Data Collection in Population Protocols with Non-uniformly Random Scheduler
|
|
- Abel Owen
- 5 years ago
- Views:
Transcription
1 Data Collection in Population Protocols with Non-uniformly Random Scheduler Or: How to work less and get done more Joffroy Beauquier Janna Burman Shay Kutten Thomas Nowak Chuan Xu September 8, 2017 Data Collection in Population Protocols with Non-uniformly Random Scheduler 1/15
2 Overview 1 Network model and motivation 2 Non uniformly random scheduler 3 Data collection in Population Protocols Data Collection in Population Protocols with Non-uniformly Random Scheduler 2/15
3 Overview 1 Network model and motivation 2 Non uniformly random scheduler 3 Data collection in Population Protocols Lower bounds on expected convergence time Analytical results on time complexities of data collection protocols Energy-efficient protocol Numerical results Data Collection in Population Protocols with Non-uniformly Random Scheduler 2/15
4 Model Population Protocols 1 Anonymous agents 2 Interaction in pairs: 3 Asymmetric: initiator, responder 4 Scheduler: order of interaction Data Collection in Population Protocols with Non-uniformly Random Scheduler 3/15
5 Model Population Protocols 1 Anonymous agents 2 Interaction in pairs: 3 Asymmetric: initiator, responder 4 Scheduler: order of interaction Examples of passively Mobile Sensor Network ZebraNet (wildlife tracking) EMMA (pollution monitoring) Data Collection in Population Protocols with Non-uniformly Random Scheduler 3/15
6 Enhanced Population Protocols: Non uniformly random scheduler S(P), P R n n Uniform random scheduler: P i,j = 1/n(n 1) Non-uniform random scheduler: general probability distribution P i,j Motivation: differing mobility patterns, differing speeds Data Collection in Population Protocols with Non-uniformly Random Scheduler 4/15
7 Data Collection Every agents starts with an initial value. Data collection is complete when the base station has all values. Values can be transfered from agent to agent. Data Collection in Population Protocols with Non-uniformly Random Scheduler 5/15
8 Lower bounds on the expected covergence time Theorem The expected convergence time of any protocol solving data collection with non-uniformly random scheduler is Ω(n log n). Theorem The expected convergence time of any protocol solving data collection is Ω(max 1 n i j=1 (P i,j +P j,i ) ). Data Collection in Population Protocols with Non-uniformly Random Scheduler 6/15
9 TTF Protocol: Transfer to the Faster [Beauquier et al, PODC 10] Transfer all values from j to i if i is faster than j i: j: Data Collection in Population Protocols with Non-uniformly Random Scheduler 7/15
10 TTF Protocol: Transfer to the Faster [Beauquier et al, PODC 10] Transfer all values from j to i if i is faster than j i: j: faster = smaller cover time (= time to meet all agents) Data Collection in Population Protocols with Non-uniformly Random Scheduler 7/15
11 TTF Protocol: Transfer to the Faster [Beauquier et al, PODC 10] Transfer all values from j to i if i is faster than j i: j: faster = smaller cover time (= time to meet all agents) define x i (t) = number of data held by agent i at step t Data Collection in Population Protocols with Non-uniformly Random Scheduler 7/15
12 TTF Protocol: Transfer to the Faster [Beauquier et al, PODC 10] Transfer all values from j to i if i is faster than j i: j: faster = smaller cover time (= time to meet all agents) define x i (t) = number of data held by agent i at step t then x(t) = W (t) x(t 1) where W (t) = Data Collection in Population Protocols with Non-uniformly Random Scheduler 7/15
13 TTF Protocol Transfer all values from j to i if i is faster than j i: j: then x(t) = W (t) W (1) x(0) convergence speed of matrix product W (t)... W (1) depends on the second eigenvalues of the W (τ) Theorem The ( expected convergence time of the TTF protocol is n log n O where W is the expected value w.r.t. P i,j of a log λ 2 ( W ) 1 ) matrix associated to the matrices W (τ). Data Collection in Population Protocols with Non-uniformly Random Scheduler 8/15
14 TTF Protocol this upper bound on the data collection time of TTF is quite loose however, Data Collection in Population Protocols with Non-uniformly Random Scheduler 9/15
15 TTF Protocol this upper bound on the data collection time of TTF is quite loose however, Data Collection in Population Protocols with Non-uniformly Random Scheduler 9/15
16 Lazy TTF (p) During an interaction as initiator, do nothing with probability p i, otherwise execute TTF. Decide Transfer whether if i istofaster execute thanttf j i: j: initiator responder with probability p i Data Collection in Population Protocols with Non-uniformly Random Scheduler 10/15
17 Lazy TTF (p) During an interaction as initiator, do nothing with probability p i, otherwise execute TTF. Decide Transfer whether if i istofaster execute thanttf j i: j: initiator responder with probability p i Data Collection in Population Protocols with Non-uniformly Random Scheduler 10/15
18 Lazy TTF (p) During an interaction as initiator, do nothing with probability p i, otherwise execute TTF. Decide Transfer whether if i istofaster execute thanttf j i: j: initiator responder with probability p i Data Collection in Population Protocols with Non-uniformly Random Scheduler 10/15
19 Lazy TTF (p) During an interaction as initiator, do nothing with probability p i, otherwise execute TTF. Decide Transfer whether if i istofaster execute thanttf j i: j: initiator responder with probability p i Data Collection in Population Protocols with Non-uniformly Random Scheduler 10/15
20 Lazy TTF (p) During an interaction as initiator, do nothing with probability p i, otherwise execute TTF. Decide Transfer whether if i istofaster execute thanttf j i: j: initiator responder with probability p i 1 When p is a vector of all ones, lazy TTF(p) = TTF 2 When p is a vector of all zeros, infinite time but zero energy consumption 3 Energy/Time trade off Data Collection in Population Protocols with Non-uniformly Random Scheduler 10/15
21 Lazy TTF (p) During an interaction as initiator, do nothing with probability p i, otherwise execute TTF. Theorem Decide Transfer whether if i istofaster execute thanttf j The ( expected convergence time of the TTF protocol is O. ) n log n log λ 2 ( W p) 1 i: j: initiator responder with probability p i Data Collection in Population Protocols with Non-uniformly Random Scheduler 10/15
22 Lazy TTF (p) During an interaction as initiator, do nothing with probability p i, otherwise execute TTF. Theorem Decide Transfer whether if i istofaster execute thanttf j The ( expected convergence time of the TTF protocol is O. ) n log n log λ 2 ( W p) 1 Choose i: p: initiator optimize the upper bound on j: the gathering responder time with probability p i Data Collection in Population Protocols with Non-uniformly Random Scheduler 10/15
23 Lazy TTF( ˆp) OP 1 : min λ 2 ( W ) p R n s.t Eq. (1) 0 p i 1 i {1,..., n} equivalent to OP 2 (convex) : min p R n,s s s.t si W 0 Eq. (1) 0 p i 1 i {1,..., n} Solving OP 2 ˆp. Data Collection in Population Protocols with Non-uniformly Random Scheduler 11/15
24 Numerical results: Gaps on Time and Energy between TTF and Lazy TTF(ˆp) For small systems, the expected convergence time T E (TTF) and T E (lazy TTF(ˆp)) can be calculated directly via the Markov chain. E: Total energy consumption of a protocol E(TTF) = 2T E (TTF) E wkp E(lazyTTF(ˆp)) = 2T E (lazy TTF(ˆp)) i (P i,j ˆp i + P j,i ˆp j ) E wkp. j Data Collection in Population Protocols with Non-uniformly Random Scheduler 12/15
25 Numerical results: Gaps on Time and Energy between TTF and Lazy TTF(ˆp) For small systems, the expected convergence time T E (TTF) and T E (lazy TTF(ˆp)) can be calculated directly via the Markov chain. E: Total energy consumption of a protocol E(TTF) = 2T E (TTF) E wkp E(lazyTTF(ˆp)) = 2T E (lazy TTF(ˆp)) i (P i,j ˆp i + P j,i ˆp j ) E wkp. j Each system of size n, S(n): schedulers randomly generated Gap(T E, n) = TE s(lazy TTF(ˆps )) TE s(ttf) TE s(ttf) /10000 and s S(n) Gap(E, n) = s S(n) E s (lazy TTF(ˆp s )) E s (TTF) E s / (TTF) Data Collection in Population Protocols with Non-uniformly Random Scheduler 12/15
26 Size n Gap(T E, n) Gap(E, n) % % % % % % % % % % Table: Gaps on time and energy. Data Collection in Population Protocols with Non-uniformly Random Scheduler 13/15
27 Conclusions: Initiate the study of non uniformly random scheduler in the context of population protocols Data Collection in Population Protocols with Non-uniformly Random Scheduler 14/15
28 Conclusions: Initiate the study of non uniformly random scheduler in the context of population protocols Give explicit lower bounds on expected convergence time of any data collection protocol Give analytical results for two distributed data collection protocols (a known TTF and a new parametrized energy efficient protocol) Data Collection in Population Protocols with Non-uniformly Random Scheduler 14/15
29 Conclusions: Initiate the study of non uniformly random scheduler in the context of population protocols Give explicit lower bounds on expected convergence time of any data collection protocol Give analytical results for two distributed data collection protocols (a known TTF and a new parametrized energy efficient protocol) Present numerical results to show the efficiency of the new protocol Data Collection in Population Protocols with Non-uniformly Random Scheduler 14/15
30 Thanks for your attention! Data Collection in Population Protocols with Non-uniformly Random Scheduler 15/15
Efficiency and detectability of random reactive jamming in wireless networks
Efficiency and detectability of random reactive jamming in wireless networks Ni An, Steven Weber Modeling & Analysis of Networks Laboratory Drexel University Department of Electrical and Computer Engineering
More informationModelling of Real Network Traffic by Phase-Type distribution
Modelling of Real Network Traffic by Phase-Type distribution Andriy Panchenko Dresden University of Technology 27-28.Juli.2004 4. Würzburger Workshop "IP Netzmanagement, IP Netzplanung und Optimierung"
More informationFrugal Sensing Spectral Analysis from Power Inequalities
Frugal Sensing Spectral Analysis from Power Inequalities Nikos Sidiropoulos Joint work with Omar Mehanna IEEE SPAWC 2013 Plenary, June 17, 2013, Darmstadt, Germany Wideband Spectrum Sensing (for CR/DSM)
More informationIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 20XX 1
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. XX, NO. X, AUGUST 0XX 1 Greenput: a Power-saving Algorithm That Achieves Maximum Throughput in Wireless Networks Cheng-Shang Chang, Fellow, IEEE, Duan-Shin Lee,
More informationMulti-user Space Time Scheduling for Wireless Systems with Multiple Antenna
Multi-user Space Time Scheduling for Wireless Systems with Multiple Antenna Vincent Lau Associate Prof., University of Hong Kong Senior Manager, ASTRI Agenda Bacground Lin Level vs System Level Performance
More informationPermutation group and determinants. (Dated: September 19, 2018)
Permutation group and determinants (Dated: September 19, 2018) 1 I. SYMMETRIES OF MANY-PARTICLE FUNCTIONS Since electrons are fermions, the electronic wave functions have to be antisymmetric. This chapter
More informationOptimal Resource Allocation for OFDM Uplink Communication: A Primal-Dual Approach
Optimal Resource Allocation for OFDM Uplink Communication: A Primal-Dual Approach Minghua Chen and Jianwei Huang The Chinese University of Hong Kong Acknowledgement: R. Agrawal, R. Berry, V. Subramanian
More informationLuca Schenato joint work with: A. Basso, G. Gamba
Distributed consensus protocols for clock synchronization in sensor networks Luca Schenato joint work with: A. Basso, G. Gamba Networked Control Systems Drive-by-wire systems Swarm robotics Smart structures:
More informationResource Management in QoS-Aware Wireless Cellular Networks
Resource Management in QoS-Aware Wireless Cellular Networks Zhi Zhang Dept. of Electrical and Computer Engineering Colorado State University April 24, 2009 Zhi Zhang (ECE CSU) Resource Management in Wireless
More informationTowards Application Driven Sensor Network Control. Nael Abu-Ghazaleh SUNY Binghamton
Towards Application Driven Sensor Network Control Nael Abu-Ghazaleh SUNY Binghamton nael@cs.binghamton.edu Scenario Observer wants to observe something about the phenomenon Track all the lions in this
More informationSupervisory Control for Cost-Effective Redistribution of Robotic Swarms
Supervisory Control for Cost-Effective Redistribution of Robotic Swarms Ruikun Luo Department of Mechaincal Engineering College of Engineering Carnegie Mellon University Pittsburgh, Pennsylvania 11 Email:
More informationComputing Nash Equilibrium; Maxmin
Computing Nash Equilibrium; Maxmin Lecture 5 Computing Nash Equilibrium; Maxmin Lecture 5, Slide 1 Lecture Overview 1 Recap 2 Computing Mixed Nash Equilibria 3 Fun Game 4 Maxmin and Minmax Computing Nash
More informationMixed Strategies; Maxmin
Mixed Strategies; Maxmin CPSC 532A Lecture 4 January 28, 2008 Mixed Strategies; Maxmin CPSC 532A Lecture 4, Slide 1 Lecture Overview 1 Recap 2 Mixed Strategies 3 Fun Game 4 Maxmin and Minmax Mixed Strategies;
More informationITLinQ: A New Approach for Spectrum Sharing in Device-to-Device Networks
ITLinQ: A New Approach for Spectrum Sharing in Device-to-Device Networks Salman Avestimehr In collaboration with Navid Naderializadeh ITA 2/10/14 D2D Communication Device-to-Device (D2D) communication
More informationMixing Business Cards in a Box
Mixing Business Cards in a Box I. Abstract... 2 II. Introduction... 2 III. Experiment... 2 1. Materials... 2 2. Mixing Procedure... 3 3. Data collection... 3 IV. Theory... 4 V. Statistics of the Data...
More informationTrade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks. Wei Wang, Vikram Srinivasan, Kee-Chaing Chua
Trade-offs Between Mobility and Density for Coverage in Wireless Sensor Networks Wei Wang, Vikram Srinivasan, Kee-Chaing Chua Coverage in sensor networks Sensors are often randomly scattered in the field
More informationMedium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks
Medium Access Control via Nearest-Neighbor Interactions for Regular Wireless Networks Ka Hung Hui, Dongning Guo and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern
More informationAdaptive Systems Homework Assignment 3
Signal Processing and Speech Communication Lab Graz University of Technology Adaptive Systems Homework Assignment 3 The analytical part of your homework (your calculation sheets) as well as the MATLAB
More informationInformation flow over wireless networks: a deterministic approach
Information flow over wireless networks: a deterministic approach alman Avestimehr In collaboration with uhas iggavi (EPFL) and avid Tse (UC Berkeley) Overview Point-to-point channel Information theory
More informationOptimization Techniques for Alphabet-Constrained Signal Design
Optimization Techniques for Alphabet-Constrained Signal Design Mojtaba Soltanalian Department of Electrical Engineering California Institute of Technology Stanford EE- ISL Mar. 2015 Optimization Techniques
More informationModule 7-4 N-Area Reliability Program (NARP)
Module 7-4 N-Area Reliability Program (NARP) Chanan Singh Associated Power Analysts College Station, Texas N-Area Reliability Program A Monte Carlo Simulation Program, originally developed for studying
More informationIntroduction. Introduction ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS. Smart Wireless Sensor Systems 1
ROBUST SENSOR POSITIONING IN WIRELESS AD HOC SENSOR NETWORKS Xiang Ji and Hongyuan Zha Material taken from Sensor Network Operations by Shashi Phoa, Thomas La Porta and Christopher Griffin, John Wiley,
More informationA Closed Form for False Location Injection under Time Difference of Arrival
A Closed Form for False Location Injection under Time Difference of Arrival Lauren M. Huie Mark L. Fowler lauren.huie@rl.af.mil mfowler@binghamton.edu Air Force Research Laboratory, Rome, N Department
More informationIN recent years, there has been great interest in the analysis
2890 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 7, JULY 2006 On the Power Efficiency of Sensory and Ad Hoc Wireless Networks Amir F. Dana, Student Member, IEEE, and Babak Hassibi Abstract We
More informationPermutations with short monotone subsequences
Permutations with short monotone subsequences Dan Romik Abstract We consider permutations of 1, 2,..., n 2 whose longest monotone subsequence is of length n and are therefore extremal for the Erdős-Szekeres
More informationRouting in Massively Dense Static Sensor Networks
Routing in Massively Dense Static Sensor Networks Eitan ALTMAN, Pierre BERNHARD, Alonso SILVA* July 15, 2008 Altman, Bernhard, Silva* Routing in Massively Dense Static Sensor Networks 1/27 Table of Contents
More informationSimple, Optimal, Fast, and Robust Wireless Random Medium Access Control
Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)
More informationGame Theory and Randomized Algorithms
Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international
More informationOn Event Signal Reconstruction in Wireless Sensor Networks
On Event Signal Reconstruction in Wireless Sensor Networks Barış Atakan and Özgür B. Akan Next Generation Wireless Communications Laboratory Department of Electrical and Electronics Engineering Middle
More informationRobustness against Longer Memory Strategies in Evolutionary Games.
Robustness against Longer Memory Strategies in Evolutionary Games. Eizo Akiyama 1 Players as finite state automata In our daily life, we have to make our decisions with our restricted abilities (bounded
More informationAntennas and Propagation. Chapter 5c: Array Signal Processing and Parametric Estimation Techniques
Antennas and Propagation : Array Signal Processing and Parametric Estimation Techniques Introduction Time-domain Signal Processing Fourier spectral analysis Identify important frequency-content of signal
More informationFeedback via Message Passing in Interference Channels
Feedback via Message Passing in Interference Channels (Invited Paper) Vaneet Aggarwal Department of ELE, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr Department of
More informationON SAMPLING ISSUES OF A VIRTUALLY ROTATING MIMO ANTENNA. Robert Bains, Ralf Müller
ON SAMPLING ISSUES OF A VIRTUALLY ROTATING MIMO ANTENNA Robert Bains, Ralf Müller Department of Electronics and Telecommunications Norwegian University of Science and Technology 7491 Trondheim, Norway
More informationChapter 2 Distributed Consensus Estimation of Wireless Sensor Networks
Chapter 2 Distributed Consensus Estimation of Wireless Sensor Networks Recently, consensus based distributed estimation has attracted considerable attention from various fields to estimate deterministic
More informationTSIN01 Information Networks Lecture 9
TSIN01 Information Networks Lecture 9 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 26 th, 2017 Danyo Danev TSIN01 Information
More informationA PageRank Algorithm based on Asynchronous Gauss-Seidel Iterations
Simulation A PageRank Algorithm based on Asynchronous Gauss-Seidel Iterations D. Silvestre, J. Hespanha and C. Silvestre 2018 American Control Conference Milwaukee June 27-29 2018 Silvestre, Hespanha and
More informationDistributed estimation and consensus. Luca Schenato University of Padova WIDE 09 7 July 2009, Siena
Distributed estimation and consensus Luca Schenato University of Padova WIDE 09 7 July 2009, Siena Joint work w/ Outline Motivations and target applications Overview of consensus algorithms Application
More informationMIMO Channel Capacity in Co-Channel Interference
MIMO Channel Capacity in Co-Channel Interference Yi Song and Steven D. Blostein Department of Electrical and Computer Engineering Queen s University Kingston, Ontario, Canada, K7L 3N6 E-mail: {songy, sdb}@ee.queensu.ca
More informationImpact of Interference Model on Capacity in CDMA Cellular Networks
SCI 04: COMMUNICATION AND NETWORK SYSTEMS, TECHNOLOGIES AND APPLICATIONS 404 Impact of Interference Model on Capacity in CDMA Cellular Networks Robert AKL and Asad PARVEZ Department of Computer Science
More informationIEEE TRANSACTIONS ON COMMUNICATIONS, VOL. X, NO. X, XXX Optimal Multiband Transmission Under Hostile Jamming
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. X, NO. X, XXX 016 1 Optimal Multiband Transmission Under Hostile Jamming Tianlong Song, Wayne E. Stark, Tongtong Li, and Jitendra K. Tugnait Abstract This paper
More informationRecovering Lost Sensor Data through Compressed Sensing
Recovering Lost Sensor Data through Compressed Sensing Zainul Charbiwala Collaborators: Younghun Kim, Sadaf Zahedi, Supriyo Chakraborty, Ting He (IBM), Chatschik Bisdikian (IBM), Mani Srivastava The Big
More informationCSE548, AMS542: Analysis of Algorithms, Fall 2016 Date: Sep 25. Homework #1. ( Due: Oct 10 ) Figure 1: The laser game.
CSE548, AMS542: Analysis of Algorithms, Fall 2016 Date: Sep 25 Homework #1 ( Due: Oct 10 ) Figure 1: The laser game. Task 1. [ 60 Points ] Laser Game Consider the following game played on an n n board,
More informationWireless Network Information Flow
Š#/,% 0/,94%#(.)15% Wireless Network Information Flow Suhas iggavi School of Computer and Communication Sciences, Laboratory for Information and Communication Systems (LICOS), EPFL Email: suhas.diggavi@epfl.ch
More informationDirty Paper Coding vs. TDMA for MIMO Broadcast Channels
1 Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels Nihar Jindal & Andrea Goldsmith Dept. of Electrical Engineering, Stanford University njindal, andrea@systems.stanford.edu Submitted to IEEE Trans.
More informationEnergy-Efficient Uplink Multi-User MIMO with Dynamic Antenna Management
Energy-Efficient Uplink Multi-User MIMO with Dynamic Antenna Management Guowang Miao Dept. Communication Systems KTH (Royal Institute of Technology) Stockholm, Sweden, 644 Email: guowang@kth.se Abstract
More informationOptimizing Client Association in 60 GHz Wireless Access Networks
Optimizing Client Association in 60 GHz Wireless Access Networks G Athanasiou, C Weeraddana, C Fischione, and L Tassiulas KTH Royal Institute of Technology, Stockholm, Sweden University of Thessaly, Volos,
More informationAnalysis of massive MIMO networks using stochastic geometry
Analysis of massive MIMO networks using stochastic geometry Tianyang Bai and Robert W. Heath Jr. Wireless Networking and Communications Group Department of Electrical and Computer Engineering The University
More informationAdaptive MIMO Antenna Selection
Adaptive MIMO Antenna Selection Inaki Berenguer Xiaodong Wang Vikram Krishnamurthy Lab. for Commun. Engineering Dept. of Electrical Engineering Dept. of Electrical Engineering University of Cambridge Columbia
More informationModeling the impact of buffering on
Modeling the impact of buffering on 8. Ken Duffy and Ayalvadi J. Ganesh November Abstract A finite load, large buffer model for the WLAN medium access protocol IEEE 8. is developed that gives throughput
More informationCSCI 699: Topics in Learning and Game Theory Fall 2017 Lecture 3: Intro to Game Theory. Instructor: Shaddin Dughmi
CSCI 699: Topics in Learning and Game Theory Fall 217 Lecture 3: Intro to Game Theory Instructor: Shaddin Dughmi Outline 1 Introduction 2 Games of Complete Information 3 Games of Incomplete Information
More informationSome results on optimal estimation and control for lossy NCS. Luca Schenato
Some results on optimal estimation and control for lossy NCS Luca Schenato Networked Control Systems Drive-by-wire systems Swarm robotics Smart structures: adaptive space telescope Wireless Sensor Networks
More informationResource Allocation in Energy-constrained Cooperative Wireless Networks
Resource Allocation in Energy-constrained Cooperative Wireless Networks Lin Dai City University of Hong ong Jun. 4, 2011 1 Outline Resource Allocation in Wireless Networks Tradeoff between Fairness and
More informationOn Optimizing Power Allocation For Reliable Communication over Fading Channels with Uninformed Transmitter
1 On Optimizing Power Allocation For Reliable Communication over Fading Channels with Uninformed Transmitter M. Majid Butt, Senior Member, IEEE, Eduard A. Jorswieck, Senior Member, IEEE and Nicola Marchetti,
More informationHow (Information Theoretically) Optimal Are Distributed Decisions?
How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr
More informationEstimating the Transmission Probability in Wireless Networks with Configuration Models
Estimating the Transmission Probability in Wireless Networks with Configuration Models Paola Bermolen niversidad de la República - ruguay Joint work with: Matthieu Jonckheere (BA), Federico Larroca (delar)
More informationThe Capability of Error Correction for Burst-noise Channels Using Error Estimating Code
The Capability of Error Correction for Burst-noise Channels Using Error Estimating Code Yaoyu Wang Nanjing University yaoyu.wang.nju@gmail.com June 10, 2016 Yaoyu Wang (NJU) Error correction with EEC June
More informationTalk More Listen Less: Energy- Efficient Neighbor Discovery in Wireless Sensor Networks
Talk More Listen Less: Energy- Efficient Neighbor Discovery in Wireless Sensor Networks Ying Qiu, Shining Li, Xiangsen Xu and Zhigang Li Presented by: Korn Sooksatra, Computer Science, Georgia State University
More informationDistributed Power Control in Cellular and Wireless Networks - A Comparative Study
Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Vijay Raman, ECE, UIUC 1 Why power control? Interference in communication systems restrains system capacity In cellular
More informationTransport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks
Transport Capacity and Spectral Efficiency of Large Wireless CDMA Ad Hoc Networks Yi Sun Department of Electrical Engineering The City College of City University of New York Acknowledgement: supported
More informationSignal Recovery from Random Measurements
Signal Recovery from Random Measurements Joel A. Tropp Anna C. Gilbert {jtropp annacg}@umich.edu Department of Mathematics The University of Michigan 1 The Signal Recovery Problem Let s be an m-sparse
More informationSEMINAIRE SCEE Supélec, campus de Rennes 26 avril 2012
SEMINAIRE SCEE Supélec, campus de Rennes 26 avril 2012 Présentation : Vincent Savaux April 17 20, 2012 Poznań, Poland An Iterative and Joint Estimation of SNR and Frequency Selective Channel for OFDM Systems
More informationPERFORMANCE OF POWER DECENTRALIZED DETECTION IN WIRELESS SENSOR SYSTEM WITH DS-CDMA
PERFORMANCE OF POWER DECENTRALIZED DETECTION IN WIRELESS SENSOR SYSTEM WITH DS-CDMA Ali M. Fadhil 1, Haider M. AlSabbagh 2, and Turki Y. Abdallah 1 1 Department of Computer Engineering, College of Engineering,
More informationInterference management with mismatched partial channel state information
Vahid et al. EURASIP Journal on Wireless Communications and Networking (2017 2017:134 DOI 10.1186/s13638-017-0917-0 RESEARCH Open Access Interference management with mismatched partial channel state information
More informationTask Allocation: Motivation-Based. Dr. Daisy Tang
Task Allocation: Motivation-Based Dr. Daisy Tang Outline Motivation-based task allocation (modeling) Formal analysis of task allocation Motivations vs. Negotiation in MRTA Motivations(ALLIANCE): Pro: Enables
More informationUniversal permuton limits of substitution-closed permutation classes
Universal permuton limits of substitution-closed permutation classes Adeline Pierrot LRI, Univ. Paris-Sud, Univ. Paris-Saclay Permutation Patterns 2017 ArXiv: 1706.08333 Joint work with Frédérique Bassino,
More informationScheduling. Radek Mařík. April 28, 2015 FEE CTU, K Radek Mařík Scheduling April 28, / 48
Scheduling Radek Mařík FEE CTU, K13132 April 28, 2015 Radek Mařík (marikr@fel.cvut.cz) Scheduling April 28, 2015 1 / 48 Outline 1 Introduction to Scheduling Methodology Overview 2 Classification of Scheduling
More informationHOW TO USE REAL-VALUED SPARSE RECOVERY ALGORITHMS FOR COMPLEX-VALUED SPARSE RECOVERY?
20th European Signal Processing Conference (EUSIPCO 202) Bucharest, Romania, August 27-3, 202 HOW TO USE REAL-VALUED SPARSE RECOVERY ALGORITHMS FOR COMPLEX-VALUED SPARSE RECOVERY? Arsalan Sharif-Nassab,
More informationELECTRIC CIRCUITS. Third Edition JOSEPH EDMINISTER MAHMOOD NAHVI
ELECTRIC CIRCUITS Third Edition JOSEPH EDMINISTER MAHMOOD NAHVI Includes 364 solved problems --fully explained Complete coverage of the fundamental, core concepts of electric circuits All-new chapters
More informationSpectrum Sharing Between MIMO-MC Radars and Communication Systems
Spectrum Sharing Between MIMO-MC Radars and Communication Systems Bo Li ands Athina Petropulus ECE Department, Rutgers, The State University of New Jersey Work supported by NSF under Grant ECCS-1408437
More informationDynamic Fair Channel Allocation for Wideband Systems
Outlines Introduction and Motivation Dynamic Fair Channel Allocation for Wideband Systems Department of Mobile Communications Eurecom Institute Sophia Antipolis 19/10/2006 Outline of Part I Outlines Introduction
More informationSummary Overview of Topics in Econ 30200b: Decision theory: strong and weak domination by randomized strategies, domination theorem, expected utility
Summary Overview of Topics in Econ 30200b: Decision theory: strong and weak domination by randomized strategies, domination theorem, expected utility theorem (consistent decisions under uncertainty should
More informationPhysical-Layer Multicasting by Stochastic Beamforming and Alamouti Space-Time Coding
Physical-Layer Multicasting by Stochastic Beamforming and Alamouti Space-Time Coding Anthony Man-Cho So Dept. of Systems Engineering and Engineering Management The Chinese University of Hong Kong (Joint
More informationCOMBINATORICS AND CARD SHUFFLING
COMBINATORICS AND CARD SHUFFLING Sami Assaf University of Southern California in collaboration with Persi Diaconis K. Soundararajan Stanford University Stanford University University of Cape Town 11 May
More informationThe Evolution of Waveform Relaxation for Circuit and Electromagnetic Solvers
The Evolution of Waveform Relaxation for Circuit and Electromagnetic Solvers Albert Ruehli, Missouri S&T EMC Laboratory, University of Science & Technology, Rolla, MO with contributions by Giulio Antonini,
More informationDiversity and Freedom: A Fundamental Tradeoff in Multiple Antenna Channels
Diversity and Freedom: A Fundamental Tradeoff in Multiple Antenna Channels Lizhong Zheng and David Tse Department of EECS, U.C. Berkeley Feb 26, 2002 MSRI Information Theory Workshop Wireless Fading Channels
More informationCompressive Data Persistence in Large-Scale Wireless Sensor Networks
Compressive Data Persistence in Large-Scale Wireless Sensor Networks Mu Lin, Chong Luo, Feng Liu and Feng Wu School of Electronic and Information Engineering, Beihang University, Beijing, PRChina Institute
More informationConnectivity Management in Mobile Robot Teams
2008 IEEE International Conference on Robotics and Automation Pasadena, CA, USA, May 19-23, 2008 Connectivity Management in Mobile Robot Teams Ethan Stump, Ali Jadbabaie, Vijay Kumar GRASP Laboratory,
More informationCONTROL OF SENSORS FOR SEQUENTIAL DETECTION A STOCHASTIC APPROACH
file://\\52zhtv-fs-725v\cstemp\adlib\input\wr_export_131127111121_237836102... Page 1 of 1 11/27/2013 AFRL-OSR-VA-TR-2013-0604 CONTROL OF SENSORS FOR SEQUENTIAL DETECTION A STOCHASTIC APPROACH VIJAY GUPTA
More informationLecture 7: The Principle of Deferred Decisions
Randomized Algorithms Lecture 7: The Principle of Deferred Decisions Sotiris Nikoletseas Professor CEID - ETY Course 2017-2018 Sotiris Nikoletseas, Professor Randomized Algorithms - Lecture 7 1 / 20 Overview
More informationToward Non-stationary Blind Image Deblurring: Models and Techniques
Toward Non-stationary Blind Image Deblurring: Models and Techniques Ji, Hui Department of Mathematics National University of Singapore NUS, 30-May-2017 Outline of the talk Non-stationary Image blurring
More informationA Novel Loss Recovery and Tracking Scheme for Maneuvering Target in Hybrid WSNs
sensors Article A Novel Loss Recovery and Tracking Scheme for Maneuvering Target in Hybrid WSNs Hanwang Qian 1,2, Pengcheng Fu 1,2, Baoqing Li 1, Jianpo Liu 1 and Xiaobing Yuan 1, * 1 Science and Technology
More informationCross-layer Congestion Control, Routing and Scheduling Design in Ad Hoc Wireless Networks
Cross-layer Congestion Control, Routing and Scheduling Design in Ad Hoc Wireless Networks Lijun Chen, Steven H. Low, Mung Chiang and John C. Doyle Engineering & Applied Science Division, California Institute
More informationAn Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks
1 An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks Yeh-Cheng Chang, Cheng-Shang Chang and Jang-Ping Sheu Department of Computer Science and Institute of Communications
More informationTD-Leaf(λ) Giraffe: Using Deep Reinforcement Learning to Play Chess. Stefan Lüttgen
TD-Leaf(λ) Giraffe: Using Deep Reinforcement Learning to Play Chess Stefan Lüttgen Motivation Learn to play chess Computer approach different than human one Humans search more selective: Kasparov (3-5
More informationMIMO III: Channel Capacity, Interference Alignment
MIMO III: Channel Capacity, Interference Alignment COS 463: Wireless Networks Lecture 18 Kyle Jamieson [Parts adapted from D. Tse] Today 1. MIMO Channel Degrees of Freedom 2. MIMO Channel Capacity 3. Interference
More informationPolicy Teaching. Through Reward Function Learning. Haoqi Zhang, David Parkes, and Yiling Chen
Policy Teaching Through Reward Function Learning Haoqi Zhang, David Parkes, and Yiling Chen School of Engineering and Applied Sciences Harvard University ACM EC 2009 Haoqi Zhang (Harvard University) Policy
More informationCompression analysis of massive MIMO uplink
Compression analysis of massive MIMO uplink Master s thesis in Communication Engineering BOJAN DRVENICA GUILHERME LUZ Department of Signals and Systems Chalmers University of Technology Gothenburg, Sweden
More informationData Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1
Data Gathering Chapter 4 Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Environmental Monitoring (PermaSense) Understand global warming in alpine environment Harsh environmental conditions Swiss made
More informationLocalisation et navigation de robots
Localisation et navigation de robots UPJV, Département EEA M2 EEAII, parcours ViRob Année Universitaire 2017/2018 Fabio MORBIDI Laboratoire MIS Équipe Perception ique E-mail: fabio.morbidi@u-picardie.fr
More informationPhotographing Long Scenes with Multiviewpoint
Photographing Long Scenes with Multiviewpoint Panoramas A. Agarwala, M. Agrawala, M. Cohen, D. Salesin, R. Szeliski Presenter: Stacy Hsueh Discussant: VasilyVolkov Motivation Want an image that shows an
More informationJoint Design of RFID Reader and Tag Anti-Collision Algorithms: A Cross-Layer Approach
Joint Design of RFID Reader and Tag Anti-Collision Algorithms: A Cross-Layer Approach Ramiro Sámano-Robles and Atílio Gameiro Instituto de Telecomunicações, Campus Universitário, Aveiro, 3810-193, Portugal.
More informationLecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1
Antenna, Antenna : Antenna and Theoretical Foundations of Wireless Communications 1 Friday, April 27, 2018 9:30-12:00, Kansliet plan 3 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication
More informationBenford s Law: Tables of Logarithms, Tax Cheats, and The Leading Digit Phenomenon
Benford s Law: Tables of Logarithms, Tax Cheats, and The Leading Digit Phenomenon Michelle Manes (manes@usc.edu) USC Women in Math 24 April, 2008 History (1881) Simon Newcomb publishes Note on the frequency
More informationADAPTIVE CONSENSUS-BASED DISTRIBUTED DETECTION IN WSN WITH UNRELIABLE LINKS
ADAPTIVE CONSENSUS-BASED DISTRIBUTED DETECTION IN WSN WITH UNRELIABLE LINKS Daniel Alonso-Román and Baltasar Beferull-Lozano Department of Information and Communication Technologies University of Agder,
More informationCoordination-free Repeater Groups in Wireless Sensor Networks Andreas Willig
Technical University Berlin Telecommunication Networks Group Coordination-free Repeater Groups in Wireless Sensor Networks Andreas Willig awillig@tkn.tu-berlin.de Berlin, August 2006 TKN Technical Report
More informationFairness Matters: Identification of Active RFID Tags with Statistically Guaranteed Fairness
Fairness Matters: Identification of Active RFID Tags with Statistically Guaranteed Fairness Muhammad Shahzad Department of Computer Science North Carolina State University Raleigh, NC, USA mshahza@ncsu.edu
More informationSIGNAL-MATCHED WAVELETS: THEORY AND APPLICATIONS
SIGNAL-MATCHED WAVELETS: THEORY AND APPLICATIONS by Anubha Gupta Submitted in fulfillment of the requirements of the degree of Doctor of Philosophy to the Electrical Engineering Department Indian Institute
More informationLow Complexity Power Allocation in Multiple-antenna Relay Networks
Low Complexity Power Allocation in Multiple-antenna Relay Networks Yi Zheng and Steven D. Blostein Dept. of Electrical and Computer Engineering Queen s University, Kingston, Ontario, K7L3N6, Canada Email:
More informationA Simulation Model of IEEE 802.1AS gptp for Clock Synchronization in OMNeT++
A Simulation Model of IEEE 802.1AS gptp for Clock Synchronization in OMNeT++ Henning Puttnies, Peter Danielis, Enkhtuvshin Janchivnyambuu, Dirk Timmermann University of Rostock, Germany 1. Motivation Real-time
More informationCompressed RF Tomography for Wireless Sensor Networks: Centralized and Decentralized Approaches
Compressed RF Tomography for Wireless Sensor Networks: Centralized and Decentralized Approaches Mohammad A. Kanso and Michael G. Rabbat Department of Electrical and Computer Engineering McGill University
More information