CACHING popular video contents at the network edge,
|
|
- Franklin Flynn
- 6 years ago
- Views:
Transcription
1 1 Mobility and Popularity-Aware Coded Small-Cell Cachin Emre Ozfatura and Deniz Gündüz arxiv: v1 [cs.it] 21 Nov 2017 Abstract In heteroeneous cellular networks with cachin capability, due to mobility of users and storae constraints of small-cell base stations (SBSs), users may not be able to download all of their requested content from the SBSs within the delay deadline of the content. In that case, the users are directed to the macro-cell base station (MBS) in order to satisfy the service quality requirement. Coded cachin is exploited here to minimize the amount of data downloaded from the MBS takin into account the mobility of the users as well as the popularity of the contents. An optimal distributed cachin policy is presented when the delay deadline is below a certain threshold, and a distributed reedy cachin policy is proposed when the delay deadline is relaxed. Index Terms Heteroeneous cellular network, content cachin, user mobility. I. INTRODUCTION CACHING popular video contents at the network ede, closer to the end users, is a promisin method to cope with increasin video traffic. In heteroeneous cellular networks, popular video files are stored at SBS caches to reduce latency as well as backhaul traffic [1] [3]. The oal in these works is to maximize the hit rate, or equivalently, to minimize the amount of data downloaded from MBSs under iven SBS cache capacity constraints. A common assumption is that a user stays connected to the same set of SBSs durin the whole duration of video download. However, in ultra dense networks, where there is a lare number of operatin SBSs with limited coverae areas, it is indispensable to take user mobility into consideration to meet the prescribed quality of service (QoS) requirements [4]. Our aim in this paper is to provide a cachin policy, which, for iven video popularity profile and user mobility patterns, minimizes the averae amount of data downloaded from the MBS. We adopt the delayed offloadin scheme in heteroeneous networks; that is, each video content request has a deadline, and if the mobile user cannot download all the framents of the content from the SBSs it has connected to by the deadline, the remainder of the request is satisfied by the MBS [5]. We consider maximum distance separable (MDS) codin for storin the video contents in the SBS caches. To the best of our knowlede, [6] is the only work that considers mobility-aware cachin with delayed offloadin. The oal in [6] is to minimize the probability of a request bein served by the MBS. In this work, as in [7], we assume that the MBS serves the remainin framents as MDS coded packets at a hiher cost. Hence, unlike [6], our oal is to minimize the Emre Ozfatura and Deniz Gündüz are with the Information Processin and Communications Lab, Department of Electrical and Electronic Enineerin, Imperial Collee London, London SW7 2AZ, UK. This work was supported by EC H2020-MSCA-ITN-2015 project SCAV- ENGE under rant number , and by the European Research Council project BEACON under rant number amount of data downloaded from the MBS. We show that, if the request deadline is below a certain threshold there is an optimal distributed solution. If the request deadline does not meet this condition, we introduce a sub-optimal reedy cachin policy. II. SYSTEM MODEL AND PROBLEM FORMULATION Consider a heteroeneous network that consists of one MBS and N SBSs, SBS 1,..., SBS N, with disjoint coverae areas. A mobile user (MU) is served by only one SBS at any particular time. We consider a video library V = {v 1,..., v K consistin of K distinct video files, each of lenth B bits, indexed accordin to their popularity profile, i.e., file v k is the kth most popular file with request probability p k. Further, we assume that video files are encoded by rateless MDS codin [3], so that a video file can be retrieved when B parity bits are collected in any order, from any SBSs. We consider equal-lenth time slots, whose duration corresponds to the minimum time that a MU remains in the coverae area of a SBS. Therefore, althouh a MU cannot connect to more than one SBS durin one time slot, it may stay connected to the same SBS over several consecutive time slots. We assume that SBS n is capable of transmittin R n bits within a time slot to a MU within its coverae area, and it has a storae capacity of C n bits. Due to the QoS requirement, a video file must be downloaded within T time slots once it is requested. Thus, if a MU is not able to collect B bits from SBSs in T slots, the remainin bits are provided by the MBS at a hiher cost. We define the mobility path of a user as the sequence of small-cells visited over T time slots after requestin a video file. For instance, for T = 5, SBS 1, SBS 2, SBS 2, SBS 3, SBS 4 is a possible mobility path. We remark that the MU may remain connected to the same SBS more than one time slot, and can connect to at most T different SBSs. Hence, there is a finite number of distinct mobility paths, denoted by M. We denote the mth mobility path by I m, and its realization probability by q m. Realization probabilities can be obtained from empirical observations, or via modelin mobility paths as random walks on a Markov chain. Our aim is to minimize the expected amount of data downloaded from the MBS for iven SBS storae capacities C {C n N, data transmission rates R {R n N, video popularity profiles P {p k K, and mobility paths with realization probabilities I T {(I m, q m ) m=1 M. Let = { N,K xn,k denote the cachin policy over T time slots, where n= x n,k indicates the number of parity bits for file v k stored in SBS n. A cachin policy is feasible if K x n,k C n, n. The averae amount of data downloaded from the MBS is denoted by d av (, I T ), or simply by d av. Let d k,m denote the amount of coded data downloaded from
2 2 the MBS for video v k followin mobility path I m. For iven C, R, P, I T, and cachin policy, we have { ( d k,m = max B min { ) x n,k, R n S m,n, 0, (1) where S m,n denotes the total number of time slots the MU connected to SBS n in mobility path I m. Then, takin the averae over all mobility paths and video files, d av can be written in terms of d k,m as d av = M K m=1 q m p k d k,m. Our oal is to find the optimal feasible cachin policy XT that minimizes d av, formulated as follows: P1: min d av subject to: x n,k C n, n. (2) x n,k 0, n, k. (3) In order to avoid the max operator in Eqn. (1), problem P1 is reformulated as follows. We treat d k,m as decision variables, and add the followin constraint: { ( d k,m max B min { ) x n,k, R n S m,n, 0. (4) We note that, for a iven feasible cachin policy the objective function is monotonically increasin with d k,m ; hence, for the optimal solution, constraint (4) must be satisfied with equality. The equivalent optimization problem is obtained as follows. P2: min,d T d av subject to: x n,k C n, n, (5) min { x n,k, R n S m,n + dk,m B, k, m, (6) d k,m 0, k, m, (7) where D T { K,M d k,m. Notice that constraints (6) and (7) k=m=1 toether imply constraint (4). Recall that a MU cannot connect to more than T different SBSs. Hence, for each (k, m) pair, constraint (6) can be replaced by at most 2 T linear constraints. To clarify, let T = 4 and N = 6, and consider the mobility path I m = {SBS 1, SBS 1, SBS 2, SBS 2. For this specific mobility path and file v k, (6) can be written as min { x 1,k, 2R 1 + min { x2,k, 2R 2 + dk,m B. (8) Equivalently, (8) can be replaced by the followin set of linear constraints: x 1,k + x 2,k + d k,m B, (9) x 1,k + 2R 2 + d k,m B, (10) 2R 1 + x 2,k + d k,m B, (11) 2R 1 + 2R 2 + d k,m B. (12) Consequently, the initial optimization problem P1 can be cast into a linear optimization problem. However, the number of constraints are exponential in time constraint T. In the next subsection we show that, under a certain assumption on T, P1 can be solved in a distributed manner. III. DISTRIBUTED SOLUTION B In this section, we consider the case T T min R ma x, where R max is the maximum data rate across all the cells, i.e., R max max {R 1,..., R N. This special case is also instrumental in hihlihtin the distinction between our problem formulation and that of [6], whose oal is to minimize the probability of downloadin any data from the MBS. We note that, with the formulation of [6], when T < T min all cachin policies are equivalent since it is not possible to collect B bits in T slots. While [6] inores the mobility paths when T < T min, each cachin policy will induce a different d av. Hence, an optimal cachin policy in [6] may lead to a suboptimal d av. Instead, we present the optimal cachin alorithm that minimizes d av when T T min. We also propose a reedy cachin policy, for T > T min. A. Optimal Distributed Solution When T T min, (1) simplifies to d k,m = B min { x n,k, R n S m,n. (13) Then, our objective d av can be rewritten as: d av = B M m=1 q m p k min { x n,k, R n S m,n. (14) {{ d av Note that minimizin d av is equivalent to maximizin d av, which denotes the averae amount of data downloaded from the SBSs. We chane the order of the summations in (14): d av = p k m=1 M q m min { x n,k, R n S m,n, (15) {{ d av, n we observe that the optimal cachin policy can be obtained via maximizin d av,n, defined above, for each SBS n separately. Let XT n denote the cachin policy for SBS n. For SBS n, we have the followin optimization problem: P3: max X n T subject to: d av,n x n,k C n. (16) x n,k 0, k. (17) If we roup the mobility paths accordin to the time spent in cell SBS n, d av,n can be written as d av,n = t=1 m:s m, n =t p k q m min { x n,k, tr n. (18) {{ d k av, n The term min { x n,k, tr n can be expanded as follows: min { t 1 x n,k, tr n = max { min { x n,k ir n, R n, 0, (19) i=0
3 3 Alorithm 1: Alorithm for optimal distributed cachin (-based policy) Input : R,C,{ n N Output: X T 1 for,...,n do 2 x n,k 0, k {1,..., K; 3 while C n > 0 do 4 ń k, t max n ; 5 x x n,ḱ n,ḱ { + min(c n, R n ); 6 n n \ ń ; k, t 7 C n C n R n ; 8 end 9 end and d k av,n can be rewritten as: d k av,n = Equivalently, d k av,n = t=1 m:s m, n t p k q m max { min { x n,k (t 1)R n, R n, 0. (20) n k,t max { min { x n,k (t 1)R n, R n, 0, (21) t=1 where n k,t p k P(S m,n t). We observe that for each k, d av,n k is a monotonically increasin piecewise linear function of x n,k, and its slope is n k,t for x n,k ((t 1)R n, tr n ). Consequently, the objective function in P3 is the sum of N monotonically increasin piecewise linear functions, and sum of its variables are bounded by constraint (16). Accordinly, it is maximized by maximizin the variable that corresponds to the linear function with the maximum slope. We propose Alorithm 1 to maximize the objective function that follows a straihtforward procedure usin n values for each SBS k,t n. The alorithm starts with increasin the variable x n,k that corresponds to the maximum slope, until the slope of d av,n k chanes, then it aain searches for the maximum slope, and repeats this process until the sum of the variables satisfies (16) with equality. From a computational point of view, proposed alorithm sorts the elements of set Γ n { nk,t : k = 1,..., K; t = 1,..., T for each n N. Since Γ n = KT, the complexity of Alorithm 1 is O(NKT lo(kt)). The optimality of the alorithm follows from the fact that n k,t n for any (k, t) pair, which implies k,t 1 that d av,n k is a concave function for each k. The cachin policy constructed accordin to Alorithm 1 is called the -based policy, and denoted by X T. We note that when T T min, X T is the optimal policy, i.e., X T = X T. B. Distributed Greedy Cache Allocation Scheme When T > T min it is not possible to predict the performance of X T, or ensure that d av(x T, I T ) d av (X T min, I Tmin ). We note that X T min is the -based cachin policy explained above for T min. However, we know that for any T > T min, d av (X T min, I T ) d av (X T min, I Tmin ). Hence, our aim is to provide a reedy distributed cachin policy X T that performs Alorithm 2: Greedy alorithm for storae reallocation Input : C, R, I T, P, XT min Output: X T 1 for,...,n do 2 + k, k NULL : k {1,..., K, Vred {; 3 V + {,V {; 4 x max = max { x n,1,..., x n,k ; 5 6 while x max > 0 do ḱ = max { k : x n,k x max ; 7 if ḱ V then 8 V V { ḱ, calculate k ; 9 end 10 if ḱ + 1 V + then 11 V + V + { ḱ + 1, calculate + k ; 12 end 13 x max x max R n ; 14 end 15 + max max +, max max ; if + max > max then ḱ max k + k, `k max k k ; 18 +`k, + NULL; ḱ 19 x x n,ḱ n,ḱ + R n, x n, `k x n, `k R n; 20 Go back to line 3 21 end 22 end better than X T min, i.e., d av (X T, I T ) d av (X T min, I T ). Our proposed method to construct X T consists of two steps. In the first step, we obtain the optimal cachin policy XT min by executin Alorithm 1. In the second step, we follow a reedy method for cache reallocation for each cell separately, which is performed by Alorithm 2. Assume that we are reallocatin the cache for SBS n, Alorithm 2 first identifies candidate video files for cache capacity increment and reduction. In this identification process, the main criteria is the popularity of the video files, e.., if there are several video files that have been allocated the same cache capacity, then the most popular file amon those is a candidate for cache capacity increment, whereas the least popular one is a candidate for cache capacity reduction. Accordinly, let V + and V denote the sets of indices of the video files that are candidates for cache capacity increment and reduction, respectively. After identification of a candidate file v k, we calculate k if k V, or + k if k V +, whose initial values are is NULL. + k and k denote the amount of chane in d av when the cache capacity of video file v k is increased by R n, or decreased by R 1 n, respectively. In the last step, alorithm compares the values of + max max k + k and max max k k. The condition + max > max implies that d av can be reduced via storae capacity reallocation. Then, the alorithm performs the followin task, storae capacity of video file v k, where + k = + max, is increased by R n, and the storae capacity of 1 Storae reallocation can be done with smaller sizes to improve the performance of the policy with a cost of complexity; however, due to limited space, we do not study this tradeoff in this letter.
4 min Cache size(% of file library), C (a) T = 5 and T min = min Delay deadline (slots), T (b) C = 300 (files) and T min = min Data transmission rate (file per slot), R (c) C = 300 (files) and T = 5. Fi. 1: The averae amount of data served by the MBS (normalized by the file size) for different values of: (a) normalized cache size C, (b) delay deadline T, and (c) data transmission rate R = 1/T min. video file v k where k = max is decreased by R n. IV. NUMERICAL RESULTS For numerical simulations we consider K = 1000 files in the library, and assume that their popularities follow a Zipf distribution with parameter 0.56 [8]. There are 16 SBSs located in a 2D square rid. We fix the transmission rate of each SBS to R, accordin to parameter T min, i.e., R = 1/T min file per slot. We consider the followin Markov mobility model: a MU connected to SBS n remains connected to the same SBS with probability f n, or connects to one of the neihborin SBSs with equal probability. In the experiment, we consider f 4 = f 13 =, f 7 = f 9 = 0.5, and for the all other SBSs f n =. As a performance benchmark, we also consider the policy, which simply caches the most popular N files at each SBS. We remark that, when T > T min the value of T has no impact on the performance of the policy since it caches the files as a whole. On the other hand, when T T min, the value of d av decreases linearly with increasin T. In the first experiment, we set T min = 2, T = 5 and consider the normalized SBS cache sizes (as portion of the entire file library) 10%, 20%, 30%, 40%, 50%. The reedy alorithm X T provides up to 40% further reduction in the amount of data downloaded from the MBS compared to -based policy X T as depicted in Fi. 1(a). We also observe that the ap between the performances of X T and X T widens with increasin cache sizes. Finally, note that the policy performs quite poorly in eneral as it inores the mobility patterns. In the second experiment, we set C = 300, T min = 2, and the delay deadline T takes values from 2 to 6 time slots. Performance of the cachin policies for different T values are plotted in Fi. 1(b). The key observation from the fiure is that, althouh the averae portion of the video file downloaded from the MBS monotonically decreases with increasin T under policy X T and X T min, this is not the always the case for X T. Note that X T mainly depends on the sojourn statistics, P(S m,n t), over all possible paths, and when T > T min those statistics miht be misleadin because in certain paths the MU miht collect all the parity bits before connectin to SBS n. In that case, storae capacity of the popular files miht be increased due to sojourn statistics even thouh it is not required. In the third experiment we set T = 5, C = 300, and the transmission rate takes values 1/2, 1/3, 1/4, 1/5, 1/6 file per slot, which correspond to T min values of 2, 3, 4, 5, 6 slots respectively. Althouh it is expected that the MBS usae decreases with the increasin transmission rate, Fi 1(c) illustrates that after a certain point the amount of data downloaded from the MBS increases with the transmission rate under all policies. This is because, T min decreases when the rate increases and the difference between T min and T widens, as a result of which the performance becomes worse. V. CONCLUSIONS In this letter, we studied mobility and popularity aware content cachin for a heteroeneous network with MDScoded cachin at the SBSs. Assumin a maximum download time requirement T, for each request, we first defined the threshold T min on T, below which some bits of the request must be downloaded from the MBS. Then, we obtained the optimal distributed cachin policy when T T min, called the -based policy, which minimizes the amount of data that need to be downloaded from the MBS. Then, we utilized the parameter T min and the -based policy for T = T min to obtain a reedy cachin policy for T > T min. Consequently, we showed how to desin a coded cachin policy accordin to T min and performed various simulations to demonstrate that the utilization of T min improves the performance sinificantly. REFERENCES [1] W. Jian, G. Fen, and S. Qin, Optimal cooperative content cachin and delivery policy for heteroeneous cellular networks, IEEE Trans. Mobile Comput., vol. 16, May [2] K. Poularakis, G. Iosifidis, and L. Tassiulas, Approximation alorithms for mobile data cachin in small cell networks, IEEE Trans. Commun., vol. 62, Oct [3] K. Shanmuam, N. Golrezaei, A. G. Dimakis, A. F. Molisch, and G. Caire, Femtocachin: Wireless content delivery throuh distributed cachin helpers, IEEE Trans. Inf. Theory, vol. 59, Dec [4] R. Wan, X. Pen, J. Zhan, and K. B. Letaief, Mobility-aware cachin for content-centric wireless networks: Modelin and methodoloy, IEEE Communications Maazine, vol. 54, Au
5 [5] K. Lee, J. Lee, Y. Yi, I. Rhee, and S. Chon, Mobile data offloadin: How much can WiFi deliver? IEEE/ACM Trans. Netw., vol. 21, Apr [6] K. Poularakis and L. Tassiulas, Code, cache and deliver on the move: A novel cachin paradim in hyper-dense small-cell networks, IEEE Trans. Mobile Comput., vol. 16, no. 3, Mar [7] J. Liao, K. K. Won, M. R. A. Khandaker, and Z. Zhen, Optimizin cache placement for heteroeneous small cell networks, IEEE Commun. Lett., vol. 21, Jan [8] M. Zink, K. Suh, Y. Gu, and J. Kurose, Characteristics of YouTube network traffic at a campus network - measurements, models, and implications, Comput. Netw., vol. 53, no. 4, Mar
The Clarke Tax Algorithm
The Clarke Tax Alorithm Michael A. Goodrich October 25, 2005 1 Introduction In these notes, we will introduce the Clarke Tax Alorithm which is a utility-based social choice mechanism. We will then ive
More informationHandout 8: Introduction to Stochastic Dynamic Programming. 2 Examples of Stochastic Dynamic Programming Problems
SEEM 3470: Dynamic Optimization and Applications 2013 14 Second Term Handout 8: Introduction to Stochastic Dynamic Programming Instructor: Shiqian Ma March 10, 2014 Suggested Reading: Chapter 1 of Bertsekas,
More informationThe Duration Derby: A Comparison of Duration Based Strategies in Asset Liability Management
The Duration Derby: A Comparison of Duration Based Strategies in Asset Liability Management H. Zheng Department of Mathematics, Imperial College London SW7 2BZ, UK h.zheng@ic.ac.uk L. C. Thomas School
More informationOnline Appendix: Extensions
B Online Appendix: Extensions In this online appendix we demonstrate that many important variations of the exact cost-basis LUL framework remain tractable. In particular, dual problem instances corresponding
More informationChapter 7 A Multi-Market Approach to Multi-User Allocation
9 Chapter 7 A Multi-Market Approach to Multi-User Allocation A primary limitation of the spot market approach (described in chapter 6) for multi-user allocation is the inability to provide resource guarantees.
More informationPORTFOLIO OPTIMIZATION AND EXPECTED SHORTFALL MINIMIZATION FROM HISTORICAL DATA
PORTFOLIO OPTIMIZATION AND EXPECTED SHORTFALL MINIMIZATION FROM HISTORICAL DATA We begin by describing the problem at hand which motivates our results. Suppose that we have n financial instruments at hand,
More informationConstrained Sequential Resource Allocation and Guessing Games
4946 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 11, NOVEMBER 2008 Constrained Sequential Resource Allocation and Guessing Games Nicholas B. Chang and Mingyan Liu, Member, IEEE Abstract In this
More informationCo-opetition Strategy for Collaborative Multiuser Multimedia Resource Allocation
Co-opetition Strategy for Collaborative Multiuser Multimedia Resource Allocation Zhangyu Guan, Dongfeng Yuan and Haixia Zhang Wireless Mobile Communications and Transmission Lab (WMCT) Shandong University,
More informationCOMP331/557. Chapter 6: Optimisation in Finance: Cash-Flow. (Cornuejols & Tütüncü, Chapter 3)
COMP331/557 Chapter 6: Optimisation in Finance: Cash-Flow (Cornuejols & Tütüncü, Chapter 3) 159 Cash-Flow Management Problem A company has the following net cash flow requirements (in 1000 s of ): Month
More informationHandout 4: Deterministic Systems and the Shortest Path Problem
SEEM 3470: Dynamic Optimization and Applications 2013 14 Second Term Handout 4: Deterministic Systems and the Shortest Path Problem Instructor: Shiqian Ma January 27, 2014 Suggested Reading: Bertsekas
More informationTHE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE
THE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE GÜNTER ROTE Abstract. A salesperson wants to visit each of n objects that move on a line at given constant speeds in the shortest possible time,
More informationSOLVING ROBUST SUPPLY CHAIN PROBLEMS
SOLVING ROBUST SUPPLY CHAIN PROBLEMS Daniel Bienstock Nuri Sercan Özbay Columbia University, New York November 13, 2005 Project with Lucent Technologies Optimize the inventory buffer levels in a complicated
More informationLecture Quantitative Finance Spring Term 2015
implied Lecture Quantitative Finance Spring Term 2015 : May 7, 2015 1 / 28 implied 1 implied 2 / 28 Motivation and setup implied the goal of this chapter is to treat the implied which requires an algorithm
More informationLecture 17: More on Markov Decision Processes. Reinforcement learning
Lecture 17: More on Markov Decision Processes. Reinforcement learning Learning a model: maximum likelihood Learning a value function directly Monte Carlo Temporal-difference (TD) learning COMP-424, Lecture
More informationFactor Saving Innovation. Michele Boldrin and David K. Levine
Factor Saving nnovation Michele Boldrin and David K. Levine 1 ntroduction endogeneity of aggregate technological progress we introduce concave model of innovation with three properties concerning technological
More informationThe exact import price and its impli the US external imbalance. Citation Applied Economics Letters, 18(17): 1.
JAIST Reposi https://dspace.j Title The exact import price and its impli the US external imbalance Author(s)Takeuchi, Fumihide Citation Applied Economics Letters, 18(17): 1 Issue Date 2011-04-08 Type Journal
More informationCall Admission Control for Preemptive and Partially Blocking Service Integration Schemes in ATM Networks
Call Admission Control for Preemptive and Partially Blocking Service Integration Schemes in ATM Networks Ernst Nordström Department of Computer Systems, Information Technology, Uppsala University, Box
More informationFinal exam solutions
EE365 Stochastic Control / MS&E251 Stochastic Decision Models Profs. S. Lall, S. Boyd June 5 6 or June 6 7, 2013 Final exam solutions This is a 24 hour take-home final. Please turn it in to one of the
More informationInvesting and Price Competition for Multiple Bands of Unlicensed Spectrum
Investing and Price Competition for Multiple Bands of Unlicensed Spectrum Chang Liu EECS Department Northwestern University, Evanston, IL 60208 Email: changliu2012@u.northwestern.edu Randall A. Berry EECS
More informationDepartment of Social Systems and Management. Discussion Paper Series
Department of Social Systems and Management Discussion Paper Series No.1252 Application of Collateralized Debt Obligation Approach for Managing Inventory Risk in Classical Newsboy Problem by Rina Isogai,
More informationTHE ENERGY EFFICIENCY OF THE ERGODIC FADING RELAY CHANNEL
7th European Signal Processing Conference (EUSIPCO 009) Glasgow, Scotland, August 4-8, 009 THE ENERGY EFFICIENCY OF THE ERGODIC FADING RELAY CHANNEL Jesús Gómez-Vilardebó Centre Tecnològic de Telecomunicacions
More information1 Consumption and saving under uncertainty
1 Consumption and saving under uncertainty 1.1 Modelling uncertainty As in the deterministic case, we keep assuming that agents live for two periods. The novelty here is that their earnings in the second
More informationOptimizing the Omega Ratio using Linear Programming
Optimizing the Omega Ratio using Linear Programming Michalis Kapsos, Steve Zymler, Nicos Christofides and Berç Rustem October, 2011 Abstract The Omega Ratio is a recent performance measure. It captures
More informationReasoning with Uncertainty
Reasoning with Uncertainty Markov Decision Models Manfred Huber 2015 1 Markov Decision Process Models Markov models represent the behavior of a random process, including its internal state and the externally
More informationHomework #4. CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class
Homework #4 CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class o Grades depend on neatness and clarity. o Write your answers with enough detail about your approach and concepts
More informationRevenue Management Under the Markov Chain Choice Model
Revenue Management Under the Markov Chain Choice Model Jacob B. Feldman School of Operations Research and Information Engineering, Cornell University, Ithaca, New York 14853, USA jbf232@cornell.edu Huseyin
More informationThe duration derby : a comparison of duration based strategies in asset liability management
Edith Cowan University Research Online ECU Publications Pre. 2011 2001 The duration derby : a comparison of duration based strategies in asset liability management Harry Zheng David E. Allen Lyn C. Thomas
More informationApplication of the Collateralized Debt Obligation (CDO) Approach for Managing Inventory Risk in the Classical Newsboy Problem
Isogai, Ohashi, and Sumita 35 Application of the Collateralized Debt Obligation (CDO) Approach for Managing Inventory Risk in the Classical Newsboy Problem Rina Isogai Satoshi Ohashi Ushio Sumita Graduate
More informationAppendix A: Introduction to Queueing Theory
Appendix A: Introduction to Queueing Theory Queueing theory is an advanced mathematical modeling technique that can estimate waiting times. Imagine customers who wait in a checkout line at a grocery store.
More informationEE266 Homework 5 Solutions
EE, Spring 15-1 Professor S. Lall EE Homework 5 Solutions 1. A refined inventory model. In this problem we consider an inventory model that is more refined than the one you ve seen in the lectures. The
More informationAsset-Liability Management
Asset-Liability Management John Birge University of Chicago Booth School of Business JRBirge INFORMS San Francisco, Nov. 2014 1 Overview Portfolio optimization involves: Modeling Optimization Estimation
More informationCredit Valuation. Oldrich Alfons Vasicek
Credit Valuation Oldrich Alfons Vasicek March, 1984 KMV Corporation COPYRGH 1984, KMV, LLC (KMV), SAN RANCSCO, CALORNA, USA. All rihts reserved. Document Number: 999-0000-01. Revision 1.1.0. KMV retains
More informationConsumption, Investment and the Fisher Separation Principle
Consumption, Investment and the Fisher Separation Principle Consumption with a Perfect Capital Market Consider a simple two-period world in which a single consumer must decide between consumption c 0 today
More informationLecture 5 January 30
EE 223: Stochastic Estimation and Control Spring 2007 Lecture 5 January 30 Lecturer: Venkat Anantharam Scribe: aryam Kamgarpour 5.1 Secretary Problem The problem set-up is explained in Lecture 4. We review
More informationVariable Annuities with Lifelong Guaranteed Withdrawal Benefits
Variable Annuities with Lifelong Guaranteed Withdrawal Benefits presented by Yue Kuen Kwok Department of Mathematics Hong Kong University of Science and Technology Hong Kong, China * This is a joint work
More informationLecture 5: Iterative Combinatorial Auctions
COMS 6998-3: Algorithmic Game Theory October 6, 2008 Lecture 5: Iterative Combinatorial Auctions Lecturer: Sébastien Lahaie Scribe: Sébastien Lahaie In this lecture we examine a procedure that generalizes
More informationQuality of Service Control: The case of IEEE e WLANs
Quality of Service Control: The case of IEEE 802.11e WLANs Saverio Mascolo Politecnico di Bari, italy c3lab.poliba.it KEYNOTE @ 3rd International Workshop on Networked Control Systems: Tolerant to Fault
More informationLecture 2: Making Good Sequences of Decisions Given a Model of World. CS234: RL Emma Brunskill Winter 2018
Lecture 2: Making Good Sequences of Decisions Given a Model of World CS234: RL Emma Brunskill Winter 218 Human in the loop exoskeleton work from Steve Collins lab Class Structure Last Time: Introduction
More informationSolving dynamic portfolio choice problems by recursing on optimized portfolio weights or on the value function?
DOI 0.007/s064-006-9073-z ORIGINAL PAPER Solving dynamic portfolio choice problems by recursing on optimized portfolio weights or on the value function? Jules H. van Binsbergen Michael W. Brandt Received:
More information17 MAKING COMPLEX DECISIONS
267 17 MAKING COMPLEX DECISIONS The agent s utility now depends on a sequence of decisions In the following 4 3grid environment the agent makes a decision to move (U, R, D, L) at each time step When the
More informationOptimization of Fuzzy Production and Financial Investment Planning Problems
Journal of Uncertain Systems Vol.8, No.2, pp.101-108, 2014 Online at: www.jus.org.uk Optimization of Fuzzy Production and Financial Investment Planning Problems Man Xu College of Mathematics & Computer
More informationMarkov Decision Processes II
Markov Decision Processes II Daisuke Oyama Topics in Economic Theory December 17, 2014 Review Finite state space S, finite action space A. The value of a policy σ A S : v σ = β t Q t σr σ, t=0 which satisfies
More informationCSCI 1951-G Optimization Methods in Finance Part 00: Course Logistics Introduction to Finance Optimization Problems
CSCI 1951-G Optimization Methods in Finance Part 00: Course Logistics Introduction to Finance Optimization Problems January 26, 2018 1 / 24 Basic information All information is available in the syllabus
More informationEE365: Risk Averse Control
EE365: Risk Averse Control Risk averse optimization Exponential risk aversion Risk averse control 1 Outline Risk averse optimization Exponential risk aversion Risk averse control Risk averse optimization
More informationReinforcement Learning. Slides based on those used in Berkeley's AI class taught by Dan Klein
Reinforcement Learning Slides based on those used in Berkeley's AI class taught by Dan Klein Reinforcement Learning Basic idea: Receive feedback in the form of rewards Agent s utility is defined by the
More informationTHE proliferation of mobile devices has lead to an explosive
Cooperative Wi-Fi Deployment: A One-to-Many Bargaining Framewor Haoran Yu, Student Member, IEEE, Man Hon Cheung, and Jianwei Huang, Fellow, IEEE arxiv:68.87v [cs.gt] 5 Aug 6 Abstract We study the cooperation
More informationWeighted Earliest Deadline Scheduling and Its Analytical Solution for Admission Control in a Wireless Emergency Network
Weighted Earliest Deadline Scheduling and Its Analytical Solution for Admission Control in a Wireless Emergency Network Jiazhen Zhou and Cory Beard Department of Computer Science/Electrical Engineering
More informationStatistic Microwave Path Loss Modeling in Urban Line-of-Sight Area Using Fuzzy Linear Regression
ICCAS2005 June 2-5, KINTEX, Gyeonggi-Do, Korea Statistic Microwave Path Loss Modeling in Urban Line-of-Sight Area Using Fuzzy Linear Regression SUPACHAI PHAIBOON, PISIT PHOKHARATKUL Faculty of Engineering,
More informationOptimal holding period In Real Estate Portfolio
Optimal holdin period In Real Estate ortfolio June 6 Michel Baroni Fabrice Barthélémy Mahdi Morane Abstract his paper considers the use of simulated cash flows to determine the optimal holdin period in
More informationA simulation study of two combinatorial auctions
A simulation study of two combinatorial auctions David Nordström Department of Economics Lund University Supervisor: Tommy Andersson Co-supervisor: Albin Erlanson May 24, 2012 Abstract Combinatorial auctions
More informationMultistage risk-averse asset allocation with transaction costs
Multistage risk-averse asset allocation with transaction costs 1 Introduction Václav Kozmík 1 Abstract. This paper deals with asset allocation problems formulated as multistage stochastic programming models.
More informationAlgorithmic Trading using Reinforcement Learning augmented with Hidden Markov Model
Algorithmic Trading using Reinforcement Learning augmented with Hidden Markov Model Simerjot Kaur (sk3391) Stanford University Abstract This work presents a novel algorithmic trading system based on reinforcement
More information2D5362 Machine Learning
2D5362 Machine Learning Reinforcement Learning MIT GALib Available at http://lancet.mit.edu/ga/ download galib245.tar.gz gunzip galib245.tar.gz tar xvf galib245.tar cd galib245 make or access my files
More informationAntino Kim Kelley School of Business, Indiana University, Bloomington Bloomington, IN 47405, U.S.A.
THE INVISIBLE HAND OF PIRACY: AN ECONOMIC ANALYSIS OF THE INFORMATION-GOODS SUPPLY CHAIN Antino Kim Kelley School of Business, Indiana University, Bloomington Bloomington, IN 47405, U.S.A. {antino@iu.edu}
More informationA_A0008: FUZZY MODELLING APPROACH FOR PREDICTING GOLD PRICE BASED ON RATE OF RETURN
Section A - Mathematics / Statistics / Computer Science 13 A_A0008: FUZZY MODELLING APPROACH FOR PREDICTING GOLD PRICE BASED ON RATE OF RETURN Piyathida Towwun,* Watcharin Klongdee Risk and Insurance Research
More informationMechanism Design and Auctions
Mechanism Design and Auctions Game Theory Algorithmic Game Theory 1 TOC Mechanism Design Basics Myerson s Lemma Revenue-Maximizing Auctions Near-Optimal Auctions Multi-Parameter Mechanism Design and the
More informationDetermination of Interruptible Load as an Ancillary Service in a Coordinated Multi-Commodity Market
Determination of Interruptible Loa as an Ancillary Service in a Coorinate ulti-commoity arket en Wan, Yon Liu, Yi Din an Yu Xiao School of lectrical an lectronic nineerin Nanyan Technoloical University
More informationStochastic Optimization Methods in Scheduling. Rolf H. Möhring Technische Universität Berlin Combinatorial Optimization and Graph Algorithms
Stochastic Optimization Methods in Scheduling Rolf H. Möhring Technische Universität Berlin Combinatorial Optimization and Graph Algorithms More expensive and longer... Eurotunnel Unexpected loss of 400,000,000
More informationHaiyang Feng College of Management and Economics, Tianjin University, Tianjin , CHINA
RESEARCH ARTICLE QUALITY, PRICING, AND RELEASE TIME: OPTIMAL MARKET ENTRY STRATEGY FOR SOFTWARE-AS-A-SERVICE VENDORS Haiyang Feng College of Management and Economics, Tianjin University, Tianjin 300072,
More informationApplications of Linear Programming
Applications of Linear Programming lecturer: András London University of Szeged Institute of Informatics Department of Computational Optimization Lecture 8 The portfolio selection problem The portfolio
More informationDynamic Programming and Reinforcement Learning
Dynamic Programming and Reinforcement Learning Daniel Russo Columbia Business School Decision Risk and Operations Division Fall, 2017 Daniel Russo (Columbia) Fall 2017 1 / 34 Supervised Machine Learning
More informationTransactions with Hidden Action: Part 1. Dr. Margaret Meyer Nuffield College
Transactions with Hidden Action: Part 1 Dr. Margaret Meyer Nuffield College 2015 Transactions with hidden action A risk-neutral principal (P) delegates performance of a task to an agent (A) Key features
More informationDynamic Resource Allocation for Spot Markets in Cloud Computi
Dynamic Resource Allocation for Spot Markets in Cloud Computing Environments Qi Zhang 1, Quanyan Zhu 2, Raouf Boutaba 1,3 1 David. R. Cheriton School of Computer Science University of Waterloo 2 Department
More informationMaking Complex Decisions
Ch. 17 p.1/29 Making Complex Decisions Chapter 17 Ch. 17 p.2/29 Outline Sequential decision problems Value iteration algorithm Policy iteration algorithm Ch. 17 p.3/29 A simple environment 3 +1 p=0.8 2
More information6.231 DYNAMIC PROGRAMMING LECTURE 8 LECTURE OUTLINE
6.231 DYNAMIC PROGRAMMING LECTURE 8 LECTURE OUTLINE Suboptimal control Cost approximation methods: Classification Certainty equivalent control: An example Limited lookahead policies Performance bounds
More informationSmooth estimation of yield curves by Laguerre functions
Smooth estimation of yield curves by Laguerre functions A.S. Hurn 1, K.A. Lindsay 2 and V. Pavlov 1 1 School of Economics and Finance, Queensland University of Technology 2 Department of Mathematics, University
More informationLecture outline W.B.Powell 1
Lecture outline What is a policy? Policy function approximations (PFAs) Cost function approximations (CFAs) alue function approximations (FAs) Lookahead policies Finding good policies Optimizing continuous
More informationCS 188: Artificial Intelligence. Outline
C 188: Artificial Intelligence Markov Decision Processes (MDPs) Pieter Abbeel UC Berkeley ome slides adapted from Dan Klein 1 Outline Markov Decision Processes (MDPs) Formalism Value iteration In essence
More informationIntro to Reinforcement Learning. Part 3: Core Theory
Intro to Reinforcement Learning Part 3: Core Theory Interactive Example: You are the algorithm! Finite Markov decision processes (finite MDPs) dynamics p p p Experience: S 0 A 0 R 1 S 1 A 1 R 2 S 2 A 2
More informationAdvanced Operations Research Prof. G. Srinivasan Dept of Management Studies Indian Institute of Technology, Madras
Advanced Operations Research Prof. G. Srinivasan Dept of Management Studies Indian Institute of Technology, Madras Lecture 23 Minimum Cost Flow Problem In this lecture, we will discuss the minimum cost
More informationOptimal Code Assignment and Call Admission Control for OVSF-CDMA Systems Constrained by Blocking Probabilities
Optimal Code Assignment and Call Admission Control for OVSF-CDMA Systems Constrained by Blocking Probabilities Jun-Seong Park, Lei Huang,DanielC.Lee, and C.-C. Jay Kuo Department of Electrical Engineering,
More informationMath 167: Mathematical Game Theory Instructor: Alpár R. Mészáros
Math 167: Mathematical Game Theory Instructor: Alpár R. Mészáros Midterm #1, February 3, 2017 Name (use a pen): Student ID (use a pen): Signature (use a pen): Rules: Duration of the exam: 50 minutes. By
More informationDevelopment Economics Structural Change
Development Economics Structural Change Andreas Schäfer University of Leipzig Institute of Theoretical Economics WS 10/11 Andreas Schäfer (University of Leipzig) Structural Change WS 10/11 1 / 36 Contents
More informationI. The Solow model. Dynamic Macroeconomic Analysis. Universidad Autónoma de Madrid. Autumn 2014
I. The Solow model Dynamic Macroeconomic Analysis Universidad Autónoma de Madrid Autumn 2014 Dynamic Macroeconomic Analysis (UAM) I. The Solow model Autumn 2014 1 / 38 Objectives In this first lecture
More information,,, be any other strategy for selling items. It yields no more revenue than, based on the
ONLINE SUPPLEMENT Appendix 1: Proofs for all Propositions and Corollaries Proof of Proposition 1 Proposition 1: For all 1,2,,, if, is a non-increasing function with respect to (henceforth referred to as
More informationA simple wealth model
Quantitative Macroeconomics Raül Santaeulàlia-Llopis, MOVE-UAB and Barcelona GSE Homework 5, due Thu Nov 1 I A simple wealth model Consider the sequential problem of a household that maximizes over streams
More informationEconomics 2010c: Lecture 4 Precautionary Savings and Liquidity Constraints
Economics 2010c: Lecture 4 Precautionary Savings and Liquidity Constraints David Laibson 9/11/2014 Outline: 1. Precautionary savings motives 2. Liquidity constraints 3. Application: Numerical solution
More informationLecture 8: Markov and Regime
Lecture 8: Markov and Regime Switching Models Prof. Massimo Guidolin 20192 Financial Econometrics Spring 2016 Overview Motivation Deterministic vs. Endogeneous, Stochastic Switching Dummy Regressiom Switching
More informationStatistical and Machine Learning Approach in Forex Prediction Based on Empirical Data
Statistical and Machine Learning Approach in Forex Prediction Based on Empirical Data Sitti Wetenriajeng Sidehabi Department of Electrical Engineering Politeknik ATI Makassar Makassar, Indonesia tenri616@gmail.com
More informationarxiv: v1 [q-fin.ec] 18 Oct 2016
arxiv:1610.05703v1 [q-fin.ec] 18 Oct 016 Two Approaches to Modeling the Interaction of Small and Medium Price-Taking Traders with a Stock Exchange by Mathematical Programming Techniques Alexander S. Belenky,
More informationCOMP417 Introduction to Robotics and Intelligent Systems. Reinforcement Learning - 2
COMP417 Introduction to Robotics and Intelligent Systems Reinforcement Learning - 2 Speaker: Sandeep Manjanna Acklowledgement: These slides use material from Pieter Abbeel s, Dan Klein s and John Schulman
More informationAdvanced Microeconomics II Game Theory Fall
Advanced Microeconomics II Game Theory 2016 Fall LIJUN PAN GRADUATE SCHOOL OF ECONOMICS NAGOYA UNIVERSITY 1 Introduction What is ame theory? A Motivatin Example Friends - S02, Ep05 To celebrate Monica's
More informationAnalyzing Pricing and Production Decisions with Capacity Constraints and Setup Costs
Erasmus University Rotterdam Bachelor Thesis Logistics Analyzing Pricing and Production Decisions with Capacity Constraints and Setup Costs Author: Bianca Doodeman Studentnumber: 359215 Supervisor: W.
More information6.231 DYNAMIC PROGRAMMING LECTURE 10 LECTURE OUTLINE
6.231 DYNAMIC PROGRAMMING LECTURE 10 LECTURE OUTLINE Rollout algorithms Cost improvement property Discrete deterministic problems Approximations of rollout algorithms Discretization of continuous time
More informationarxiv: v1 [math.pr] 6 Apr 2015
Analysis of the Optimal Resource Allocation for a Tandem Queueing System arxiv:1504.01248v1 [math.pr] 6 Apr 2015 Liu Zaiming, Chen Gang, Wu Jinbiao School of Mathematics and Statistics, Central South University,
More informationProblem 1: Random variables, common distributions and the monopoly price
Problem 1: Random variables, common distributions and the monopoly price In this problem, we will revise some basic concepts in probability, and use these to better understand the monopoly price (alternatively
More informationMoral Hazard Example. 1. The Agent s Problem. contract C = (w, w) that offers the same wage w regardless of the project s outcome.
Moral Hazard Example Well, then says I, what s the use you learning to do right when it s troublesome to do right and ain t no trouble to do wrong, and the wages is just the same? I was stuck. I couldn
More informationProduct Di erentiation: Exercises Part 1
Product Di erentiation: Exercises Part Sotiris Georganas Royal Holloway University of London January 00 Problem Consider Hotelling s linear city with endogenous prices and exogenous and locations. Suppose,
More informationEENG473 Mobile Communications Module 3 : Week # (11) Mobile Radio Propagation: Large-Scale Path Loss
EENG473 Mobile Communications Module 3 : Week # (11) Mobile Radio Propagation: Large-Scale Path Loss Practical Link Budget Design using Path Loss Models Most radio propagation models are derived using
More informationThe Irrevocable Multi-Armed Bandit Problem
The Irrevocable Multi-Armed Bandit Problem Ritesh Madan Qualcomm-Flarion Technologies May 27, 2009 Joint work with Vivek Farias (MIT) 2 Multi-Armed Bandit Problem n arms, where each arm i is a Markov Decision
More information1 Online Problem Examples
Comp 260: Advanced Algorithms Tufts University, Spring 2018 Prof. Lenore Cowen Scribe: Isaiah Mindich Lecture 9: Online Algorithms All of the algorithms we have studied so far operate on the assumption
More informationInteger Programming Models
Integer Programming Models Fabio Furini December 10, 2014 Integer Programming Models 1 Outline 1 Combinatorial Auctions 2 The Lockbox Problem 3 Constructing an Index Fund Integer Programming Models 2 Integer
More informationComputing Unsatisfiable k-sat Instances with Few Occurrences per Variable
Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Department of Computer Science, University of Toronto, shlomoh,szeider@cs.toronto.edu Abstract.
More informationRobustness to Non-Normality of Common Tests for the Many-Sample Location Problem
JOURNAL OF APPLIED MATHEMATICS AND DECISION SCIENCES, 7(4), 87 26 Copyriht c 23, Lawrence Erlbaum Associates, Inc. Robustness to Non-Normality of Common Tests for the Many-Sample Location Problem AZMERI
More informationLecture 9: Markov and Regime
Lecture 9: Markov and Regime Switching Models Prof. Massimo Guidolin 20192 Financial Econometrics Spring 2017 Overview Motivation Deterministic vs. Endogeneous, Stochastic Switching Dummy Regressiom Switching
More informationFinancial Risk Forecasting Chapter 9 Extreme Value Theory
Financial Risk Forecasting Chapter 9 Extreme Value Theory Jon Danielsson 2017 London School of Economics To accompany Financial Risk Forecasting www.financialriskforecasting.com Published by Wiley 2011
More informationBudget Management In GSP (2018)
Budget Management In GSP (2018) Yahoo! March 18, 2018 Miguel March 18, 2018 1 / 26 Today s Presentation: Budget Management Strategies in Repeated auctions, Balseiro, Kim, and Mahdian, WWW2017 Learning
More informationMarkov Decision Processes
Markov Decision Processes Robert Platt Northeastern University Some images and slides are used from: 1. CS188 UC Berkeley 2. AIMA 3. Chris Amato Stochastic domains So far, we have studied search Can use
More informationThe Basel II Accord: What Does It Mean for the North American Leasing Market?
The Basel II Accord: What Does It Mean for the North American Leasin Market? 4301 N. Fairfax Drive, Suite 550, Arlinton, VA 22203; Lisa A. Levine, CAE, Executive Director Phone: 703-527-8655 Fax: 703-465-7488
More informationDynamic Programming: An overview. 1 Preliminaries: The basic principle underlying dynamic programming
Dynamic Programming: An overview These notes summarize some key properties of the Dynamic Programming principle to optimize a function or cost that depends on an interval or stages. This plays a key role
More information