CACHING popular video contents at the network edge,

Size: px
Start display at page:

Download "CACHING popular video contents at the network edge,"

Transcription

1 1 Mobility and Popularity-Aware Coded Small-Cell Cachin Emre Ozfatura and Deniz Gündüz arxiv: v1 [cs.it] 21 Nov 2017 Abstract In heteroeneous cellular networks with cachin capability, due to mobility of users and storae constraints of small-cell base stations (SBSs), users may not be able to download all of their requested content from the SBSs within the delay deadline of the content. In that case, the users are directed to the macro-cell base station (MBS) in order to satisfy the service quality requirement. Coded cachin is exploited here to minimize the amount of data downloaded from the MBS takin into account the mobility of the users as well as the popularity of the contents. An optimal distributed cachin policy is presented when the delay deadline is below a certain threshold, and a distributed reedy cachin policy is proposed when the delay deadline is relaxed. Index Terms Heteroeneous cellular network, content cachin, user mobility. I. INTRODUCTION CACHING popular video contents at the network ede, closer to the end users, is a promisin method to cope with increasin video traffic. In heteroeneous cellular networks, popular video files are stored at SBS caches to reduce latency as well as backhaul traffic [1] [3]. The oal in these works is to maximize the hit rate, or equivalently, to minimize the amount of data downloaded from MBSs under iven SBS cache capacity constraints. A common assumption is that a user stays connected to the same set of SBSs durin the whole duration of video download. However, in ultra dense networks, where there is a lare number of operatin SBSs with limited coverae areas, it is indispensable to take user mobility into consideration to meet the prescribed quality of service (QoS) requirements [4]. Our aim in this paper is to provide a cachin policy, which, for iven video popularity profile and user mobility patterns, minimizes the averae amount of data downloaded from the MBS. We adopt the delayed offloadin scheme in heteroeneous networks; that is, each video content request has a deadline, and if the mobile user cannot download all the framents of the content from the SBSs it has connected to by the deadline, the remainder of the request is satisfied by the MBS [5]. We consider maximum distance separable (MDS) codin for storin the video contents in the SBS caches. To the best of our knowlede, [6] is the only work that considers mobility-aware cachin with delayed offloadin. The oal in [6] is to minimize the probability of a request bein served by the MBS. In this work, as in [7], we assume that the MBS serves the remainin framents as MDS coded packets at a hiher cost. Hence, unlike [6], our oal is to minimize the Emre Ozfatura and Deniz Gündüz are with the Information Processin and Communications Lab, Department of Electrical and Electronic Enineerin, Imperial Collee London, London SW7 2AZ, UK. This work was supported by EC H2020-MSCA-ITN-2015 project SCAV- ENGE under rant number , and by the European Research Council project BEACON under rant number amount of data downloaded from the MBS. We show that, if the request deadline is below a certain threshold there is an optimal distributed solution. If the request deadline does not meet this condition, we introduce a sub-optimal reedy cachin policy. II. SYSTEM MODEL AND PROBLEM FORMULATION Consider a heteroeneous network that consists of one MBS and N SBSs, SBS 1,..., SBS N, with disjoint coverae areas. A mobile user (MU) is served by only one SBS at any particular time. We consider a video library V = {v 1,..., v K consistin of K distinct video files, each of lenth B bits, indexed accordin to their popularity profile, i.e., file v k is the kth most popular file with request probability p k. Further, we assume that video files are encoded by rateless MDS codin [3], so that a video file can be retrieved when B parity bits are collected in any order, from any SBSs. We consider equal-lenth time slots, whose duration corresponds to the minimum time that a MU remains in the coverae area of a SBS. Therefore, althouh a MU cannot connect to more than one SBS durin one time slot, it may stay connected to the same SBS over several consecutive time slots. We assume that SBS n is capable of transmittin R n bits within a time slot to a MU within its coverae area, and it has a storae capacity of C n bits. Due to the QoS requirement, a video file must be downloaded within T time slots once it is requested. Thus, if a MU is not able to collect B bits from SBSs in T slots, the remainin bits are provided by the MBS at a hiher cost. We define the mobility path of a user as the sequence of small-cells visited over T time slots after requestin a video file. For instance, for T = 5, SBS 1, SBS 2, SBS 2, SBS 3, SBS 4 is a possible mobility path. We remark that the MU may remain connected to the same SBS more than one time slot, and can connect to at most T different SBSs. Hence, there is a finite number of distinct mobility paths, denoted by M. We denote the mth mobility path by I m, and its realization probability by q m. Realization probabilities can be obtained from empirical observations, or via modelin mobility paths as random walks on a Markov chain. Our aim is to minimize the expected amount of data downloaded from the MBS for iven SBS storae capacities C {C n N, data transmission rates R {R n N, video popularity profiles P {p k K, and mobility paths with realization probabilities I T {(I m, q m ) m=1 M. Let = { N,K xn,k denote the cachin policy over T time slots, where n= x n,k indicates the number of parity bits for file v k stored in SBS n. A cachin policy is feasible if K x n,k C n, n. The averae amount of data downloaded from the MBS is denoted by d av (, I T ), or simply by d av. Let d k,m denote the amount of coded data downloaded from

2 2 the MBS for video v k followin mobility path I m. For iven C, R, P, I T, and cachin policy, we have { ( d k,m = max B min { ) x n,k, R n S m,n, 0, (1) where S m,n denotes the total number of time slots the MU connected to SBS n in mobility path I m. Then, takin the averae over all mobility paths and video files, d av can be written in terms of d k,m as d av = M K m=1 q m p k d k,m. Our oal is to find the optimal feasible cachin policy XT that minimizes d av, formulated as follows: P1: min d av subject to: x n,k C n, n. (2) x n,k 0, n, k. (3) In order to avoid the max operator in Eqn. (1), problem P1 is reformulated as follows. We treat d k,m as decision variables, and add the followin constraint: { ( d k,m max B min { ) x n,k, R n S m,n, 0. (4) We note that, for a iven feasible cachin policy the objective function is monotonically increasin with d k,m ; hence, for the optimal solution, constraint (4) must be satisfied with equality. The equivalent optimization problem is obtained as follows. P2: min,d T d av subject to: x n,k C n, n, (5) min { x n,k, R n S m,n + dk,m B, k, m, (6) d k,m 0, k, m, (7) where D T { K,M d k,m. Notice that constraints (6) and (7) k=m=1 toether imply constraint (4). Recall that a MU cannot connect to more than T different SBSs. Hence, for each (k, m) pair, constraint (6) can be replaced by at most 2 T linear constraints. To clarify, let T = 4 and N = 6, and consider the mobility path I m = {SBS 1, SBS 1, SBS 2, SBS 2. For this specific mobility path and file v k, (6) can be written as min { x 1,k, 2R 1 + min { x2,k, 2R 2 + dk,m B. (8) Equivalently, (8) can be replaced by the followin set of linear constraints: x 1,k + x 2,k + d k,m B, (9) x 1,k + 2R 2 + d k,m B, (10) 2R 1 + x 2,k + d k,m B, (11) 2R 1 + 2R 2 + d k,m B. (12) Consequently, the initial optimization problem P1 can be cast into a linear optimization problem. However, the number of constraints are exponential in time constraint T. In the next subsection we show that, under a certain assumption on T, P1 can be solved in a distributed manner. III. DISTRIBUTED SOLUTION B In this section, we consider the case T T min R ma x, where R max is the maximum data rate across all the cells, i.e., R max max {R 1,..., R N. This special case is also instrumental in hihlihtin the distinction between our problem formulation and that of [6], whose oal is to minimize the probability of downloadin any data from the MBS. We note that, with the formulation of [6], when T < T min all cachin policies are equivalent since it is not possible to collect B bits in T slots. While [6] inores the mobility paths when T < T min, each cachin policy will induce a different d av. Hence, an optimal cachin policy in [6] may lead to a suboptimal d av. Instead, we present the optimal cachin alorithm that minimizes d av when T T min. We also propose a reedy cachin policy, for T > T min. A. Optimal Distributed Solution When T T min, (1) simplifies to d k,m = B min { x n,k, R n S m,n. (13) Then, our objective d av can be rewritten as: d av = B M m=1 q m p k min { x n,k, R n S m,n. (14) {{ d av Note that minimizin d av is equivalent to maximizin d av, which denotes the averae amount of data downloaded from the SBSs. We chane the order of the summations in (14): d av = p k m=1 M q m min { x n,k, R n S m,n, (15) {{ d av, n we observe that the optimal cachin policy can be obtained via maximizin d av,n, defined above, for each SBS n separately. Let XT n denote the cachin policy for SBS n. For SBS n, we have the followin optimization problem: P3: max X n T subject to: d av,n x n,k C n. (16) x n,k 0, k. (17) If we roup the mobility paths accordin to the time spent in cell SBS n, d av,n can be written as d av,n = t=1 m:s m, n =t p k q m min { x n,k, tr n. (18) {{ d k av, n The term min { x n,k, tr n can be expanded as follows: min { t 1 x n,k, tr n = max { min { x n,k ir n, R n, 0, (19) i=0

3 3 Alorithm 1: Alorithm for optimal distributed cachin (-based policy) Input : R,C,{ n N Output: X T 1 for,...,n do 2 x n,k 0, k {1,..., K; 3 while C n > 0 do 4 ń k, t max n ; 5 x x n,ḱ n,ḱ { + min(c n, R n ); 6 n n \ ń ; k, t 7 C n C n R n ; 8 end 9 end and d k av,n can be rewritten as: d k av,n = Equivalently, d k av,n = t=1 m:s m, n t p k q m max { min { x n,k (t 1)R n, R n, 0. (20) n k,t max { min { x n,k (t 1)R n, R n, 0, (21) t=1 where n k,t p k P(S m,n t). We observe that for each k, d av,n k is a monotonically increasin piecewise linear function of x n,k, and its slope is n k,t for x n,k ((t 1)R n, tr n ). Consequently, the objective function in P3 is the sum of N monotonically increasin piecewise linear functions, and sum of its variables are bounded by constraint (16). Accordinly, it is maximized by maximizin the variable that corresponds to the linear function with the maximum slope. We propose Alorithm 1 to maximize the objective function that follows a straihtforward procedure usin n values for each SBS k,t n. The alorithm starts with increasin the variable x n,k that corresponds to the maximum slope, until the slope of d av,n k chanes, then it aain searches for the maximum slope, and repeats this process until the sum of the variables satisfies (16) with equality. From a computational point of view, proposed alorithm sorts the elements of set Γ n { nk,t : k = 1,..., K; t = 1,..., T for each n N. Since Γ n = KT, the complexity of Alorithm 1 is O(NKT lo(kt)). The optimality of the alorithm follows from the fact that n k,t n for any (k, t) pair, which implies k,t 1 that d av,n k is a concave function for each k. The cachin policy constructed accordin to Alorithm 1 is called the -based policy, and denoted by X T. We note that when T T min, X T is the optimal policy, i.e., X T = X T. B. Distributed Greedy Cache Allocation Scheme When T > T min it is not possible to predict the performance of X T, or ensure that d av(x T, I T ) d av (X T min, I Tmin ). We note that X T min is the -based cachin policy explained above for T min. However, we know that for any T > T min, d av (X T min, I T ) d av (X T min, I Tmin ). Hence, our aim is to provide a reedy distributed cachin policy X T that performs Alorithm 2: Greedy alorithm for storae reallocation Input : C, R, I T, P, XT min Output: X T 1 for,...,n do 2 + k, k NULL : k {1,..., K, Vred {; 3 V + {,V {; 4 x max = max { x n,1,..., x n,k ; 5 6 while x max > 0 do ḱ = max { k : x n,k x max ; 7 if ḱ V then 8 V V { ḱ, calculate k ; 9 end 10 if ḱ + 1 V + then 11 V + V + { ḱ + 1, calculate + k ; 12 end 13 x max x max R n ; 14 end 15 + max max +, max max ; if + max > max then ḱ max k + k, `k max k k ; 18 +`k, + NULL; ḱ 19 x x n,ḱ n,ḱ + R n, x n, `k x n, `k R n; 20 Go back to line 3 21 end 22 end better than X T min, i.e., d av (X T, I T ) d av (X T min, I T ). Our proposed method to construct X T consists of two steps. In the first step, we obtain the optimal cachin policy XT min by executin Alorithm 1. In the second step, we follow a reedy method for cache reallocation for each cell separately, which is performed by Alorithm 2. Assume that we are reallocatin the cache for SBS n, Alorithm 2 first identifies candidate video files for cache capacity increment and reduction. In this identification process, the main criteria is the popularity of the video files, e.., if there are several video files that have been allocated the same cache capacity, then the most popular file amon those is a candidate for cache capacity increment, whereas the least popular one is a candidate for cache capacity reduction. Accordinly, let V + and V denote the sets of indices of the video files that are candidates for cache capacity increment and reduction, respectively. After identification of a candidate file v k, we calculate k if k V, or + k if k V +, whose initial values are is NULL. + k and k denote the amount of chane in d av when the cache capacity of video file v k is increased by R n, or decreased by R 1 n, respectively. In the last step, alorithm compares the values of + max max k + k and max max k k. The condition + max > max implies that d av can be reduced via storae capacity reallocation. Then, the alorithm performs the followin task, storae capacity of video file v k, where + k = + max, is increased by R n, and the storae capacity of 1 Storae reallocation can be done with smaller sizes to improve the performance of the policy with a cost of complexity; however, due to limited space, we do not study this tradeoff in this letter.

4 min Cache size(% of file library), C (a) T = 5 and T min = min Delay deadline (slots), T (b) C = 300 (files) and T min = min Data transmission rate (file per slot), R (c) C = 300 (files) and T = 5. Fi. 1: The averae amount of data served by the MBS (normalized by the file size) for different values of: (a) normalized cache size C, (b) delay deadline T, and (c) data transmission rate R = 1/T min. video file v k where k = max is decreased by R n. IV. NUMERICAL RESULTS For numerical simulations we consider K = 1000 files in the library, and assume that their popularities follow a Zipf distribution with parameter 0.56 [8]. There are 16 SBSs located in a 2D square rid. We fix the transmission rate of each SBS to R, accordin to parameter T min, i.e., R = 1/T min file per slot. We consider the followin Markov mobility model: a MU connected to SBS n remains connected to the same SBS with probability f n, or connects to one of the neihborin SBSs with equal probability. In the experiment, we consider f 4 = f 13 =, f 7 = f 9 = 0.5, and for the all other SBSs f n =. As a performance benchmark, we also consider the policy, which simply caches the most popular N files at each SBS. We remark that, when T > T min the value of T has no impact on the performance of the policy since it caches the files as a whole. On the other hand, when T T min, the value of d av decreases linearly with increasin T. In the first experiment, we set T min = 2, T = 5 and consider the normalized SBS cache sizes (as portion of the entire file library) 10%, 20%, 30%, 40%, 50%. The reedy alorithm X T provides up to 40% further reduction in the amount of data downloaded from the MBS compared to -based policy X T as depicted in Fi. 1(a). We also observe that the ap between the performances of X T and X T widens with increasin cache sizes. Finally, note that the policy performs quite poorly in eneral as it inores the mobility patterns. In the second experiment, we set C = 300, T min = 2, and the delay deadline T takes values from 2 to 6 time slots. Performance of the cachin policies for different T values are plotted in Fi. 1(b). The key observation from the fiure is that, althouh the averae portion of the video file downloaded from the MBS monotonically decreases with increasin T under policy X T and X T min, this is not the always the case for X T. Note that X T mainly depends on the sojourn statistics, P(S m,n t), over all possible paths, and when T > T min those statistics miht be misleadin because in certain paths the MU miht collect all the parity bits before connectin to SBS n. In that case, storae capacity of the popular files miht be increased due to sojourn statistics even thouh it is not required. In the third experiment we set T = 5, C = 300, and the transmission rate takes values 1/2, 1/3, 1/4, 1/5, 1/6 file per slot, which correspond to T min values of 2, 3, 4, 5, 6 slots respectively. Althouh it is expected that the MBS usae decreases with the increasin transmission rate, Fi 1(c) illustrates that after a certain point the amount of data downloaded from the MBS increases with the transmission rate under all policies. This is because, T min decreases when the rate increases and the difference between T min and T widens, as a result of which the performance becomes worse. V. CONCLUSIONS In this letter, we studied mobility and popularity aware content cachin for a heteroeneous network with MDScoded cachin at the SBSs. Assumin a maximum download time requirement T, for each request, we first defined the threshold T min on T, below which some bits of the request must be downloaded from the MBS. Then, we obtained the optimal distributed cachin policy when T T min, called the -based policy, which minimizes the amount of data that need to be downloaded from the MBS. Then, we utilized the parameter T min and the -based policy for T = T min to obtain a reedy cachin policy for T > T min. Consequently, we showed how to desin a coded cachin policy accordin to T min and performed various simulations to demonstrate that the utilization of T min improves the performance sinificantly. REFERENCES [1] W. Jian, G. Fen, and S. Qin, Optimal cooperative content cachin and delivery policy for heteroeneous cellular networks, IEEE Trans. Mobile Comput., vol. 16, May [2] K. Poularakis, G. Iosifidis, and L. Tassiulas, Approximation alorithms for mobile data cachin in small cell networks, IEEE Trans. Commun., vol. 62, Oct [3] K. Shanmuam, N. Golrezaei, A. G. Dimakis, A. F. Molisch, and G. Caire, Femtocachin: Wireless content delivery throuh distributed cachin helpers, IEEE Trans. Inf. Theory, vol. 59, Dec [4] R. Wan, X. Pen, J. Zhan, and K. B. Letaief, Mobility-aware cachin for content-centric wireless networks: Modelin and methodoloy, IEEE Communications Maazine, vol. 54, Au

5 [5] K. Lee, J. Lee, Y. Yi, I. Rhee, and S. Chon, Mobile data offloadin: How much can WiFi deliver? IEEE/ACM Trans. Netw., vol. 21, Apr [6] K. Poularakis and L. Tassiulas, Code, cache and deliver on the move: A novel cachin paradim in hyper-dense small-cell networks, IEEE Trans. Mobile Comput., vol. 16, no. 3, Mar [7] J. Liao, K. K. Won, M. R. A. Khandaker, and Z. Zhen, Optimizin cache placement for heteroeneous small cell networks, IEEE Commun. Lett., vol. 21, Jan [8] M. Zink, K. Suh, Y. Gu, and J. Kurose, Characteristics of YouTube network traffic at a campus network - measurements, models, and implications, Comput. Netw., vol. 53, no. 4, Mar

The Clarke Tax Algorithm

The Clarke Tax Algorithm The Clarke Tax Alorithm Michael A. Goodrich October 25, 2005 1 Introduction In these notes, we will introduce the Clarke Tax Alorithm which is a utility-based social choice mechanism. We will then ive

More information

Handout 8: Introduction to Stochastic Dynamic Programming. 2 Examples of Stochastic Dynamic Programming Problems

Handout 8: Introduction to Stochastic Dynamic Programming. 2 Examples of Stochastic Dynamic Programming Problems SEEM 3470: Dynamic Optimization and Applications 2013 14 Second Term Handout 8: Introduction to Stochastic Dynamic Programming Instructor: Shiqian Ma March 10, 2014 Suggested Reading: Chapter 1 of Bertsekas,

More information

The Duration Derby: A Comparison of Duration Based Strategies in Asset Liability Management

The Duration Derby: A Comparison of Duration Based Strategies in Asset Liability Management The Duration Derby: A Comparison of Duration Based Strategies in Asset Liability Management H. Zheng Department of Mathematics, Imperial College London SW7 2BZ, UK h.zheng@ic.ac.uk L. C. Thomas School

More information

Online Appendix: Extensions

Online Appendix: Extensions B Online Appendix: Extensions In this online appendix we demonstrate that many important variations of the exact cost-basis LUL framework remain tractable. In particular, dual problem instances corresponding

More information

Chapter 7 A Multi-Market Approach to Multi-User Allocation

Chapter 7 A Multi-Market Approach to Multi-User Allocation 9 Chapter 7 A Multi-Market Approach to Multi-User Allocation A primary limitation of the spot market approach (described in chapter 6) for multi-user allocation is the inability to provide resource guarantees.

More information

PORTFOLIO OPTIMIZATION AND EXPECTED SHORTFALL MINIMIZATION FROM HISTORICAL DATA

PORTFOLIO OPTIMIZATION AND EXPECTED SHORTFALL MINIMIZATION FROM HISTORICAL DATA PORTFOLIO OPTIMIZATION AND EXPECTED SHORTFALL MINIMIZATION FROM HISTORICAL DATA We begin by describing the problem at hand which motivates our results. Suppose that we have n financial instruments at hand,

More information

Constrained Sequential Resource Allocation and Guessing Games

Constrained Sequential Resource Allocation and Guessing Games 4946 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 11, NOVEMBER 2008 Constrained Sequential Resource Allocation and Guessing Games Nicholas B. Chang and Mingyan Liu, Member, IEEE Abstract In this

More information

Co-opetition Strategy for Collaborative Multiuser Multimedia Resource Allocation

Co-opetition Strategy for Collaborative Multiuser Multimedia Resource Allocation Co-opetition Strategy for Collaborative Multiuser Multimedia Resource Allocation Zhangyu Guan, Dongfeng Yuan and Haixia Zhang Wireless Mobile Communications and Transmission Lab (WMCT) Shandong University,

More information

COMP331/557. Chapter 6: Optimisation in Finance: Cash-Flow. (Cornuejols & Tütüncü, Chapter 3)

COMP331/557. Chapter 6: Optimisation in Finance: Cash-Flow. (Cornuejols & Tütüncü, Chapter 3) COMP331/557 Chapter 6: Optimisation in Finance: Cash-Flow (Cornuejols & Tütüncü, Chapter 3) 159 Cash-Flow Management Problem A company has the following net cash flow requirements (in 1000 s of ): Month

More information

Handout 4: Deterministic Systems and the Shortest Path Problem

Handout 4: Deterministic Systems and the Shortest Path Problem SEEM 3470: Dynamic Optimization and Applications 2013 14 Second Term Handout 4: Deterministic Systems and the Shortest Path Problem Instructor: Shiqian Ma January 27, 2014 Suggested Reading: Bertsekas

More information

THE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE

THE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE THE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE GÜNTER ROTE Abstract. A salesperson wants to visit each of n objects that move on a line at given constant speeds in the shortest possible time,

More information

SOLVING ROBUST SUPPLY CHAIN PROBLEMS

SOLVING ROBUST SUPPLY CHAIN PROBLEMS SOLVING ROBUST SUPPLY CHAIN PROBLEMS Daniel Bienstock Nuri Sercan Özbay Columbia University, New York November 13, 2005 Project with Lucent Technologies Optimize the inventory buffer levels in a complicated

More information

Lecture Quantitative Finance Spring Term 2015

Lecture Quantitative Finance Spring Term 2015 implied Lecture Quantitative Finance Spring Term 2015 : May 7, 2015 1 / 28 implied 1 implied 2 / 28 Motivation and setup implied the goal of this chapter is to treat the implied which requires an algorithm

More information

Lecture 17: More on Markov Decision Processes. Reinforcement learning

Lecture 17: More on Markov Decision Processes. Reinforcement learning Lecture 17: More on Markov Decision Processes. Reinforcement learning Learning a model: maximum likelihood Learning a value function directly Monte Carlo Temporal-difference (TD) learning COMP-424, Lecture

More information

Factor Saving Innovation. Michele Boldrin and David K. Levine

Factor Saving Innovation. Michele Boldrin and David K. Levine Factor Saving nnovation Michele Boldrin and David K. Levine 1 ntroduction endogeneity of aggregate technological progress we introduce concave model of innovation with three properties concerning technological

More information

The exact import price and its impli the US external imbalance. Citation Applied Economics Letters, 18(17): 1.

The exact import price and its impli the US external imbalance. Citation Applied Economics Letters, 18(17): 1. JAIST Reposi https://dspace.j Title The exact import price and its impli the US external imbalance Author(s)Takeuchi, Fumihide Citation Applied Economics Letters, 18(17): 1 Issue Date 2011-04-08 Type Journal

More information

Call Admission Control for Preemptive and Partially Blocking Service Integration Schemes in ATM Networks

Call Admission Control for Preemptive and Partially Blocking Service Integration Schemes in ATM Networks Call Admission Control for Preemptive and Partially Blocking Service Integration Schemes in ATM Networks Ernst Nordström Department of Computer Systems, Information Technology, Uppsala University, Box

More information

Final exam solutions

Final exam solutions EE365 Stochastic Control / MS&E251 Stochastic Decision Models Profs. S. Lall, S. Boyd June 5 6 or June 6 7, 2013 Final exam solutions This is a 24 hour take-home final. Please turn it in to one of the

More information

Investing and Price Competition for Multiple Bands of Unlicensed Spectrum

Investing and Price Competition for Multiple Bands of Unlicensed Spectrum Investing and Price Competition for Multiple Bands of Unlicensed Spectrum Chang Liu EECS Department Northwestern University, Evanston, IL 60208 Email: changliu2012@u.northwestern.edu Randall A. Berry EECS

More information

Department of Social Systems and Management. Discussion Paper Series

Department of Social Systems and Management. Discussion Paper Series Department of Social Systems and Management Discussion Paper Series No.1252 Application of Collateralized Debt Obligation Approach for Managing Inventory Risk in Classical Newsboy Problem by Rina Isogai,

More information

THE ENERGY EFFICIENCY OF THE ERGODIC FADING RELAY CHANNEL

THE ENERGY EFFICIENCY OF THE ERGODIC FADING RELAY CHANNEL 7th European Signal Processing Conference (EUSIPCO 009) Glasgow, Scotland, August 4-8, 009 THE ENERGY EFFICIENCY OF THE ERGODIC FADING RELAY CHANNEL Jesús Gómez-Vilardebó Centre Tecnològic de Telecomunicacions

More information

1 Consumption and saving under uncertainty

1 Consumption and saving under uncertainty 1 Consumption and saving under uncertainty 1.1 Modelling uncertainty As in the deterministic case, we keep assuming that agents live for two periods. The novelty here is that their earnings in the second

More information

Optimizing the Omega Ratio using Linear Programming

Optimizing the Omega Ratio using Linear Programming Optimizing the Omega Ratio using Linear Programming Michalis Kapsos, Steve Zymler, Nicos Christofides and Berç Rustem October, 2011 Abstract The Omega Ratio is a recent performance measure. It captures

More information

Reasoning with Uncertainty

Reasoning with Uncertainty Reasoning with Uncertainty Markov Decision Models Manfred Huber 2015 1 Markov Decision Process Models Markov models represent the behavior of a random process, including its internal state and the externally

More information

Homework #4. CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class

Homework #4. CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class Homework #4 CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class o Grades depend on neatness and clarity. o Write your answers with enough detail about your approach and concepts

More information

Revenue Management Under the Markov Chain Choice Model

Revenue Management Under the Markov Chain Choice Model Revenue Management Under the Markov Chain Choice Model Jacob B. Feldman School of Operations Research and Information Engineering, Cornell University, Ithaca, New York 14853, USA jbf232@cornell.edu Huseyin

More information

The duration derby : a comparison of duration based strategies in asset liability management

The duration derby : a comparison of duration based strategies in asset liability management Edith Cowan University Research Online ECU Publications Pre. 2011 2001 The duration derby : a comparison of duration based strategies in asset liability management Harry Zheng David E. Allen Lyn C. Thomas

More information

Application of the Collateralized Debt Obligation (CDO) Approach for Managing Inventory Risk in the Classical Newsboy Problem

Application of the Collateralized Debt Obligation (CDO) Approach for Managing Inventory Risk in the Classical Newsboy Problem Isogai, Ohashi, and Sumita 35 Application of the Collateralized Debt Obligation (CDO) Approach for Managing Inventory Risk in the Classical Newsboy Problem Rina Isogai Satoshi Ohashi Ushio Sumita Graduate

More information

Appendix A: Introduction to Queueing Theory

Appendix A: Introduction to Queueing Theory Appendix A: Introduction to Queueing Theory Queueing theory is an advanced mathematical modeling technique that can estimate waiting times. Imagine customers who wait in a checkout line at a grocery store.

More information

EE266 Homework 5 Solutions

EE266 Homework 5 Solutions EE, Spring 15-1 Professor S. Lall EE Homework 5 Solutions 1. A refined inventory model. In this problem we consider an inventory model that is more refined than the one you ve seen in the lectures. The

More information

Asset-Liability Management

Asset-Liability Management Asset-Liability Management John Birge University of Chicago Booth School of Business JRBirge INFORMS San Francisco, Nov. 2014 1 Overview Portfolio optimization involves: Modeling Optimization Estimation

More information

Credit Valuation. Oldrich Alfons Vasicek

Credit Valuation. Oldrich Alfons Vasicek Credit Valuation Oldrich Alfons Vasicek March, 1984 KMV Corporation COPYRGH 1984, KMV, LLC (KMV), SAN RANCSCO, CALORNA, USA. All rihts reserved. Document Number: 999-0000-01. Revision 1.1.0. KMV retains

More information

Consumption, Investment and the Fisher Separation Principle

Consumption, Investment and the Fisher Separation Principle Consumption, Investment and the Fisher Separation Principle Consumption with a Perfect Capital Market Consider a simple two-period world in which a single consumer must decide between consumption c 0 today

More information

Lecture 5 January 30

Lecture 5 January 30 EE 223: Stochastic Estimation and Control Spring 2007 Lecture 5 January 30 Lecturer: Venkat Anantharam Scribe: aryam Kamgarpour 5.1 Secretary Problem The problem set-up is explained in Lecture 4. We review

More information

Variable Annuities with Lifelong Guaranteed Withdrawal Benefits

Variable Annuities with Lifelong Guaranteed Withdrawal Benefits Variable Annuities with Lifelong Guaranteed Withdrawal Benefits presented by Yue Kuen Kwok Department of Mathematics Hong Kong University of Science and Technology Hong Kong, China * This is a joint work

More information

Lecture 5: Iterative Combinatorial Auctions

Lecture 5: Iterative Combinatorial Auctions COMS 6998-3: Algorithmic Game Theory October 6, 2008 Lecture 5: Iterative Combinatorial Auctions Lecturer: Sébastien Lahaie Scribe: Sébastien Lahaie In this lecture we examine a procedure that generalizes

More information

Quality of Service Control: The case of IEEE e WLANs

Quality of Service Control: The case of IEEE e WLANs Quality of Service Control: The case of IEEE 802.11e WLANs Saverio Mascolo Politecnico di Bari, italy c3lab.poliba.it KEYNOTE @ 3rd International Workshop on Networked Control Systems: Tolerant to Fault

More information

Lecture 2: Making Good Sequences of Decisions Given a Model of World. CS234: RL Emma Brunskill Winter 2018

Lecture 2: Making Good Sequences of Decisions Given a Model of World. CS234: RL Emma Brunskill Winter 2018 Lecture 2: Making Good Sequences of Decisions Given a Model of World CS234: RL Emma Brunskill Winter 218 Human in the loop exoskeleton work from Steve Collins lab Class Structure Last Time: Introduction

More information

Solving dynamic portfolio choice problems by recursing on optimized portfolio weights or on the value function?

Solving dynamic portfolio choice problems by recursing on optimized portfolio weights or on the value function? DOI 0.007/s064-006-9073-z ORIGINAL PAPER Solving dynamic portfolio choice problems by recursing on optimized portfolio weights or on the value function? Jules H. van Binsbergen Michael W. Brandt Received:

More information

17 MAKING COMPLEX DECISIONS

17 MAKING COMPLEX DECISIONS 267 17 MAKING COMPLEX DECISIONS The agent s utility now depends on a sequence of decisions In the following 4 3grid environment the agent makes a decision to move (U, R, D, L) at each time step When the

More information

Optimization of Fuzzy Production and Financial Investment Planning Problems

Optimization of Fuzzy Production and Financial Investment Planning Problems Journal of Uncertain Systems Vol.8, No.2, pp.101-108, 2014 Online at: www.jus.org.uk Optimization of Fuzzy Production and Financial Investment Planning Problems Man Xu College of Mathematics & Computer

More information

Markov Decision Processes II

Markov Decision Processes II Markov Decision Processes II Daisuke Oyama Topics in Economic Theory December 17, 2014 Review Finite state space S, finite action space A. The value of a policy σ A S : v σ = β t Q t σr σ, t=0 which satisfies

More information

CSCI 1951-G Optimization Methods in Finance Part 00: Course Logistics Introduction to Finance Optimization Problems

CSCI 1951-G Optimization Methods in Finance Part 00: Course Logistics Introduction to Finance Optimization Problems CSCI 1951-G Optimization Methods in Finance Part 00: Course Logistics Introduction to Finance Optimization Problems January 26, 2018 1 / 24 Basic information All information is available in the syllabus

More information

EE365: Risk Averse Control

EE365: Risk Averse Control EE365: Risk Averse Control Risk averse optimization Exponential risk aversion Risk averse control 1 Outline Risk averse optimization Exponential risk aversion Risk averse control Risk averse optimization

More information

Reinforcement Learning. Slides based on those used in Berkeley's AI class taught by Dan Klein

Reinforcement Learning. Slides based on those used in Berkeley's AI class taught by Dan Klein Reinforcement Learning Slides based on those used in Berkeley's AI class taught by Dan Klein Reinforcement Learning Basic idea: Receive feedback in the form of rewards Agent s utility is defined by the

More information

THE proliferation of mobile devices has lead to an explosive

THE proliferation of mobile devices has lead to an explosive Cooperative Wi-Fi Deployment: A One-to-Many Bargaining Framewor Haoran Yu, Student Member, IEEE, Man Hon Cheung, and Jianwei Huang, Fellow, IEEE arxiv:68.87v [cs.gt] 5 Aug 6 Abstract We study the cooperation

More information

Weighted Earliest Deadline Scheduling and Its Analytical Solution for Admission Control in a Wireless Emergency Network

Weighted Earliest Deadline Scheduling and Its Analytical Solution for Admission Control in a Wireless Emergency Network Weighted Earliest Deadline Scheduling and Its Analytical Solution for Admission Control in a Wireless Emergency Network Jiazhen Zhou and Cory Beard Department of Computer Science/Electrical Engineering

More information

Statistic Microwave Path Loss Modeling in Urban Line-of-Sight Area Using Fuzzy Linear Regression

Statistic Microwave Path Loss Modeling in Urban Line-of-Sight Area Using Fuzzy Linear Regression ICCAS2005 June 2-5, KINTEX, Gyeonggi-Do, Korea Statistic Microwave Path Loss Modeling in Urban Line-of-Sight Area Using Fuzzy Linear Regression SUPACHAI PHAIBOON, PISIT PHOKHARATKUL Faculty of Engineering,

More information

Optimal holding period In Real Estate Portfolio

Optimal holding period In Real Estate Portfolio Optimal holdin period In Real Estate ortfolio June 6 Michel Baroni Fabrice Barthélémy Mahdi Morane Abstract his paper considers the use of simulated cash flows to determine the optimal holdin period in

More information

A simulation study of two combinatorial auctions

A simulation study of two combinatorial auctions A simulation study of two combinatorial auctions David Nordström Department of Economics Lund University Supervisor: Tommy Andersson Co-supervisor: Albin Erlanson May 24, 2012 Abstract Combinatorial auctions

More information

Multistage risk-averse asset allocation with transaction costs

Multistage risk-averse asset allocation with transaction costs Multistage risk-averse asset allocation with transaction costs 1 Introduction Václav Kozmík 1 Abstract. This paper deals with asset allocation problems formulated as multistage stochastic programming models.

More information

Algorithmic Trading using Reinforcement Learning augmented with Hidden Markov Model

Algorithmic Trading using Reinforcement Learning augmented with Hidden Markov Model Algorithmic Trading using Reinforcement Learning augmented with Hidden Markov Model Simerjot Kaur (sk3391) Stanford University Abstract This work presents a novel algorithmic trading system based on reinforcement

More information

2D5362 Machine Learning

2D5362 Machine Learning 2D5362 Machine Learning Reinforcement Learning MIT GALib Available at http://lancet.mit.edu/ga/ download galib245.tar.gz gunzip galib245.tar.gz tar xvf galib245.tar cd galib245 make or access my files

More information

Antino Kim Kelley School of Business, Indiana University, Bloomington Bloomington, IN 47405, U.S.A.

Antino Kim Kelley School of Business, Indiana University, Bloomington Bloomington, IN 47405, U.S.A. THE INVISIBLE HAND OF PIRACY: AN ECONOMIC ANALYSIS OF THE INFORMATION-GOODS SUPPLY CHAIN Antino Kim Kelley School of Business, Indiana University, Bloomington Bloomington, IN 47405, U.S.A. {antino@iu.edu}

More information

A_A0008: FUZZY MODELLING APPROACH FOR PREDICTING GOLD PRICE BASED ON RATE OF RETURN

A_A0008: FUZZY MODELLING APPROACH FOR PREDICTING GOLD PRICE BASED ON RATE OF RETURN Section A - Mathematics / Statistics / Computer Science 13 A_A0008: FUZZY MODELLING APPROACH FOR PREDICTING GOLD PRICE BASED ON RATE OF RETURN Piyathida Towwun,* Watcharin Klongdee Risk and Insurance Research

More information

Mechanism Design and Auctions

Mechanism Design and Auctions Mechanism Design and Auctions Game Theory Algorithmic Game Theory 1 TOC Mechanism Design Basics Myerson s Lemma Revenue-Maximizing Auctions Near-Optimal Auctions Multi-Parameter Mechanism Design and the

More information

Determination of Interruptible Load as an Ancillary Service in a Coordinated Multi-Commodity Market

Determination of Interruptible Load as an Ancillary Service in a Coordinated Multi-Commodity Market Determination of Interruptible Loa as an Ancillary Service in a Coorinate ulti-commoity arket en Wan, Yon Liu, Yi Din an Yu Xiao School of lectrical an lectronic nineerin Nanyan Technoloical University

More information

Stochastic Optimization Methods in Scheduling. Rolf H. Möhring Technische Universität Berlin Combinatorial Optimization and Graph Algorithms

Stochastic Optimization Methods in Scheduling. Rolf H. Möhring Technische Universität Berlin Combinatorial Optimization and Graph Algorithms Stochastic Optimization Methods in Scheduling Rolf H. Möhring Technische Universität Berlin Combinatorial Optimization and Graph Algorithms More expensive and longer... Eurotunnel Unexpected loss of 400,000,000

More information

Haiyang Feng College of Management and Economics, Tianjin University, Tianjin , CHINA

Haiyang Feng College of Management and Economics, Tianjin University, Tianjin , CHINA RESEARCH ARTICLE QUALITY, PRICING, AND RELEASE TIME: OPTIMAL MARKET ENTRY STRATEGY FOR SOFTWARE-AS-A-SERVICE VENDORS Haiyang Feng College of Management and Economics, Tianjin University, Tianjin 300072,

More information

Applications of Linear Programming

Applications of Linear Programming Applications of Linear Programming lecturer: András London University of Szeged Institute of Informatics Department of Computational Optimization Lecture 8 The portfolio selection problem The portfolio

More information

Dynamic Programming and Reinforcement Learning

Dynamic Programming and Reinforcement Learning Dynamic Programming and Reinforcement Learning Daniel Russo Columbia Business School Decision Risk and Operations Division Fall, 2017 Daniel Russo (Columbia) Fall 2017 1 / 34 Supervised Machine Learning

More information

Transactions with Hidden Action: Part 1. Dr. Margaret Meyer Nuffield College

Transactions with Hidden Action: Part 1. Dr. Margaret Meyer Nuffield College Transactions with Hidden Action: Part 1 Dr. Margaret Meyer Nuffield College 2015 Transactions with hidden action A risk-neutral principal (P) delegates performance of a task to an agent (A) Key features

More information

Dynamic Resource Allocation for Spot Markets in Cloud Computi

Dynamic Resource Allocation for Spot Markets in Cloud Computi Dynamic Resource Allocation for Spot Markets in Cloud Computing Environments Qi Zhang 1, Quanyan Zhu 2, Raouf Boutaba 1,3 1 David. R. Cheriton School of Computer Science University of Waterloo 2 Department

More information

Making Complex Decisions

Making Complex Decisions Ch. 17 p.1/29 Making Complex Decisions Chapter 17 Ch. 17 p.2/29 Outline Sequential decision problems Value iteration algorithm Policy iteration algorithm Ch. 17 p.3/29 A simple environment 3 +1 p=0.8 2

More information

6.231 DYNAMIC PROGRAMMING LECTURE 8 LECTURE OUTLINE

6.231 DYNAMIC PROGRAMMING LECTURE 8 LECTURE OUTLINE 6.231 DYNAMIC PROGRAMMING LECTURE 8 LECTURE OUTLINE Suboptimal control Cost approximation methods: Classification Certainty equivalent control: An example Limited lookahead policies Performance bounds

More information

Smooth estimation of yield curves by Laguerre functions

Smooth estimation of yield curves by Laguerre functions Smooth estimation of yield curves by Laguerre functions A.S. Hurn 1, K.A. Lindsay 2 and V. Pavlov 1 1 School of Economics and Finance, Queensland University of Technology 2 Department of Mathematics, University

More information

Lecture outline W.B.Powell 1

Lecture outline W.B.Powell 1 Lecture outline What is a policy? Policy function approximations (PFAs) Cost function approximations (CFAs) alue function approximations (FAs) Lookahead policies Finding good policies Optimizing continuous

More information

CS 188: Artificial Intelligence. Outline

CS 188: Artificial Intelligence. Outline C 188: Artificial Intelligence Markov Decision Processes (MDPs) Pieter Abbeel UC Berkeley ome slides adapted from Dan Klein 1 Outline Markov Decision Processes (MDPs) Formalism Value iteration In essence

More information

Intro to Reinforcement Learning. Part 3: Core Theory

Intro to Reinforcement Learning. Part 3: Core Theory Intro to Reinforcement Learning Part 3: Core Theory Interactive Example: You are the algorithm! Finite Markov decision processes (finite MDPs) dynamics p p p Experience: S 0 A 0 R 1 S 1 A 1 R 2 S 2 A 2

More information

Advanced Operations Research Prof. G. Srinivasan Dept of Management Studies Indian Institute of Technology, Madras

Advanced Operations Research Prof. G. Srinivasan Dept of Management Studies Indian Institute of Technology, Madras Advanced Operations Research Prof. G. Srinivasan Dept of Management Studies Indian Institute of Technology, Madras Lecture 23 Minimum Cost Flow Problem In this lecture, we will discuss the minimum cost

More information

Optimal Code Assignment and Call Admission Control for OVSF-CDMA Systems Constrained by Blocking Probabilities

Optimal Code Assignment and Call Admission Control for OVSF-CDMA Systems Constrained by Blocking Probabilities Optimal Code Assignment and Call Admission Control for OVSF-CDMA Systems Constrained by Blocking Probabilities Jun-Seong Park, Lei Huang,DanielC.Lee, and C.-C. Jay Kuo Department of Electrical Engineering,

More information

Math 167: Mathematical Game Theory Instructor: Alpár R. Mészáros

Math 167: Mathematical Game Theory Instructor: Alpár R. Mészáros Math 167: Mathematical Game Theory Instructor: Alpár R. Mészáros Midterm #1, February 3, 2017 Name (use a pen): Student ID (use a pen): Signature (use a pen): Rules: Duration of the exam: 50 minutes. By

More information

Development Economics Structural Change

Development Economics Structural Change Development Economics Structural Change Andreas Schäfer University of Leipzig Institute of Theoretical Economics WS 10/11 Andreas Schäfer (University of Leipzig) Structural Change WS 10/11 1 / 36 Contents

More information

I. The Solow model. Dynamic Macroeconomic Analysis. Universidad Autónoma de Madrid. Autumn 2014

I. The Solow model. Dynamic Macroeconomic Analysis. Universidad Autónoma de Madrid. Autumn 2014 I. The Solow model Dynamic Macroeconomic Analysis Universidad Autónoma de Madrid Autumn 2014 Dynamic Macroeconomic Analysis (UAM) I. The Solow model Autumn 2014 1 / 38 Objectives In this first lecture

More information

,,, be any other strategy for selling items. It yields no more revenue than, based on the

,,, be any other strategy for selling items. It yields no more revenue than, based on the ONLINE SUPPLEMENT Appendix 1: Proofs for all Propositions and Corollaries Proof of Proposition 1 Proposition 1: For all 1,2,,, if, is a non-increasing function with respect to (henceforth referred to as

More information

A simple wealth model

A simple wealth model Quantitative Macroeconomics Raül Santaeulàlia-Llopis, MOVE-UAB and Barcelona GSE Homework 5, due Thu Nov 1 I A simple wealth model Consider the sequential problem of a household that maximizes over streams

More information

Economics 2010c: Lecture 4 Precautionary Savings and Liquidity Constraints

Economics 2010c: Lecture 4 Precautionary Savings and Liquidity Constraints Economics 2010c: Lecture 4 Precautionary Savings and Liquidity Constraints David Laibson 9/11/2014 Outline: 1. Precautionary savings motives 2. Liquidity constraints 3. Application: Numerical solution

More information

Lecture 8: Markov and Regime

Lecture 8: Markov and Regime Lecture 8: Markov and Regime Switching Models Prof. Massimo Guidolin 20192 Financial Econometrics Spring 2016 Overview Motivation Deterministic vs. Endogeneous, Stochastic Switching Dummy Regressiom Switching

More information

Statistical and Machine Learning Approach in Forex Prediction Based on Empirical Data

Statistical and Machine Learning Approach in Forex Prediction Based on Empirical Data Statistical and Machine Learning Approach in Forex Prediction Based on Empirical Data Sitti Wetenriajeng Sidehabi Department of Electrical Engineering Politeknik ATI Makassar Makassar, Indonesia tenri616@gmail.com

More information

arxiv: v1 [q-fin.ec] 18 Oct 2016

arxiv: v1 [q-fin.ec] 18 Oct 2016 arxiv:1610.05703v1 [q-fin.ec] 18 Oct 016 Two Approaches to Modeling the Interaction of Small and Medium Price-Taking Traders with a Stock Exchange by Mathematical Programming Techniques Alexander S. Belenky,

More information

COMP417 Introduction to Robotics and Intelligent Systems. Reinforcement Learning - 2

COMP417 Introduction to Robotics and Intelligent Systems. Reinforcement Learning - 2 COMP417 Introduction to Robotics and Intelligent Systems Reinforcement Learning - 2 Speaker: Sandeep Manjanna Acklowledgement: These slides use material from Pieter Abbeel s, Dan Klein s and John Schulman

More information

Advanced Microeconomics II Game Theory Fall

Advanced Microeconomics II Game Theory Fall Advanced Microeconomics II Game Theory 2016 Fall LIJUN PAN GRADUATE SCHOOL OF ECONOMICS NAGOYA UNIVERSITY 1 Introduction What is ame theory? A Motivatin Example Friends - S02, Ep05 To celebrate Monica's

More information

Analyzing Pricing and Production Decisions with Capacity Constraints and Setup Costs

Analyzing Pricing and Production Decisions with Capacity Constraints and Setup Costs Erasmus University Rotterdam Bachelor Thesis Logistics Analyzing Pricing and Production Decisions with Capacity Constraints and Setup Costs Author: Bianca Doodeman Studentnumber: 359215 Supervisor: W.

More information

6.231 DYNAMIC PROGRAMMING LECTURE 10 LECTURE OUTLINE

6.231 DYNAMIC PROGRAMMING LECTURE 10 LECTURE OUTLINE 6.231 DYNAMIC PROGRAMMING LECTURE 10 LECTURE OUTLINE Rollout algorithms Cost improvement property Discrete deterministic problems Approximations of rollout algorithms Discretization of continuous time

More information

arxiv: v1 [math.pr] 6 Apr 2015

arxiv: v1 [math.pr] 6 Apr 2015 Analysis of the Optimal Resource Allocation for a Tandem Queueing System arxiv:1504.01248v1 [math.pr] 6 Apr 2015 Liu Zaiming, Chen Gang, Wu Jinbiao School of Mathematics and Statistics, Central South University,

More information

Problem 1: Random variables, common distributions and the monopoly price

Problem 1: Random variables, common distributions and the monopoly price Problem 1: Random variables, common distributions and the monopoly price In this problem, we will revise some basic concepts in probability, and use these to better understand the monopoly price (alternatively

More information

Moral Hazard Example. 1. The Agent s Problem. contract C = (w, w) that offers the same wage w regardless of the project s outcome.

Moral Hazard Example. 1. The Agent s Problem. contract C = (w, w) that offers the same wage w regardless of the project s outcome. Moral Hazard Example Well, then says I, what s the use you learning to do right when it s troublesome to do right and ain t no trouble to do wrong, and the wages is just the same? I was stuck. I couldn

More information

Product Di erentiation: Exercises Part 1

Product Di erentiation: Exercises Part 1 Product Di erentiation: Exercises Part Sotiris Georganas Royal Holloway University of London January 00 Problem Consider Hotelling s linear city with endogenous prices and exogenous and locations. Suppose,

More information

EENG473 Mobile Communications Module 3 : Week # (11) Mobile Radio Propagation: Large-Scale Path Loss

EENG473 Mobile Communications Module 3 : Week # (11) Mobile Radio Propagation: Large-Scale Path Loss EENG473 Mobile Communications Module 3 : Week # (11) Mobile Radio Propagation: Large-Scale Path Loss Practical Link Budget Design using Path Loss Models Most radio propagation models are derived using

More information

The Irrevocable Multi-Armed Bandit Problem

The Irrevocable Multi-Armed Bandit Problem The Irrevocable Multi-Armed Bandit Problem Ritesh Madan Qualcomm-Flarion Technologies May 27, 2009 Joint work with Vivek Farias (MIT) 2 Multi-Armed Bandit Problem n arms, where each arm i is a Markov Decision

More information

1 Online Problem Examples

1 Online Problem Examples Comp 260: Advanced Algorithms Tufts University, Spring 2018 Prof. Lenore Cowen Scribe: Isaiah Mindich Lecture 9: Online Algorithms All of the algorithms we have studied so far operate on the assumption

More information

Integer Programming Models

Integer Programming Models Integer Programming Models Fabio Furini December 10, 2014 Integer Programming Models 1 Outline 1 Combinatorial Auctions 2 The Lockbox Problem 3 Constructing an Index Fund Integer Programming Models 2 Integer

More information

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Department of Computer Science, University of Toronto, shlomoh,szeider@cs.toronto.edu Abstract.

More information

Robustness to Non-Normality of Common Tests for the Many-Sample Location Problem

Robustness to Non-Normality of Common Tests for the Many-Sample Location Problem JOURNAL OF APPLIED MATHEMATICS AND DECISION SCIENCES, 7(4), 87 26 Copyriht c 23, Lawrence Erlbaum Associates, Inc. Robustness to Non-Normality of Common Tests for the Many-Sample Location Problem AZMERI

More information

Lecture 9: Markov and Regime

Lecture 9: Markov and Regime Lecture 9: Markov and Regime Switching Models Prof. Massimo Guidolin 20192 Financial Econometrics Spring 2017 Overview Motivation Deterministic vs. Endogeneous, Stochastic Switching Dummy Regressiom Switching

More information

Financial Risk Forecasting Chapter 9 Extreme Value Theory

Financial Risk Forecasting Chapter 9 Extreme Value Theory Financial Risk Forecasting Chapter 9 Extreme Value Theory Jon Danielsson 2017 London School of Economics To accompany Financial Risk Forecasting www.financialriskforecasting.com Published by Wiley 2011

More information

Budget Management In GSP (2018)

Budget Management In GSP (2018) Budget Management In GSP (2018) Yahoo! March 18, 2018 Miguel March 18, 2018 1 / 26 Today s Presentation: Budget Management Strategies in Repeated auctions, Balseiro, Kim, and Mahdian, WWW2017 Learning

More information

Markov Decision Processes

Markov Decision Processes Markov Decision Processes Robert Platt Northeastern University Some images and slides are used from: 1. CS188 UC Berkeley 2. AIMA 3. Chris Amato Stochastic domains So far, we have studied search Can use

More information

The Basel II Accord: What Does It Mean for the North American Leasing Market?

The Basel II Accord: What Does It Mean for the North American Leasing Market? The Basel II Accord: What Does It Mean for the North American Leasin Market? 4301 N. Fairfax Drive, Suite 550, Arlinton, VA 22203; Lisa A. Levine, CAE, Executive Director Phone: 703-527-8655 Fax: 703-465-7488

More information

Dynamic Programming: An overview. 1 Preliminaries: The basic principle underlying dynamic programming

Dynamic Programming: An overview. 1 Preliminaries: The basic principle underlying dynamic programming Dynamic Programming: An overview These notes summarize some key properties of the Dynamic Programming principle to optimize a function or cost that depends on an interval or stages. This plays a key role

More information