Scheduling in Multi-Channel Wireless Networks

Size: px
Start display at page:

Download "Scheduling in Multi-Channel Wireless Networks"

Transcription

1 Scheduing in Muti-Channe Wireess Networks Vartika Bhandari and Nitin H. Vaidya University of Iinois at Urbana-Champaign, USA Abstract. The avaiabiity of mutipe orthogona channes in a wireess network can ead to substantia performance improvement by aeviating contention and interference. However, this aso gives rise to non-trivia channe coordination issues. The situation is exacerbated by variabiity in the achievabe datarates across channes and inks. Thus, scheduing in such networks may require substantia information-exchange and ead to non-negigibe overhead. This provides a strong motivation for the study of scheduing agorithms that can operate with imited information whie sti providing acceptabe worst-case performance guarantees. In this paper, we make an effort in this direction by examining the scheduing impications of mutipe channes and heterogeneity in channe-rates. We estabish ower bounds on the performance of a cass of maxima scheduers. We first demonstrate that when the underying scheduing mechanism is imperfect, the presence of mutipe orthogona channes can hep aeviate the detrimenta impact of the imperfect scheduer, and yied a significanty better efficiency-ratio in a wide range of network topoogies. We then estabish performance bounds for a scheduer that can achieve a good efficiency-ratio in the presence of channes with heterogeneous rates without requiring expicit exchange of queue-information. Our resuts indicate that it may be possibe to achieve a desirabe trade-off between performance and information. 1 Introduction Appropriate scheduing poicies are of utmost importance in achieving good throughput characteristics in a wireess network. The semina work of Tassiuas and Ephremides yieded a throughput-optima scheduer, which can schedue a feasibe traffic fows without resuting in unbounded queues [8]. However, such an optima scheduer is difficut to impement in practice. Hence, various imperfect scheduing strategies that tradeoff throughput for simpicity have been proposed in [5, 9, 10, 7], amongst others. The avaiabiity of mutipe orthogona channes in a wireess network can potentiay ead to substantia performance improvement by aeviating contention and interference. However, this aso gives rise to non-trivia channe coordination issues. The situation is exacerbated by variabiity in the achievabe data-rates across channes and inks. Computing an optima schedue, even in a singe-channe network, is amost aways intractabe, due to the need for goba information, as we as the computationa This research was supported in part by NSF grant CNS , US Army Research Office grant W911NF , and a Vodafone Graduate Feowship. Vartika Bhandari is now with Googe Inc.

2 compexity. However, imperfect scheduers requiring imited oca information can typicay be designed, which provide acceptabe worst-case (and typicay much better average case) performance degradation compared to the optima. In a muti-channe network, the oca information exchange required by even an imperfect scheduer can be quite prohibitive as information may be needed on a per-channe basis. For instance, Lin and Rasoo [4] have described a scheduing agorithm for muti-channe muti-radio wireess networks that requires information about per-channe queues at a interfering inks. This provides a strong motivation for the study of scheduing agorithms that can operate with imited information, whie sti providing acceptabe worst-case performance guarantees. In this paper, we make an effort in this direction, by examining the scheduing impications of mutipe channes, and heterogeneity in channe-rates. We estabish ower bounds on performance of a cass of maxima scheduers, and describe some scheduers that require imited information-exchange between nodes. Some of the bounds presented here improve on bounds deveoped in past work [4]. We begin by anayzing the performance of a centraized greedy maxima scheduer. A ower bound for this scheduer was estabished in [4]. However, in a arge variety of network topoogies, the ower bound can be quite oose. Thus is particuary true for muti-channe networks with singe interface nodes. We estabish an aternative bound that is tighter in a range of topoogies. Our resuts indicate that when the underying scheduing mechanism is imperfect, the presence of mutipe orthogona channes can hep aeviate the impact of the imperfect scheduer, and yied a significanty better efficiency-ratio in a wide range of scenarios.. We then consider the possibiity of achieving efficiency-ratio comparabe to the centraized greedy maxima scheduer using a simper scheduer that works with imited information. We estabish resuts for a cass of maxima scheduers couped with oca queue-oading rues that do not require queue-information from interfering nodes. 2 Preiminaries We consider a muti-hop wireess network. For simpicity, we argey imit our discussion to nodes equipped with a singe haf-dupex radio-interface capabe of tuning to any one avaiabe channe at any given time. A interfaces in the network have identica capabiities, and may switch between the avaiabe channes if desired. Many of the presented resuts can aso be used to obtain resuts for the case when each node is equipped with mutipe interfaces; we briefy discuss this issue. The wireess network is viewed as a directed graph, with each directed ink in the graph representing an avaiabe communication ink. We mode interference using a confict reation between inks. Two inks are said to confict with each other if it is ony feasibe to schedue one of the inks on a certain channe at any given time. The confict reation is assumed to be symmetric. The confict-based interference mode provides a tractabe approximation of reaity whie it does not capture the wireess channe precisey, it is more amenabe to anaysis. Such confict-based interference modes have been used frequenty in the past work (e.g., [11, 4]).

3 Time is assumed to be sotted with a sot duration of 1 unit time (i.e., we use sot duration as the time unit). In each time sot, the scheduer determines which inks shoud transmit in that time sots, as we as the channe to be used for each such transmission. We now introduce some notation and terminoogy. The network is viewed as a coection of directed inks, where each ink is a pair of nodes that are capabe of direct communication with non-zero rate. L denotes the set of directed inks in the network. C is the set of a avaiabe orthogona channes. Thus, C is the number of avaiabe channes. We say that a scheduer schedues ink-channe pair (,c) if it schedues ink for transmission on channe c. r c denotes the rate achievabe on ink by operating ink on channe c, provided that no conficting ink is aso schedued on channe c. For simpicity, we assume that r c > 0 for a L and c C. 1 The rates r c do not vary with time. We aso define the terms: r max = max L,c C rc, and r min = min L,c C rc. When two conficting inks are schedued simutaneousy on the same channe, both achieve rate 0. β s denotes the sef-skew-ratio, defined as the minimum ratio between rates supportabe over different channes on a singe ink. Therefore, for any two channes c and d, and any ink, we have rd r c β s. Note that 0 < β s 1. β c denotes the cross-skew-ratio, defined as the minimum ratio between rates supportabe over the same channe on different inks. Therefore, for any channe c, and any two inks and : rc r c β c. Note that 0 < β c 1. r c c C Let r = max c C rc. Let σ s = min L r. Note that σ s 1+β s ( C 1). Moreover, in typica scenarios, σ s wi be expected to be much arger than this worst-case bound. σ s is argest when β s = 1, in which case σ s = C. b() and e(), respectivey, denotes the nodes at the two endpoints of a ink. In particuar, ink is directed from node b() to node e(). E(b())and E(e())denote the set of inks incident on nodes b() and e(), respectivey. Thus, the inks in E(b()) and E(e()) share an endpoint with ink. Since we focus on singe-interface nodes, this impies that if ink is schedued in a certain time sot, no other ink in E(b()) or E(e()) can be schedued at the same time. We refer to this as an interface confict. Let A() =E(b()) E(e()). Note that A(). Links in A() are said to be adjacent to ink. Links that have an interface confict with ink are those that beong to E(b()) E(e()) \ {}. Let A max = max A(). I() denotes the set of inks that confict with ink when schedued on the same channe. I() may incude inks that aso have an interface-confict with ink. By convention, is considered incuded in I(). The subset of I() comprising interfering inks that are not adjacent to is denoted by I (), i.e., I () = I() \A(). Let I max = max I (). 1 Though we assume that r c > 0 for a,c, the resuts can be generaized very easiy to hande the case where r c = 0 for some ink-channe pairs.

4 K denotes the maximum number of non-adjacent inks in I () that can be schedued on a given channe simutaneousy if is not schedued on that channe. K ( C ) denotes the maximum number of non-adjacent inks in I () that can be schedued simutaneousy using any of the C channes (without conficts) if is not schedued for transmission. Note that here we excude inks that have an interface confict with. K is the argest vaue of K over a inks, i.e., K = max K. K C is the argest vaue of K ( C ) over a inks, i.e., K C = max hard to see that for singe-interface nodes: K ( C ). Let I max = max I (). It is not K K C min{k C,I max } (1) We remark that the term K as used by us is simiar, but not exacty the same as the term K used in [4]. In [4], K denotes the argest number of inks that may be schedued simutaneousy if some ink is not schedued, incuding inks adjacent to. We excude the adjacent inks in our definition of K. Throughout this text, we wi refer to the quantity defined in [4] as κ instead of K. Let γ be 0 if there are no other inks adjacent to at either endpoint of, 1 if there are other adjacent inks at ony one endpoint, and 2 if there are other adjacent inks at both endpoints. γ is the argest vaue of γ over a inks, i.e., γ = max γ. Load vector: We consider singe-hop traffic, i.e., any traffic that originates at a node is destined for a next-hop node, and is transmitted over the ink between the two nodes. Under this assumption, a the traffic that must traverse a given ink can be treated as a singe fow. The traffic arriva process for ink is denoted by {λ(t)}. The arrivas in each sot t are assumed i.i.d. with average λ. The average oad on the network is denoted by oad vector λ = [λ 1,λ 2,...,λ L ], where λ denotes the arriva rate for the fow on ink. λ may possiby be 0 for some inks. Queues: The packets generated by each fow are first added to a queue maintained at the source node. Depending on the agorithm, there coud be a singe queue for each ink, or a queue for each (ink, channe) pair. Stabiity: The system of queues in the network is said to be stabe if, for a queues Q in the network, the foowing is true [2]: im t sup 1 t t τ=1 E[q(τ)] < where q(τ) denotes the backog in queue Q at time τ (2) Feasibe oad vector: In each time sot, the scheduer used in the network determines which inks shoud transmit and on which channe (reca that each ink is a directed ink, with a transmitter and a receiver). In different time sots, the scheduer may schedue a different set of inks for transmission. A oad vector is said to be feasibe, if there exists a scheduer that can schedue transmissions to achieve stabiity (as defined above), when using that oad vector.

5 Link rate vector: Depending on the schedue chosen in a given sot by the scheduer, each ink wi have a certain transmission rate. For instance, using our notation above, if ink is schedued to transmit on channe c, it wi have rate r c (we assume that, if the scheduer schedues ink on channe c, it does not schedue another conficting ink on that channe). Thus, the schedue chosen for a time-sot yieds a ink rate vector for that time sot. Note that ink rate vector specifies rate of transmission used on each ink in a certain time sot. On the other hand, oad vector specifies the rate at which traffic is generated for each ink. Feasibe rate region: The set of a feasibe oad vectors constitutes the feasibe rate-region of the network, and is denoted by Λ. Throughput-optima scheduer: A throughput-optima scheduer is one that is capabe of maintaining stabe queues for any oad vector λ in the interior of Λ. For simpicity of notation, we use λ Λ in the rest of the text to indicate a oad-vector vector λ ying in the interior of a region Λ. From the work of [8], it is known that a scheduer that maintains a queue for each ink, and then chooses the schedue given by argmax r q r, is throughputoptima for scenarios with singe-hop traffic (q is the backog in ink s queue, and the maximum is taken over a possibe ink rate vectors r ). Note that q is a function of time, and queue-backogs at the start of a time sot are used above for computing the schedue (or ink-rate vector) for that sot. Imperfect scheduer: It is usuay difficut to determine the throughput-optima inkrate aocations, since the probem is typicay computationay intractabe. Hence, there has been significant recent interest in imperfect scheduing poicies that can be impemented efficienty. In [5], cross-ayer rate-contro was studied for an imperfect scheduer that chooses (in each time sot) ink-rate vector s such that q s δ argmax r q r, for some constant δ (0 < δ 1). It was shown [5] that any scheduer with this property can stabiize any oad-vector λ δλ. Note that if a rate vector λ is in Λ, then the rate vector δ λ is in δλ. δλ is aso referred to as the δ-reduced rate-region. If a scheduer can stabiize a λ δλ, its efficiency-ratio is said to be δ. Maxima scheduer: Under our assumed interference mode, a schedue is said to be maxima if (a) no two inks in the schedue confict with each other, and (b) it is not possibe to add any ink to the schedue without creating a confict (either confict due to interference, or an interface-confict). We wi aso utiize the Lyapunov-drift based stabiity criterion from Lemma 2 of [6]. 3 Scheduing in Muti-channe Networks As was discussed previousy, throughput-optima scheduing is often an intractabe probem even in a singe-channe network. However, imperfect scheduers that achieve a fraction of the stabiity-region can potentiay be impemented in a reasonaby efficient manner. Of particuar interest is the cass of imperfect scheduers know as maxima scheduers, which we defined in Section 2. The performance of maxima scheduers

6 1 Identica channes/gains β c β s 1 Fig D visuaization of channe heterogeneity under various assumptions has been studied in much recent work, e.g., [10, 7], with the focus argey on singe-channe wireess networks. The issue of designing a distributed scheduer that approximates a maxima scheduer has been addressed in [3], etc. When there are mutipe channes, but each node has one or few interfaces, an additiona degree of compexity is added in terms of channe seection. In particuar, when the ink-channe rates r c can be different for different inks, and channes c, the scheduing compexity is exacerbated by the fact that it is not enough to assign different channes to interfering inks; for good performance, the channes must be assigned taking achievabe rates into account, i.e., individua channe identities are important. Scheduing in muti-channe muti-radio networks has been examined in [4], which argues that using a simpe maxima scheduer is used in such a network coud possiby ead to arbitrary degradation in efficiency-ratio (assuming arbitrary variabiity in rates) compared to the efficiency-ratio achieved with identica channes. A queue-oading agorithm was been proposed, in conjunction with which, a maxima scheduer can stabiize any vector in ( 1 κ+2) Λ, for arbitrary βc and β s vaues. This rue requires knowedge of of the ength of queues at a interfering inks, which can incur substantia overhead. Whie variabe channe gains are a rea-word characteristic that cannot be ignored in designing effective protocos/agorithms, it is important that the soutions not require extensive information exchange with arge overhead that offsets any performance benefit. In ight of this, it is crucia to consider various points of trade-off between information and performance. In this context, the quantities β s,β c and σ s defined in Section 2 prove to be usefu. The quantities β s and β c can be viewed as two orthogona axes for worst-case channe heterogeneity (Fig. 1). The quantity σ s provides an aggregate (and thus averaged-out) view of heterogeneity aong the β s axis. β s = 1 corresponds to a scenario where a channes have identica characteristics, such as bandwidth, moduation/transmission-rate, noise-eves, etc., and the ink-gain is a function soey of the separation between sender and receiver. β c = 1 corresponds to a scenario where a inks have the same sender-receiver separation, and the same conditions/characteristics for any given channe, but the channes may have different characteristics, e.g., an b channe with a maximum supported data-rate of 11 Mbps, and an a channe with a maximum supported data-rate of 54 Mbps.

7 Vertex representing a ink Channe Interference confict Fig. 2. Exampe of improved bound on efficiency ratio: ink-interference topoogy is a star with a center ink and x radia inks In this paper, we show that in a singe-interface network, a simpe maxima scheduer augmented ( with oca traffic-distribution ) and threshod rues achieves an efficiencyratio at east. The noteworthy features of this resut are: σ s K C +max{1,γ} C 1. This scheduer does not require information about queues at interfering inks. 2. The performance degradation (compared to the scheduer of [4]) when rates are σ variabe, i.e., β s,β c 1, is not arbitrary, and is at worst s C 1+β s( C 1) C 1 C. Thus, even with a purey oca information based queue-oading rue, it is possibe to avoid arbitrary performance degradation even in the worst case. Typicay, the performance woud be much better. ( 3. In many network scenarios, the provabe ower bound of σ s K C +max{1,γ} C ) may actuay be better than κ+2 1. This is particuary ikey to happen in networks with singe-interface nodes, e.g., suppose we have three channes a,b,c with r a = 1,r b = 1,r c = 0.5 for a inks. Then, in the network in Fig. 2 (where the ink-interference graph is a star with x radia vertices, and there are no interface-conficts), K C = 1 x,γ = 0,σ s = 2.5, and we obtain a bound of 0.4x+1.2, whereas the proved ower 1 bound of the scheduer of [4] is x+2. The muti-channe scheduing probem is further compicated if the rates r c are timevarying, i.e., r c = rc (t). However, handing such time-varying rates is beyond the scope of the resuts in this paper, and we address ony the case where rates do not exhibit timevariation. Note that reated prior work on muti-channe scheduing [4] aso addresses ony time-invariant rates. 4 Summary of Resuts For muti-channe wireess networks with singe-interface nodes, we present ower bounds on the efficiency-ratio of a cass of maxima scheduers (incuding both centraized and distributed scheduers), which indicate that the worst-case efficiency-ratio can be higher when there are mutipe channes (as compared to the singe-channe case). More specificay, we show that: The number of inks schedued by any maxima scheduer are within at east a δ fraction of the maximum number of inks activated by any feasibe schedue, where: { } C δ = max K C + max{1,γ} C, 1 max{1,k + γ}

8 A centraized greedy maxima (CGM) scheduer achieves an efficiency-ratio which is at east σ max{ s } This constitutes an improvement over the ower K C +max{1,γ} C, 1 max{1,k+γ} bound for the CGM scheduer proved in [4]. Since K C min{k C,I max } κ C, this new bound on efficiency-ratio can often be substantiay tighter. We show that any maxima scheduer, in conjunction with a simpe oca queueoading rue, and a threshod-based ink-participation rue, achieves an efficiency- ( ratio of at east σ s K C +max{1,γ} C ). This scheduer is of significant interest as it does not require information about queues at a interfering inks. Due to space constraints, proofs are omitted. Pease see [1] for the proofs. Note that the text beow makes the natura assumption that two inks that confict with each other (due to interference or interface-confict) are not schedued in the same timesot by any scheduer discussed in the rest of this paper. 5 Maxima Scheduers We begin by presenting a resut about the cardinaity of the set of inks schedued by any maxima scheduer. Theorem 1. Let S opt denote the set of inks schedued by a scheduer that seeks to maximize the number of inks schedued for transmission, and ets max denote the set of inks activated by any maxima scheduer. Then the foowing is true: { S max max C K C + max{1,γ} C, 1 max{1,k + γ} The proof is omitted due to ack of space. Pease see [1]. } S opt (3) 6 Centraized Greedy Maxima Scheduer A centraized greedy maxima (CGM) scheduer operates in the manner described beow. In each timesot: 1. Cacuate ink weights w c = q r c for a inks and channes c. 2. Sort the ink-channe pairs (,c) in non-increasing order of w c. 3. Add the first ink-channe pair in the sorted ist (i.e., the one with highest weight) to the schedue for the timesot, and remove from the ist a ink-channe pairs that are no onger feasibe (due to either interface or interference conficts). 4. Repeat step 3 unti the ist is exhausted (i.e., no more inks can be added to the schedue). In [4], it was shown that this centraized greedy maxima (CGM) scheduer can achieve an approximation-ratio which is at east ( 1 κ+2) in a muti-channe muti-radio network, where κ is the maximum number of inks conficting with a ink that may

9 possiby be schedued concurrenty when is not schedued. This bound hods for arbitrary vaues of β s and β c, and variabe number of interfaces per node. However, this bound can be quite oose in muti-channe wireess networks where each device has one or few interfaces. In this section, we prove an improved bound on the efficiency-ratio achievabe with the CGM scheduer for singe-interface nodes. We aso briefy discuss how it can be used to obtain a bound for muti-interface nodes. Theorem 2. Let S opt denote the set of inks activated by an optima scheduer that chooses a set of ink-channe pairs (,c) for transmission such that w c is maximized. Let c () denote the channe assigned to ink S opt by this optima scheduer. Let S g denote the set of inks activated by the centraized greedy maxima (CGM) scheduer, and et c g () denote the channe assigned to a ink S g. Then: w cg() S g w c () S opt { max σ s K C + max{1,γ} C, 1 max{1,k + γ} } (4) The proof is omitted due to ack of space. Pease see [1]. Theorem 2 eads to the foowing resut: Theorem 3. The centraized greedy maxima (CGM) scheduer can stabiize the δ- reduced rate-region, where: { } σ s δ = max K C + max{1,γ} C, 1 max{1,k + γ} Proof. We earier discussed a resut from [5] that any scheduer, which chooses rateaocation s such that q s δ argmax q r, can stabiize the δ-reduced rate-region. Using Theorem 2 and this resut, we obtain the above resut. We remark that the above bound is independent of β c. 6.1 Mutipe Interfaces per Node We now describe how the resut can be extended to networks where each node may have more than one interface. Given the origina network node-graph G = (V, E), construct the foowing transformed graph G = (V,E ): For each node v V, if v has m v interfaces, create m v nodes v 1,v 2,...v mv in V. For each edge (u,v) E, where u,v have m u,m v interfaces respectivey, create edges (u i,v j ),1 i m u,1 j m v, and set q (ui,v j ) = q (u,v). Set the achievabe channe rate appropriatey for each edge in E and each channe. For exampe, assuming that the channe-rate is soey a function of u,v and c, then: for each channe c, set r c (u i,v j ) = rc (u,v).

10 The transformed graph G comprises ony singe-interface inks, and thus Theorem 2 appies to it. Moreover, it is not hard to see that a schedue that maximizes q r in G aso maximizes q r in G. Thus, the efficiency-ratio from Theorem 2 for network graph G yieds an efficiency-ratio for the performance of the CGM scheduer in the muti-interface network. We briefy touch upon how one woud expect the ratio to vary as the number of interfaces at each node increases. Note that the efficiency-ratio depends on β s, C,K C,γ. Of these β s and C are aways the same for both G and G. γ is aso aways the same for any G derived from a given node-graph G, as it depends ony on the number of other node-inks incident on either endpoint of a node-ink in G (which is a property of the node topoogy, and not the number of interfaces each node has). However, K C might potentiay increase in G as there are many more non-adjacent interfering inks when each interface is viewed as a distinct node. Thus, for a given number of channes C, one woud expect the provabe efficiency-ratio to initiay decrease as we add more interfaces, and then become static. Whie this may initiay seem counter-intuitive, this is expained by the observation that mutipe orthogona channes yieded a better efficiency-ratio in the singe-interface case since there was more spectra resource, but imited hardware (interfaces) to utiize it. Thus, the additiona channes coud be effectivey used to aeviate the impact of sub-optima scheduing. When the hardware is commensurate with the number of channes, the situation (compared to an optima scheduer) increasingy starts to resembe a singe-channe singe-interface network. 6.2 Specia Case: C Interfaces per Node Let us consider the specia case where each node in the network has C interfaces, and achievabe rate on a ink between nodes u,v and a channes c C is soey a function of u,v and c (and not of the interfaces used). In this case, it is possibe to obtain a simper transformation. Given the origina network node-graph G = (V, E), construct C copies of this graph, viz., G 1,G 2,...,G C, and view each node in each graph as having a singeinterface, and each network as having access to a singe channe. Then each network graph G i can be viewed in isoation, and the throughput obtained in the origina graph is the sum of the throughputs in each graph. ( From ) Theorem 2, in each graph we can 1 max{1,k+γ} show that the CGM scheduer is within ( overa network, the CGM scheduer is within 1 max{1,k+γ} of the optima. Thus, even in the ) of the optima. 7 A Rate-Proportiona Maxima Muti-Channe (RPMMC) Scheduer In this section, we describe a scheduer where a ink does not require any information about queue-engths at interfering inks. The set of a inks in denoted by L. The arriva process for ink is i.i.d. over a time-sots t, and is denoted by {λ (t)}, with E[λ (t)] = λ. We make no assumption about independence of arriva processes for two inks, k. However, we consider ony

11 the cass of arriva processes for which E[λ (t)λ k (t)] is bounded, i.e., E[λ (t)λ k (t)] η for a L,k L, where η is a suitabe constant. Consider the foowing scheduer: Rate-Proportiona Maxima Muti-Channe (RPMMC) Scheduer Each ink maintains a queue for each channe. The ength of the queue for ink and channe c at time t is denoted by q c (t). In time-sot t: ony those ink-channe pairs with q c (t) rc participate, and the scheduer computes a maxima schedue from amongst the participating inks. The new arrivas during this sot, i.e., λ (t) are assigned to channe-queues in proportion to the rates, i.e., λ c (t) = λ (t)r c r b b C Theorem 4. The RPMMC scheduer stabiizes the queues in the network for any oadvector within the δ-reduced rate-region, where: δ = σ s K C + max{1,γ} C The proof is omitted due to space constraints. Pease see [1]. Coroary 1 The efficiency-ratio of the RPMMC scheduer is aways at east: ( )( σs 1 ) C K + max{1,γ} Proof. The proof foows from Theorem 4 and (1). 8 Discussion The intuition behind the RPMMC scheduer is simpe: by spitting the traffic across channes in proportion to the channe-rates, each ink sees the average of a channerates as its effective rate. This heps avoid worst-case scenarios where the ink may end up being repeatedy schedued on a channe that yieds poor rate on that ink. The agorithm is made attractive by the fact that no information about queues at interfering inks is required. Furthermore we showed that the efficiency-ratio of the RPMMC scheduer is aways at east ( σs C )( 1 K+max{1,γ} ). Note that 1+β s ( C 1) σ s C. Thus, the efficiency ratio of this agorithm does not degrade indefinitey as β s becomes smaer. Moreover, in many practica settings, one can expect σ s to be Θ( C ) and the performance woud be much better compared to the worst-case of σ s = 1+β s ( C 1). 9 Future Directions The RPMMC scheduer provides motivation for further study of scheduers that work with imited information. The scheduer of Lin-Rasoo [4] and the RPMMC scheduer represent two extremes of a range of possibiities, since the former uses information

12 from a interfering inks, whie the atter uses no such information. Evidenty, using more information can potentiay aow for a better provabe efficiency-ratio. However, the nature of the trade-off curve between these two extremities is not cear. For instance, an interesting question to ponder is the foowing: If interference extends up to M hops, but each ink ony has information upto x < M hops, what provabe bounds can be obtained? This woud hep quantify the extent of performance improvement achievabe by increasing the information-exchange, and provide insights about suitabe operating points for protoco design, since contro overhead can be a concern in rea-word network scenarios. References 1. V. Bhandari. Performance of wireess networks subject to constraints and faiures. Ph.D. Thesis, UIUC, L. Georgiadis, M. J. Neey, and L. Tassiuas. Resource aocation and cross-ayer contro in wireess networks. Found. Trends Netw., 1(1):1 144, C. Joo and N. B. Shroff. Performance of random access scheduing schemes in muti-hop wireess networks. In Proceedings of IEEE INFOCOM, pages 19 27, X. Lin and S. Rasoo. A Distributed Joint Channe-Assignment, Scheduing and Routing Agorithm for Muti-Channe Ad-hoc Wireess Networks. In Proceedings of IEEE INFOCOM, pages , May X. Lin and N. B. Shroff. The impact of imperfect scheduing on cross-ayer rate contro in wireess networks. In Proceedings of IEEE INFOCOM, pages , M. J. Neey, E. Modiano, and C. E. Rohrs. Dynamic power aocation and routing for time varying wireess networks. In Proceedings of IEEE INFOCOM, G. Sharma, R. R. Mazumdar, and N. B. Shroff. On the compexity of scheduing in wireess networks. In MobiCom 06: Proceedings of the 12th annua internationa conference on Mobie computing and networking, pages ACM, L. Tassiuas and A. Ephremides. Stabiity properties of constrained queueing systems and scheduing poicies for maximum throughput in mutihop radio networks. IEEE Transactions on Automatic Contro, 37(12): , Dec X. Wu and R. Srikant. Scheduing efficiency of distributed greedy scheduing agorithms in wireess networks. In Proceedings of IEEE INFOCOM, X. Wu, R. Srikant, and J. R. Perkins. Queue-ength stabiity of maxima greedy schedues in wireess networks. In Workshop on Information Theory and Appications, X. Wu, R. Srikant, and J. R. Perkins. Scheduing efficiency of distributed greedy scheduing agorithms in wireess networks. IEEE Trans. Mob. Comput., 6(6): , 2007.

Secure Network Coding with a Cost Criterion

Secure Network Coding with a Cost Criterion Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu

More information

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441

More information

Pricing and Revenue Sharing Strategies for Internet Service Providers

Pricing and Revenue Sharing Strategies for Internet Service Providers Pricing and Revenue Sharing Strategies for Internet Service Providers Linhai He and Jean Warand Department of Eectrica Engineering and Computer Sciences University of Caifornia at Berkeey {inhai,wr}@eecs.berkeey.edu

More information

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks Simutaneous Routing and Power Aocation in CDMA Wireess Data Networks Mikae Johansson *,LinXiao and Stephen Boyd * Department of Signas, Sensors and Systems Roya Institute of Technoogy, SE 00 Stockhom,

More information

Virtual trunk simulation

Virtual trunk simulation Virtua trunk simuation Samui Aato * Laboratory of Teecommunications Technoogy Hesinki University of Technoogy Sivia Giordano Laboratoire de Reseaux de Communication Ecoe Poytechnique Federae de Lausanne

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 12, DECEMBER 2013 1 Scaabe Muti-Cass Traffic Management in Data Center Backbone Networks Amitabha Ghosh, Sangtae Ha, Edward Crabbe, and Jennifer

More information

Multi-Robot Task Scheduling

Multi-Robot Task Scheduling Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in

More information

Australian Bureau of Statistics Management of Business Providers

Australian Bureau of Statistics Management of Business Providers Purpose Austraian Bureau of Statistics Management of Business Providers 1 The principa objective of the Austraian Bureau of Statistics (ABS) in respect of business providers is to impose the owest oad

More information

GREEN: An Active Queue Management Algorithm for a Self Managed Internet

GREEN: An Active Queue Management Algorithm for a Self Managed Internet : An Active Queue Management Agorithm for a Sef Managed Internet Bartek Wydrowski and Moshe Zukerman ARC Specia Research Centre for Utra-Broadband Information Networks, EEE Department, The University of

More information

Fixed income managers: evolution or revolution

Fixed income managers: evolution or revolution Fixed income managers: evoution or revoution Traditiona approaches to managing fixed interest funds rey on benchmarks that may not represent optima risk and return outcomes. New techniques based on separate

More information

With the arrival of Java 2 Micro Edition (J2ME) and its industry

With the arrival of Java 2 Micro Edition (J2ME) and its industry Knowedge-based Autonomous Agents for Pervasive Computing Using AgentLight Fernando L. Koch and John-Jues C. Meyer Utrecht University Project AgentLight is a mutiagent system-buiding framework targeting

More information

Pricing Internet Services With Multiple Providers

Pricing Internet Services With Multiple Providers Pricing Internet Services With Mutipe Providers Linhai He and Jean Warand Dept. of Eectrica Engineering and Computer Science University of Caifornia at Berkeey Berkeey, CA 94709 inhai, wr@eecs.berkeey.edu

More information

Minimizing the Total Weighted Completion Time of Coflows in Datacenter Networks

Minimizing the Total Weighted Completion Time of Coflows in Datacenter Networks Minimizing the Tota Weighted Competion Time of Cofows in Datacenter Networks Zhen Qiu Ciff Stein and Yuan Zhong ABSTRACT Communications in datacenter jobs (such as the shuffe operations in MapReduce appications

More information

Load Balance vs Energy Efficiency in Traffic Engineering: A Game Theoretical Perspective

Load Balance vs Energy Efficiency in Traffic Engineering: A Game Theoretical Perspective Load Baance vs Energy Efficiency in Traffic Engineering: A Game Theoretica Perspective Yangming Zhao, Sheng Wang, Shizhong Xu and Xiong Wang Schoo of Communication and Information Engineering University

More information

Load Balancing in Distributed Web Server Systems with Partial Document Replication *

Load Balancing in Distributed Web Server Systems with Partial Document Replication * Load Baancing in Distributed Web Server Systems with Partia Document Repication * Ling Zhuo Cho-Li Wang Francis C. M. Lau Department of Computer Science and Information Systems The University of Hong Kong

More information

Early access to FAS payments for members in poor health

Early access to FAS payments for members in poor health Financia Assistance Scheme Eary access to FAS payments for members in poor heath Pension Protection Fund Protecting Peope s Futures The Financia Assistance Scheme is administered by the Pension Protection

More information

(12) Patent Application Publication (10) Pub. N0.: US 2006/0105797 A1 Marsan et al. (43) Pub. Date: May 18, 2006

(12) Patent Application Publication (10) Pub. N0.: US 2006/0105797 A1 Marsan et al. (43) Pub. Date: May 18, 2006 (19) United States US 20060105797A (12) Patent Appication Pubication (10) Pub. N0.: US 2006/0105797 A1 Marsan et a. (43) Pub. Date: (54) METHOD AND APPARATUS FOR (52) US. C...... 455/522 ADJUSTING A MOBILE

More information

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing. Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services

More information

Chapter 3: e-business Integration Patterns

Chapter 3: e-business Integration Patterns Chapter 3: e-business Integration Patterns Page 1 of 9 Chapter 3: e-business Integration Patterns "Consistency is the ast refuge of the unimaginative." Oscar Wide In This Chapter What Are Integration Patterns?

More information

WIRELESS Mesh Networks (WMNs) have recently attracted

WIRELESS Mesh Networks (WMNs) have recently attracted 3968 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 2, NO. 8, AUGUST 23 A New MPLS-Based Forwarding Paradigm for Muti-Radio Wireess Mesh Networks Stefano Avaone and Giovanni Di Stasi Abstract Routing

More information

Randomized Algorithms for Scheduling VMs in the Cloud

Randomized Algorithms for Scheduling VMs in the Cloud Randomized Agorithms for Scheduing VMs in the Coud Javad Ghaderi Coumbia University Abstract We consider the probem of scheduing VMs (Virtua Machines) in a muti-server system motivated by coud computing

More information

Betting Strategies, Market Selection, and the Wisdom of Crowds

Betting Strategies, Market Selection, and the Wisdom of Crowds Betting Strategies, Market Seection, and the Wisdom of Crowds Wiemien Kets Northwestern University w-kets@keogg.northwestern.edu David M. Pennock Microsoft Research New York City dpennock@microsoft.com

More information

Pricing and hedging of variable annuities

Pricing and hedging of variable annuities Cutting Edge Pricing and hedging of variabe annuities Variabe annuity products are unit-inked investments with some form of guarantee, traditionay sod by insurers or banks into the retirement and investment

More information

On Capacity Scaling in Arbitrary Wireless Networks

On Capacity Scaling in Arbitrary Wireless Networks On Capacity Scaing in Arbitrary Wireess Networks Urs Niesen, Piyush Gupta, and Devavrat Shah 1 Abstract arxiv:07112745v3 [csit] 3 Aug 2009 In recent work, Özgür, Lévêque, and Tse 2007) obtained a compete

More information

A Distributed MAC Scheme Supporting Voice Services in Mobile Ad Hoc Networks 1

A Distributed MAC Scheme Supporting Voice Services in Mobile Ad Hoc Networks 1 A Distributed MAC Scheme Supporting Voice Services in Mobie Ad Hoc Networks 1 Hai Jiang, Ping Wang, H. Vincent Poor, and Weihua Zhuang Department of Eectrica & Computer Engineering, University of Aberta,

More information

Face Hallucination and Recognition

Face Hallucination and Recognition Face Haucination and Recognition Xiaogang Wang and Xiaoou Tang Department of Information Engineering, The Chinese University of Hong Kong {xgwang1, xtang}@ie.cuhk.edu.hk http://mmab.ie.cuhk.edu.hk Abstract.

More information

An FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks

An FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks An FDD ideband CDMA MAC Protoco for ireess Mutimedia Networks Xudong ang Broadband and ireess Networking (BN) Lab Schoo of Eectrica and Computer Engineering Georgia Institute of Technoogy Atanta, GA 3332

More information

eg Enterprise vs. a Big 4 Monitoring Soution: Comparing Tota Cost of Ownership Restricted Rights Legend The information contained in this document is confidentia and subject to change without notice. No

More information

Older people s assets: using housing equity to pay for health and aged care

Older people s assets: using housing equity to pay for health and aged care Key words: aged care; retirement savings; reverse mortgage; financia innovation; financia panning Oder peope s assets: using housing equity to pay for heath and aged care The research agenda on the ageing

More information

Take me to your leader! Online Optimization of Distributed Storage Configurations

Take me to your leader! Online Optimization of Distributed Storage Configurations Take me to your eader! Onine Optimization of Distributed Storage Configurations Artyom Sharov Aexander Shraer Arif Merchant Murray Stokey sharov@cs.technion.ac.i, {shraex, aamerchant, mstokey}@googe.com

More information

Integrating Risk into your Plant Lifecycle A next generation software architecture for risk based

Integrating Risk into your Plant Lifecycle A next generation software architecture for risk based Integrating Risk into your Pant Lifecyce A next generation software architecture for risk based operations Dr Nic Cavanagh 1, Dr Jeremy Linn 2 and Coin Hickey 3 1 Head of Safeti Product Management, DNV

More information

Design Considerations

Design Considerations Chapter 2: Basic Virtua Private Network Depoyment Page 1 of 12 Chapter 2: Basic Virtua Private Network Depoyment Before discussing the features of Windows 2000 tunneing technoogy, it is important to estabish

More information

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation

More information

Order-to-Cash Processes

Order-to-Cash Processes TMI170 ING info pat 2:Info pat.qxt 01/12/2008 09:25 Page 1 Section Two: Order-to-Cash Processes Gregory Cronie, Head Saes, Payments and Cash Management, ING O rder-to-cash and purchase-topay processes

More information

Message. The Trade and Industry Bureau is committed to providing maximum support for Hong Kong s manufacturing and services industries.

Message. The Trade and Industry Bureau is committed to providing maximum support for Hong Kong s manufacturing and services industries. Message The Trade and Industry Bureau is committed to providing maximum support for Hong Kong s manufacturing and services industries. With the weight of our economy shifting towards knowedge-based and

More information

ASYMPTOTIC DIRECTION FOR RANDOM WALKS IN RANDOM ENVIRONMENTS arxiv:math/0512388v2 [math.pr] 11 Dec 2007

ASYMPTOTIC DIRECTION FOR RANDOM WALKS IN RANDOM ENVIRONMENTS arxiv:math/0512388v2 [math.pr] 11 Dec 2007 ASYMPTOTIC DIRECTION FOR RANDOM WALKS IN RANDOM ENVIRONMENTS arxiv:math/0512388v2 [math.pr] 11 Dec 2007 FRANÇOIS SIMENHAUS Université Paris 7, Mathématiques, case 7012, 2, pace Jussieu, 75251 Paris, France

More information

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci

SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH. Ufuk Cebeci SELECTING THE SUITABLE ERP SYSTEM: A FUZZY AHP APPROACH Ufuk Cebeci Department of Industria Engineering, Istanbu Technica University, Macka, Istanbu, Turkey - ufuk_cebeci@yahoo.com Abstract An Enterprise

More information

Teamwork. Abstract. 2.1 Overview

Teamwork. Abstract. 2.1 Overview 2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and

More information

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS

CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 CONTRIBUTION OF INTERNAL AUDITING IN THE VALUE OF A NURSING UNIT WITHIN THREE YEARS John N.. Var arvatsouakis atsouakis DURING the present time,

More information

The eg Suite Enabing Rea-Time Monitoring and Proactive Infrastructure Triage White Paper Restricted Rights Legend The information contained in this document is confidentia and subject to change without

More information

3.3 SOFTWARE RISK MANAGEMENT (SRM)

3.3 SOFTWARE RISK MANAGEMENT (SRM) 93 3.3 SOFTWARE RISK MANAGEMENT (SRM) Fig. 3.2 SRM is a process buit in five steps. The steps are: Identify Anayse Pan Track Resove The process is continuous in nature and handed dynamicay throughout ifecyce

More information

Application-Aware Data Collection in Wireless Sensor Networks

Application-Aware Data Collection in Wireless Sensor Networks Appication-Aware Data Coection in Wireess Sensor Networks Xiaoin Fang *, Hong Gao *, Jianzhong Li *, and Yingshu Li +* * Schoo of Computer Science and Technoogy, Harbin Institute of Technoogy, Harbin,

More information

Internal Control. Guidance for Directors on the Combined Code

Internal Control. Guidance for Directors on the Combined Code Interna Contro Guidance for Directors on the Combined Code ISBN 1 84152 010 1 Pubished by The Institute of Chartered Accountants in Engand & Waes Chartered Accountants Ha PO Box 433 Moorgate Pace London

More information

APIS Software Training /Consulting

APIS Software Training /Consulting APIS Software Training /Consuting IQ-Software Services APIS Informationstechnoogien GmbH The information contained in this document is subject to change without prior notice. It does not represent any

More information

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS 1 DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS 2 ASHER M. KACH, KAREN LANGE, AND REED SOLOMON Abstract. We show that if H is an effectivey competey decomposabe computabe torsion-free abeian group,

More information

This paper considers an inventory system with an assembly structure. In addition to uncertain customer

This paper considers an inventory system with an assembly structure. In addition to uncertain customer MANAGEMENT SCIENCE Vo. 51, No. 8, August 2005, pp. 1250 1265 issn 0025-1909 eissn 1526-5501 05 5108 1250 informs doi 10.1287/mnsc.1050.0394 2005 INFORMS Inventory Management for an Assemby System wh Product

More information

Hybrid Interface Solutions for next Generation Wireless Access Infrastructure

Hybrid Interface Solutions for next Generation Wireless Access Infrastructure tec. Connectivity & Networks Voker Sorhage Hybrid Interface Soutions for next Generation Wireess Access Infrastructure Broadband wireess communication wi revoutionize every aspect of peope s ives by enabing

More information

Wide-Area Traffic Management for. Cloud Services

Wide-Area Traffic Management for. Cloud Services Wide-Area Traffic Management for Coud Services Joe Wenjie Jiang A Dissertation Presented to the Facuty of Princeton University in Candidacy for the Degree of Doctor of Phiosophy Recommended for Acceptance

More information

Minimum Support Size of the Defender s Strong Stackelberg Equilibrium Strategies in Security Games

Minimum Support Size of the Defender s Strong Stackelberg Equilibrium Strategies in Security Games Minimum Support Size o the Deender s Strong Stackeberg Equiibrium Strategies in Security Games Jiarui Gan University o Chinese Academy o Sciences The Key Lab o Inteigent Inormation Processing, ICT, CAS

More information

Cooperative Content Distribution and Traffic Engineering in an ISP Network

Cooperative Content Distribution and Traffic Engineering in an ISP Network Cooperative Content Distribution and Traffic Engineering in an ISP Network Wenjie Jiang, Rui Zhang-Shen, Jennifer Rexford, Mung Chiang Department of Computer Science, and Department of Eectrica Engineering

More information

Automatic Structure Discovery for Large Source Code

Automatic Structure Discovery for Large Source Code Automatic Structure Discovery for Large Source Code By Sarge Rogatch Master Thesis Universiteit van Amsterdam, Artificia Inteigence, 2010 Automatic Structure Discovery for Large Source Code Page 1 of 130

More information

The Comparison and Selection of Programming Languages for High Energy Physics Applications

The Comparison and Selection of Programming Languages for High Energy Physics Applications The Comparison and Seection of Programming Languages for High Energy Physics Appications TN-91-6 June 1991 (TN) Bebo White Stanford Linear Acceerator Center P.O. Box 4349, Bin 97 Stanford, Caifornia 94309

More information

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server

More information

Bite-Size Steps to ITIL Success

Bite-Size Steps to ITIL Success 7 Bite-Size Steps to ITIL Success Pus making a Business Case for ITIL! Do you want to impement ITIL but don t know where to start? 7 Bite-Size Steps to ITIL Success can hep you to decide whether ITIL can

More information

Finance 360 Problem Set #6 Solutions

Finance 360 Problem Set #6 Solutions Finance 360 Probem Set #6 Soutions 1) Suppose that you are the manager of an opera house. You have a constant margina cost of production equa to $50 (i.e. each additiona person in the theatre raises your

More information

Pay-on-delivery investing

Pay-on-delivery investing Pay-on-deivery investing EVOLVE INVESTment range 1 EVOLVE INVESTMENT RANGE EVOLVE INVESTMENT RANGE 2 Picture a word where you ony pay a company once they have deivered Imagine striking oi first, before

More information

Life Contingencies Study Note for CAS Exam S. Tom Struppeck

Life Contingencies Study Note for CAS Exam S. Tom Struppeck Life Contingencies Study Note for CAS Eam S Tom Struppeck (Revised 9/19/2015) Introduction Life contingencies is a term used to describe surviva modes for human ives and resuting cash fows that start or

More information

How To Deiver Resuts

How To Deiver Resuts Message We sha make every effort to strengthen the community buiding programme which serves to foster among the peope of Hong Kong a sense of beonging and mutua care. We wi continue to impement the District

More information

Maintenance activities planning and grouping for complex structure systems

Maintenance activities planning and grouping for complex structure systems Maintenance activities panning and grouping for compex structure systems Hai Canh u, Phuc Do an, Anne Barros, Christophe Berenguer To cite this version: Hai Canh u, Phuc Do an, Anne Barros, Christophe

More information

The Productive Therapist and The Productive Clinic Peter R. Kovacek, MSA, PT

The Productive Therapist and The Productive Clinic Peter R. Kovacek, MSA, PT The Productive Therapist and The Productive Cinic Peter R. Kovacek, MSA, PT Format Interactive Discussions among equa peers Constructive argument Reaity Oriented Mutua Accountabiity Expectation Panning

More information

Technical Support Guide for online instrumental lessons

Technical Support Guide for online instrumental lessons Technica Support Guide for onine instrumenta essons This is a technica guide for Music Education Hubs, Schoos and other organisations participating in onine music essons. The guidance is based on the technica

More information

INDUSTRIAL PROCESSING SITES COMPLIANCE WITH THE NEW REGULATORY REFORM (FIRE SAFETY) ORDER 2005

INDUSTRIAL PROCESSING SITES COMPLIANCE WITH THE NEW REGULATORY REFORM (FIRE SAFETY) ORDER 2005 INDUSTRIAL PROCESSING SITES COMPLIANCE WITH THE NEW REGULATORY REFORM (FIRE SAFETY) ORDER 2005 Steven J Manchester BRE Fire and Security E-mai: manchesters@bre.co.uk The aim of this paper is to inform

More information

Hedge Fund Capital Accounts and Revaluations: Are They Section 704(b) Compliant?

Hedge Fund Capital Accounts and Revaluations: Are They Section 704(b) Compliant? o EDITED BY ROGER F. PILLOW, LL.M. PARTNERSHIPS, S CORPORATIONS & LLCs Hedge Fund Capita Accounts and Revauations: Are They Section 704(b) Compiant? THOMAS GRAY Hedge funds treated as partnerships for

More information

GreenTE: Power-Aware Traffic Engineering

GreenTE: Power-Aware Traffic Engineering GreenTE: Power-Aware Traffic Engineering Mingui Zhang zmg6@mais.tsinghua.edu.cn Cheng Yi yic@emai.arizona.edu Bin Liu iub@tsinghua.edu.cn Beichuan Zhang bzhang@arizona.edu Abstract Current network infrastructures

More information

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS

DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS DEGREES OF ORDERS ON TORSION-FREE ABELIAN GROUPS ASHER M. KACH, KAREN LANGE, AND REED SOLOMON Abstract. We show that if H is an effectivey competey decomposabe computabe torsion-free abeian group, then

More information

The growth of online Internet services during the past decade has

The growth of online Internet services during the past decade has IEEE DS Onine, Voume 2, Number 4 Designing an Adaptive CORBA Load Baancing Service Using TAO Ossama Othman, Caros O'Ryan, and Dougas C. Schmidt University of Caifornia, Irvine The growth of onine Internet

More information

The guaranteed selection. For certainty in uncertain times

The guaranteed selection. For certainty in uncertain times The guaranteed seection For certainty in uncertain times Making the right investment choice If you can t afford to take a ot of risk with your money it can be hard to find the right investment, especiay

More information

Introduction the pressure for efficiency the Estates opportunity

Introduction the pressure for efficiency the Estates opportunity Heathy Savings? A study of the proportion of NHS Trusts with an in-house Buidings Repair and Maintenance workforce, and a discussion of eary experiences of Suppies efficiency initiatives Management Summary

More information

Assigning Tasks in a 24-Hour Software Development Model

Assigning Tasks in a 24-Hour Software Development Model Assigning Tasks in a -Hour Software Deveopent Mode Pankaj Jaote, Gourav Jain Departent of Coputer Science & Engineering Indian Institute of Technoogy, Kanpur, INDIA 006 Eai:{jaote, gauravj}@iitk.ac.in

More information

Market Design & Analysis for a P2P Backup System

Market Design & Analysis for a P2P Backup System Market Design & Anaysis for a P2P Backup System Sven Seuken Schoo of Engineering & Appied Sciences Harvard University, Cambridge, MA seuken@eecs.harvard.edu Denis Chares, Max Chickering, Sidd Puri Microsoft

More information

Capacity of Multi-service Cellular Networks with Transmission-Rate Control: A Queueing Analysis

Capacity of Multi-service Cellular Networks with Transmission-Rate Control: A Queueing Analysis Capacity of Muti-service Ceuar Networs with Transmission-Rate Contro: A Queueing Anaysis Eitan Atman INRIA, BP93, 2004 Route des Lucioes, 06902 Sophia-Antipois, France aso CESIMO, Facutad de Ingeniería,

More information

Chapter 2 Traditional Software Development

Chapter 2 Traditional Software Development Chapter 2 Traditiona Software Deveopment 2.1 History of Project Management Large projects from the past must aready have had some sort of project management, such the Pyramid of Giza or Pyramid of Cheops,

More information

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization

WHITE PAPER BEsT PRAcTIcEs: PusHIng ExcEl BEyond ITs limits WITH InfoRmATIon optimization Best Practices: Pushing Exce Beyond Its Limits with Information Optimization WHITE Best Practices: Pushing Exce Beyond Its Limits with Information Optimization Executive Overview Microsoft Exce is the

More information

SABRe B2.1: Design & Development. Supplier Briefing Pack.

SABRe B2.1: Design & Development. Supplier Briefing Pack. SABRe B2.1: Design & Deveopment. Suppier Briefing Pack. 2013 Ros-Royce pc The information in this document is the property of Ros-Royce pc and may not be copied or communicated to a third party, or used

More information

EDS-Unigraphics MIS DataBroker Architecture

EDS-Unigraphics MIS DataBroker Architecture EDS-Unigraphics MIS DataBroker Architecture Jeff Greiner Bob Woodridge October 9,1996 Topics UG/MIS Probem Domain Requirements for New Architecture Seection of Java Deveoping Java Based Intranet Soutions

More information

IT Governance Principles & Key Metrics

IT Governance Principles & Key Metrics IT Governance Principes & Key Metrics Smawood Maike & Associates, Inc. 9393 W. 110th Street 51 Corporate Woods, Suite 500 Overand Park, KS 66210 Office: 913-451-6790 Good governance processes that moves

More information

An Integrated Data Management Framework of Wireless Sensor Network

An Integrated Data Management Framework of Wireless Sensor Network An Integrated Data Management Framework of Wireess Sensor Network for Agricutura Appications 1,2 Zhao Liang, 2 He Liyuan, 1 Zheng Fang, 1 Jin Xing 1 Coege of Science, Huazhong Agricutura University, Wuhan

More information

A New Statistical Approach to Network Anomaly Detection

A New Statistical Approach to Network Anomaly Detection A New Statistica Approach to Network Anomay Detection Christian Caegari, Sandrine Vaton 2, and Michee Pagano Dept of Information Engineering, University of Pisa, ITALY E-mai: {christiancaegari,mpagano}@ietunipiit

More information

Human Capital & Human Resources Certificate Programs

Human Capital & Human Resources Certificate Programs MANAGEMENT CONCEPTS Human Capita & Human Resources Certificate Programs Programs to deveop functiona and strategic skis in: Human Capita // Human Resources ENROLL TODAY! Contract Hoder Contract GS-02F-0010J

More information

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY Course Offered By: Indian Environmenta Society INTRODUCTION The Indian Environmenta Society (IES) a dynamic and fexibe organization with a goba vision

More information

Hybrid Process Algebra

Hybrid Process Algebra Hybrid Process Agebra P.J.L. Cuijpers M.A. Reniers Eindhoven University of Technoogy (TU/e) Den Doech 2 5600 MB Eindhoven, The Netherands Abstract We deveop an agebraic theory, caed hybrid process agebra

More information

Oligopoly in Insurance Markets

Oligopoly in Insurance Markets Oigopoy in Insurance Markets June 3, 2008 Abstract We consider an oigopoistic insurance market with individuas who differ in their degrees of accident probabiities. Insurers compete in coverage and premium.

More information

Business schools are the academic setting where. The current crisis has highlighted the need to redefine the role of senior managers in organizations.

Business schools are the academic setting where. The current crisis has highlighted the need to redefine the role of senior managers in organizations. c r o s os r oi a d s REDISCOVERING THE ROLE OF BUSINESS SCHOOLS The current crisis has highighted the need to redefine the roe of senior managers in organizations. JORDI CANALS Professor and Dean, IESE

More information

(12) United States Patent Rune

(12) United States Patent Rune (12) United States Patent Rune US006304913B1 (10) Patent N0.: (45) Date of Patent: US 6,304,913 B1 on. 16, 2001 (54) INTERNET SYSTEM AND METHOD FOR SELECTING A CLOSEST SERVER FROM A PLURALITY OF ALTERNATIVE

More information

Avaya Remote Feature Activation (RFA) User Guide

Avaya Remote Feature Activation (RFA) User Guide Avaya Remote Feature Activation (RFA) User Guide 03-300149 Issue 5.0 September 2007 2007 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this document

More information

500 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 3, MARCH 2013

500 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 3, MARCH 2013 500 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 3, NO. 3, MARCH 203 Cognitive Radio Network Duaity Agorithms for Utiity Maximization Liang Zheng Chee Wei Tan, Senior Member, IEEE Abstract We

More information

Comparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time

Comparison of Traditional and Open-Access Appointment Scheduling for Exponentially Distributed Service Time Journa of Heathcare Engineering Vo. 6 No. 3 Page 34 376 34 Comparison of Traditiona and Open-Access Appointment Scheduing for Exponentiay Distributed Service Chongjun Yan, PhD; Jiafu Tang *, PhD; Bowen

More information

Spatio-Temporal Asynchronous Co-Occurrence Pattern for Big Climate Data towards Long-Lead Flood Prediction

Spatio-Temporal Asynchronous Co-Occurrence Pattern for Big Climate Data towards Long-Lead Flood Prediction Spatio-Tempora Asynchronous Co-Occurrence Pattern for Big Cimate Data towards Long-Lead Food Prediction Chung-Hsien Yu, Dong Luo, Wei Ding, Joseph Cohen, David Sma and Shafiqu Isam Department of Computer

More information

Telephony Trainers with Discovery Software

Telephony Trainers with Discovery Software Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System

More information

TCP/IP Gateways and Firewalls

TCP/IP Gateways and Firewalls Gateways and Firewas 1 Gateways and Firewas Prof. Jean-Yves Le Boudec Prof. Andrzej Duda ICA, EPFL CH-1015 Ecubens http://cawww.epf.ch Gateways and Firewas Firewas 2 o architecture separates hosts and

More information

Documents de Travail du Centre d Economie de la Sorbonne

Documents de Travail du Centre d Economie de la Sorbonne Documents de Travai du Centre d Economie de a Sorbonne Rationaizabiity and Efficiency in an Asymmetric Cournot Oigopoy Gabrie DESGRANGES, Stéphane GAUTHIER 2014.28 Maison des Sciences Économiques, 106-112

More information

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud

Dynamic Pricing Trade Market for Shared Resources in IIU Federated Cloud Dynamic Pricing Trade Market or Shared Resources in IIU Federated Coud Tongrang Fan 1, Jian Liu 1, Feng Gao 1 1Schoo o Inormation Science and Technoogy, Shiiazhuang Tiedao University, Shiiazhuang, 543,

More information

Chapter 1 Structural Mechanics

Chapter 1 Structural Mechanics Chapter Structura echanics Introduction There are many different types of structures a around us. Each structure has a specific purpose or function. Some structures are simpe, whie others are compex; however

More information

Business Banking. A guide for franchises

Business Banking. A guide for franchises Business Banking A guide for franchises Hep with your franchise business, right on your doorstep A true understanding of the needs of your business: that s what makes RBS the right choice for financia

More information

effect on major accidents

effect on major accidents An Investigation into a weekend (or bank hoiday) effect on major accidents Nicoa C. Heaey 1 and Andrew G. Rushton 2 1 Heath and Safety Laboratory, Harpur Hi, Buxton, Derbyshire, SK17 9JN 2 Hazardous Instaations

More information

Ricoh Healthcare. Process Optimized. Healthcare Simplified.

Ricoh Healthcare. Process Optimized. Healthcare Simplified. Ricoh Heathcare Process Optimized. Heathcare Simpified. Rather than a destination that concudes with the eimination of a paper, the Paperess Maturity Roadmap is a continuous journey to strategicay remove

More information

UCU Continuing Professional Development

UCU Continuing Professional Development UCU Continuing Professiona Deveopment Cassroom management The background Good cassroom and behaviour management is one of the key eements of successfu teaching and earning, and wi be crucia to your success

More information

A Description of the California Partnership for Long-Term Care Prepared by the California Department of Health Care Services

A Description of the California Partnership for Long-Term Care Prepared by the California Department of Health Care Services 2012 Before You Buy A Description of the Caifornia Partnership for Long-Term Care Prepared by the Caifornia Department of Heath Care Services Page 1 of 13 Ony ong-term care insurance poicies bearing any

More information

Delhi Business Review X Vol. 4, No. 2, July - December 2003. Mohammad Talha

Delhi Business Review X Vol. 4, No. 2, July - December 2003. Mohammad Talha Dehi Business Review X Vo. 4, No. 2, Juy - December 2003 TREATMENT TMENT OF GOODWILL IN ACCOUNTING Mohammad Taha GOODWILL is usuay ony recorded in an accounting system when a company purchases an unincorporated

More information

Uncovered Report: Cash Plan and Private Health Insurance Explained

Uncovered Report: Cash Plan and Private Health Insurance Explained Uncovered Report: Cash Pan and Private Heath Insurance Expained Contents 3 Introduction 4 Cash pan products 6 Private heath insurance products 9 How the two pans match up? 10 Concusion 33256_ONEGI_GEN3480_BRO.indd

More information