Transmission Scheduling for Multi-Channel Satellite and Wireless Networks

Size: px
Start display at page:

Download "Transmission Scheduling for Multi-Channel Satellite and Wireless Networks"

Transcription

1 Tranmiion Scheduling for ulti-channel Satellite and Wirele Network Anand Ganti, Eytan odiano, John N. Titikli aachuett Intitute of Technology Abtract We conider a lotted ytem with N queue, and i.i.d. Bernoulli arrival at each queue during each lot. Each queue i aociated with a beam and a channel that change between on and off tate according to i.i.d. Bernoulli procee. We aume that the ytem ha K identical tranmitter ( erver ). Each erver, during each lot, can tranmit up to C 0 packet from a queue aociated with an on channel. We how that when K i arbitrary and C 0 =1,awell a when K =1and C 0 i arbitrary, a policy that aign the K erver to the on channel aociated with the K longet queue i optimal. We alo conider a fluid model under which fractional packet can be erved, for the cae K = N, and ubject to a contraint that at mot C packet can be erved in total over all of the N queue. We how that there i an optimal policy which erve the queue o that the reulting vector of queue length i ot Balanced. 1 Introduction Wirele and atellite node are often limited to a mall number of tranmitter and channel, and thee have to be allocated to uer in the face of competing demand. For example, atellite ytem employ hundred or even thouand of narrow beam over which information can be tranmitted at high data rate. Each of the downlink beam cover a different region within the atellite footprint. Data packet to be tranmitted along the different beam arrive at the atellite, either from the ground or from one of it neighboring atellite, and are tored in on-board buffer. In thi context, there i often only a limited number of tranmitter on-board the atellite, o that not all beam can be erved by the tranmitter imultaneouly. Thi give rie to a cheduling problem involving the allocation of the tranmitter to the different downlink beam. Further complicating matter i the fact that, due to weather and atmopheric condition, the tranmiion rate along the different beam varie with time; hence, the quality of the link mut be taken into account in making cheduling deciion. Similarly, a wirele bae tation typically ha far fewer channel available for tranmiion than the number of uer to be erved. Again, thi raie a nearly identical problem of allocating channel to the different uer. Thi cheduling problem ha received attention recently in the context of next generation wirele data ytem [2, 3, 4, 5, 6, 7, 8, 10]. We model the ytem a a dicrete time queueing ytem, with arrival and channel tate decribed by independent Bernoulli procee. ore pecifically, we aume that Thi reearch i upported in part by NSF Grant No. NCR and by DARPA under the Next Generation Internet Initiative

2 the number of arrival to the ith queue at time n, denoted by A i (n), are independent Bernoulli random variable, with the ame parameter for all i and n. Furthermore, we aume that the tate of the ith channel at time n, denoted by G i (n), can only take one of two value, namely, 0 or 1. We deignate 0 a an off tate, and 1 a the on tate. When the channel i in the off tate, no tranmiion i poible. When the channel i in the on tate, the channel can be utilized. Again, we aume that the G i (n) are independent and identically ditributed Bernoulli random variable, which are alo independent from the arrival procee. Finally, we let B i (n) repreent the number of packet in the ith queue at the beginning of time lot n. The atellite ha K tranmitter. Each tranmitter can only erve one queue, and can only be aigned to a queue whoe channel i on. At each lot, each tranmitter can tranmit up to C 0 packet, and the total number of tranmitted packet cannot exceed C. The parameter C 0 correpond to the power limitation on an individual tranmitter and C correpond to the power limitation on the entire atellite. Such queueing ytem, with multiple queue and tochatically varying ervice rate, have been tudied in [2] where the author how that, when K = 1(ingle tranmitter), apolicy called the Longet Connected Queue (LCQ) maximize the tability region of the ytem, and alo reult in optimal average queue lenght. Furthermore, [3] how that the LCQ policy reult in a maximal tability region under more general aumption on the arrival and channel tate procee. The model conidered in the preent work extend thi previou work in variou direction. 2 The cae of multiple erver and C 0 =1 We firt conider the cae where C = K and C 0 =1. That i, there are K erver, and each erver can erve at mot one packet during each time lot. Thi i a generalization of the ytem tudied in [2], which dealt with the cae where K =1.Wenow decribe apolicy that will be hown to be optimal in the current cenario, a well a in the cae where there i a ingle erver that can erve upto C 0 packet (ee Section 3). The Longet Connected Queue (LCQ) policy operate a follow. Conider the et of queue i that are connected, i.e., G i (n) =1. Out of that et, elect up to K queue with the larget value of B i (n), and erve min{b i (n),c 0 } packet from each one of them. Note that fewer than K queue will be elected if and only if the number of nonempty connected queue i maller than K. oreover, in the event that there are multiple queue with equal value of B i (n) competing for a tranmitter, the policy can chooe between them arbitrarily. Our main reult tate that the LCQ policy i optimal in the tochatic ordering ene [1]. The intuitive reaon i that thi policy trie to keep the queued packet pread over multiple queue and ha a better chance of avoiding idling when ome channel are off. Theorem 1 Aume that C 0 =1and C = K. Let Q(n) = N i=1 B i (n) be the total number of packet, tarting from a given initial tate, under ome policy π. Let Q L (n) be the total number of packet when the LCQ policy i ued. Then, {Q L (n)} {Q(n)}, t i.e., the proce {Q L (n)} tochatically dominate the proce {Q(n)}. A reult of thi type wa proved in [2], for the cae K =1,uing a coupling argument. Our proof for the cae of general K alo ue a coupling argument. For brevity, we only provide an outline here and refer the reader to [9] for complete proof.

3 Let u note that optimality in the tochatic ordering ene i a rather trong notion. It implie the optimality of the LCQ policy over either a finite or an infinite horizon, involving one-tep cot of the form E[f(Q(n))], where f i any nondecreaing function. The ame comment applie to Theorem 2 later in thi paper. Let Z N + be the et of nonnegative integer. We ue Π d : R N R N to denote the function that ort it argument in decreaing order. We alo let (N) = {δ { 1, 0, 1} N δ i > 0 [δ j 0, j <i]} be the et of vector whoe component are either minu one, zero, or one, with all the one appearing before all the negative one. For example, [0, 1, 0, 1, 1, 0, 1, 0, 1] belong to (9). Finally, we ue Z(N) = {b Z N + : b 1 b 2 b N } to denote the et of nonnegative vector whoe component are nonincreaing. For example, [9, 2, 2, 1] belong to Z(4). Proof Outline: We conider a ytem (to be referred to a ytem 0 ) that tart at an initial tate (b(0),g(0)) and i controlled by policy π. Wewill contruct a policy π 1 and a correponding ytem 1 on the ame probability pace, by appropriately coupling the arrival, ervice, and channel tate procee, o that π 1 act imilar to LCQ at n =0,and o that Q 1 (n) Q(n) atall time n, for every ample path. We will ue a upercript 1 to denote variou quantitie, uch a total queue length or channel tate, under policy π 1 in ytem 1. Both ytem tart with the ame initial tate (b(0),g(0)). If π behave like LCQ at time 0, we let π 1 be equal to π, and we couple the two ytem o that they evolve in an identical fahion. In thi cae, the inequality Q 1 (n) Q(n) hold with equality for all n. Suppoe now that at time 0, π behave differently from LCQ. We contruct ytem 1 and policy π 1 a follow. At time 0, we have the ame channel tate g(0) in both ytem. We apply an LCQ policy to ytem 1. After ubtracting the packet withdrawal at time 0, we arrange the queue length of ytem 0 and ytem 1 in decreaing order We then couple any arrival to the ith longet queue of ytem 0 to an arrival to the ith longet queue of ytem 1. Let β(n) be the vector of queue length in ytem 0, arranged in decreaing order, o that β 1 (n) β 2 (n) β N (n). Similarly define β 1 (n) for ytem 1. Let δ(n) = β(n) β 1 (n) The following lemma (whoe proof we omit) how that δ(1) (N), a reult we will ue in decribing the coupling procedure for n 1. The firt part of the lemma how that if we firt ubtract the packet withdrawal under either policy, and then ort the reulting queue length vector, the difference belong to the et (N). The econd part etablihe that after coupling the arrival at time 0, a decribed earlier, the vector δ(1) belong to (N). Lemma 1 (a) Let b Z(N) and g {0, 1} N. Let r be afeaible packet withdrawal vector, and let r be the LCQ control, in tate (b, g). Then Π d (b r) Π d (b r) (N). (b) Let e {0, 1} N,b, b Z(N),b b (N). Then Π d (b + e) Π d ( b + e) (N). We now decribe the coupling and the policy π 1 at poitive time n. Cae I: Suppoe that there exit ome i uch that δ i (1) = 1 and β 1 i (1) = 0. Since δ(1) (N) (Lemma 1), we mut have δ(1) 0, i.e., the jth longet queue in ytem 0

4 ha no fewer packet than the jth longet queue in ytem 1, for every j. Wethen let the channel tate, control, and arrival for the jth longet queue in ytem 1 be the ame a for the jth longet queue in ytem 1, at all poitive time n. Weobtain Q 1 (1) Q(1), and the coupling alo preerve thi inequality for all time n. Cae II: Suppoe now that for every i atifying β 1 i (1) = 0, we mut alo have δ i (1) = 0, which implie β i (1) = 0. We map the channel tate of the ith longet queue in ytem 0 to the the ith longet queue in ytem 1. If π erve a packet from the ith longet queue in ytem 0, we have β i (1) > 0, which implie that β 1 i (1) > 0, and we let π 1 erve a packet from the ith longet queue in ytem 1. To couple the arrival, we again ubtract the packet withdrawal, arrange the queue length in ytem 0 and 1, repectively, in decreaing order, and couple any arrival to the ith longet queue of ytem 0 to an arrival to the ith longet queue of ytem 1. The next lemma (whoe proof i omitted) tate that δ(2) (N), which we can then ue to repeat the coupling at time 1, for time n =2, 3,... Lemma 2 Let e {0, 1} N,b, b Z(N),b b (N). Then Π d (b e) Π d ( b e) (N). For n =2, 3,..., either the coupling ha already been determined (if at ome prior time the condition for Cae I wa atified), or ele we repeat the above coupling procedure and ue the fact δ(n 1) (N) δ(n) (N) (Lemma 1 and 2). We now how that Q 1 (n) Q(n) for all n. Thi tatement clearly hold when n =0. We have alo etablihed it for Cae I. For Cae II, we have already noted that we can alway withdraw a many packet in ytem 1 a in ytem 0, which implie our aertion for all n. We have etablihed that for every policy π, there exit a policy π 1 that agree with the LCQ policy at time 0, and uch that Q 1 (n) Q(n), for all n. By repeating the contruction, we obtain policie π 1,π 2,... uch that the policy π k agree with LCQ until time k 1, and uch that Q k (n) Q k 1 (n 1) Q 1 (n) Q(n), for all n. Thi tatement, in conjunction with a tandard characterization of tochatic dominance [1] complete the proof. 3 The ingle erver cae We now conider a variant of the problem in which there i a ingle erver. Thi i another extenion of the problem tudied in [2], where the erver could only erve one packet per lot. In our generalization, the erver can erve up to C 0 packet during the ame lot, but they mut all be taken from the ame queue. Without lo of generality, we aume that if a queue with B i (n) packet i erved, then the number of packet withdrawn i equal to min{b i (n),c 0 }. Wehave the following reult, which i again proved uing a coupling argument. Theorem 2 Aume that K =1.LetQ(n) = N i=1 B i (n) be the total number of packet, tarting from a given initial tate, under ome policy π. Let Q L (n) be the total number of packet when the LCQ policy i ued. Then, {Q L (n)} t {Q(n)}.

5 For the purpoe of the proof of thi theorem, we expand the et of policie to include policie that may add extra packet to queue. We let Φ a be the expanded et of policie. We let Φ na ( no addition ) be the et of all policie that never add extra packet. We ay that a policy ha the LCQ property at time t if at that time it can only erve packet from a longet connected queue. We let L τ be the et of all policie that have the LCQ property for all time t τ, and which do not add any packet before time τ. We will ue a(n) to denote arrival, g(n) to denote channel tate, b(n) to denote queue ize, and h i (n) todenote packet added to queue i, attime n. Proof Outline: The core of the proof conit of the following two tep. 0. We tart with a policy π in L τ 1 Φ na acting on a queueing ytem with initial tate (b(0),g(0)). We call thi ytem 0. Such a policy ha the LCQ property until time τ 1, and never introduce additional packet. 1. We contruct a new policy π in L τ (i.e., π ha the LCQ property until time τ, and doe not introduce additional packet before time τ), and a correponding ytem 1 on the ame probability pace, o that π dominate π, inthe ene that Q 1 (n) Q(n) for all n. (We ue a upercript of 1 to denote variou quantite in ytem 1 and no upercript to denote related quantitie in ytem 0.) We now decribe the contruction of π. Before time τ, welet π be identical to π, and let arrival and channel tate be the ame for both ytem. In particular, b(τ) =b 1 (τ). At time τ, welet the tate of each channel be the ame for both ytem. Step 1.1. Policy π at time τ. If π erve a longet connected queue at time τ, we let π do the ame, and et a 1 (τ) =a(τ), h 1 (τ) =0. In thi cae, we have b 1 (τ +1)=b(τ + 1). Suppoe now that π chooe to erve at time τ ome queue which i not a longet connected queue. Without lo of generality, let u aume that π erve queue 2 and that queue 1 i a longet connected queue. Thu, b(τ) iofthe form b(τ) = for ome Z+ N 2 and >m.weditinguih three cae. (i) Suppoe that C 0 m<. Policy π remove C 0 packet from queue 2. We let policy π remove C 0 packet from queue 1. We alo let h 1 (τ) =0anda 1 (τ) =a(τ). The reulting configuration are of the form b(τ +1)= m C 0 m, + a(τ), b 1 (τ +1)= C 0 m + a(τ). (ii) Suppoe that m< C 0.Inthi cae, π drive m down to zero. We let π erve queue 1, alo driving it down to zero. Furthermore, π add packet to queue 2 to drive it up to, i.e., h 1 2(τ) = m. Wealo let a 2 (τ), if i =1, a 1 i (τ) = a 1 (τ), if i =2, a i (τ), otherwie.

6 The reulting configuration are of the form b(τ +1)= 0 + a(τ), b 1 (τ +1)= Thu, b 1 (τ +1)and b(τ +1)are permutation of each other. 0 + a 1 (τ). (iii) Suppoe finally that m<c 0 <.Inthi cae, π drive m down to zero. We let π erve queue 1 and remove C 0 packet. We alo let π add C 0 m packet to queue 2, i.e., h 1 2(τ) =C 0 m, driving it up to C 0. The reulting configuration are of the form b(τ +1)= 0 + a(τ), b 1 (τ +1)= C 0 C 0 + a(τ). Thi complete the decription of policy π at time τ. Wewill now contruct π, for time t>τ,o that at any time one of the following three relationhip hold: (i) b(t) =b 1 (t). (ii) b(t) and b 1 (t) differ only in their firt two component, and b 1 (t) =b 1 2(t), b 2 (t) =b 1 1(t). (iii) b(t) and b 1 (t) differ only in their firt two component, and there exit a poitive integer k uch that for either (i, j) =(1, 2) or for (i, j) =(2, 1), we have b j (t) min{b 1 1(t),b 1 2(t)} max{b 1 1(t),b 1 2(t)} b i (t), b 1 i (t) =b i (t) kc 0, b 1 j(t) =b j (t)+kc 0, We will ue b 1 (t) b(t) to indicate that b(t) and b 1 (t) are related in one of the above three way. Note that our contruction of π at time τ guarantee that b 1 (τ +1) b(τ + 1). Step 1.2. Policy π at time t>τ. We now contruct the policy π for time t > τ. We proceed recurively. For time τ +1, thi i already accomplihed. Suppoe that π ha been defined up to ome time t 1 and that b 1 (t) b(t). We conider three cae, which correpond to the three cae in the definition of the relation. Cae (i): If b(t) =b 1 (t), we let the channel tate, arrival, and control be the ame for both ytem, which enure that b 1 (t +1)=b(t +1)and b 1 (t +1) b(t +1). Cae (ii): Suppoe that b 1 (t) iobtained from b(t) bypermuting the firt two component. For queue i / {1, 2} we let the channel tate, arrival, and control be the ame for both ytem. For queue 1 and 2, we let channel tate, arrival, and control for queue 1 in ytem 0 be the ame a for queue 2 in ytem 1, and vice vera. Then, the lat N 2 component of b 1 (t +1)and b(t +1)are equal, wherea the firt two remain permutation of each other. In particular, b 1 (t +1) b(t +1). Cae (iii): We finally conider the remaining cae (iii) in the definition of. Without lo of generality, we aume that the firt component of b(t) iatleat a large a the

7 econd component. In particular, for ome m and, with m<, for ome poitive integer k, and for ome Z N 2 +,wehave b(t) = m, b 1 (t) = kc 0 m + kc 0 The ret of the argument will be different, depending on whether we have m + kc 0 kc 0 ( Type I ) or m + kc 0 > kc 0 ( Type II ). Type I: Suppoe that m + kc 0 kc 0.Wecouple the channel tate and arrival by letting g 1 (t) =g(t) and a 1 (t) =a(t). (a) If π erve queue 1, bringing it down to C 0,policy π alo remove C 0 packet from queue 1. (Thi i poible becaue kc 0 m + kc 0 C 0. The reulting configuration i b(t +1)= C 0 m + a(t), b 1 (t +1)=. (k +1)C 0 m + kc 0 + a(t), and we have b 1 (t+1) b(t+1). (b) If π remove u packet from queue 2 (note that either u = C 0 if m C 0,oru = m otherwie), then π remove the ame number of packet from queue 2. (Thi i done by removing C 0 packet and then adding h 1 2(t) =C 0 u packet.) The reulting configuration i b(t +1)= m u + a(t), b 1 (t +1)= kc 0 m u + kc 0 + a(t). (c) Finally, if π erve ome queue j>2, we let π do the ame. In all ubcae, we have b 1 (t +1) b(t + 1). Type II: Suppoe now that m + kc 0 > kc 0.Welet g 1 1(t) =g 2 (t), g 1 2(t) =g 1 (t), and g 1 j (t) =g j (t) for j>2. That i, we couple the channel tate for queue 1 under policy π to that for queue 2 under policy π, and vice vera. For all other queue, channel tate coincide under the two policie. (a) Suppoe that π erve ome queue j>2. Then, π remove the ame number of packet from the ame queue, which i poible becaue b 1 j(t) =b j (t) and g 1 j (t) =g j (t). We then let a 1 (t) =a(t). (b) Suppoe that π erve queue 1 (in particular, g 1 (t) =1), bringing it down to C 0.Wethen let π erve queue 2, bringing it down to m +(k 1)C 0. Thi i poible becaue g 1 2(t) =g 1 (t) =1and b 1 2(t) =m + kc 0 C 0. We then let a 1 (t) =a(t). The reulting configuration i b(t +1)= C 0 m + a(t), b 1 (t +1)= kc 0 m +(k 1)C 0 Notice that m m +(k 1)C 0,becaue k i poitive. In particular, + a(t). m min{ kc 0,m+(k 1)C 0 } max{ kc 0,m+(k 1)C 0 } C 0. We then ee that b 1 (t +1) b(t +1). (If k =1,wehave cae (i) in the definition of ; if k>1, we have cae (iii).)

8 (c) Suppoe, finally, that π erve queue 2 and remove u = min{m, C 0 } packet, bringing it down to m u. In particular, g1(t) 1 =g 2 (t) =1. If kc 0 C 0, then, π remove C 0 packet from queue 1, bringing it to (k +1)C 0, and add h 1 2(t) =C 0 u packet to queue 2, bringing it to m +(k +1)C 0 u. We then let a 1 (t) =a(t). The reulting configuration i b(t +1)= m u + a(t), b 1 (t +1)= (k +1)C 0 m u +(k +1)C 0 + a(t). We then have b 1 (t +1) b(t +1) (cae (iii) in the definition of ). It remain to conider the cae where kc 0 <C 0.Inthat cae, we have m kc 0 C 0,othat π drive queue 2 down to zero. Policy π, drive queue 1 from kc 0 down to zero, and it add enough packet to queue 2 to drive it up to. We then let a 1 1(t) =a 2 (t),a 1 2(t) =a 1 (t) and a 1 j(t) =a j (t), for j>2. The reulting configuration i b(t+1) = 0 + a 1 (t) a 2 (t) [a 3 (t),...,a N (t)] T, b 1 (t+1) = 0 + a 2 (t) a 1 (t) [a 3 (t),...,a N (t)] T and we have b 1 (t +1) b(t +1)(cae (ii) in the definition of ). At thi point, we have completed the recurive contruction of π. The new policy π dominate π, ha the LCQ property until time τ, and doe not add any packet before time τ. The remainder of the proof of Theorem 2, which we omit, proceed a follow. We modify the policy π to obtain yet another policy ˆπ in L τ Φ na (in particular, ˆπ never add extra packet), and which dominate π. We then repeat the preceding tep for τ =0, 1,...,toobtain a policy with the LCQ property at all time and with no added packet, and which dominate the policy that we tarted with. 4 The cae of one erver per queue (K = N) In thi ection, we aume that packet can be erved from all connected queue imultaneouly, ubject to a bound C on the total number of packet that can be erved during one time lot. If we further aume that C =1,weare back to the model in [2], and the LCQ policy i optimal. The cae of general C i an open problem. However, if we lightly modify the model to allow erving a noninteger number of packet from each queue, we can how that a generalization of LCQ, which we call the ot Balanced policy i optimal. Suppoe that at time n we have (B(n),G(n)) = (b, g), for ome vector b and g. Let U(b, g) denote the et of feaible vector of packet withdrawal, when the ytem i in tate (b, g), i.e, { U(b, g) = u R N + if g i =0then u i =0; } N u i C. i=1 The ot Balanced policy chooe a u U(b, g) othat i u i i a large a poible, and in addition, o that it minimize max (b i u i ). i:g i =1,

9 For example, if b =[5, 4, 3, 2, 6, 1], g =[1, 1, 1, 1, 0, 0], and C =2,amot balanced policy will let u =[1.5, 0.5, 0, 0, 0, 0], reulting in the configuration b u =[3.5, 3.5, 3, 2, 6, 1]. It i not hard to how that the mot balanced policy i uniquely defined. Finally, we let F be the et of all function f : R N + Rthat are convex, nondecreaing, and ymmetric (permutation invariant). Theorem 3 Let B(n) be the vector of queue ize at time n. For any function f F and for every n 0, the ot Balanced policy minimize E[f(B(n))]. Proof Outline: The proof ue a dynamic programming argument. Let Vn (b, g) bethe leat poible value of E[f(B(n))], tarting from the initial tate (b, g) attime zero. We then have V0 (b, g) =f(b), and V n (b, g) = min w U(b,g) a p A (a)p G ( g)v n 1(b + a w, g), g for every poitive n. Here, p G ( g) ithe probability that the next vector of channel tate i g, and p A (a) ithe probability that the vector of queue arrival i a. We ue the above equation and induction to how that the function Vn belong to F, for all n. The convexity and ymmetry of V (n), together with the form of the above dynamic programming equation, can be ued to how that more balanced configuration are alway preferable. Uing Theorem 3, it i eaily een that the mot balanced policy i optimal for a wide variety of performance criteria, uch a a dicounted um of the E[f(Q(n))] over a finite or infinite horizon, or an undicounted um over a finite horizon. Furthermore, the theorem cover the important pecial cae of f(b) =b b N (total queue length). 5 Dicuion Let u remark that Theorem 1 and 2 remain valid for certain generalization of the model. For example, alway auming that the arrival A i (n) are independent and identically ditributed, the Bernoulli aumption can be relaxed. Intead, it uffice to aume that the random variable A i (n) can be expreed a a um of independent Bernoulli random variable, with poibly different parameter. The pecial cae of equal parameter allow the A i (n) tohave abinomial ditribution. For another generalization, we can relax the aumption that the ditribution of the A i (n) ithe ame for different time n. For example, we can aume that it i Bernoulli with a parameter which i itelf random and independent at different time (a determinitically changing parameter i a pecial cae). In the ame pirit, the probability that a channel i on can alo vary with time. It turn out that the reult alo remain valid in certain ituation where the arrival at different queue (repectively, the channel tate) at a given time are dependent, a long a the dependence i ymmetric, in the ene that it lead to permutation-invariant ditribution. Reference [1] D. Stoyan, Comparion ethod for Queue and other Stochatic odel, John Wiley, 1983.

10 [2] L. Taiula and A. Ephremide, Dynamic Server Allocation to Parallel Queue with Randomly Varying Connectivity, IEEE Tranaction on Information Theory, 1993, Vol. 39, No. 2, pp [3]. Andrew, A. Stoylar, K. Kumaran, R. Vijayakumar, K. Ramanan, and P. Whiting, Scheduling in a Queueing Sytem with Aynchronouly Varying Service Rate, IEEE Tranaction on Communication, Vol. 39, No. 2, 2001, pp [4] R. A. Berry, and R. Gallager, Communication Over Fading Channel with Delay Contraint, IEEE Tranaction on Information Theory, Vol. 48, No. 5, ay 2002, pp [5]. Neely, E. odiano and C. Rohr, Power and Server Allocation in a ulti-beam Satellite with Time Varying Channel, IEEE INFOCO 2002, New York, June, [6] L. Taiula and A. Ephremide, Stability Propertie of Contrained Queueing Sytem and Scheduling Policie for aximum Throughput in ultihop Radio Network, IEEE Tranaction on Automatic Control, Vol. 37, no. 12, Dec [7] N. Bambo and G. ichailidi, On Parallel Queueing with Random Server Connectivity and Routing Contraint, Probability in Engineering and Information Science, 2002, in pre. [8]. Armory and N. Bambo, Queueing Dynamic and maximal Throughput Scheduling in Switched Proceing Sytem, technical report Net-Lab , Stanford Univerity, Stanford, CA [9] A. Ganti, Tranmiion Scheduling for ulti-beam Satellite Sytem, doctoral thei, dept. of EECS, IT, Cambridge, A, [10]. Andrew, K. Kumaran, K. Ramanan, A. Stolyar, R. Vijayakumar, P. Whiting, Scheduling in a Queueing Sytem with Aynchronouly Varying Service Rate, preprint, October 2000.

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

A Note on Profit Maximization and Monotonicity for Inbound Call Centers OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding

More information

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada

More information

Name: SID: Instructions

Name: SID: Instructions CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com

More information

Scheduling of Jobs and Maintenance Activities on Parallel Machines

Scheduling of Jobs and Maintenance Activities on Parallel Machines Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 cylee@ac.tamu.edu Zhi-Long Chen** Department

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,

More information

Partial optimal labeling search for a NP-hard subclass of (max,+) problems

Partial optimal labeling search for a NP-hard subclass of (max,+) problems Partial optimal labeling earch for a NP-hard ubcla of (max,+) problem Ivan Kovtun International Reearch and Training Center of Information Technologie and Sytem, Kiev, Uraine, ovtun@image.iev.ua Dreden

More information

Utility-Based Flow Control for Sequential Imagery over Wireless Networks

Utility-Based Flow Control for Sequential Imagery over Wireless Networks Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building

More information

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad

More information

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic

More information

Senior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow

Senior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow Senior Thei Hore Play Optimal Wager and the Kelly Criterion Author: Courtney Kempton Supervior: Profeor Jim Morrow June 7, 20 Introduction The fundamental problem in gambling i to find betting opportunitie

More information

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International

More information

Bi-Objective Optimization for the Clinical Trial Supply Chain Management

Bi-Objective Optimization for the Clinical Trial Supply Chain Management Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective

More information

DUE to the small size and low cost of a sensor node, a

DUE to the small size and low cost of a sensor node, a 1992 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 14, NO. 10, OCTOBER 2015 A Networ Coding Baed Energy Efficient Data Bacup in Survivability-Heterogeneou Senor Networ Jie Tian, Tan Yan, and Guiling Wang

More information

Online story scheduling in web advertising

Online story scheduling in web advertising Online tory cheduling in web advertiing Anirban Dagupta Arpita Ghoh Hamid Nazerzadeh Prabhakar Raghavan Abtract We tudy an online job cheduling problem motivated by toryboarding in web advertiing, where

More information

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

Unit 11 Using Linear Regression to Describe Relationships

Unit 11 Using Linear Regression to Describe Relationships Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

Distributed Monitoring and Aggregation in Wireless Sensor Networks

Distributed Monitoring and Aggregation in Wireless Sensor Networks Ditributed Monitoring and Aggregation in Wirele Senor Network Changlei Liu and Guohong Cao Department of Computer Science & Engineering The Pennylvania State Univerity E-mail: {chaliu, gcao}@ce.pu.edu

More information

Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System

Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System Probability and Statitic Volume 5, Article ID 558, 8 page http://dxdoiorg/55/5/558 Reearch Article An (, S) Production Inventory Controlled Self-Service Queuing Sytem Anoop N Nair and M J Jacob Department

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

Assessing the Discriminatory Power of Credit Scores

Assessing the Discriminatory Power of Credit Scores Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,

More information

Queueing Models for Multiclass Call Centers with Real-Time Anticipated Delays

Queueing Models for Multiclass Call Centers with Real-Time Anticipated Delays Queueing Model for Multicla Call Center with Real-Time Anticipated Delay Oualid Jouini Yve Dallery Zeynep Akşin Ecole Centrale Pari Koç Univerity Laboratoire Génie Indutriel College of Adminitrative Science

More information

Socially Optimal Pricing of Cloud Computing Resources

Socially Optimal Pricing of Cloud Computing Resources Socially Optimal Pricing of Cloud Computing Reource Ihai Menache Microoft Reearch New England Cambridge, MA 02142 t-imena@microoft.com Auman Ozdaglar Laboratory for Information and Deciion Sytem Maachuett

More information

T-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D

T-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D The t Tet for ependent Sample T-tet for dependent Sample (ak.a., Paired ample t-tet, Correlated Group eign, Within- Subject eign, Repeated Meaure,.. Repeated-Meaure eign When you have two et of core from

More information

Group Mutual Exclusion Based on Priorities

Group Mutual Exclusion Based on Priorities Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio

More information

Managing Customer Arrivals in Service Systems with Multiple Servers

Managing Customer Arrivals in Service Systems with Multiple Servers Managing Cutomer Arrival in Service Sytem with Multiple Server Chrito Zacharia Department of Management Science, School of Buine Adminitration, Univerity of Miami, Coral Gable, FL 3346. czacharia@bu.miami.edu

More information

INFORMATION Technology (IT) infrastructure management

INFORMATION Technology (IT) infrastructure management IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning

More information

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute.

HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * Michael Spagat Royal Holloway, University of London, CEPR and Davidson Institute. HUMAN CAPITAL AND THE FUTURE OF TRANSITION ECONOMIES * By Michael Spagat Royal Holloway, Univerity of London, CEPR and Davidon Intitute Abtract Tranition economie have an initial condition of high human

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

Linear energy-preserving integrators for Poisson systems

Linear energy-preserving integrators for Poisson systems BIT manucript No. (will be inerted by the editor Linear energy-preerving integrator for Poion ytem David Cohen Ernt Hairer Received: date / Accepted: date Abtract For Hamiltonian ytem with non-canonical

More information

Availability of WDM Multi Ring Networks

Availability of WDM Multi Ring Networks Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity

More information

Proceedings of Power Tech 2007, July 1-5, Lausanne

Proceedings of Power Tech 2007, July 1-5, Lausanne Second Order Stochatic Dominance Portfolio Optimization for an Electric Energy Company M.-P. Cheong, Student Member, IEEE, G. B. Sheble, Fellow, IEEE, D. Berleant, Senior Member, IEEE and C.-C. Teoh, Student

More information

Mixed Method of Model Reduction for Uncertain Systems

Mixed Method of Model Reduction for Uncertain Systems SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced

More information

Assigning Tasks for Efficiency in Hadoop

Assigning Tasks for Efficiency in Hadoop Aigning Tak for Efficiency in Hadoop [Extended Abtract] Michael J. Ficher Computer Science Yale Univerity P.O. Box 208285 New Haven, CT, USA michael.ficher@yale.edu Xueyuan Su Computer Science Yale Univerity

More information

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET Chapter 1 NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET S. Srivatava Univerity of Miouri Kana City, USA hekhar@conrel.ice.umkc.edu S. R. Thirumalaetty now

More information

A Review On Software Testing In SDlC And Testing Tools

A Review On Software Testing In SDlC And Testing Tools www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,

More information

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds !111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg

More information

Gabriel E. Arrobo and Richard D. Gitlin, NAI Charter Fellow

Gabriel E. Arrobo and Richard D. Gitlin, NAI Charter Fellow Technology and Innovation, Vol. 15, pp. 227 236, 2013 1949-8241/13 $90.00 +.00 Printed in the USA. All right reerved. DOI: http://dx.doi.org/10.3727/194982413x13790020921825 Copyright ã 2013 Cognizant

More information

Health Insurance and Social Welfare. Run Liang. China Center for Economic Research, Peking University, Beijing 100871, China,

Health Insurance and Social Welfare. Run Liang. China Center for Economic Research, Peking University, Beijing 100871, China, Health Inurance and Social Welfare Run Liang China Center for Economic Reearch, Peking Univerity, Beijing 100871, China, Email: rliang@ccer.edu.cn and Hao Wang China Center for Economic Reearch, Peking

More information

Auction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile Cloud Computing

Auction Mechanisms Toward Efficient Resource Sharing for Cloudlets in Mobile Cloud Computing 1 Auction Mechanim Toward Efficient Reource Sharing for Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Ping Wang, Duit Niyato, and Peijian Ju Abtract Mobile cloud computing offer an appealing

More information

Towards Control-Relevant Forecasting in Supply Chain Management

Towards Control-Relevant Forecasting in Supply Chain Management 25 American Control Conference June 8-1, 25. Portland, OR, USA WeA7.1 Toward Control-Relevant Forecating in Supply Chain Management Jay D. Schwartz, Daniel E. Rivera 1, and Karl G. Kempf Control Sytem

More information

12.4 Problems. Excerpt from "Introduction to Geometry" 2014 AoPS Inc. Copyrighted Material CHAPTER 12. CIRCLES AND ANGLES

12.4 Problems. Excerpt from Introduction to Geometry 2014 AoPS Inc.  Copyrighted Material CHAPTER 12. CIRCLES AND ANGLES HTER 1. IRLES N NGLES Excerpt from "Introduction to Geometry" 014 os Inc. onider the circle with diameter O. all thi circle. Why mut hit O in at leat two di erent point? (b) Why i it impoible for to hit

More information

TRADING rules are widely used in financial market as

TRADING rules are widely used in financial market as Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a

More information

Design of Compound Hyperchaotic System with Application in Secure Data Transmission Systems

Design of Compound Hyperchaotic System with Application in Secure Data Transmission Systems Deign of Compound Hyperchaotic Sytem with Application in Secure Data Tranmiion Sytem D. Chantov Key Word. Lyapunov exponent; hyperchaotic ytem; chaotic ynchronization; chaotic witching. Abtract. In thi

More information

Performance Evaluation of Multiple IEEE 802.11b WLAN Stations in the Presence of Bluetooth Radio Interference

Performance Evaluation of Multiple IEEE 802.11b WLAN Stations in the Presence of Bluetooth Radio Interference Performance Evaluation of Multiple IEEE 802.11b WLAN Station in the Preence of Bluetooth Radio Interference Jung-Hyuck Jo and Nikil Jayant Georgia ech Broadband Intitute, Georgia Intitute of echnology,

More information

Algorithms for Advance Bandwidth Reservation in Media Production Networks

Algorithms for Advance Bandwidth Reservation in Media Production Networks Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton

More information

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted

More information

Bundled Discounts: Strategic Substitutes or Complements?

Bundled Discounts: Strategic Substitutes or Complements? Bundled Dicount: Strategic Subtitute or Complement? Duarte Brito y Univeridade Nova de Liboa and CEFGE-UE Helder Vaconcelo z Faculdade de Economia, Univeridade do Porto, CEF.UP and CEPR June 2, 24 btract

More information

Review of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015

Review of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015 Review of Multiple Regreion Richard William, Univerity of Notre Dame, http://www3.nd.edu/~rwilliam/ Lat revied January 13, 015 Aumption about prior nowledge. Thi handout attempt to ummarize and yntheize

More information

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring Redeigning Rating: Aeing the Dicriminatory Power of Credit Score under Cenoring Holger Kraft, Gerald Kroiandt, Marlene Müller Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Thi verion: June

More information

INTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS

INTERACTIVE TOOL FOR ANALYSIS OF TIME-DELAY SYSTEMS WITH DEAD-TIME COMPENSATORS INTERACTIVE TOOL FOR ANALYSIS OF TIMEDELAY SYSTEMS WITH DEADTIME COMPENSATORS Joé Lui Guzmán, Pedro García, Tore Hägglund, Sebatián Dormido, Pedro Alberto, Manuel Berenguel Dep. de Lenguaje y Computación,

More information

A Life Contingency Approach for Physical Assets: Create Volatility to Create Value

A Life Contingency Approach for Physical Assets: Create Volatility to Create Value A Life Contingency Approach for Phyical Aet: Create Volatility to Create Value homa Emil Wendling 2011 Enterprie Rik Management Sympoium Society of Actuarie March 14-16, 2011 Copyright 2011 by the Society

More information

MSc Financial Economics: International Finance. Bubbles in the Foreign Exchange Market. Anne Sibert. Revised Spring 2013. Contents

MSc Financial Economics: International Finance. Bubbles in the Foreign Exchange Market. Anne Sibert. Revised Spring 2013. Contents MSc Financial Economic: International Finance Bubble in the Foreign Exchange Market Anne Sibert Revied Spring 203 Content Introduction................................................. 2 The Mone Market.............................................

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing

Auction-Based Resource Allocation for Sharing Cloudlets in Mobile Cloud Computing 1 Auction-Baed Reource Allocation for Sharing Cloudlet in Mobile Cloud Computing A-Long Jin, Wei Song, Senior Member, IEEE, and Weihua Zhuang, Fellow, IEEE Abtract Driven by pervaive mobile device and

More information

v = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t

v = x t = x 2 x 1 t 2 t 1 The average speed of the particle is absolute value of the average velocity and is given Distance travelled t Chapter 2 Motion in One Dimenion 2.1 The Important Stuff 2.1.1 Poition, Time and Diplacement We begin our tudy of motion by conidering object which are very mall in comparion to the ize of their movement

More information

Politicians, Taxes and Debt

Politicians, Taxes and Debt Review of Economic Studie 00) 77, 806 840 0034-657/0/0040$0.00 doi: 0./j.467-937X.009.00584.x Politician, Taxe and Debt PIERRE YARED Columbia Univerity Firt verion received January 008; final verion accepted

More information

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Journal of Information Technology Management ISSN #1042-1319 A Publication of the Aociation of Management THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE LI-CHIOU

More information

Project Management Basics

Project Management Basics Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management

More information

A New Optimum Jitter Protection for Conversational VoIP

A New Optimum Jitter Protection for Conversational VoIP Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill

More information

LECTURE 2. TURÁN S THEOREM : BIPARTITE GRAPHS

LECTURE 2. TURÁN S THEOREM : BIPARTITE GRAPHS LECTURE 2. TURÁN S THEOREM : BIPARTITE GRAPHS. Complete bipartite graph.. Kövari-Só-Turán theorem. When H i a bipartite graph, i.e., when χ(h) = 2, Erdő and Stone theorem aert that π H = 0. In other word,

More information

Graph Analyi I Network Meaure of the Networked Adaptive Agents

Graph Analyi I Network Meaure of the Networked Adaptive Agents Uing Graph Analyi to Study Network of Adaptive Agent Sherief Abdallah Britih Univerity in Dubai, United Arab Emirate Univerity of Edinburgh, United Kingdom hario@ieee.org ABSTRACT Experimental analyi of

More information

MECH 2110 - Statics & Dynamics

MECH 2110 - Statics & Dynamics Chapter D Problem 3 Solution 1/7/8 1:8 PM MECH 11 - Static & Dynamic Chapter D Problem 3 Solution Page 7, Engineering Mechanic - Dynamic, 4th Edition, Meriam and Kraige Given: Particle moving along a traight

More information

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy

More information

Digital Communication Systems

Digital Communication Systems Digital Communication Sytem The term digital communication cover a broad area of communication technique, including digital tranmiion and digital radio. Digital tranmiion, i the tranmitted of digital pule

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto

More information

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1. International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.

More information

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science aachuett Intitute of Technology Department of Electrical Engineering and Computer Science 6.685 Electric achinery Cla Note 10: Induction achine Control and Simulation c 2003 Jame L. Kirtley Jr. 1 Introduction

More information

Software Engineering Management: strategic choices in a new decade

Software Engineering Management: strategic choices in a new decade Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk

More information

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development

More information

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li-Chiou Chen Department of Information Sytem School of Computer Science and Information Sytem Pace Univerity

More information

Multi-Objective Optimization for Sponsored Search

Multi-Objective Optimization for Sponsored Search Multi-Objective Optimization for Sponored Search Yilei Wang 1,*, Bingzheng Wei 2, Jun Yan 2, Zheng Chen 2, Qiao Du 2,3 1 Yuanpei College Peking Univerity Beijing, China, 100871 (+86)15120078719 wangyileipku@gmail.com

More information

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data.

Support Vector Machine Based Electricity Price Forecasting For Electricity Markets utilising Projected Assessment of System Adequacy Data. The Sixth International Power Engineering Conference (IPEC23, 27-29 November 23, Singapore Support Vector Machine Baed Electricity Price Forecating For Electricity Maret utiliing Projected Aement of Sytem

More information

MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) *

MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * MANAGING DATA REPLICATION IN MOBILE AD- HOC NETWORK DATABASES (Invited Paper) * Praanna Padmanabhan School of Computer Science The Univerity of Oklahoma Norman OK, USA praannap@yahoo-inc.com Dr. Le Gruenwald

More information

Simulation of Power Systems Dynamics using Dynamic Phasor Models. Power Systems Laboratory. ETH Zürich Switzerland

Simulation of Power Systems Dynamics using Dynamic Phasor Models. Power Systems Laboratory. ETH Zürich Switzerland X SEPOPE 2 a 25 de maio de 26 May 2 rt to 25 th 26 FLORIANÓPOLIS (SC) BRASIL X SIMPÓSIO DE ESPECIALISTAS EM PLANEJAMENTO DA OPERAÇÃO E EXPANSÃO ELÉTRICA X SYMPOSIUM OF SPECIALISTS IN ELECTRIC OPERATIONAL

More information

d t Thus, L R ECS 152A Computer Networks Fall 2002 HW 7 Solutions

d t Thus, L R ECS 152A Computer Networks Fall 2002 HW 7 Solutions ECS 52A Computer Network Fall 2002 HW 7 Solution. (5 pt) Conider four tation that are attached to two different bu cable. The tation exchange fixed-ize packet of length ec. Time i divided into lot of ec.

More information

Performance Evaluation and Delay Modelling of VoIP Traffic over 802.11 Wireless Mesh Network

Performance Evaluation and Delay Modelling of VoIP Traffic over 802.11 Wireless Mesh Network International Journal of Computer Application (975 8887) Volume 1 No.9, May 11 Performance Evaluation and Delay Modelling of VoIP Traffic over 8.11 Wirele Meh Network Amit Chhabra Dept. of CSE SDDIET,

More information

Computing Location from Ambient FM Radio Signals

Computing Location from Ambient FM Radio Signals Computing Location from Ambient FM Radio Signal Adel Youef Department of Computer Science Univerity of Maryland A.V. William Building College Park, MD 20742 adel@c.umd.edu John Krumm, Ed Miller, Gerry

More information

POSSIBILITIES OF INDIVIDUAL CLAIM RESERVE RISK MODELING

POSSIBILITIES OF INDIVIDUAL CLAIM RESERVE RISK MODELING POSSIBILITIES OF INDIVIDUAL CLAIM RESERVE RISK MODELING Pavel Zimmermann * 1. Introduction A ignificant increae in demand for inurance and financial rik quantification ha occurred recently due to the fact

More information

In this paper, we investigate toll setting as a policy tool to regulate the use of roads for dangerous goods

In this paper, we investigate toll setting as a policy tool to regulate the use of roads for dangerous goods Vol. 43, No. 2, May 2009, pp. 228 243 in 0041-1655 ein 1526-5447 09 4302 0228 inform doi 10.1287/trc.1080.0236 2009 INFORMS Toll Policie for Mitigating Hazardou Material Tranport Rik Patrice Marcotte,

More information

1 Looking in the wrong place for healthcare improvements: A system dynamics study of an accident and emergency department

1 Looking in the wrong place for healthcare improvements: A system dynamics study of an accident and emergency department 1 Looking in the wrong place for healthcare improvement: A ytem dynamic tudy of an accident and emergency department DC Lane, C Monefeldt and JV Roenhead - The London School of Economic and Political Science

More information

EVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN

EVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 4, April 2012 pp. 2563 2581 EVALUATING SERVICE QUALITY OF MOBILE APPLICATION

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

A Duality Model of TCP and Queue Management Algorithms

A Duality Model of TCP and Queue Management Algorithms A Duality Model of TCP and Queue Management Algorithm Steven H. Low CS and EE Department California Intitute of Technology Paadena, CA 95 low@caltech.edu May 4, Abtract We propoe a duality model of end-to-end

More information

Maximizing Acceptance Probability for Active Friending in Online Social Networks

Maximizing Acceptance Probability for Active Friending in Online Social Networks Maximizing for Active Friending in Online Social Network De-Nian Yang, Hui-Ju Hung, Wang-Chien Lee, Wei Chen Academia Sinica, Taipei, Taiwan The Pennylvania State Univerity, State College, Pennylvania,

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

Analysis of Mesostructure Unit Cells Comprised of Octet-truss Structures

Analysis of Mesostructure Unit Cells Comprised of Octet-truss Structures Analyi of Meotructure Unit Cell Compried of Octet-tru Structure Scott R. Johnton *, Marque Reed *, Hongqing V. Wang, and David W. Roen * * The George W. Woodruff School of Mechanical Engineering, Georgia

More information

Free Enterprise, the Economy and Monetary Policy

Free Enterprise, the Economy and Monetary Policy Free Enterprie, the Economy and Monetary Policy free (fre) adj. not cont Free enterprie i the freedom of individual and buinee to power of another; at regulation. It enable individual and buinee to create,

More information

Planning of Capacity and Inventory in a Manufacturing Supply Chain: Under Uncertain Demand. Acknowledgements. Outline

Planning of Capacity and Inventory in a Manufacturing Supply Chain: Under Uncertain Demand. Acknowledgements. Outline Planning of Capacity and Inventory in a Manufacturing Supply Chain: Under Uncertain Demand B. Dominguez Balletero,, C. Luca, G. Mitra,, C. Poojari Acknowledgement European Project SCHUMANN: Supply Chain

More information

Morningstar Fixed Income Style Box TM Methodology

Morningstar Fixed Income Style Box TM Methodology Morningtar Fixed Income Style Box TM Methodology Morningtar Methodology Paper Augut 3, 00 00 Morningtar, Inc. All right reerved. The information in thi document i the property of Morningtar, Inc. Reproduction

More information

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing

More information

Mobility Improves Coverage of Sensor Networks

Mobility Improves Coverage of Sensor Networks Mobility Improve Coverage of Senor Networ Benyuan Liu Dept. of Computer Science Univerity of Maachuett-Lowell Lowell, MA 1854 Peter Bra Dept. of Computer Science City College of New Yor New Yor, NY 131

More information

Stochasticity in Transcriptional Regulation: Origins, Consequences, and Mathematical Representations

Stochasticity in Transcriptional Regulation: Origins, Consequences, and Mathematical Representations 36 Biophyical Journal Volume 8 December 200 36 336 Stochaticity in Trancriptional Regulation: Origin, Conequence, and Mathematical Repreentation Thoma B. Kepler* and Timothy C. Elton *Santa Fe Intitute,

More information