Performance Analysis of Cognitive Radio Spectrum Access with Prioritized Traffic
|
|
- Alan Ford
- 6 years ago
- Views:
Transcription
1 Performance Analysis of Cognitive Radio Spectrum Access with Prioritized Traffic Vamsi Krishna Tumuluru, Ping Wang, and Dusit Niyato Center for Multimedia and Networ Technology (CeMNeT) School of Computer Engineering, Nanyang Technological University, Singapore. Abstract Dynamic spectrum access (DSA) is an important design aspect for the cognitive radio networs. Most of the existing DSA schemes are to govern the unlicensed user (i.e., secondary user) traffic in a licensed spectrum without compromising the transmissions of the licensed users, in which all the unlicensed users are typically treated equally. In this paper, prioritized unlicensed user traffic is considered. Specifically, we prioritize the unlicensed user traffic into two priority classes (i.e., high and low priority). Two different DSA policies are proposed to manage the handoff for prioritized unlicensed user traffic (i.e., reassigning new channels to the secondary users which paved way for licensed user). These two policies are different in which one allows to drop the ongoing low priority secondary users to accommodate more high priority secondary users being replaced by the presence of licensed user while the other does not allow that. We also study the impact of sub-channel reservation for the high priority secondary users in both DSA policies. Both DSA policies are analyzed using Marov chain. For performance measures, we derive the blocing probability, the probability of forced termination and the throughput for both high and low priority unlicensed users. The numerical results are verified using simulations. Keywords Cognitive radio, dynamic spectrum access, Marov chain analysis, priority. I. INTRODUCTION In recent years, several spectrum surveys have been conducted to understand the spectrum utilization in the licensed and unlicensed portions of the radio spectrum [], [2]. These surveys revealed that under the present spectrum regulatory policies, major portions of the licensed spectrum are underutilized for most of the time, while the unlicensed spectrum is heavily used and is often insufficient. Among the efforts to improve the overall spectrum utilization, the concept of cognitive radio is gaining much importance [3]. The cognitive radio networ (CRN) is composed of licensed users and unlicensed users sharing the licensed spectrum. In most cases, the licensed users (also called primary users) are oblivious of the existence of the unlicensed users (also called secondary users). In the CRN, the secondary users are allowed to dynamically access unused channels (i.e., frequency bands) in the primary user spectrum, thereby improving the overall spectrum utilization. Secondary user transmissions in the CRN can be effectively managed by a dynamic spectrum access (DSA) policy. Using the DSA policy, the secondary users are assigned unused channels in the primary user spectrum. In the event of a primary user s arrival, the secondary users transmissions on the corresponding channel are either reassigned to another unused licensed channel or terminated. Recently, some wors dealt with the performance evaluation of the CRN under different DSA policies, using continuous time Marov chain (CTMC) analysis [4]-[7]. According to the DSA policy in [4], the secondary users which experience unsuccessful handoff are queued till they find the transmission opportunities. In [5], DSA policy considered channel reservation for secondary user handoff. In [6], the secondary user arrivals wait in a queue when a channel 2 is not available. In [7], the DSA policy assigns variable bandwidth to the secondary users. In all these wors, the CRN was modeled as a call admission control system which receives calls from both primary users (PUs) and secondary users (SUs). During the spectrum access, the PU calls have a higher priority over the SU calls. Unlie the above wors, in this paper, we consider prioritization among the SUs while accessing the licensed spectrum. For example, the SUs with real-time traffic have higher priority than those with non real-time traffic. To date, only a few wors ([8] and [9]) have taen prioritized SU traffic into consideration. However, these wors have not addressed the issue of spectrum handoff under prioritized SU traffic. For the simplicity of presentation, we consider that the SU traffic is composed of two priority classes 3 (i.e., high and low priority). We propose two DSA policies to handle the spectrum access for the SUs in the licensed spectrum. The two DSA policies have different SU handoff mechanisms. Further, we also introduce sub-channel reservation for the high priority SU call arrivals in both the DSA policies. We develop analytical models for the CRN under both the DSA policies using CTMC models. The performance of the DSA policies is evaluated in terms of the blocing probability, the probability of forced termination, and the throughput for both high and low priority SUs. II. SYSTEM MODEL The licensed spectrum is divided into M channels, each of which is further divided into N sub-channels, as shown in Fig.. A PU call is assigned one channel whereas a SU call is assigned one sub-channel for data transmission. The licensed The process of reassigning a displaced secondary user transmission is referred to as handoff. 2 In this paper, the terms licensed channel and channel are used interchangeably. 3 Please note that the proposed analytical model is not restricted to the two priority class case and can be extended to the case of more than two priority classes.
2 spectrum is shared by the PUs and SUs. The PUs have the highest priority in accessing the channels. The secondary users are classified into two priority classes. The high priority SUs are denoted as SU while the low priority SUs are denoted as SU 2. Similar to [4], we assume that a central controller exists to implement the DSA policy. The objective of the DSA policy is to assign idle sub-channels to the incoming SU calls, and moderate their handoff. We consider two DSA policies for our system model. They are denoted as DSA-C and DSA-C2. sub-channel N channel Licensed spectrum Fig.. System model. N(M-)+ A. Sub-channel Reservation under DSA-C and DSA-C2 Under both the DSA policies, a number of sub-channels are reserved for high priority secondary user SU, i.e., when the total number of idle sub-channels is less than ζ which is the number of sub-channels reserved for SU, the new SU 2 call will be rejected. In this way, we provide higher priority for the SU calls over the SU 2 calls 4. Call arrivals occur independently as Poisson processes with mean arrival rates λ p, λ and λ 2 for PU, SU and SU 2, respectively. The service times independently follow exponential distributions with mean service rates of µ p, µ and µ 2 for PU, SU and SU 2 calls, respectively. The number of ongoing PU calls is denoted as and the number of occupied sub-channels is denoted as Y. The new calls are dropped when the system becomes full (i.e., Y = MN for SU call, Y = MN ζ for SU 2 calls and N = M for PU calls). B. Handoff Mechanism under DSA-C When a new PU call claims a channel occupied by the SUs, the handoff mechanism is initiated. During handoff, the idle sub-channels (if any) are first assigned to the displaced SU calls. Thereafter, the remaining idle sub-channels are assigned to the displaced SU 2 calls. If the required idle sub-channels are not available for SU handoff, then some ongoing SU 2 calls are terminated and the resulting idle sub-channels are assigned to the displaced SU calls. When the idle sub-channels are not enough to accommodate all the displaced SU or SU 2 calls, some of the displaced calls will be terminated. C. Handoff Mechanism under DSA-C2 DSA-C2 policy is similar to DSA-C policy except that no ongoing SU 2 calls are terminated for the sae of SU handoff. In other words, if a displaced SU call does not find an idle sub-channel, it is terminated. 4 Note that the PUs are not affected by such sub-channel reservation. M MN III. PERFORMANCE ANALYSIS In this section, we develop analytical models for the CRN corresponding to each DSA policy using continuous time Marov Chain (CTMC). The state of the CTMC (for both DSA policies) is defined as z = [i, j, ]. Here, i {,,..., MN}, j {,,..., MN ζ} and {,,..., M} represent the number of ongoing SU, SU 2, and PU calls in the system, respectively. The total number of occupied sub-channels in the state z is calculated as Y = i + j + N. For a valid state, Y should not exceed MN. Let l (where l {,,..., N}) and m (where m {,,..., N}) denote respectively the number of SU and SU 2 calls displaced by an incoming PU call when the state is [i, j, ]. l and m should satisfy the following conditions: l i, m j and l + m {,,..., N} r = MN Y (N (l + m)) and r s = (l + m) min(r, l + m). () In Eq. (), the first condition gives the maximum number of SUs that can be displaced upon a PU arrival whereas the second condition gives the number of sub-channels available for handoff (denoted as r) for the displaced SU calls. Accordingly, the total number of unsuccessful handoff calls (denoted as s) is calculated. The evolution of the state [i, j, ] of the CTMC is presented under three cases of Y : ) Y N(M ): The system has at least N idle subchannels. 2) N(M ) < Y < MN: The system has idle subchannel in the range {,..., N }. 3) Y = MN: The system has no idle sub-channel. For the case Y N(M ), all displaced SU and SU 2 calls perform successful handoff (i.e., s = ) when displaced by a PU arrival. In other words, no calls are terminated (under both DSA-C and DSA-C2) due to an incoming PU call. For the case N(M ) Y MN, s = {,..., N } number of SU calls experience unsuccessful handoff, whereas when Y = MN, s = N SU calls experience unsuccessful handoff. The exact number of terminated SU and SU 2 calls under each centralized DSA policy are explained later. Let l and m denote the number of terminated SU and SU 2 calls, respectively. Thus, l + m = s. A. State Transitions under DSA-C Policy Under the DSA-C policy, the transitions for the state [i, j, ] for different cases of Y are explained in Fig. 2. State transitions from/to the state [i, j, ] occur due to any of the six possible events, namely PU arrival, SU arrival, SU 2 arrival, PU departure, SU departure and SU 2 departure. Each state transition is represented by its corresponding rate. Taing as an example, a SU 2 arrival in state [i, j, ] causes transition to state [i, j, ] with a rate δ λ 2, where δ = (i+(j )+N<MN ζ) specifies the condition for subchannel reservation (i.e., a new SU 2 call is accepted by the system only when the condition i + (j ) + N < MN ζ 2
3 holds), where ( ) is the indicator function which returns the value when the condition given inside the parenthesis is true and returns otherwise. In Fig. 2, δ 2 = (i+j+n<mn ζ) (condition for sub-channel reservation in state [i, j, ]) and δ 3 = (i+j+( )N N(M )). The transition rate γ i,j, from state [i, j, ] to state [i l, j m, + ] is calculated as follows: ) Let N denote the set containing the valid combinations of (l, m ). 2) For every valid pair of (l, m ) in the set N, find R which represents the number of valid combinations of l, m, r and s = l + m. Valid l, m, r and s for given [i, j, ] found using Eq. (). 3) Then, the transition rate γ i,j, is given by γ i,j, = R ( ) N R λ p. (2) Taing into consideration the handoff mechanism explained in Section II-B, the variables l and m in Eq. (2) are given by l = s min(j, s) and m = min(j, s). The value of s is determined by Eq. (). i, j, δ λ 2 i, j, Fig. 2. i µ λ j µ 2 i l, j m, + γ i, j, l, m µ p δ λ p 3 λ ( j + ) µ 2 ( + ) µ p δ 2 λ 2 + i +, j, ( i + ) µ i, j +, State transitions for the DSA policies, DSA-C and DSA-C2. For the cases Y N(M ) and N(M ) < Y < MN, all the transitions shown in Fig. 2 are valid. For the case Y = MN, the transitions between the states [i, j, ] and [i+, j, ], and between [i, j, ] and [i, j +, ] are not considered as the system is full (i.e., idle sub-channels not available). Apart from the state transitions shown in Fig. 2, when Y = MN few transitions occur from the states in which the number of ongoing calls is greater than N(M ) to the state [i, j, ] due to a PU arrival. These transitions are described below. Transition from state [i, j+j, ] to state [i, j, ] occurs with rate γ i,j+j,,j, where j > and < j < N. The rate γ i,j+j, is calculated using Eq. (2) corresponding,j to the state [i, j + j, ]. During this state transition, j SU 2 calls are terminated. Transition from state [i + (s j ), j + j, ] to state [i, j, ] occurs with rate γ i+(s j ),j+j, s j,j, where j =, < s < N and j < s. The rate γ i+(s j ),j+j, s j,j is calculated using Eq. (2) corresponding to the state [i + 3 (s j ), j + j, ]. During this state transition, s j SU calls and j SU 2 calls are terminated. B. State Transitions under DSA-C2 Policy Fig. 2 also represents the state transitions under the DSA-C2 policy for the various cases of Y. According to the handoff mechanism under DSA-C2 policy, the number of terminated SU and SU 2 calls are given as l = l min(r, l) and m = max(, m max(, r l)), respectively. All state transitions shown in Fig. 2 occur similar to the DSA-C policy. Apart from the state transitions given in Fig. 2, transitions occur from states [i+i, j +j, ] (in which i+j +( )N = N(M )) to the state [i, j, ] when Y = MN, where i, j < N and < i + j < N. C. Performance Measures The performance measures for each DSA policy are expressed using the steady state probability distribution of its corresponding CTMC. We derive performance measures (for both SU and SU 2 calls) such as blocing probability, probability of forced termination, and throughput. Let Π z denote the steady state distribution of a CTMC whose state is denoted as z = [i, j, ]. To simplify the presentation, we use the same notations under all DSA policies. For any DSA policy, the corresponding steady state probability distribution Π z is obtained by finding the corresponding transition rate matrix Q and applying the Gauss-Seidel algorithm []. Each row of Q represents the transitions with respect to a specific state z, as a balance equation. For example, referring to Fig. 2, one balance equation with respect to the state [i, j, ] under the DSA-C policy is expressed as follows: [µ p + δ 2 λ 2 + λ + λ p + iµ + jµ 2 ] Π [i,j,] = λ p Π [i,j, ] + (j + )µ 2 Π [i,j+,] + (i + )µ Π [i+,j,] + ( + )µ p Π [i,j,+] + λ Π [i,j,] + δ λ 2 Π [i,j,] (3) where Π [i,j,] represents the steady state probability for state [i, j, ] under DSA-C policy. ) Blocing Probability: The blocing probability represents the probability that an incoming SU call (SU or SU 2 ) is not permitted to enter into the system. The blocing probability of SU calls denoted as P B is expressed as P B = z Π z. The blocing probability of SU 2 calls Y =MN denoted as P B2 is expressed as P B2 = Π z. z Y MN ζ 2) Probability of Forced Termination: The probability of forced termination represents the probability that an ongoing SU call (SU or SU 2 ) is terminated by an incoming PU call. The probability of forced termination for the SU calls, denoted as P F, is expressed as follows: P F = z i l, j m l γ i,j, Π z λ ( P B ). (4) In Eq. (4), the numerator denotes the rate that l SU calls are terminated in state z whereas the denominator denotes the
4 effective rate with which a new SU call is assigned a subchannel. Similarly, the probability of forced termination for the SU 2 calls, denoted as P F 2, is expressed as follows: P F 2 = z i l, j m m γ i,j, Π z. (5) λ 2 ( P B2 ) In Eqs. (4) and (5), l and m depend on the DSA policy. 3) Throughput: The throughput under a given SU priority class is expressed as the mean number of ongoing calls in the system. Let η and η 2 denote the throughput for SU and SU 2 calls, respectively. The throughput η is given by η = λ ( P B )( P F ) whereas The throughput η 2 is given by η 2 = λ 2 ( P B2 )( P F 2 ). IV. RESULTS AND DISCUSSION In this section, we compare the two DSA policies based on the performance measures described in Section III-C. The accuracy of the analytical models is verified through simulations. In the experiments, we set M = 3 and N = 5. The symbols (a) and (s) in the figures indicate analytical and simulation results, respectively. A. Blocing Probabilities The blocing probabilities corresponding to the DSA-C2 policy are same as that corresponding to the DSA-C policy (because the DSA policies only differ in the handoff mechanism), and hence they are not shown for brevity of paper. Fig. 3 shows the blocing probabilities of the SU and SU 2 calls under the DSA-C policy with various PU arrival rate (λ p ). The following parameters are chosen for this experiment: λ =.4, λ 2 =.4, λ p [.3,.2], µ =.8, µ 2 =.8, µ p =.9, and η = 2. It can be seen that all the blocing probabilities (i.e., for both SU classes) increase as the PU arrival rate increases. This is because the number of busy sub-channels increases with an increase in the PU arrival rate, resulting in higher blocing probabilities for the SUs. Fig. 3 also shows that the analysis results match well with the simulation results. Blocing probabilities of SU and SU2 calls.4.2. PB, PB, PB2, PB2, Fig. 3. Blocing probabilities of SU and SU 2 calls under both DSA policies. 4 B. Forced Termination Probabilities Fig. 4 and Fig. 5 respectively show the forced termination probabilities of the SU and SU 2 calls under both DSA policies with various PU arrival rate λ p. The following parameters are set for this experiment: λ =.8, λ 2 =.8, λ p [.3,.2], µ =.35, µ 2 =.35, µ p =.9 and η = 2. It can be observed that as λ p increases, the forced termination probabilities of SU and SU 2 calls also increase with both DSA policies. Fig. 4 shows that DSA- C policy has lower force termination probability for the SU calls compared to DSA-C2 policy. Fig. 5 shows higher force termination probability of the SU 2 calls using DSA- C policy compared to DSA-C2 policy. Such observations accord with our expectation. Compared to the DSA-C2 policy, DSA-C policy reduces handoff failures for the SU calls by terminating some ongoing SU 2 calls during handoff. Again, the analysis and simulation results match well. Fig. 4. Fig. 5. Forced termination probability of SU calls, PF Forced termination probability of SU2 calls, PF2 Forced termination probability of SU2 calls, PF Forced termination probability of SU calls under both DSA policies Forced termination probability of SU 2 calls under both DSA policies SU arrival rate, λ Fig. 6. Effect of SU arrival rate on forced termination probability of SU 2 calls under both DSA policies.
5 Fig. 6 shows the effect of SU arrival rate (λ ) on the forced termination probability of the low priority SU 2 calls. In this experiment, we set λ p = and vary λ. It can be seen that as λ increases, the forced termination probability of SU 2 calls also increases with both DSA policies. This is because when λ increases, the number of SU 2 calls entering the system decreases. This leads to an increase in P F 2 along with λ. With DSA-C policy, apart from terminations caused by the PU arrivals, the SU 2 calls are also terminated by SU calls during handoff. Thus, P F 2 of DSA-C policy is higher than that of DSA-C2 policy. C. Optimal Sub-channel Reservation As mentioned in Section II-A, some sub-channels (ζ) are reserved for the SU call arrivals. Using the sub-channel reservation, we bloc some low priority SU calls to improve the performance of the high priority SU calls. Based on the given parameter settings and blocing probability requirement of the SU calls, an optimal number of sub-channels (ζ) to be reserved under the DSA policies can be determined from our analysis. Here, optimal number means the minimum number of sub-channels to be reserved in order to guarantee that the blocing probability requirement of the SU calls is satisfied. For instance, consider the following parameter setting: λ =.8, λ 2 =.8, λ p =, µ =.8, µ 2 =.3, µ p =.9 and a desired blocing probability of 5% for the SU calls. From the analysis, we found that the optimal value of ζ is 4 for both DSA policies. The analysis results can be verified from simulation. Fig. 7 shows the simulation results for the above parameter settings under different values of ζ. Fig. 7 shows that the desired blocing probability of 5% for the SU calls is satisfied when ζ = 4 sub-channels. Blocing probability of SU calls, PB Number of sub-channels reserved for SU calls (ζ) Fig. 7. Effect of ζ on blocing probability of SU calls under both DSA policies. D. Throughput Evaluation We verify the throughput calculated in the analysis with the simulation results. For the simulation, the throughput for a given SU priority class is calculated by taing the ratio of the total number of SU calls corresponding to that priority class completing service, to the total duration of the simulation. In our simulations, call arrivals are generated for a duration of 8 time units. For the parameter setting λ =.8, λ 2 =.8, λ p =.3, µ =.3, µ 2 =, µ p =.4 and ζ =, we obtained the following values for the throughput 5 from the analysis: η =.9975 and η 2 =.3462 for DSA-C policy whereas η =.789 and η 2 =.3997 for DSA-C2 policy. In the simulation, under DSA-C policy, SU calls and SU 2 calls completed service whereas under DSA- C2 policy, SU calls and SU 2 calls completed service. Therefore, from simulations, η =.9974 and η 2 =.3464 for DSA-C policy whereas η =.7986 and η 2 =.396 for DSA-C2 policy. The analysis results and simulation results for the throughput of the SUs correspond closely. As expected, DSA-C policy gives higher throughput for SU compared to DSA-C2 policy, at the expense of sacrificing the throughput of SU 2. This phenomenon holds under various parameter settings. V. CONCLUSION We have investigated the dynamic spectrum access in the cognitive radio networs under a special case in which the SU traffic is prioritized. Two different DSA policies have been developed to handle the spectrum assignment and handoff for the SU traffic with two priority classes. We have developed the analytical models for two proposed DSA policies. For performance evaluation, we have derived the blocing probability, the forced termination probability, and the throughput for the two priority classes of SU traffic. We have also investigated the case of sub-channel reservation for the high priority SUs and obtained the optimal sub-channel reservation. The analytical results have been verified through simulations. REFERENCES [] Federal Communications Commission, Spectrum policy tas force, in Rep. OET Docet No. 2-35, Nov.22. [2] S. D. Jones, E. Jung, X. Liu, N. Merhab and I-J. Wang, Characterization of spectrum activities in the U.S. public safety band for opportunistic spectrum access, in 2nd International Symposium on New Frontiers in Dynamic Spectrum Access Networs (DySPAN),pp , April 27. [3] S. Hayin, Cognitive radio: Brain-empowered wireless communications, in IEEE Journal on Selected Areas in Communication, vol. 23, no. 2, pp. 2 23, 25. [4] E. W. M. Wong and C. H. Foh, Analysis of cognitive radio spectrum access with finite user polulation, in IEEE Communications Letters, vol. 5, no. 5, pp , May 29. [5] X. Zhu, L. Shen and T-S. P. Yum, Analysis of cognitive radio spectrum access with optimal channel reservation, in IEEE Communications Letters, vol., no. 4, pp , April 27. [6] Y. Zhang, Dynamic spectrum access in cognitive radio wirless networs, in IEEE International Conference on Communications, pp , May 28. [7] S. M. Kannappa and M. Saquib, Performance analysis of a cognitive networ with dynamic spectrum assignment to secondary users, in IEEE International Conference on Communications, pp. 5, July 2. [8] U. Wiggins, R. Kannan, V. Charavarthy and A. V. Vasilaos, Datacentric prioritization in a cognitive radio networ: A quality-of-service based design and integration, in 3rd IEEE Symposium on on New Frontiers in Dynamic Spectrum Access Networs (DySPAN), pp., Oct. 28. [9] C. Gosh, S. Chen, D. P. Agarwal and A. M. Wyglinsi, Priority-based spectrum allocation for cognitive radio networs employing NC-OFDM transmission, in IEEE Military Communications Conference, pp. 5, Oct. 29. [] W. J. Stewart, Introduction to the numerical solution of Marov chains, Princeton University Press, 994.
Weighted Earliest Deadline Scheduling and Its Analytical Solution for Admission Control in a Wireless Emergency Network
Weighted Earliest Deadline Scheduling and Its Analytical Solution for Admission Control in a Wireless Emergency Network Jiazhen Zhou and Cory Beard Department of Computer Science/Electrical Engineering
More informationAnalysis of Distributed Reservation Protocol for UWB-based WPANs with ECMA-368 MAC
Analysis of Distributed Reservation Protocol for UWB-based WPANs with ECMA-368 MAC Nasim Arianpoo, Yuxia Lin, Vincent W.S. Wong Department of Electrical and Computer Engineering The University of British
More information1.010 Uncertainty in Engineering Fall 2008
MIT OpenCourseWare http://ocw.mit.edu 1.010 Uncertainty in Engineering Fall 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms. Application Example 18
More informationFinal exam solutions
EE365 Stochastic Control / MS&E251 Stochastic Decision Models Profs. S. Lall, S. Boyd June 5 6 or June 6 7, 2013 Final exam solutions This is a 24 hour take-home final. Please turn it in to one of the
More informationDynamic Pricing of Preemptive Service for Elastic Demand
Dynamic Pricing of Preemptive Service for Elastic Demand Aylin Turhan, Murat Alanyali and David Starobinski Abstract We consider a service provider that accommodates two classes of users: primary users
More informationCoopetition Spectrum Trading - Creating Endogenous Spectrum Holes
Coopetition Spectrum Trading - Creating Endogenous Spectrum Holes Liu Cui School of Information Sciences University of Pittsburgh Email: lic49@pitt.edu Taieb Znati Department of Computer Sciences University
More informationOptimal Code Assignment and Call Admission Control for OVSF-CDMA Systems Constrained by Blocking Probabilities
Optimal Code Assignment and Call Admission Control for OVSF-CDMA Systems Constrained by Blocking Probabilities Jun-Seong Park, Lei Huang,DanielC.Lee, and C.-C. Jay Kuo Department of Electrical Engineering,
More informationNon-Cash Auction for Spectrum Trading in Cognitive Radio Networks: A Contract Theoretical Model with Joint Adverse Selection and Moral Hazard
arxiv:79.837v [cs.ni] 25 Sep 27 Non-Cash Auction for Spectrum Trading in Cognitive Radio Networks: A Contract Theoretical Model with Joint Adverse Selection and Moral Hazard Yanru Zhang, Student Member,
More informationThe Impact of Fading on the Outage Probability in Cognitive Radio Networks
1 The Impact of Fading on the Outage obability in Cognitive Radio Networks Yaobin Wen, Sergey Loyka and Abbas Yongacoglu Abstract This paper analyzes the outage probability in cognitive radio networks,
More informationA Simple Method for Solving Multiperiod Mean-Variance Asset-Liability Management Problem
Available online at wwwsciencedirectcom Procedia Engineering 3 () 387 39 Power Electronics and Engineering Application A Simple Method for Solving Multiperiod Mean-Variance Asset-Liability Management Problem
More informationSequential and Concurrent Auction Mechanisms for Dynamic Spectrum Access
Sequential and Concurrent Auction Mechanisms for Dynamic Spectrum Access Shamik Sengupta and Mainak Chatterjee School of Electrical Engineering and Computer Science University of Central Florida Orlando,
More informationIndoor Measurement And Propagation Prediction Of WLAN At
Indoor Measurement And Propagation Prediction Of WLAN At.4GHz Oguejiofor O. S, Aniedu A. N, Ejiofor H. C, Oechuwu G. N Department of Electronic and Computer Engineering, Nnamdi Aziiwe University, Awa Abstract
More informationDynamic Contract Trading in Spectrum Markets
1 Dynamic Contract Trading in Spectrum Markets G. Kasbekar, S. Sarkar, K. Kar, P. Muthusamy, A. Gupta Abstract We address the question of optimal trading of bandwidth (service) contracts in wireless spectrum
More information206 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 1, JANUARY 2017
206 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 16, NO. 1, JANUARY 2017 Spectrum Auction for Differential Secondary Wireless Service Provisioning With Time-Dependent Valuation Information Changyan
More informationDISRUPTION MANAGEMENT FOR SUPPLY CHAIN COORDINATION WITH EXPONENTIAL DEMAND FUNCTION
Acta Mathematica Scientia 2006,26B(4):655 669 www.wipm.ac.cn/publish/ ISRUPTION MANAGEMENT FOR SUPPLY CHAIN COORINATION WITH EXPONENTIAL EMAN FUNCTION Huang Chongchao ( ) School of Mathematics and Statistics,
More informationCombined Preemption and Queuing Policies for a Cellular Emergency Network
Combined Preemption and Queuing Policies for a Cellular Emergency Network Jiazhen Zhou and Cory Beard Department of Computer Science/Electrical Engineering University of Missouri-Kansas City Email: {jzmpc,beardc}@umkc.edu
More informationTHE proliferation of mobile devices is leading to an
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 35, NO. 1, JANUARY 2017 79 Auction-Based Coopetition Between LTE Unlicensed and Wi-Fi Haoran Yu, George Iosifidis, Jianwei Huang, Fellow, IEEE, and
More informationSolutions of Bimatrix Coalitional Games
Applied Mathematical Sciences, Vol. 8, 2014, no. 169, 8435-8441 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2014.410880 Solutions of Bimatrix Coalitional Games Xeniya Grigorieva St.Petersburg
More informationThe Effect of Trading Volume on PIN's Anomaly around Information Disclosure
2011 3rd International Conference on Information and Financial Engineering IPEDR vol.12 (2011) (2011) IACSIT Press, Singapore The Effect of Trading Volume on PIN's Anomaly around Information Disclosure
More informationHandout 4: Deterministic Systems and the Shortest Path Problem
SEEM 3470: Dynamic Optimization and Applications 2013 14 Second Term Handout 4: Deterministic Systems and the Shortest Path Problem Instructor: Shiqian Ma January 27, 2014 Suggested Reading: Bertsekas
More informationarxiv: v1 [math.pr] 6 Apr 2015
Analysis of the Optimal Resource Allocation for a Tandem Queueing System arxiv:1504.01248v1 [math.pr] 6 Apr 2015 Liu Zaiming, Chen Gang, Wu Jinbiao School of Mathematics and Statistics, Central South University,
More informationCompetition with Dynamic Spectrum Leasing
1 Competition with Dynamic Spectrum Leasing Lingjie Duan, Jianwei Huang, and Biying Shou Department of Information Engineering, The Chinese University of Hong Kong, Hong Kong Department of Management Sciences,
More informationRevenue Management Under the Markov Chain Choice Model
Revenue Management Under the Markov Chain Choice Model Jacob B. Feldman School of Operations Research and Information Engineering, Cornell University, Ithaca, New York 14853, USA jbf232@cornell.edu Huseyin
More informationForecasting prices from level-i quotes in the presence of hidden liquidity
Forecasting prices from level-i quotes in the presence of hidden liquidity S. Stoikov, M. Avellaneda and J. Reed December 5, 2011 Background Automated or computerized trading Accounts for 70% of equity
More informationDynamic Pricing in Ridesharing Platforms
Dynamic Pricing in Ridesharing Platforms A Queueing Approach Sid Banerjee Ramesh Johari Carlos Riquelme Cornell Stanford Stanford rjohari@stanford.edu With thanks to Chris Pouliot, Chris Sholley, and Lyft
More informationA THREE-FACTOR CONVERGENCE MODEL OF INTEREST RATES
Proceedings of ALGORITMY 01 pp. 95 104 A THREE-FACTOR CONVERGENCE MODEL OF INTEREST RATES BEÁTA STEHLÍKOVÁ AND ZUZANA ZÍKOVÁ Abstract. A convergence model of interest rates explains the evolution of the
More informationCall Admission Control for Preemptive and Partially Blocking Service Integration Schemes in ATM Networks
Call Admission Control for Preemptive and Partially Blocking Service Integration Schemes in ATM Networks Ernst Nordström Department of Computer Systems, Information Technology, Uppsala University, Box
More informationMarkov Decision Processes (MDPs) CS 486/686 Introduction to AI University of Waterloo
Markov Decision Processes (MDPs) CS 486/686 Introduction to AI University of Waterloo Outline Sequential Decision Processes Markov chains Highlight Markov property Discounted rewards Value iteration Markov
More informationRESEARCH ARTICLE. The Penalized Biclustering Model And Related Algorithms Supplemental Online Material
Journal of Applied Statistics Vol. 00, No. 00, Month 00x, 8 RESEARCH ARTICLE The Penalized Biclustering Model And Related Algorithms Supplemental Online Material Thierry Cheouo and Alejandro Murua Département
More informationScheduling arrivals to queues: a model with no-shows
TEL-AVIV UNIVERSITY RAYMOND AND BEVERLY SACKLER FACULTY OF EXACT SCIENCES SCHOOL OF MATHEMATICAL SCIENCES, DEPARTMENT OF STATISTICS AND OPERATIONS RESEARCH Scheduling arrivals to queues: a model with no-shows
More informationThe Viability of Spectrum Trading Markets
TOPICS IN RADIO COMMUNICATIONS The Viability of Spectrum Trading Markets Carlos E. Caicedo, Syracuse University Martin B. H. Weiss, University of Pittsburgh ABSTRACT Spectrum trading markets are of growing
More informationLecture Outline. Scheduling aperiodic jobs (cont d) Scheduling sporadic jobs
Priority Driven Scheduling of Aperiodic and Sporadic Tasks (2) Embedded Real-Time Software Lecture 8 Lecture Outline Scheduling aperiodic jobs (cont d) Sporadic servers Constant utilization servers Total
More informationOptimal Scheduling Policy Determination in HSDPA Networks
Optimal Scheduling Policy Determination in HSDPA Networks Hussein Al-Zubaidy, Jerome Talim, Ioannis Lambadaris SCE-Carleton University 1125 Colonel By Drive, Ottawa, ON, Canada Email: {hussein, jtalim,
More informationAn Approximation Algorithm for Capacity Allocation over a Single Flight Leg with Fare-Locking
An Approximation Algorithm for Capacity Allocation over a Single Flight Leg with Fare-Locking Mika Sumida School of Operations Research and Information Engineering, Cornell University, Ithaca, New York
More informationAssembly systems with non-exponential machines: Throughput and bottlenecks
Nonlinear Analysis 69 (2008) 911 917 www.elsevier.com/locate/na Assembly systems with non-exponential machines: Throughput and bottlenecks ShiNung Ching, Semyon M. Meerkov, Liang Zhang Department of Electrical
More information6.262: Discrete Stochastic Processes 3/2/11. Lecture 9: Markov rewards and dynamic prog.
6.262: Discrete Stochastic Processes 3/2/11 Lecture 9: Marov rewards and dynamic prog. Outline: Review plus of eigenvalues and eigenvectors Rewards for Marov chains Expected first-passage-times Aggregate
More informationSequential Bandwidth and Power Auctions. for Spectrum Sharing
Sequential Bandwidth and Power Auctions 1 for Spectrum Sharing Junjik Bae, Eyal Beigman, Randall Berry, Michael L. Honig, and Rakesh Vohra Abstract We study a sequential auction for sharing a wireless
More informationAppendix A: Introduction to Queueing Theory
Appendix A: Introduction to Queueing Theory Queueing theory is an advanced mathematical modeling technique that can estimate waiting times. Imagine customers who wait in a checkout line at a grocery store.
More informationPrediction Models of Financial Markets Based on Multiregression Algorithms
Computer Science Journal of Moldova, vol.19, no.2(56), 2011 Prediction Models of Financial Markets Based on Multiregression Algorithms Abstract The paper presents the results of simulations performed for
More informationGame-Theoretic Risk Analysis in Decision-Theoretic Rough Sets
Game-Theoretic Risk Analysis in Decision-Theoretic Rough Sets Joseph P. Herbert JingTao Yao Department of Computer Science, University of Regina Regina, Saskatchewan, Canada S4S 0A2 E-mail: [herbertj,jtyao]@cs.uregina.ca
More informationHandout 8: Introduction to Stochastic Dynamic Programming. 2 Examples of Stochastic Dynamic Programming Problems
SEEM 3470: Dynamic Optimization and Applications 2013 14 Second Term Handout 8: Introduction to Stochastic Dynamic Programming Instructor: Shiqian Ma March 10, 2014 Suggested Reading: Chapter 1 of Bertsekas,
More informationAn optimal policy for joint dynamic price and lead-time quotation
Lingnan University From the SelectedWorks of Prof. LIU Liming November, 2011 An optimal policy for joint dynamic price and lead-time quotation Jiejian FENG Liming LIU, Lingnan University, Hong Kong Xianming
More informationIncentivizing Secondary Spectrum Trading: A Profit Perspective
Incentivizing Secondary Spectrum Trading: A Profit Perspective by Shang-Pin Sheng A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Electrical
More informationModelling Anti-Terrorist Surveillance Systems from a Queueing Perspective
Systems from a Queueing Perspective September 7, 2012 Problem A surveillance resource must observe several areas, searching for potential adversaries. Problem A surveillance resource must observe several
More informationA Rollout-based Joint Spectrum Sensing and Access Policy for Cognitive Radio Networks with Hardware Limitations
A Rollout-based Joint Spectrum Sensing and Access Policy for Cognitive Radio Networks with ardware Limitations Lingcen Wu, Wei Wang, Zhaoyang Zhang, Lin Chen Department of Information Science and Electronic
More informationPERFORMANCE ANALYSIS OF TANDEM QUEUES WITH SMALL BUFFERS
PRFORMNC NLYSIS OF TNDM QUUS WITH SMLL BUFFRS Marcel van Vuuren and Ivo J.B.F. dan indhoven University of Technology P.O. Box 13 600 MB indhoven The Netherlands -mail: m.v.vuuren@tue.nl i.j.b.f.adan@tue.nl
More informationOptimal Production-Inventory Policy under Energy Buy-Back Program
The inth International Symposium on Operations Research and Its Applications (ISORA 10) Chengdu-Jiuzhaigou, China, August 19 23, 2010 Copyright 2010 ORSC & APORC, pp. 526 532 Optimal Production-Inventory
More informationINTER-ORGANIZATIONAL COOPERATIVE INNOVATION OF PROJECT-BASED SUPPLY CHAINS UNDER CONSIDERATION OF MONITORING SIGNALS
ISSN 176-459 Int j simul model 14 (015) 3, 539-550 Original scientific paper INTER-ORGANIZATIONAL COOPERATIVE INNOVATION OF PROJECT-BASED SUPPLY CHAINS UNDER CONSIDERATION OF MONITORING SIGNALS Wu, G.-D.
More informationOptimal rebalancing of portfolios with transaction costs assuming constant risk aversion
Optimal rebalancing of portfolios with transaction costs assuming constant risk aversion Lars Holden PhD, Managing director t: +47 22852672 Norwegian Computing Center, P. O. Box 114 Blindern, NO 0314 Oslo,
More informationAN ABSTRACT OF THE THESIS OF
AN ABSTRACT OF THE THESIS OF Pingan Zhu for the degree of Master of Science incomputer Science and Mathematics presented on September 23, 2013. Title: Revenue-Based Spectrum Management Via Markov Decision
More informationCognitive Interference Management in Retransmission-Based Wireless Networks
Cognitive Interference Management in Retransmission-Based Wireless Networks Marco Levorato, Member, IEEE, Urbashi Mitra, Fellow, IEEE, Michele Zorzi, Fellow, IEEE arxiv:1004.0542v3 [cs.it] 22 Nov 2011
More informationISSN: Guizhen * et al., 6(11): November, 2017] Impact Factor: 4.116
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY OPTIMIZATION MODEL OF WAVE PROPAGATION IN COMPLEX ENVIRONMENTS Cao Zhi, Lu Guizhen* *Communication University of China DOI: 10.581/zenodo.104066
More informationHow Much Competition is a Secondary Market? Online Appendixes (Not for Publication)
How Much Competition is a Secondary Market? Online Appendixes (Not for Publication) Jiawei Chen, Susanna Esteban, and Matthew Shum March 12, 2011 1 The MPEC approach to calibration In calibrating the model,
More informationState Switching in US Equity Index Returns based on SETAR Model with Kalman Filter Tracking
State Switching in US Equity Index Returns based on SETAR Model with Kalman Filter Tracking Timothy Little, Xiao-Ping Zhang Dept. of Electrical and Computer Engineering Ryerson University 350 Victoria
More informationDynamic Resource Allocation for Spot Markets in Cloud Computi
Dynamic Resource Allocation for Spot Markets in Cloud Computing Environments Qi Zhang 1, Quanyan Zhu 2, Raouf Boutaba 1,3 1 David. R. Cheriton School of Computer Science University of Waterloo 2 Department
More informationApplication of the Collateralized Debt Obligation (CDO) Approach for Managing Inventory Risk in the Classical Newsboy Problem
Isogai, Ohashi, and Sumita 35 Application of the Collateralized Debt Obligation (CDO) Approach for Managing Inventory Risk in the Classical Newsboy Problem Rina Isogai Satoshi Ohashi Ushio Sumita Graduate
More informationA Model of Coverage Probability under Shadow Fading
A Model of Coverage Probability under Shadow Fading Kenneth L. Clarkson John D. Hobby August 25, 23 Abstract We give a simple analytic model of coverage probability for CDMA cellular phone systems under
More informationMandatory Social Security Regime, C Retirement Behavior of Quasi-Hyperb
Title Mandatory Social Security Regime, C Retirement Behavior of Quasi-Hyperb Author(s) Zhang, Lin Citation 大阪大学経済学. 63(2) P.119-P.131 Issue 2013-09 Date Text Version publisher URL http://doi.org/10.18910/57127
More informationSequential Investment, Hold-up, and Strategic Delay
Sequential Investment, Hold-up, and Strategic Delay Juyan Zhang and Yi Zhang February 20, 2011 Abstract We investigate hold-up in the case of both simultaneous and sequential investment. We show that if
More informationElif Özge Özdamar T Reinforcement Learning - Theory and Applications February 14, 2006
On the convergence of Q-learning Elif Özge Özdamar elif.ozdamar@helsinki.fi T-61.6020 Reinforcement Learning - Theory and Applications February 14, 2006 the covergence of stochastic iterative algorithms
More informationHedging with Life and General Insurance Products
Hedging with Life and General Insurance Products June 2016 2 Hedging with Life and General Insurance Products Jungmin Choi Department of Mathematics East Carolina University Abstract In this study, a hybrid
More informationHigh Frequency Trading in a Regime-switching Model. Yoontae Jeon
High Frequency Trading in a Regime-switching Model by Yoontae Jeon A thesis submitted in conformity with the requirements for the degree of Master of Science Graduate Department of Mathematics University
More informationX(t) = B(t), t 0,
IEOR 4106: Introduction to Operations Research: Stochastic Models Spring 2007, Professor Whitt, Final Exam Chapters 4-7 and 10 in Ross, Wednesday, May 9, 1:10pm-4:00pm Open Book: but only the Ross textbook,
More informationDECISION MAKING. Decision making under conditions of uncertainty
DECISION MAKING Decision making under conditions of uncertainty Set of States of nature: S 1,..., S j,..., S n Set of decision alternatives: d 1,...,d i,...,d m The outcome of the decision C ij depends
More informationTHe recent explosive growth of wireless networks, with
Designing Truthful Spectrum Double Auctions with Local Markets Wei Wang, Student Member, IEEE, Ben Liang, Senior Member, IEEE, and Baochun Li, Senior Member, IEEE Abstract Market-driven spectrum auctions
More informationBEHAVIOUR OF PASSAGE TIME FOR A QUEUEING NETWORK MODEL WITH FEEDBACK: A SIMULATION STUDY
IJMMS 24:24, 1267 1278 PII. S1611712426287 http://ijmms.hindawi.com Hindawi Publishing Corp. BEHAVIOUR OF PASSAGE TIME FOR A QUEUEING NETWORK MODEL WITH FEEDBACK: A SIMULATION STUDY BIDYUT K. MEDYA Received
More informationFinite-length analysis of the TEP decoder for LDPC ensembles over the BEC
Finite-length analysis of the TEP decoder for LDPC ensembles over the BEC Pablo M. Olmos, Fernando Pérez-Cruz Departamento de Teoría de la Señal y Comunicaciones. Universidad Carlos III in Madrid. email:
More informationA Linear Programming Approach for Optimum Project Scheduling Taking Into Account Overhead Expenses and Tardiness Penalty Function
A Linear Programming Approach for Optimum Project Scheduling Taking Into Account Overhead Expenses and Tardiness Penalty Function Mohammed Woyeso Geda, Industrial Engineering Department Ethiopian Institute
More informationMeasurement of Radio Propagation Path Loss over the Sea for Wireless Multimedia
Measurement of Radio Propagation Path Loss over the Sea for Wireless Multimedia Dong You Choi Division of Electronics & Information Engineering, Cheongju University, #36 Naedok-dong, Sangdang-gu, Cheongju-city
More informationAlgorithmic and High-Frequency Trading
LOBSTER June 2 nd 2016 Algorithmic and High-Frequency Trading Julia Schmidt Overview Introduction Market Making Grossman-Miller Market Making Model Trading Costs Measuring Liquidity Market Making using
More informationNUMERICAL METHODS OF PARTIAL INTEGRO-DIFFERENTIAL EQUATIONS FOR OPTION PRICE
Trends in Mathematics - New Series Information Center for Mathematical Sciences Volume 13, Number 1, 011, pages 1 5 NUMERICAL METHODS OF PARTIAL INTEGRO-DIFFERENTIAL EQUATIONS FOR OPTION PRICE YONGHOON
More informationFairness concept in terms of the utilization Hakyong Kim, Yongtak Lee, and Kiseon Kim Indexing terms: fairness, fairness index In this Letter, we disc
Fairness concept in terms of the utilization Hakyong Kim, Yongtak Lee, and Kiseon Kim Indexing terms: fairness, fairness index In this Letter, we discuss the concept of the fairness and dene a fairness
More informationEindhoven University of Technology BACHELOR. Price directed control of bike sharing systems. van der Schoot, Femke A.
Eindhoven University of Technology BACHELOR Price directed control of bike sharing systems van der Schoot, Femke A. Award date: 2017 Link to publication Disclaimer This document contains a student thesis
More informationGrowth and Distributional Effects of Inflation with Progressive Taxation
MPRA Munich Personal RePEc Archive Growth and Distributional Effects of Inflation with Progressive Taxation Fujisaki Seiya and Mino Kazuo Institute of Economic Research, Kyoto University 20. October 2010
More informationTerm Structure of Credit Spreads of A Firm When Its Underlying Assets are Discontinuous
www.sbm.itb.ac.id/ajtm The Asian Journal of Technology Management Vol. 3 No. 2 (2010) 69-73 Term Structure of Credit Spreads of A Firm When Its Underlying Assets are Discontinuous Budhi Arta Surya *1 1
More informationLecture 7: Bayesian approach to MAB - Gittins index
Advanced Topics in Machine Learning and Algorithmic Game Theory Lecture 7: Bayesian approach to MAB - Gittins index Lecturer: Yishay Mansour Scribe: Mariano Schain 7.1 Introduction In the Bayesian approach
More informationDepartment of Social Systems and Management. Discussion Paper Series
Department of Social Systems and Management Discussion Paper Series No.1252 Application of Collateralized Debt Obligation Approach for Managing Inventory Risk in Classical Newsboy Problem by Rina Isogai,
More informationPricing Problems under the Markov Chain Choice Model
Pricing Problems under the Markov Chain Choice Model James Dong School of Operations Research and Information Engineering, Cornell University, Ithaca, New York 14853, USA jd748@cornell.edu A. Serdar Simsek
More informationA Hybrid Importance Sampling Algorithm for VaR
A Hybrid Importance Sampling Algorithm for VaR No Author Given No Institute Given Abstract. Value at Risk (VaR) provides a number that measures the risk of a financial portfolio under significant loss.
More informationDynamic Market Making and Asset Pricing
Dynamic Market Making and Asset Pricing Wen Chen 1 Yajun Wang 2 1 The Chinese University of Hong Kong, Shenzhen 2 Baruch College Institute of Financial Studies Southwestern University of Finance and Economics
More informationStatistic Microwave Path Loss Modeling in Urban Line-of-Sight Area Using Fuzzy Linear Regression
ICCAS2005 June 2-5, KINTEX, Gyeonggi-Do, Korea Statistic Microwave Path Loss Modeling in Urban Line-of-Sight Area Using Fuzzy Linear Regression SUPACHAI PHAIBOON, PISIT PHOKHARATKUL Faculty of Engineering,
More informationDesign of Information Sharing Mechanisms
Design of Information Sharing Mechanisms Krishnamurthy Iyer ORIE, Cornell University Oct 2018, IMA Based on joint work with David Lingenbrink, Cornell University Motivation Many instances in the service
More informationAnalytical Option Pricing under an Asymmetrically Displaced Double Gamma Jump-Diffusion Model
Analytical Option Pricing under an Asymmetrically Displaced Double Gamma Jump-Diffusion Model Advances in Computational Economics and Finance Univerity of Zürich, Switzerland Matthias Thul 1 Ally Quan
More informationMarket MicroStructure Models. Research Papers
Market MicroStructure Models Jonathan Kinlay Summary This note summarizes some of the key research in the field of market microstructure and considers some of the models proposed by the researchers. Many
More informationSequential Investment, Hold-up, and Strategic Delay
Sequential Investment, Hold-up, and Strategic Delay Juyan Zhang and Yi Zhang December 20, 2010 Abstract We investigate hold-up with simultaneous and sequential investment. We show that if the encouragement
More informationContinuous time Markov chains (week 9) Solution
Continuous time Markov chains (week 9) Solution 1 Determining the number of channels to provide service in cellular communications. A Departure process. Defining T k as the random time until the next departure
More informationCompetition in Private Commons: Price War or Market Sharing?
Competition in Private Commons: Price War or Market Sharing? Emir Kavurmacioglu, Murat Alanyali and David Starobinski Division of Systems Engineering, Department of Electrical Engineering Boston University
More informationCollateralized capital and news-driven cycles. Abstract
Collateralized capital and news-driven cycles Keiichiro Kobayashi Research Institute of Economy, Trade, and Industry Kengo Nutahara Graduate School of Economics, University of Tokyo, and the JSPS Research
More informationSingular Stochastic Control Models for Optimal Dynamic Withdrawal Policies in Variable Annuities
1/ 46 Singular Stochastic Control Models for Optimal Dynamic Withdrawal Policies in Variable Annuities Yue Kuen KWOK Department of Mathematics Hong Kong University of Science and Technology * Joint work
More informationForecasting Prices in the Presence of Hidden Liquidity
Forecasting Prices in the Presence of Hidden Liquidity Marco Avellaneda, Josh Reed & Sasha Stoikov December 14, 2010 Abstract Bid and ask sizes at the top of the order book provide information on short-term
More informationChapter 6 Money, Inflation and Economic Growth
George Alogoskoufis, Dynamic Macroeconomic Theory, 2015 Chapter 6 Money, Inflation and Economic Growth In the models we have presented so far there is no role for money. Yet money performs very important
More informationA No-Arbitrage Theorem for Uncertain Stock Model
Fuzzy Optim Decis Making manuscript No (will be inserted by the editor) A No-Arbitrage Theorem for Uncertain Stock Model Kai Yao Received: date / Accepted: date Abstract Stock model is used to describe
More informationOPTIMAL PORTFOLIO CONTROL WITH TRADING STRATEGIES OF FINITE
Proceedings of the 44th IEEE Conference on Decision and Control, and the European Control Conference 005 Seville, Spain, December 1-15, 005 WeA11.6 OPTIMAL PORTFOLIO CONTROL WITH TRADING STRATEGIES OF
More informationThe Procyclical Effects of Basel II
9TH JACQUES POLAK ANNUAL RESEARCH CONFERENCE NOVEMBER 13-14, 2008 The Procyclical Effects of Basel II Rafael Repullo CEMFI and CEPR, Madrid, Spain and Javier Suarez CEMFI and CEPR, Madrid, Spain Presented
More informationarxiv: v5 [quant-ph] 16 Oct 2008
Violation of Equalities in Bipartite Qutrits Systems Hossein Movahhedian Department of Physics, Shahrood University of Technology, Seventh Tir Square, Shahrood, Iran We have recently shown that for the
More informationAn Adjusted Trinomial Lattice for Pricing Arithmetic Average Based Asian Option
American Journal of Applied Mathematics 2018; 6(2): 28-33 http://www.sciencepublishinggroup.com/j/ajam doi: 10.11648/j.ajam.20180602.11 ISSN: 2330-0043 (Print); ISSN: 2330-006X (Online) An Adjusted Trinomial
More informationOptimally Thresholded Realized Power Variations for Lévy Jump Diffusion Models
Optimally Thresholded Realized Power Variations for Lévy Jump Diffusion Models José E. Figueroa-López 1 1 Department of Statistics Purdue University University of Missouri-Kansas City Department of Mathematics
More informationTrinomial Tree. Set up a trinomial approximation to the geometric Brownian motion ds/s = r dt + σ dw. a
Trinomial Tree Set up a trinomial approximation to the geometric Brownian motion ds/s = r dt + σ dw. a The three stock prices at time t are S, Su, and Sd, where ud = 1. Impose the matching of mean and
More informationValuation of Exit Strategy under Decaying Abandonment Value
Communications in Mathematical Finance, vol. 4, no., 05, 3-4 ISSN: 4-95X (print version), 4-968 (online) Scienpress Ltd, 05 Valuation of Exit Strategy under Decaying Abandonment Value Ming-Long Wang and
More informationPublic Pension Reform in Japan
ECONOMIC ANALYSIS & POLICY, VOL. 40 NO. 2, SEPTEMBER 2010 Public Pension Reform in Japan Akira Okamoto Professor, Faculty of Economics, Okayama University, Tsushima, Okayama, 700-8530, Japan. (Email: okamoto@e.okayama-u.ac.jp)
More information