Online Computation and Competitive Analysis

Size: px
Start display at page:

Download "Online Computation and Competitive Analysis"

Transcription

1 Online Computation and Competitive Analysis Allan Borodin University of Toronto Ran El-Yaniv Technion - Israel Institute of Technology I CAMBRIDGE UNIVERSITY PRESS

2 Contents Preface page xiii 1 Introduction to Competitive Analysis: The List Accessing Problem Basic Ideas and Terminology The List Accessing Problem The Sleator-Tarjan Result The Potential Function Method Some Lower Bounds The List Factoring Technique Historical Notes and Open Questions 19 2 Introduction to Randomized Algorithms: The List Accessing Problem The Competitive Ratio of Randomized Algorithms Algorithm BIT Algorithm RMTF: Barely Random Versus Random List Factoring-Phase Partitioning Revisited COMB: An -Competitive Algorithm Historical Notes and Open Questions 29 3 Paging: Deterministic Algorithms Some Paging Algorithms The (h, k)-paging Problem List Accessing Algorithms as Paging Algorithms LFD - An Optimal Offline Paging Algorithm Marking and Conservative Algorithms and the Competitiveness of LRU, CLOCK, FIFO, and FWF LIFO and LFU Are Not Competitive The Full Access Cost Model 40 vii

3 viii CONTENTS 3.8 Theory Versus Practice Historical Notes and Open Questions 42 4 Paging: Randomized Algorithms Randomized Competitive Analysis The Competitiveness of RANDOM The MARK Algorithm A Lower Bound for Randomized Paging Algorithms Historical Notes and Open Questions 52 5 Alternative Paging Models: Beyond Pure Competitive Analysis The Access Graph Model Dynamic Access Graphs and Experimental Studies Distributional Paging Models Historical Notes and Open Questions 75 6 Game Theoretic Foundations Games in Extensive and Strategic Forms Randomized Strategies: Mixed, Behavioral, and General Equivalence Theorems for Linear Games and Games of Perfect Recall An Application to Paging and Competitive Analysis Historical Notes and Open Questions 95 7 Request-Answer Games Request-Answer Games Randomized Adversaries Relating the Adversaries Historical Notes and Open Questions Competitive Analysis and Zero-Sum Games Two-Person Zero-Sum Games On Generalizations of the Minimax Theorem for Infinite Games Yao's Principle: A Technique for Obtaining Lower Bounds Paging Revisited Historical Notes Metrical Task Systems Formulation of (Metrical) Task Systems An 8(iV - 1)-Competitive Traversal Algorithm A2N-1 Lower Bound 128

4 CONTENTS IX 9.4 An Optimal Work Function MTS Algorithm A Randomized Algorithm for a Uniform MTS A Randomized Polylogarithmic Competitive Algorithm for Any MTS Historical Notes and Open Questions The ^-Server Problem The Formulation of the Model Some Basic Aspects of the ^-Server Problem A Deterministic Lower Bound ^-Servers on a Line and a Tree An Efficient 3-Competitive 2-Server Algorithm for Euclidean Spaces Balancing Algorithms The ^-Server Work Function Algorithm On Generalizations of the ^-Server Conjecture That Fail Historical Notes and Open Questions Randomized A>Server Algorithms Oblivious Adversaries and Two Randomized ^-Server Algorithms for the Circle A Lower Bound Against an Adaptive-Online Adversary The-Cat and Rat Game and Applications to Randomized ^-Server Algorithms The Harmonic Random Walk The HARMONIC it-server Algorithm on an Arbitrary Metric Space The Resistive Approach Historical Notes and Open Questions Load Balancing Defining the Problem Online Algorithms for Load Balancing of Permanent Jobs Formulating the Machine Assignment Problem as a Generalized Virtual Circuit Routing Problem Load Balancing of Temporary Jobs Bin Packing Historical Notes and Open Questions Call Admission and Circuit Routing Specifying the Problem 226

5 X CONTENTS 13.2 Throughput Maximization for Permanent Calls in Networks with Large Edge Capacities Throughput Maximization for Limited Duration Calls Experimental Results Call Admission for Particular Networks: The Disjoint Paths Problem The Disjoint Paths Problem: A Lower Bound for a Difficult Network Routing on Optical Networks Path Coloring for Particular Networks A Lower Bound for Path Coloring on the Brick Wall Graph Historical Notes and Open Problems Search, Trading, and Portfolio Selection Online Search and One-Way Trading Online Portfolio Selection Two-Way Trading: Statistical Adversaries and "Money Making" Algorithms Two-Way Trading and the Fixed Fluctuation Model Weighted Portfolio Selection Algorithms Historical Notes and Open Questions On Decision Theories and the Competitive Ratio Certainty, Risk, and Strict Uncertainty Decision Making Under Strict Uncertainty The Competitive Ratio Axioms Characterization of the Competitive Ratio Characterizations of the Classical Criteria for Strict Uncertainty An Example - The Leasing Problem Decision Making Under Risk Bayesian Approaches for Decision Making Under Uncertainty Historical Notes and Open Questions 348 A Glossary 355 B Stochastic Analyses for List Accessing Algorithms 357 C The Harmonic Random Walk and Its Connection to Electrical Networks 361

6 CONTENTS XI D Proof of Lemmas 5.4 and 5.5 in Theorem 5.11: FAR Is a Uniformly Optimal Online Paging Algorithm 364 D.I Proof of Lemma 5.4: Type 1 Reps and the Construction of T' 364 D.2 Proof of Lemma 5.5: Type 2 Reps and the Construction of H 365 E Some Tools from Renewal Theory 369 E. 1 Renewal Processes 369 E.2 Wald's Equation 370 E.3 The Elementary Renewal Theorem 373 F Proof of Theorem 13.14: Disjoint Paths in an Array 375 F.I Short Distance Calls 375 F.2 Long Distance Calls 376 G Some Tools from the Theory of Types 379 H Two Technical Lemmas 382 Bibliography 389 Index 403

COMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 11 - Oct. 11, 2018 University of Manitoba

COMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 11 - Oct. 11, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem Shahin Kamali Lecture 11 - Oct. 11, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem 1 / 19 Review & Plan

More information

COMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 9 - Oct. 4, 2018 University of Manitoba

COMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 9 - Oct. 4, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem Shahin Kamali Lecture 9 - Oct. 4, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem 1 / 20 Review & Plan COMP

More information

Online Call Control in Cellular Networks Revisited

Online Call Control in Cellular Networks Revisited Online Call Control in Cellular Networks Revisited Yong Zhang Francis Y.L. Chin Hing-Fung Ting Joseph Wun-Tat Chan Xin Han Ka-Cheong Lam Abstract Wireless Communication Networks based on Frequency Division

More information

Digital Signal Processing

Digital Signal Processing Digital Signal Processing Fourth Edition John G. Proakis Department of Electrical and Computer Engineering Northeastern University Boston, Massachusetts Dimitris G. Manolakis MIT Lincoln Laboratory Lexington,

More information

Lecture Notes 3: Paging, K-Server and Metric Spaces

Lecture Notes 3: Paging, K-Server and Metric Spaces Online Algorithms 16/11/11 Lecture Notes 3: Paging, K-Server and Metric Spaces Professor: Yossi Azar Scribe:Maor Dan 1 Introduction This lecture covers the Paging problem. We present a competitive online

More information

Lecture 7: The Principle of Deferred Decisions

Lecture 7: The Principle of Deferred Decisions Randomized Algorithms Lecture 7: The Principle of Deferred Decisions Sotiris Nikoletseas Professor CEID - ETY Course 2017-2018 Sotiris Nikoletseas, Professor Randomized Algorithms - Lecture 7 1 / 20 Overview

More information

THOMAS PANY SOFTWARE RECEIVERS

THOMAS PANY SOFTWARE RECEIVERS TECHNOLOGY AND APPLICATIONS SERIES THOMAS PANY SOFTWARE RECEIVERS Contents Preface Acknowledgments xiii xvii Chapter 1 Radio Navigation Signals 1 1.1 Signal Generation 1 1.2 Signal Propagation 2 1.3 Signal

More information

The tenure game. The tenure game. Winning strategies for the tenure game. Winning condition for the tenure game

The tenure game. The tenure game. Winning strategies for the tenure game. Winning condition for the tenure game The tenure game The tenure game is played by two players Alice and Bob. Initially, finitely many tokens are placed at positions that are nonzero natural numbers. Then Alice and Bob alternate in their moves

More information

Search then involves moving from state-to-state in the problem space to find a goal (or to terminate without finding a goal).

Search then involves moving from state-to-state in the problem space to find a goal (or to terminate without finding a goal). Search Can often solve a problem using search. Two requirements to use search: Goal Formulation. Need goals to limit search and allow termination. Problem formulation. Compact representation of problem

More information

Game Theory and Randomized Algorithms

Game Theory and Randomized Algorithms Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international

More information

Joint Scheduling and Fast Cell Selection in OFDMA Wireless Networks

Joint Scheduling and Fast Cell Selection in OFDMA Wireless Networks 1 Joint Scheduling and Fast Cell Selection in OFDMA Wireless Networks Reuven Cohen Guy Grebla Department of Computer Science Technion Israel Institute of Technology Haifa 32000, Israel Abstract In modern

More information

CONTENTS PREFACE. Part One THE DESIGN PROCESS: PROPERTIES, PARADIGMS AND THE EVOLUTIONARY STRUCTURE

CONTENTS PREFACE. Part One THE DESIGN PROCESS: PROPERTIES, PARADIGMS AND THE EVOLUTIONARY STRUCTURE Copyrighted Material Dan Braha and Oded Maimon, A Mathematical Theory of Design: Foundations, Algorithms, and Applications, Springer, 1998, 708 p., Hardcover, ISBN: 0-7923-5079-0. PREFACE Part One THE

More information

Systems. Advanced Radar. Waveform Design and Diversity for. Fulvio Gini, Antonio De Maio and Lee Patton. Edited by

Systems. Advanced Radar. Waveform Design and Diversity for. Fulvio Gini, Antonio De Maio and Lee Patton. Edited by Waveform Design and Diversity for Advanced Radar Systems Edited by Fulvio Gini, Antonio De Maio and Lee Patton The Institution of Engineering and Technology Contents Waveform diversity: a way forward to

More information

Cognitive Radio Techniques

Cognitive Radio Techniques Cognitive Radio Techniques Spectrum Sensing, Interference Mitigation, and Localization Kandeepan Sithamparanathan Andrea Giorgetti ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Preface xxi 1 Introduction

More information

Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 2010

Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 2010 Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 21 Peter Bro Miltersen November 1, 21 Version 1.3 3 Extensive form games (Game Trees, Kuhn Trees)

More information

Contents. List of Figures List of Tables. Structure of the Book How to Use this Book Online Resources Acknowledgements

Contents. List of Figures List of Tables. Structure of the Book How to Use this Book Online Resources Acknowledgements Contents List of Figures List of Tables Preface Notation Structure of the Book How to Use this Book Online Resources Acknowledgements Notational Conventions Notational Conventions for Probabilities xiii

More information

Benford's Law. Theory, the General Law of Relative Quantities, and Forensic Fraud Detection Applications. Alex Ely Kossovsky.

Benford's Law. Theory, the General Law of Relative Quantities, and Forensic Fraud Detection Applications. Alex Ely Kossovsky. BEIJING SHANGHAI Benford's Law Theory, the General Law of Relative Quantities, and Forensic Fraud Detection Applications Alex Ely Kossovsky The City University of New York, USA World Scientific NEW JERSEY

More information

AI Approaches to Ultimate Tic-Tac-Toe

AI Approaches to Ultimate Tic-Tac-Toe AI Approaches to Ultimate Tic-Tac-Toe Eytan Lifshitz CS Department Hebrew University of Jerusalem, Israel David Tsurel CS Department Hebrew University of Jerusalem, Israel I. INTRODUCTION This report is

More information

Hamming Codes as Error-Reducing Codes

Hamming Codes as Error-Reducing Codes Hamming Codes as Error-Reducing Codes William Rurik Arya Mazumdar Abstract Hamming codes are the first nontrivial family of error-correcting codes that can correct one error in a block of binary symbols.

More information

Chapter 3 Learning in Two-Player Matrix Games

Chapter 3 Learning in Two-Player Matrix Games Chapter 3 Learning in Two-Player Matrix Games 3.1 Matrix Games In this chapter, we will examine the two-player stage game or the matrix game problem. Now, we have two players each learning how to play

More information

Analysis and Design of Autonomous Microwave Circuits

Analysis and Design of Autonomous Microwave Circuits Analysis and Design of Autonomous Microwave Circuits ALMUDENA SUAREZ IEEE PRESS WILEY A JOHN WILEY & SONS, INC., PUBLICATION Contents Preface xiii 1 Oscillator Dynamics 1 1.1 Introduction 1 1.2 Operational

More information

CS510 \ Lecture Ariel Stolerman

CS510 \ Lecture Ariel Stolerman CS510 \ Lecture04 2012-10-15 1 Ariel Stolerman Administration Assignment 2: just a programming assignment. Midterm: posted by next week (5), will cover: o Lectures o Readings A midterm review sheet will

More information

4.5. Latency in milliseconds Number of Shutdowns

4.5. Latency in milliseconds Number of Shutdowns Latency Effects of System Level Power Management Algorithms Λ Dinesh Ramanathan Sandy Irani Rajesh Gupta Department of Information and Computer Science University of California Irvine, CA 92697 fdinesh,irani,rguptag@ics.uci.edu

More information

Characteristics of Routes in a Road Traffic Assignment

Characteristics of Routes in a Road Traffic Assignment Characteristics of Routes in a Road Traffic Assignment by David Boyce Northwestern University, Evanston, IL Hillel Bar-Gera Ben-Gurion University of the Negev, Israel at the PTV Vision Users Group Meeting

More information

each pair of constellation points. The binary symbol error that corresponds to an edge is its edge label. For a constellation with 2 n points, each bi

each pair of constellation points. The binary symbol error that corresponds to an edge is its edge label. For a constellation with 2 n points, each bi 36th Annual Allerton Conference on Communication, Control, and Computing, September 23-2, 1998 Prole Optimal 8-QAM and 32-QAM Constellations Xueting Liu and Richard D. Wesel Electrical Engineering Department

More information

Department of Statistics and Operations Research Undergraduate Programmes

Department of Statistics and Operations Research Undergraduate Programmes Department of Statistics and Operations Research Undergraduate Programmes OPERATIONS RESEARCH YEAR LEVEL 2 INTRODUCTION TO LINEAR PROGRAMMING SSOA021 Linear Programming Model: Formulation of an LP model;

More information

Systems Dependability Assessment

Systems Dependability Assessment FOCUS RISK MANAGEMENT AND DEPENDABILITY SERIES Systems Dependability Assessment Modeling with Graphs and Finite State Automata Jean-François Aubry Nicolae Brinzei Systems Dependability Assessment FOCUS

More information

Wireless Network Coding with Local Network Views: Coded Layer Scheduling

Wireless Network Coding with Local Network Views: Coded Layer Scheduling Wireless Network Coding with Local Network Views: Coded Layer Scheduling Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh Sabharwal arxiv:06.574v3 [cs.it] 4 Apr 07 Abstract One of the

More information

Preface for Instructors and Other Teachers 1 About This Book... xvii

Preface for Instructors and Other Teachers 1 About This Book... xvii Preface for Instructors and Other Teachers xvii 1 About This Book.... xvii 2 How tousethis Book...................... xx 2.1 A Start on Discovery-Based Learning..... xxi 2.2 Details of Conducting Group

More information

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14 600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14 25.1 Introduction Today we re going to spend some time discussing game

More information

CS 1571 Introduction to AI Lecture 12. Adversarial search. CS 1571 Intro to AI. Announcements

CS 1571 Introduction to AI Lecture 12. Adversarial search. CS 1571 Intro to AI. Announcements CS 171 Introduction to AI Lecture 1 Adversarial search Milos Hauskrecht milos@cs.pitt.edu 39 Sennott Square Announcements Homework assignment is out Programming and experiments Simulated annealing + Genetic

More information

Digital Communication Systems Engineering with

Digital Communication Systems Engineering with Digital Communication Systems Engineering with Software-Defined Radio Di Pu Alexander M. Wyglinski ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Preface xiii What Is an SDR? 1 1.1 Historical Perspective

More information

1.6 Congruence Modulo m

1.6 Congruence Modulo m 1.6 Congruence Modulo m 47 5. Let a, b 2 N and p be a prime. Prove for all natural numbers n 1, if p n (ab) and p - a, then p n b. 6. In the proof of Theorem 1.5.6 it was stated that if n is a prime number

More information

Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011

Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011 Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011 Lecture 9 In which we introduce the maximum flow problem. 1 Flows in Networks Today we start talking about the Maximum Flow

More information

@CRC Press. Discrete Mathematics. with Ducks. sarah-marie belcastro. let this be your watchword. serious mathematics treated with levity

@CRC Press. Discrete Mathematics. with Ducks. sarah-marie belcastro. let this be your watchword. serious mathematics treated with levity Discrete Mathematics with Ducks sarah-marie belcastro serious mathematics treated with levity let this be your watchword @CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint

More information

Multivariate Permutation Tests: With Applications in Biostatistics

Multivariate Permutation Tests: With Applications in Biostatistics Multivariate Permutation Tests: With Applications in Biostatistics Fortunato Pesarin University ofpadova, Italy JOHN WILEY & SONS, LTD Chichester New York Weinheim Brisbane Singapore Toronto Contents Preface

More information

Algorithms. Abstract. We describe a simple construction of a family of permutations with a certain pseudo-random

Algorithms. Abstract. We describe a simple construction of a family of permutations with a certain pseudo-random Generating Pseudo-Random Permutations and Maimum Flow Algorithms Noga Alon IBM Almaden Research Center, 650 Harry Road, San Jose, CA 9510,USA and Sackler Faculty of Eact Sciences, Tel Aviv University,

More information

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007

3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007 3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,

More information

Minimax Universal Sampling for Compound Multiband Channels

Minimax Universal Sampling for Compound Multiband Channels ISIT 2013, Istanbul July 9, 2013 Minimax Universal Sampling for Compound Multiband Channels Yuxin Chen, Andrea Goldsmith, Yonina Eldar Stanford University Technion Capacity of Undersampled Channels Point-to-point

More information

Adversarial Search. Rob Platt Northeastern University. Some images and slides are used from: AIMA CS188 UC Berkeley

Adversarial Search. Rob Platt Northeastern University. Some images and slides are used from: AIMA CS188 UC Berkeley Adversarial Search Rob Platt Northeastern University Some images and slides are used from: AIMA CS188 UC Berkeley What is adversarial search? Adversarial search: planning used to play a game such as chess

More information

18 Completeness and Compactness of First-Order Tableaux

18 Completeness and Compactness of First-Order Tableaux CS 486: Applied Logic Lecture 18, March 27, 2003 18 Completeness and Compactness of First-Order Tableaux 18.1 Completeness Proving the completeness of a first-order calculus gives us Gödel s famous completeness

More information

Research Article n-digit Benford Converges to Benford

Research Article n-digit Benford Converges to Benford International Mathematics and Mathematical Sciences Volume 2015, Article ID 123816, 4 pages http://dx.doi.org/10.1155/2015/123816 Research Article n-digit Benford Converges to Benford Azar Khosravani and

More information

TOPOLOGY, LIMITS OF COMPLEX NUMBERS. Contents 1. Topology and limits of complex numbers 1

TOPOLOGY, LIMITS OF COMPLEX NUMBERS. Contents 1. Topology and limits of complex numbers 1 TOPOLOGY, LIMITS OF COMPLEX NUMBERS Contents 1. Topology and limits of complex numbers 1 1. Topology and limits of complex numbers Since we will be doing calculus on complex numbers, not only do we need

More information

Novelty, Information and Surprise

Novelty, Information and Surprise Günther Palm Novelty, Information and Surprise 4i Springer Contents Introduction References xiii xxii Part I Surprise and Information of Descriptions 1 Prerequisites from Logic and Probability Theory 3

More information

SF2972: Game theory. Mark Voorneveld, February 2, 2015

SF2972: Game theory. Mark Voorneveld, February 2, 2015 SF2972: Game theory Mark Voorneveld, mark.voorneveld@hhs.se February 2, 2015 Topic: extensive form games. Purpose: explicitly model situations in which players move sequentially; formulate appropriate

More information

Elements of Artificial Intelligence and Expert Systems

Elements of Artificial Intelligence and Expert Systems Elements of Artificial Intelligence and Expert Systems Master in Data Science for Economics, Business & Finance Nicola Basilico Dipartimento di Informatica Via Comelico 39/41-20135 Milano (MI) Ufficio

More information

Adversarial Search. Human-aware Robotics. 2018/01/25 Chapter 5 in R&N 3rd Ø Announcement: Slides for this lecture are here:

Adversarial Search. Human-aware Robotics. 2018/01/25 Chapter 5 in R&N 3rd Ø Announcement: Slides for this lecture are here: Adversarial Search 2018/01/25 Chapter 5 in R&N 3rd Ø Announcement: q Slides for this lecture are here: http://www.public.asu.edu/~yzhan442/teaching/cse471/lectures/adversarial.pdf Slides are largely based

More information

Regents Physics Mr. Mellon Based on Chapter 22 and 23

Regents Physics Mr. Mellon Based on Chapter 22 and 23 Name Regents Physics Mr. Mellon Based on Chapter 22 and 23 Essential Questions What is current? How is it measured? What are the relationships for Ohm s Law? What device measures current and how is it

More information

Wireless Communications Over Rapidly Time-Varying Channels

Wireless Communications Over Rapidly Time-Varying Channels Wireless Communications Over Rapidly Time-Varying Channels Edited by Franz Hlawatsch Gerald Matz ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY

More information

LECTURE 26: GAME THEORY 1

LECTURE 26: GAME THEORY 1 15-382 COLLECTIVE INTELLIGENCE S18 LECTURE 26: GAME THEORY 1 INSTRUCTOR: GIANNI A. DI CARO ICE-CREAM WARS http://youtu.be/jilgxenbk_8 2 GAME THEORY Game theory is the formal study of conflict and cooperation

More information

Topic 1: defining games and strategies. SF2972: Game theory. Not allowed: Extensive form game: formal definition

Topic 1: defining games and strategies. SF2972: Game theory. Not allowed: Extensive form game: formal definition SF2972: Game theory Mark Voorneveld, mark.voorneveld@hhs.se Topic 1: defining games and strategies Drawing a game tree is usually the most informative way to represent an extensive form game. Here is one

More information

MULTIRATE DIGITAL SIGNAL PROCESSING

MULTIRATE DIGITAL SIGNAL PROCESSING AT&T MULTIRATE DIGITAL SIGNAL PROCESSING RONALD E. CROCHIERE LAWRENCE R. RABINER Acoustics Research Department Bell Laboratories Murray Hill, New Jersey Prentice-Hall, Inc., Upper Saddle River, New Jersey

More information

Lower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings

Lower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings ÂÓÙÖÒÐ Ó ÖÔ ÐÓÖØÑ Ò ÔÔÐØÓÒ ØØÔ»»ÛÛÛº ºÖÓÛÒºÙ»ÔÙÐØÓÒ»» vol.?, no.?, pp. 1 44 (????) Lower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings David R. Wood School of Computer Science

More information

Statistical Analysis of Nuel Tournaments Department of Statistics University of California, Berkeley

Statistical Analysis of Nuel Tournaments Department of Statistics University of California, Berkeley Statistical Analysis of Nuel Tournaments Department of Statistics University of California, Berkeley MoonSoo Choi Department of Industrial Engineering & Operations Research Under Guidance of Professor.

More information

SIGNAL PROCESSING OF POWER QUALITY DISTURBANCES

SIGNAL PROCESSING OF POWER QUALITY DISTURBANCES SIGNAL PROCESSING OF POWER QUALITY DISTURBANCES MATH H. J. BOLLEN IRENE YU-HUA GU IEEE PRESS SERIES I 0N POWER ENGINEERING IEEE PRESS SERIES ON POWER ENGINEERING MOHAMED E. EL-HAWARY, SERIES EDITOR IEEE

More information

Cooperative Wireless Charging Vehicle Scheduling

Cooperative Wireless Charging Vehicle Scheduling Cooperative Wireless Charging Vehicle Scheduling Huanyang Zheng and Jie Wu Computer and Information Sciences Temple University 1. Introduction Limited lifetime of battery-powered WSNs Possible solutions

More information

CS 188: Artificial Intelligence

CS 188: Artificial Intelligence CS 188: Artificial Intelligence Adversarial Search Instructor: Stuart Russell University of California, Berkeley Game Playing State-of-the-Art Checkers: 1950: First computer player. 1959: Samuel s self-taught

More information

3-2 Lecture 3: January Repeated Games A repeated game is a standard game which isplayed repeatedly. The utility of each player is the sum of

3-2 Lecture 3: January Repeated Games A repeated game is a standard game which isplayed repeatedly. The utility of each player is the sum of S294-1 Algorithmic Aspects of Game Theory Spring 2001 Lecturer: hristos Papadimitriou Lecture 3: January 30 Scribes: Kris Hildrum, ror Weitz 3.1 Overview This lecture expands the concept of a game by introducing

More information

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011

3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 Asynchronous CSMA Policies in Multihop Wireless Networks With Primary Interference Constraints Peter Marbach, Member, IEEE, Atilla

More information

Permutations with short monotone subsequences

Permutations with short monotone subsequences Permutations with short monotone subsequences Dan Romik Abstract We consider permutations of 1, 2,..., n 2 whose longest monotone subsequence is of length n and are therefore extremal for the Erdős-Szekeres

More information

Near-Optimal Radio Use For Wireless Network Synch. Synchronization

Near-Optimal Radio Use For Wireless Network Synch. Synchronization Near-Optimal Radio Use For Wireless Network Synchronization LANL, UCLA 10th of July, 2009 Motivation Consider sensor network: tiny, inexpensive embedded computers run complex software sense environmental

More information

Statistics, Probability and Noise

Statistics, Probability and Noise Statistics, Probability and Noise Claudia Feregrino-Uribe & Alicia Morales-Reyes Original material: Rene Cumplido Autumn 2015, CCC-INAOE Contents Signal and graph terminology Mean and standard deviation

More information

Broadcast in Radio Networks in the presence of Byzantine Adversaries

Broadcast in Radio Networks in the presence of Byzantine Adversaries Broadcast in Radio Networks in the presence of Byzantine Adversaries Vinod Vaikuntanathan Abstract In PODC 0, Koo [] presented a protocol that achieves broadcast in a radio network tolerating (roughly)

More information

Online Frequency Assignment in Wireless Communication Networks

Online Frequency Assignment in Wireless Communication Networks Online Frequency Assignment in Wireless Communication Networks Francis Y.L. Chin Taikoo Chair of Engineering Chair Professor of Computer Science University of Hong Kong Joint work with Dr WT Chan, Dr Deshi

More information

Signals, Sound, and Sensation

Signals, Sound, and Sensation Signals, Sound, and Sensation William M. Hartmann Department of Physics and Astronomy Michigan State University East Lansing, Michigan Л1Р Contents Preface xv Chapter 1: Pure Tones 1 Mathematics of the

More information

Hideo Okawara s Mixed Signal Lecture Series. DSP-Based Testing Fundamentals 6 Spectrum Analysis -- FFT

Hideo Okawara s Mixed Signal Lecture Series. DSP-Based Testing Fundamentals 6 Spectrum Analysis -- FFT Hideo Okawara s Mixed Signal Lecture Series DSP-Based Testing Fundamentals 6 Spectrum Analysis -- FFT Verigy Japan October 008 Preface to the Series ADC and DAC are the most typical mixed signal devices.

More information

Preface... Acknowledgments... Glossary Introduction Management Systems and the Management of Chemical Process Safety...

Preface... Acknowledgments... Glossary Introduction Management Systems and the Management of Chemical Process Safety... Preface... Acknowledgments... Glossary... xi xiii xv 1. Introduction... 1 1.1 Process Safety Management Activities of the Center for Chemical Process Safety (CCPS)... 1 1.2 Definition of "Process Safety

More information

Laboratory 1: Uncertainty Analysis

Laboratory 1: Uncertainty Analysis University of Alabama Department of Physics and Astronomy PH101 / LeClair May 26, 2014 Laboratory 1: Uncertainty Analysis Hypothesis: A statistical analysis including both mean and standard deviation can

More information

Alternation in the repeated Battle of the Sexes

Alternation in the repeated Battle of the Sexes Alternation in the repeated Battle of the Sexes Aaron Andalman & Charles Kemp 9.29, Spring 2004 MIT Abstract Traditional game-theoretic models consider only stage-game strategies. Alternation in the repeated

More information

Acentral problem in the design of wireless networks is how

Acentral problem in the design of wireless networks is how 1968 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 6, SEPTEMBER 1999 Optimal Sequences, Power Control, and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers Pramod

More information

Synchronization in Digital Communications

Synchronization in Digital Communications Synchronization in Digital Communications Volume 1 Phase-, Frequency-Locked Loops, and Amplitude Control Heinrich Meyr Aachen University of Technology (RWTH) Gerd Ascheid CADIS GmbH, Aachen WILEY A Wiley-lnterscience

More information

Precoding and Signal Shaping for Digital Transmission

Precoding and Signal Shaping for Digital Transmission Precoding and Signal Shaping for Digital Transmission Robert F. H. Fischer The Institute of Electrical and Electronics Engineers, Inc., New York WILEY- INTERSCIENCE A JOHN WILEY & SONS, INC., PUBLICATION

More information

Contents ACKNOWLEDGMENTS... LIST OF ACRONYMS... xvii PART 1. THINK UP A METHOD... 1

Contents ACKNOWLEDGMENTS... LIST OF ACRONYMS... xvii PART 1. THINK UP A METHOD... 1 Contents ACKNOWLEDGMENTS... PREFACE... xi xiii LIST OF ACRONYMS... xvii PART 1. THINK UP A METHOD... 1 CHAPTER 1. INNOVATION: AN UNFINISHED JOURNEY... 3 1.1. The journey as the end... 3 1.2. Application

More information

Practice Session 2. HW 1 Review

Practice Session 2. HW 1 Review Practice Session 2 HW 1 Review Chapter 1 1.4 Suppose we extend Evans s Analogy program so that it can score 200 on a standard IQ test. Would we then have a program more intelligent than a human? Explain.

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 6, DECEMBER /$ IEEE

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 6, DECEMBER /$ IEEE IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 6, DECEMBER 2009 1805 Optimal Channel Probing and Transmission Scheduling for Opportunistic Spectrum Access Nicholas B Chang, Student Member, IEEE, and Mingyan

More information

CONTROL OF SENSORS FOR SEQUENTIAL DETECTION A STOCHASTIC APPROACH

CONTROL OF SENSORS FOR SEQUENTIAL DETECTION A STOCHASTIC APPROACH file://\\52zhtv-fs-725v\cstemp\adlib\input\wr_export_131127111121_237836102... Page 1 of 1 11/27/2013 AFRL-OSR-VA-TR-2013-0604 CONTROL OF SENSORS FOR SEQUENTIAL DETECTION A STOCHASTIC APPROACH VIJAY GUPTA

More information

Fundamentals of Industrial Control

Fundamentals of Industrial Control Fundamentals of Industrial Control 2nd Edition D. A. Coggan, Editor Practical Guides for Measurement and Control Preface ix Contributors xi Chapter 1 Sensors 1 Applications of Instrumentation 1 Introduction

More information

Game Theory two-person, zero-sum games

Game Theory two-person, zero-sum games GAME THEORY Game Theory Mathematical theory that deals with the general features of competitive situations. Examples: parlor games, military battles, political campaigns, advertising and marketing campaigns,

More information

Antonio Fernández Anta Dariusz R. Kowalski (U. of Liverpool) Miguel A. Mosteiro (Kean U. & U. Rey Juan Carlos) Prudence W. H. Wong (U.

Antonio Fernández Anta Dariusz R. Kowalski (U. of Liverpool) Miguel A. Mosteiro (Kean U. & U. Rey Juan Carlos) Prudence W. H. Wong (U. Antonio Fernández Anta Dariusz R. Kowalski (U. of Liverpool) Miguel A. Mosteiro (Kean U. & U. Rey Juan Carlos) Prudence W. H. Wong (U. of Liverpool) Health monitoring system: - Patients with sensors of

More information

Set 4: Game-Playing. ICS 271 Fall 2017 Kalev Kask

Set 4: Game-Playing. ICS 271 Fall 2017 Kalev Kask Set 4: Game-Playing ICS 271 Fall 2017 Kalev Kask Overview Computer programs that play 2-player games game-playing as search with the complication of an opponent General principles of game-playing and search

More information

Automatic Control Motion control Advanced control techniques

Automatic Control Motion control Advanced control techniques Automatic Control Motion control Advanced control techniques (luca.bascetta@polimi.it) Politecnico di Milano Dipartimento di Elettronica, Informazione e Bioingegneria Motivations (I) 2 Besides the classical

More information

CSCI 699: Topics in Learning and Game Theory Fall 2017 Lecture 3: Intro to Game Theory. Instructor: Shaddin Dughmi

CSCI 699: Topics in Learning and Game Theory Fall 2017 Lecture 3: Intro to Game Theory. Instructor: Shaddin Dughmi CSCI 699: Topics in Learning and Game Theory Fall 217 Lecture 3: Intro to Game Theory Instructor: Shaddin Dughmi Outline 1 Introduction 2 Games of Complete Information 3 Games of Incomplete Information

More information

Modular Arithmetic. claserken. July 2016

Modular Arithmetic. claserken. July 2016 Modular Arithmetic claserken July 2016 Contents 1 Introduction 2 2 Modular Arithmetic 2 2.1 Modular Arithmetic Terminology.................. 2 2.2 Properties of Modular Arithmetic.................. 2 2.3

More information

Lecture 2. 1 Nondeterministic Communication Complexity

Lecture 2. 1 Nondeterministic Communication Complexity Communication Complexity 16:198:671 1/26/10 Lecture 2 Lecturer: Troy Lee Scribe: Luke Friedman 1 Nondeterministic Communication Complexity 1.1 Review D(f): The minimum over all deterministic protocols

More information

Section Marks Agents / 8. Search / 10. Games / 13. Logic / 15. Total / 46

Section Marks Agents / 8. Search / 10. Games / 13. Logic / 15. Total / 46 Name: CS 331 Midterm Spring 2017 You have 50 minutes to complete this midterm. You are only allowed to use your textbook, your notes, your assignments and solutions to those assignments during this midterm.

More information

On the Benefit of Tunability in Reducing Electronic Port Counts in WDM/TDM Networks

On the Benefit of Tunability in Reducing Electronic Port Counts in WDM/TDM Networks On the Benefit of Tunability in Reducing Electronic Port Counts in WDM/TDM Networks Randall Berry Dept. of ECE Northwestern Univ. Evanston, IL 60208, USA e-mail: rberry@ece.northwestern.edu Eytan Modiano

More information

Introduction to Electromagnetic Compatibility

Introduction to Electromagnetic Compatibility Introduction to Electromagnetic Compatibility Second Edition CLAYTON R. PAUL Department of Electrical and Computer Engineering, School of Engineering, Mercer University, Macon, Georgia and Emeritus Professor

More information

Optimizing Media Access Strategy for Competing Cognitive Radio Networks Y. Gwon, S. Dastangoo, H. T. Kung

Optimizing Media Access Strategy for Competing Cognitive Radio Networks Y. Gwon, S. Dastangoo, H. T. Kung Optimizing Media Access Strategy for Competing Cognitive Radio Networks Y. Gwon, S. Dastangoo, H. T. Kung December 12, 2013 Presented at IEEE GLOBECOM 2013, Atlanta, GA Outline Introduction Competing Cognitive

More information

Formalising Event Reconstruction in Digital Investigations

Formalising Event Reconstruction in Digital Investigations Formalising Event Reconstruction in Digital Investigations Pavel Gladyshev The thesis is submitted to University College Dublin for the degree of PhD in the Faculty of Science August 2004 Department of

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

Index Terms Deterministic channel model, Gaussian interference channel, successive decoding, sum-rate maximization.

Index Terms Deterministic channel model, Gaussian interference channel, successive decoding, sum-rate maximization. 3798 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 6, JUNE 2012 On the Maximum Achievable Sum-Rate With Successive Decoding in Interference Channels Yue Zhao, Member, IEEE, Chee Wei Tan, Member,

More information

Axiom A-1: To every angle there corresponds a unique, real number, 0 < < 180.

Axiom A-1: To every angle there corresponds a unique, real number, 0 < < 180. Axiom A-1: To every angle there corresponds a unique, real number, 0 < < 180. We denote the measure of ABC by m ABC. (Temporary Definition): A point D lies in the interior of ABC iff there exists a segment

More information

Bandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation

Bandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation Bandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation Xiliang Liu Joint work with Kaliappa Ravindran and Dmitri Loguinov Department of Computer Science City University of New

More information

Chapter 3 Chip Planning

Chapter 3 Chip Planning Chapter 3 Chip Planning 3.1 Introduction to Floorplanning 3. Optimization Goals in Floorplanning 3.3 Terminology 3.4 Floorplan Representations 3.4.1 Floorplan to a Constraint-Graph Pair 3.4. Floorplan

More information

1. Introduction to Game Theory

1. Introduction to Game Theory 1. Introduction to Game Theory What is game theory? Important branch of applied mathematics / economics Eight game theorists have won the Nobel prize, most notably John Nash (subject of Beautiful mind

More information

Universiteit Leiden Opleiding Informatica

Universiteit Leiden Opleiding Informatica Universiteit Leiden Opleiding Informatica An Analysis of Dominion Name: Roelof van der Heijden Date: 29/08/2014 Supervisors: Dr. W.A. Kosters (LIACS), Dr. F.M. Spieksma (MI) BACHELOR THESIS Leiden Institute

More information

Retransmission and Back-off Strategies for Broadcasting in Multi-hop Wireless Networks

Retransmission and Back-off Strategies for Broadcasting in Multi-hop Wireless Networks Retransmission and Back-off Strategies for Broadcasting in Multi-hop Wireless Networks Jesus Arango, Alon Efrat Computer Science Department University of Arizona Srinivasan Ramasubramanian Electrical and

More information

Artificial Intelligence

Artificial Intelligence Artificial Intelligence CS482, CS682, MW 1 2:15, SEM 201, MS 227 Prerequisites: 302, 365 Instructor: Sushil Louis, sushil@cse.unr.edu, http://www.cse.unr.edu/~sushil Non-classical search - Path does not

More information

Adversarial Search. Robert Platt Northeastern University. Some images and slides are used from: 1. CS188 UC Berkeley 2. RN, AIMA

Adversarial Search. Robert Platt Northeastern University. Some images and slides are used from: 1. CS188 UC Berkeley 2. RN, AIMA Adversarial Search Robert Platt Northeastern University Some images and slides are used from: 1. CS188 UC Berkeley 2. RN, AIMA What is adversarial search? Adversarial search: planning used to play a game

More information

AMORE meeting, 1-4 October, Leiden, Holland

AMORE meeting, 1-4 October, Leiden, Holland A graph theoretical approach to shunting problems L. Koci, G. Di Stefano Dipartimento di Ingegneria Elettrica, Università dell Aquila, Italy AMORE meeting, 1-4 October, Leiden, Holland Train depot algorithms

More information