Online Computation and Competitive Analysis
|
|
- Frank Willis
- 6 years ago
- Views:
Transcription
1 Online Computation and Competitive Analysis Allan Borodin University of Toronto Ran El-Yaniv Technion - Israel Institute of Technology I CAMBRIDGE UNIVERSITY PRESS
2 Contents Preface page xiii 1 Introduction to Competitive Analysis: The List Accessing Problem Basic Ideas and Terminology The List Accessing Problem The Sleator-Tarjan Result The Potential Function Method Some Lower Bounds The List Factoring Technique Historical Notes and Open Questions 19 2 Introduction to Randomized Algorithms: The List Accessing Problem The Competitive Ratio of Randomized Algorithms Algorithm BIT Algorithm RMTF: Barely Random Versus Random List Factoring-Phase Partitioning Revisited COMB: An -Competitive Algorithm Historical Notes and Open Questions 29 3 Paging: Deterministic Algorithms Some Paging Algorithms The (h, k)-paging Problem List Accessing Algorithms as Paging Algorithms LFD - An Optimal Offline Paging Algorithm Marking and Conservative Algorithms and the Competitiveness of LRU, CLOCK, FIFO, and FWF LIFO and LFU Are Not Competitive The Full Access Cost Model 40 vii
3 viii CONTENTS 3.8 Theory Versus Practice Historical Notes and Open Questions 42 4 Paging: Randomized Algorithms Randomized Competitive Analysis The Competitiveness of RANDOM The MARK Algorithm A Lower Bound for Randomized Paging Algorithms Historical Notes and Open Questions 52 5 Alternative Paging Models: Beyond Pure Competitive Analysis The Access Graph Model Dynamic Access Graphs and Experimental Studies Distributional Paging Models Historical Notes and Open Questions 75 6 Game Theoretic Foundations Games in Extensive and Strategic Forms Randomized Strategies: Mixed, Behavioral, and General Equivalence Theorems for Linear Games and Games of Perfect Recall An Application to Paging and Competitive Analysis Historical Notes and Open Questions 95 7 Request-Answer Games Request-Answer Games Randomized Adversaries Relating the Adversaries Historical Notes and Open Questions Competitive Analysis and Zero-Sum Games Two-Person Zero-Sum Games On Generalizations of the Minimax Theorem for Infinite Games Yao's Principle: A Technique for Obtaining Lower Bounds Paging Revisited Historical Notes Metrical Task Systems Formulation of (Metrical) Task Systems An 8(iV - 1)-Competitive Traversal Algorithm A2N-1 Lower Bound 128
4 CONTENTS IX 9.4 An Optimal Work Function MTS Algorithm A Randomized Algorithm for a Uniform MTS A Randomized Polylogarithmic Competitive Algorithm for Any MTS Historical Notes and Open Questions The ^-Server Problem The Formulation of the Model Some Basic Aspects of the ^-Server Problem A Deterministic Lower Bound ^-Servers on a Line and a Tree An Efficient 3-Competitive 2-Server Algorithm for Euclidean Spaces Balancing Algorithms The ^-Server Work Function Algorithm On Generalizations of the ^-Server Conjecture That Fail Historical Notes and Open Questions Randomized A>Server Algorithms Oblivious Adversaries and Two Randomized ^-Server Algorithms for the Circle A Lower Bound Against an Adaptive-Online Adversary The-Cat and Rat Game and Applications to Randomized ^-Server Algorithms The Harmonic Random Walk The HARMONIC it-server Algorithm on an Arbitrary Metric Space The Resistive Approach Historical Notes and Open Questions Load Balancing Defining the Problem Online Algorithms for Load Balancing of Permanent Jobs Formulating the Machine Assignment Problem as a Generalized Virtual Circuit Routing Problem Load Balancing of Temporary Jobs Bin Packing Historical Notes and Open Questions Call Admission and Circuit Routing Specifying the Problem 226
5 X CONTENTS 13.2 Throughput Maximization for Permanent Calls in Networks with Large Edge Capacities Throughput Maximization for Limited Duration Calls Experimental Results Call Admission for Particular Networks: The Disjoint Paths Problem The Disjoint Paths Problem: A Lower Bound for a Difficult Network Routing on Optical Networks Path Coloring for Particular Networks A Lower Bound for Path Coloring on the Brick Wall Graph Historical Notes and Open Problems Search, Trading, and Portfolio Selection Online Search and One-Way Trading Online Portfolio Selection Two-Way Trading: Statistical Adversaries and "Money Making" Algorithms Two-Way Trading and the Fixed Fluctuation Model Weighted Portfolio Selection Algorithms Historical Notes and Open Questions On Decision Theories and the Competitive Ratio Certainty, Risk, and Strict Uncertainty Decision Making Under Strict Uncertainty The Competitive Ratio Axioms Characterization of the Competitive Ratio Characterizations of the Classical Criteria for Strict Uncertainty An Example - The Leasing Problem Decision Making Under Risk Bayesian Approaches for Decision Making Under Uncertainty Historical Notes and Open Questions 348 A Glossary 355 B Stochastic Analyses for List Accessing Algorithms 357 C The Harmonic Random Walk and Its Connection to Electrical Networks 361
6 CONTENTS XI D Proof of Lemmas 5.4 and 5.5 in Theorem 5.11: FAR Is a Uniformly Optimal Online Paging Algorithm 364 D.I Proof of Lemma 5.4: Type 1 Reps and the Construction of T' 364 D.2 Proof of Lemma 5.5: Type 2 Reps and the Construction of H 365 E Some Tools from Renewal Theory 369 E. 1 Renewal Processes 369 E.2 Wald's Equation 370 E.3 The Elementary Renewal Theorem 373 F Proof of Theorem 13.14: Disjoint Paths in an Array 375 F.I Short Distance Calls 375 F.2 Long Distance Calls 376 G Some Tools from the Theory of Types 379 H Two Technical Lemmas 382 Bibliography 389 Index 403
COMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 11 - Oct. 11, 2018 University of Manitoba
COMP 7720 - Online Algorithms Paging and k-server Problem Shahin Kamali Lecture 11 - Oct. 11, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem 1 / 19 Review & Plan
More informationCOMP Online Algorithms. Paging and k-server Problem. Shahin Kamali. Lecture 9 - Oct. 4, 2018 University of Manitoba
COMP 7720 - Online Algorithms Paging and k-server Problem Shahin Kamali Lecture 9 - Oct. 4, 2018 University of Manitoba COMP 7720 - Online Algorithms Paging and k-server Problem 1 / 20 Review & Plan COMP
More informationOnline Call Control in Cellular Networks Revisited
Online Call Control in Cellular Networks Revisited Yong Zhang Francis Y.L. Chin Hing-Fung Ting Joseph Wun-Tat Chan Xin Han Ka-Cheong Lam Abstract Wireless Communication Networks based on Frequency Division
More informationDigital Signal Processing
Digital Signal Processing Fourth Edition John G. Proakis Department of Electrical and Computer Engineering Northeastern University Boston, Massachusetts Dimitris G. Manolakis MIT Lincoln Laboratory Lexington,
More informationLecture Notes 3: Paging, K-Server and Metric Spaces
Online Algorithms 16/11/11 Lecture Notes 3: Paging, K-Server and Metric Spaces Professor: Yossi Azar Scribe:Maor Dan 1 Introduction This lecture covers the Paging problem. We present a competitive online
More informationLecture 7: The Principle of Deferred Decisions
Randomized Algorithms Lecture 7: The Principle of Deferred Decisions Sotiris Nikoletseas Professor CEID - ETY Course 2017-2018 Sotiris Nikoletseas, Professor Randomized Algorithms - Lecture 7 1 / 20 Overview
More informationTHOMAS PANY SOFTWARE RECEIVERS
TECHNOLOGY AND APPLICATIONS SERIES THOMAS PANY SOFTWARE RECEIVERS Contents Preface Acknowledgments xiii xvii Chapter 1 Radio Navigation Signals 1 1.1 Signal Generation 1 1.2 Signal Propagation 2 1.3 Signal
More informationThe tenure game. The tenure game. Winning strategies for the tenure game. Winning condition for the tenure game
The tenure game The tenure game is played by two players Alice and Bob. Initially, finitely many tokens are placed at positions that are nonzero natural numbers. Then Alice and Bob alternate in their moves
More informationSearch then involves moving from state-to-state in the problem space to find a goal (or to terminate without finding a goal).
Search Can often solve a problem using search. Two requirements to use search: Goal Formulation. Need goals to limit search and allow termination. Problem formulation. Compact representation of problem
More informationGame Theory and Randomized Algorithms
Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international
More informationJoint Scheduling and Fast Cell Selection in OFDMA Wireless Networks
1 Joint Scheduling and Fast Cell Selection in OFDMA Wireless Networks Reuven Cohen Guy Grebla Department of Computer Science Technion Israel Institute of Technology Haifa 32000, Israel Abstract In modern
More informationCONTENTS PREFACE. Part One THE DESIGN PROCESS: PROPERTIES, PARADIGMS AND THE EVOLUTIONARY STRUCTURE
Copyrighted Material Dan Braha and Oded Maimon, A Mathematical Theory of Design: Foundations, Algorithms, and Applications, Springer, 1998, 708 p., Hardcover, ISBN: 0-7923-5079-0. PREFACE Part One THE
More informationSystems. Advanced Radar. Waveform Design and Diversity for. Fulvio Gini, Antonio De Maio and Lee Patton. Edited by
Waveform Design and Diversity for Advanced Radar Systems Edited by Fulvio Gini, Antonio De Maio and Lee Patton The Institution of Engineering and Technology Contents Waveform diversity: a way forward to
More informationCognitive Radio Techniques
Cognitive Radio Techniques Spectrum Sensing, Interference Mitigation, and Localization Kandeepan Sithamparanathan Andrea Giorgetti ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Preface xxi 1 Introduction
More informationComputational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 2010
Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 21 Peter Bro Miltersen November 1, 21 Version 1.3 3 Extensive form games (Game Trees, Kuhn Trees)
More informationContents. List of Figures List of Tables. Structure of the Book How to Use this Book Online Resources Acknowledgements
Contents List of Figures List of Tables Preface Notation Structure of the Book How to Use this Book Online Resources Acknowledgements Notational Conventions Notational Conventions for Probabilities xiii
More informationBenford's Law. Theory, the General Law of Relative Quantities, and Forensic Fraud Detection Applications. Alex Ely Kossovsky.
BEIJING SHANGHAI Benford's Law Theory, the General Law of Relative Quantities, and Forensic Fraud Detection Applications Alex Ely Kossovsky The City University of New York, USA World Scientific NEW JERSEY
More informationAI Approaches to Ultimate Tic-Tac-Toe
AI Approaches to Ultimate Tic-Tac-Toe Eytan Lifshitz CS Department Hebrew University of Jerusalem, Israel David Tsurel CS Department Hebrew University of Jerusalem, Israel I. INTRODUCTION This report is
More informationHamming Codes as Error-Reducing Codes
Hamming Codes as Error-Reducing Codes William Rurik Arya Mazumdar Abstract Hamming codes are the first nontrivial family of error-correcting codes that can correct one error in a block of binary symbols.
More informationChapter 3 Learning in Two-Player Matrix Games
Chapter 3 Learning in Two-Player Matrix Games 3.1 Matrix Games In this chapter, we will examine the two-player stage game or the matrix game problem. Now, we have two players each learning how to play
More informationAnalysis and Design of Autonomous Microwave Circuits
Analysis and Design of Autonomous Microwave Circuits ALMUDENA SUAREZ IEEE PRESS WILEY A JOHN WILEY & SONS, INC., PUBLICATION Contents Preface xiii 1 Oscillator Dynamics 1 1.1 Introduction 1 1.2 Operational
More informationCS510 \ Lecture Ariel Stolerman
CS510 \ Lecture04 2012-10-15 1 Ariel Stolerman Administration Assignment 2: just a programming assignment. Midterm: posted by next week (5), will cover: o Lectures o Readings A midterm review sheet will
More information4.5. Latency in milliseconds Number of Shutdowns
Latency Effects of System Level Power Management Algorithms Λ Dinesh Ramanathan Sandy Irani Rajesh Gupta Department of Information and Computer Science University of California Irvine, CA 92697 fdinesh,irani,rguptag@ics.uci.edu
More informationCharacteristics of Routes in a Road Traffic Assignment
Characteristics of Routes in a Road Traffic Assignment by David Boyce Northwestern University, Evanston, IL Hillel Bar-Gera Ben-Gurion University of the Negev, Israel at the PTV Vision Users Group Meeting
More informationeach pair of constellation points. The binary symbol error that corresponds to an edge is its edge label. For a constellation with 2 n points, each bi
36th Annual Allerton Conference on Communication, Control, and Computing, September 23-2, 1998 Prole Optimal 8-QAM and 32-QAM Constellations Xueting Liu and Richard D. Wesel Electrical Engineering Department
More informationDepartment of Statistics and Operations Research Undergraduate Programmes
Department of Statistics and Operations Research Undergraduate Programmes OPERATIONS RESEARCH YEAR LEVEL 2 INTRODUCTION TO LINEAR PROGRAMMING SSOA021 Linear Programming Model: Formulation of an LP model;
More informationSystems Dependability Assessment
FOCUS RISK MANAGEMENT AND DEPENDABILITY SERIES Systems Dependability Assessment Modeling with Graphs and Finite State Automata Jean-François Aubry Nicolae Brinzei Systems Dependability Assessment FOCUS
More informationWireless Network Coding with Local Network Views: Coded Layer Scheduling
Wireless Network Coding with Local Network Views: Coded Layer Scheduling Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh Sabharwal arxiv:06.574v3 [cs.it] 4 Apr 07 Abstract One of the
More informationPreface for Instructors and Other Teachers 1 About This Book... xvii
Preface for Instructors and Other Teachers xvii 1 About This Book.... xvii 2 How tousethis Book...................... xx 2.1 A Start on Discovery-Based Learning..... xxi 2.2 Details of Conducting Group
More informationIntroduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14
600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14 25.1 Introduction Today we re going to spend some time discussing game
More informationCS 1571 Introduction to AI Lecture 12. Adversarial search. CS 1571 Intro to AI. Announcements
CS 171 Introduction to AI Lecture 1 Adversarial search Milos Hauskrecht milos@cs.pitt.edu 39 Sennott Square Announcements Homework assignment is out Programming and experiments Simulated annealing + Genetic
More informationDigital Communication Systems Engineering with
Digital Communication Systems Engineering with Software-Defined Radio Di Pu Alexander M. Wyglinski ARTECH HOUSE BOSTON LONDON artechhouse.com Contents Preface xiii What Is an SDR? 1 1.1 Historical Perspective
More information1.6 Congruence Modulo m
1.6 Congruence Modulo m 47 5. Let a, b 2 N and p be a prime. Prove for all natural numbers n 1, if p n (ab) and p - a, then p n b. 6. In the proof of Theorem 1.5.6 it was stated that if n is a prime number
More informationStanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011
Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011 Lecture 9 In which we introduce the maximum flow problem. 1 Flows in Networks Today we start talking about the Maximum Flow
More information@CRC Press. Discrete Mathematics. with Ducks. sarah-marie belcastro. let this be your watchword. serious mathematics treated with levity
Discrete Mathematics with Ducks sarah-marie belcastro serious mathematics treated with levity let this be your watchword @CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint
More informationMultivariate Permutation Tests: With Applications in Biostatistics
Multivariate Permutation Tests: With Applications in Biostatistics Fortunato Pesarin University ofpadova, Italy JOHN WILEY & SONS, LTD Chichester New York Weinheim Brisbane Singapore Toronto Contents Preface
More informationAlgorithms. Abstract. We describe a simple construction of a family of permutations with a certain pseudo-random
Generating Pseudo-Random Permutations and Maimum Flow Algorithms Noga Alon IBM Almaden Research Center, 650 Harry Road, San Jose, CA 9510,USA and Sackler Faculty of Eact Sciences, Tel Aviv University,
More information3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 10, OCTOBER 2007
3432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 53, NO 10, OCTOBER 2007 Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution Yingbin Liang, Member, IEEE, Venugopal V Veeravalli, Fellow,
More informationMinimax Universal Sampling for Compound Multiband Channels
ISIT 2013, Istanbul July 9, 2013 Minimax Universal Sampling for Compound Multiband Channels Yuxin Chen, Andrea Goldsmith, Yonina Eldar Stanford University Technion Capacity of Undersampled Channels Point-to-point
More informationAdversarial Search. Rob Platt Northeastern University. Some images and slides are used from: AIMA CS188 UC Berkeley
Adversarial Search Rob Platt Northeastern University Some images and slides are used from: AIMA CS188 UC Berkeley What is adversarial search? Adversarial search: planning used to play a game such as chess
More information18 Completeness and Compactness of First-Order Tableaux
CS 486: Applied Logic Lecture 18, March 27, 2003 18 Completeness and Compactness of First-Order Tableaux 18.1 Completeness Proving the completeness of a first-order calculus gives us Gödel s famous completeness
More informationResearch Article n-digit Benford Converges to Benford
International Mathematics and Mathematical Sciences Volume 2015, Article ID 123816, 4 pages http://dx.doi.org/10.1155/2015/123816 Research Article n-digit Benford Converges to Benford Azar Khosravani and
More informationTOPOLOGY, LIMITS OF COMPLEX NUMBERS. Contents 1. Topology and limits of complex numbers 1
TOPOLOGY, LIMITS OF COMPLEX NUMBERS Contents 1. Topology and limits of complex numbers 1 1. Topology and limits of complex numbers Since we will be doing calculus on complex numbers, not only do we need
More informationNovelty, Information and Surprise
Günther Palm Novelty, Information and Surprise 4i Springer Contents Introduction References xiii xxii Part I Surprise and Information of Descriptions 1 Prerequisites from Logic and Probability Theory 3
More informationSF2972: Game theory. Mark Voorneveld, February 2, 2015
SF2972: Game theory Mark Voorneveld, mark.voorneveld@hhs.se February 2, 2015 Topic: extensive form games. Purpose: explicitly model situations in which players move sequentially; formulate appropriate
More informationElements of Artificial Intelligence and Expert Systems
Elements of Artificial Intelligence and Expert Systems Master in Data Science for Economics, Business & Finance Nicola Basilico Dipartimento di Informatica Via Comelico 39/41-20135 Milano (MI) Ufficio
More informationAdversarial Search. Human-aware Robotics. 2018/01/25 Chapter 5 in R&N 3rd Ø Announcement: Slides for this lecture are here:
Adversarial Search 2018/01/25 Chapter 5 in R&N 3rd Ø Announcement: q Slides for this lecture are here: http://www.public.asu.edu/~yzhan442/teaching/cse471/lectures/adversarial.pdf Slides are largely based
More informationRegents Physics Mr. Mellon Based on Chapter 22 and 23
Name Regents Physics Mr. Mellon Based on Chapter 22 and 23 Essential Questions What is current? How is it measured? What are the relationships for Ohm s Law? What device measures current and how is it
More informationWireless Communications Over Rapidly Time-Varying Channels
Wireless Communications Over Rapidly Time-Varying Channels Edited by Franz Hlawatsch Gerald Matz ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY
More informationLECTURE 26: GAME THEORY 1
15-382 COLLECTIVE INTELLIGENCE S18 LECTURE 26: GAME THEORY 1 INSTRUCTOR: GIANNI A. DI CARO ICE-CREAM WARS http://youtu.be/jilgxenbk_8 2 GAME THEORY Game theory is the formal study of conflict and cooperation
More informationTopic 1: defining games and strategies. SF2972: Game theory. Not allowed: Extensive form game: formal definition
SF2972: Game theory Mark Voorneveld, mark.voorneveld@hhs.se Topic 1: defining games and strategies Drawing a game tree is usually the most informative way to represent an extensive form game. Here is one
More informationMULTIRATE DIGITAL SIGNAL PROCESSING
AT&T MULTIRATE DIGITAL SIGNAL PROCESSING RONALD E. CROCHIERE LAWRENCE R. RABINER Acoustics Research Department Bell Laboratories Murray Hill, New Jersey Prentice-Hall, Inc., Upper Saddle River, New Jersey
More informationLower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings
ÂÓÙÖÒÐ Ó ÖÔ ÐÓÖØÑ Ò ÔÔÐØÓÒ ØØÔ»»ÛÛÛº ºÖÓÛÒºÙ»ÔÙÐØÓÒ»» vol.?, no.?, pp. 1 44 (????) Lower Bounds for the Number of Bends in Three-Dimensional Orthogonal Graph Drawings David R. Wood School of Computer Science
More informationStatistical Analysis of Nuel Tournaments Department of Statistics University of California, Berkeley
Statistical Analysis of Nuel Tournaments Department of Statistics University of California, Berkeley MoonSoo Choi Department of Industrial Engineering & Operations Research Under Guidance of Professor.
More informationSIGNAL PROCESSING OF POWER QUALITY DISTURBANCES
SIGNAL PROCESSING OF POWER QUALITY DISTURBANCES MATH H. J. BOLLEN IRENE YU-HUA GU IEEE PRESS SERIES I 0N POWER ENGINEERING IEEE PRESS SERIES ON POWER ENGINEERING MOHAMED E. EL-HAWARY, SERIES EDITOR IEEE
More informationCooperative Wireless Charging Vehicle Scheduling
Cooperative Wireless Charging Vehicle Scheduling Huanyang Zheng and Jie Wu Computer and Information Sciences Temple University 1. Introduction Limited lifetime of battery-powered WSNs Possible solutions
More informationCS 188: Artificial Intelligence
CS 188: Artificial Intelligence Adversarial Search Instructor: Stuart Russell University of California, Berkeley Game Playing State-of-the-Art Checkers: 1950: First computer player. 1959: Samuel s self-taught
More information3-2 Lecture 3: January Repeated Games A repeated game is a standard game which isplayed repeatedly. The utility of each player is the sum of
S294-1 Algorithmic Aspects of Game Theory Spring 2001 Lecturer: hristos Papadimitriou Lecture 3: January 30 Scribes: Kris Hildrum, ror Weitz 3.1 Overview This lecture expands the concept of a game by introducing
More information3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011
3644 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 6, JUNE 2011 Asynchronous CSMA Policies in Multihop Wireless Networks With Primary Interference Constraints Peter Marbach, Member, IEEE, Atilla
More informationPermutations with short monotone subsequences
Permutations with short monotone subsequences Dan Romik Abstract We consider permutations of 1, 2,..., n 2 whose longest monotone subsequence is of length n and are therefore extremal for the Erdős-Szekeres
More informationNear-Optimal Radio Use For Wireless Network Synch. Synchronization
Near-Optimal Radio Use For Wireless Network Synchronization LANL, UCLA 10th of July, 2009 Motivation Consider sensor network: tiny, inexpensive embedded computers run complex software sense environmental
More informationStatistics, Probability and Noise
Statistics, Probability and Noise Claudia Feregrino-Uribe & Alicia Morales-Reyes Original material: Rene Cumplido Autumn 2015, CCC-INAOE Contents Signal and graph terminology Mean and standard deviation
More informationBroadcast in Radio Networks in the presence of Byzantine Adversaries
Broadcast in Radio Networks in the presence of Byzantine Adversaries Vinod Vaikuntanathan Abstract In PODC 0, Koo [] presented a protocol that achieves broadcast in a radio network tolerating (roughly)
More informationOnline Frequency Assignment in Wireless Communication Networks
Online Frequency Assignment in Wireless Communication Networks Francis Y.L. Chin Taikoo Chair of Engineering Chair Professor of Computer Science University of Hong Kong Joint work with Dr WT Chan, Dr Deshi
More informationSignals, Sound, and Sensation
Signals, Sound, and Sensation William M. Hartmann Department of Physics and Astronomy Michigan State University East Lansing, Michigan Л1Р Contents Preface xv Chapter 1: Pure Tones 1 Mathematics of the
More informationHideo Okawara s Mixed Signal Lecture Series. DSP-Based Testing Fundamentals 6 Spectrum Analysis -- FFT
Hideo Okawara s Mixed Signal Lecture Series DSP-Based Testing Fundamentals 6 Spectrum Analysis -- FFT Verigy Japan October 008 Preface to the Series ADC and DAC are the most typical mixed signal devices.
More informationPreface... Acknowledgments... Glossary Introduction Management Systems and the Management of Chemical Process Safety...
Preface... Acknowledgments... Glossary... xi xiii xv 1. Introduction... 1 1.1 Process Safety Management Activities of the Center for Chemical Process Safety (CCPS)... 1 1.2 Definition of "Process Safety
More informationLaboratory 1: Uncertainty Analysis
University of Alabama Department of Physics and Astronomy PH101 / LeClair May 26, 2014 Laboratory 1: Uncertainty Analysis Hypothesis: A statistical analysis including both mean and standard deviation can
More informationAlternation in the repeated Battle of the Sexes
Alternation in the repeated Battle of the Sexes Aaron Andalman & Charles Kemp 9.29, Spring 2004 MIT Abstract Traditional game-theoretic models consider only stage-game strategies. Alternation in the repeated
More informationAcentral problem in the design of wireless networks is how
1968 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 6, SEPTEMBER 1999 Optimal Sequences, Power Control, and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers Pramod
More informationSynchronization in Digital Communications
Synchronization in Digital Communications Volume 1 Phase-, Frequency-Locked Loops, and Amplitude Control Heinrich Meyr Aachen University of Technology (RWTH) Gerd Ascheid CADIS GmbH, Aachen WILEY A Wiley-lnterscience
More informationPrecoding and Signal Shaping for Digital Transmission
Precoding and Signal Shaping for Digital Transmission Robert F. H. Fischer The Institute of Electrical and Electronics Engineers, Inc., New York WILEY- INTERSCIENCE A JOHN WILEY & SONS, INC., PUBLICATION
More informationContents ACKNOWLEDGMENTS... LIST OF ACRONYMS... xvii PART 1. THINK UP A METHOD... 1
Contents ACKNOWLEDGMENTS... PREFACE... xi xiii LIST OF ACRONYMS... xvii PART 1. THINK UP A METHOD... 1 CHAPTER 1. INNOVATION: AN UNFINISHED JOURNEY... 3 1.1. The journey as the end... 3 1.2. Application
More informationPractice Session 2. HW 1 Review
Practice Session 2 HW 1 Review Chapter 1 1.4 Suppose we extend Evans s Analogy program so that it can score 200 on a standard IQ test. Would we then have a program more intelligent than a human? Explain.
More informationIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 6, DECEMBER /$ IEEE
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 17, NO 6, DECEMBER 2009 1805 Optimal Channel Probing and Transmission Scheduling for Opportunistic Spectrum Access Nicholas B Chang, Student Member, IEEE, and Mingyan
More informationCONTROL OF SENSORS FOR SEQUENTIAL DETECTION A STOCHASTIC APPROACH
file://\\52zhtv-fs-725v\cstemp\adlib\input\wr_export_131127111121_237836102... Page 1 of 1 11/27/2013 AFRL-OSR-VA-TR-2013-0604 CONTROL OF SENSORS FOR SEQUENTIAL DETECTION A STOCHASTIC APPROACH VIJAY GUPTA
More informationFundamentals of Industrial Control
Fundamentals of Industrial Control 2nd Edition D. A. Coggan, Editor Practical Guides for Measurement and Control Preface ix Contributors xi Chapter 1 Sensors 1 Applications of Instrumentation 1 Introduction
More informationGame Theory two-person, zero-sum games
GAME THEORY Game Theory Mathematical theory that deals with the general features of competitive situations. Examples: parlor games, military battles, political campaigns, advertising and marketing campaigns,
More informationAntonio Fernández Anta Dariusz R. Kowalski (U. of Liverpool) Miguel A. Mosteiro (Kean U. & U. Rey Juan Carlos) Prudence W. H. Wong (U.
Antonio Fernández Anta Dariusz R. Kowalski (U. of Liverpool) Miguel A. Mosteiro (Kean U. & U. Rey Juan Carlos) Prudence W. H. Wong (U. of Liverpool) Health monitoring system: - Patients with sensors of
More informationSet 4: Game-Playing. ICS 271 Fall 2017 Kalev Kask
Set 4: Game-Playing ICS 271 Fall 2017 Kalev Kask Overview Computer programs that play 2-player games game-playing as search with the complication of an opponent General principles of game-playing and search
More informationAutomatic Control Motion control Advanced control techniques
Automatic Control Motion control Advanced control techniques (luca.bascetta@polimi.it) Politecnico di Milano Dipartimento di Elettronica, Informazione e Bioingegneria Motivations (I) 2 Besides the classical
More informationCSCI 699: Topics in Learning and Game Theory Fall 2017 Lecture 3: Intro to Game Theory. Instructor: Shaddin Dughmi
CSCI 699: Topics in Learning and Game Theory Fall 217 Lecture 3: Intro to Game Theory Instructor: Shaddin Dughmi Outline 1 Introduction 2 Games of Complete Information 3 Games of Incomplete Information
More informationModular Arithmetic. claserken. July 2016
Modular Arithmetic claserken July 2016 Contents 1 Introduction 2 2 Modular Arithmetic 2 2.1 Modular Arithmetic Terminology.................. 2 2.2 Properties of Modular Arithmetic.................. 2 2.3
More informationLecture 2. 1 Nondeterministic Communication Complexity
Communication Complexity 16:198:671 1/26/10 Lecture 2 Lecturer: Troy Lee Scribe: Luke Friedman 1 Nondeterministic Communication Complexity 1.1 Review D(f): The minimum over all deterministic protocols
More informationSection Marks Agents / 8. Search / 10. Games / 13. Logic / 15. Total / 46
Name: CS 331 Midterm Spring 2017 You have 50 minutes to complete this midterm. You are only allowed to use your textbook, your notes, your assignments and solutions to those assignments during this midterm.
More informationOn the Benefit of Tunability in Reducing Electronic Port Counts in WDM/TDM Networks
On the Benefit of Tunability in Reducing Electronic Port Counts in WDM/TDM Networks Randall Berry Dept. of ECE Northwestern Univ. Evanston, IL 60208, USA e-mail: rberry@ece.northwestern.edu Eytan Modiano
More informationIntroduction to Electromagnetic Compatibility
Introduction to Electromagnetic Compatibility Second Edition CLAYTON R. PAUL Department of Electrical and Computer Engineering, School of Engineering, Mercer University, Macon, Georgia and Emeritus Professor
More informationOptimizing Media Access Strategy for Competing Cognitive Radio Networks Y. Gwon, S. Dastangoo, H. T. Kung
Optimizing Media Access Strategy for Competing Cognitive Radio Networks Y. Gwon, S. Dastangoo, H. T. Kung December 12, 2013 Presented at IEEE GLOBECOM 2013, Atlanta, GA Outline Introduction Competing Cognitive
More informationFormalising Event Reconstruction in Digital Investigations
Formalising Event Reconstruction in Digital Investigations Pavel Gladyshev The thesis is submitted to University College Dublin for the degree of PhD in the Faculty of Science August 2004 Department of
More informationHow (Information Theoretically) Optimal Are Distributed Decisions?
How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr
More informationIndex Terms Deterministic channel model, Gaussian interference channel, successive decoding, sum-rate maximization.
3798 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 6, JUNE 2012 On the Maximum Achievable Sum-Rate With Successive Decoding in Interference Channels Yue Zhao, Member, IEEE, Chee Wei Tan, Member,
More informationAxiom A-1: To every angle there corresponds a unique, real number, 0 < < 180.
Axiom A-1: To every angle there corresponds a unique, real number, 0 < < 180. We denote the measure of ABC by m ABC. (Temporary Definition): A point D lies in the interior of ABC iff there exists a segment
More informationBandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation
Bandwidth Estimation Using End-to- End Packet-Train Probing: Stochastic Foundation Xiliang Liu Joint work with Kaliappa Ravindran and Dmitri Loguinov Department of Computer Science City University of New
More informationChapter 3 Chip Planning
Chapter 3 Chip Planning 3.1 Introduction to Floorplanning 3. Optimization Goals in Floorplanning 3.3 Terminology 3.4 Floorplan Representations 3.4.1 Floorplan to a Constraint-Graph Pair 3.4. Floorplan
More information1. Introduction to Game Theory
1. Introduction to Game Theory What is game theory? Important branch of applied mathematics / economics Eight game theorists have won the Nobel prize, most notably John Nash (subject of Beautiful mind
More informationUniversiteit Leiden Opleiding Informatica
Universiteit Leiden Opleiding Informatica An Analysis of Dominion Name: Roelof van der Heijden Date: 29/08/2014 Supervisors: Dr. W.A. Kosters (LIACS), Dr. F.M. Spieksma (MI) BACHELOR THESIS Leiden Institute
More informationRetransmission and Back-off Strategies for Broadcasting in Multi-hop Wireless Networks
Retransmission and Back-off Strategies for Broadcasting in Multi-hop Wireless Networks Jesus Arango, Alon Efrat Computer Science Department University of Arizona Srinivasan Ramasubramanian Electrical and
More informationArtificial Intelligence
Artificial Intelligence CS482, CS682, MW 1 2:15, SEM 201, MS 227 Prerequisites: 302, 365 Instructor: Sushil Louis, sushil@cse.unr.edu, http://www.cse.unr.edu/~sushil Non-classical search - Path does not
More informationAdversarial Search. Robert Platt Northeastern University. Some images and slides are used from: 1. CS188 UC Berkeley 2. RN, AIMA
Adversarial Search Robert Platt Northeastern University Some images and slides are used from: 1. CS188 UC Berkeley 2. RN, AIMA What is adversarial search? Adversarial search: planning used to play a game
More informationAMORE meeting, 1-4 October, Leiden, Holland
A graph theoretical approach to shunting problems L. Koci, G. Di Stefano Dipartimento di Ingegneria Elettrica, Università dell Aquila, Italy AMORE meeting, 1-4 October, Leiden, Holland Train depot algorithms
More information