Resource Reservation and Utility based Rate Adaptation in Wireless LAN with Slow Fading Channels

Size: px
Start display at page:

Download "Resource Reservation and Utility based Rate Adaptation in Wireless LAN with Slow Fading Channels"

Transcription

1 Resource Reservatio ad Utility based Rate Adaptatio i Wireless LAN with Slow Fadig Chaels Floriao De Rago, Peppio Fazio 2 ad Salvatore Marao D.E.I.S. Dept, Uiversity of Calabria Via P.Bucci, cubo 42/c, Arcavacata di Rede (CS), 8736, Italy {derago, marao}@deis.uical.it, 2 [email protected] Abstract Recetly there is a growig iterest i the adaptive multimedia etworkig where the badwidth of a ogoig multimedia flow ca be dyamically adjusted. I this paper the attetio is focused o the maagemet of mobility idepedet services. The cosidered class of service has bee the MIP class, defied i Itegrated Services for mobile wireless eviromet. I order to offer a adaptive QoS (soft QoS) icreasig the total wireless system utilizatio, a rate adaptatio algorithm has bee cosidered. The valued algorithm is based o user utility fuctio ad its target is to maximize this fuctio. The mobility of host ca impact o umber of hadoff ad o chael states (fadig), so the rate adaptatio accouts the degradatio chael state coditios. A algorithm of admissio cotrol has bee cosidered too i order to regulate the access to wireless multimedia etwork. The admissio cotrol ca use the pre-reservatio phase amog the visited cells from mobile hosts for MIP. The performace evaluatios of the wireless system have bee evaluated i terms of total badwidth utilizatio for MIP services, average user utility perceived by mobile users ad system outage probability. Keywords Admissio cotrol, adaptive badwidth allocatio, utility fuctio, Markov model, fadig chaels, pre-reservatio. I. INTRODUCTION There has bee a rapid growth i popularity of wireless data services ad a icreasig maturity of wired multimedia etworks so, extedig multimedia services ito wireless etwork is ievitable. Wireless commuicatios pose special problems, such as limited badwidth ad high error rate, that do ot exist i wired etworks; i additio, the dyamics of physical chaels cause fluctuatios i received sigals; for these reasos, determiistic service guaratees ad badwidth allocatio, commoly used i wired etworks, become iadequate for dealig with wireless commuicatios. User mobility has a importat impact o QoS parameters of real-time applicatios ad the existig protocols, as proposed i [], must be exteded i order to maage host s mobility. This ca be hadled by usig the MRSVP protocol, which is based o active ad passive reservatios ad capable to pre-reserve a amout of badwidth for MIP flows to guaratee the desired QoS durig had-off evets. Sice the dyamics of the resources i mobile computig eviromets is much more severe tha i wirelie eviromets, it is perceived i the scietific commuity the eed to provide effective mechaisms for adaptatio at multiple badwidth levels There differet work i literature that accout the adaptatio of the resource i wireless eviromet ad base the criteria of the badwidth adaptatio o differet idexes as the mi-max fairess criteria, the protocol overhead or the degradatio degree of the flows [8,9]. These algorithms, however, do ot accout the coditio of wireless chael that ca affect the performace of the wireless system. I a etwork ca be preset situatio i which it is ot useful to give a particular amout of badwidth if the chael is i a bad coditio ad the error rate is so high. I this case ca be more useful to give the badwidth to flow that ca take advatage of a better state of the chael. Differet users may experiece differet lik capacities due to differet locatios, ad we believe that badwidth should be allocated i a adaptive ad lik-state depedet way. To cosider the heterogeeity of differet applicatios ad to have a cosistet performace measure, we adopt utility fuctios i our proposed adaptive QoS model. I this paper, we propose a utility-orieted badwidth allocatio scheme ad admissio cotrol policy, which accout for the users QoS requiremets ad actively adapts to the dyamics of the physical chael. There has bee much work o wireless resource maagemet, focusig o multiple access ad chael allocatio, however there is less research o addig a explicit adaptive mechaisms to badwidth allocatio schemes to deal with the variatios of wireless chaels. The rest of the paper is orgaized as follows. Sectio II discusses the user mobility effect ad the wireless variatios. I Sectio III the lik model ad the utility orieted adaptive QoS model are discussed. Sectio IV describes the simulatio results ad Sectio V cocludes the paper. II. DEALING WITH USER MOBILITY AND LINK VARIATIONS I order to offer a adaptive QoS or a better tha best-effort service due to the iheret time varyig evirometal coditios evidet i radio commuicatios (e.g. fadig), it is used a architecture capable to reserve badwidth levels ad to offer guarateed services. This last oe is the Itegrated Services Network [2] with mobile host ad Mobile Resource Reservatio Protocol (MRSVP) [3] is used for exchagig state iformatio of wireless etworks. This protocol ca offer soft QoS (adaptive QoS) for a class of services called Mobility Idepedet Predictive (MIP) ad users belogig to this class request service guaratees, regardig delay i packet delivery ad drop probability durig had-off evets. Accordig to adaptive multimedia wireless framework [4], MIP ca reserve a badwidth level that ca chage durig call holdig time. These behaviour ca guaratee a more flexible resource maagemet icreasig the system utilizatio. The MRSVP protocol esures the absece of flow droppig for MIP class whe the users chage their coverage areas by the passive reservatio policy: a active reservatio is made i the actual coverage access poit (where the coectio is bor) ad a certai amout of passive badwidth (depedet o the allocatio schemes used) is reserved i the remote access poits, that will be visited by user durig the coectio. I this way, MIP users caot fid a ew overloaded cell durig a had-off evet ad they ca be served i adequate maer to cotiue their data sessios. User mobility is also oe of the reasos which cause chael quality degradatios durig a coectio: we cosidered the multipath fadig pheomeo, as direct cosequece of user mobility ad time-varyig impulse respose of radio liks; i particular our work takes i accout the slow-fadig effect, which takes place whe the evolutio of lik chages ca be cosidered to be slower

2 tha symbol trasmissio time. I this way, we give more effectiveess to used rate adaptatio algorithm ad reservatio protocol, because the offered etwork service always guaratees the miimum delay requests made by users, by allocatig more resources to face trasmissio errors due to absece of ideality i radio chaels. To hadle physical lik variability, low level mechaisms, such as error correctio codig ad swappig trasmissio opportuities i packet schedulig, are usually used, but they become iadequate for slow lik variatios; we itroduced a high-level badwidth allocatio scheme that adjust the average badwidth share of each user as the lik quality chages. As we see, mobility ad fadig ca chage system coditios, so it is ecessary to use rate adaptatios algorithms for varyig badwidth levels, accordig to chael coditios ad host mobility. I this case, the used rate adaptatio algorithm is based o a utility fuctio associated to MIP class ad it tries to maximize the user profile satisfactio modelled by these target fuctios [5]. III. SYSTEM MODELING A. Modelig the Time-varyig Lik I our work we employed a Markov chai model to describe the behavior of a radio-lik betwee users ad access-poits, as proposed i [6]. We eeded to itroduce the chai model to cosider the absece of ideality i wireless commuicatios ad the fluctuatios i the received sigal level, due to the various propagatio pheomea durig a geeric coectio (shadowig, refractio, fadig, etc.). As we will see, each chai state has a associated ratio, which represets the received percetage of corrupted bits. The model ca oly be used uder the assumptio of slow fadig. Let S = {s, s,, s K- } deote a fiite set of states ad {S }, =,,2, be a costat Markov process, with the property of statioary trasitios, the the trasitio probability is idepedet of the time idex ad ca be writte as t = P S + = s S = s ), () j, k r ( k j for all =,,2, ad j,k {,,2,,K-}; we ca defie a KxK state trasitio probability matrix T, with elemets t j,k. Moreover, with the statioary trasitio property, the probability of state k without ay state iformatio at other time idices ca also be defied as p k = Pr (S = s k ), where k {,,2,,K-}, so a Kx steady probability vector p ca be defied with its elemet p k. To complete the descriptio of the chai model, we require additioal iformatio o the chael quality for each state, so we ca defie a Kx crossover probability vector e with its elemets e k, k {,,2,,K-}. Now the FSMC is completely defied by T, p ad e. Uder the hypothesis of a received sigal evelope Rayleigh distributed, we ca derive a relatioship betwee physical chael ad its fiite-state model, by partitioig the rage of the received SNR ito a fiite umber of itervals. Fig. 2. SNR ad BER for some digital modulatio schemes Let = A < A < A 2 < < A k = be the thresholds of the received sigal to oise ratio, the the Rayleigh fadig chael is said to be i state s k, k =,,2,,K- if the received SNR is i the iterval [A k,a k+ ). Associated with each state there is a crossover probability e k ad, give a specific digital modulatio scheme, the average error probability is a fuctio of the received sigal to oise ratio (the value of e k is the average error probability o trasmittig a bit whe the received SNR falls i the k-th iterval). The elemets of p ad e ca be writte as follows: pk = Ak + Ak a ρ e da, ρ Ak a ek = e Pe ( a) da / pk, A + ρ ρ k where P e (a) depeds o the digital modulatio scheme chose. I our simulatios we cosidered the CCK modulatio (as i the stadard IEEE82.b) [7], ad P e ( CCK ) ) 2 ( ( a = Q 2 a ). (4) Due to the o liearity betwee SNR ad e k, the SNR itervals may have to be o-uiform to be useful. Figure 2 illustrates the course of BER versus SNR for some kid of useful digital modulatio schemes (Biary Frequecy Shift Keyig, Biary Phase Shift Keyig ad Complemetary Code Keyig). The thresholds A k, with k =,, K-, ca be calculated by choosig the desired values of cross-over probabilities, directly depedet from the degradatio percetage of each state by a etropy fuctio, ad solvig the previous expressio for e k (i our work we proceeded i umerical way). Figure 3 shows the geeral partitioig method of SNR values. The etire modellig techique is based o the kowledge of chael state iformatio (CSI): we assumed that, give the chael capacity, we ca obtai the related values of crossover probabilities by usig a etropy fuctio I particular, whe the CSI is available, the chael capacity is the average capacity over all the states: (2) (3) K = pk [ h( e k )] k = C (5) Fig.. A fiite state Markov chai

3 where h(.) is the biary etropy fuctio defied as: h( e) = e log + ( e) log. (6) e e Fig. 4. A example of utility fuctio Fig. 3. Relatio betwee SNR, BER ad chai states To calculate the trasitio probabilities t j,k we first assumed that the Rayleigh fadig chael is slow eough that the received SNR remais at a certai level for the time duratio of a chael symbol; furthermore, the chael states associated with cosecutive symbols are assumed to be eighborig states. If f d is the maximum Doppler shift itroduced by the user mobility ad T the symbol trasmissio time, the we say that the slow-fadig coditio is verified if f d *T<<. B. Adaptive QoS Model ad Badwidth Allocatio Scheme We used a utility-orieted algorithm for rate-adaptatio ad admissio cotrol, cosiderig the time-varyig ature of liks, betwee hosts ad access poits [5]. I our case, we used mootoically o-decreasig utility fuctios, describig how the perceived utility chages with the amout of effective badwidth received by the user. I our service model, each user i ca sigal its utility fuctio U i (r) to the etwork, where r is the amout of effective badwidth received by the user ad the badwidth allocated to a flow ca take its discrete value from the set B={l,l 2,,l }, where l i <l i+ for i=,.., -. It is assumed that the calls ca belog to MIP class ad all of them take (varyig) badwidth values from the same set B. The etwork tries to dyamically allocate badwidth such that each user's istat utility is maitaied above the miimum level ad, i the log ru, the badwidth is allocated fairly ad utilized efficietly. As described earlier, the commuicatio lik of each user ca be modelled by a k-state Markov chai: we ca idicate the average state-holdig time of each state m with t m ad the badwidth degradatio ratio of the state with D m, where D m <, m k. If, at a particular time istace, r i is the amout of badwidth that the etwork is allocatig to user i, we defie the received istat utility as u i = U i ((-D i,m )*r i ). Oe of the objectives of the badwidth allocatio scheme is to guaratee the miimum utility level for each user i; if we defie utility outage as the evet that user i s istat utility level falls below the miimum, the scheme should guaratee that the probability of a utility outage is smaller tha a certai threshold p outage. I additio, the fairess criterio should also be based o utility: cosiderig users i ad j with average utility u i,avg ad u j,avg respectively, we ca defie the ormalized gap of the average utility received ad the miimum level u *,mi as: G i =(u i,avg -u i,mi )/u i,mi, so we wat all users to have the same ormalized gap i the log ru (G i G j, i,j). Whe a user s lik degrades, it may surreder some badwidth to aother user, with a smaller ormalized gap; whe a lik upgrades the user may receive some badwidth from aother oe, with a larger ormalized gap; i this way there is a et gai i the combied istat utility. If at a particular time user i s lik state chages to state p, the followig steps are performed: ) all users average utility level ad ormalized gap are updated; 2) users are sorted i icreasig order of ormalized gap; 3) if the istat utility level of user i is below the miimum, some users badwidth will be reduced ad reallocated to user i to meet its ui,mi; 4) if there is o step three, user i may give up part of its badwidth to aother user if the lik degrades, whereas it may receive some badwidth if the lik upgrades. We call the user who gives up part of its badwidth to others the beefactor, ad the user who receives badwidth from others the beeficiary. I the third step, to satisfy user i s u i,mi, the scheme searches for beefactor(s) startig from the user with the largest ormalized gap. Suppose the user with the largest ormalized gap is user j, whose lik is curretly i state q ad it is above u j,mi. User j will yield ri,mi rj,mi mi( ri, rj ) Di, p D j, q amout of badwidth to user i, where r i ad r j are the badwidth allocated to users i ad j, respectively, before the lik state trasitio. This procedure will be repeated util u i,mi is reached or all the users have bee checked. Whe user i s lik degrades, the scheme will search for a appropriate beeficiary, checkig the users i icreasig order of ormalized gap; whe the beeficiary is foud, the scheme decides the amout of badwidth to trasfer betwee the users, tryig to maximize the combied utility of them. This procedure is repeated util oe beeficiary is foud or all users with smaller ormalized gap tha user i s have bee checked. Similarly, whe user i s lik upgrades, user i becomes the beeficiary ad users with larger ormalized gap are the cadidates for beefactor. The scheme checks the cadidates i decreasig order of ormalized gap ad, whe the beefactor is foud, the scheme decides the amout of badwidth to exchage, maximizig the combied utility of the two users. Besides the lik state chages, adjustmets i badwidth allocatio are also eeded whe a user arrives (ew user) or departs. If r is the amout of badwidth which eeds to be collected from curret users because of a user arrival, user j with largest ormalized gap G j is to give up (7)

4 mi(max(, r j rj,mi ), r) (8) D j, q amout of badwidth, where q is the curret lik state of user j. This procedure will be repeated util eough badwidth has bee collected or all the curret users have bee serched. If after searchig all the curret users, the collected badwidth is still ot eough, the scheme will start a secod roud of collectio, agai startig from the user with the largest ormalized gap, but, this time, each chose user will be dropped out from the etwork. Similarly, if there is surplus badwidth, the users with the first k smallest ormalized gap are chose to receive the surplus badwidth. Each user ca icrease its effective badwidth up to the maximum effective badwidth level. To guaratee users miimum utility level, a admissio cotrol policy should be eforced to limit the umber of users i the system. Recallig that whe a user s istat utility falls below its miimum utility level there is a utility outage for the user, the probability p of such evet at ay time is: p ri = Pr D i= i,mi, mi > R, where m i is user i s lik state at the time istace, p mi is the probability of the user i s lik to beig i state m at a particular time, is the total umber of users icludig the ew oe ad R represets the badwidth associated to the wireless cell c. Modellig the wireless chael through a FSMC, it is possible to kow the value of p i the worst case, accoutig the chael state coditios i the followig way: rl, p = pm, A = { m, m2,..., m m,..., m k, > R}. i () Dl, m A l i The admissio cotrol algorithm works differetly for two classes of service (MIP, MDP). For MIP class, the flow is admitted if: C p, c C poutage, c= (9) () where C = umber of cells that mobile host will visit ad p outage is the outage probability of the wireless system (for MDP class, the coditio must be verified oly for the curret cell). So, whe a ew user arrives, the scheme calculates p,c as described ad if p,c p outage for each cell, the ew user is admitted, otherwise it is rejected. If a user j is admitted, it is iitially allocated r j,mi /(-D j,q ), where q is user j s curret lik state. The assiged amout of badwidth to j is cotributed by the users curretly i the etwork followig the algorithm we described previously. IV. SIMULATIONS Our simulated et cosists of 5 wireless cell, each oe covered by a access poit (as illustrated i figure 5) with badwidth capacity of 5.5Mbps; the access poits are wired coected, by a switchig subet, to the et-seder. I our model, each mobile host moves ahead i circular way: a user that is receivig data i cell 5 will visit cell, after a had-off. Each wireless lik is described by a 4-states Markov chai, with the followig parameters: Tab.. Values for the Markov chai model p i e i D i (%) t mi (s) e-5. Fig. 5. The simulated et The protocol used i the simulatios has bee the MRSVP [3] with MIP ad MDP services. The MIP services have the capability to make advace reservatio o the potetially visited cells offerig a adaptive QoS with the host mobility. The MDP services ca reserve the resources oly o the curret cell ad for this reaso they are ot able to guaratee a adaptive QoS with host mobility. The MIP services are evaluated for differet outage probabilities fixed o the CAC algorithm. The set of possible discrete badwidth levels (Kbps) is: B = {52, 64, 768, 896} ad the utility fuctio is the same of figure 4, so the set of istat utility values is: U = {,2,3,4} for all users. I our simulatios the traffic load is composed by MIP ad MDP flows, as provided i ISPNs: i particular, there are 8% MIP ad 2% MDP flows. The badwidth is maaged by the policies illustrated i Sectio III ad the outage threshold is the same for both flow classes (cojuctive badwidth maagemet). The mobile host ca move with average speed selected uiformly i rage [5,75] Km/h. The followig curves illustrates the performaces of the utility-orieted algorithm for differet values of outage threshold ad mobile host speed. From figure 6 it ca be observed that the allocated badwidth for MIP users is ear the maximum level for every host s speed ad decreases by icreasig the outage threshold: the admissio cotrol becomes less selective if the p outage value is icreased, so more MIP users ca eter the etwork; i this way, the available badwidth is shared amog a higher umber of cocurret flows, which receive a lower amout of resources. For the same reasos, the perceived utility from MIP users (figure 7) assumes differet values, depedig o the fixed threshold; higher p outage values imply lower perceived utility values. I figure 8 we ca see that the system utilizatio does ot exceed the 85% percetage ad decreases for higher speed or higher threshold values. As the user s speed icreases, the physical radio lik chages its state with higher frequecy, so more badwidth reallocatio are made by the system ad this implies a resource wastage; i additio, if a high threshold value (like ) is fixed, more users ca access the system, which tries to avoid outage evets more frequetly; this is aother reaso of badwidth wastage, which causes a uder-utilizatio of the etwork. The

5 absece of a high system utilizatio values derives from the presece of high percetage of MIP traffic (8%): there is a lot of badwidth wastage, due to the passive reservatios made by system (MIP flows reserve the maximum badwidth level i their remote cells). Figure 9 shows the average umber of admitted MIP flows ad, as discussed above, it ca be observed that there is a visible icrease for higher values of outage threshold: the system admits a larger umber of users, but gives smaller guaratees about the outage evets bw (Kbps) Fig. 6. Allocated badwidth to MIP services for differet outage probability p ad speed values Fig. 9. Admitted MIP flows for differet outage probability p ad speed values V. CONCLUSIONS I this paper we aalyzed the performaces of a proposed utility-orieted algorithm ad we also see that there is eed to cosider the physical lik variability, i order to give more effectiveess to badwidth allocatio schemes ad to take i accout the absece of ideality durig radio coectios. From simulatio results we observed that the chael degradatio becomes more evidet for high speed values ad the had-off umber icreases, but the pre-reservatio of MIP classes guaratees a full compliace to QoS parameters (outage probability ad maximized user utility fuctio) for low values of outage threshold, so the mobility effects are miimized. u Fig. 7. MIP received utility for differet outage probability p ad speed values u Fig. 8. System utilizatio (*) for MIP services for differet outage probability p ad speed values REFERENCES [] R. Brade, L. Zhag, Resource ReSerVatio Protocol (RSVP) - Versio Message Processig Rules, September 97. [2] Clark, D.D. Sheker, S. ad Zhag, Supportig Real-Time Applicatios I A Itegrated Services Packet Network: Architecture ad Mechaism., Proc. SIGCOMM 92, 92. [3] Talukdar A. K., Badriath B.R. ad Acharya A., MRSVP: A Reservatio Protocol for a Itegrated Services Packet Network with Mobile Hosts. [4] V.Bharghava, K-W.Lee, S.Lu, S.Ha, J-R.Li, D.Dwyer, The TIMELY Adaptive Resource Maagemet Architecture, IEEE Persoal Commuicatios Mag., pp.2-3, Aug.998. [5] Y.Cao, Victor O.K.Li, Utility-orieted Adaptive QoS ad Badwidth Allocatio i Wireless Networks, IEEE It. Cof. O Commuicatios (ICC22). [6] H.S.Wag, N.Moayeri, Fiite-State Markov Chael-A Useful Model for Radio Commuicatio Chaels, IEEE Tras. O Vehicular Techology, vol.44, o., pp.63-7, Feb.995. [7] Part:Wireless LAN Medium Access Cotrol (MAC) ad Physical Layer (PHY) specificatios: Higher-Speed Layer Extesio i the 2.4GHz Bad, IEEE Std 82.b-999. [8] F. De Rago, G. Aloi, S. Marao, A Efficiet Rate Adaptatio Scheme i Wireless Mobile Networks, to appear o Wireless Telecommuicatios Symposium (WTS24), Pomoa, Califoria, USA, May 24. [9] A.K.Talukdar, B.R.Badriath, A.Acharya, Rate Adaptatio Schemes i Networks with Mobile Hosts, Proc. Of ACM/IEEE MOBICOM,998

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

Domain 1 - Describe Cisco VoIP Implementations

Domain 1 - Describe Cisco VoIP Implementations Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.

More information

Determining the sample size

Determining the sample size Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors

More information

Subject CT5 Contingencies Core Technical Syllabus

Subject CT5 Contingencies Core Technical Syllabus Subject CT5 Cotigecies Core Techical Syllabus for the 2015 exams 1 Jue 2014 Aim The aim of the Cotigecies subject is to provide a groudig i the mathematical techiques which ca be used to model ad value

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

How to read A Mutual Fund shareholder report

How to read A Mutual Fund shareholder report Ivestor BulletI How to read A Mutual Fud shareholder report The SEC s Office of Ivestor Educatio ad Advocacy is issuig this Ivestor Bulleti to educate idividual ivestors about mutual fud shareholder reports.

More information

On the Capacity of Hybrid Wireless Networks

On the Capacity of Hybrid Wireless Networks O the Capacity of Hybrid ireless Networks Beyua Liu,ZheLiu +,DoTowsley Departmet of Computer Sciece Uiversity of Massachusetts Amherst, MA 0002 + IBM T.J. atso Research Ceter P.O. Box 704 Yorktow Heights,

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

INVESTMENT PERFORMANCE COUNCIL (IPC)

INVESTMENT PERFORMANCE COUNCIL (IPC) INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks

More information

ODBC. Getting Started With Sage Timberline Office ODBC

ODBC. Getting Started With Sage Timberline Office ODBC ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.

More information

CHAPTER 3 DIGITAL CODING OF SIGNALS

CHAPTER 3 DIGITAL CODING OF SIGNALS CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity

More information

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

A Churn-prevented Bandwidth Allocation Algorithm for Dynamic Demands In IaaS Cloud

A Churn-prevented Bandwidth Allocation Algorithm for Dynamic Demands In IaaS Cloud A Chur-preveted Badwidth Allocatio Algorithm for Dyamic Demads I IaaS Cloud Jilei Yag, Hui Xie ad Jiayu Li Departmet of Computer Sciece ad Techology, Tsighua Uiversity, Beijig, P.R. Chia Tsighua Natioal

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information

CHAPTER 3 THE TIME VALUE OF MONEY

CHAPTER 3 THE TIME VALUE OF MONEY CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all

More information

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

Baan Service Master Data Management

Baan Service Master Data Management Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :

More information

Bond Valuation I. What is a bond? Cash Flows of A Typical Bond. Bond Valuation. Coupon Rate and Current Yield. Cash Flows of A Typical Bond

Bond Valuation I. What is a bond? Cash Flows of A Typical Bond. Bond Valuation. Coupon Rate and Current Yield. Cash Flows of A Typical Bond What is a bod? Bod Valuatio I Bod is a I.O.U. Bod is a borrowig agreemet Bod issuers borrow moey from bod holders Bod is a fixed-icome security that typically pays periodic coupo paymets, ad a pricipal

More information

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal Advaced Sciece ad Techology Letters, pp.31-35 http://dx.doi.org/10.14257/astl.2014.78.06 Study o the applicatio of the software phase-locked loop i trackig ad filterig of pulse sigal Sog Wei Xia 1 (College

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

On the Use of Adaptive OFDM to Preserve Energy in Ad Hoc Wireless Networks

On the Use of Adaptive OFDM to Preserve Energy in Ad Hoc Wireless Networks O the Use of Adaptive OFDM to Preserve Eergy i Ad Hoc Wireless etworks Kamol Kaemarugsi ad Prashat Krishamurthy Telecommuicatios Program, School of Iformatio Sciece, Uiversity of Pittsburgh 135 orth Bellefield

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

Convention Paper 6764

Convention Paper 6764 Audio Egieerig Society Covetio Paper 6764 Preseted at the 10th Covetio 006 May 0 3 Paris, Frace This covetio paper has bee reproduced from the author's advace mauscript, without editig, correctios, or

More information

Amendments to employer debt Regulations

Amendments to employer debt Regulations March 2008 Pesios Legal Alert Amedmets to employer debt Regulatios The Govermet has at last issued Regulatios which will amed the law as to employer debts uder s75 Pesios Act 1995. The amedig Regulatios

More information

Capacity of Wireless Networks with Heterogeneous Traffic

Capacity of Wireless Networks with Heterogeneous Traffic Capacity of Wireless Networks with Heterogeeous Traffic Migyue Ji, Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity of Califoria, Sata

More information

The Forgotten Middle. research readiness results. Executive Summary

The Forgotten Middle. research readiness results. Executive Summary The Forgotte Middle Esurig that All Studets Are o Target for College ad Career Readiess before High School Executive Summary Today, college readiess also meas career readiess. While ot every high school

More information

Hypergeometric Distributions

Hypergeometric Distributions 7.4 Hypergeometric Distributios Whe choosig the startig lie-up for a game, a coach obviously has to choose a differet player for each positio. Similarly, whe a uio elects delegates for a covetio or you

More information

Professional Networking

Professional Networking Professioal Networkig 1. Lear from people who ve bee where you are. Oe of your best resources for etworkig is alumi from your school. They ve take the classes you have take, they have bee o the job market

More information

Universal coding for classes of sources

Universal coding for classes of sources Coexios module: m46228 Uiversal codig for classes of sources Dever Greee This work is produced by The Coexios Project ad licesed uder the Creative Commos Attributio Licese We have discussed several parametric

More information

A probabilistic proof of a binomial identity

A probabilistic proof of a binomial identity A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two

More information

Data Analysis and Statistical Behaviors of Stock Market Fluctuations

Data Analysis and Statistical Behaviors of Stock Market Fluctuations 44 JOURNAL OF COMPUTERS, VOL. 3, NO. 0, OCTOBER 2008 Data Aalysis ad Statistical Behaviors of Stock Market Fluctuatios Ju Wag Departmet of Mathematics, Beijig Jiaotog Uiversity, Beijig 00044, Chia Email:

More information

June 3, 1999. Voice over IP

June 3, 1999. Voice over IP Jue 3, 1999 Voice over IP This applicatio ote discusses the Hypercom solutio for providig ed-to-ed Iteret protocol (IP) coectivity i a ew or existig Hypercom Hybrid Trasport Mechaism (HTM) etwork, reducig

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

Domain 1: Configuring Domain Name System (DNS) for Active Directory

Domain 1: Configuring Domain Name System (DNS) for Active Directory Maual Widows Domai 1: Cofigurig Domai Name System (DNS) for Active Directory Cofigure zoes I Domai Name System (DNS), a DNS amespace ca be divided ito zoes. The zoes store ame iformatio about oe or more

More information

hp calculators HP 12C Statistics - average and standard deviation Average and standard deviation concepts HP12C average and standard deviation

hp calculators HP 12C Statistics - average and standard deviation Average and standard deviation concepts HP12C average and standard deviation HP 1C Statistics - average ad stadard deviatio Average ad stadard deviatio cocepts HP1C average ad stadard deviatio Practice calculatig averages ad stadard deviatios with oe or two variables HP 1C Statistics

More information

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC 8 th Iteratioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a i a, M a y 25 27, 2 6 ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC Vadim MUKHIN 1, Elea PAVLENKO 2 Natioal Techical

More information

ContactPro Desktop for Multi-Media Contact Center

ContactPro Desktop for Multi-Media Contact Center CotactPro Desktop for Multi-Media Cotact Ceter CCT CotactPro (CP) is the perfect solutio for the aget desktop i a Avaya multimedia call ceter eviromet. CotactPro empowers agets to efficietly serve customers

More information

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5 Sectio 13 Kolmogorov-Smirov test. Suppose that we have a i.i.d. sample X 1,..., X with some ukow distributio P ad we would like to test the hypothesis that P is equal to a particular distributio P 0, i.e.

More information

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat

More information

Sequences and Series

Sequences and Series CHAPTER 9 Sequeces ad Series 9.. Covergece: Defiitio ad Examples Sequeces The purpose of this chapter is to itroduce a particular way of geeratig algorithms for fidig the values of fuctios defied by their

More information

Engineering Data Management

Engineering Data Management BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package

More information

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13

Discrete Mathematics and Probability Theory Spring 2014 Anant Sahai Note 13 EECS 70 Discrete Mathematics ad Probability Theory Sprig 2014 Aat Sahai Note 13 Itroductio At this poit, we have see eough examples that it is worth just takig stock of our model of probability ad may

More information

Domain 1 Components of the Cisco Unified Communications Architecture

Domain 1 Components of the Cisco Unified Communications Architecture Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate

More information

Telecomunicazione. A Priority-Aware Protection Technique for QoS Enabled WDM Networks

Telecomunicazione. A Priority-Aware Protection Technique for QoS Enabled WDM Networks Uiversità di Bergamo Facoltà di Igegeria dell Iformazioe e etodi atematici La Protezioe elle Reti di Telecomuicazioe A Priority-Aware Protectio Techique for QoS Eabled WD etworks Fabio artigo Sommario

More information

Incremental calculation of weighted mean and variance

Incremental calculation of weighted mean and variance Icremetal calculatio of weighted mea ad variace Toy Fich [email protected] [email protected] Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically

More information

Estimating Probability Distributions by Observing Betting Practices

Estimating Probability Distributions by Observing Betting Practices 5th Iteratioal Symposium o Imprecise Probability: Theories ad Applicatios, Prague, Czech Republic, 007 Estimatig Probability Distributios by Observig Bettig Practices Dr C Lych Natioal Uiversity of Irelad,

More information

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 16804-0030 [email protected] Abstract:

More information

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable Week 3 Coditioal probabilities, Bayes formula, WEEK 3 page 1 Expected value of a radom variable We recall our discussio of 5 card poker hads. Example 13 : a) What is the probability of evet A that a 5

More information

Maximum Likelihood Estimators.

Maximum Likelihood Estimators. Lecture 2 Maximum Likelihood Estimators. Matlab example. As a motivatio, let us look at oe Matlab example. Let us geerate a radom sample of size 00 from beta distributio Beta(5, 2). We will lear the defiitio

More information

Confidence Intervals. CI for a population mean (σ is known and n > 30 or the variable is normally distributed in the.

Confidence Intervals. CI for a population mean (σ is known and n > 30 or the variable is normally distributed in the. Cofidece Itervals A cofidece iterval is a iterval whose purpose is to estimate a parameter (a umber that could, i theory, be calculated from the populatio, if measuremets were available for the whole populatio).

More information

client communication

client communication CCH Portal cliet commuicatio facig today s challeges Like most accoutacy practices, we ow use email for most cliet commuicatio. It s quick ad easy, but we do worry about the security of sesitive data.

More information

6. p o s I T I v e r e I n f o r c e M e n T

6. p o s I T I v e r e I n f o r c e M e n T 6. p o s I T I v e r e I f o r c e M e T The way positive reiforcemet is carried out is more importat tha the amout. B.F. Skier We all eed positive reiforcemet. Whether or ot we are cosciously aware of

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval

Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval 1 Optimal Adaptive Badwidth Moitorig for QoS Based Retrieval Yizhe Yu, Iree Cheg ad Aup Basu (Seior Member) Departmet of Computig Sciece Uiversity of Alberta Edmoto, AB, T6G E8, CAADA {yizhe, aup, li}@cs.ualberta.ca

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

Information about Bankruptcy

Information about Bankruptcy Iformatio about Bakruptcy Isolvecy Service of Irelad Seirbhís Dócmhaieachta a héirea Isolvecy Service of Irelad Seirbhís Dócmhaieachta a héirea What is the? The Isolvecy Service of Irelad () is a idepedet

More information

Virtual Machine Scheduling Management on Cloud Computing Using Artificial Bee Colony

Virtual Machine Scheduling Management on Cloud Computing Using Artificial Bee Colony , March 12-14, 2014, Hog Kog Virtual Machie Schedulig Maagemet o Cloud Computig Usig Artificial Bee Coloy B. Kruekaew ad W. Kimpa Abstract Resource schedulig maagemet desig o Cloud computig is a importat

More information

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology

More information

Section 11.3: The Integral Test

Section 11.3: The Integral Test Sectio.3: The Itegral Test Most of the series we have looked at have either diverged or have coverged ad we have bee able to fid what they coverge to. I geeral however, the problem is much more difficult

More information

SYSTEM INFO. MDK - Multifunctional Digital Communications System. Efficient Solutions for Information and Safety

SYSTEM INFO. MDK - Multifunctional Digital Communications System. Efficient Solutions for Information and Safety Commuicatios Systems for Itercom, PA, Emergecy Call ad Telecommuicatios MDK - Multifuctioal Digital Commuicatios System SYSTEM INFO ms NEUMANN ELEKTRONIK GmbH Efficiet Solutios for Iformatio ad Safety

More information

MTO-MTS Production Systems in Supply Chains

MTO-MTS Production Systems in Supply Chains NSF GRANT #0092854 NSF PROGRAM NAME: MES/OR MTO-MTS Productio Systems i Supply Chais Philip M. Kamisky Uiversity of Califoria, Berkeley Our Kaya Uiversity of Califoria, Berkeley Abstract: Icreasig cost

More information

Infinite Sequences and Series

Infinite Sequences and Series CHAPTER 4 Ifiite Sequeces ad Series 4.1. Sequeces A sequece is a ifiite ordered list of umbers, for example the sequece of odd positive itegers: 1, 3, 5, 7, 9, 11, 13, 15, 17, 19, 21, 23, 25, 27, 29...

More information

Case Study. Normal and t Distributions. Density Plot. Normal Distributions

Case Study. Normal and t Distributions. Density Plot. Normal Distributions Case Study Normal ad t Distributios Bret Halo ad Bret Larget Departmet of Statistics Uiversity of Wiscosi Madiso October 11 13, 2011 Case Study Body temperature varies withi idividuals over time (it ca

More information

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights Ceter, Spread, ad Shape i Iferece: Claims, Caveats, ad Isights Dr. Nacy Pfeig (Uiversity of Pittsburgh) AMATYC November 2008 Prelimiary Activities 1. I would like to produce a iterval estimate for the

More information

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring No-life isurace mathematics Nils F. Haavardsso, Uiversity of Oslo ad DNB Skadeforsikrig Mai issues so far Why does isurace work? How is risk premium defied ad why is it importat? How ca claim frequecy

More information

PUBLIC RELATIONS PROJECT 2016

PUBLIC RELATIONS PROJECT 2016 PUBLIC RELATIONS PROJECT 2016 The purpose of the Public Relatios Project is to provide a opportuity for the chapter members to demostrate the kowledge ad skills eeded i plaig, orgaizig, implemetig ad evaluatig

More information

PENSION ANNUITY. Policy Conditions Document reference: PPAS1(7) This is an important document. Please keep it in a safe place.

PENSION ANNUITY. Policy Conditions Document reference: PPAS1(7) This is an important document. Please keep it in a safe place. PENSION ANNUITY Policy Coditios Documet referece: PPAS1(7) This is a importat documet. Please keep it i a safe place. Pesio Auity Policy Coditios Welcome to LV=, ad thak you for choosig our Pesio Auity.

More information

1 Correlation and Regression Analysis

1 Correlation and Regression Analysis 1 Correlatio ad Regressio Aalysis I this sectio we will be ivestigatig the relatioship betwee two cotiuous variable, such as height ad weight, the cocetratio of a ijected drug ad heart rate, or the cosumptio

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

CREATIVE MARKETING PROJECT 2016

CREATIVE MARKETING PROJECT 2016 CREATIVE MARKETING PROJECT 2016 The Creative Marketig Project is a chapter project that develops i chapter members a aalytical ad creative approach to the marketig process, actively egages chapter members

More information

BaanERP. BaanERP Windows Client Installation Guide

BaanERP. BaanERP Windows Client Installation Guide BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject to

More information

5 Boolean Decision Trees (February 11)

5 Boolean Decision Trees (February 11) 5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected

More information

Entropy of bi-capacities

Entropy of bi-capacities Etropy of bi-capacities Iva Kojadiovic LINA CNRS FRE 2729 Site école polytechique de l uiv. de Nates Rue Christia Pauc 44306 Nates, Frace [email protected] Jea-Luc Marichal Applied Mathematics

More information

CCH Accountants Starter Pack

CCH Accountants Starter Pack CCH Accoutats Starter Pack We may be a bit smaller, but fudametally we re o differet to ay other accoutig practice. Util ow, smaller firms have faced a stark choice: Buy cheaply, kowig that the practice

More information

Properties of MLE: consistency, asymptotic normality. Fisher information.

Properties of MLE: consistency, asymptotic normality. Fisher information. Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout

More information

Overview of some probability distributions.

Overview of some probability distributions. Lecture Overview of some probability distributios. I this lecture we will review several commo distributios that will be used ofte throughtout the class. Each distributio is usually described by its probability

More information

Designing Incentives for Online Question and Answer Forums

Designing Incentives for Online Question and Answer Forums Desigig Icetives for Olie Questio ad Aswer Forums Shaili Jai School of Egieerig ad Applied Scieces Harvard Uiversity Cambridge, MA 0238 USA [email protected] Yilig Che School of Egieerig ad Applied

More information

Reliability Analysis in HPC clusters

Reliability Analysis in HPC clusters Reliability Aalysis i HPC clusters Narasimha Raju, Gottumukkala, Yuda Liu, Chokchai Box Leagsuksu 1, Raja Nassar, Stephe Scott 2 College of Egieerig & Sciece, Louisiaa ech Uiversity Oak Ridge Natioal Lab

More information

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu Multi-server Optimal Badwidth Moitorig for QoS based Multimedia Delivery Aup Basu, Iree Cheg ad Yizhe Yu Departmet of Computig Sciece U. of Alberta Architecture Applicatio Layer Request receptio -coectio

More information

CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION

CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION www.arpapress.com/volumes/vol8issue2/ijrras_8_2_04.pdf CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION Elsayed A. E. Habib Departmet of Statistics ad Mathematics, Faculty of Commerce, Beha

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

E-Plex Enterprise Access Control System

E-Plex Enterprise Access Control System Eterprise Access Cotrol System Egieered for Flexibility Modular Solutio The Eterprise Access Cotrol System is a modular solutio for maagig access poits. Employig a variety of hardware optios, system maagemet

More information

TIAA-CREF Wealth Management. Personalized, objective financial advice for every stage of life

TIAA-CREF Wealth Management. Personalized, objective financial advice for every stage of life TIAA-CREF Wealth Maagemet Persoalized, objective fiacial advice for every stage of life A persoalized team approach for a trusted lifelog relatioship No matter who you are, you ca t be a expert i all aspects

More information

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection

The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity

More information

A Cross-Layer Cross-Overlay Architecture for Proactive Adaptive Processing in Mesh Networks

A Cross-Layer Cross-Overlay Architecture for Proactive Adaptive Processing in Mesh Networks 1 A Cross-Layer Cross- Architecture for Proactive Adaptive Processig i Mesh Networks Dilip Krishaswamy, Hsie-Po Shiag, Joh Vicete, Vidya Govida, W. Steve Coer, Sajay Rugta, Wiso Cha, Kai Miao Itel Corporatio,

More information