Stochastic Games on a Multiple Access Channel

Size: px
Start display at page:

Download "Stochastic Games on a Multiple Access Channel"

Transcription

1 Stochastc Games on a Multple Access Channel Prashant N and Vnod Sharma Department of Electrcal Communcaton Engneerng Indan Insttute of Scence, Bangalore , Inda Emal: prashant2406@gmal.com, vnod@ece.sc.ernet.n arxv: v1 [cs.sy] 29 Oct 2012 Abstract We consder a scenaro where N users try to access a common base staton. Assocated wth each user s ts channel state and a fnte queue whch vares wth tme. Each user chooses hs power and the admsson control varable n a dynamc manner so as to maxmze hs expected throughput. The throughput of each user s a functon of the actons and states of all users. The scenaro consders the stuaton where each user knows hs channel and buffer state but s unaware of the states and actons taken by the other users. We consder the scenaro when each user s saturated (.e., always has a packet to transmt) as well as the case when each user s unsaturated. We formulate the problem as a Markov game and show connectons wth strategc form games. We then consder varous throughput functons assocated wth the multple user channel and provde algorthms for fndng these equlbra. Keywords: Multple access channel, Stochastc games, Statonary polces, Strategc form games, Nash equlbra, Potental games. I. INTRODUCTION There has been a tremendous growth of wreless communcaton systems over the last few years. The success of wreless systems s prmarly due to the effcent use of ther resources. The users are able to obtan ther qualty of servce effcently n a tme varyng rado channel by adjustng ther own transmsson powers. Dstrbuted control of resources s an nterestng area of study snce ts alternatve nvolves hgh system complexty and large nfrastructure due the presence of a central controller. Noncooperatve game theory [1] s a natural tool to desgn and analyze wreless systems wth dstrbuted control of resources. Scutar et al. [3], [4] analyzed compettve maxmzaton of transmsson rate and mutual nformaton on the multple access channel subject to power and other constrants. Hekknen [5] analyzed dstrbuted power control problems va potental games whle La et al.[2] appled game theoretc framework to resource allocaton problem n fadng multple access channel. Altman et al. [6] studed the problem of maxmzng throughput of saturated users (a user always has a packet to transmt) who have a Markov modelled channel and are subjected to power constrants.they consdered both the centralzed scenaro where the base staton chooses the transmsson power levels for all users as well as the decentralzed scenaro where each user chooses ts own power level based on the condton of ts rado channel. Altman et al. [7] later consderd the problem of maxmzng the throughput of users n a dstrbuted manner subject to both power and buffer constrants. The decentralzed scenaro n [6] whle the dstrbuted resource allocaton problem n [7] was analyzed as constraned Markov games wth ndependent state nformaton,.e., no user knows other user s state. The proof of exstence of the equlbrum polces for such games was gven n [8]. An algorthm whch guaranteed convergence to the equlbrum polces for two users for any throughput functon of the two users and an algorthm whch guaranteed convergence to the equlbrum polces for N users when ther throughput functons are dentcal were provded n [9]. Our work s closely related to the above mentoned work. When restrcted to the objectve functons n [6], [7] our problem s exactly the same however we present an alternatve vew of constraned Markov games wth ndependent state nformaton. Wth ths vew we connect the theory to strategc form games [10]. The exstence of equlbrum polces follows drectly from ths vewpont. Ths ncludes both the saturated as well as the unsaturated scenaro consdered n [6] and [7] respectvely. We also show that the algorthm whch guaranteed convergence to the equlbrum polces for N users can be extended to cases where the throughput functons of the users may be dfferent. Besdes presentng an unfed vew of both the saturated as well as the unsaturated problem, we also consder the case where the base staton uses a successve nterfence cancellaton rather than a regular matched flter. Here we formulate both the non-cooperatve and the cooperatve (team problem) setup and fnd the equlbra for both the problems. The paper s structured as follows. In Secton II we present the system model for both the saturated (no buffer constrants) and the unsaturated (both buffer and power constrants) scenaro. In Secton III we setup the problem as a constraned Markov game wth ndependent state nformaton and defne the so called equvalent strategc form game. Here we provde a proof of exstence of equlbrum polces and defne the dea of a pure strategy and potental functon for Markov games. In Secton IV we consder varous throughput functons assocated wth the multple access channel. In Secton V we develop algorthms to compute these equlbrum polces. Secton VI concludes the paper. II. SYSTEM MODEL We consder a scenaro where a set N = {1,,N} of users access the base staton through a channel smultaneously. Tme s dvded nto slots. The channel for user s modelled as an ergodc Markov chan k [n] takng values from a fnte ndex set K = {0,1,2,,km }. The channel gan for user

2 n ndex k s h (k ) where functon h : K [0 1]. We assume h (0) = 0. The transton probablty of user gong from channel ndex k to k s P kk. We assume that n each tme slot each user knows hs channel ndex perfectly but does not know the channel ndex of the other users. Each user has a set of power ndexes L = {0,1,2,,lm } where l m s the largest power ndex. The power nvested by user at tme n s gven by the functon p : L R wth the property that p (0) = 0,.e., there s no power nvested by user at power ndex l = 0. Let l [n] represent the power ndex followed by user. For the unsaturated case each user has a queue of fnte length q m. Denote Q = {0,1,2,,qm }. Let γ [n] packets arrve n the queue at tme slot n from the hgher layers where {γ [n],n 0} are ndependent and dentcally dstrbuted (d) wth dstrbuton τ. In each tme slot a user may transmt atmost one packet from ts queue f t s not empty. Let d [n] D = {0,1} be the admsson control varable for user where d [n] = 1 denotes acceptng all packets from the upper layer and d [n] = 0 denotes rejectng all packets. The ncomng packets are accepted untll the buffer s full, the remanng packets are dropped. We assume that a user has no nformaton about the queues of other users. If q [n] and w [n] denote the number of packets n the queue and the number of departures from the buffer n slot n then the queue dynamcs are gven as, q [n+1] = mn([q [n]+d [n]γ [n] w [n]] +,q m). (1) In tme slot n the state x [n] and the acton a [n] of user s defned as, x [n] = (k [n],q [n]), a [n] = (l [n],c [n]). (2) The set of states X and the set of actons A of user are denoted as X = K Q and A = L D respectvely. The set of states (actons) other than that of user s denoted as X (A ) whle the set of all states (actons) of all users s denoted as X (A) respectvely. In the followng we wll present the detals for the unsaturated case and then comment brefly for the saturated case. A. Instantaneous throughput and cost for user : The throughput obtaned by user s gven by the functon t : K L R + satsfyng t (k,l) = 0 f k = 0 or l = 0 where K = N =1 K and A = N =1 A. Ths mples that the throughput obtaned by user s 0 f the channel s very bad or there s no power nvested by the user. Note that the throughput of user depends on the global channel ndex k and global power ndexl of all users. We defne the throughput (t ) and the cost (c j ) of user at tme n as, t (x[n],a[n]) = t (k[n],1 {q[n] 0} l [n]; N), (3) c 1 (x[n],a[n]) = p (k [n]), c 2 (x[n],a[n]) = q [n], (4) where 1 A represents the ndcator functon and s 1 f event A s true. We observe that there s a power cost and a queung cost for user due to strngent delay requrements whch have to be met by the user. B. Transton probablty under each acton: We defne the transton probablty P xa x of user gong from state x to state x under the acton a as, P xa x = P kk P qa q, (5) where P qa q s the transton probablty of user gong from state q to state q under acton a. C. Saturated system: In the saturated system each user always has a packet to transmt at each tme. Thus there s only a power cost for every user. Th state, acton and transton probablty of user get modfed as, x [n] = k [n], a [n] = l [n],and P xa x = P kk whle the nstantaneous throughput and cost for user are t (x[n],a[n]) = t (k[n],l[n]) and c 1 (x[n],a[n]) = p (k [n]) respectvely. D. Statonary polces: LetM (G) be the set of probablty measures over a set G. A statonary polcy for user s a functon u : X M (A ). The value u (a x ) represents the probablty of user takng acton a when t s n state x. We denote the set of statonary polces for user as U and the set of all statonary multpolces as U = N =1 U. The set of statonary multpolces of all users other than user s denoted as U. E. Expected tme-average rate, costs and constrants: Let x 0 := x[0] represent the ntal state of all users. Gven a statonary multpolcy u for all players, Pu x0 denotes the dstrbuton of the stochastc process (x[n], a[n]). The expectaton due to ths dstrbuton s denoted as E x0 u. We now defne the tme-average expected rate as, T (u) := lmsup T 1 T T n=1 E x0 u (t (x[n],a[n])). (6) where the expected tme average costs are subject to constrants, C k (u ) := lmsup T 1 T T n=1 E x0 u (c k (x[n],a[n])) Ck. (7) wherec 1 = P andc 2 = Q. In case of the saturated scenaro k = 1 otherwse k {1,2}. A polcy u s called feasble f t satsfes C k (u ) C k k and s called feasble f t s -feasble for all users N.

3 III. GAME THEORETIC FORMULATION Each user chooses a statonary polcy u U so as to maxmze hs expected average reward T (u). However T (u) depends on the statonary polcy of other users also leadng to a noncooperatve game. We denote the above formulaton as a constraned Markov game [8], [11], Γ cmg = [N,(X ),(A ),(P ),(t ),(c k ),(Ck ) ] where the elements of the above tuple are as defned prevously. Let [u,v ] denote the multpolcy where, users k use statonary polcy u k whle user uses polcy v. We now defne the Constraned Nash Equllbrum (CNE). Defnton 1: A multpolcy u U s called a CNE f for each player N and for any v U such that [u,v ] s feasble, T (u) T (u,v ). (8) A feasble polcy u s called an optmal response of player aganst a multpolcy u of other users f for any other feasble polcy v, (13) holds. In ths paper we lmt ourselves to statonary CNE as aganst general hstory dependent Nash equlbra. These are easy to mplement and are usually the subject of study. It s shown n [8] that statonary Nash equlbra are Nash equlbra n the general class of polces also although may only be a proper subset. A. Calculaton of optmal response Denote the transton probablty of user gong from state x to state y under the polcy u as, P xu y = a A u (a x )P xa y. (9) Defne the mmedate reward for user, when user has state x and takes acton a and other users use multpolcy u as, R (x,a ) = [ l (a l x l )π l u u l (x l )]t (x,a), (10) (x,a ) where π u l (x l ) s the steady state probablty of user l beng n state x l when t uses polcy u l. Gven the statonary polcy u U defne the occupaton measure as, z (x,a ) = π u (x ) u (a x ). (11) The occupaton measurez (x,a ) for user s the steady-state probablty of the user beng n state x X and usng acton a A. Gven the occupaton measurez the statonary polcy u s: u (a x ) = z (x,a ) a A z (x,a ), (x,a ) X A. (12), Then the tme-average expected rate and costs under the multpolcy u are: T (u) = R (x,a )z (x,a ), (13) C k (u ) = B. Best response of player c k (x,a )z (x,a ). (14) Let all users other than user use the multpolcy u. Then user has an optmal statonary best response polcy whch s ndependent of the ntal state x 0 [8]. Let the set of optmal statonary polces of user be denoted as BR(u ). We can compute the elements of ths set from the followng Lnear program: Fnd z = [z (x,a )],(x,a ) X A that maxmzes: T (u) = R (x,a )z (x,a ), (15) subject to C k (u ) = [1 y (x ) P ya x ]z (x,a ) = 0, y X, (16) c k (x,a )z (x,a ) C k, k {1,2}, (17) z (x,a ) = 1, z (x,a ) 0, (x,y ) X Y. (18) Note that the above Lnear program can be modfed for the saturated scenaro smply by choosng k = 1. The Lnear program for the saturated scenaro can be presented n a much smpler form [6]. The constrants (21 23) are referred n matrx form as A us z b us. C. Equvalent Strategc form game: In ths secton we wll show that the above Markov game s equvalent to a usual strategc form (nonstochastc) game. We wll use ths equvalence to show exstence of the CNE and also provde algorthms to fnd them and show ther convergence. Defne a Strategc form gameγ E = N,{V } N,{r } N where V := {1,2,,v m}. Each pont v V corresponds to the endpont [z (x,a )];(x,a ) X A of the polyhedron formed due to constrants A us z b us and wll be denoted as v := [v (x,a )];(x,a ) X A. The utlty functon r : V R where V = N V s defned as, r (v) = r (v 1,v 2,,v N ) := R v (x,a )v (x,a ), where R v (x,a ) := l (19) v l (x l,a l )t (x,a). (20)

4 Letλ be a mxed strategy for player. Denote the set of mxed strateges of player as (V ). The expected utlty of player when all players use strategy tuple λ = (λ 1,λ 2,,λ N ) s gven as r (λ) := E λ (r ) where E λ (.) denotes expectaton wth respect to the global mxed strategy λ. Defne the set of optmal strateges for player, when other players use strategy λ as, { } BR(λ ) = λ : λ argmax λ r (λ,λ ). (21) D. Exstence of Nash Equllbrum The followng proposton establshes a connecton between any global multpolcy u for the constraned Markov game Γ cmg and some global mxed strategy λ n the equvalent strategc form game Γ E. Proposton 1: There exst a u BR(u ) gven any multpolcy u of players other than f and only f there exst λ for players other than and a λ BR(λ ) such that T (u,u ) = r (λ,λ ) Proof: Refer to [11]. The exstence of CNE for the constraned Markov game Γ cmg follows from the above proposton. Theorem 1: There exst a CNE for the Constraned Markov game Γ cmg. Proof: There exst a mxed strategy Nash equlbrum for the equvalent strategc form game Γ E [1], let t be denoted by λ. It follows then, that r (λ,λ ) r (λ,λ ), λ, N. From proposton 1 we can fnd equvalent u for λ such that T (u,u ) = r (λ,λ ) r (λ,λ ) = T (u,u ), u U, N. Ths proves that u s a CNE. E. Potental Games We frst defne the dea of a pure strategy and pure startegy Nash equlbrum (PSNE) for the constraned Markov game Γ cmg. Defnton 2: A polcyu for players called a pure polcy or pure strategy of the constraned Markov game Γ cmg f the mxed strategy λ correspondng to ths polcy s a pure strategy. We say that a constraned Markov game Γ cmg has a PSNE f the equvalent startegc form game has a PSNE. Defnton 3: A strategc form game Γ s called a potental game f there exsts a functon r : V R such that N, r 1(v,v ) r 1(ˆv,v ) = ( r(v,v ) r(ˆv,v ) ) v,ˆv V, v V. Γ cmg s a potental game f the correspondng Γ E s a potental game. Consder the class of strategc form games, ( Ξ := Γ(k) = ) N,{L } N,{t (k)} N : k K (22) Lemma 1: If Γ(k) s a potental game for each k K, then the constraned Markov game Γ cmg s a potental game. Proof: Refer to [11]. Refer to an example n [11]. IV. THROUGHPUT FUNCTIONS The base staton may use a regular matched flter or a successve nterference cancellaton (SIC) flter. We assume that each user s aware of the flter adopted at the base staton to decode ther respectve transmssons. Any of the two cases results n dfferent throughput functons for the users whch we characterze n the subsequent subsectons. A. Regular matched flter When the base staton uses a regular matched flter the receved packet of any user s decoded by treatng the sgnals of other users as nose. In ths case, the throughput functons for user s, t n (k,l) = log 2 ( 1+ ) h (k )p (l ) N 0 + N j=1,j h. (23) j(k j )p j (l j ) Note that t n (k,l) s an upper bound for the throughput of user. On the other hand the users may want to maxmze the aggregrated throughput n a decentralzed manner. In ths case the jont objectve functon when they use acton a A at state x X s, t s (k,l) = N =1 t n (k,l). (24) The nterference cancellaton Markov game s Γ cmg wth t = t n and the sum throughput game s Γ cmg wth t = t s. The nterference canccellaton Markov game and the sum throughput Markov game are denoted as Γ n cmg and Γs cmg respectvely. These throughput functons were consdered n [7], [6]. B. Successve Interference Cancellaton When the base staton uses a successve nterference cancellaton flter t decodes the data of users n a predefned order at each tme slot. Gven an orderng scheme on the the set of users N, the receved packet of a user s decoded after cancellng out the decoded transmsson of other users lyng below user n the predefned order from the receved transmsson. We assume perfect cancellaton of the decoded sgnal from the receved transmsson [7]. We frst show how to choose the decodng order for each tme slot. We defne the Endpont SIC schemes where the decodng order s fxed for all tme slots. Now usng the latter we defne the Randomzed SIC schemes where the decodng order for each tme slot s chosen randomly from some dstrbuton. We assume that the dstrbuton s known to all users but they do not know the decodng order at each tme slot. 1) Endpont SIC schemes: Here the decodng order s same for each tme slot n. Gven the set of users N defne the m- th permutaton set of N as the ordered set σ N (m) where m represents one of the possble N! permutaton. Let B (m) denote the set of players who are ndexed above user n

5 the set σ N (m). We defne the m-th utlty functon of user as, ) t m h (k )p (l ) (k,l) = log 2 (1+ N 0 + j B h. (25) (m) j(k j )p j (l j ) The above utlty functon for player ndcates that all users ndexed below usern the set σ N (m) are decoded before user and ther sgnal s cancelled out from the receved sgnal, after whch, user sgnal s decoded. The m-th endpont SIC Markov game s Γ cmg wth t = t m N and s denoted as Γ m cmg. 2) Randomzed SIC schemes: Here the decodng order s chosen at each tme slot n wth a probablty. Though each user knows the probablty dstrbuton at each tme slot n, he does not know the exact decodng order. If probablty mass functon α = {α(m)} over the set N! = {1,2,,N!} s chosen then the utlty functon of user as, t α (k,l) = N! m=1 α(m)t m (k,l). (26) The α randomzed SIC Markov game s Γ cmg wth t = t α N and s denoted as Γ α cmg. Note that the randomzatons α such that α(m) = 1 for some m corresponds to the endpont game Γ m cmg. In the next subsecton we fnd randomzatons α, for whch Γ α cmg has a pure strategy Nash equlbrum. 3) Randomzed games wth PSNE: In ths scton we construct randomzatons α for whch the resultng randomzed games have PSNE s. Take a partton P 1,P 2,,P k of the set N where 1 k N. Let s(p a ) = P 1,P 2,,P k denote ths partcular partton of the set N where p a ndexes ths partcular partton of the set N. Let s(p a,p e ) = (P e1 P e2 P ek ) denote the ordered set formed by the p e -th permutaton of the parttons P 1,P 2,,P k. Note that 1 p e k!. Defne the Support set S(p a,p e ) as, S(p a,p e ) := { m : σ N (m) = σ Pe1 (m 1 )σ Pe2 (m 2 ) σ Pek (m k ) } 1 m 1 P e1!,,1 m k P ek!. where σ G (m) refers to the m-th permutaton of the set G. The set S(p a,p e ) contans all the permutatons m for whch the randomzaton α (to be defned next) has a postve value,.e α(m) > 0 m S(p a,p e ). We now defne the randomzaton α(p a,p e ) as, { 1 α(m) = P 1! P 2! P k! ; m S(p a,p e ) (27) 0 ; otherwse. The followng example shows the constructon for N = {1,2,3} Example 1: N = {1,2,3}. The permutaton sets of N are σ N (1) = (1,2,3), σ N (2) = (1,3,2), σ N (3) = (2,1,3), σ N (4) = (2,3,1), σ N (5) = (3,1,2) and σ N (6) = (3,2,1). The possble parttons of the set N are s(1) = {1},{2},{3}, s(2) = {1,2},{3}, s(3) = {1,3},{2}, s(4) = {3, 2},{1} and s(5) = {1, 2, 3}. The ordered set formed due to the correspondng permutatons of the parttons are s(1,1) = ({1}{2}{3}), s(1,2) = ({1}{3}{2}), s(1,3) = ({2}{1}{3}),s(1,4) = ({2}{3}{1}),s(1,5) = ({3}{1}{2}), s(1,6) = ({3}{2}{1}), s(2,1) = ({1}{2,3}), s(2,2) = ({2,3}{1}), s(3,1) = ({2}{1,3}), s(3,2) = ({1,3}{2}), s(4,1) = ({3}{1,2}), s(4,2) = ({1,2}{3}) and s(5) = ({1,2,3}). The support sets resultng from the above ordered sets are S(1,1) = {1}, S(1,2) = {2}, S(1,3) = {3}, S(1,4) = {4}, S(1,5) = {5}, S(1,6) = {6}, S(2,1) = {1,2}, S(2,2) = {4,6}, S(3,1) = {3,4}, S(3,2) = {2,5}, S(4,1) = {5,6}, S(4,2) = {1,3} and S(5,1) = {1,2,3,4,5,6} The above support set lead to the followng randomzatons: TABLE I RANDOMIZATIONS WITH PSNE α(p a,p e) α(1) α(2) α(3) α(4) α(5) α(6) α(1, 1) 1 0) α(1, 2) α(1, 3) α(1, 4) α(1, 5) α(1, 6) α(2, 1) 1/2 1/ α(2, 2) /2 0 1/2 α(3, 1) 0 0 1/2 1/2 0 0 α(3, 2) 0 1/ /2 0 α(4, 1) /2 1/2 α(4, 2) 1/2 0 1/ α(5, 1) 1/6 1/6 1/6 1/6 1/6 1/6 The next theorem shows that the randomzatons constructed n ths secton lead to games whch have PSNE s. Theorem 2: Any Markov game Γ α cmg wth α = α(p a,p e ) has a pure strategy Nash equlbrum. Proof: Refer to [11]. C. Sum Capacty utlty functon We defne the sum capacty utlty functon as, N t sc =1 (k,l) = log 2 (1+ h ) (k )p (l ). (28) N 0 For any probablty dstrbuton α we have, N t α (k,l) = t sc (k,l). =1 We can nterpret the sum capacty utlty functon as the aggregrated sum throughput that each user maxmzes n a decentralzed manner when the base staton s usng a SIC decoder. The Sum capacty Markov game s Γ cmg wth t = t sc N and s denoted as Γ sc cmg. V. ALGORITHMS In ths secton we gve the algorthms to compute the CNE for the Markov games Γ n cmg, Γsc cmg, Γs cmg and Γα cmg whenever α = α(p a,p e ) for some partton s(p a ) of N and

6 permutaton p e of the partton sets. Algorthm 1 s used to compute the Nash equlbrum for the frst three Markov games whle algorthm 2 s used to compute the equlbrum for the randomzed game Γ α cmg. Note that algorthm 1 was consdered n [6] and ts proof for dentcal nterest throughput functons (.e., Γ s cmg) was also gven. We extend the proof for Γ s cmg. Algorthm 1 Intalze multpolcy u 0 U for all 1 N do Compute u k BR(u ) by solvng the LP usng the smplex algorthm where u = (u k 1,uk 2,,uk 1,uk 1,,u k 1 N ). f T (u k,u )=T (u k 1,u ) then then the updated value u k end f end for f u k = u k 1 then stop, else go to step 2 end f u k s the CNE := uk 1 We defne the restrcton ofγ cmg whch s used n algorthm 2. Gven any set S N of users and polcy u 0 for all N/S, we defne the restrcton of Γ cmg on the set S as the constraned Markov game wth the set S of users partcpatng n the game Γ cmg whle the users N/S use the predefned polcy u 0. We denote the restrcted game as Γ cmg(s). Let s(p a,p e ) = P e1 P e2 P ek denote the ordered set formed by the p e -th permutaton of the partton s(p a ) = P 1,P 2,,P k. We compute the PSNE for the game Γ α cmg nduced by the partton p a and permutaton p e. Algorthm 2 Intalze multpolcy u 0 U for all 1 j k do f user P el where l < j then Set u = u end f f user P el where l > j then Set u = u 0 end f Compute u k for all P ej by restrctng algorthm 1 on the restrcted Markov game Γ cmg (P ej ). Set u = uk for all P ej. end for u, N s the requred PSNE. The convergence of algorthms 1 and 2 s proved n [11]. VI. NUMERICAL RESULTS The channel model consdered s the BF-FSMC model [7]: The channel transton probabltes are P 0,0 = 1/2, P 0,1 = 1/2, P k m,km 1 = 1/2, P k m,km = 1/2 ;P k,k = 1/3, P k,k 1 = 1/3, P k,k +1 = 1/3 (1 k km 1). The channel gan and the power functon are h = k /(k m ) and p = l respectvely. The followng parameters are fxed for all user: k m = 3, l m = 5, q m = 10, P = 2 and Q = 5. γ [n] has a Posson dstrbuton wth rate.3 and N 0 = 1. The throughput obtaned at the equlbra for the varous games are tabulated n Table II n the user order {1,2,3}. Note that the randomzed game α(2, 1) has multple equlbra. Please refer to [11] for the optmal polces. : TABLE II OPTIMAL USER THROUGHPUT Game / System Model Saturated Unsaturated Γ n cmg.5263,.5263, ,.4649,.4649 Γ α cmg α = α(1, 1) ,.6969, ,.5649,.4649 Γ α cmg α = α(4, 2).8836,.8836, ,.6299,.4649 Γ α cmg α = α(5, 1).7566,.7566, ,.5749,.5749 Γ α cmg ,.6035,.5987 α = α(2, 1) ,.5987, ,.5149,.5149 Γ s cmg Γ sc cmg ACKNOWLEDGEMENTS The authors would lke to thank Professor Altman for nterestng dscussons about the paper. VII. CONCLUSIONS We have consdered decentralzed schedulng of a Wreless channel by multple users. The users may be saturated or unsaturated. The decoder at the base staton may employ a matched flter or successve nterfernce cancellaton. The users know only ther own channel states. The system s modelled as a constraned Markov game wth ndependent state nformaton. We have proved the exstence of equlbrum polces and provded algorthms to fnd these polces. For ths, we frst convert the Markov game nto an equvalent strategc form game. REFERENCES [1] Z Han, D Nyato, W Saad, T Basar, A Hjorungnes, Game Theory n Wreless and Communcaton Networks [2] L. La and H. El Gamal, The water-fllng game n fadng multple-access channels, IEEE Trans. Inform. Theory, vol. 54, no. 5, pp , May [3] G Scutar, D P. Palomar, and S Barbarossa, Optmal Lnear Precodng Strateges for Wdeband Noncooperatve Systems Based on Game Theory Part I: Nash Equlbra n IEEE Transacton on Sgnal Processng, vol. 56, no. 3, pp , March [4] G Scutar, D P. Palomar, and S Barbarossa, Optmal Lnear Precodng Strateges for Wdeband Noncooperatve Systems Based on Game Theory Part II: Algorthms n IEEE Transacton on Sgnal Processng, vol. 56, no. 3, pp , March [5] T. Hekknen, A potental game approach to dstrbuted power control and schedulng,n Computer Networks, vol. 50, no. 13, pp , September [6] E. Altman, K. Avrachenkov, G. Mller, and B. Prabhu, Uplnk dynamc dscrete power control n cellular networks,inria Techncal Report 5818, 2006

7 [7] E Altman, K Avrachenkov, N Bonneau, M Debbah, R El-Azouz, D Menasch, Constraned Stochastc Games n Wreless Networks Globecomm, 2008 [8] E. Altman, Constraned cost coupled stochastc games wth ndependent state nformaton to be publshed n Operatons Research Letters, vol. 36, no. 2, Mar [9] E. Altman, K. Avrachenkov, N. Bonneau, M. Debbah, R. El-Azouz, and D. Menasch, Constraned stochastc games: Dynamc control n wreless networks Tech Report, 2007, www-net.cs.umass.edu/sadoc/mdp. [10] D. Monderer and L. S. Shapley, Potental games, n Games and Economc Behavor, vol. 14, no. 1, pp May [11] N Prashant and Vnod Sharma, Stochastc Games on the Multple Access Channel Submtted to arxv pre-prnt server, October 2012

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

A Lyapunov Optimization Approach to Repeated Stochastic Games

A Lyapunov Optimization Approach to Repeated Stochastic Games PROC. ALLERTON CONFERENCE ON COMMUNICATION, CONTROL, AND COMPUTING, OCT. 2013 1 A Lyapunov Optmzaton Approach to Repeated Stochastc Games Mchael J. Neely Unversty of Southern Calforna http://www-bcf.usc.edu/

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

Extending Probabilistic Dynamic Epistemic Logic

Extending Probabilistic Dynamic Epistemic Logic Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Dynamic Pricing for Smart Grid with Reinforcement Learning

Dynamic Pricing for Smart Grid with Reinforcement Learning Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS

CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS CALL ADMISSION CONTROL IN WIRELESS MULTIMEDIA NETWORKS Novella Bartoln 1, Imrch Chlamtac 2 1 Dpartmento d Informatca, Unverstà d Roma La Sapenza, Roma, Italy novella@ds.unroma1.t 2 Center for Advanced

More information

Slow Fading Channel Selection: A Restless Multi-Armed Bandit Formulation

Slow Fading Channel Selection: A Restless Multi-Armed Bandit Formulation Slow Fadng Channel Selecton: A Restless Mult-Armed Bandt Formulaton Konstantn Avrachenkov INRIA, Maestro Team BP95, 06902 Sopha Antpols, France Emal: k.avrachenkov@sopha.nra.fr Laura Cottatellucc, Lorenzo

More information

DISTRIBUTED storage systems have been becoming increasingly

DISTRIBUTED storage systems have been becoming increasingly 268 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 28, NO. 2, FEBRUARY 2010 Cooperatve Recovery of Dstrbuted Storage Systems from Multple Losses wth Network Codng Yuchong Hu, Ynlong Xu, Xaozhao

More information

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia

NON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

QoS-Aware Spectrum Sharing in Cognitive Wireless Networks

QoS-Aware Spectrum Sharing in Cognitive Wireless Networks QoS-Aware Spectrum Sharng n Cogntve reless Networks Long Le and Ekram Hossan Abstract e consder QoS-aware spectrum sharng n cogntve wreless networks where secondary users are allowed to access the spectrum

More information

Combinatorial Agency of Threshold Functions

Combinatorial Agency of Threshold Functions Combnatoral Agency of Threshold Functons Shal Jan Computer Scence Department Yale Unversty New Haven, CT 06520 shal.jan@yale.edu Davd C. Parkes School of Engneerng and Appled Scences Harvard Unversty Cambrdge,

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

An Intelligent Policy System for Channel Allocation of Information Appliance

An Intelligent Policy System for Channel Allocation of Information Appliance Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Downlink Power Allocation for Multi-class. Wireless Systems

Downlink Power Allocation for Multi-class. Wireless Systems Downlnk Power Allocaton for Mult-class 1 Wreless Systems Jang-Won Lee, Rav R. Mazumdar, and Ness B. Shroff School of Electrcal and Computer Engneerng Purdue Unversty West Lafayette, IN 47907, USA {lee46,

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

An MILP model for planning of batch plants operating in a campaign-mode

An MILP model for planning of batch plants operating in a campaign-mode An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN yfumero@santafe-concet.gov.ar Gabrela Corsano Insttuto de Desarrollo y Dseño

More information

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center

How To Solve An Onlne Control Polcy On A Vrtualzed Data Center Dynamc Resource Allocaton and Power Management n Vrtualzed Data Centers Rahul Urgaonkar, Ulas C. Kozat, Ken Igarash, Mchael J. Neely urgaonka@usc.edu, {kozat, garash}@docomolabs-usa.com, mjneely@usc.edu

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks

Coordinated Denial-of-Service Attacks in IEEE 802.22 Networks Coordnated Denal-of-Servce Attacks n IEEE 82.22 Networks Y Tan Department of ECE Stevens Insttute of Technology Hoboken, NJ Emal: ytan@stevens.edu Shamk Sengupta Department of Math. & Comp. Sc. John Jay

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems

Joint Scheduling of Processing and Shuffle Phases in MapReduce Systems Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent

More information

Optimization of Resource Allocation in Wireless Systems Based on Game Theory

Optimization of Resource Allocation in Wireless Systems Based on Game Theory Internatonal Journal of Computer Scences and Engneerng Open Access Research Paper Volume-4, Issue-1 E-ISSN: 347-693 Optmzaton of Resource Allocaton n Wreless Systems Based on Game Theory Sara Rah 1*, Al

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

Product-Form Stationary Distributions for Deficiency Zero Chemical Reaction Networks

Product-Form Stationary Distributions for Deficiency Zero Chemical Reaction Networks Bulletn of Mathematcal Bology (21 DOI 1.17/s11538-1-9517-4 ORIGINAL ARTICLE Product-Form Statonary Dstrbutons for Defcency Zero Chemcal Reacton Networks Davd F. Anderson, Gheorghe Cracun, Thomas G. Kurtz

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Addendum to: Importing Skill-Biased Technology

Addendum to: Importing Skill-Biased Technology Addendum to: Importng Skll-Based Technology Arel Bursten UCLA and NBER Javer Cravno UCLA August 202 Jonathan Vogel Columba and NBER Abstract Ths Addendum derves the results dscussed n secton 3.3 of our

More information

OPTIMAL INVESTMENT POLICIES FOR THE HORSE RACE MODEL. Thomas S. Ferguson and C. Zachary Gilstein UCLA and Bell Communications May 1985, revised 2004

OPTIMAL INVESTMENT POLICIES FOR THE HORSE RACE MODEL. Thomas S. Ferguson and C. Zachary Gilstein UCLA and Bell Communications May 1985, revised 2004 OPTIMAL INVESTMENT POLICIES FOR THE HORSE RACE MODEL Thomas S. Ferguson and C. Zachary Glsten UCLA and Bell Communcatons May 985, revsed 2004 Abstract. Optmal nvestment polces for maxmzng the expected

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process

Rate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process Dsadvantages of cyclc TDDB47 Real Tme Systems Manual scheduler constructon Cannot deal wth any runtme changes What happens f we add a task to the set? Real-Tme Systems Laboratory Department of Computer

More information

Energy Conserving Routing in Wireless Ad-hoc Networks

Energy Conserving Routing in Wireless Ad-hoc Networks Energy Conservng Routng n Wreless Ad-hoc Networks Jae-Hwan Chang and Leandros Tassulas Department of Electrcal and Computer Engneerng & Insttute for Systems Research Unversty of Maryland at College ark

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Economic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks

Economic-Robust Transmission Opportunity Auction in Multi-hop Wireless Networks Economc-Robust Transmsson Opportunty Aucton n Mult-hop Wreless Networks Mng L, Pan L, Mao Pan, and Jnyuan Sun Department of Electrcal and Computer Engneerng, Msssspp State Unversty, Msssspp State, MS 39762

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION

AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION The Medterranean Journal of Computers and Networks, Vol. 2, No. 1, 2006 57 AN APPROACH TO WIRELESS SCHEDULING CONSIDERING REVENUE AND USERS SATISFACTION L. Bada 1,*, M. Zorz 2 1 Department of Engneerng,

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Bandwdth Packng E. G. Coman, Jr. and A. L. Stolyar Bell Labs, Lucent Technologes Murray Hll, NJ 07974 fegc,stolyarg@research.bell-labs.com Abstract We model a server that allocates varyng amounts of bandwdth

More information

AN optimization problem to maximize the up-link

AN optimization problem to maximize the up-link IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 57, NO. 8, AUGUST 29 2225 Power and Rate Control wth Outage Constrants n CDMA Wreless Networks C. Fschone, M. Butuss, K. H. Johansson, and M. D Angelo Abstract

More information

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks

Efficient On-Demand Data Service Delivery to High-Speed Trains in Cellular/Infostation Integrated Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. XX, NO. XX, MONTH 2XX 1 Effcent On-Demand Data Servce Delvery to Hgh-Speed Trans n Cellular/Infostaton Integrated Networks Hao Lang, Student Member,

More information

Fair and Efficient User-Network Association Algorithm for Multi-Technology Wireless Networks

Fair and Efficient User-Network Association Algorithm for Multi-Technology Wireless Networks Far and Effcent User-Network Assocaton Algorthm for Mult-Technology Wreless Networks Perre Coucheney, Cornne Touat and Bruno Gaujal INRIA Rhône-Alpes and LIG, MESCAL project, Grenoble France, {perre.coucheney,

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告

行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 行 政 院 國 家 科 學 委 員 會 補 助 專 題 研 究 計 畫 成 果 報 告 期 中 進 度 報 告 畫 類 別 : 個 別 型 計 畫 半 導 體 產 業 大 型 廠 房 之 設 施 規 劃 計 畫 編 號 :NSC 96-2628-E-009-026-MY3 執 行 期 間 : 2007 年 8 月 1 日 至 2010 年 7 月 31 日 計 畫 主 持 人 : 巫 木 誠 共 同

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance

) of the Cell class is created containing information about events associated with the cell. Events are added to the Cell instance Calbraton Method Instances of the Cell class (one nstance for each FMS cell) contan ADC raw data and methods assocated wth each partcular FMS cell. The calbraton method ncludes event selecton (Class Cell

More information

Downlink Scheduling and Resource Allocation for OFDM Systems

Downlink Scheduling and Resource Allocation for OFDM Systems 288 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 1, JANUARY 2009 Downlnk Schedulng and Resource Allocaton for OFDM Systems Janwe Huang, Member, IEEE, Vjay G. Subramanan, Member, IEEE, Rajeev

More information

Optimal Call Routing in VoIP

Optimal Call Routing in VoIP Optmal Call Routng n VoIP Costas Courcoubets Department of Computer Scence Athens Unversty of Economcs and Busness 47A Evelpdon Str Athens 11363, GR Emal: courcou@aueb.gr Costas Kalogros Department of

More information

Solving Factored MDPs with Continuous and Discrete Variables

Solving Factored MDPs with Continuous and Discrete Variables Solvng Factored MPs wth Contnuous and screte Varables Carlos Guestrn Berkeley Research Center Intel Corporaton Mlos Hauskrecht epartment of Computer Scence Unversty of Pttsburgh Branslav Kveton Intellgent

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

General Auction Mechanism for Search Advertising

General Auction Mechanism for Search Advertising General Aucton Mechansm for Search Advertsng Gagan Aggarwal S. Muthukrshnan Dávd Pál Martn Pál Keywords game theory, onlne auctons, stable matchngs ABSTRACT Internet search advertsng s often sold by an

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 MAC Layer Servce Tme Dstrbuton of a Fxed Prorty Real Tme Scheduler over 80. Inès El Korb Ecole Natonale des Scences de

More information

Formulating & Solving Integer Problems Chapter 11 289

Formulating & Solving Integer Problems Chapter 11 289 Formulatng & Solvng Integer Problems Chapter 11 289 The Optonal Stop TSP If we drop the requrement that every stop must be vsted, we then get the optonal stop TSP. Ths mght correspond to a ob sequencng

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

Learning the Best K-th Channel for QoS Provisioning in Cognitive Networks

Learning the Best K-th Channel for QoS Provisioning in Cognitive Networks 000 001 002 003 004 005 006 007 008 009 010 011 012 013 014 015 016 017 018 019 020 021 022 023 024 025 026 027 028 029 030 031 032 033 034 035 036 037 038 039 040 041 042 043 044 045 046 047 048 049 050

More information

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet

2008/8. An integrated model for warehouse and inventory planning. Géraldine Strack and Yves Pochet 2008/8 An ntegrated model for warehouse and nventory plannng Géraldne Strack and Yves Pochet CORE Voe du Roman Pays 34 B-1348 Louvan-la-Neuve, Belgum. Tel (32 10) 47 43 04 Fax (32 10) 47 43 01 E-mal: corestat-lbrary@uclouvan.be

More information

One-Shot Games for Spectrum Sharing among Co-Located Radio Access Networks

One-Shot Games for Spectrum Sharing among Co-Located Radio Access Networks One-Shot Games for Spectrum Sharng among Co-Located Rado Access etwors Sofonas Halu, Alexs A. Dowhuszo, Olav Tronen and Lu We Department of Communcatons and etworng, Aalto Unversty, P.O. Box 3000, FI-00076

More information

Online Advertisement, Optimization and Stochastic Networks

Online Advertisement, Optimization and Stochastic Networks Onlne Advertsement, Optmzaton and Stochastc Networks Bo (Rambo) Tan and R. Srkant Department of Electrcal and Computer Engneerng Unversty of Illnos at Urbana-Champagn Urbana, IL, USA 1 arxv:1009.0870v6

More information

The Power of Slightly More than One Sample in Randomized Load Balancing

The Power of Slightly More than One Sample in Randomized Load Balancing The Power of Slghtly More than One Sample n Randomzed oad Balancng e Yng, R. Srkant and Xaohan Kang Abstract In many computng and networkng applcatons, arrvng tasks have to be routed to one of many servers,

More information

On Secrecy Capacity Scaling in Wireless Networks

On Secrecy Capacity Scaling in Wireless Networks On Secrecy Capacty Scalng n Wreless Networks O. Ozan Koyluoglu, Student Member, IEEE, C. Emre Koksal, Member, IEEE, and esham El Gamal, Fellow, IEEE arxv:0908.0898v [cs.it] 0 Apr 00 Abstract Ths work studes

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen, Na L and Steven H. Low Engneerng & Appled Scence Dvson, Calforna Insttute of Technology, USA Abstract Speed scalng has been wdely adopted

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

Analyzing Self-Defense Investments in Internet Security Under Cyber-Insurance Coverage

Analyzing Self-Defense Investments in Internet Security Under Cyber-Insurance Coverage Analyzng Self-Defense Investments n Internet Securty Under Cyber-Insurance Coverage Ranjan Pal Department of Computer Scence Unv. of Southern Calforna Emal: rpal@usc.edu Leana Golubchk Department of Computer

More information

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn

More information

Equlbra Exst and Trade S effcent proportionally

Equlbra Exst and Trade S effcent proportionally On Compettve Nonlnear Prcng Andrea Attar Thomas Marott Franços Salané February 27, 2013 Abstract A buyer of a dvsble good faces several dentcal sellers. The buyer s preferences are her prvate nformaton,

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Supply network formation as a biform game

Supply network formation as a biform game Supply network formaton as a bform game Jean-Claude Hennet*. Sona Mahjoub*,** * LSIS, CNRS-UMR 6168, Unversté Paul Cézanne, Faculté Sant Jérôme, Avenue Escadrlle Normande Némen, 13397 Marselle Cedex 20,

More information

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things

A Game-Theoretic Approach for Minimizing Security Risks in the Internet-of-Things A Game-Theoretc Approach for Mnmzng Securty Rsks n the Internet-of-Thngs George Rontds, Emmanoul Panaouss, Aron Laszka, Tasos Daguklas, Pasquale Malacara, and Tansu Alpcan Hellenc Open Unversty, Greece

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

HowHow to Find the Best Online Stock Broker

HowHow to Find the Best Online Stock Broker A GENERAL APPROACH FOR SECURITY MONITORING AND PREVENTIVE CONTROL OF NETWORKS WITH LARGE WIND POWER PRODUCTION Helena Vasconcelos INESC Porto hvasconcelos@nescportopt J N Fdalgo INESC Porto and FEUP jfdalgo@nescportopt

More information

Resource Control for Elastic Traffic in CDMA Networks

Resource Control for Elastic Traffic in CDMA Networks Resource Control for Elastc Traffc n CDMA Networks Vaslos A. Srs Insttute of Computer Scence (ICS) Foundaton for Research and Technology - Hellas (FORTH) P.O. Box 1385, GR 711 1, Heraklon, Crete, Greece

More information

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems

Multi-Resource Fair Allocation in Heterogeneous Cloud Computing Systems 1 Mult-Resource Far Allocaton n Heterogeneous Cloud Computng Systems We Wang, Student Member, IEEE, Ben Lang, Senor Member, IEEE, Baochun L, Senor Member, IEEE Abstract We study the mult-resource allocaton

More information

Minimum Energy Coding in CDMA Wireless Sensor Networks

Minimum Energy Coding in CDMA Wireless Sensor Networks IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO., FEBRUARY 009 985 Mnmum Energy Codng n CDMA Wreless Sensor Networks C. Fschone, Member, IEEE, K. H. Johansson, Member, IEEE, A. Sangovann-Vncentell,

More information

Price Competition in an Oligopoly Market with Multiple IaaS Cloud Providers

Price Competition in an Oligopoly Market with Multiple IaaS Cloud Providers Prce Competton n an Olgopoly Market wth Multple IaaS Cloud Provders Yuan Feng, Baochun L, Bo L Department of Computng, Hong Kong Polytechnc Unversty Department of Electrcal and Computer Engneerng, Unversty

More information

The Stock Market Game and the Kelly-Nash Equilibrium

The Stock Market Game and the Kelly-Nash Equilibrium The Stock Market Game and the Kelly-Nash Equlbrum Carlos Alós-Ferrer, Ana B. Ana Department of Economcs, Unversty of Venna. Hohenstaufengasse 9, A-1010 Venna, Austra. July 2003 Abstract We formulate the

More information

Research on Privacy Protection Approach for Cloud Computing Environments

Research on Privacy Protection Approach for Cloud Computing Environments , pp. 113-120 http://dx.do.org/10.14257/jsa.2015.9.3.11 Research on Prvacy Protecton Approach for Cloud Computng Envronments Xaohu L 1,2, Hongxng Lang 3 and Dan Ja 1 1 College of Electrcal and Informaton

More information

How To Improve Delay Throughput In Wireless Networks With Multipath Routing And Channel Codeing

How To Improve Delay Throughput In Wireless Networks With Multipath Routing And Channel Codeing Delay-Throughput Enhancement n Wreless Networs wth Mult-path Routng and Channel Codng Kevan Ronas, Student Member, IEEE, Amr-Hamed Mohsenan-Rad, Member, IEEE, Vncent W.S. Wong, Senor Member, IEEE, Sathsh

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services

When Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu

More information

Cross-Selling in a Call Center with a Heterogeneous Customer Population

Cross-Selling in a Call Center with a Heterogeneous Customer Population OPERATIONS RESEARCH Vol. 57, No. 2, March Aprl 29, pp. 299 313 ssn 3-364X essn 1526-5463 9 572 299 nforms do 1.1287/opre.18.568 29 INFORMS Cross-Sellng n a Call Center wth a Heterogeneous Customer Populaton

More information

Value Driven Load Balancing

Value Driven Load Balancing Value Drven Load Balancng Sherwn Doroud a, Esa Hyytä b,1, Mor Harchol-Balter c,2 a Tepper School of Busness, Carnege Mellon Unversty, 5000 Forbes Ave., Pttsburgh, PA 15213 b Department of Communcatons

More information

Nordea G10 Alpha Carry Index

Nordea G10 Alpha Carry Index Nordea G10 Alpha Carry Index Index Rules v1.1 Verson as of 10/10/2013 1 (6) Page 1 Index Descrpton The G10 Alpha Carry Index, the Index, follows the development of a rule based strategy whch nvests and

More information