Stochastic Games on a Multiple Access Channel
|
|
- Suzan Miles
- 8 years ago
- Views:
Transcription
1 Stochastc Games on a Multple Access Channel Prashant N and Vnod Sharma Department of Electrcal Communcaton Engneerng Indan Insttute of Scence, Bangalore , Inda Emal: prashant2406@gmal.com, vnod@ece.sc.ernet.n arxv: v1 [cs.sy] 29 Oct 2012 Abstract We consder a scenaro where N users try to access a common base staton. Assocated wth each user s ts channel state and a fnte queue whch vares wth tme. Each user chooses hs power and the admsson control varable n a dynamc manner so as to maxmze hs expected throughput. The throughput of each user s a functon of the actons and states of all users. The scenaro consders the stuaton where each user knows hs channel and buffer state but s unaware of the states and actons taken by the other users. We consder the scenaro when each user s saturated (.e., always has a packet to transmt) as well as the case when each user s unsaturated. We formulate the problem as a Markov game and show connectons wth strategc form games. We then consder varous throughput functons assocated wth the multple user channel and provde algorthms for fndng these equlbra. Keywords: Multple access channel, Stochastc games, Statonary polces, Strategc form games, Nash equlbra, Potental games. I. INTRODUCTION There has been a tremendous growth of wreless communcaton systems over the last few years. The success of wreless systems s prmarly due to the effcent use of ther resources. The users are able to obtan ther qualty of servce effcently n a tme varyng rado channel by adjustng ther own transmsson powers. Dstrbuted control of resources s an nterestng area of study snce ts alternatve nvolves hgh system complexty and large nfrastructure due the presence of a central controller. Noncooperatve game theory [1] s a natural tool to desgn and analyze wreless systems wth dstrbuted control of resources. Scutar et al. [3], [4] analyzed compettve maxmzaton of transmsson rate and mutual nformaton on the multple access channel subject to power and other constrants. Hekknen [5] analyzed dstrbuted power control problems va potental games whle La et al.[2] appled game theoretc framework to resource allocaton problem n fadng multple access channel. Altman et al. [6] studed the problem of maxmzng throughput of saturated users (a user always has a packet to transmt) who have a Markov modelled channel and are subjected to power constrants.they consdered both the centralzed scenaro where the base staton chooses the transmsson power levels for all users as well as the decentralzed scenaro where each user chooses ts own power level based on the condton of ts rado channel. Altman et al. [7] later consderd the problem of maxmzng the throughput of users n a dstrbuted manner subject to both power and buffer constrants. The decentralzed scenaro n [6] whle the dstrbuted resource allocaton problem n [7] was analyzed as constraned Markov games wth ndependent state nformaton,.e., no user knows other user s state. The proof of exstence of the equlbrum polces for such games was gven n [8]. An algorthm whch guaranteed convergence to the equlbrum polces for two users for any throughput functon of the two users and an algorthm whch guaranteed convergence to the equlbrum polces for N users when ther throughput functons are dentcal were provded n [9]. Our work s closely related to the above mentoned work. When restrcted to the objectve functons n [6], [7] our problem s exactly the same however we present an alternatve vew of constraned Markov games wth ndependent state nformaton. Wth ths vew we connect the theory to strategc form games [10]. The exstence of equlbrum polces follows drectly from ths vewpont. Ths ncludes both the saturated as well as the unsaturated scenaro consdered n [6] and [7] respectvely. We also show that the algorthm whch guaranteed convergence to the equlbrum polces for N users can be extended to cases where the throughput functons of the users may be dfferent. Besdes presentng an unfed vew of both the saturated as well as the unsaturated problem, we also consder the case where the base staton uses a successve nterfence cancellaton rather than a regular matched flter. Here we formulate both the non-cooperatve and the cooperatve (team problem) setup and fnd the equlbra for both the problems. The paper s structured as follows. In Secton II we present the system model for both the saturated (no buffer constrants) and the unsaturated (both buffer and power constrants) scenaro. In Secton III we setup the problem as a constraned Markov game wth ndependent state nformaton and defne the so called equvalent strategc form game. Here we provde a proof of exstence of equlbrum polces and defne the dea of a pure strategy and potental functon for Markov games. In Secton IV we consder varous throughput functons assocated wth the multple access channel. In Secton V we develop algorthms to compute these equlbrum polces. Secton VI concludes the paper. II. SYSTEM MODEL We consder a scenaro where a set N = {1,,N} of users access the base staton through a channel smultaneously. Tme s dvded nto slots. The channel for user s modelled as an ergodc Markov chan k [n] takng values from a fnte ndex set K = {0,1,2,,km }. The channel gan for user
2 n ndex k s h (k ) where functon h : K [0 1]. We assume h (0) = 0. The transton probablty of user gong from channel ndex k to k s P kk. We assume that n each tme slot each user knows hs channel ndex perfectly but does not know the channel ndex of the other users. Each user has a set of power ndexes L = {0,1,2,,lm } where l m s the largest power ndex. The power nvested by user at tme n s gven by the functon p : L R wth the property that p (0) = 0,.e., there s no power nvested by user at power ndex l = 0. Let l [n] represent the power ndex followed by user. For the unsaturated case each user has a queue of fnte length q m. Denote Q = {0,1,2,,qm }. Let γ [n] packets arrve n the queue at tme slot n from the hgher layers where {γ [n],n 0} are ndependent and dentcally dstrbuted (d) wth dstrbuton τ. In each tme slot a user may transmt atmost one packet from ts queue f t s not empty. Let d [n] D = {0,1} be the admsson control varable for user where d [n] = 1 denotes acceptng all packets from the upper layer and d [n] = 0 denotes rejectng all packets. The ncomng packets are accepted untll the buffer s full, the remanng packets are dropped. We assume that a user has no nformaton about the queues of other users. If q [n] and w [n] denote the number of packets n the queue and the number of departures from the buffer n slot n then the queue dynamcs are gven as, q [n+1] = mn([q [n]+d [n]γ [n] w [n]] +,q m). (1) In tme slot n the state x [n] and the acton a [n] of user s defned as, x [n] = (k [n],q [n]), a [n] = (l [n],c [n]). (2) The set of states X and the set of actons A of user are denoted as X = K Q and A = L D respectvely. The set of states (actons) other than that of user s denoted as X (A ) whle the set of all states (actons) of all users s denoted as X (A) respectvely. In the followng we wll present the detals for the unsaturated case and then comment brefly for the saturated case. A. Instantaneous throughput and cost for user : The throughput obtaned by user s gven by the functon t : K L R + satsfyng t (k,l) = 0 f k = 0 or l = 0 where K = N =1 K and A = N =1 A. Ths mples that the throughput obtaned by user s 0 f the channel s very bad or there s no power nvested by the user. Note that the throughput of user depends on the global channel ndex k and global power ndexl of all users. We defne the throughput (t ) and the cost (c j ) of user at tme n as, t (x[n],a[n]) = t (k[n],1 {q[n] 0} l [n]; N), (3) c 1 (x[n],a[n]) = p (k [n]), c 2 (x[n],a[n]) = q [n], (4) where 1 A represents the ndcator functon and s 1 f event A s true. We observe that there s a power cost and a queung cost for user due to strngent delay requrements whch have to be met by the user. B. Transton probablty under each acton: We defne the transton probablty P xa x of user gong from state x to state x under the acton a as, P xa x = P kk P qa q, (5) where P qa q s the transton probablty of user gong from state q to state q under acton a. C. Saturated system: In the saturated system each user always has a packet to transmt at each tme. Thus there s only a power cost for every user. Th state, acton and transton probablty of user get modfed as, x [n] = k [n], a [n] = l [n],and P xa x = P kk whle the nstantaneous throughput and cost for user are t (x[n],a[n]) = t (k[n],l[n]) and c 1 (x[n],a[n]) = p (k [n]) respectvely. D. Statonary polces: LetM (G) be the set of probablty measures over a set G. A statonary polcy for user s a functon u : X M (A ). The value u (a x ) represents the probablty of user takng acton a when t s n state x. We denote the set of statonary polces for user as U and the set of all statonary multpolces as U = N =1 U. The set of statonary multpolces of all users other than user s denoted as U. E. Expected tme-average rate, costs and constrants: Let x 0 := x[0] represent the ntal state of all users. Gven a statonary multpolcy u for all players, Pu x0 denotes the dstrbuton of the stochastc process (x[n], a[n]). The expectaton due to ths dstrbuton s denoted as E x0 u. We now defne the tme-average expected rate as, T (u) := lmsup T 1 T T n=1 E x0 u (t (x[n],a[n])). (6) where the expected tme average costs are subject to constrants, C k (u ) := lmsup T 1 T T n=1 E x0 u (c k (x[n],a[n])) Ck. (7) wherec 1 = P andc 2 = Q. In case of the saturated scenaro k = 1 otherwse k {1,2}. A polcy u s called feasble f t satsfes C k (u ) C k k and s called feasble f t s -feasble for all users N.
3 III. GAME THEORETIC FORMULATION Each user chooses a statonary polcy u U so as to maxmze hs expected average reward T (u). However T (u) depends on the statonary polcy of other users also leadng to a noncooperatve game. We denote the above formulaton as a constraned Markov game [8], [11], Γ cmg = [N,(X ),(A ),(P ),(t ),(c k ),(Ck ) ] where the elements of the above tuple are as defned prevously. Let [u,v ] denote the multpolcy where, users k use statonary polcy u k whle user uses polcy v. We now defne the Constraned Nash Equllbrum (CNE). Defnton 1: A multpolcy u U s called a CNE f for each player N and for any v U such that [u,v ] s feasble, T (u) T (u,v ). (8) A feasble polcy u s called an optmal response of player aganst a multpolcy u of other users f for any other feasble polcy v, (13) holds. In ths paper we lmt ourselves to statonary CNE as aganst general hstory dependent Nash equlbra. These are easy to mplement and are usually the subject of study. It s shown n [8] that statonary Nash equlbra are Nash equlbra n the general class of polces also although may only be a proper subset. A. Calculaton of optmal response Denote the transton probablty of user gong from state x to state y under the polcy u as, P xu y = a A u (a x )P xa y. (9) Defne the mmedate reward for user, when user has state x and takes acton a and other users use multpolcy u as, R (x,a ) = [ l (a l x l )π l u u l (x l )]t (x,a), (10) (x,a ) where π u l (x l ) s the steady state probablty of user l beng n state x l when t uses polcy u l. Gven the statonary polcy u U defne the occupaton measure as, z (x,a ) = π u (x ) u (a x ). (11) The occupaton measurez (x,a ) for user s the steady-state probablty of the user beng n state x X and usng acton a A. Gven the occupaton measurez the statonary polcy u s: u (a x ) = z (x,a ) a A z (x,a ), (x,a ) X A. (12), Then the tme-average expected rate and costs under the multpolcy u are: T (u) = R (x,a )z (x,a ), (13) C k (u ) = B. Best response of player c k (x,a )z (x,a ). (14) Let all users other than user use the multpolcy u. Then user has an optmal statonary best response polcy whch s ndependent of the ntal state x 0 [8]. Let the set of optmal statonary polces of user be denoted as BR(u ). We can compute the elements of ths set from the followng Lnear program: Fnd z = [z (x,a )],(x,a ) X A that maxmzes: T (u) = R (x,a )z (x,a ), (15) subject to C k (u ) = [1 y (x ) P ya x ]z (x,a ) = 0, y X, (16) c k (x,a )z (x,a ) C k, k {1,2}, (17) z (x,a ) = 1, z (x,a ) 0, (x,y ) X Y. (18) Note that the above Lnear program can be modfed for the saturated scenaro smply by choosng k = 1. The Lnear program for the saturated scenaro can be presented n a much smpler form [6]. The constrants (21 23) are referred n matrx form as A us z b us. C. Equvalent Strategc form game: In ths secton we wll show that the above Markov game s equvalent to a usual strategc form (nonstochastc) game. We wll use ths equvalence to show exstence of the CNE and also provde algorthms to fnd them and show ther convergence. Defne a Strategc form gameγ E = N,{V } N,{r } N where V := {1,2,,v m}. Each pont v V corresponds to the endpont [z (x,a )];(x,a ) X A of the polyhedron formed due to constrants A us z b us and wll be denoted as v := [v (x,a )];(x,a ) X A. The utlty functon r : V R where V = N V s defned as, r (v) = r (v 1,v 2,,v N ) := R v (x,a )v (x,a ), where R v (x,a ) := l (19) v l (x l,a l )t (x,a). (20)
4 Letλ be a mxed strategy for player. Denote the set of mxed strateges of player as (V ). The expected utlty of player when all players use strategy tuple λ = (λ 1,λ 2,,λ N ) s gven as r (λ) := E λ (r ) where E λ (.) denotes expectaton wth respect to the global mxed strategy λ. Defne the set of optmal strateges for player, when other players use strategy λ as, { } BR(λ ) = λ : λ argmax λ r (λ,λ ). (21) D. Exstence of Nash Equllbrum The followng proposton establshes a connecton between any global multpolcy u for the constraned Markov game Γ cmg and some global mxed strategy λ n the equvalent strategc form game Γ E. Proposton 1: There exst a u BR(u ) gven any multpolcy u of players other than f and only f there exst λ for players other than and a λ BR(λ ) such that T (u,u ) = r (λ,λ ) Proof: Refer to [11]. The exstence of CNE for the constraned Markov game Γ cmg follows from the above proposton. Theorem 1: There exst a CNE for the Constraned Markov game Γ cmg. Proof: There exst a mxed strategy Nash equlbrum for the equvalent strategc form game Γ E [1], let t be denoted by λ. It follows then, that r (λ,λ ) r (λ,λ ), λ, N. From proposton 1 we can fnd equvalent u for λ such that T (u,u ) = r (λ,λ ) r (λ,λ ) = T (u,u ), u U, N. Ths proves that u s a CNE. E. Potental Games We frst defne the dea of a pure strategy and pure startegy Nash equlbrum (PSNE) for the constraned Markov game Γ cmg. Defnton 2: A polcyu for players called a pure polcy or pure strategy of the constraned Markov game Γ cmg f the mxed strategy λ correspondng to ths polcy s a pure strategy. We say that a constraned Markov game Γ cmg has a PSNE f the equvalent startegc form game has a PSNE. Defnton 3: A strategc form game Γ s called a potental game f there exsts a functon r : V R such that N, r 1(v,v ) r 1(ˆv,v ) = ( r(v,v ) r(ˆv,v ) ) v,ˆv V, v V. Γ cmg s a potental game f the correspondng Γ E s a potental game. Consder the class of strategc form games, ( Ξ := Γ(k) = ) N,{L } N,{t (k)} N : k K (22) Lemma 1: If Γ(k) s a potental game for each k K, then the constraned Markov game Γ cmg s a potental game. Proof: Refer to [11]. Refer to an example n [11]. IV. THROUGHPUT FUNCTIONS The base staton may use a regular matched flter or a successve nterference cancellaton (SIC) flter. We assume that each user s aware of the flter adopted at the base staton to decode ther respectve transmssons. Any of the two cases results n dfferent throughput functons for the users whch we characterze n the subsequent subsectons. A. Regular matched flter When the base staton uses a regular matched flter the receved packet of any user s decoded by treatng the sgnals of other users as nose. In ths case, the throughput functons for user s, t n (k,l) = log 2 ( 1+ ) h (k )p (l ) N 0 + N j=1,j h. (23) j(k j )p j (l j ) Note that t n (k,l) s an upper bound for the throughput of user. On the other hand the users may want to maxmze the aggregrated throughput n a decentralzed manner. In ths case the jont objectve functon when they use acton a A at state x X s, t s (k,l) = N =1 t n (k,l). (24) The nterference cancellaton Markov game s Γ cmg wth t = t n and the sum throughput game s Γ cmg wth t = t s. The nterference canccellaton Markov game and the sum throughput Markov game are denoted as Γ n cmg and Γs cmg respectvely. These throughput functons were consdered n [7], [6]. B. Successve Interference Cancellaton When the base staton uses a successve nterference cancellaton flter t decodes the data of users n a predefned order at each tme slot. Gven an orderng scheme on the the set of users N, the receved packet of a user s decoded after cancellng out the decoded transmsson of other users lyng below user n the predefned order from the receved transmsson. We assume perfect cancellaton of the decoded sgnal from the receved transmsson [7]. We frst show how to choose the decodng order for each tme slot. We defne the Endpont SIC schemes where the decodng order s fxed for all tme slots. Now usng the latter we defne the Randomzed SIC schemes where the decodng order for each tme slot s chosen randomly from some dstrbuton. We assume that the dstrbuton s known to all users but they do not know the decodng order at each tme slot. 1) Endpont SIC schemes: Here the decodng order s same for each tme slot n. Gven the set of users N defne the m- th permutaton set of N as the ordered set σ N (m) where m represents one of the possble N! permutaton. Let B (m) denote the set of players who are ndexed above user n
5 the set σ N (m). We defne the m-th utlty functon of user as, ) t m h (k )p (l ) (k,l) = log 2 (1+ N 0 + j B h. (25) (m) j(k j )p j (l j ) The above utlty functon for player ndcates that all users ndexed below usern the set σ N (m) are decoded before user and ther sgnal s cancelled out from the receved sgnal, after whch, user sgnal s decoded. The m-th endpont SIC Markov game s Γ cmg wth t = t m N and s denoted as Γ m cmg. 2) Randomzed SIC schemes: Here the decodng order s chosen at each tme slot n wth a probablty. Though each user knows the probablty dstrbuton at each tme slot n, he does not know the exact decodng order. If probablty mass functon α = {α(m)} over the set N! = {1,2,,N!} s chosen then the utlty functon of user as, t α (k,l) = N! m=1 α(m)t m (k,l). (26) The α randomzed SIC Markov game s Γ cmg wth t = t α N and s denoted as Γ α cmg. Note that the randomzatons α such that α(m) = 1 for some m corresponds to the endpont game Γ m cmg. In the next subsecton we fnd randomzatons α, for whch Γ α cmg has a pure strategy Nash equlbrum. 3) Randomzed games wth PSNE: In ths scton we construct randomzatons α for whch the resultng randomzed games have PSNE s. Take a partton P 1,P 2,,P k of the set N where 1 k N. Let s(p a ) = P 1,P 2,,P k denote ths partcular partton of the set N where p a ndexes ths partcular partton of the set N. Let s(p a,p e ) = (P e1 P e2 P ek ) denote the ordered set formed by the p e -th permutaton of the parttons P 1,P 2,,P k. Note that 1 p e k!. Defne the Support set S(p a,p e ) as, S(p a,p e ) := { m : σ N (m) = σ Pe1 (m 1 )σ Pe2 (m 2 ) σ Pek (m k ) } 1 m 1 P e1!,,1 m k P ek!. where σ G (m) refers to the m-th permutaton of the set G. The set S(p a,p e ) contans all the permutatons m for whch the randomzaton α (to be defned next) has a postve value,.e α(m) > 0 m S(p a,p e ). We now defne the randomzaton α(p a,p e ) as, { 1 α(m) = P 1! P 2! P k! ; m S(p a,p e ) (27) 0 ; otherwse. The followng example shows the constructon for N = {1,2,3} Example 1: N = {1,2,3}. The permutaton sets of N are σ N (1) = (1,2,3), σ N (2) = (1,3,2), σ N (3) = (2,1,3), σ N (4) = (2,3,1), σ N (5) = (3,1,2) and σ N (6) = (3,2,1). The possble parttons of the set N are s(1) = {1},{2},{3}, s(2) = {1,2},{3}, s(3) = {1,3},{2}, s(4) = {3, 2},{1} and s(5) = {1, 2, 3}. The ordered set formed due to the correspondng permutatons of the parttons are s(1,1) = ({1}{2}{3}), s(1,2) = ({1}{3}{2}), s(1,3) = ({2}{1}{3}),s(1,4) = ({2}{3}{1}),s(1,5) = ({3}{1}{2}), s(1,6) = ({3}{2}{1}), s(2,1) = ({1}{2,3}), s(2,2) = ({2,3}{1}), s(3,1) = ({2}{1,3}), s(3,2) = ({1,3}{2}), s(4,1) = ({3}{1,2}), s(4,2) = ({1,2}{3}) and s(5) = ({1,2,3}). The support sets resultng from the above ordered sets are S(1,1) = {1}, S(1,2) = {2}, S(1,3) = {3}, S(1,4) = {4}, S(1,5) = {5}, S(1,6) = {6}, S(2,1) = {1,2}, S(2,2) = {4,6}, S(3,1) = {3,4}, S(3,2) = {2,5}, S(4,1) = {5,6}, S(4,2) = {1,3} and S(5,1) = {1,2,3,4,5,6} The above support set lead to the followng randomzatons: TABLE I RANDOMIZATIONS WITH PSNE α(p a,p e) α(1) α(2) α(3) α(4) α(5) α(6) α(1, 1) 1 0) α(1, 2) α(1, 3) α(1, 4) α(1, 5) α(1, 6) α(2, 1) 1/2 1/ α(2, 2) /2 0 1/2 α(3, 1) 0 0 1/2 1/2 0 0 α(3, 2) 0 1/ /2 0 α(4, 1) /2 1/2 α(4, 2) 1/2 0 1/ α(5, 1) 1/6 1/6 1/6 1/6 1/6 1/6 The next theorem shows that the randomzatons constructed n ths secton lead to games whch have PSNE s. Theorem 2: Any Markov game Γ α cmg wth α = α(p a,p e ) has a pure strategy Nash equlbrum. Proof: Refer to [11]. C. Sum Capacty utlty functon We defne the sum capacty utlty functon as, N t sc =1 (k,l) = log 2 (1+ h ) (k )p (l ). (28) N 0 For any probablty dstrbuton α we have, N t α (k,l) = t sc (k,l). =1 We can nterpret the sum capacty utlty functon as the aggregrated sum throughput that each user maxmzes n a decentralzed manner when the base staton s usng a SIC decoder. The Sum capacty Markov game s Γ cmg wth t = t sc N and s denoted as Γ sc cmg. V. ALGORITHMS In ths secton we gve the algorthms to compute the CNE for the Markov games Γ n cmg, Γsc cmg, Γs cmg and Γα cmg whenever α = α(p a,p e ) for some partton s(p a ) of N and
6 permutaton p e of the partton sets. Algorthm 1 s used to compute the Nash equlbrum for the frst three Markov games whle algorthm 2 s used to compute the equlbrum for the randomzed game Γ α cmg. Note that algorthm 1 was consdered n [6] and ts proof for dentcal nterest throughput functons (.e., Γ s cmg) was also gven. We extend the proof for Γ s cmg. Algorthm 1 Intalze multpolcy u 0 U for all 1 N do Compute u k BR(u ) by solvng the LP usng the smplex algorthm where u = (u k 1,uk 2,,uk 1,uk 1,,u k 1 N ). f T (u k,u )=T (u k 1,u ) then then the updated value u k end f end for f u k = u k 1 then stop, else go to step 2 end f u k s the CNE := uk 1 We defne the restrcton ofγ cmg whch s used n algorthm 2. Gven any set S N of users and polcy u 0 for all N/S, we defne the restrcton of Γ cmg on the set S as the constraned Markov game wth the set S of users partcpatng n the game Γ cmg whle the users N/S use the predefned polcy u 0. We denote the restrcted game as Γ cmg(s). Let s(p a,p e ) = P e1 P e2 P ek denote the ordered set formed by the p e -th permutaton of the partton s(p a ) = P 1,P 2,,P k. We compute the PSNE for the game Γ α cmg nduced by the partton p a and permutaton p e. Algorthm 2 Intalze multpolcy u 0 U for all 1 j k do f user P el where l < j then Set u = u end f f user P el where l > j then Set u = u 0 end f Compute u k for all P ej by restrctng algorthm 1 on the restrcted Markov game Γ cmg (P ej ). Set u = uk for all P ej. end for u, N s the requred PSNE. The convergence of algorthms 1 and 2 s proved n [11]. VI. NUMERICAL RESULTS The channel model consdered s the BF-FSMC model [7]: The channel transton probabltes are P 0,0 = 1/2, P 0,1 = 1/2, P k m,km 1 = 1/2, P k m,km = 1/2 ;P k,k = 1/3, P k,k 1 = 1/3, P k,k +1 = 1/3 (1 k km 1). The channel gan and the power functon are h = k /(k m ) and p = l respectvely. The followng parameters are fxed for all user: k m = 3, l m = 5, q m = 10, P = 2 and Q = 5. γ [n] has a Posson dstrbuton wth rate.3 and N 0 = 1. The throughput obtaned at the equlbra for the varous games are tabulated n Table II n the user order {1,2,3}. Note that the randomzed game α(2, 1) has multple equlbra. Please refer to [11] for the optmal polces. : TABLE II OPTIMAL USER THROUGHPUT Game / System Model Saturated Unsaturated Γ n cmg.5263,.5263, ,.4649,.4649 Γ α cmg α = α(1, 1) ,.6969, ,.5649,.4649 Γ α cmg α = α(4, 2).8836,.8836, ,.6299,.4649 Γ α cmg α = α(5, 1).7566,.7566, ,.5749,.5749 Γ α cmg ,.6035,.5987 α = α(2, 1) ,.5987, ,.5149,.5149 Γ s cmg Γ sc cmg ACKNOWLEDGEMENTS The authors would lke to thank Professor Altman for nterestng dscussons about the paper. VII. CONCLUSIONS We have consdered decentralzed schedulng of a Wreless channel by multple users. The users may be saturated or unsaturated. The decoder at the base staton may employ a matched flter or successve nterfernce cancellaton. The users know only ther own channel states. The system s modelled as a constraned Markov game wth ndependent state nformaton. We have proved the exstence of equlbrum polces and provded algorthms to fnd these polces. For ths, we frst convert the Markov game nto an equvalent strategc form game. REFERENCES [1] Z Han, D Nyato, W Saad, T Basar, A Hjorungnes, Game Theory n Wreless and Communcaton Networks [2] L. La and H. El Gamal, The water-fllng game n fadng multple-access channels, IEEE Trans. Inform. Theory, vol. 54, no. 5, pp , May [3] G Scutar, D P. Palomar, and S Barbarossa, Optmal Lnear Precodng Strateges for Wdeband Noncooperatve Systems Based on Game Theory Part I: Nash Equlbra n IEEE Transacton on Sgnal Processng, vol. 56, no. 3, pp , March [4] G Scutar, D P. Palomar, and S Barbarossa, Optmal Lnear Precodng Strateges for Wdeband Noncooperatve Systems Based on Game Theory Part II: Algorthms n IEEE Transacton on Sgnal Processng, vol. 56, no. 3, pp , March [5] T. Hekknen, A potental game approach to dstrbuted power control and schedulng,n Computer Networks, vol. 50, no. 13, pp , September [6] E. Altman, K. Avrachenkov, G. Mller, and B. Prabhu, Uplnk dynamc dscrete power control n cellular networks,inria Techncal Report 5818, 2006
7 [7] E Altman, K Avrachenkov, N Bonneau, M Debbah, R El-Azouz, D Menasch, Constraned Stochastc Games n Wreless Networks Globecomm, 2008 [8] E. Altman, Constraned cost coupled stochastc games wth ndependent state nformaton to be publshed n Operatons Research Letters, vol. 36, no. 2, Mar [9] E. Altman, K. Avrachenkov, N. Bonneau, M. Debbah, R. El-Azouz, and D. Menasch, Constraned stochastc games: Dynamc control n wreless networks Tech Report, 2007, www-net.cs.umass.edu/sadoc/mdp. [10] D. Monderer and L. S. Shapley, Potental games, n Games and Economc Behavor, vol. 14, no. 1, pp May [11] N Prashant and Vnod Sharma, Stochastc Games on the Multple Access Channel Submtted to arxv pre-prnt server, October 2012
Luby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
More informationA Lyapunov Optimization Approach to Repeated Stochastic Games
PROC. ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, OCT. 2013 1 A Lyapunov Optmzaton Approach to Repeated Stochastc Games Mchael J. Neely Unversty of Southern Calforna http://www-bcf.usc.edu/
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationExtending Probabilistic Dynamic Epistemic Logic
Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationINVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationDynamic Pricing for Smart Grid with Reinforcement Learning
Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,
More information1 Example 1: Axis-aligned rectangles
COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton
More informationCALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS
CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS Novella Bartoln 1, Imrch Chlamtac 2 1 Dpartmento d Informatca, Unverstà d Roma La Sapenza, Roma, Italy novella@ds.unroma1.t 2 Center for Advanced
More informationSlow Fading Channel Selection: A Restless Multi-Armed Bandit Formulation
Slow Fadng Channel Selecton: A Restless Mult-Armed Bandt Formulaton Konstantn Avrachenkov INRIA, Maestro Team BP95, 06902 Sopha Antpols, France Emal: k.avrachenkov@sopha.nra.fr Laura Cottatellucc, Lorenzo
More informationDISTRIBUTED storage systems have been becoming increasingly
268 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 28, NO. 2, FEBRUARY 2010 Cooperatve Recovery of Dstrbuted Storage Systems from Multple Losses wth Network Codng Yuchong Hu, Ynlong Xu, Xaozhao
More informationNON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia
To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationQoS-Aware Spectrum Sharing in Cognitive Wireless Networks
QoS-Aware Spectrum Sharng n Cogntve reless Networks Long Le and Ekram Hossan Abstract e consder QoS-aware spectrum sharng n cogntve wreless networks where secondary users are allowed to access the spectrum
More informationCombinatorial Agency of Threshold Functions
Combnatoral Agency of Threshold Functons Shal Jan Computer Scence Department Yale Unversty New Haven, CT 06520 shal.jan@yale.edu Davd C. Parkes School of Engneerng and Appled Scences Harvard Unversty Cambrdge,
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationAn Intelligent Policy System for Channel Allocation of Information Appliance
Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department
More informationMinimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
More informationPAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
More informationDownlink Power Allocation for Multi-class. Wireless Systems
Downlnk Power Allocaton for Mult-class 1 Wreless Systems Jang-Won Lee, Rav R. Mazumdar, and Ness B. Shroff School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette, IN 47907, USA {lee46,
More informationEfficient Project Portfolio as a tool for Enterprise Risk Management
Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse
More informationPower-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
More informationAn MILP model for planning of batch plants operating in a campaign-mode
An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN yfumero@santafe-concet.gov.ar Gabrela Corsano Insttuto de Desarrollo y Dseño
More informationHow To Solve An Onlne Control Polcy On A Vrtualzed Data Center
Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu
More informationHow Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence
1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh
More informationCoordinated Denial-of-Service Attacks in IEEE 802.22 Networks
Coordnated Denal-of-Servce Attacks n IEEE 82.22 Networks Y Tan Department of ECE Stevens Insttute of Technology Hoboken, NJ Emal: ytan@stevens.edu Shamk Sengupta Department of Math. & Comp. Sc. John Jay
More informationPSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
More informationJoint Scheduling of Processing and Shuffle Phases in MapReduce Systems
Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent
More informationOptimization of Resource Allocation in Wireless Systems Based on Game Theory
Internatonal Journal of Computer Scences and Engneerng Open Access Research Paper Volume-4, Issue-1 E-ISSN: 347-693 Optmzaton of Resource Allocaton n Wreless Systems Based on Game Theory Sara Rah 1*, Al
More informationv a 1 b 1 i, a 2 b 2 i,..., a n b n i.
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are
More information8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
More informationdenote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node
Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate
More informationProduct-Form Stationary Distributions for Deficiency Zero Chemical Reaction Networks
Bulletn of Mathematcal Bology (21 DOI 1.17/s11538-1-9517-4 ORIGINAL ARTICLE Product-Form Statonary Dstrbutons for Defcency Zero Chemcal Reacton Networks Davd F. Anderson, Gheorghe Cracun, Thomas G. Kurtz
More information1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
More informationAddendum to: Importing Skill-Biased Technology
Addendum to: Importng Skll-Based Technology Arel Bursten UCLA and NBER Javer Cravno UCLA August 202 Jonathan Vogel Columba and NBER Abstract Ths Addendum derves the results dscussed n secton 3.3 of our
More informationOPTIMAL INVESTMENT POLICIES FOR THE HORSE RACE MODEL. Thomas S. Ferguson and C. Zachary Gilstein UCLA and Bell Communications May 1985, revised 2004
OPTIMAL INVESTMENT POLICIES FOR THE HORSE RACE MODEL Thomas S. Ferguson and C. Zachary Glsten UCLA and Bell Communcatons May 985, revsed 2004 Abstract. Optmal nvestment polces for maxmzng the expected
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationRate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process
Dsadvantages of cyclc TDDB47 Real Tme Systems Manual scheduler constructon Cannot deal wth any runtme changes What happens f we add a task to the set? Real-Tme Systems Laboratory Department of Computer
More informationEnergy Conserving Routing in Wireless Ad-hoc Networks
Energy Conservng Routng n Wreless Ad-hoc Networks Jae-Hwan Chang and Leandros Tassulas Department of Electrcal and Computer Engneerng & Insttute for Systems Research Unversty of Maryland at College ark
More informationThe Greedy Method. Introduction. 0/1 Knapsack Problem
The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton
More informationProject Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
More informationEconomic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks
Economc-Robust Transmsson Opportunty Aucton n Mult-hop Wreless Networks Mng L, Pan L, Mao Pan, and Jnyuan Sun Department of Electrcal and Computer Engneerng, Msssspp State Unversty, Msssspp State, MS 39762
More informationJ. Parallel Distrib. Comput.
J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n
More informationAN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION
The Medterranean Journal of Computers and Networks, Vol. 2, No. 1, 2006 57 AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION L. Bada 1,*, M. Zorz 2 1 Department of Engneerng,
More informationEnabling P2P One-view Multi-party Video Conferencing
Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P
More informationOn File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network
On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg
More informationRelay Secrecy in Wireless Networks with Eavesdropper
Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationBandwdth Packng E. G. Coman, Jr. and A. L. Stolyar Bell Labs, Lucent Technologes Murray Hll, NJ 07974 fegc,stolyarg@research.bell-labs.com Abstract We model a server that allocates varyng amounts of bandwdth
More informationAN optimization problem to maximize the up-link
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 57, NO. 8, AUGUST 29 2225 Power and Rate Control wth Outage Constrants n CDMA Wreless Networks C. Fschone, M. Butuss, K. H. Johansson, and M. D Angelo Abstract
More informationEfficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,
More informationFair and Efficient User-Network Association Algorithm for Multi-Technology Wireless Networks
Far and Effcent User-Network Assocaton Algorthm for Mult-Technology Wreless Networks Perre Coucheney, Cornne Touat and Bruno Gaujal INRIA Rhône-Alpes and LIG, MESCAL project, Grenoble France, {perre.coucheney,
More informationOn the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
More information行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告
行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 畫 類 別 : 個 別 型 計 畫 半 導 體 產 業 大 型 廠 房 之 設 施 規 劃 計 畫 編 號 :NSC 96-2628-E-009-026-MY3 執 行 期 間 : 2007 年 8 月 1 日 至 2010 年 7 月 31 日 計 畫 主 持 人 : 巫 木 誠 共 同
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationAvailability-Based Path Selection and Network Vulnerability Assessment
Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl
More information) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance
Calbraton Method Instances of the Cell class (one nstance for each FMS cell) contan ADC raw data and methods assocated wth each partcular FMS cell. The calbraton method ncludes event selecton (Class Cell
More informationDownlink Scheduling and Resource Allocation for OFDM Systems
288 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 1, JANUARY 2009 Downlnk Schedulng and Resource Allocaton for OFDM Systems Janwe Huang, Member, IEEE, Vjay G. Subramanan, Member, IEEE, Rajeev
More informationOptimal Call Routing in VoIP
Optmal Call Routng n VoIP Costas Courcoubets Department of Computer Scence Athens Unversty of Economcs and Busness 47A Evelpdon Str Athens 11363, GR Emal: courcou@aueb.gr Costas Kalogros Department of
More informationSolving Factored MDPs with Continuous and Discrete Variables
Solvng Factored MPs wth Contnuous and screte Varables Carlos Guestrn Berkeley Research Center Intel Corporaton Mlos Hauskrecht epartment of Computer Scence Unversty of Pttsburgh Branslav Kveton Intellgent
More informationANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,
More informationData Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
More informationGeneral Auction Mechanism for Search Advertising
General Aucton Mechansm for Search Advertsng Gagan Aggarwal S. Muthukrshnan Dávd Pál Martn Pál Keywords game theory, onlne auctons, stable matchngs ABSTRACT Internet search advertsng s often sold by an
More informationBERNSTEIN POLYNOMIALS
On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationAnalysis of Energy-Conserving Access Protocols for Wireless Identification Networks
From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara
More informationMAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11
Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 MAC Layer Servce Tme Dstrbuton of a Fxed Prorty Real Tme Scheduler over 80. Inès El Korb Ecole Natonale des Scences de
More informationFormulating & Solving Integer Problems Chapter 11 289
Formulatng & Solvng Integer Problems Chapter 11 289 The Optonal Stop TSP If we drop the requrement that every stop must be vsted, we then get the optonal stop TSP. Ths mght correspond to a ob sequencng
More informationTHE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek
HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo
More informationLearning the Best K-th Channel for QoS Provisioning in Cognitive Networks
000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050
More information2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet
2008/8 An ntegrated model for warehouse and nventory plannng Géraldne Strack and Yves Pochet CORE Voe du Roman Pays 34 B-1348 Louvan-la-Neuve, Belgum. Tel (32 10) 47 43 04 Fax (32 10) 47 43 01 E-mal: corestat-lbrary@uclouvan.be
More informationOne-Shot Games for Spectrum Sharing among Co-Located Radio Access Networks
One-Shot Games for Spectrum Sharng among Co-Located Rado Access etwors Sofonas Halu, Alexs A. Dowhuszo, Olav Tronen and Lu We Department of Communcatons and etworng, Aalto Unversty, P.O. Box 3000, FI-00076
More informationOnline Advertisement, Optimization and Stochastic Networks
Onlne Advertsement, Optmzaton and Stochastc Networks Bo (Rambo) Tan and R. Srkant Department of Electrcal and Computer Engneerng Unversty of Illnos at Urbana-Champagn Urbana, IL, USA 1 arxv:1009.0870v6
More informationThe Power of Slightly More than One Sample in Randomized Load Balancing
The Power of Slghtly More than One Sample n Randomzed oad Balancng e Yng, R. Srkant and Xaohan Kang Abstract In many computng and networkng applcatons, arrvng tasks have to be routed to one of many servers,
More informationOn Secrecy Capacity Scaling in Wireless Networks
On Secrecy Capacty Scalng n Wreless Networks O. Ozan Koyluoglu, Student Member, IEEE, C. Emre Koksal, Member, IEEE, and esham El Gamal, Fellow, IEEE arxv:0908.0898v [cs.it] 0 Apr 00 Abstract Ths work studes
More informationCan Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
More informationOn the Interaction between Load Balancing and Speed Scaling
On the Interacton between Load Balancng and Speed Scalng Ljun Chen, Na L and Steven H. Low Engneerng & Appled Scence Dvson, Calforna Insttute of Technology, USA Abstract Speed scalng has been wdely adopted
More informationSupport Vector Machines
Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.
More informationAnalyzing Self-Defense Investments in Internet Security Under Cyber-Insurance Coverage
Analyzng Self-Defense Investments n Internet Securty Under Cyber-Insurance Coverage Ranjan Pal Department of Computer Scence Unv. of Southern Calforna Emal: rpal@usc.edu Leana Golubchk Department of Computer
More informationPerformance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments
Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn
More informationEqulbra Exst and Trade S effcent proportionally
On Compettve Nonlnear Prcng Andrea Attar Thomas Marott Franços Salané February 27, 2013 Abstract A buyer of a dvsble good faces several dentcal sellers. The buyer s preferences are her prvate nformaton,
More informationInstitute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
More informationSupply network formation as a biform game
Supply network formaton as a bform game Jean-Claude Hennet*. Sona Mahjoub*,** * LSIS, CNRS-UMR 6168, Unversté Paul Cézanne, Faculté Sant Jérôme, Avenue Escadrlle Normande Némen, 13397 Marselle Cedex 20,
More informationA Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things
A Game-Theoretc Approach for Mnmzng Securty Rsks n the Internet-of-Thngs George Rontds, Emmanoul Panaouss, Aron Laszka, Tasos Daguklas, Pasquale Malacara, and Tansu Alpcan Hellenc Open Unversty, Greece
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationHowHow to Find the Best Online Stock Broker
A GENERAL APPROACH FOR SECURITY MONITORING AND PREVENTIVE CONTROL OF NETWORKS WITH LARGE WIND POWER PRODUCTION Helena Vasconcelos INESC Porto hvasconcelos@nescportopt J N Fdalgo INESC Porto and FEUP jfdalgo@nescportopt
More informationResource Control for Elastic Traffic in CDMA Networks
Resource Control for Elastc Traffc n CDMA Networks Vaslos A. Srs Insttute of Computer Scence (ICS) Foundaton for Research and Technology - Hellas (FORTH) P.O. Box 1385, GR 711 1, Heraklon, Crete, Greece
More informationMulti-Resource Fair Allocation in Heterogeneous Cloud Computing Systems
1 Mult-Resource Far Allocaton n Heterogeneous Cloud Computng Systems We Wang, Student Member, IEEE, Ben Lang, Senor Member, IEEE, Baochun L, Senor Member, IEEE Abstract We study the mult-resource allocaton
More informationMinimum Energy Coding in CDMA Wireless Sensor Networks
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO., FEBRUARY 009 985 Mnmum Energy Codng n CDMA Wreless Sensor Networks C. Fschone, Member, IEEE, K. H. Johansson, Member, IEEE, A. Sangovann-Vncentell,
More informationPrice Competition in an Oligopoly Market with Multiple IaaS Cloud Providers
Prce Competton n an Olgopoly Market wth Multple IaaS Cloud Provders Yuan Feng, Baochun L, Bo L Department of Computng, Hong Kong Polytechnc Unversty Department of Electrcal and Computer Engneerng, Unversty
More informationThe Stock Market Game and the Kelly-Nash Equilibrium
The Stock Market Game and the Kelly-Nash Equlbrum Carlos Alós-Ferrer, Ana B. Ana Department of Economcs, Unversty of Venna. Hohenstaufengasse 9, A-1010 Venna, Austra. July 2003 Abstract We formulate the
More informationResearch on Privacy Protection Approach for Cloud Computing Environments
, pp. 113-120 http://dx.do.org/10.14257/jsa.2015.9.3.11 Research on Prvacy Protecton Approach for Cloud Computng Envronments Xaohu L 1,2, Hongxng Lang 3 and Dan Ja 1 1 College of Electrcal and Informaton
More informationHow To Improve Delay Throughput In Wireless Networks With Multipath Routing And Channel Codeing
Delay-Throughput Enhancement n Wreless Networs wth Mult-path Routng and Channel Codng Kevan Ronas, Student Member, IEEE, Amr-Hamed Mohsenan-Rad, Member, IEEE, Vncent W.S. Wong, Senor Member, IEEE, Sathsh
More informationThe OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationWhen Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services
When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu
More informationCross-Selling in a Call Center with a Heterogeneous Customer Population
OPERATIONS RESEARCH Vol. 57, No. 2, March Aprl 29, pp. 299 313 ssn 3-364X essn 1526-5463 9 572 299 nforms do 1.1287/opre.18.568 29 INFORMS Cross-Sellng n a Call Center wth a Heterogeneous Customer Populaton
More informationValue Driven Load Balancing
Value Drven Load Balancng Sherwn Doroud a, Esa Hyytä b,1, Mor Harchol-Balter c,2 a Tepper School of Busness, Carnege Mellon Unversty, 5000 Forbes Ave., Pttsburgh, PA 15213 b Department of Communcatons
More informationNordea G10 Alpha Carry Index
Nordea G10 Alpha Carry Index Index Rules v1.1 Verson as of 10/10/2013 1 (6) Page 1 Index Descrpton The G10 Alpha Carry Index, the Index, follows the development of a rule based strategy whch nvests and
More information