σ max I b (σ), and Q b (θ) def = Q(σ), θ [σb, (σ+)b) the pecewse-constant nterpolaton matrx of Q(σ). Recall that a sequence of random varables (A t ) t R weakly converges to a random varable A f for any contnuous and bounded functon f: E[f(A t )] E[f(A)]. Then: Theorem : When b 0, the sequence {q,a b (.)} weakly converges to the soluton of a dfferental equaton, belongng to the replcator dynamcs famly: dq,a = q,a [f,a (Q) f (Q)], (3) dθ wth f,a (Q)=E Q [R A =a ] and f (Q)= q,a f,a (Q). a B. Effcency and Farness A As we consder elastc or data traffc, the Qualty-of-Servce of each user s her experenced throughput. We hence seek at Pareto optmal NE,.e. matrces Q such that Q Q, I s. t. E Q [T ] > E Q [T ], j I, E Q [T j ] < E Q [T j ]. Further, our NE should not only be Pareto optmal but also α-far [3],.e. satsfes max Q I E Q [G(T )] wth G(x) def = x α α. (4) Note that n pure strateges, for each moble such that A = a, then E Q [T ] = t a (l a c (A)). So, we am at fndng a set of decsons A = (A ) I that reaches max a A I G(t a (l a c (A))). When α=0, the correspondng soluton s a socal optmum. The lmt α s the proportonal far pont (or Nash Barganng Soluton) and α, the max-mn far pont. Parameter α hence gves flexblty n the choce of Pareto optmal ponts: from fully effcent to perfectly far allocatons. Consder a dynamcs V (Q) = dq. We say that Q s a dθ statonary pont for V f V (Q) = 0. Also, Q s asymptotcally stable f there exsts a neghborhood U of Q such that: Q(θ) U Q(θ) Q. Then, one can show that the dynamcs θ (3), (and hence the algorthm when b 0) can only converge to a NE of the system. Followng an dea of [4], we consder the summaton of all users expected α-far throughput: F (Q) = q,a E Q [G(T ) A = a ]. (5) I a A Then, we have the followng proposton: Proposton : F s a potental functon for the dynamcs (3),.e. : I, a A, f,a (Q) = F q,a (Q). For replcator dynamcs (Eq. 3), the potental functon F s a Lyapunov functon (t ncreases along the trajectores) [5], [6]. Hence, the global α-far throughput converges to an optmal pont when the dfferental equaton trajectory approaches a stable state. Ths s summarzed n the followng theorem. Theorem 2: Usng reward functon (2), the dynamcs (3), and hence Algorthm converge to an asymptotcally stable state that maxmzes the total expected α-far throughput. C. Pure Strateges Unlke mult-homng between WF systems (see [7], [4]), mult-homng between dfferent technologes (e.g. WF and WMAX) nduces several complcatons: the dfferent technologes may have dfferent delays, packet szes or codng systems,... and re-constructng the messages sent by the mobles may be hazardous. Durng the convergence phase, each moble s usng mxed strateges. Yet, studyng the stablty of equlbrum ponts of Eq. 3, one can show that our algorthm converges -after a transtonal state- to NE n whch each user uses a sngle network,.e. pure strategy equlbra (full proof avalable n [0]). From Theorem 2 and the fact that the algorthm converges to a pure equlbrum, we can conclude: Theorem 3: Algorthm wth rewards 2 converges to a pure NE whch corresponds to the α-far pont of the system. Probablty q,a Tme epoch σ Fg. 2: Convergence of the probablty values for each of the 5 possble choces of one user. Consder a typcal run of algorthm over a system made of 0 users wth 5 choces over 0 networks (Fg. 2). As, A = 5, then, a A, q,a = 0.2 (ntal equprobablty of all choces). As σ grows, all probabltes tend to 0 except correspondng to the optmal acton at the pure NE. V. IMPLEMENTATION AND VALIDATION Frst, notce that each user only needs to know her own reward to update her step sze and strategy vector. Second,

4 each base staton only needs her own load to compute the rewards, hence allowng for a fully dstrbuted algorthm. In the prevous sectons, convergence of the algorthm has been shown when the step sze b tends to 0. Ths secton shows numercal tests we performed to study possble practcal heurstcs for the step sze computaton. Indeed, whle the step szes should be small enough to ensure convergence, larger values speed up convergence. A. The Dfferent Heurstcs for the Steps Each heurstc actually conssts of two parts: A roundng up test: As tme ncreases, the probabltes of choosng each acton tends ether to 0 or. To speed up convergence, we consder thresholds ɛ m and ɛ M such that: { q,a (σ + ) 0 f q I, a A,,a (σ) < ɛ m q,a (σ + ) f q,a (σ) > ɛ M. After roundng up a strategy, the vector s normalzed to reman n S. In the tests, ɛ m = 0.05 and ɛ M = 0.3. A step sze computaton: : dfferent schemes to compute b (σ) are consdered: ) Constant Step Sze (CSS): the steps are predefned: I, σ, b (σ) = b. Numercal values are b = 0.0 (CSS L, slow but optmal), b= (CSS H ) and the ntermedate b=0. (CSS M ). 2) Constant Update Sze (CUS): the steps are such that the changes of probabltes are bounded by a predefned value q (fxed to 0. n the experments): I, a A, abs (q,a (σ + ) q,a (σ)) q. 3) Decreasng Step Sze (DSS): potental pure NE are detected durng a few large steps teratons and then confrmed or nfered by smaller step teratons. We mplemented 2 varants: a) DSS-SA: Inspred from smulated annealng, we consder cyclc decreasng step sze: b = 3/(σ mod 0). b) DSS-CSS: A DSS phase to stablze most users followed by a constant large step sze to speed up convergence of the others: b = 4/σ f σ < 20 and b = 4 otherwse. B. System Scenaro We consder a smple scenaro of an operator provdng subscrbers wth a servce avalable ether through a large WMAX cell or a seres of WF access ponts. For each smulaton, a topology s chosen randomly, accordng to 3 parameters: number of users, of WF access ponts and of possble choces for each user A. More precsely, for each user: The frst choce s the WMAX cell and one of the 8 possble zones (cf Secton V-C), pcked at random (unformly). All other A choces are one of the C cells, pcked up accordng to a unform law. As explaned n Secton V-C, we do not consder zones n the WF cells. The strategy vector s ntalzed wth equal probabltes: I, a A, q,a (0) = / A. C. Throughput of TCP sessons n WLAN and WMAX To valdate our algorthm, we mplemented n our smulator the average mean throughputs of TCP connectons avalable n the ltterature obtaned through flud approxmatons. Equatons of throughput n WF cells: Based on [7], we consder that the throughput of connecton s L T CP t (l c ) = l c (T DAT A + T ACK + 2T T BO (l c ) + 2T W (l c )) where L T CP = 8000 bts, T ACK =.09 ms, T DAT A =.785 ms. Then, T W and T T BO are soluton of the fxed pont equaton gven n [7]. WMAX: We consder a far sharng of N bc carrers [8]: f p users are present n the cell, each of them wll receve NbC/p sub-carrers. Hence, the throughput of a user n zone z s roughly the fracton / z Zc l c,z of the throughput she would obtan f she were alone n the cell. For a sngle user, we follow expermental values obtaned n [9] for IEEE WMAX 802.6d for ts eght zones: Modulaton QAM64 3/4 QAM64 2/3 QAM6 3/4 QAM6 /2 TCP goodput Modulaton QPSK 3/4 QPSK /2 BPSK 3/4 BPSK /2 TCP goodput D. Comparsons between Heurstcs Fgure 3(a) dsplays the performance (n terms of global throughput) obtaned by the sx heurstcs as a functon of the total number of users I. For a gven load, all heurstcs have been tested on the same topology to allow a far comparson. The small constant step sze (CSS L wth b = 0.0), provdes the best performance. It s even tested optmal for the small values of I, up to 20. Most heurstcs stay wthn 0 % of the optmal (except for DSS-CSS whose performance can be poor). Also note that the total capacty of the system s less than 36 (0 2.6(WF)+9.58 (WMAX)) Mbt/s. Thus, the best heurstc s always wthn 5 % of the optmal. Fnally, t should be noted that the medum constant step sze (CSS M ) wth b = 0. s always very close to the best (CSS L ) and that the constant update sze (CU S) performs better and better when the number of users grows. As for the number of teratons, t vares wdely between the dfferent heurstcs, even on a logarthmc scale (Fgure 3(b)). The CU S heurstc s a clear wnner here (wth an average number of teratons never above 80). Meanwhle, CSS L does not always converge wthn the lmt of 20,000 teratons set n the program. Under hgh loads, CU S provdes the best compromse wth very fast convergence and reasonable performance. Under lght load, the constant step sze of medum sze (CSS M ) s also an nterestng choce, for ts performance s almost optmal and ts number of teratons remans below 00. E. Impact on Farness Consder the followng scenaro: a set of 20 users, each havng 3 avalable choces among 0 cells. The WMAX cell s numbered 0 and ts 8 zones are numbered from 0 to 7. The set of choces of the users are A = {{0, }, {8}, {}} {{0, 5}, {6}, {4}} {{0, }, {6}, {9}} {{0, 2}, {2}, {6}} {{0, 3}, {8}, {9}} {{0, 6}, {4}, {9}} {{0, 7}, {3}, {6}} {{0, 4}, {}, {2}} {{0, 6}, {6}, {9}} {{0, 5}, {3}, {4}} {{0, 6}, {3}, {}} {{0, 7}, {9}, {6}} {{0, 3}, {8}, {}} {{0, 6}, {4}, {7}} {{0, 6}, {9}, {5}} {{0, 0}, {6}, {5}} {{0, 5}, {4}, {}} {{0, 6}, {6}, {4}} {{0, 3}, {3}, {4}} {{0, 3}, {8}, {4}}. The optmal assocaton scheme, for α = 0 (effcent scheme) and α = 2 (far schemes) are respectvely: A eff = {2,, 2,,,,, 2, 2, 2,,, 2, 2, 2, 0, 2,,, }, A far = {0,, 0,, 0, 2,, 2,,, 2,,, 2, 2, 2,, 2, 0, }.

5 Throughput (Mb/s) Number of teratons Load (a) Average performance (b) Average number of teratons Fg. 3: Comparson of the heurstcs (CUS, DSS SA, DSS CSS, CSS L, CSS M and CSS H resp.) under dfferent loads (wth 5% confdence ntervals). The nduced throughputs are: T eff = 0.824,.225, 0.824,.225,.225,.225, 0.824,.225, 0.824,.225, 0.824, 0.824, 0.824, 2.245, 2.246, 9.58, 0.824,.225, 0.824,.225. T far = 2.22,.225, 2.22,.225,.25,.225,.225,.225,.225,.225, 2.245,.225,.225, 2.246,.225,.225,.225,.225,.25,.225. The effcent scheme acheves a total throughput of 3.29 Mb/s. The far scheme suffers a degradaton of slghtly less than 0%, wth a total throughput of Mb/s. Yet a closer look at the fgures ndcates that the effcent scheme leads to hgh dfferences between users (user only obtans a throughput of 0.8 Mb/s whle user 6 s granted 9.58 Mb/s). Meanwhle, n the far assocaton scheme, all users beneft from throughputs hgher. Mb/s. As n bandwdth allocaton mechansms n wred systems [4], the parameter α hence allows one to fnely tune the compromse between maxmum global throughput and farness between users. F. Seamless Adaptaton to User Arrvals and Departures The assocaton algorthm has to be run at every arrval or departure of a user n a cell. We now dscuss the mpact of such events. Frst, typcal tme scales compare ncely: whle arrvals or departures of users n WMAX or WF cells occur every mnute or so, the assocaton algorthm converges n less than a second n most cases, when the best heurstc (CUS) for the step szes s used. Second, the convergence of the algorthm s much faster when the ntal state s chosen close to the former optmal soluton for all old users and one change occurs (an arrval of a departure). Ths s llustrated n Fg. 4: n the frst phase, 30 users wth 3 choces over 0 cells run the algorthm usng CUS step updates. Startng wth unform probabltes (/3, /3, /3), convergence occurs after 60 teratons. Upon arrval of a new user, the algorthm s reset the startng ponts s (/3, /3, /3) for the newcomer and (/4, /4, /2) for all other users, wth probablty /2 gven to the prevously chosen cell. Then, convergence only requres 27 teratons. VI. CONCLUSION AND FUTURE WORKS In ths paper, we have desgned a dstrbuted algorthm that converges to an optmal (n terms of farness or effcency) network assocaton n heterogeneous wreless networks. Ths opens the way to several nterestng future works, such as the mplementaton of such methods n modern moble devces n collaboraton wth Alcatel-Lucent Throughput Convergence Arrval New convergence Load Iteratons Fg. 4: Convergence speed after arrval of a new user. REFERENCES [] E. Koutsoupas and C. Papadmtrou, Worst-case equlbra, n Proc. of STACS, 998. [2] A. Legrand and C. Touat, Non-cooperatve schedulng of multple bag-of-task appplcatons, n Proc. of INFOCOM, May [3] J. Mo and J. Walrand, Far end-to-end wndow-based congeston control, n Proc. of SPIE, I. Symp. on Voce, Vdeo & Data Comm., 998. [4] C. Touat, E. Altman, and J. Galter, Generalsed Nash barganng soluton for banwdth allocaton, Computer Networks, vol. 50, no. 7, pp , Dec [5] J. W. Webull, Evolutonary Game Theory. MIT Press, 995. [6] J. Hofbauer and K. Sgmund, Evolutonary game dynamcs, Bull. Amer. Math. Soc., vol. 40, pp , [7] S. Shakkotta, E. Altman, and A. Kumar, Multhomng of users to access ponts n WLANs: A populaton game perspectve, IEEE J. on Sel. Areas of Comm., vol. 25, no. 6, pp , [8] D. Barth, O. Bournez, O. Boussaton, and J. Cohen, Dstrbuted learnng of Wardrop equlbra, n Proc. of UC, ser. LNCS, vol. 5204, [9] P. Sastry, V. Phansalkar, and A. Thathachar, Decentralzed learnng of Nash equlbra n mult-person stochastc games wth ncomplete nformaton, IEEE Transactons on System, man, and cybernetcs, vol. 24, no. 5, pp , 994. [0] P. Coucheney, C. Touat, and B. Gaujal, A dstrbuted algorthm for far and effcent user-network assocaton n mult-technology wreless networks, INRIA, Tech. Rep., [] M. Coupechoux, J.-M. Kelf, and P. Godlewsk, Network controlled jont rado resource management for heterogeneous networks, n Proc. of IEEE VTC Sprng, [2] J. F. Nash, Equlbrum ponts n n-person games, Proceedng of the Natonal Academy of Scences, vol. 36, pp , 950. [3] R. Cole, Y. Dods, and T. Roughgarden, Prcng network edges for heterogeneous selfsh users, n Proc. of STOC, [4] S. Shakkotta, E. Altman, and A. Kumar, The case for non-cooperatve multhomng of users to access ponts n IEEE 802. WLANs, n Proc. of INFOCOM, [5] D. Monderer and L. S. Shapley, Potental games, Games and Economc Behavor, vol. 4, pp , 996. [6] W. H. Sandholm, Potental games wth contnuous player sets, Journal of Economc Theory, vol. 24, pp. 8 08, 200. [7] D. Morand, A. A. Kheran, and E. Altman, A queueng model for HTTP traffc over IEEE 802. WLANs, IEEE Computer Networks, vol. 50, pp , [8] C. Tarhn and T. Chahed, System capacty n OFDMA-based WMAX, n Proc. of the Int. Conf. on Syst. & Network Comm., [9] F. Yousaf, K. Danel, and C. Wetfeld, Performance evaluaton of IEEE WMAX lnk wth respect to hgher layer protocols, n Proc. of the Int. Symp. on Wreless Communcaton Systems, 2007, pp

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs

Distributed Optimal Contention Window Control for Elastic Traffic in Wireless LANs Dstrbuted Optmal Contenton Wndow Control for Elastc Traffc n Wreless LANs Yalng Yang, Jun Wang and Robn Kravets Unversty of Illnos at Urbana-Champagn { yyang8, junwang3, rhk@cs.uuc.edu} Abstract Ths paper

More information

Stochastic Games on a Multiple Access Channel

Stochastic Games on a Multiple Access Channel Stochastc Games on a Multple Access Channel Prashant N and Vnod Sharma Department of Electrcal Communcaton Engneerng Indan Insttute of Scence, Bangalore 560012, Inda Emal: prashant2406@gmal.com, vnod@ece.sc.ernet.n

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Rapid Estimation Method for Data Capacity and Spectrum Efficiency in Cellular Networks

Rapid Estimation Method for Data Capacity and Spectrum Efficiency in Cellular Networks Rapd Estmaton ethod for Data Capacty and Spectrum Effcency n Cellular Networs C.F. Ball, E. Humburg, K. Ivanov, R. üllner Semens AG, Communcatons oble Networs unch, Germany carsten.ball@semens.com Abstract

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

A Lyapunov Optimization Approach to Repeated Stochastic Games

A Lyapunov Optimization Approach to Repeated Stochastic Games PROC. ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, OCT. 2013 1 A Lyapunov Optmzaton Approach to Repeated Stochastc Games Mchael J. Neely Unversty of Southern Calforna http://www-bcf.usc.edu/

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen, Na L and Steven H. Low Engneerng & Appled Scence Dvson, Calforna Insttute of Technology, USA Abstract Speed scalng has been wdely adopted

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS Novella Bartoln 1, Imrch Chlamtac 2 1 Dpartmento d Informatca, Unverstà d Roma La Sapenza, Roma, Italy novella@ds.unroma1.t 2 Center for Advanced

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

Downlink Power Allocation for Multi-class. Wireless Systems

Downlink Power Allocation for Multi-class. Wireless Systems Downlnk Power Allocaton for Mult-class 1 Wreless Systems Jang-Won Lee, Rav R. Mazumdar, and Ness B. Shroff School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette, IN 47907, USA {lee46,

More information

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things A Game-Theoretc Approach for Mnmzng Securty Rsks n the Internet-of-Thngs George Rontds, Emmanoul Panaouss, Aron Laszka, Tasos Daguklas, Pasquale Malacara, and Tansu Alpcan Hellenc Open Unversty, Greece

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen and Na L Abstract Speed scalng has been wdely adopted n computer and communcaton systems, n partcular, to reduce energy consumpton. An

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Dynamic Pricing for Smart Grid with Reinforcement Learning

Dynamic Pricing for Smart Grid with Reinforcement Learning Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,

More information

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks Coordnated Denal-of-Servce Attacks n IEEE 82.22 Networks Y Tan Department of ECE Stevens Insttute of Technology Hoboken, NJ Emal: ytan@stevens.edu Shamk Sengupta Department of Math. & Comp. Sc. John Jay

More information

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION The Medterranean Journal of Computers and Networks, Vol. 2, No. 1, 2006 57 AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION L. Bada 1,*, M. Zorz 2 1 Department of Engneerng,

More information

Sangam - Efficient Cellular-WiFi CDN-P2P Group Framework for File Sharing Service

Sangam - Efficient Cellular-WiFi CDN-P2P Group Framework for File Sharing Service Sangam - Effcent Cellular-WF CDN-P2P Group Framework for Fle Sharng Servce Anjal Srdhar Unversty of Illnos, Urbana-Champagn Urbana, USA srdhar3@llnos.edu Klara Nahrstedt Unversty of Illnos, Urbana-Champagn

More information

FOURTH Generation (4G) Wireless Networks are developed

FOURTH Generation (4G) Wireless Networks are developed 2600 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 9, NO. 8, AUGUST 2010 Congeston-Based Prcng Resource Management n Broadband Wreless Networks Najah AbuAl, Mohammad Hayajneh, and Hossam Hassanen

More information

Cloud-based Social Application Deployment using Local Processing and Global Distribution

Cloud-based Social Application Deployment using Local Processing and Global Distribution Cloud-based Socal Applcaton Deployment usng Local Processng and Global Dstrbuton Zh Wang *, Baochun L, Lfeng Sun *, and Shqang Yang * * Bejng Key Laboratory of Networked Multmeda Department of Computer

More information

Learning the Best K-th Channel for QoS Provisioning in Cognitive Networks

Learning the Best K-th Channel for QoS Provisioning in Cognitive Networks 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems 1 Mult-Resource Far Allocaton n Heterogeneous Cloud Computng Systems We Wang, Student Member, IEEE, Ben Lang, Senor Member, IEEE, Baochun L, Senor Member, IEEE Abstract We study the mult-resource allocaton

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks

A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks A Resource-tradng Mechansm for Effcent Dstrbuton of Large-volume Contents on Peer-to-Peer Networks SmonG.M.Koo,C.S.GeorgeLee, Karthk Kannan School of Electrcal and Computer Engneerng Krannet School of

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Combinatorial Agency of Threshold Functions

Combinatorial Agency of Threshold Functions Combnatoral Agency of Threshold Functons Shal Jan Computer Scence Department Yale Unversty New Haven, CT 06520 shal.jan@yale.edu Davd C. Parkes School of Engneerng and Appled Scences Harvard Unversty Cambrdge,

More information

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ Effcent Strpng Technques for Varable Bt Rate Contnuous Meda Fle Servers æ Prashant J. Shenoy Harrck M. Vn Department of Computer Scence, Department of Computer Scences, Unversty of Massachusetts at Amherst

More information

Agile Traffic Merging for Data Center Networks. Qing Yi and Suresh Singh Portland State University, Oregon June 10 th, 2014

Agile Traffic Merging for Data Center Networks. Qing Yi and Suresh Singh Portland State University, Oregon June 10 th, 2014 Agle Traffc Mergng for Data Center Networks Qng Y and Suresh Sngh Portland State Unversty, Oregon June 10 th, 2014 Agenda Background and motvaton Power optmzaton model Smulated greedy algorthm Traffc mergng

More information

A New Paradigm for Load Balancing in Wireless Mesh Networks

A New Paradigm for Load Balancing in Wireless Mesh Networks A New Paradgm for Load Balancng n Wreless Mesh Networks Abstract: Obtanng maxmum throughput across a network or a mesh through optmal load balancng s known to be an NP-hard problem. Desgnng effcent load

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

Pricing Internet Access for Disloyal Users: A Game-Theoretic Analysis

Pricing Internet Access for Disloyal Users: A Game-Theoretic Analysis Prcng Internet Access for Dsloyal Users: A Game-Theoretc Analyss Gergely Bczók, Sándor Kardos and Tuan Anh Trnh Hgh Speed Networks Lab, Dept. of Telecommuncatons & Meda Informatcs Budapest Unversty of

More information

Multi-Source Video Multicast in Peer-to-Peer Networks

Multi-Source Video Multicast in Peer-to-Peer Networks ult-source Vdeo ultcast n Peer-to-Peer Networks Francsco de Asís López-Fuentes*, Eckehard Stenbach Technsche Unverstät ünchen Insttute of Communcaton Networks, eda Technology Group 80333 ünchen, Germany

More information

An Introduction to 3G Monte-Carlo simulations within ProMan

An Introduction to 3G Monte-Carlo simulations within ProMan An Introducton to 3G Monte-Carlo smulatons wthn ProMan responsble edtor: Hermann Buddendck AWE Communcatons GmbH Otto-Llenthal-Str. 36 D-71034 Böblngen Phone: +49 70 31 71 49 7-16 Fax: +49 70 31 71 49

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu

More information

An Intelligent Policy System for Channel Allocation of Information Appliance

An Intelligent Policy System for Channel Allocation of Information Appliance Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department

More information

Distributed Multi-Target Tracking In A Self-Configuring Camera Network

Distributed Multi-Target Tracking In A Self-Configuring Camera Network Dstrbuted Mult-Target Trackng In A Self-Confgurng Camera Network Crstan Soto, B Song, Amt K. Roy-Chowdhury Department of Electrcal Engneerng Unversty of Calforna, Rversde {cwlder,bsong,amtrc}@ee.ucr.edu

More information

Many e-tailers providing attended home delivery, especially e-grocers, offer narrow delivery time slots to

Many e-tailers providing attended home delivery, especially e-grocers, offer narrow delivery time slots to Vol. 45, No. 3, August 2011, pp. 435 449 ssn 0041-1655 essn 1526-5447 11 4503 0435 do 10.1287/trsc.1100.0346 2011 INFORMS Tme Slot Management n Attended Home Delvery Nels Agatz Department of Decson and

More information

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 MAC Layer Servce Tme Dstrbuton of a Fxed Prorty Real Tme Scheduler over 80. Inès El Korb Ecole Natonale des Scences de

More information

Cross-Selling in a Call Center with a Heterogeneous Customer Population

Cross-Selling in a Call Center with a Heterogeneous Customer Population OPERATIONS RESEARCH Vol. 57, No. 2, March Aprl 29, pp. 299 313 ssn 3-364X essn 1526-5463 9 572 299 nforms do 1.1287/opre.18.568 29 INFORMS Cross-Sellng n a Call Center wth a Heterogeneous Customer Populaton

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

AD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT

AD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT 1 AD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT Nkos Salamanos, Ev Alexogann, Mchals Vazrganns Department of Informatcs, Athens Unversty of Economcs and Busness salaman@aueb.gr,

More information

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com G. G. Md. Nawaz Al 1,2, Rajb Chakraborty 2, Md. Shhabul Alam 2 and Edward Chan 1 1 Cty Unversty of Hong Kong, Hong Kong, Chna taposh_kuet20@yahoo.comcsedchan@ctyu.edu.hk 2 Khulna Unversty of Engneerng

More information

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg

More information

How To Improve Delay Throughput In Wireless Networks With Multipath Routing And Channel Codeing

How To Improve Delay Throughput In Wireless Networks With Multipath Routing And Channel Codeing Delay-Throughput Enhancement n Wreless Networs wth Mult-path Routng and Channel Codng Kevan Ronas, Student Member, IEEE, Amr-Hamed Mohsenan-Rad, Member, IEEE, Vncent W.S. Wong, Senor Member, IEEE, Sathsh

More information

A Novel Auction Mechanism for Selling Time-Sensitive E-Services

A Novel Auction Mechanism for Selling Time-Sensitive E-Services A ovel Aucton Mechansm for Sellng Tme-Senstve E-Servces Juong-Sk Lee and Boleslaw K. Szymansk Optmaret Inc. and Department of Computer Scence Rensselaer Polytechnc Insttute 110 8 th Street, Troy, Y 12180,

More information

Economic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks

Economic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks Economc-Robust Transmsson Opportunty Aucton n Mult-hop Wreless Networks Mng L, Pan L, Mao Pan, and Jnyuan Sun Department of Electrcal and Computer Engneerng, Msssspp State Unversty, Msssspp State, MS 39762

More information

Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous Servers

Dominant Resource Fairness in Cloud Computing Systems with Heterogeneous Servers 1 Domnant Resource Farness n Cloud Computng Systems wth Heterogeneous Servers We Wang, Baochun L, Ben Lang Department of Electrcal and Computer Engneerng Unversty of Toronto arxv:138.83v1 [cs.dc] 1 Aug

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

The literature on many-server approximations provides significant simplifications toward the optimal capacity

The literature on many-server approximations provides significant simplifications toward the optimal capacity Publshed onlne ahead of prnt November 13, 2009 Copyrght: INFORMS holds copyrght to ths Artcles n Advance verson, whch s made avalable to nsttutonal subscrbers. The fle may not be posted on any other webste,

More information

Economic Models for Cloud Service Markets

Economic Models for Cloud Service Markets Economc Models for Cloud Servce Markets Ranjan Pal and Pan Hu 2 Unversty of Southern Calforna, USA, rpal@usc.edu 2 Deutsch Telekom Laboratores, Berln, Germany, pan.hu@telekom.de Abstract. Cloud computng

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

QoS-Aware Active Queue Management for Multimedia Services over the Internet

QoS-Aware Active Queue Management for Multimedia Services over the Internet QoS-Aware Actve Queue Management for Multmeda Servces over the Internet I-Shyan Hwang, *Bor-Junn Hwang, Pen-Mng Chang, Cheng-Yu Wang Abstract Recently, the multmeda servces such as IPTV, vdeo conference

More information

Network Services Definition and Deployment in a Differentiated Services Architecture

Network Services Definition and Deployment in a Differentiated Services Architecture etwork Servces Defnton and Deployment n a Dfferentated Servces Archtecture E. kolouzou, S. Manats, P. Sampatakos,. Tsetsekas, I. S. Veners atonal Techncal Unversty of Athens, Department of Electrcal and

More information

A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing

A generalized hierarchical fair service curve algorithm for high network utilization and link-sharing Computer Networks 43 (2003) 669 694 www.elsever.com/locate/comnet A generalzed herarchcal far servce curve algorthm for hgh network utlzaton and lnk-sharng Khyun Pyun *, Junehwa Song, Heung-Kyu Lee Department

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

An Evolutionary Game Theoretic Approach to Adaptive and Stable Application Deployment in Clouds

An Evolutionary Game Theoretic Approach to Adaptive and Stable Application Deployment in Clouds An Evolutonary Game Theoretc Approach to Adaptve and Stable Applcaton Deployment n Clouds Chonho Lee Unversty of Massachusetts, Boston Boston, MA 5, USA chonho@csumbedu Yuj Yamano OGIS Internatonal, Inc

More information

The Power of Slightly More than One Sample in Randomized Load Balancing

The Power of Slightly More than One Sample in Randomized Load Balancing The Power of Slghtly More than One Sample n Randomzed oad Balancng e Yng, R. Srkant and Xaohan Kang Abstract In many computng and networkng applcatons, arrvng tasks have to be routed to one of many servers,

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Product-Form Stationary Distributions for Deficiency Zero Chemical Reaction Networks

Product-Form Stationary Distributions for Deficiency Zero Chemical Reaction Networks Bulletn of Mathematcal Bology (21 DOI 1.17/s11538-1-9517-4 ORIGINAL ARTICLE Product-Form Statonary Dstrbutons for Defcency Zero Chemcal Reacton Networks Davd F. Anderson, Gheorghe Cracun, Thomas G. Kurtz

More information

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm

A New Task Scheduling Algorithm Based on Improved Genetic Algorithm A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng Envronment Congcong Xong, Long Feng, Lxan Chen A New Task Schedulng Algorthm Based on Improved Genetc Algorthm n Cloud Computng

More information

Realistic Image Synthesis

Realistic Image Synthesis Realstc Image Synthess - Combned Samplng and Path Tracng - Phlpp Slusallek Karol Myszkowsk Vncent Pegoraro Overvew: Today Combned Samplng (Multple Importance Samplng) Renderng and Measurng Equaton Random

More information

Dynamics of heterogeneous peer-to-peer networks

Dynamics of heterogeneous peer-to-peer networks Dynamcs of heterogeneous peer-to-peer networks Fernando Pagann, Andrés Ferragut and Martín Zubeldía Unversdad ORT Uruguay Abstract Dynamc models of populaton n peer-to-peer fle sharng systems have focused

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems

Schedulability Bound of Weighted Round Robin Schedulers for Hard Real-Time Systems Schedulablty Bound of Weghted Round Robn Schedulers for Hard Real-Tme Systems Janja Wu, Jyh-Charn Lu, and We Zhao Department of Computer Scence, Texas A&M Unversty {janjaw, lu, zhao}@cs.tamu.edu Abstract

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

Implementation of Deutsch's Algorithm Using Mathcad

Implementation of Deutsch's Algorithm Using Mathcad Implementaton of Deutsch's Algorthm Usng Mathcad Frank Roux The followng s a Mathcad mplementaton of Davd Deutsch's quantum computer prototype as presented on pages - n "Machnes, Logc and Quantum Physcs"

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

Dynamic Fleet Management for Cybercars

Dynamic Fleet Management for Cybercars Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.

More information