Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks
|
|
- Annabelle York
- 7 years ago
- Views:
Transcription
1 Simutaneous Routing and Power Aocation in CDMA Wireess Data Networks Mikae Johansson *,LinXiao and Stephen Boyd * Department of Signas, Sensors and Systems Roya Institute of Technoogy, SE 00 Stockhom, Sweden Emai: mikaej@s.kth.se Information Systems Laboratory, Department of Eectrica Engineering Stanford University, Stanford, CA 90 90, USA Emai: {xiao, boyd}@stanford.edu Abstract The optima routing of data in a wireess network depends on the ink capacities, which, in turn, are determined by the aocation of transmit powers across the network. Thus, the optima network performance can ony be achieved by simutaneous optimization of routing and power aocation. In this paper, we study this joint optimization probem in CDMA data networks using convex optimization techniques. Athough ink capacity constraints of CDMA systems are not jointy convex in rates and powers, we show that coordinate projections or transformations aow the simutaneous routing and power aocation probem to be formuated as in systems with interference canceation or approximated by in systems without interference canceation a convex optimization probem which can be soved very efficienty. We aso propose a heuristic inkremova procedure based on the convex approximation to further improve the system performance. I. Introduction To make efficient the use of scarce radio resources, it becomes important not ony to optimize the operation of each ayer in wireess data networks, but aso to coordinate the operation of different ayers e.g., []. In particuar, the optima routing probem in the network ayer and resource aocation probem in the radio contro ayer are couped through the ink capacities, and the optima performance can ony be achieved by simutaneous optimization of routing and resource aocation. In a previous paper [], we formuated the simutaneous routing and resource aocation SRRA probem for wireess data networks. By assuming that the ink capacity is a concave and increasing function of the communications resources aocated the ink this assumption hods for TDMA and FDMA systems with orthogona channes the SRRA probem is a convex optimization probem over the network fow variabes and the communications variabes. We expoited the separabe structure of the SRRA probem via dua decomposition, and derived an efficient soution method which achieves the optima coordination of data routing and resource aocation. This research was sponsored in part by the Swedish Research Counci, AFOSR grant F , NSF grant ECS and DARPA contract F-99-C-0 In this paper, we generaize the SRRA formuation to incude code-division mutipe access CDMA systems. In CDMA systems, the capacity of a ink depends not ony on the power aocated to itsef, but aso the powers aocated to other inks due to interferences. Moreover, the capacity constraints are not jointy convex in communication rates and power aocations, so a straightforward formuation of the SRRA probem is not a convex optimization probem and generay very hard to sove. We wi show, however, that by using a coordinate projection that ony considers the rate region the SRRA probem using Gaussian broadcast channes with superposition coding and interference canceation can be converted into an equivaent convex optimization probem. For practica CDMA systems without interference canceation, we suggest an approximate capacity formua for reativey high signa to interference and noise ratio SINR and show how a coordinate transform yieds a convex formuation. This approximate formuation is a restriction of the origina probem, and its soution is guaranteed to be feasibe for the origina non-convex formuation. We propose a heuristic ink-remova procedure to further improve the system performance based on this convex approximation. II. Formuation of the SRRA probem We briefy review the SRRA probem formuated in [] and generaize the mode to incude the CDMA case. A. Network fow mode Consider a connected communication network containing N nodes abeed n =,...,N and L directed inks abeed. The topoogy of the network is represented by a node-ink incidence matrix A R N L whose entry A n is associated with node n and ink via, if n is the start node of ink A n =, if n is the end node of ink 0, otherwise /0/$ IEEE
2 We define On as the set of outgoing inks from node n. We use a muticommodity fow mode for the routing of data fows, with average data rates in bits per second. We identify the fows by their destinations, abeed d =,...,D, where D N. For each destination d, we define a source-sink vector s d R N,whosenth n d entry s n d denotes the non-negative amount of fow injected into the network at node n the source and destined for node d the sink, where s d d = n d sd n. We aso define x d R L + as the fow vector for destination d, whose component x d is the amount of fow on each ink and destined for node d. Lett and c be the tota traffic oad and the capacity of ink respectivey. Our network fow mode imposes the foowing group of constraints on the network fow variabes x, s and t: Ax d = s d, d =,...,D x d 0, s d d 0, d =,...,D t = d xd, t c, Here, means component-wise inequaity, and d means component-wise inequaity except for the dth component. The first set of constraints are the fow conservation aws for each destination, whie the ast set of constraints are capacity constraints for each ink. B. Communications mode In a wireess system, the capacities of individua inks channes depend on the media access scheme and the aocation of communications variabes, such as transmit powers, bandwidths or time-sot fractions, to the transmitters. We assume that the medium access, coding and moduation schemes are fixed, but that we can optimize over the communications variabes r. We use the foowing generic mode to reate the vector of tota traffic t and the vector of communications variabes r t c = φ r, Fr g, r 0 Here, the formua c = φ r describes the dependence of the capacity of ink on the communications variabes r =r,...,r L andr is the sub-vector of resources aocated to ink. The inear inequaity Fr g describes resource imits, such as the tota avaiabe transmit powers at each node. The constraint r 0 specifies that the communications variabes are non-negative. In this paper we consider two particuar casses of CDMA systems that we now describe in some detai. The Gaussian broadcast channe: The set of achievabe rates t i for an M-user Gaussian broadcast channe with noise powers σ σ... σ M in different inks and tota transmit power P tot assuming unit tota bandwidth is given by [, ] P i t i og + σ i + j<i P,i=,...,M j M i= P i P tot, P i 0, i=,...,m where P i is the transmit power aocated to ink i. Here the communications variabes are r =P,...,P M, and the constraints are exacty in the generic form. This mode can be used for inks starting from the same node, with superposition coding and interference canceation []. Interference-imited channes: Most CDMA systems in practice are designed without interference canceation. Let G R+ L L be the channe gain matrix across the whoe network, whose entry G ij is the power gain from the transmitter of ink j to the receiver of ink i. Ony the diagona terms G ii are desired, and the off-diagona terms G ij i j ead to interferences. Based on Shannon capacity, we have the ink capacity constraints t og + σ + j G jp j,. The power imits can be specified for each ink, P P,tot, or for each node shared by its outgoing inks P P n tot, n =,...,N. On Here the communications variabes are the powers P = P,...,P L, and the above constraints have the form. C. The generic SRRA formuation Consider the operation of a wireess data network described by the network fow mode and the communications mode and suppose that the objective is to minimize a convex cost function fx, s, t, r or maximize a concave utiity function. We have the foowing generic formuation of the SRRA probem: minimize fx, s, t, r subject to Ax d = s d, d =,...,D x d 0, s d d 0, d =,...,D t = d xd, t φ r, Fr g, r 0. Here the optimization variabes are the network fow variabes x, s, t and the communications variabes r. The SRRA probem is very genera and it incudes many important design probems for wireess data networks. For
3 exampe, the objective can be maximum tota utiity, minimum tota power or bandwidth, minimax power among the nodes, and minimax ink utiization []. For TDMA and FDMA systems, the capacity constraints usuay take the form t φ r the inks are orthogona and the functions φ are usuay concave and monotone increasing in r. These properties impy that the capacity constraints are jointy convex in t and r, hence the SRRA probem is a convex optimization probem, which can be soved gobay and efficienty by recenty deveoped interior-point methods e.g., []. More effective methods can be deveoped for soving the SRRA probem by expoiting its structure via dua decomposition see []. For the CDMA systems described in section II-B, however, the capacity constraints are not jointy convex in the rates t and vector of transmit powers P. This means that the direct formuation of the SRRA probem as in is not a convex optimization probem, and that it is generay very hard to find the goba optima soution. Nevertheess, we wi show in sections III and IV that coordinate projections or transformations aow us to approach the SRRA probem effectivey using convex optimization techniques. III. SRRA in CDMA networks using Gaussian broadcast channes In this section, we derive an equivaent convex formuation of the SRRA probem that uses Gaussian broadcast channe with interference-canceation at each node. A. An equivaent characterization of the rate region Athough the capacity constraints in for the Gaussian broadcast channe is not jointy convex in the rates t i and power vector P, it is a we-known fact that the achievabe rate region CP tot ={t, t 0} is a convex set. This is better seen from an equivaent characterization of the rate region [] CP tot ={t pt P tot,t 0} where the function p is defined as M pt = σ i σ i e i j M tj σ M 7 i= and σ 0 = 0. It is cear that the function p is convex, hence the rate region CP tot, the projection of the feasibe set of t, P ontothet-coordinates, is a convex set. Given any rate vector t CP tot, the corresponding power aocation is given by k P k = σ i σ i e i j<k tj e t k 8 i= for k =,...,M. Note that the proof of these resuts, given in appendix, reies on the fact that the channe gains in the mode are a equa. B. The convex formuation of the SRRA probem Consider a wireess data network where each node uses the Gaussian broadcast channe to send information over its outgoing inks. We assume that there is no interference among channes from different nodes they use disjoint frequency bands. We denote the oca tota traffic vector by t n = {t On} and define a convex function p n t n simiary as pt in 7 for each node n. Then we can formuate the convex SRRA probem minimize fx, s, t, r subject to A d x d = s d, d =,...,D x d 0, s d d 0, d =,...,D t = D d= xd, p n t n r n, n =,...,N r n P n tot, n =,...,N where the communications variabe r n is the tota transmit power used at node n. Introducing r n aows us to formuate the minimum tota power and minimax power SRRA probems. This convex optimization probem is equivaent to when the Gaussian broadcast channe mode is used at each node. After soving this convex probem, we can recover the power aocation P for each ink using 8. IV. SRRA in CDMA networks with interference-imited channes In this section, we derive a convex approximation for the SRRA probem with interference-imited channes when the SINRs are reativey high. We then give a heuristic ink-remova procedure to further improve the network performance based on the soution to the convex program. A. A convex approximation For CDMA systems with interference-imited channes described by, the SINRs are defined as γ = σ + j G,. jp j When the SINRs are reativey high e.g., γ or 0, we use the approximation og + γ og γ and re-write φ P og σ + j G jp j σ + j = og G jp j σ = og P + G j P j P. G G j Let Q = ogp i.e., P = e Q forand define σ ψ Q =φ P Q = og e Q + G j e Qj Q. G G j
4 Note that the functions ψ are concave in the variabe Q since og-sum-exp expressions are convex []. With the approximate capacity formua and the change of variabes, we can formuate the foowing SRRA probem minimize fx, s, t, r subject to A d x d = s d, d =,...,D x d 0, s d d 0, d =,...,D t = D d= xd, t ψ Q, On eq P n tot, n =,...,N where the ast constraint which is convex is in the new variabe Q. Here the capacity constraints t ψ Q are jointy convex in t and Q. This impies that 9 is a convex optimization probem, which can be soved gobay and efficienty. We have the foowing remarks: Note that og γ og + γ, i.e., weusedanunderestimate for the ink capacity. This means that the soution to the restricted convex program 9 is aways feasibe to the origina probem. The average throughput of many channes with biterror-rate constraints e.g., variabe-rate M-QAM in additive Gaussian noise or Rayeigh fading environment can be we approximated e.g., [7, 8] by og + kγ og k + og γ 9 provided that kγ is reativey high. We can formuate the SRRA probem with these channes simiary. The change of variabes that we have used is weknown in geometric programming see, e.g., [] and provides an expicit ink between our work and the optimization of communication systems with quaity of service constraints considered in [9, 0]. B. A heuristic ink-remova procedure Any soution to 9 must satisfy γ for a inks, since we require 0 t og γ. The inks with γ = have zero capacity, but are aocated nonzero powers. We can safey remove these inks, and sti guarantee that the soution is feasibe for the SRRA probem with the new reduced network topoogy. If we sove the SRRA probem for the new topoogy, the objective can ony be improved eading to arger tota utiity or ess tota power. Hence, we propose to use the foowing ink-remova procedure given a network topoogy and the SRRA probem repeat sove the convex SRRA formuation 9 remove inks whose SINRs equa one capacity zero unti no inks were removed a SINRs greater than one This procedure usuay takes very few iterations to stop. In many cases we can continue to remove inks with very Fig.. Fig A network with nodes and 0 directed inks. Fig.. Initia routing soution. Routing soution after the ink-remova procedure. sma SINRs, even if they are greater than one. This may resut in sparser routing pattern and higher SINRs for the remaining inks, but feasibiity is no onger guaranteed and the objective may be degraded. V. A numerica exampe Consider the network shown in figure, which has nodes and 0 directed inks ink abes are next to the arrows. Each node has tota power P n tot = to be shared by its outgoing inks. A the receivers have the same noise power σ = We use the interference-imited channe mode. A diagona entries of the channe gain matrix G are set to one, and the off-diagona entries are generated randomy with a uniform distribution on [0, 0.0]. There are two data fows, one form node to node and the other form node to node, to be supported by the network. The goa is to maximize the sum throughput of the two fows s + s. Foowing the ink-remova procedure in section IV-B, we soved the probem in three steps: a Sove the convex SRRA probem 9 with 0 inks. The soution is shown in figure and tabe I. The tota throughput is.89. b Remove the 8 inks with SINRs equa to one, and sove 9 with the new network topoogy having inks. The routing soution is roughy the same as before see figure, and the tota throughput is.0. c Further remove ink and 0 which have very ow SINRs, and sove 9 again for the resuting network with 0 inks. The routing soution, shown in figure, achieves a tota throughput of.00. 0
5 ink SINR power aocation a b c a b c TABLE I SINR and power aocation. The SINRs are a stricty greater than one after ony one ink-remova step b, with a sight improvement in the objective vaue. Athough the further removing of inks with sma SINRs in step c degrades the objective a itte bit, it eads to a sparser routing pattern cf. figure and. In a three cases, the sum throughputs are very cose. VI. Concusions We have generaized the formuation of the SRRA probem in wireess data networks to incude CDMA systems. Athough the capacity constraints for CDMA systems are not jointy convex in rates and powers, we have shown that coordinate projection and transformation techniques aow the SRRA probem to be formuated as with interference canceation or approximated by without interference canceation a convex optimization probem that can be soved very efficienty. We have aso proposed a heuristic ink-remova procedure based on the convex approximation to further improve the system performance. Distributed agorithms have been deveoped for power contro probems in CDMA systems to achieve maxmin or specified SINRs e.g., [,, ]. It woud be interesting to expore if these coud be used to deveop distributed agorithms for soving the SRRA probem in the dua decomposition framework [], where distributed power contro is done based on the pricing of the ink capacities. Appendix The foowing derivation detais the outine in []. To derive an equivaent characterization of the achievabe rate region for the Gaussian broadcast channe, we sove the P i s in terms of the rate vector t. We can rewrite the equaities in into j i P j = e ti j<i P j + e ti σ i σ i, i =,...,M. For a given k, we mutipy the ith equaity by e i<j k tj for i k. Then adding them together yieds j k P j = k i= σ i σ i e i j k tj σ k. where σ 0 = 0. We define the functions p k t = j k P j = k i= σ i σ i e i j k tj σ k for k =,...,M. Note that p k t is non-negative and non-decreasing in k, since p t =σ e t 0and p k t p k t = k i= σ i σ i e i j<k tj e t k 0 for a k>. Hence, given any t 0, provided that pt p M t = M i= σ i σ i e i j M tj σ M P tot, there must exist an aocation of powers P k such that P k = p k t p k t 0, k =,...,M where p 0 t =0and M i= P k P tot, i.e., t ies in the capacity region. Conversey, any rate vector satisfying satisfy pt P tot, and the corresponding power aocation is given by P k = p k t p k t, i.e., equation 8. References [] N. Bambos. Toward power-sensitive network architectures in wireess communications: Concepts, issues, and design aspects. IEEE Pers. Commun., :0 9, 998. [] L. Xiao, M. Johansson, and S. P. Boyd. Simutaneous routing and resource aocation via dua decomposition. Submitted, Juy boyd/srra.htm [] T.M.Cover.Broadcastchannes.IEEE Trans. Inform. Theory, 8:, 97. [] P. P. Bergmans. Random coding theorem for broadcast channes with degraded components. IEEE Trans. Inform. Theory, 9:97 07, 97. [] S. P. Boyd and L. Vandenberghe. Course reader for EE: Introduction to Convex Optimization with Engineering Appications. Stanford University, 998. [] D. N. Tse. Optima power aocation over parae Gaussian broadcast channes. Unpubished, a short summary pubished in Proc. of Int. Symp. Inform. Theory, Um, Germany, 997. [7] X. Qiu and K. Chawa. On the performance of adaptive moduation in ceuar systems. IEEE Trans. Commun., 7:88 89, June 999. [8] A. J. Godsmith and S.-G. Chua. Variabe-rate variabepower M-QAM for fading channes. IEEE Trans. Commun., 0:8 0, October 997. [9] S. Kandukuri and S. P. Boyd. Optima power contro in interference imited fading wireess channes with outage-probabiity specifications. IEEE Trans. Wireess Commun., :, 00. [0] D. Juian, M. Chiang, D. O Nei, and S. P. Boyd. QoS and fairness constrained convex optimization of resource aocation for wireess ceuar and ad hoc networks. In Proc. IEEE IN- FOCOM 0, 00. [] J. Zander. Distributed cochanne interference contro in ceuar radio systems. IEEE Trans. Veh. Techno., :0, 99. [] G. J. Foschini and Z. Mijanic. A simpe distributed autonomous power contro agorithm and its convergence. IEEE Trans. Veh. Techno., :, 99. [] R. D. Yates. A framework for upink power contro in ceuar radio systems. IEEE J. Seect. Areas Commun., 7: 7, 99.
Secure Network Coding with a Cost Criterion
Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu
More information500 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 3, MARCH 2013
500 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 3, NO. 3, MARCH 203 Cognitive Radio Network Duaity Agorithms for Utiity Maximization Liang Zheng Chee Wei Tan, Senior Member, IEEE Abstract We
More informationPricing Internet Services With Multiple Providers
Pricing Internet Services With Mutipe Providers Linhai He and Jean Warand Dept. of Eectrica Engineering and Computer Science University of Caifornia at Berkeey Berkeey, CA 94709 inhai, wr@eecs.berkeey.edu
More informationFace Hallucination and Recognition
Face Haucination and Recognition Xiaogang Wang and Xiaoou Tang Department of Information Engineering, The Chinese University of Hong Kong {xgwang1, xtang}@ie.cuhk.edu.hk http://mmab.ie.cuhk.edu.hk Abstract.
More informationIEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1 Scaabe Muti-Cass Traffic Management in Data Center Backbone Networks Amitabha Ghosh, Sangtae Ha, Edward Crabbe, and Jennifer
More informationAn FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks
An FDD ideband CDMA MAC Protoco for ireess Mutimedia Networks Xudong ang Broadband and ireess Networking (BN) Lab Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy Atanta, GA 3332
More informationCooperative Content Distribution and Traffic Engineering in an ISP Network
Cooperative Content Distribution and Traffic Engineering in an ISP Network Wenjie Jiang, Rui Zhang-Shen, Jennifer Rexford, Mung Chiang Department of Computer Science, and Department of Eectrica Engineering
More informationLecture 7 Datalink Ethernet, Home. Datalink Layer Architectures
Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441
More informationAustralian Bureau of Statistics Management of Business Providers
Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad
More informationWIRELESS Mesh Networks (WMNs) have recently attracted
3968 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 2, NO. 8, AUGUST 23 A New MPLS-Based Forwarding Paradigm for Muti-Radio Wireess Mesh Networks Stefano Avaone and Giovanni Di Stasi Abstract Routing
More informationPricing and Revenue Sharing Strategies for Internet Service Providers
Pricing and Revenue Sharing Strategies for Internet Service Providers Linhai He and Jean Warand Department of Eectrica Engineering and Computer Sciences University of Caifornia at Berkeey {inhai,wr}@eecs.berkeey.edu
More informationFast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.
Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services
More informationAn Idiot s guide to Support vector machines (SVMs)
An Idiot s guide to Support vector machines (SVMs) R. Berwick, Viage Idiot SVMs: A New Generation of Learning Agorithms Pre 1980: Amost a earning methods earned inear decision surfaces. Linear earning
More informationScheduling in Multi-Channel Wireless Networks
Scheduing in Muti-Channe Wireess Networks Vartika Bhandari and Nitin H. Vaidya University of Iinois at Urbana-Champaign, USA vartikab@acm.org, nhv@iinois.edu Abstract. The avaiabiity of mutipe orthogona
More informationGREEN: An Active Queue Management Algorithm for a Self Managed Internet
: An Active Queue Management Agorithm for a Sef Managed Internet Bartek Wydrowski and Moshe Zukerman ARC Specia Research Centre for Utra-Broadband Information Networks, EEE Department, The University of
More informationLoad Balance vs Energy Efficiency in Traffic Engineering: A Game Theoretical Perspective
Load Baance vs Energy Efficiency in Traffic Engineering: A Game Theoretica Perspective Yangming Zhao, Sheng Wang, Shizhong Xu and Xiong Wang Schoo of Communication and Information Engineering University
More informationMarket Design & Analysis for a P2P Backup System
Market Design & Anaysis for a P2P Backup System Sven Seuken Schoo of Engineering & Appied Sciences Harvard University, Cambridge, MA seuken@eecs.harvard.edu Denis Chares, Max Chickering, Sidd Puri Microsoft
More informationA Cross-Layer Optimization Framework for Multicast in Multi-hop Wireless Networks
A Cro-Layer Optimization Framework for Muticat in Muti-hop Wiree Network Jun Yuan, Zongpeng Li, Wei Yu, Baochun Li Department of Eectrica and Computer Engineering Univerity of Toronto {teveyuan@comm, arcane@eecg,
More informationBetting on the Real Line
Betting on the Rea Line Xi Gao 1, Yiing Chen 1,, and David M. Pennock 2 1 Harvard University, {xagao,yiing}@eecs.harvard.edu 2 Yahoo! Research, pennockd@yahoo-inc.com Abstract. We study the probem of designing
More informationAdvanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger
Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server
More informationIterative Water-filling for Load-balancing in Wireless LAN or Microcellular Networks
terative Water-fiing for Load-baancing in Wireess LAN or Microceuar Networks Jeremy K. Chen Theodore S. Rappaport Gustavo de Veciana Wireess Networking and Communications Group (WNCG), be University of
More informationTeamwork. Abstract. 2.1 Overview
2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and
More informationBetting Strategies, Market Selection, and the Wisdom of Crowds
Betting Strategies, Market Seection, and the Wisdom of Crowds Wiemien Kets Northwestern University w-kets@keogg.northwestern.edu David M. Pennock Microsoft Research New York City dpennock@microsoft.com
More informationOnline Supplement for The Robust Network Loading Problem under Hose Demand Uncertainty: Formulation, Polyhedral Analysis, and Computations
Onine Suppement for The Robust Network Loading Probem under Hose Demand Uncertaint: Formuation, Pohedra Anasis, and Computations Aşegü Atın Department of Industria Engineering, TOBB Universit of Economics
More informationMulti-Robot Task Scheduling
Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in
More information(12) Patent Application Publication (10) Pub. N0.: US 2006/0105797 A1 Marsan et al. (43) Pub. Date: May 18, 2006
(19) United States US 20060105797A (12) Patent Appication Pubication (10) Pub. N0.: US 2006/0105797 A1 Marsan et a. (43) Pub. Date: (54) METHOD AND APPARATUS FOR (52) US. C...... 455/522 ADJUSTING A MOBILE
More informationA Branch-and-Price Algorithm for Parallel Machine Scheduling with Time Windows and Job Priorities
A Branch-and-Price Agorithm for Parae Machine Scheduing with Time Windows and Job Priorities Jonathan F. Bard, 1 Siwate Rojanasoonthon 2 1 Graduate Program in Operations Research and Industria Engineering,
More informationOn Capacity Scaling in Arbitrary Wireless Networks
On Capacity Scaing in Arbitrary Wireess Networks Urs Niesen, Piyush Gupta, and Devavrat Shah 1 Abstract arxiv:07112745v3 [csit] 3 Aug 2009 In recent work, Özgür, Lévêque, and Tse 2007) obtained a compete
More informationCapacity of Multi-service Cellular Networks with Transmission-Rate Control: A Queueing Analysis
Capacity of Muti-service Ceuar Networs with Transmission-Rate Contro: A Queueing Anaysis Eitan Atman INRIA, BP93, 2004 Route des Lucioes, 06902 Sophia-Antipois, France aso CESIMO, Facutad de Ingeniería,
More informationNew Economic Perspectives for Resource Allocation in Wireless Networks
2005 American Control Conference June 8-10, 2005. Portland, OR, USA FrA18.2 New Economic Perspectives for Resource Allocation in Wireless Networks Ahmad Reza Fattahi and Fernando Paganini Abstract The
More informationA Distributed MAC Scheme Supporting Voice Services in Mobile Ad Hoc Networks 1
A Distributed MAC Scheme Supporting Voice Services in Mobie Ad Hoc Networks 1 Hai Jiang, Ping Wang, H. Vincent Poor, and Weihua Zhuang Department of Eectrica & Computer Engineering, University of Aberta,
More informationUncertain Bequest Needs and Long-Term Insurance Contracts 1
Uncertain Bequest Needs and Long-Term Insurance Contracts 1 Wenan Fei (Hartford Life Insurance) Caude Fuet (Université du Québec à Montréa and CIRPEE) Harris Schesinger (University of Aabama) Apri 22,
More informationNCH Software Warp Speed PC Tune-up Software
NCH Software Warp Speed PC Tune-up Software This user guide has been created for use with Warp Speed PC Tune-up Software Version 1.xx NCH Software Technica Support If you have difficuties using Warp Speed
More informationFinance 360 Problem Set #6 Solutions
Finance 360 Probem Set #6 Soutions 1) Suppose that you are the manager of an opera house. You have a constant margina cost of production equa to $50 (i.e. each additiona person in the theatre raises your
More informationDesign and Analysis of a Hidden Peer-to-peer Backup Market
Design and Anaysis of a Hidden Peer-to-peer Backup Market Sven Seuken, Denis Chares, Max Chickering, Mary Czerwinski Kama Jain, David C. Parkes, Sidd Puri, and Desney Tan December, 2015 Abstract We present
More informationTOPOLOGICAL DESIGN OF MULTIPLE VPNS OVER MPLS NETWORK Anotai Srikitja David Tipper
TOPOLOGICAL DESIGN OF MULTIPLE VPNS OVER MPLS NETWORK Anotai Sriitja David Tier Det. of Information Science and Teecommunications University of Pittsburgh N. Beefied Avenue, Pittsburgh, PA 60 ABSTRACT
More informationPay-on-delivery investing
Pay-on-deivery investing EVOLVE INVESTment range 1 EVOLVE INVESTMENT RANGE EVOLVE INVESTMENT RANGE 2 Picture a word where you ony pay a company once they have deivered Imagine striking oi first, before
More informationMaintenance activities planning and grouping for complex structure systems
Maintenance activities panning and grouping for compex structure systems Hai Canh u, Phuc Do an, Anne Barros, Christophe Berenguer To cite this version: Hai Canh u, Phuc Do an, Anne Barros, Christophe
More informationEarly access to FAS payments for members in poor health
Financia Assistance Scheme Eary access to FAS payments for members in poor heath Pension Protection Fund Protecting Peope s Futures The Financia Assistance Scheme is administered by the Pension Protection
More informationWith the arrival of Java 2 Micro Edition (J2ME) and its industry
Knowedge-based Autonomous Agents for Pervasive Computing Using AgentLight Fernando L. Koch and John-Jues C. Meyer Utrecht University Project AgentLight is a mutiagent system-buiding framework targeting
More informationMinimizing the Total Weighted Completion Time of Coflows in Datacenter Networks
Minimizing the Tota Weighted Competion Time of Cofows in Datacenter Networks Zhen Qiu Ciff Stein and Yuan Zhong ABSTRACT Communications in datacenter jobs (such as the shuffe operations in MapReduce appications
More informationSubject: Corns of En gineers and Bureau of Reclamation: Information on Potential Budgetarv Reductions for Fiscal Year 1998
GAO United States Genera Accounting Office Washington, D.C. 20548 Resources, Community, and Economic Deveopment Division B-276660 Apri 25, 1997 The Honorabe Pete V. Domenici Chairman The Honorabe Harry
More informationChapter 3: JavaScript in Action Page 1 of 10. How to practice reading and writing JavaScript on a Web page
Chapter 3: JavaScript in Action Page 1 of 10 Chapter 3: JavaScript in Action In this chapter, you get your first opportunity to write JavaScript! This chapter introduces you to JavaScript propery. In addition,
More informationA New Statistical Approach to Network Anomaly Detection
A New Statistica Approach to Network Anomay Detection Christian Caegari, Sandrine Vaton 2, and Michee Pagano Dept of Information Engineering, University of Pisa, ITALY E-mai: {christiancaegari,mpagano}@ietunipiit
More informationUnderstanding. nystagmus. RCOphth
Understanding nystagmus RCOphth RNIB s understanding series The understanding series is designed to hep you, your friends and famiy understand a itte bit more about your eye condition. Other tites in the
More informationComparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time
Journa of Heathcare Engineering Vo. 6 No. 3 Page 34 376 34 Comparison of Traditiona and Open-Access Appointment Scheduing for Exponentiay Distributed Service Chongjun Yan, PhD; Jiafu Tang *, PhD; Bowen
More informationLeakage detection in water pipe networks using a Bayesian probabilistic framework
Probabiistic Engineering Mechanics 18 (2003) 315 327 www.esevier.com/ocate/probengmech Leakage detection in water pipe networks using a Bayesian probabiistic framework Z. Pouakis, D. Vaougeorgis, C. Papadimitriou*
More informationLink Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE traffic classes
Link Dimensioning and LSP Optimization for MPLS Networks Supporting DiffServ EF and BE traffic casses Kehang Wu and Dougas S. Reeves Departments of Eectrica and Computer Engineering and Computer Science
More informationDynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud
Dynamic Pricing Trade Market or Shared Resources in IIU Federated Coud Tongrang Fan 1, Jian Liu 1, Feng Gao 1 1Schoo o Inormation Science and Technoogy, Shiiazhuang Tiedao University, Shiiazhuang, 543,
More informationASYMPTOTIC DIRECTION FOR RANDOM WALKS IN RANDOM ENVIRONMENTS arxiv:math/0512388v2 [math.pr] 11 Dec 2007
ASYMPTOTIC DIRECTION FOR RANDOM WALKS IN RANDOM ENVIRONMENTS arxiv:math/0512388v2 [math.pr] 11 Dec 2007 FRANÇOIS SIMENHAUS Université Paris 7, Mathématiques, case 7012, 2, pace Jussieu, 75251 Paris, France
More informationNordic Ecolabelling of Copy and printing paper - supplementary module
rdic Ecoabeing of Copy and printing paper - suppementary modue Version 4.1 22 June 2011 30 June 2016 rdic Ecoabeing Content What is rdic Ecoabeed copy and printing paper? 3 Why choose the rdic Ecoabe?
More informationVirtual trunk simulation
Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne
More informationJournal of Economic Behavior & Organization
Journa of Economic Behavior & Organization 85 (23 79 96 Contents ists avaiabe at SciVerse ScienceDirect Journa of Economic Behavior & Organization j ourna ho me pag e: www.esevier.com/ocate/j ebo Heath
More informationThis paper considers an inventory system with an assembly structure. In addition to uncertain customer
MANAGEMENT SCIENCE Vo. 51, No. 8, August 2005, pp. 1250 1265 issn 0025-1909 eissn 1526-5501 05 5108 1250 informs doi 10.1287/mnsc.1050.0394 2005 INFORMS Inventory Management for an Assemby System wh Product
More informationLoad Balancing in Distributed Web Server Systems with Partial Document Replication *
Load Baancing in Distributed Web Server Systems with Partia Document Repication * Ling Zhuo Cho-Li Wang Francis C. M. Lau Department of Computer Science and Information Systems The University of Hong Kong
More informationFigure 1. A Simple Centrifugal Speed Governor.
ENGINE SPEED CONTROL Peter Westead and Mark Readman, contro systems principes.co.uk ABSTRACT: This is one of a series of white papers on systems modeing, anaysis and contro, prepared by Contro Systems
More informationRisk Margin for a Non-Life Insurance Run-Off
Risk Margin for a Non-Life Insurance Run-Off Mario V. Wüthrich, Pau Embrechts, Andreas Tsanakas February 2, 2011 Abstract For sovency purposes insurance companies need to cacuate so-caed best-estimate
More informationOn Distributed Computation Rate Optimization for Deploying Cloud Computing Programming Frameworks
On Distributed omputation ate Optimization for Depoying oud omputing Programming Framewors Jia Liu athy H. Xia Ness B. Shroff Xiaodong Zhang Dept. of Eectrica and omputer Engineering Dept. of Integrated
More informationWide-Area Traffic Management for. Cloud Services
Wide-Area Traffic Management for Coud Services Joe Wenjie Jiang A Dissertation Presented to the Facuty of Princeton University in Candidacy for the Degree of Doctor of Phiosophy Recommended for Acceptance
More informationWe focus on systems composed of entities operating with autonomous control, such
Middeware Architecture for Federated Contro Systems Girish Baiga and P.R. Kumar University of Iinois at Urbana-Champaign A federated contro system (FCS) is composed of autonomous entities, such as cars,
More informationFRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS. Karl Skretting and John Håkon Husøy
FRAME BASED TEXTURE CLASSIFICATION BY CONSIDERING VARIOUS SPATIAL NEIGHBORHOODS Kar Skretting and John Håkon Husøy University of Stavanger, Department of Eectrica and Computer Engineering N-4036 Stavanger,
More informationA Latent Variable Pairwise Classification Model of a Clustering Ensemble
A atent Variabe Pairwise Cassification Mode of a Custering Ensembe Vadimir Berikov Soboev Institute of mathematics, Novosibirsk State University, Russia berikov@math.nsc.ru http://www.math.nsc.ru Abstract.
More informationNon-orthogonal Direct Access for Small Data Transmission in Cellular MTC Networks
Non-orthogona Direct Access for Sma Data Transmission in Ceuar MTC Networks Keng-Te Liao, Chia-Han Lee, Tzu-Ming Lin, Chien-Min Lee, and Wen-Tsuen Chen Academia Sinica, Taipei, Taiwan Industria Technoogy
More informationA Description of the California Partnership for Long-Term Care Prepared by the California Department of Health Care Services
2012 Before You Buy A Description of the Caifornia Partnership for Long-Term Care Prepared by the Caifornia Department of Heath Care Services Page 1 of 13 Ony ong-term care insurance poicies bearing any
More informationChapter 3: e-business Integration Patterns
Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?
More informationCLOUD service providers manage an enterprise-class
IEEE TRANSACTIONS ON XXXXXX, VOL X, NO X, XXXX 201X 1 Oruta: Privacy-Preserving Pubic Auditing for Shared Data in the Coud Boyang Wang, Baochun Li, Member, IEEE, and Hui Li, Member, IEEE Abstract With
More informationHybrid Process Algebra
Hybrid Process Agebra P.J.L. Cuijpers M.A. Reniers Eindhoven University of Technoogy (TU/e) Den Doech 2 5600 MB Eindhoven, The Netherands Abstract We deveop an agebraic theory, caed hybrid process agebra
More informationA Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation
A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation
More informationExample of Credit Card Agreement for Bank of America Visa Signature and World MasterCard accounts
Exampe of Credit Card Agreement for Bank of America Visa Signature and Word MasterCard accounts PRICING INFORMATION Actua pricing wi vary from one cardhoder to another Annua Percentage Rates for Purchases
More informationAA Fixed Rate ISA Savings
AA Fixed Rate ISA Savings For the road ahead The Financia Services Authority is the independent financia services reguator. It requires us to give you this important information to hep you to decide whether
More informationRisk Margin for a Non-Life Insurance Run-Off
Risk Margin for a Non-Life Insurance Run-Off Mario V. Wüthrich, Pau Embrechts, Andreas Tsanakas August 15, 2011 Abstract For sovency purposes insurance companies need to cacuate so-caed best-estimate reserves
More informationGWPD 4 Measuring water levels by use of an electric tape
GWPD 4 Measuring water eves by use of an eectric tape VERSION: 2010.1 PURPOSE: To measure the depth to the water surface beow and-surface datum using the eectric tape method. Materias and Instruments 1.
More informationLogics preserving degrees of truth from varieties of residuated lattices
Corrigendum Logics preserving degrees of truth from varieties of residuated attices FÉLIX BOU and FRANCESC ESTEVA, Artificia Inteigence Research Institute IIIA - CSIC), Beaterra, Spain. E-mai: fbou@iiia.csic.es;
More informationRFID Radio Frequency IDentification
RFID Radio Frequency IDentification By: Jeremy Yager RFID - Overview RFID, as the name suggests, uses RF devices to communicate identification information. This is achieved by using sma devices known as
More informationAvaya Remote Feature Activation (RFA) User Guide
Avaya Remote Feature Activation (RFA) User Guide 03-300149 Issue 5.0 September 2007 2007 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document
More informationILP Formulation and K-Shortest Path Heuristic for the RWA Problem with Allocation of Wavelength Converters
ILP Formuation and K-Shortest Path Heuristic for the RWA Probem with Aocation of Waveength Converters Karcius D.R. Assis 1, A. C. B. Soares, Wiiam F. Giozza and Heio Wadman 1 UEFS- State University of
More informationThe Use of Cooling-Factor Curves for Coordinating Fuses and Reclosers
he Use of ooing-factor urves for oordinating Fuses and Recosers arey J. ook Senior Member, IEEE S& Eectric ompany hicago, Iinois bstract his paper describes how to precisey coordinate distribution feeder
More informationIntroduction to XSL. Max Froumentin - W3C
Introduction to XSL Max Froumentin - W3C Introduction to XSL XML Documents Stying XML Documents XSL Exampe I: Hamet Exampe II: Mixed Writing Modes Exampe III: database Other Exampes How do they do that?
More informationSABRe B2.1: Design & Development. Supplier Briefing Pack.
SABRe B2.1: Design & Deveopment. Suppier Briefing Pack. 2013 Ros-Royce pc The information in this document is the property of Ros-Royce pc and may not be copied or communicated to a third party, or used
More informationPhysics 100A Homework 11- Chapter 11 (part 1) The force passes through the point A, so there is no arm and the torque is zero.
Physics A Homework - Chapter (part ) Finding Torque A orce F o magnitude F making an ange with the x axis is appied to a partice ocated aong axis o rotation A, at Cartesian coordinates (,) in the igure.
More informationEnergy Density / Energy Flux / Total Energy in 3D
Lecture 5 Phys 75 Energy Density / Energy Fux / Tota Energy in D Overview and Motivation: In this ecture we extend the discussion of the energy associated with wave otion to waves described by the D wave
More informationTERM INSURANCE CALCULATION ILLUSTRATED. This is the U.S. Social Security Life Table, based on year 2007.
This is the U.S. Socia Security Life Tabe, based on year 2007. This is avaiabe at http://www.ssa.gov/oact/stats/tabe4c6.htm. The ife eperiences of maes and femaes are different, and we usuay do separate
More informationCelerity: A Low-Delay Multi-Party Conferencing Solution
Ceerity: A Low-Deay Muti-Party Conferencing Soution Xiangwen Chen Dept. of Information Engineering The Chinese University of Hong Kong Yao Zhao Acate-Lucent Minghua Chen Dept. of Information Engineering
More informationBite-Size Steps to ITIL Success
7 Bite-Size Steps to ITIL Success Pus making a Business Case for ITIL! Do you want to impement ITIL but don t know where to start? 7 Bite-Size Steps to ITIL Success can hep you to decide whether ITIL can
More informationTeaching fractions in elementary school: A manual for teachers
Teaching fractions in eementary schoo: A manua for teachers H. Wu Apri 0, 998 [Added December, 200] I have decided to resurrect this fie of 998 because, as a reativey short summary of the basic eements
More informationSAT Math Facts & Formulas
Numbers, Sequences, Factors SAT Mat Facts & Formuas Integers:..., -3, -2, -1, 0, 1, 2, 3,... Reas: integers pus fractions, decimas, and irrationas ( 2, 3, π, etc.) Order Of Operations: Aritmetic Sequences:
More informationONE of the most challenging problems addressed by the
IEEE TRANSACTIONS ON GEOSCIENCE AND REMOTE SENSING, VOL. 44, NO. 9, SEPTEMBER 2006 2587 A Mutieve Context-Based System for Cassification of Very High Spatia Resoution Images Lorenzo Bruzzone, Senior Member,
More informationMessage. The Trade and Industry Bureau is committed to providing maximum support for Hong Kong s manufacturing and services industries.
Message The Trade and Industry Bureau is committed to providing maximum support for Hong Kong s manufacturing and services industries. With the weight of our economy shifting towards knowedge-based and
More information3.5 Pendulum period. 2009-02-10 19:40:05 UTC / rev 4d4a39156f1e. g = 4π2 l T 2. g = 4π2 x1 m 4 s 2 = π 2 m s 2. 3.5 Pendulum period 68
68 68 3.5 Penduum period 68 3.5 Penduum period Is it coincidence that g, in units of meters per second squared, is 9.8, very cose to 2 9.87? Their proximity suggests a connection. Indeed, they are connected
More informationIncome Protection Options
Income Protection Options Poicy Conditions Introduction These poicy conditions are written confirmation of your contract with Aviva Life & Pensions UK Limited. It is important that you read them carefuy
More informationBreakeven analysis and short-term decision making
Chapter 20 Breakeven anaysis and short-term decision making REAL WORLD CASE This case study shows a typica situation in which management accounting can be hepfu. Read the case study now but ony attempt
More informationHedge Fund Capital Accounts and Revaluations: Are They Section 704(b) Compliant?
o EDITED BY ROGER F. PILLOW, LL.M. PARTNERSHIPS, S CORPORATIONS & LLCs Hedge Fund Capita Accounts and Revauations: Are They Section 704(b) Compiant? THOMAS GRAY Hedge funds treated as partnerships for
More informationWINMAG Graphics Management System
SECTION 10: page 1 Section 10: by Honeywe WINMAG Graphics Management System Contents What is WINMAG? WINMAG Text and Graphics WINMAG Text Ony Scenarios Fire/Emergency Management of Fauts & Disabement Historic
More informationFast b-matching via Sufficient Selection Belief Propagation
Fast b-matching via Sufficient Seection Beief Propagation Bert Huang Computer Science Department Coumbia University New York, NY 127 bert@cs.coumbia.edu Tony Jebara Computer Science Department Coumbia
More informationIncome Protection Solutions. Policy Wording
Income Protection Soutions Poicy Wording Wecome to Aviva This booket tes you a you need to know about your poicy, incuding: what to do if you need to caim what s covered, and expanations of some of the
More informationDocuments de Travail du Centre d Economie de la Sorbonne
Documents de Travai du Centre d Economie de a Sorbonne Rationaizabiity and Efficiency in an Asymmetric Cournot Oigopoy Gabrie DESGRANGES, Stéphane GAUTHIER 2014.28 Maison des Sciences Économiques, 106-112
More informationWEBSITE ACCOUNT USER GUIDE SECURITY, PASSWORD & CONTACTS
WEBSITE ACCOUNT USER GUIDE SECURITY, PASSWORD & CONTACTS Password Reset Process Navigate to the og in screen Seect the Forgot Password ink You wi be asked to enter the emai address you registered with
More informationConference Paper Service Organizations: Customer Contact and Incentives of Knowledge Managers
econstor www.econstor.eu Der Open-Access-Pubikationsserver der ZBW Leibniz-Informationszentrum Wirtschaft The Open Access Pubication Server of the ZBW Leibniz Information Centre for Economics Kirchmaier,
More informationSNMP Reference Guide for Avaya Communication Manager
SNMP Reference Guide for Avaya Communication Manager 03-602013 Issue 1.0 Feburary 2007 2006 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this
More informationCapacity Planning of Survivable MPLS Networks Supporting DiffServ
Capacity Panning of Survivabe MPLS Networks Supporting DiffServ Kehang Wu and Dougas S. Reeves Departments of Eectrica and Computer Engineering and Computer Science North Caroina State University kwu@unity.ncsu.edu,
More information