Multiple-relay selection in amplify-and-forward cooperative wireless networks with multiple source nodes

Size: px
Start display at page:

Download "Multiple-relay selection in amplify-and-forward cooperative wireless networks with multiple source nodes"

Transcription

1 Wu et al. EURASIP Journal on Wireless Counications and Networing 202, 202:256 RESEARCH Open Access Multiple-relay selection in aplify-and-forward cooperative wireless networs with ultiple source nodes Jinsong Wu *, Yiin D Zhang 2*, Moeness G Ain 2 and Murat Uysal 3 Abstract In this article, we propose ultiple-relay selection schees for ultiple source nodes in aplify-and-forward wireless relay networs based on the su capacity axiization criterion. Both optial and sub-optial relay selection criteria are discussed, considering that sub-optial approaches deonstrate advantages in reduced coputational coplexity. Using sei-definite prograing convex optiization, we present coputationally efficient algoriths for ultiple-source ultiple-relay selection MSMRS with both fixed nuber and varied nuber of relays. Finally, nuerical results are provided to illustrate the coparisons between different relay selection criteria. It is deonstrated that optial varied nuber MSMRS outperfors optial fixed nuber MSMRS under the sae power constraints. Introduction Multihop relaying has eerged as a proising approach to achieve high-rate coverage in wireless counications [,2]. Several aplify-and-forward AF and decode-andforward DF relaying techniques have been introduced such as in [2,3]. Following those pioneer wors, a nuber of cooperative diversity schees have been proposed, including, for exaple, distributed space-tie coding [3-5], adaptive power control for relay networs or relay beaforing [6-9], and relay selection [0-9]. The objective of relay selection is to achieve higher throughput or lower error probability through choosing one or ore relays for transission according to channel conditions. In coparison to relay beaforing, relay selection is attractive due to its deployent of sipler signaling schee and energy saving. Most currently available relay selection approaches assue only a single source node [0-2,4-8], and can be classified into two categories:. A ajority of relay selection rules are restrictive in the sense that they either always use all the available *Correspondence: [email protected]; [email protected] Bell Laboratories, Alcatel-Lucent, Shanghai 20206, P.R. China 2 Center for Advanced Counications, Villanova University, Villanova, PA 9085, USA Full list of author inforation is available at the end of the article relays or always use just a single relay, such as in [0-8,20-29]. In [2], four siple relay selection criteria are described: Two criteria are based on the selection of a single relay according to ean channel gains, while the other two select all available relays. Selecting all available relays are the siplest approach with ultiple relays, and this approach ay not be allowed when the su power liit is less than the suation of the power values of all available relays. A single-relay node is selected based on average channel state inforation CSI, e.g., distance or path loss [20,22,30], and on the instantaneous fading states of the various lins such as in [23]. 2. Multiple-relay selection for a single source has attracted attention as well [3-33]. Jing and Jafarhani proposed sub-optial two-step optiization approaches for single-source ultiple-relay selection in [3,33]: In the first step, phase rotation is perfored at each relay, and thus only power allocation is considered due to signal-to-noise ratio SNR consisting of a suation of purely real ters. In the second step, several sub-optial ethods were introduced [3,33]: a By introducing the idea of relay ordering, several schees with linear coplexity were proposed; 202 Wu et al.; licensee Springer. This is an Open Access article distributed under the ters of the Creative Coons Attribution License which perits unrestricted use, distribution, and reproduction in any ediu, provided the original wor is properly cited.

2 Wu et al. EURASIP Journal on Wireless Counications and Networing 202, 202:256 Page 2 of 3 b Based on recursion, a schee with quadratic coplexity was proposed. Although both single- and ultiple-relay selection approaches for a single source node networ have been investigated, relay selection approaches for ultiple source nodes are rarely addressed in literature. Only the following three existing publications [34-36] have discussed ultiple-source relay selection MSRS approaches. Elzbieta and Raviraj have proposed MSRS for DF relay networs [34]. Xu et al. have presented MSRS approaches in which only a single source is considered as the desired user over each selected relay per transission while other sources or users are considered as interferers during the transission [35]. Guo et al. have analyzed MSRS for opportunistic relays, in other words, only a single source is transitted over each selected relay per transission [36]. Further, there have been several recent research wors on two-way relay selections [37-40]. In this article, we consider AF relay-based cooperative counication systes for siultaneous ultiple-source transission over each selected relay, and ore than one relay is allowed per ultiple-source transission. Each relay is assued to satisfy practical individual short-ter power constraints, that is, each relay has two power levels: zero and its axiu power. This assuption has been used for single-source ultiple-relay selection in, for exaple, [3,33]. The ain contributions of this article can be listed as:. Based on the su capacity criteria, we derive and propose several ultiple-relay selection techniques in AF relay networs with ultiple source nodes. 2. Using sei-definite prograing optiization, we propose coputationally efficient algoriths for ultiple-source ultiple-relay selection MSMRS in the presence of both fixed nuber and varied nuber of relays. The following notations are used: T denotes atrix transpose, conjugate, H atrix conjugate transpose, Hardard product operator, [A] a,b the a, bth entry eleent of atrix A, tr atrix trace operation, Re real part of the object atrix or variable, I iaginary part of the object atrix or variable, E α expectation over rando variable or rando variable set α, diaga denotes a square atrix with all-zeros entries except the ain diagonal filled with the entries of the vector a, φ denotes epty set, and X 0 denotes that X is a positive sei-definite atrix. Syste odel and proble forulation Consider a wireless relay networ with M source nodes transitters, K relay nodes, and one destination node receiver. Each node is equipped with a single antenna. Assue no direct channel path between the source nodes and the destination node. The source nodes and the relay nodes are assued to share the sae transission channel. Based on two-phase half-duplex AF relay assuption, we consider a ultiple-source AF relay selection approach. The period of one two-phase AF relay procedure is defined as one tie channel use. During the tth tie channel use, the two-phase AF protocol is perfored as follows:. In the first phase, the th source node transitter sends source inforation sybol x t using power P S to the relay nodes, where =,..., M, x t E 2 =. the inforation sybols x t, =,..., M, are selected randoly fro M independent codeboos. It is assued that M source nodes siultaneously send uncorrelated signal streas x t, =,..., M, and the corresponding channel sybols are received at relay at the sae tie. 2. Inthesecondphase,L relays with indices,..., L are selected according to soe criteria, which will be elaborated later. Here, L, L K, is an integer, which is referred to as relay selection order inthis article. Then, the i th relay, i =,..., L,scalesits received signal power to unity, and, using power i, aplifies and forwards it to the receiver. Note that, in this two-phase AF protocol, ultiple source nodes share the sae channels. The transission and reception aong the source nodes, the relay nodes and the destination node are assued to be perfectly synchronized. In the tth tie channel use, the channel fro the th source node transitter to the th relay is denoted as and the channel fro the th relay to the receiver is denoted as g t. The channels are odeled as frequency non-selective Rayleigh fading, and are assued to independently vary over different tie channel uses. Denote v t as the noise coponent at the th relay, =,..., K, and denote w t as the noise coponent at the destination node, where v t and w t are assued to be independently and identically distributed i.i.d. coplex Gaussian rando variables with zero ean and unit variance. During the tth tie channel use, the received signal at the th relay is h,t r t = M = P S h,t xt + v t.

3 Wu et al. EURASIP Journal on Wireless Counications and Networing 202, 202:256 Page 3 of 3 The corresponding scaling factor for the th relay is given by β t = M = P S h,t During the tth tie channel use, the received signal at destination is then obtained as y t = K = + = K = α t α t g t βt rt M g t βt = + w t P S h,t x K = α t s t g t βt vt + w t, q t where α t is the relay selection factor, whose value is equal to 0 or, depending upon different relay selection algoriths. In this article, we choose su capacity per tie channel use as the perforance easure for relay selection [4-43]. The syste su capacity is given by C t = 2 log ρ t, 4 where ρ t is the overall syste effective SNR, and obtained in our case as ρ t = E x t,v t,wt s t q t 2 = E s t 2 x t E v t,wt q t 2. 5 In the above, E x t s t 2 and E v t q t 2 are,wt given by E x t s t 2 = M K P S = = α t gt βt h,t 2 6 and q E t 2 v t =,wt K = Inserting 6 and 7 into 5, we have ρ t = M = P S K = K = α t gt βt α t gt βt h,t α t gt βt Relay selection could be expressed using set partition. Define relay index set =,..., K. There exist L distinct relay indices,..., L, where,..., L K, such that the following hold: α t = 0, /,..., L, K and α t = = =. The optiization proble can be now forulated as arg ax C t. Since log a, a >, is α t L a onotonous function, the proble is equivalent to arg ax ρ t. Relay selection can be ipleented at the destination node receiver. In this case, the receiver is assued to now all instantaneous channel state inforation for source-relay paths and relay-destination paths, which ay be obtained through channel estiation. After one relay selection algorith is perfored at the destination node, α t = = α t L are obtained, and then the destination node feedbacs one-digit relay selection inforation to each relay node. The superscripts t used in this section will be oitted in the rest of the article to siplify the notations whenever no abiguity arises. Fixed nuber ultiple-source ultiple-relay selection When individual relay power constraints are equal or close,thenuberofrelaysaybeusedasaconstraint to stand for su relay power constraints. In this section, for siultaneous transission of ultiple source signals, thenuberofrelaystobeselectedisassuedtobea fixed nuber L, wherel >. This class of approaches are referred to as fixed nuber ultiple-source ultiplerelay selection FN-MSMRS, and the corresponding set partition of relay indices for relay selection can be defined as F M = L >, L is a fixed positive integer. 7 8

4 Wu et al. EURASIP Journal on Wireless Counications and Networing 202, 202:256 Page 4 of 3 Optial FN-MSMRS Using 8 and the values of α t, the output SNR of optial FN-MSMRS OFN-MSMRS can be derived as ρ = M = P S L d= L d= d g d β d h d d g d 2 βd 2 Thus, the proposed selection criterion is arg ax ρ. 0 F M Fixed nuber MSMRS based on sei-definite prograing optiization The coplexity of OFN-MSMRS ay be prohibitive particularly when the diension of the proble becoes larger. Closed-for optiization solutions are unfortunately not possible for 0 due to the involveent of ultiple sources. Based on sei-definite prograing [44], we propose an efficient approach for FN-MSMRS. First, note that 8 can be written in a atrix for as ρ = pt P /2 A s P /2 p p T P /2 A n P /2 p +, where p = [α,..., α K ] T, P = diag M T = P S a s = a s a s,..., PR, A s =, A n = diag a n a n, [ ] β h g,..., β K h K T g K,anda n = [ β g,..., β K g K ] T. Further, note that p is a real integer vector with 0, entries, A s is a Heritian atrix, and A n is a real-valued atrix. It can be readily checed fro 6 that I E x s 2 = I p T P /2 A s P /2 p = 0. Thus, can be further siplified in a real-valued atrix for as ρ = pt P /2 Re A s P /2 p p T P /2 A n P /2 p +. 2 K atrix M of size K K, the following relationship always holds, where p T Mp = c T Mc, 4 c = [, c T ] T, 5 and atrix M is related to M by a function f defined as M = f M = [ K T M K K T ] M. 6 4 M K M Now can be re-written as ρ = ct Sc c T Nc +, 7 where S = f P /2 Re A s P /2 and N = f P /2 A n P /2. The optiization proble can be now forulated as axiize ρ, subject to ρ = c T f I K c = L, ct Sc c T Nc +, c T G c =, =,..., K, 8a 8b 8c 8d where G, =,..., K, are all-zero atrices except [G ], =, =,..., K. The fixed relay selection order is quantified in 8c. Note that, it is necessary to include individual relay selection factor constraints, such as 8d, which are actually related to individual relay power constraints, otherwise individual relay selection factors can be arbitrary in the optiization process. Only using vector p, it is hard to quantify individual relay selection factor constraints. However, based on the vector transforation in 3 and 5, individual relay selection factor constraints can be advantageously written as the for shown in 8d. Denote B = cc T.Notethatc T Xc = tr Xcc T = tr XB. Thus, the optiization proble 8 now becoes axiize ρ, 9a Denote c = 2p K, 3 where c is an integer vector with, entries, and K is an all-one colun vector of length K. For an arbitrary subject to: ρ = tr SB tr NB +, tr f I K B = L, 9b 9c

5 Wu et al. EURASIP Journal on Wireless Counications and Networing 202, 202:256 Page 5 of 3 tr G B =, =,..., K, ran B =, 9d 9e Through reoving ran constraint 9e, the proble 9 is now relaxed to axiize tr SW, 26a B 0. 9f The optiization proble is not convex due to ran constraint 9e and fractional constraint 9b. We can perfor sei-definite relaxation through reoving ran constraint 9e [45]. Choosing a positive variable u, trsb where trnb+ u, the above optiization proble can be written as axiize u, 20a subject to tr S un B, u tr f I K B = L, tr G B =, =,..., K, 20b 20c 20d B 0. 20e The optiization proble 20 is still non-convex. However, using the bisection Algorith as shown in Appendix, with the aids of convex prograing tools, such as CVX [46,47] which we have used in the siulations, the proble 20 can be solved iteratively, since it is quasi-convex in each loop within the bisection Algorith, where u acts as a constant. This proble 20 can now be efficiently solved by standard interior point algoriths based on sei-definite prograing SDP [48]. Denote theoptialestiationofb through the proposed bisection Algorith as B. The above SDP procedure requires bisection Algorith, which ight introduce higher coplexity when the nuber of iterative loops is high for convergence. Now we ay consider another approach without the requireent of an bisection algorith. Denote U = N + L f I K. 2 Using 20c, we have tr UB = tr NB Denote w = λc, 23 where λ>0ischosentoaesure w T Uw =. 24 Denote W = ww T,andthus ρ = tr SB tr SW = tr UB tr UW. 25 subject to tr UW =, tr f I K W = Lλ, tr G W = λ, =,..., K, D 0, 26b 26c 26d 26e λ 0. 26f The proble 26 now could be solved using seidefinite prograing without the requireent of a bisection algorith. Note that the above ethod could be considered as the extension of Charnes Cooper algorith [49] fro linear fractional prograing to linear quadratic prograing. Note that the above solutions are obtained through reoving the ran- constraint 9e, which ay lead to an increased proble diension. Thus it is required to convert the sei-definite relaxation solution to soe Boolean solution. In [45,50,5], a randoization ethod has been introduced to achieve this conversion. Note that in those wors, the randoization approach is ipleented without additional constraint. Here, we extend such randoization approach to support extra constraints, such as 20c. Based on the randoization procedure as proposed in the Appendix, the decision of c, ĉ,can be obtained, where ĉ = [ ] T [ĉ],2,..., [ĉ],k+ and [ĉ], is the th entry of ĉ. It should be noted that Steps 9 and 0 of Algorith 2 are introduced to satisfy constraint 20c. In [45,50,5], only c = sign V T u is used in the randoization process. However, it has been further proved that ±sign c = sign V T u holds with probability in Property 2 of [45] a. Thus it ay be eaningful to perfor both + and of sign operations in the randoization process as we have proposed in Steps 9 and 0 of Algorith 2. The above proposed MSMRS based on sei-definite prograing is tered as SDPFN-MSMRS:. In the case of solving Proble 20 and using randoization procedure Algorith 2: SDPFN-MSMRS B, 2. In the case of solving Proble 20 and using randoization procedure Algorith 2 without step 0: SDPFN-MSMRS A, 3. In the case of solving Proble 26 and using randoization procedure Algorith 2: SDPFN-MSMRS B2,

6 Wu et al. EURASIP Journal on Wireless Counications and Networing 202, 202:256 Page 6 of 3 4. In the case of solving Proble 26 and using randoization procedure Algorith 2 without step 0: SDPFN-MSMRS A2. Note that both the solutions of SDPFN-MSMRS B and SDPFN-MSMRS A require bisection algoriths to solve SDP probles iteratively, while both the solutions of SDPFN-MSMRS B2 and SDPFN-MSMRS A2 do not. Best worse FN-MSMRS and rando FN-MSMRS Note that 9 cannot be further siplified without additional approxiations. Intuitively, it can be questioned whether best-worse single source single-relay selection [33] can be extended to this case. To address this concern, calculate all M a = in = P S h a 2, ga 2 2 βa, where =,..., K. Then,perutatea in descending order such that a σ a σk,whereσ denotes the perutation function. This yields σ,..., σl, and such a selection criterion is tered as best worse FN MSMRS BWFN-MSMRS. For coparison purpose, we also define rando fixed nuber MSMRS RANDFN-MSMRS, which randoly selects L relays, as a baseline benchar FN-MSMRS schee. Varied nuber ultiple-source ultiple-relay selection MSMRS When individual relay power constraints are diverse, su powerconstraintscannolongerbedescribedusingafixed nuber of relays. Unlie the previous section, we assue in this section that the nuber of relays to be selected is not predeterined but rather a varied nuber which is optiized depending on both individual and su relay power constraints. This class of proposed approaches are abbreviated as VN-MSMRS, and the corresponding set partition of relay indices for relay selection can be defined as V M = L K, L is a integer variable, L. P Su a= a For coparison purpose, a baseline benchar VN- MSMRS schee using predeterined relay selection, PVN-MSMRS, is also defined. In this schee, a feasible relay selection is chosen, assuing that this selection satisfies given relay power constraints, and no ore relays can be added, otherwise the given su power constraint is violated. Optial VN-MSMRS OVN-MSMRS For VN-MSMRS, the overall effective syste SNR is still given by 9. However, L is no longer a fixed nuber but a variable to be chosen fro a set L,..., K. The proposed optial selection criterion, OVN-MSMRS, becoes arg ax ρ. 27 V M Varied nuber MSMRS based on sei-definite prograing optiization For VN-MSMRS, the forulation of optiization proble is the sae as 8 except that 8c is replaced by a su power constraint c T f P c P Su. 28 The corresponding sei-definite relaxation forulation is written as axiize u, 29a subject to tr S un B, u tr f P B P Su, tr G B =, =,..., K, 29b 29c 29d B 0 29e The optiization proble 29 can be solved using the bisection procedure siilar to the proposed Algorith as depicted in Appendix. The difference is that Step 4 of the bisection procedure for VN-MSMRS is changed into solve the SDP optiization proble 29. To obtain the estiation of c, ĉ, the randoization procedure Algorith 3 for VN-MSMRS is proposed in Appendix. The above proposed MSMRS based on sei-definite prograing is defined as SDPVN-MSMRS: the SDPVN- MSMRS using randoization procedure Algorith 3 is tered as SDPVN-MSMRS B, while the SDPVN-MSMRS using randoization procedure Algorith 3 without steps 9 and 0 is called as SDPVN-MSMRS A. Nuerical results In this section, we present the perforance of the su capacity per tie channel use for the relay selection approaches under considerations. In all figures, the horizontal axis indicates unit power P, and, =,..., K, and P S, =..., M, are scaled values of P. In this section,thenuberofsourcesissettom = 2. We further assue that channels h,t and g t, =,..., M and =,..., K, are Rayleigh fading channel gains odeled as coplex Gaussian with zero ean and unit variance, and

7 Wu et al. EURASIP Journal on Wireless Counications and Networing 202, 202:256 Page 7 of 3 they change independently over different tie channel uses. FN-MSMRS results In Figures and 2, we assue K = 8, L = 4, = PM, =,..., K, and P S = P, =,..., M. The settings of randoization procedure in SDPFN- MSMRS A, SDPFN-MSMRS A2, SDPFN-MSMRS B, and SDPFN-MSMRS B2 are N c = 2andN l = 4. In Figure, we observe that, to achieve the sae average su capacity per tie channel use,. SDPFN-MSMRS A, SDPFN-MSMRS A2, SDPFN-MSMRS B, and SDPFN-MSMRS B2 use less unit power P than BWFN-MSMRS by.6 and.3 db, respectively; 2. BWFN-MSMRS use less unit power P than RANDFN-MSMRS by only 2.2 db; 3. With the advantage of lower coplexity, SDPFN- MSMRS A, SDPFN-MSMRS A2, SDPFN-MSMRS B, and SDPFN-MSMRS B2 require ore unit power P than OFN-MSMRS by 2.2 and 2.5 db, respectively. It is observed that both SDPFN-MSMRS B and SDPFN-MSMRS B2 achieve notably higher average su capacity over both SDPFN-MSMRS A and SDPFN- MSMRS A2 for the sae unit power P. This also verifies the iportance of step 0 of Algorith 2. With very close perforance to SDPFN-MSMRS A and SDPFN-MSMRS B, respectively, SDPFN-MSMRS A2 and SDPFN-MSMRS B2 are quite coputationally effective due to avoiding the needs of additional bisection algoriths. VN-MSMRS results In this section, the settings of randoization procedure in SDPVN-MSMRS B and SDPVNMSMRS A are N c = 2 and N l = 4. In Figures 3 and 4, we assue K = 8, M = 2, P Su = 4PM, = PM, =,..., K, P S = P, =,..., M. Fro Figure 3, we observe that, to achieve the sae average su capacity per tie channel use,. SDPVN-MSMRS B and SDPVN-MSMRS A use less unit power P than PVN-MSMRS by 4.2 and 3.9 db, respectively, 2. With the advantage of lower coplexity, SDPVN-MSMRS B and SDPVN-MSMRS A require ore unit power P than OVN-MSMRS by.4 and.7 db, respectively. 4 Average su capacity per tie channel use bits/hz OFN MSMRS SDPFN MSMRS A with bisection ethod for SDP SDPFN MSMRS B with bisection ethod for SDP SDPFN MSMRS A2 without bisection ethod for SDP SDPFN MSMRS B2 without bisection ethod for SDP BWFN MSMRS RANDFN MSMRS P db Figure Average per tie channel use su capacity versus P for FN-MSMRS, K = 8, M = 2, L = 4, P S = P, =,..., M. = MP, =,..., K,

8 Wu et al. EURASIP Journal on Wireless Counications and Networing 202, 202:256 Page 8 of ProbC >C OFN MSMRS SDPFN MSMRS A with bisection ethod for SDP SDPFN MSMRS B with bisection ethod for SDP SDPFN MSMRS A2 without bisection ethod for SDP SDPFN MSMRS B2 without bisection ethod for SDP BWFN MSMRS RANDFN MSMRS Su capacity per tie channel use bits/hertz Figure 2 Copleentary cuulative distribution function of su capacity per tie channel use at P = 4 db for FN-MSMRS, K = 8, M = 2, L = 4, = MP, =,..., K, P S = P, =,..., M. Average su capacity per tie channel use bits/hz OVN MSMRS SDPVN MSMRS A SDPVN MSMRS B PVN MSMRS P db Figure 3 Average per tie channel use su capacity versus P for VN-MSMRS, K = 8, M = 2, P Su = 4PM, = PM, =,..., K, P S = P, =,..., M.

9 Wu et al. EURASIP Journal on Wireless Counications and Networing 202, 202:256 Page 9 of ProbC > C OVN MSMRS SDPVN MSMRS A SDPVN MSMRS B PVN MSMRS Su capacity per tie channel use bits/hertz Figure 4 Copleentary cuulative distribution function of capacity per tie channel use at P = 4 db for VN-MSMRS, K = 8, M = 2, P Su = 4PM, = PM, =,..., K, P S = P, =,..., M. Unlie in Figures 3 and 4, relay powers in Figures 5 and 6 are not uniforly distributed, and we assue K = 8, M = 2, P Su = 3.62PM, = PM, =, 2, = 0.65PM, = 3, 4, = 0.4PM, = 5,...,8, P S = P, =,..., M. In Figure 5, siilar conclusions can be drawn except for different gains as shown in Figure 3. For exaple, in Figure 5, SDPVN-MSMRS B uses 3.55dB less unit power P than PVN-MSMRS. The Average su capacity per tie channel use bits/hz OVN MSMRS SDPVN MSMRS A SDPVN MSMRS B PVN MSMRS P db Figure 5 Average per tie channel use su capacity versus P for VN-MSMRS, K = 8, M = 2, P Su = 3.62PM, = 0.65PM, = 3, 4, = 0.4PM, = 5,...,8, P S = P, =,..., M. = PM, =, 2,

10 Wu et al. EURASIP Journal on Wireless Counications and Networing 202, 202:256 Page 0 of ProbC > C OVN MSMRS SDPVN MSMRS A SDPVN MSMRS B PVN MSMRS Su capacity per tie channel use bits/hertz Figure 6 Copleentary cuulative distribution function of su capacity per tie channel use at P = 4 db for VN-MSMRS, K = 8, M = 2, P Su = 3.62PM, = PM, =, 2, = 0.65PM, = 3, 4, = 0.4PM, = 5,...,8, P S = P, =,..., M. above results verify the iportance of steps 9 and 0 of Algorith 3. Coparison between OFN-MSMRS and OVN-MSMRS In Figures 7 and 8, we copare OFN-MSMRS with OVN-MSMRS under the sae power constraints, and we assue K = 8, M = 2, P Su = 4PM, = PM, =,..., K, P S = P, =,..., M. Note that, for OFN-MSMRS, P Su = 4PM is equivalent to set L = 4. It is evident that OVN-MSMRS outperfors OFN-MSMRS under the sae power constraints. This Average su capacity per tie channel use bits/hz OFN MSMRS OVN MSMRS P db Figure 7 Average per tie channel use su capacity versus P for OFN-MSMRS and OVN-MSMRS, K = 8, M = 2, P Su = 4PM, = PM, =,..., K, P S = P, =,..., M.

11 Wu et al. EURASIP Journal on Wireless Counications and Networing 202, 202:256 Page of ProbC > C OFN MSMRS OVN MSMRS Su capacity per tie channel use bits/hertz Figure 8 Copleentary cuulative distribution function of su capacity per tie channel use at P = 4 db for OFN-MSMRS and OVN-MSMRS, K = 8, M = 2, P Su = 4PM, = PM, =,..., K, P S = P, =,..., M. iplies that the best selection solution for soe channel realizations ay not necessarily always reach full su power constraints. Note that the coplexity of optial MSMRS significantly increases when K becoes larger. In siulations, we choose a sall nuber of K = 8, for reduced siulation tie. For such low K values, the coplexity advantage for the proposed approaches ay not be that significant. However, with the increase of K, coplexity advantage for proposed approaches in Sections Fixed nuber ultiple-source ultiple-relay selection and Varied nuber ultiple-source ultiple-relay selection will becoe ore pronounced. Conclusion Based on the su capacity axiization criterion, we have proposed a nuber of ultiple-relay selection approaches for siultaneously transitting ultiple source nodes with fixed power relays in an aplifyand-forward cooperative relay networ. We propose coputationally efficient algoriths based on seidefinite prograing for MSMRS with both fixed nuber and varied nuber of relays. We have deonstrated that optial varied nuber MSMRS outperfors fixed nuber MSMRS under the sae su power constraints. Although we have discussed the convex relaxation approaches in this article, as the future research directions, it ay be deserved to investigate other nonconvex-relaxation approaches with better perforance, such as in [52-54]. Endnote a In [45], the authors express sign operation using notation σ instead of sign Appendix Algoriths Algorith Bisection procedure:. Initialize the upper and lower liits of u, u U and u L ; 2. If u U u L <ε, go to step 7, otherwise go to step 3; 3. u := 2 u U + u L ; 4. Perfor the SDP optiization procedure for proble 20; 5. If the optiization proble 20 is infeasible or unbounded, u U := u; else u L := u; B = B; 6. Go to step 2; 7. The optiization procedure ends. Algorith 2 Randoization procedure for FN-MSMRS:. Copute V such that B = V T V,where V = [v,..., v K ]; 2. Set a c = 0, a s = 0,andρ ax = 0; 3. If a s = 0, go to step 3, otherwise go to step 4; 4. If a c N c,

12 Wu et al. EURASIP Journal on Wireless Counications and Networing 202, 202:256 Page 2 of 3 choose ĉ using BWFN-MSMRS such that L entries of ĉ equal to and the rest equal to,thengoto step 3; else go to step 5; 5. Set a l = 0; 6. Choose rando vector u fro the unifor distribution on the unit sphere; 7. Copute c = sign V T u, and thus obtain c as in 5; 8. Copute p = 2 c + ; K 9. If [p], == L, = Copute ρ based on 8b; If ρ>ρ ax, ρ ax = ρ, ĉ = c; a s = ; K 0. If K [p], == L, = Copute c = c,[c], =, and thus obtain c; Copute ρ based on 8b; If ρ>ρ ax, ρ ax = ρ,ĉ = c; a s = ;. a l = a l + ; 2. If a l N l, a c = a c + ; go to 3; else go to 6; 3. The randoization procedure ends. Algorith 3 Randoization procedure for VN-MSMRS:. Copute V such that B = V T V,where V = [v,..., v K ], v is the th colun vector of V; 2. Set a c = 0, a s = 0,andρ ax = 0; 3. If a s = 0, go to step 3, otherwise go to step 4; 4. If a c N c, Choose ĉ using optial ultiple-source single-relay selection such that the su power constraint 28 is satisfied, then go to step 3; else go to step 5; 5. Set a l = 0; 6. Choose rando vector u fro the unifor distribution on the unit sphere; 7. Copute c = sign V T u, and thus obtain c; 8. If the su power constraint 28 is satisfied, Copute ρ based on 8b; If ρ>ρ ax, ρ ax = ρ, ĉ = c; a s = ; 9. Copute c = c, [c], =, and thus obtain c; 0. If the su power constraint 28 is satisfied, Using c,coputeρ based on 8b; If ρ>ρ ax, ρ ax = ρ, ĉ = c; a s = ;. a l = a l + ; 2. if a l N l, a c = a c + ; go to 3; else go to 6; 3. The randoization procedure ends. Copeting interest The authors declare that they have no copeting interests Acnowledgeents The study was perfored when J. Wu was with the Center for Advanced Counications, Villanova University, Villanova, PA 9085, USA Author details Bell Laboratories, Alcatel-Lucent, Shanghai 20206, P.R. China. 2 Center for Advanced Counications, Villanova University, Villanova, PA 9085, USA. 3 Faculty of Engineering, Ozyegin University, 34794, Istanbul, Turey. Received: 28 June 20 Accepted: 3 July 202 Published: 6 August 202 References. A Sendonaris, E Erip, B Aazhang, User cooperation diversity part I: syste description. IEEE Trans. Coun. 5, JN Lanean, DNC Tse, GW Wornell, Cooperative diversity in wireless networs: efficient protocols and outage behavior. IEEE Trans. Inf. Theory. 502, PA Anghel, M Kaveh, On the perforance of distributed space-tie coding systes with one and two non-regenerative relays. IEEE Trans. Wirel. Coun. 53, J Lanean, G Wornell, Distributed space-tie-coded protocols for exploiting cooperative diversity in wireless networs. IEEE Trans. Inf. Theory. 490, Y Jing, B Hassibi, Distributed space-tie coding in wireless relay networs. IEEE Trans. Wirel. Coun. 52, A Rezni, SR Kularni, S Verdu, Degraded Gaussian ultirelay channels: Capacity and optial power allocation. IEEE Trans. Inf. Theory. 502, X Tang, Y Hua, Optial design of non-regenerative MIMO wireless relays. IEEE Trans. Wirel. Coun, N Khajehnouri, AH Sayed, Distributed MMSE relay strategies for wireless sensor networs. IEEE Trans. Signal Process. 55, X Li, Y Zhang, M Ain, Joint optiization of source power allocation and relay beaforing in ultiuser cooperative wireless networs. Mobile Netw. Appl. 65, V Sreng, H Yanioeroglu, DD Falconer, Relayer selection strategies in cellular networs with peer-to-peer relaying. in Proc. IEEE Vehicular Tech. Conf. vol , pp A Ribeiro, X Cai, GB Giannais, Sybol error probabilities for general cooperative lins. IEEE Trans. Wirel. Coun. 4, AK Sade, Z Han, KJR Liu, A distributed relay-assignent algorith for cooperative counications in wireless networs. in Proc. IEEE Int. Conf. Coun. Istanbul, Turey, 2006, pp Y Zhao, R Adve, TJ Li, Sybol error rate of selection aplify-and-forward relay systes. IEEE Coun. Lett. 0, Z Lin, E Erip, A Stefanov, Cooperative regions and partner choice in coded cooperative systes. IEEE Trans. Coun. 54,

13 Wu et al. EURASIP Journal on Wireless Counications and Networing 202, 202:256 Page 3 of 3 5. DS Michalopoulos, GK Karagiannidis, TA Tsiftsis, RK Malli, An optiized user selection ethod for cooperative diversity systes. in Proc. IEEE Globeco San Francisco, CA, USA, R Madan, NB Mehta, AF Molisch, J Zhang, Energy-efficient cooperative relaying over fading channels with siple relay selection. in Proc. IEEE Globeco San Francisco, CA, USA, CK Lo, RWH Jr, S Vishwanath, Hybrid-ARQ in ultihop networs with opportunistic relay selection. in Proc. IEEE Int. Conf. Acoustics, Speech, and Signal Process, vol. 0 Honolulu, Hawaii, USA, 2007, pp Y Zhao, R Adve, TJ Li, Iproving aplify-and-forward relay networs: optial power allocation versus selection. IEEE Trans. Wirel. Coun. 6, B Chalise, L Vandendorpe, Y Zhang, M Ain, Local CSI based selection beaforing for aplify-and-forward MIMO relay networs. IEEE Trans. Signal Process. 605, A Stefanov, E Erip, Cooperative coding for wireless networs. IEEE Trans. Coun. 52, J Luo, RS Blu, LJ Ciini, LJ Greenstein, AM Haiovich, Lin-failure probabilities for practical cooperative relay networs. in Proc. IEEE Veh. Tech. Conf. Spring, vol. 3 Stochol, Sweden, 2005, pp A Stefanov, E Erip, Cooperative space-tie coding for wireless networs. IEEE Trans. Coun. 53, A Bletsas, DP Reed, A Lippan, A siple cooperative diversity ethod based on networ path selection. IEEE J. Sel. Areas Coun. 24, Y Li, B Vucetic, Z Chen, J Yuan, An iproved relay selection schee with hybrid relaying protocols. in Proc. Global Telecoun. Conf. Washington, D.C., USA, 2007, pp CK Lo, S Vishwanath, RW Heath, Relay subset selection in wireless networs using partial decode-and-forward transission. in Proc. Vehicular Tech. Conf. Spring Marina Bay, Singapore, 2008, pp R Madan, N Mehta, A Molisch, J Zhang, Energy-efficient cooperative relaying over fading channels with siple relay selection. IEEE Trans. Wirel. Coun. 78, Y Zhang, Y Xu, Y Cai, Relay selection utilizing power control for decode-and-forward wireless relay networs. in Proc. Int. Conf. on Sig. Proc. Coun. Syst. Gold Coast, Australia, 2008, pp DS Michalopoulos, HA Suraweera, GK Karagiannidis, R Schober, Aplify-and-forward relay selection with outdated channel estiates. IEEE Trans. Coun. 605, I Kriidis, T Charalabous, JS Thopson, Buffer-aided relay selection for cooperative diversity systes without delay constraints. IEEE Trans. Wirel. Coun. 5, Z Lin, E Erip, Relay search algoriths for coded cooperative systes. in Proc. IEEE Globeco, vol. 3 St. Louis, Missouri, USA, Y Jing, H Jafarhani, Single and ultiple relay selection schees and their diversity orders. in Proc. IEEE ICC 2008 Worshop on Cooperative Coun. & Networing Beijing, China, 2008, pp B Hegyi, J Levendovszy, Efficient, distributed, ultiple-relay selection procedures for cooperative counications. in Proc. Int. Syposiu Wireless Pervasive Coputing Santorini, Greece, 2008, pp Y Jing, H Jafarhani, Single and ultiple relay selection schees and their diversity orders. IEEE Trans. Wirel. Coun. 83, B Elzbieta, A Raviraj, Selection cooperation in ulti-source cooperative networs. IEEE Trans. Wirel. Coun. 7, J Xu, S Zhou, Z Niu, Interference-aware relay selection for ultiple source-destination cooperative networs. in Proc. 5th Asia-Pacific Conf. on Coun. Shanghai, China, 2009, pp W Guo, J Liu, L Zheng, Y Liu, G Zhang, Perforance analysis of a selection cooperation schee in ulti-source ulti-relay networs. in Proc. Int. Conf. on Wireless Coun. and Signal Processing Nanjing, China, 200, pp L Ding, M Tao, F Yang, W Zhang, Joint scheduling and relay selection in one- and two-way relay networs with buffering. in Proc. IEEE Int. Conf. Coun. Dresden, Gerany, I Kriidis, Relay selection for two-way relay channels with MABC DF: A diversity perspective. IEEE Trans. Veh. Technol. 599, Y Li, RHY Louie, B Vucetic, Relay selection with networ coding in two-way relay channels. IEEE Trans. Veh. Technol. 599, S Talwar, Y Jing, S Shahbazpanahi, Joint relay selection and power allocation for two-way relay networs. IEEE Signal Process. Lett. 82, L Ozarow, The capacity of the white Gaussian ultiple access channel with feedbac. IEEE Trans. Inf. Theory. 304, B Rioldi, R Urbane, A rate-splitting approach to the Gaussian ultiple-access channel. IEEE Trans. Inf. Theory. 422, V Aggarwal, A Sabharwal, Slotted Gaussian ultiple access channel: Stable throughput region and role of side inforation. EURASIP J. Wirel. Coun. Networ. 2008, L Vandenberghe, S Boyd, Seidefinite prograing. SIAM Rev. 38, WK Ma, TN Davidson, KM Wong, ZQ Luo, PC Ching, Quasi-axiu-lielihood ultiuser detection using sei-definite relaxation with application to synchronous CDMA. IEEE Trans. Signal Process. 50, M Grant, S Boyd, CVX: Matlab software for disciplined convex prograing, version. 2 20, M Grant, S Boyd, Graph ipleentations for nonsooth convex progras. in Recent Advances in Learning and Control, Lecture Notes in Control and Inforation Sciences Springer-Verlag Liited, 2008, pp boyd/graph dcp.htl 48. C Helberg, F Rendl, R Vanderbei, H Wolowicz, An interior point ethod for seidefinite prograing. SIAM J. Optiiz. 62, A Charnes, WW Cooper, Prograing with linear fractional functions. Naval Res. Logist. Quaterly. 9, MX Goeans, DP Williason, Iproved approxiation algoriths for axiu cut and satisfiability proble using sei-definite prograing. J. ACM. 426, YE Nesterov, Quality of seidefinite relaxation for nonconvex quadratic optiization, Tech. Rep., CORE, Universite Catholique de Louvain, Brussels, Belgiu, Y Zhang, G Zheng, C Ji, K Wong, Near-optial joint antenna selection for aplify and forward relay networs. IEEE Trans. Wirel. Coun. 98, J Chen, C Wen, Near-optial relay subset selection for two-way aplify and forward MIMO relaying systes. IEEE Trans. Wirel. Coun. 0, H Par, J Chun, A two-stage antenna subset selection schee for aplify and forward MIMO relay systes. IEEE Signal Process. Lett. 7, doi:0.86/ Cite this article as: Wu et al.: Multiple-relay selection in aplify-and-forward cooperative wireless networs with ultiple source nodes. EURASIP Journal on Wireless Counications and Networing :256. Subit your anuscript to a journal and benefit fro: 7 Convenient online subission 7 Rigorous peer review 7 Iediate publication on acceptance 7 Open access: articles freely available online 7 High visibility within the field 7 Retaining the copyright to your article Subit your next anuscript at 7 springeropen.co

Resource Allocation in Wireless Networks with Multiple Relays

Resource Allocation in Wireless Networks with Multiple Relays Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0

More information

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks

Reliability Constrained Packet-sizing for Linear Multi-hop Wireless Networks Reliability Constrained acket-sizing for inear Multi-hop Wireless Networks Ning Wen, and Randall A. Berry Departent of Electrical Engineering and Coputer Science Northwestern University, Evanston, Illinois

More information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information

Capacity of Multiple-Antenna Systems With Both Receiver and Transmitter Channel State Information IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO., OCTOBER 23 2697 Capacity of Multiple-Antenna Systes With Both Receiver and Transitter Channel State Inforation Sudharan K. Jayaweera, Student Meber,

More information

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In

More information

arxiv:0805.1434v1 [math.pr] 9 May 2008

arxiv:0805.1434v1 [math.pr] 9 May 2008 Degree-distribution stability of scale-free networs Zhenting Hou, Xiangxing Kong, Dinghua Shi,2, and Guanrong Chen 3 School of Matheatics, Central South University, Changsha 40083, China 2 Departent of

More information

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks

Cooperative Caching for Adaptive Bit Rate Streaming in Content Delivery Networks Cooperative Caching for Adaptive Bit Rate Streaing in Content Delivery Networs Phuong Luu Vo Departent of Coputer Science and Engineering, International University - VNUHCM, Vietna [email protected]

More information

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou

More information

2. FINDING A SOLUTION

2. FINDING A SOLUTION The 7 th Balan Conference on Operational Research BACOR 5 Constanta, May 5, Roania OPTIMAL TIME AND SPACE COMPLEXITY ALGORITHM FOR CONSTRUCTION OF ALL BINARY TREES FROM PRE-ORDER AND POST-ORDER TRAVERSALS

More information

Equivalent Tapped Delay Line Channel Responses with Reduced Taps

Equivalent Tapped Delay Line Channel Responses with Reduced Taps Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ

More information

Image restoration for a rectangular poor-pixels detector

Image restoration for a rectangular poor-pixels detector Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2

More information

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters

More information

Searching strategy for multi-target discovery in wireless networks

Searching strategy for multi-target discovery in wireless networks Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,

More information

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network 2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona

More information

Online Bagging and Boosting

Online Bagging and Boosting Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used

More information

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY

CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY CLOSED-LOOP SUPPLY CHAIN NETWORK OPTIMIZATION FOR HONG KONG CARTRIDGE RECYCLING INDUSTRY Y. T. Chen Departent of Industrial and Systes Engineering Hong Kong Polytechnic University, Hong Kong [email protected]

More information

Applying Multiple Neural Networks on Large Scale Data

Applying Multiple Neural Networks on Large Scale Data 0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree

More information

Machine Learning Applications in Grid Computing

Machine Learning Applications in Grid Computing Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA [email protected], [email protected]

More information

An Innovate Dynamic Load Balancing Algorithm Based on Task

An Innovate Dynamic Load Balancing Algorithm Based on Task An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun

More information

Managing Complex Network Operation with Predictive Analytics

Managing Complex Network Operation with Predictive Analytics Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory

More information

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128

ON SELF-ROUTING IN CLOS CONNECTION NETWORKS. BARRY G. DOUGLASS Electrical Engineering Department Texas A&M University College Station, TX 77843-3128 ON SELF-ROUTING IN CLOS CONNECTION NETWORKS BARRY G. DOUGLASS Electrical Engineering Departent Texas A&M University College Station, TX 778-8 A. YAVUZ ORUÇ Electrical Engineering Departent and Institute

More information

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure

RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION. Henrik Kure RECURSIVE DYNAMIC PROGRAMMING: HEURISTIC RULES, BOUNDING AND STATE SPACE REDUCTION Henrik Kure Dina, Danish Inforatics Network In the Agricultural Sciences Royal Veterinary and Agricultural University

More information

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach

An Optimal Task Allocation Model for System Cost Analysis in Heterogeneous Distributed Computing Systems: A Heuristic Approach An Optial Tas Allocation Model for Syste Cost Analysis in Heterogeneous Distributed Coputing Systes: A Heuristic Approach P. K. Yadav Central Building Research Institute, Rooree- 247667, Uttarahand (INDIA)

More information

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA

Audio Engineering Society. Convention Paper. Presented at the 119th Convention 2005 October 7 10 New York, New York USA Audio Engineering Society Convention Paper Presented at the 119th Convention 2005 October 7 10 New York, New York USA This convention paper has been reproduced fro the authors advance anuscript, without

More information

Reconnect 04 Solving Integer Programs with Branch and Bound (and Branch and Cut)

Reconnect 04 Solving Integer Programs with Branch and Bound (and Branch and Cut) Sandia is a ultiprogra laboratory operated by Sandia Corporation, a Lockheed Martin Copany, Reconnect 04 Solving Integer Progras with Branch and Bound (and Branch and Cut) Cynthia Phillips (Sandia National

More information

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed

More information

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS

A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS A CHAOS MODEL OF SUBHARMONIC OSCILLATIONS IN CURRENT MODE PWM BOOST CONVERTERS Isaac Zafrany and Sa BenYaakov Departent of Electrical and Coputer Engineering BenGurion University of the Negev P. O. Box

More information

Factored Models for Probabilistic Modal Logic

Factored Models for Probabilistic Modal Logic Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008 Factored Models for Probabilistic Modal Logic Afsaneh Shirazi and Eyal Air Coputer Science Departent, University of Illinois

More information

Implementation of Active Queue Management in a Combined Input and Output Queued Switch

Implementation of Active Queue Management in a Combined Input and Output Queued Switch pleentation of Active Queue Manageent in a obined nput and Output Queued Switch Bartek Wydrowski and Moshe Zukeran AR Special Research entre for Ultra-Broadband nforation Networks, EEE Departent, The University

More information

Optimal Resource-Constraint Project Scheduling with Overlapping Modes

Optimal Resource-Constraint Project Scheduling with Overlapping Modes Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de

More information

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2 Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,

More information

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent Load balancing over redundant wireless sensor networks based on diffluent Abstract Xikui Gao Yan ai Yun Ju School of Control and Coputer Engineering North China Electric ower University 02206 China Received

More information

Efficient Key Management for Secure Group Communications with Bursty Behavior

Efficient Key Management for Secure Group Communications with Bursty Behavior Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:

More information

Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization

Impact of Processing Costs on Service Chain Placement in Network Functions Virtualization Ipact of Processing Costs on Service Chain Placeent in Network Functions Virtualization Marco Savi, Massio Tornatore, Giacoo Verticale Dipartiento di Elettronica, Inforazione e Bioingegneria, Politecnico

More information

Partitioning Data on Features or Samples in Communication-Efficient Distributed Optimization?

Partitioning Data on Features or Samples in Communication-Efficient Distributed Optimization? Partitioning Data on Features or Saples in Counication-Efficient Distributed Optiization? Chenxin Ma Industrial and Systes Engineering Lehigh University, USA [email protected] Martin Taáč Industrial and

More information

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN

Airline Yield Management with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Airline Yield Manageent with Overbooking, Cancellations, and No-Shows JANAKIRAM SUBRAMANIAN Integral Developent Corporation, 301 University Avenue, Suite 200, Palo Alto, California 94301 SHALER STIDHAM

More information

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS 641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC [email protected] Abstract Custoer relationship

More information

On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes

On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes On Coputing Nearest Neighbors with Applications to Decoding of Binary Linear Codes Alexander May and Ilya Ozerov Horst Görtz Institute for IT-Security Ruhr-University Bochu, Gerany Faculty of Matheatics

More information

Use of extrapolation to forecast the working capital in the mechanical engineering companies

Use of extrapolation to forecast the working capital in the mechanical engineering companies ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance

More information

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State

More information

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:

More information

ASIC Design Project Management Supported by Multi Agent Simulation

ASIC Design Project Management Supported by Multi Agent Simulation ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously

More information

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES Int. J. Appl. Math. Coput. Sci., 2014, Vol. 24, No. 1, 133 149 DOI: 10.2478/acs-2014-0011 AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES PIOTR KULCZYCKI,,

More information

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University

More information

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary

More information

Fuzzy Sets in HR Management

Fuzzy Sets in HR Management Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic [email protected] Jana Talašová Faculty of Science, Palacký Univerzity,

More information

Performance Evaluation of Machine Learning Techniques using Software Cost Drivers

Performance Evaluation of Machine Learning Techniques using Software Cost Drivers Perforance Evaluation of Machine Learning Techniques using Software Cost Drivers Manas Gaur Departent of Coputer Engineering, Delhi Technological University Delhi, India ABSTRACT There is a treendous rise

More information

6. Time (or Space) Series Analysis

6. Time (or Space) Series Analysis ATM 55 otes: Tie Series Analysis - Section 6a Page 8 6. Tie (or Space) Series Analysis In this chapter we will consider soe coon aspects of tie series analysis including autocorrelation, statistical prediction,

More information

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference

More information

Modified Latin Hypercube Sampling Monte Carlo (MLHSMC) Estimation for Average Quality Index

Modified Latin Hypercube Sampling Monte Carlo (MLHSMC) Estimation for Average Quality Index Analog Integrated Circuits and Signal Processing, vol. 9, no., April 999. Abstract Modified Latin Hypercube Sapling Monte Carlo (MLHSMC) Estiation for Average Quality Index Mansour Keraat and Richard Kielbasa

More information

An Approach to Combating Free-riding in Peer-to-Peer Networks

An Approach to Combating Free-riding in Peer-to-Peer Networks An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008

More information

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava

More information

The Virtual Spring Mass System

The Virtual Spring Mass System The Virtual Spring Mass Syste J. S. Freudenberg EECS 6 Ebedded Control Systes Huan Coputer Interaction A force feedbac syste, such as the haptic heel used in the EECS 6 lab, is capable of exhibiting a

More information

Factor Model. Arbitrage Pricing Theory. Systematic Versus Non-Systematic Risk. Intuitive Argument

Factor Model. Arbitrage Pricing Theory. Systematic Versus Non-Systematic Risk. Intuitive Argument Ross [1],[]) presents the aritrage pricing theory. The idea is that the structure of asset returns leads naturally to a odel of risk preia, for otherwise there would exist an opportunity for aritrage profit.

More information

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking

More information

Preference-based Search and Multi-criteria Optimization

Preference-based Search and Multi-criteria Optimization Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne [email protected]

More information

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering

More information

Data Streaming Algorithms for Estimating Entropy of Network Traffic

Data Streaming Algorithms for Estimating Entropy of Network Traffic Data Streaing Algoriths for Estiating Entropy of Network Traffic Ashwin Lall University of Rochester Vyas Sekar Carnegie Mellon University Mitsunori Ogihara University of Rochester Jun (Ji) Xu Georgia

More information

Partitioned Elias-Fano Indexes

Partitioned Elias-Fano Indexes Partitioned Elias-ano Indexes Giuseppe Ottaviano ISTI-CNR, Pisa [email protected] Rossano Venturini Dept. of Coputer Science, University of Pisa [email protected] ABSTRACT The Elias-ano

More information

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries

More information

High Performance Chinese/English Mixed OCR with Character Level Language Identification

High Performance Chinese/English Mixed OCR with Character Level Language Identification 2009 0th International Conference on Docuent Analysis and Recognition High Perforance Chinese/English Mixed OCR with Character Level Language Identification Kai Wang Institute of Machine Intelligence,

More information

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008

SOME APPLICATIONS OF FORECASTING Prof. Thomas B. Fomby Department of Economics Southern Methodist University May 2008 SOME APPLCATONS OF FORECASTNG Prof. Thoas B. Foby Departent of Econoics Southern Methodist University May 8 To deonstrate the usefulness of forecasting ethods this note discusses four applications of forecasting

More information

Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects

Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Lucas Grèze Robert Pellerin Nathalie Perrier Patrice Leclaire February 2011 CIRRELT-2011-11 Bureaux

More information

Method of supply chain optimization in E-commerce

Method of supply chain optimization in E-commerce MPRA Munich Personal RePEc Archive Method of supply chain optiization in E-coerce Petr Suchánek and Robert Bucki Silesian University - School of Business Adinistration, The College of Inforatics and Manageent

More information

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs Send Orders for Reprints to [email protected] 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic

More information

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1 International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi

More information

Software Quality Characteristics Tested For Mobile Application Development

Software Quality Characteristics Tested For Mobile Application Development Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology

More information

The Application of Bandwidth Optimization Technique in SLA Negotiation Process

The Application of Bandwidth Optimization Technique in SLA Negotiation Process The Application of Bandwidth Optiization Technique in SLA egotiation Process Srecko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia

More information

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.

More information

Models and Algorithms for Stochastic Online Scheduling 1

Models and Algorithms for Stochastic Online Scheduling 1 Models and Algoriths for Stochastic Online Scheduling 1 Nicole Megow Technische Universität Berlin, Institut für Matheatik, Strasse des 17. Juni 136, 10623 Berlin, Gerany. eail: [email protected]

More information

Markovian inventory policy with application to the paper industry

Markovian inventory policy with application to the paper industry Coputers and Cheical Engineering 26 (2002) 1399 1413 www.elsevier.co/locate/copcheeng Markovian inventory policy with application to the paper industry K. Karen Yin a, *, Hu Liu a,1, Neil E. Johnson b,2

More information

Cross-Domain Metric Learning Based on Information Theory

Cross-Domain Metric Learning Based on Information Theory Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence Cross-Doain Metric Learning Based on Inforation Theory Hao Wang,2, Wei Wang 2,3, Chen Zhang 2, Fanjiang Xu 2. State Key Laboratory

More information

A quantum secret ballot. Abstract

A quantum secret ballot. Abstract A quantu secret ballot Shahar Dolev and Itaar Pitowsky The Edelstein Center, Levi Building, The Hebrerw University, Givat Ra, Jerusale, Israel Boaz Tair arxiv:quant-ph/060087v 8 Mar 006 Departent of Philosophy

More information

CPU Animation. Introduction. CPU skinning. CPUSkin Scalar:

CPU Animation. Introduction. CPU skinning. CPUSkin Scalar: CPU Aniation Introduction The iportance of real-tie character aniation has greatly increased in odern gaes. Aniating eshes ia 'skinning' can be perfored on both a general purpose CPU and a ore specialized

More information

Data Set Generation for Rectangular Placement Problems

Data Set Generation for Rectangular Placement Problems Data Set Generation for Rectangular Placeent Probles Christine L. Valenzuela (Muford) Pearl Y. Wang School of Coputer Science & Inforatics Departent of Coputer Science MS 4A5 Cardiff University George

More information

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS

PREDICTION OF POSSIBLE CONGESTIONS IN SLA CREATION PROCESS PREDICTIO OF POSSIBLE COGESTIOS I SLA CREATIO PROCESS Srećko Krile University of Dubrovnik Departent of Electrical Engineering and Coputing Cira Carica 4, 20000 Dubrovnik, Croatia Tel +385 20 445-739,

More information

An improved TF-IDF approach for text classification *

An improved TF-IDF approach for text classification * Zhang et al. / J Zheiang Univ SCI 2005 6A(1:49-55 49 Journal of Zheiang University SCIECE ISS 1009-3095 http://www.zu.edu.cn/zus E-ail: [email protected] An iproved TF-IDF approach for text classification

More information

Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation M(1,2,3)

Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation M(1,2,3) 324 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY 29 Fuzzy Evaluation on Networ Security Based on the New Algorith of Mebership Degree Transforation M(,2,3) Hua Jiang School of Econoics and Manageent, Hebei

More information

Network delay-aware load balancing in selfish and cooperative distributed systems

Network delay-aware load balancing in selfish and cooperative distributed systems Network delay-aware load balancing in selfish and cooperative distributed systes Piotr Skowron Faculty of Matheatics, Inforatics and Mechanics University of Warsaw Eail: [email protected] Krzysztof

More information

The Velocities of Gas Molecules

The Velocities of Gas Molecules he Velocities of Gas Molecules by Flick Colean Departent of Cheistry Wellesley College Wellesley MA 8 Copyright Flick Colean 996 All rights reserved You are welcoe to use this docuent in your own classes

More information

Modeling operational risk data reported above a time-varying threshold

Modeling operational risk data reported above a time-varying threshold Modeling operational risk data reported above a tie-varying threshold Pavel V. Shevchenko CSIRO Matheatical and Inforation Sciences, Sydney, Locked bag 7, North Ryde, NSW, 670, Australia. e-ail: [email protected]

More information

Lecture L26-3D Rigid Body Dynamics: The Inertia Tensor

Lecture L26-3D Rigid Body Dynamics: The Inertia Tensor J. Peraire, S. Widnall 16.07 Dynaics Fall 008 Lecture L6-3D Rigid Body Dynaics: The Inertia Tensor Version.1 In this lecture, we will derive an expression for the angular oentu of a 3D rigid body. We shall

More information

Stable Learning in Coding Space for Multi-Class Decoding and Its Extension for Multi-Class Hypothesis Transfer Learning

Stable Learning in Coding Space for Multi-Class Decoding and Its Extension for Multi-Class Hypothesis Transfer Learning Stable Learning in Coding Space for Multi-Class Decoding and Its Extension for Multi-Class Hypothesis Transfer Learning Bang Zhang, Yi Wang 2, Yang Wang, Fang Chen 2 National ICT Australia 2 School of

More information

IRCI Free Co-located MIMO Radar Based on Sufficient Cyclic Prefix OFDM Waveforms

IRCI Free Co-located MIMO Radar Based on Sufficient Cyclic Prefix OFDM Waveforms IRCI Free Co-located MIMO Radar Based on Sufficient Cyclic Prefix OFDM Wavefors Yun-He Cao, Meber, IEEE, Xiang-Gen Xia,, Fellow, IEEE, and Sheng-Hua Wang Abstract In this paper, we propose a cyclic prefix

More information

Multi-Class Deep Boosting

Multi-Class Deep Boosting Multi-Class Deep Boosting Vitaly Kuznetsov Courant Institute 25 Mercer Street New York, NY 002 [email protected] Mehryar Mohri Courant Institute & Google Research 25 Mercer Street New York, NY 002 [email protected]

More information

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:

More information

Nonlinear Error Modeling of Reduced GPS/INS Vehicular Tracking Systems Using Fast Orthogonal Search

Nonlinear Error Modeling of Reduced GPS/INS Vehicular Tracking Systems Using Fast Orthogonal Search VEHICULAR 2014 : The Third International Conference on Advances in Vehicular Systes, Technologies and Applications Nonlinear Error Modeling of Reduced GPS/INS Vehicular Tracing Systes Using Fast Orthogonal

More information

BEST RELAY SELECTION METHOD FOR DETECT AND FORWARD AIDED COOPERATIVE WIRELESS NETWORK

BEST RELAY SELECTION METHOD FOR DETECT AND FORWARD AIDED COOPERATIVE WIRELESS NETWORK BEST RELAY SELECTION METHOD FOR DETECT AND FORWARD AIDED COOPERATIVE WIRELESS NETWORK Nithin S. and M. Kannan Department of Electronics Engineering, Madras Institute of Technology, Anna University, Chennai,

More information

Quality evaluation of the model-based forecasts of implied volatility index

Quality evaluation of the model-based forecasts of implied volatility index Quality evaluation of the odel-based forecasts of iplied volatility index Katarzyna Łęczycka 1 Abstract Influence of volatility on financial arket forecasts is very high. It appears as a specific factor

More information

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation

Load Control for Overloaded MPLS/DiffServ Networks during SLA Negotiation Int J Counications, Network and Syste Sciences, 29, 5, 422-432 doi:14236/ijcns292547 Published Online August 29 (http://wwwscirporg/journal/ijcns/) Load Control for Overloaded MPLS/DiffServ Networks during

More information

Trading Regret for Efficiency: Online Convex Optimization with Long Term Constraints

Trading Regret for Efficiency: Online Convex Optimization with Long Term Constraints Journal of Machine Learning Research 13 2012) 2503-2528 Subitted 8/11; Revised 3/12; Published 9/12 rading Regret for Efficiency: Online Convex Optiization with Long er Constraints Mehrdad Mahdavi Rong

More information

Budget-optimal Crowdsourcing using Low-rank Matrix Approximations

Budget-optimal Crowdsourcing using Low-rank Matrix Approximations Budget-optial Crowdsourcing using Low-rank Matrix Approxiations David R. Karger, Sewoong Oh, and Devavrat Shah Departent of EECS, Massachusetts Institute of Technology Eail: {karger, swoh, devavrat}@it.edu

More information