A Calculus for End-to-end Statistical Service Guarantees

Size: px
Start display at page:

Download "A Calculus for End-to-end Statistical Service Guarantees"

Transcription

1 A Calculus for End-to-end Statistical Service Guarantees Technical Report: University of Virginia, CS (2nd revised version) Almut Burchard Ý Jörg Liebeherr Stephen Patek Ý Department of Mathematics Department of Computer Science Department of Systems and Information Engineering University of Virginia Charlottesville, VA Abstract The deterministic network calculus offers an elegant framework for determining delays and backlog in a network with deterministic service guarantees to individual traffic flows. This paper addresses the problem of extending the network calculus to a probabilistic framework with statistical service guarantees. Here, the key difficulty relates to expressing, in a statistical setting, an end-to-end (network) service curve as a concatenation of per-node service curves. The notion of an effective service curve is developed as a probabilistic bound on the service received by an individual flow. It is shown that per-node effective service curves can be concatenated to yield a network effective service curve. Key Words: Quality-of-Service, Service Differentiation, Statistical Service, Network Calculus. 1 Introduction The deterministic network calculus recently evolved as a fundamental theory for quality of service (QoS) networks, and has provided powerful tools for reasoning about delay and backlog in a network with service guarantees to individual traffic flows. Using the notion of arrival envelopes and service curves [12], several recent works have shown that delay and backlog bounds can be concisely expressed in a min-plus algebra [1, 5, 8]. However, the deterministic view of traffic generally overestimates the actual resource requirements of a flow and results in a low utilization of available network resources. This motivates the search for a statistical network calculus that can exploit statistical multiplexing, while preserving the algebraic aspects of the deterministic calculus. The problem of developing a probabilistic network calculus has been the subject of several studies. Kurose [16] uses the concept of stochastic ordering and obtains bounds on the distribution of delay and buffer occupancy of a flow in a network with FIFO scheduling. Chang [7] presents probabilistic bounds This work is supported in part by the National Science Foundation through grants ANI , ECS (CAREER), ANI , DMS , and ANI , and by an Alfred P. Sloan research fellowship. This report was revised in December 2001, and majorly revised in April 2002.

2 on output burstiness, backlog and delays in a network where the moment generating functions of arrivals are exponentially bounded. Different bounds for stochastically bounded arrivals are derived by Yaron and Sidi [22] and Starobinski and Sidi [21]. The above results can be used to determine stochastic end-to-end performance bounds. Results on statistical end-to-end delay guarantees in a network have been obtained for specific scheduling algorithms, such as EDF [19, 20], and GPS [15], and a class of coordinated scheduling algorithms [2, 17]. Several researchers have considered probabilistic formulations of service curves. Cruz defines a probabilistic service curve which violates a given deterministic service curve according to a certain distribution [13]. Chang (see [9], Chp. 7) presents exercises which hint at a statistical network calculus for the class of dynamic F-servers. Finally, Knightly and Qiu [18] derive statistical service envelopes as time-invariant lower bounds on the service received by an aggregate of flows. With exception of ([9], Chp. 7), none of the cited works express statistical end-to-end performance bounds in a min-plus algebra, and it has been an open question whether a statistical network calculus can be developed in this setting. The contribution of this paper is the presentation of a statistical network calculus that uses the min-plus algebra [1, 5, 8]. The advantage of using the min-plus algebra is that end-to-end guarantees can be expressed as a simple concatenation of single node guarantees, which, in turn, can be exploited to achieve simple probabilistic bounds. We define an effective service curve, which is, with high certainty, a probabilistic bound on the service received by a single flow. We will show that the main results of the deterministic network calculus carry over to the statistical framework we present. Our derivations reveal a difficulty that occurs when calculating probabilistic service guarantees for multiple nodes. We show that the problem can be overcome by revising the definition of the effective service curve. The results in this paper are set in a continuous time model with fluid left-continuous traffic arrival functions, as is common for network delay analysis in the deterministic network calculus. A node represents a router (or switch) in a network. Packetization delays and other effects of discrete-sized packets, such as the non-preemption of packet transmission, are ignored. We refer to [9] for the issues involved in relaxing these assumptions for the analysis of packet networks. When analyzing delays in a network, all processing overhead and propagation delays are ignored. As in the deterministic network calculus, arrivals from a traffic flow to the network satisfy deterministic upper bounds, which are enforced by a deterministic regulator. The remaining sections of this paper are structured as follows. In Section 2, we review the notation and key results of the deterministic network calculus. In Section 3 we introduce effective service curves and present the results for a statistical network calculus in terms of effective service curves. In Section 4 we provide a discussion that motivates our revised definition of an effective service curve. In Section 5, we present brief conclusions. 2 Network Calculus Preliminaries The deterministic network calculus, which was created in [10, 11] and fully developed in the last decade, provides concise expressions for upper bounds on the backlog and delay experienced by an individual flow at one or more network nodes. An attractive feature of the network calculus is that end-to-end bounds can often be easily obtained from manipulations of the per-node bounds. In this section we review some notation and results from the deterministic network calculus. This section is not a comprehensive summary of the network calculus and we refer to [1, 6, 9] for a complete discussion. 2

3 2.1 Operators Much of the formal framework of the network calculus can be elegantly expressed in a min-plus algebra [3], complete with convolution and deconvolution operators for functions. Generally, the functions in this paper are non-negative, non-decreasing, and left-continuous, defined over time intervals ¼ Ø. We assume for a given function that ص ¼ if Ø ¼. The convolution of two functions and, is defined as ص The deconvolution «of two functions and is defined as Ò Ø µ µ (1) ¾ ¼ Ø «Øµ ÙÔ Ø µ µ (2) ¼ For ¼, the impulse function Æ is defined as ½ Æ Øµ ¼ If is nondecreasing, we have the formulas if Ø if Ø (3) Ø µ Æ Øµ (4) Ø µ «Æ ص (5) We refer to [3, 6, 9] for a detailed discussion of the properties of the min-plus algebra and the properties of the convolution and deconvolution operators. 2.2 Arrival functions and Service Curves Let us consider the traffic arrivals to a single network node. The arrivals of a flow in the time interval ¼ ص are given in terms of a function ص. The departures of a flow from the node in the time interval ¼ ص are denoted by ص, with ص ص. The backlog of a flow at time Ø, denoted by ص, is given by ص ص ص (6) The delay at time Ø, denoted as Ï Øµ, is the delay experienced by an arrival which departs at time Ø, given by Ï Øµ Ò ¼ Ø µ ص (7) We will use Ü Ýµ and Ü Ýµ to denote the arrivals and departures in the time interval Ü Ýµ, with Ü Ýµ ݵ ܵ and Ü Ýµ ݵ ܵ. We make the following assumptions on the arrival functions. (A1) Non-Negativity. The arrivals in any interval of time are non-negative. That is, for any Ü Ý, we have ݵ ܵ ¼. 3

4 ... A=A 1 Node D 1= A 2 Node D 2 A H Node D H =D 1 2 H S 1 S 2 S H Figure 1: Traffic of a flow through a set of À nodes. Let and denote the arrival and departures at the -th node, with ½, ½ for ¾ À and À. (A2) Upper Bound. The arrivals of a flow are bounded by a subadditive 1 function, called the arrival envelope, 2 such that Ø µ ص µ for all Ø ¼. A minimum service curve for a flow is a function Ë which specifies a lower bound on the service given to the flow such that, for all Ø ¼, ص Ë Øµ (8) A maximum service curve for a flow is a function Ë which specifies an upper bound on the service given to a flow such that, for all Ø ¼, ص Ë Øµ (9) Minimum service curves play a larger role in the network calculus since they provide service guarantees. Therefore, we, as the related literature, often refer to a minimum service curve simply as a service curve. If no maximum service curve is explicitly given, one can use Ë Øµ Ø, where is the link capacity. The following two theorems summarize some key results of the deterministic network calculus. These results have been derived in [1, 5, 8]. We follow the notation used in [1]. Theorem 1 Deterministic Calculus [1, 5, 8]. Given a flow with arrival envelope and with minimum service curve Ë, the following hold: 1. Output Envelope. The function «Ë is an envelope for the departures, in the sense that, for all Ø ¼, ص Ø µ µ (10) 2. Backlog Bound. An upper bound for the backlog, denoted by Ñ Ü, is given by Ñ Ü «Ë ¼µ (11) 3. Delay Bound. An upper bound for the delay, denoted by Ñ Ü, is given by Ñ Ü Ò ¼ Ø ¼ Ø µ Ë Øµ (12) The next theorem states that the service curves of a flow at the nodes on its route can be concatenated to define a network service curve, which expresses service guarantees offered to the flow by the network as a whole. 1 A function is subadditive if Ü Ýµ ܵ ݵ, for all Ü Ý ¼, or, equivalently, if ص ص. 2 A function is called an envelope for a function if Ø µ µ ص for all Ø ¼, or, equivalently, if ص ص, for all Ø ¼. 4

5 Theorem 2 Concatenation of Deterministic Network Service Curves [1, 5, 8]. Suppose a flow passes through À nodes in series, as shown in Figure 1, and suppose the flow is offered minimum and maximum service curves Ë and Ë, respectively, at each node ½ À. Then, the sequence of nodes provides minimum and maximum service curves Ë Ò Ø and Ë Ò Ø, which are given by Ë Ò Ø Ë ½ Ë ¾ Ë À (13) Ë Ò Ø Ë ½ Ë ¾ Ë À (14) Ë Ò Ø and Ë Ò Ø will be referred to as network service curves, and Eqs. (13) (14) will be called the concatenation formulas. With Theorems 1 and 2 network service curves can be used to determine bounds on delay and backlog for individual flows in a network. There are many additional properties and refinements that have been derived for the deterministic calculus. However, in this paper we will concern ourselves only with the results above. 3 Statistical Network Calculus We now approach the network calculus in a probabilistic framework. Arrivals and departures from a flow to the network in the time interval ¼ ص are described by random processes ص and ص satisfying assumptions (A1) and (A2). The random processes are defined over an underlying joint probability space that we suppress in our notation. The statistical network calculus makes service guarantees for individual flows, where each flow is allocated a probabilistic service in the form of an effective service curve. Given a flow with arrival process, a (minimum) effective service curve is a nonnegative function Ë that satisfies for all Ø ¼, È Ö Øµ Ë Øµ ½ (15) Note that the effective service curve is a non-random function. We omit the corresponding definition of a maximum effective service curve. The following theorem is a probabilistic counterpart to Theorem 1. Theorem 3 Statistical Calculus. Given a flow with arrival process satisfying assumptions (A1) (A2), and given an effective service curve Ë, the following hold: 1. Output Envelope. The function «Ë is a probabilistic bound for the departures on ¼ Ø, in the sense that, for all Ø ¼, È Ö Ø Ø µ «Ë µ ½ (16) 2. Backlog Bound. A probabilistic bound for the backlog is given by Ñ Ü «Ë ¼µ, in the sense that, for all Ø ¼, È Ö Øµ Ñ Ü ½ (17) 3. Delay Bound. A probabilistic bound for the delay is given by, Ñ Ü Ò ¼ Ø ¼ Ø µ Ë Øµ (18) 5

6 in the sense that, for all Ø ¼, È Ö Ï Øµ Ñ Ü ½ (19) By setting ¼ in Theorem 3, we can recover the bounds of Theorem 1 with probability one. Proof. The proof uses on several occasions that the inequality Ø µ ص «µ (20) holds for any nonnegative function and for all Ø ¼. To see this inequality, we compute Ø µ ص Ø µ Ò Ø Üµ ܵ ܾ ¼ Ø ÙÔ Ø Ü Ø µ ܵ ܾ ¼ Ø ÙÔ Ü ¼ (21) (22) ܵ ܵ (23) «µ (24) Eqn. (21) expands the convolution operator. Eqn. (22) takes Ø µ inside the infimum and uses that Ø µ Ø Üµ Ø Ü Ø µ. Eqn. (23) uses that Ø Ü Ø µ Ü µ for all Ü Ø by definition of an arrival envelope, and extends the range of the supremum. Finally, Eqn. (24) uses the definition of the deconvolution operator. 1. Proof of the Output Bound. For any fixed Ø ¼, we have ½ È Ö Øµ Ë Øµ (25) È Ö Ø Ø µ Ø µ Ë Øµ (26) È Ö Ø Ø µ Ø µ Ë Øµ (27) È Ö Ø Ø µ «Ë µ (28) Eqn. (25) holds by the definition of the effective service curve Ë. Eqn. (26) uses that Ø Ø µ Ø µ ص. Eqn. (27) uses that departures in ¼ ص cannot exceed arrivals, that is, ص ص for all Ø ¼. Finally, Eqn. (28) uses that Ø µ Ë Øµ «Ë µ by Eqn. (20). 2. Proof of the Backlog Bound. Since ص ص ص and with the definition of the effective service curve, we can write ½ È Ö Øµ Ë Øµ (29) È Ö Øµ ص Ë Øµ (30) È Ö Øµ «Ë ¼µ (31) Eqn. (29) holds by definition of the effective service curve. Eqn. (30) uses that ص ص Eqn. (31) uses that ص Ë Øµ «Ë ¼µ by Eqn. (20). ص, and 6

7 3. Proof of the Delay Bound. The delay bound is proven by estimating the probability that the output ص exceeds the arrivals Ø Ñ Ü µ. ½ È Ö Øµ Ë Øµ (32) È Ö Øµ Æ Ñ Ü µ ص (33) È Ö Øµ µ Æ Ñ Ü µ ص (34) È Ö Øµ Ø Ñ Ü µ (35) Eqn. (32) uses the definition of the effective service curve Ë. Eqn. (33) uses the definition of the impulse function in Eqn. (4) and the definition of Ñ Ü in Eqn. (18). Eqn. (34) follows from the associativity of the convolution, and Eqn. (34) uses the definition of an arrival envelope. ¾ A probabilistic counterpart to Theorem 2 can be formulated as follows. Theorem 4 Concatenation of Effective Service Curves. Consider a flow that passes through À network nodes in series, as shown in Figure 1. Assume that effective service curves are given by nondecreasing functions Ë at each node ( ½ À). Then, for any Ø ¼, Ó È Ö Ò Øµ Ë ½ Ë À Æ À ص ½ À Ø (36) where ¼ is an arbitrary parameter. Again, we can can recover the deterministic result from Theorem 2. By setting ¼, the results in Eqn. (36) hold with probability one. Then by letting ¼, we obtain Theorem 2 almost surely. Proof. We proceed in three steps. In the first step, we modify the effective service curve to give lower bounds on the departures simultaneously for all times in the entire interval ¼ Ø. In the second step, we perform a deterministic calculation. The proof concludes with a simple probabilistic estimate. Step 1: Uniform probabilistic bound on ¼ Ø. Suppose that Ë is a nondecreasing effective service curve, that is Ü ¾ ¼ Ø È Ö Üµ Ë Üµ ½ (37) We will show that then, for any choice of ¼, È Ö Ü ¾ ¼ Ø Üµ Ë Ü µ ½ Ø (38) To see this, fix ¼, set Ü, and consider the events Ü µ Ë Ü µ ½ Ò (39) where Ò is the smallest integer no larger than Ø. By Eqn. (37), Ò Ó È Ö ½ Ò (40) ¼ Ò Let Ü ¾ ¼ Ø be arbitrary, and let the largest integer with Ü Ü. By construction, Ü occurs, then Ü. If ܵ Ü µ Ë Ü µ Ë Ü µ (41) 7

8 where we have used the fact that Ë is nondecreasing in the last step. It follows that È Ö Ü ¾ ¼ Ø Üµ Ë Ü µ È Ö ½ Ò Ü µ Ë Ü µ (42) Ò Ó È Ö (43) which proves Eqn. (38). Thus, the assumptions of the theorem imply that ¼ Ò ½ Ò (44) ½ À È Ö Ü ¾ ¼ Ø Üµ Ë Ü µ ½ Ø (45) for any ¼. Adding the violation probabilities, we see that È Ö Ü ¾ ¼ Ø ½ À ܵ Ë Ü µ ½ À Ø (46) Step 2: A deterministic argument. Suppose that, for a particular sample path, Ü ¾ ¼ Ø ½ À ܵ Ë Ü µ (47) Consider for a moment the case where the path through the network consists of only two nodes, À ¾. By Eqn. (47) with À ¾ and Ü Ø, we have ¾ ص By Eqn. (47) with ½, we have for all Ü ¾ ¼ Ø, ½ ܵ Ò ¾ ܵ Ë ¾ Ø Ü µ (48) ܾ ¼ Ø Ò ½ ݵ Ë ½ Ü Ý µ (49) ݾ ¼ Ü Setting ¾, ¾ ½, ½, and inserting Eqn.(49) into Eqn.(48) yields Ò Ó Øµ Ò Ò Ýµ Ë ½ Ü Ý µ Ë ¾ Ø Ü µ ܾ ¼ Ø Ý¾ ¼ Ü Ë ½ Ë ¾ Æ ¾ ص (51) An induction over the number of nodes shows that Eqn. (47) implies (50) ص Ë ½ Ë À Æ À ص (52) Step 3: Conclusion. The proof is completed by estimating È Ö Øµ Ë ½ Ë À Æ À ص (53) È Ö Ü Ø ½ À ܵ Ë Ü µ (54) ½ À Ø (55) The first inequality follows from the fact that Eqn. (47) implies Eqn. (52). The second inequality merely uses Eqn. (46). ¾ 8

9 traffic arrivals B(t 0 ) departures D(t 0 ) 0 t 0 t time Figure 2: Illustration for the modified convolution operator. The operator ؼ uses the backlog at time Ø ¼ and the arrivals in the interval Ø ¼ Ø. 4 Strengthening the Statistical Calculus with Adaptive Service Guarantees Since the bound in Eqn. (36) deteriorates as Ø becomes large, Theorem 4 is of limited practical value. To explain why Eqn. (36) deteriorates, consider a network as shown in Figure 1, with À ¾ nodes. An effective service curve Ë ¾ in the sense of Eqn. (15) at the second node guarantees that, for any given time Ø, the departures from this node are with high probability bounded below by ¾ ص ¾ Ë ¾ ص Ò ¾ Ø µ Ë ¾ µ (56) Ø Suppose that the infimum in Eqn. (56) is assumed at some value Ø. Since the departures from the first node are random, even if the arrivals to the first node satisfy the deterministic bound, is a random variable. An effective service curve Ë ½ at the first node guarantees that for any arbitrary but fixed time Ü, the arrivals ¾ ܵ ½ ܵ to the second node are with high probability bounded below by ½ ܵ ½ Ë ½ ܵ (57) Since is a random variable, we cannot simply evaluate Eqn. (57) for Ü Ø and use the resulting bound in Eqn. (56). Furthermore, there is, a priori, no time-independent bound on the distribution of. Note that the above issue does not arise in the deterministic calculus, since deterministic service curves make service guarantees that hold for all values of Ü. We conclude that, in a probabilistic setting, additional assumptions are required to establish time-independent bounds on the range of the infimum, and, in that way, obtain probabilistic network service curves that do not deteriorate with time. We next define a class of effective service curves where the range of the infimum is bounded independently of time, and then give conditions under which these service curves are also effective service curves in the sense of Eqn. (15). The resulting effective service curves are valid without adding assumptions on a specific arrival distribution or service discipline. 9

10 4.1 (Deterministic) Adaptive Service Curves We define a modified convolution operator by setting, for any Ø ¼ Ø, Ò Ø¼ ص Ñ Ò Ø Ø ¼ µ Ø ¼ µ Ò Ø µ Ó µ (58) Ø Ø ¼ ؼ The essential property of this modified operator is that the range over which the infimum is taken is limited to the interval Ø ¼ Ø. Note that the function ؼ ص depends on the backlog at time Ø ¼ as well as on the arrivals in the interval Ø ¼ Ø. It can be written equivalently as Ò Ó Ø¼ ص Ñ Ò Ø Ø ¼ µ Ò µ µ Ø ¼ µ (59) Ø Ø ¼ Ø The usual convolution operator is recovered by setting Ø ¼ ¼. We now reconsider the definition of a service curve in a deterministic regime. We introduce a revised definition of a (deterministic) service curve, which is presented in [1, 14], and is referred to as adaptive service curve in [6]. A (minimum) adaptive service curve is defined as a function Ë which specifies a lower bound on the service given to a flow such that, for all Ø Ø ¼ ¼, with Ø ¼ Ø, Ø ¼ ص ؼ Ë Øµ (60) A maximum adaptive service curve can be defined accordingly. 3 Eqn. (60) is equivalent to requiring that Ë satisfies Eqn. (8) for the time-shifted arrivals and departures ܵ Ø ¼ µ Ø ¼ Ø ¼ ܵ ܵ Ø ¼ Ø ¼ ܵ (61) Figure 2 illustrates the time-shifted arrivals. Many service curves with applications in packet networks, such as shapers, schedulers with delay guarantees, and rate-controlled schedulers such as GPS, can be expressed in terms of adaptive service curves. By setting Ø ¼ ¼, one can see that each adaptive service curve is a service curve. However, the converse does not hold [6]. We next define a (minimum) -adaptive service curve, denoted by Ë, as a function for which Eqn. (60) is satisfied whenever Ø Ø ¼. If ½, we obtain an adaptive service curve, and drop the superscript in the notation. The difference between a service curve according to Eqn. (8) and an -adaptive service curve is that the former involves arrivals over the entire interval ¼ Ø, while the latter uses information about arrivals and departures in intervals Ø ¼ Ø whose length does not depend on Ø. Performing a time shift as in Eqn. (61) and applying Theorem 2 shows that the convolution of -adaptive service curves yields an -adaptive network service curve. The following lemma shows that for sufficiently large, but finite, an -adaptive service curve is a service curve in the sense of Eqn. (8). In particular, the conclusions of Theorems 1 and 2 hold for such service curves. Lemma 1 Suppose that the arrival function of a flow has arrival envelope. Let Ë be an -adaptive service curve. If Ø ¾ ¼ ص Ë Øµ (62) then Ë Ë is an adaptive service curve for intervals of arbitrary length. In particular, Ë satisfies Eqn. (8) for all Ø ¼. The proof of the lemma is given in the appendix. 3 We note that the adaptive service curve in [6] is more general and is defined using Ø ¼ ص Ñ Ò Ò Ø Ø¼ ؼ Ø µ µ Ó. In our context we set. Ò Ø Ø ¼µ Ø ¼µ 10

11 4.2 Effective Adaptive Service Curves Next we introduce a probabilistic version of the -adaptive service curve. We define an effective -adaptive service curve to be a nonnegative function Ë such that È Ö Ø ¼ ص ؼ Ë Øµ ½ (63) for all Ø ¼ Ø ¼ with Ø Ø ¼. If ½, we call the resulting function an effective adaptive service curve, and drop the superscript. Note that the infimum in the convolution on the right hand side of Eqn. (63) ranges over an interval of length at most. With this bound on the range of the infimum, we derive the following effective network service curve. Theorem 5 Concatenation of -Adaptive Effective Service Curves. Consider a flow that passes through À network nodes in series. Let the functions Ë define effective -adaptive service curves at each node ( ½ À). Assume that the Ë are nondecreasing. Then Ë Ò Ø À ص Ë ½ Ë À Æ À ص (64) is an effective -adaptive network service curve for any choice of ¼, with violation probability given by À. Proof. We need to show that, for any Ø ¼ Ø with Ø Ø ¼ and any choice of the parameter, we have È Ö Ø ¼ ص ؼ Ë Ò Ø À ص ½ À (65) Fix Ø ¼ Ø with Ø Ø ¼. Performing a time shift as in Eqn. (61), we may assume without loss of generality that Ø ¼ ¼ and Ø ¾ ¼. The claim now follows immediately from Theorem 4. ¾ The following lemma gives a sufficient conditions for an effective -adaptive curve to be an effective service curve in the sense of Eqn. (15). Lemma 2 Given a flow with arrival process, and an effective -adaptive service curve Ë. 1. If È Ö Ø ¼ ¾ Ø Ø Ø ¼ µ ¼ ½ ½ (66) for all Ø ¼, then, for any choice of ¼, Ë ½ Ë Æ is an effective adaptive service curve for intervals of arbitrary length, with violation probability ½. In particular, for all Ø ¼. 2. If the arrival process has arrival envelope and È Ö Øµ Ë Æ Øµ ½ ½ µ (67) È Ö Øµ Ë µ µ ½ ½ (68) for all Ø ¼, then Ë ½ Ë is an effective adaptive service curve for intervals of arbitrary length, with violation probability ½. In particular, for all Ø ¼. È Ö Øµ Ë Øµ ½ ½ µ (69) 11

12 Lemma 2 should be compared with Lemma 1, as both provide sufficient conditions under which service guarantees on intervals of a given finite length imply service guarantees on intervals of arbitrary length. While the condition on in Eqn. (62) involves only the deterministic arrival envelope and the service curve, Eqs. (66) and (68) represent additional assumptions on the backlog process. This points out a fundamental difference between the deterministic and the statistical network calculus. Proof. The proof consists of four steps. If the second condition of the lemma holds, the first two steps can be omitted. In the first step, we estimate the change in the modified convolution ؼ Ë as Ø ¼ is increased. In the second step, we modify a given effective -adaptive service curve to give uniform probabilistic lower bounds on the departure of all intervals of the form Ø ¼ Ø, where Ø is fixed and Ø ¼ ¾ Ø Ø. This is analogous to the first step in the proof of Theorem 4. The third step contains a deterministic argument. We conclude with a probabilistic estimate in Step 4. Step 1: A property of the modified convolution operator ؼ. Let be a nondecreasing function, let Ø ½ ¾ Ø ¼ Ø, and set Ø ½ Ø ¼. Then Ø ½ ص ؽ ص (70) implies Ø ¼ ص ؼ Æ Øµ (71) To see this, note that Eqn. (70) implies that either or If Eqn. (72) holds, then clearly Ø ½ ص Ø Ø ½ µ (72) Ø ½ ص Ø ½ µ Ò Ø ½ Ø µ µ (73) Ø Ø ½ Ø ¼ ص Ø ½ ص Ø Ø ½ µ Æ Ø Ø ¼ µ ؼ Æ Øµ (74) where we have used that is nondecreasing in the third inequality. If Eqn. (73) holds, then Ø ¼ ص Ø ¼ Ø ½ µ Ø ½ ص (75) Ø ¼ Ø ½ µ Ø ½ µ Ò Ø Ø ½ ؽ Ø µ µ (76) Ø ¼ µ Ò Ø Ø ½ ؼ Ø µ µ (77) ؼ Æ µ ص (78) In Eqn. (76) we have used Eqn. (73). In Eqn. (77), we have used the definitions of Ø ¼ µ and Ø ½ µ and taken Ø ¼ Ø ½ µ under the infimum. In Eqn. (78) we have applied the definition of, and used that Æ because is nondecreasing. Step 2: Uniform probabilistic bounds. curve, that is, for any Ø ¼, Suppose that Ë is a nondecreasing effective -adaptive service Ø ¼ ¾ Ø Ø È Ö Ø ¼ ص ؼ Ë Øµ ½ (79) 12

13 We will show that then, for any choice of ¼, È Ö Ø ¼ ¾ Ø Ø Ø ¼ ص ؼ Ë Ø µ ½ (80) To see this, assume without loss of generality that Ø, and consider the events Ü Øµ Ü Ë Øµ ¼ Ò (81) By Eqn. (79), we have Using Step 1, we arrive at Ò È Ö ¼ Ò Ó ½ Ò (82) which proves Eqn. (80) in the case Ø. È Ö Ø ¼ ¾ ¼ ص ؼ Ë Ø µ (83) È Ö ¼ Ò ½ Ü µ Ü Ë Ü µ (84) Ò Ó È Ö (85) ¼ Ò ½ Ò (86) Step 3: Deterministic argument. Fix Ø ¼, and suppose that for a particular sample path, we have and either Ü ¾ Ø Ø Ü Øµ Ü Ì Øµ (87) ½ Ø ¼ ¾ Ø Ø Ø ¼ µ ¼ or (88) ¾ Ø µ Ë µ µ where is an arrival envelope. (89) In the first case, we can set Ü Ø ¼ in Eqn. (87) to obtain ¾ Ø ¼ ¾ Ø Ø This implies that Ø ¼ µ ¼ and ص Ø ¼ µ Ñ Ò Ë Ø Ø ¼ µ Ø ¼ µ Ò Ø Ø¼ Ø ¼ Ø µ Ë µ ص In the second case, we note that from Eqn. (89) it follows that which implies that (90) Ò Ø µ Ë µ (91) Ø Ø ¼ Ø µ Ò Ø Ø µ Ë µ Ë µ µ Ø Øµ Ë µ (92) Ø Øµ Ø µ Ò Ø µ Ë µ (93) Inserting this into Eqn. (87) with Ü Ø yields again Eqn. (91). 13

14 Step 4: Probabilistic estimate. If the first condition of the lemma holds, we use Step 3 to see that È Ö Øµ Ò Ø µ µ (94) Ò È Ö Ü ¾ Ø Ø Ü Øµ Ü Ì Øµ Ó and Ø ¼ ¾ Ø Ø Ø ¼ µ ¼ (95) ½ ½ µ (96) where we have used the result of Step 2 in the second line. If the second condition of the lemma holds, È Ö Øµ Ò Ø µ µ (97) Ò È Ö Ø Øµ Ø Ì Øµ Ó and Ø µ Ë µ µ (98) ½ ½ µ (99) where we have used the definition of Ë in the second line. ¾ 4.3 Strong Effective Adaptive Service Curves Even though the concatenation formula in Theorem 5 results in a significant improvement over Theorem 4, a drawback of Theorem 5 is that the construction of the network service curve results in a degradation of the violation probability to À and introduces a time shift Æ À. As becomes large, for any choice of ¼, either the violation probability À or the time shift À grow significantly. The conversion of an effective -adaptive to an effective adaptive service curve in Lemma 2 introduces additional losses. To avoid this successive degradation of the service guarantees, we further strengthen the effective service curve. We define a strong effective adaptive service curve for intervals of length to be a function Ì which satisfies for any interval Á of length, È Ö Ø ¼ Ø Á Ø ¼ ص ؼ Ì Øµ ½ (100) This definition differs from the definition of an effective service in Eqn. (15) in two ways: it uses the modified convolution operator, and it provides lower bounds on the departures simultaneously in all subintervals of an interval Á. With the strong effective adaptive network service curve, we obtain a probabilistic version of a network service curve, with a similar concatenation formula as in the deterministic calculus. This is the content of the following theorem. Theorem 6 Concatenation of Strong Effective Adaptive Service Curves. Consider a flow that passes through À network nodes in series. Assume that the functions Ì define strong effective adaptive service curves for intervals of length at each node ( ½ À). Then is a strong effective adaptive service curve for intervals of length. Ì Ò Ø À ص Ì ½ Ì À ص (101) Note the similarity of the convolution formula in Eqn. (101) with the corresponding expression in the deterministic calculus. Thus, in the statistical calculus, obtaining a statistical end-to-end service curve via 14

15 a simple convolution operation comes at the price of significant modifications to the definition of a service curve. Proof. We need to show that Ì Ò Ø À Ì ½ Ì À satisfies for any interval Á of length È Ö Ø ¼ Ø Á Ø ¼ ص ؼ Ì Ò Ø À ص ½ À (102) The proof is analogous to the proof of Theorem 4. Step 1. Uniform probabilistic bound on Á. Since each Ì is a strong effective service curve by assumption, we have È Ö Ø ¼ Ü Á ½ À Ø ¼ ܵ ؼ Ì Üµ ½ À (103) Step 2. A deterministic argument. Suppose that, for a particular sample path, Ø ¼ Ü Á ½ À Ø ¼ ܵ ؼ Ì Üµ (104) Fix Ø ¼ and Ø and consider the time-shifted arrivals and departures defined by Eqn. (61). Eqn. (104) implies Ü Ø Ø ¼ ½ À ܵ Ì Üµ (105) We argue as in Step 2 of the proof of Theorem 4 that this implies ص Ì ½ Ì À ص (106) Reversing the time shift and using that Ø ¼ Ø Á was arbitrary, we arrive at Step 3 : Conclusion. We conclude that Ø ¼ Ø Á ص ؼ Ì ½ Ì À ص (107) È Ö Ø ¼ Ø Á Ø ¼ ص ؼ Ì Ò Ø À ص (108) È Ö Ø ¼ Ü Á ½ À Ø ¼ ܵ ؼ Ì Üµ (109) ½ À (110) The first inequality follows from the definition of Ì Ò Ø À and the fact that Eqn. (104) implies Eqn. (107), and the second inequality is just Eqn. (103). ¾ It is possible to recover an effective service curve in the sense of Eqn. (15) from a strong effective adaptive service curve, provided that additional information on the backlog is available. This is stated in the following lemma. Lemma 3 Given a flow with arrival process, and a strong effective adaptive service curve Ì on intervals of length. Assume that for every Ø ¼, at least one of the following two conditions is satisfied. ½ È Ö Ø ¼ ¾ Ø Ø Ø ¼ µ ¼ ½ ½ or (111) ¾ È Ö Øµ Ì µ µ ½ ½ where is an arrival envelope. (112) Then, for any Ø ¼ and any Ø ½ Ø, È Ö Ø ½ ص ؽ Ì Øµ ½ ½ µ (113) In particular, for Ø ½ ¼, Ë ½ Ì is an effective service curve in the sense of Eqn. (15). 15

16 The proof will show that either of the two conditions in the lemma guarantees the stronger statement that È Ö Øµ Ò Ø µ Ì µ ½ ½ µ (114) for any Ø ¼, thus, yielding a time independent bound on the range of the convolution. Proof. We need to show that under the assumptions of the lemma, we have for any Ø ¼ and any Ø ½ Ø È Ö Ø ½ ص ؽ Ì Øµ ½ ½ µ (115) By considering time-shifted arrivals and departures as in Eqn. (61), we may assume without loss of generality that Ø ½ ¼. Step 1.: Deterministic argument. Fix Ø ¼, and suppose that for a particular sample path, we have and either Ü Ý Ø Ø Ü Ýµ Ü Ì Ýµ (116) ½ Ø ¼ ¾ Ø Ø Ø ¼ µ ¼ or (117) ¾ Ø µ Ì µ µ where is an arrival envelope. (118) The first step in the proof of Lemma 2 shows that this implies Step 2: Probabilistic estimate. By Step 1, we have ص Ò Ø µ Ì µ (119) as claimed. È Ö Øµ Ò Ø µ µ (120) Ü Ý Ø Ø Ü Ýµ Ü Ì Üµ È Ö and either Ø ¼ ¾ Ø Ø Ø ¼ µ ¼ or Ø µ Ì µ µ (121) ½ ½ µ (122) ¾ Combining Theorem 6 with Lemma 3 yields an effective network service curve, which by Theorem 3 guarantees probabilistic bounds on output, backlog, and delay. A comparison of the definition of the strong effective adaptive service curve in Eqn. (100) with Eqn. (63) shows that a strong effective adaptive service curve is an effective -adaptive service curve which provides service guarantees simultaneously on all subintervals of an interval of length. A comparison of Theorem 6 and Lemma 3 with Theorem 5 and Lemma 3 shows that the more stringent strong effective adaptive service curve expresses the statistical calculus more elegantly. We believe that, unless additional assumptions are made on the arrival processes and the service curves, the network calculus with strong effective adaptive service curves offers the preferred framework. Our final result shows how to construct a strong effective adaptive service curve from an effective adaptive service curve. The lemma indicates that the choice of working with a strong effective adaptive service curve rather than an effective adaptive service curve is purely a matter of technical convenience. 16

17 Lemma 4 Let Ë be an effective -adaptive service curve for a flow and assume that Ë Øµ is a nondecreasing function of Ø. Let ¼ be arbitrary, and set where ¾ is the smallest integer no less than. Then the function ¼ ¾ ¾ ¾ (123) Ì ¼ Ë Æ (124) is a strong effective service curve for intervals of length, with violation probability given by ¼. Proof. We will show that for any interval Á of length, Ø ¼ Ø Á È Ö Ø ¼ ص ؼ Ë Øµ ½ (125) implies È Ö Ø ¼ Ø Á Ø ¼ ص ؼ Ì ¼ ص ½ ¼ (126) where ¼ and Ì ¼ are as given in the statement of the lemma. By performing a suitable time shift as in Eqn. (61), we may assume without loss of generality that Á ¼. The strategy is similar to the construction of strong effective envelopes from effective envelopes in [4], and uses the same techniques as the first step in the proof of Theorem 4 and the first two steps in the proof of Lemma 2. We first use the fact that the departures satisfy the positivity assumption (A1) to translate service guarantees given on a subinterval into a service guarantee on a longer interval. In the second step, we establish probabilistic bounds for the departures simultaneously in a finite number of subintervals Á of Á, and then bound the departures in general subintervals of Á from below in terms of the departures in the Á. Step 1: A property of the modified convolution. Let be a nondecreasing function, let Ø ½ Ø ¾ Ø ¼ Ø, and set ½ Ø ½ Ø ¼, ¾ Ø Ø ¾, ½ ¾. If, for a particular sample path, then Ø ½ Ø ¾ µ ؽ Ø ¾ µ (127) Ø ¼ ص Ø ¼ Ø ¾ µ (128) ؼ Æ ½ ؾ µ (129) ؼ Æ Øµ (130) Here, Eqn. (129) follows from the first step in the proof of Lemma 2. Eqn. (130) follows since is nondecreasing and ½ ¾. Step 2: Uniform probabilistic bounds on Á. Fix ¼, set Ü ¾, and consider the intervals Á Ü Ü ¼ Ò (131) 17

18 where Ò ¾ is the smallest integer no less than ¾. The total number of these intervals is given by Ò Ò ½µ ¾. Let be the event Ü Ü µ Ü Ë Ü µ (132) Since Ë is an effective -adaptive service curve, we have that È Ö ½ for each, and consequently the probability that all of the occur simultaneously is bounded below by Ò Ó È Ö ½ Ò ¾ ¾ (133) ¼ Ò Let now Ø ¼ Ø ¼ be arbitrary, and choose Á Ø ¼ Ø be as large as possible. If occurs, we apply Step 1 with Ø ½ Ü and Ø ¾ Ü, and use that Ü Ø ¼ µ Ø Ü µ to see that ص ؼ Ë Æ Øµ (134) It follows that as claimed. È Ö Ø ¼ Ø ¼ Ø ¼ ص ؼ Ë Ø µ È Ö ¼ Ò Ü Ü µ Ü Ë Ü µ (135) Ò Ó È Ö (136) ¼ Ò ½ Ò ¾ ¾ (137) ¾ 5 Conclusions We have presented a network calculus with probabilistic service guarantees where arrivals to the network satisfy a deterministic arrival bound. We have introduced the notion of effective service curves as a probabilistic bound on the service received by individual flows in a network. We have shown that some key results from the deterministic network calculus can be carried over to the statistical framework by inserting appropriate probabilistic arguments. We showed that the deterministic bounds on output, delay, and backlog from Theorem 1 have corresponding formulations in the statistical calculus (Theorem 3). We have extended the concatenation formula of Theorem 2 for network service curves to a statistical setting (Theorems 4, 5, and 6). We showed that a modified effective service curve, called strong effective adaptive service curve yields the simplest concatenation formula. In order to connect the different notions of effective service curves, we have made an additional assumption on the backlog in Lemmas 2 and 3. While the question is open whether one can dispense with this additional assumption, we have made an attempt to justify the need for it. Acknowledgments We thank Rene Cruz for pointing out problems in earlier versions of the effective network service curve. The authors gratefully acknowledge the valuable comments from Chengzhi Li. 18

19 References [1] R. Agrawal, R. L. Cruz, C. Okino, and R. Rajan. Performance bounds for flow control protocols. IEEE/ACM Transactions on Networking, 7(3): , June [2] M. Andrews. Probabilistic end-to-end delay bounds for earliest deadline first scheduling. In Proceedings of IEEE Infocom 2000, pages , Tel Aviv, March [3] F. L. Baccelli, G. Cohen, G. J. Olsder, and J.-P. Quadrat. Synchronization and Linearity: An Algebra for Discrete Event Systems. John Wiley and Sons, [4] R. Boorstyn, A. Burchard, J. Liebeherr, and C. Oottamakorn. Statistical service assurances for traffic scheduling algorithms. IEEE Journal on Selected Areas in Communications. Special Issue on Internet QoS, 18(12): , December [5] J. Y. Le Boudec. Application of network calculus to guaranteed service networks. IEEE/ACM Transactions on Information Theory, 44(3): , May [6] J. Y. Le Boudec and P. Thiran. Network Calculus. Springer Verlag, Lecture Notes in Computer Science, LNCS 2050, [7] C. S. Chang. Stability, queue length, and delay of deterministic and stochastic queueing networks. IEEE Transactions on Automatic Control, 39(5): , May [8] C. S. Chang. On deterministic traffic regulation and service guarantees: a systematic approach by filtering. IEEE/ACM Transactions on Information Theory, 44(3): , May [9] C. S. Chang. Performance Guarantees in Communication Networks. Springer Verlag, [10] R. L. Cruz. A calculus for network delay, Part I : Network elements in isolation. IEEE Transaction of Information Theory, 37(1): , [11] R. L. Cruz. A calculus for network delay, Part II : Network analysis. IEEE Transactions on Information Theory, 37(1): , January [12] R. L. Cruz. Quality of service guarantees in virtual circuit switched networks. IEEE Journal on Selected Areas in Communications, 13(6): , August [13] R. L. Cruz. Quality of service management in integrated services networks. In Proceedings of the 1st Semi-Annual Research Review, CWC, UCSD, June [14] R. L. Cruz and C. Okino. Service gurantees for flow control protocols. In Proceedings of the 34th Allerton Conference on Communications, Control and Computating, October [15] A. Elwalid and D. Mitra. Design of generalized processor sharing schedulers which statistically multiplex heterogeneous QoS classes. In Proceedings of IEEE INFOCOM 99, pages , New York, March [16] J. Kurose. On computing per-session performance bounds in high-speed multi-hop computer networks. In ACM Sigmetrics 92, pages ,

20 [17] C. Li and E. Knightly. Coordinated network scheduling: A framework for end-to-end services. In Proceedings of IEEE ICNP 2000, Osaka, November [18] J. Qiu and E. Knightly. Inter-class resource sharing using statistical service envelopes. In Proceedings of IEEE Infocom 99, pages 36 42, March [19] V. Sivaraman and F. M. Chiussi. Statistical analysis of delay bound violations at an earliest deadline first scheduler. Performance Evaluation, 36(1): , [20] V. Sivaraman and F. M. Chiussi. Providing end-to-end statistical delay guarantees with earliest deadline first scheduling and per-hop traffic shaping. In Proceedings of IEEE Infocom 2000, pages , Tel Aviv, March [21] D. Starobinski and M. Sidi. Stochastically bounded burstiness for communication networks. IEEE Transaction of Information Theory, 46(1): , [22] O. Yaron and M. Sidi. Performance and stability of communication networks via robust exponential bounds. IEEE/ACM Transactions on Networking, 1(3): , June

21 APPENDIX A Proof of Lemma 1 Let Ë be an -adaptive service curve. We need to show that Ø ½ ص ؽ Ë Øµ (138) holds for all Ø Ø ½ ¼ with Ø ½ Ø. By considering the time-shifted arrivals and departures as in Eqn. (61), we may assume without loss of generality that Ø ½ ¼. Consider intervals Á ½µ, where ¼ is an integer. We will show by induction, that for any integer ¼, Ø ¾ Á ص Ë Øµ (139) Applying the definition of an -adaptive network service curve with Á ¼, we see that Eqn. (139) clearly holds for ¼. For the inductive step, suppose that Eqn. (139) holds for some integer ¼. Fix Ø ¾ Á ½, and let Ø ¼ Ø ¾ Á. By the inductive assumption, Ø ¼µ Ë Ø ¼ µ. Eqn. (60) says that either Ø ¼ ص Ë Ø Ø ¼ µ (140) or If Eqn. (140) holds, then Ø ¼ ص Ø ¼ µ Ò Ø¼ Ø µ Ë Ø Ø ¼ Ø µ (141) ص Ø ¼ ص Ø ¼ µ (142) Ë Ø Ø ¼ µ Ò µ Ë µ (143) Ø ¼ ؼ Ë Ø Ø ¼ µ Ø Ø ¼ µ Ò µ Ë µ (144) Ø ¼ Ø Ë Øµ (145) In Eqn. (143), we have used Eqn. (140) and the inductive assumption. In Eqn. (144), we have used that Ø ¼ Ø µ Ø Ø ¼ µ and pulled Ø Ø ¼ µ out of the infimum. In Eqn. (145), we have inserted Ø Ø ¼, used the assumption that µ Ë µ, and extended the range of the infimum. If Eqn. (141) holds, then ص Ø ¼ µ Ø Ø ¼ µ (146) Ø ¼ µ Ò Ø µ Ë µ (147) Ø Ø ¼ ؼ Ò µ Ë µ (148) Ø Ø ¼ Ø Ë Øµ (149) In Eqn. (147), we have used Eqn. (141), and the fact that Ø ¼ µ Ø ¼ µ Ø ¼ µ. In Eqn. (148), we have taken Ø ¼ µ under the infimum and used that Ø ¼ µ Ø ¼ Ø µ Ø µ. In Eqn. (149), we have extended the range of the infimum and used the definition of the convolution. Since Ø ¾ Á ½ was arbitrary, this proves the inductive step, and the lemma. 21

solutions:, and it cannot be the case that a supersolution is always greater than or equal to a subsolution.

solutions:, and it cannot be the case that a supersolution is always greater than or equal to a subsolution. Chapter 4 Comparison The basic problem to be considered here is the question when one can say that a supersolution is always greater than or equal to a subsolution of a problem, where one in most cases

More information

Event Based Sequential Program Development: Application to Constructing a Pointer Program

Event Based Sequential Program Development: Application to Constructing a Pointer Program Event Based Sequential Program Development: Application to Constructing a Pointer Program Jean-Raymond Abrial Consultant, Marseille, France jr@abrial.org Abstract. In this article, I present an event approach

More information

ÈÖÓÚ Ò Ò ÁÑÔÐ Ø ÓÒ È É Ï Ö Ø ÐÓÓ Ø Û Ý ØÓ ÔÖÓÚ Ø Ø Ñ ÒØ Ó Ø ÓÖÑ Á È Ø Ò É ÓÖ È É Ì ÓÐÐÓÛ Ò ÔÖÓÓ ØÝÔ Ò Ð Ó Ù ØÓ ÔÖÓÚ Ø Ø Ñ ÒØ Ó Ø ÓÖÑ Ü È Üµ É Üµµ Ý ÔÔ

ÈÖÓÚ Ò Ò ÁÑÔÐ Ø ÓÒ È É Ï Ö Ø ÐÓÓ Ø Û Ý ØÓ ÔÖÓÚ Ø Ø Ñ ÒØ Ó Ø ÓÖÑ Á È Ø Ò É ÓÖ È É Ì ÓÐÐÓÛ Ò ÔÖÓÓ ØÝÔ Ò Ð Ó Ù ØÓ ÔÖÓÚ Ø Ø Ñ ÒØ Ó Ø ÓÖÑ Ü È Üµ É Üµµ Ý ÔÔ Å Ø Ó Ó ÈÖÓÓ ÊÙÐ Ó ÁÒ Ö Ò ¹ Ø ØÖÙØÙÖ Ó ÔÖÓÓ ÆÓÛ ËØÖ Ø ÓÖ ÓÒ ØÖÙØ Ò ÔÖÓÓ ÁÒØÖÓ ÙØ ÓÒ ØÓ ÓÑÑÓÒ ÔÖÓÓ Ø Ò ÕÙ Ê ÐÐ Ø Ø Ñ ÒØ ÒØ Ò Ø Ø Ø Ö ØÖÙ ÓÖ Ð º Ò Ø ÓÒ ÔÖÓÓ ÓÒÚ Ò Ò Ö ÙÑ ÒØ Ø Ø Ø Ø Ñ ÒØ ØÖÙ º ÆÓØ Ï ÒÒÓØ

More information

Extensional Equality in Intensional Type Theory

Extensional Equality in Intensional Type Theory Extensional Equality in Intensional Type Theory Thorsten Altenkirch Department of Informatics University of Munich Oettingenstr. 67, 80538 München, Germany, alti@informatik.uni-muenchen.de Abstract We

More information

Improved Boosting Algorithms Using Confidence-rated Predictions

Improved Boosting Algorithms Using Confidence-rated Predictions Improved Boosting Algorithms Using Confidence-rated Predictions ÊÇÊÌ º ËÀÈÁÊ schapire@research.att.com AT&T Labs, Shannon Laboratory, 18 Park Avenue, Room A279, Florham Park, NJ 7932-971 ÇÊÅ ËÁÆÊ singer@research.att.com

More information

A procedure to compute a probabilistic bound for the maximum tardiness using stochastic simulation

A procedure to compute a probabilistic bound for the maximum tardiness using stochastic simulation Proceedings of the 17th World Congress The International Federation of Automatic Control A procedure to compute a probabilistic bound for the maximum tardiness using stochastic simulation Nasser Mebarki*.

More information

Refinement in Requirements Specification and Analysis: a Case Study

Refinement in Requirements Specification and Analysis: a Case Study Refinement in Requirements Specification and Analysis: a Case Study Edwin de Jong Hollandse Signaalapparaten P.O. Box 42 7550 GD Hengelo The Netherlands edejong@signaal.nl Jaco van de Pol CWI P.O. Box

More information

ishares Core Composite Bond ETF

ishares Core Composite Bond ETF ishares Core Composite Bond ETF ARSN 154 626 767 ANNUAL FINANCIAL REPORT 30 June 2017 BlackRock Investment Management (Australia) Limited 13 006 165 975 Australian Financial Services Licence No 230523

More information

Solutions of Implication Constraints yield Type Inference for More General Algebraic Data Types

Solutions of Implication Constraints yield Type Inference for More General Algebraic Data Types Solutions of Implication Constraints yield Type Inference for More General Algebraic Data Types Peter J. Stuckey NICTA Victoria Laboratory Department of Computer Science and Software Engineering The University

More information

LET Õ Ò µ denote the maximum size of a Õ-ary code

LET Õ Ò µ denote the maximum size of a Õ-ary code 1 Long Nonbinary Codes Exceeding the Gilbert-Varshamov bound for Any Fixed Distance Sergey Yekhanin Ilya Dumer Abstract Let Õ µ denote the maximum size of a Õ- ary code of length and distance We study

More information

Decomposition and Complexity of Hereditary History Preserving Bisimulation on BPP

Decomposition and Complexity of Hereditary History Preserving Bisimulation on BPP Decomposition and Complexity of Hereditary History Preserving Bisimulation on BPP Sibylle Fröschle and Sławomir Lasota Institute of Informatics, Warsaw University 02 097 Warszawa, Banacha 2, Poland sib,sl

More information

Hoboken Public Schools. Algebra II Honors Curriculum

Hoboken Public Schools. Algebra II Honors Curriculum Hoboken Public Schools Algebra II Honors Curriculum Algebra Two Honors HOBOKEN PUBLIC SCHOOLS Course Description Algebra II Honors continues to build students understanding of the concepts that provide

More information

Randomized Pursuit-Evasion in Graphs

Randomized Pursuit-Evasion in Graphs Randomized Pursuit-Evasion in Graphs Micah Adler, Harald Räcke ¾, Naveen Sivadasan, Christian Sohler ¾, and Berthold Vöcking ¾ Department of Computer Science University of Massachusetts, Amherst, micah@cs.umass.edu

More information

Nominal Techniques in Isabelle/HOL

Nominal Techniques in Isabelle/HOL Noname manuscript No. (will be inserted by the editor) Nominal Techniques in Isabelle/HOL Christian Urban Received: date / Accepted: date Abstract This paper describes a formalisation of the lambda-calculus

More information

ÙÒØ ÓÒ Ò Ø ÓÒ ÙÒØ ÓÒ ÖÓÑ ØÓ ÒÓØ Ö Ð Ø ÓÒ ÖÓÑ ØÓ Ù Ø Ø ÓÖ Ú ÖÝ Ü ¾ Ø Ö ÓÑ Ý ¾ Ù Ø Ø Ü Ýµ Ò Ø Ö Ð Ø ÓÒ Ò Ü Ýµ Ò Ü Þµ Ö Ò Ø Ö Ð Ø ÓÒ Ø Ò Ý Þº ÆÓØ Ø ÓÒ Á

ÙÒØ ÓÒ Ò Ø ÓÒ ÙÒØ ÓÒ ÖÓÑ ØÓ ÒÓØ Ö Ð Ø ÓÒ ÖÓÑ ØÓ Ù Ø Ø ÓÖ Ú ÖÝ Ü ¾ Ø Ö ÓÑ Ý ¾ Ù Ø Ø Ü Ýµ Ò Ø Ö Ð Ø ÓÒ Ò Ü Ýµ Ò Ü Þµ Ö Ò Ø Ö Ð Ø ÓÒ Ø Ò Ý Þº ÆÓØ Ø ÓÒ Á ÙÒØ ÓÒ Ò Ø ÓÒ ÙÒØ ÓÒ ÖÓÑ ØÓ ÒÓØ Ö Ð Ø ÓÒ ÖÓÑ ØÓ Ù Ø Ø ÓÖ Ú ÖÝ Ü ¾ Ø Ö ÓÑ Ý ¾ Ù Ø Ø Ü Ýµ Ò Ø Ö Ð Ø ÓÒ Ò Ü Ýµ Ò Ü Þµ Ö Ò Ø Ö Ð Ø ÓÒ Ø Ò Ý Þº ÆÓØ Ø ÓÒ Á Ü Ýµ Ò Ø Ö Ð Ø ÓÒ Û ÛÖ Ø Üµ ݺ Ì Ø Ø ÓÑ Ò Ó Ø ÙÒØ ÓÒ

More information

Two-Way Equational Tree Automata for AC-like Theories: Decidability and Closure Properties

Two-Way Equational Tree Automata for AC-like Theories: Decidability and Closure Properties Two-Way Equational Tree Automata for AC-like Theories: Decidability and Closure Properties Kumar Neeraj Verma LSV/CNRS UMR 8643 & INRIA Futurs projet SECSI & ENS Cachan, France verma@lsv.ens-cachan.fr

More information

DYNAMIC RISK MANAGEMENT IN ELECTRICITY PORTFOLIO OPTIMIZATION VIA POLYHEDRAL RISK FUNCTIONALS

DYNAMIC RISK MANAGEMENT IN ELECTRICITY PORTFOLIO OPTIMIZATION VIA POLYHEDRAL RISK FUNCTIONALS DYNAMIC RISK MANAGEMENT IN ELECTRICITY PORTFOLIO OPTIMIZATION VIA POLYHEDRAL RISK FUNCTIONALS Andreas Eichhorn Department of Mathematics Humboldt University 199 Berlin, Germany Email eichhorn@math.hu-berlin.de

More information

MSR, Access Control, and the Most Powerful Attacker

MSR, Access Control, and the Most Powerful Attacker MSR, Access Control, and the Most Powerful Attacker Iliano Cervesato Advanced Engineering and Sciences Division ITT Industries, Inc. 2560 Huntington Avenue, Alexandria, VA 22303-1410 USA Tel.: +1-202-404-4909,

More information

Approval Voting Theory with Multiple Levels of Approval

Approval Voting Theory with Multiple Levels of Approval Claremont Colleges Scholarship @ Claremont HMC Senior Theses HMC Student Scholarship 2012 Approval Voting Theory with Multiple Levels of Approval Craig Burkhart Harvey Mudd College Recommended Citation

More information

Implementing Domain Specific Languages using Dependent Types and Partial Evaluation

Implementing Domain Specific Languages using Dependent Types and Partial Evaluation Implementing Domain Specific Languages using Dependent Types and Partial Evaluation Edwin Brady eb@cs.st-andrews.ac.uk University of St Andrews EE-PigWeek, January 7th 2010 EE-PigWeek, January 7th 2010

More information

Chapter. Estimating the Value of a Parameter Using Confidence Intervals Pearson Prentice Hall. All rights reserved

Chapter. Estimating the Value of a Parameter Using Confidence Intervals Pearson Prentice Hall. All rights reserved Chapter 9 Estimating the Value of a Parameter Using Confidence Intervals 2010 Pearson Prentice Hall. All rights reserved Section 9.1 The Logic in Constructing Confidence Intervals for a Population Mean

More information

The Nominal Datatype Package in Isabelle/HOL

The Nominal Datatype Package in Isabelle/HOL The Nominal Datatype Package in Isabelle/HOL Christian Urban University of Munich joint work with Stefan Berghofer, Markus Wenzel, Alexander Krauss... Notingham, 18. April 2006 p.1 (1/1) The POPLmark-Challenge

More information

Domain, Range, Inverse

Domain, Range, Inverse Ê Ð Ø ÓÒ Ò Ø ÓÒ Ò ÖÝ Ö Ð Ø ÓÒ ÓÒ Ø Ò Ù Ø Ó Ü º Ì Ø ÒÝ Ê Ò ÖÝ Ö Ð Ø ÓÒº Ù Ø Ó ¾ Ü Ò ÖÝ Ö Ð Ø ÓÒ ÓÒ º ÆÓØ Ø ÓÒ Á µ ¾ Ê Û Ó Ø Ò ÛÖ Ø Ê º Ü ÑÔÐ Ò Ò ÖÝ Ö Ð Ø ÓÒ È ÓÒ ÓÖ ÐÐ Ñ Òµ ¾ ÑÈÒ Ñ Ò Ú Òº ËÓ È¾ È ¹ µ Ƚº

More information

Topics on the Border of Economics and Computation December 18, Lecture 8

Topics on the Border of Economics and Computation December 18, Lecture 8 Topics on the Border of Economics and Computation December 18, 2005 Lecturer: Noam Nisan Lecture 8 Scribe: Ofer Dekel 1 Correlated Equilibrium In the previous lecture, we introduced the concept of correlated

More information

Manipulative Voting Dynamics

Manipulative Voting Dynamics Manipulative Voting Dynamics Thesis submitted in accordance with the requirements of the University of Liverpool for the degree of Doctor in Philosophy by Neelam Gohar Supervisor: Professor Paul W. Goldberg

More information

Estimating the Margin of Victory for Instant-Runoff Voting

Estimating the Margin of Victory for Instant-Runoff Voting Estimating the Margin of Victory for Instant-Runoff Voting David Cary Abstract A general definition is proposed for the margin of victory of an election contest. That definition is applied to Instant Runoff

More information

Randomized Pursuit-Evasion in Graphs

Randomized Pursuit-Evasion in Graphs Randomized Pursuit-Evasion in Graphs Micah Adler Harald Räcke Ý Naveen Sivadasan Þ Christian Sohler Ý Berthold Vöcking Þ Abstract We analyze a randomized pursuit-evasion game on graphs. This game is played

More information

P(x) testing training. x Hi

P(x) testing training. x Hi ÙÑÙÐ Ø Ú ÈÖÓ Ø ± Ê Ú Û Ó Ä ØÙÖ ½ Ç Ñ³ Ê ÞÓÖ Ì ÑÔÐ Ø ÑÓ Ð Ø Ø Ø Ø Ø Ð Ó Ø ÑÓ Ø ÔÐ Ù Ð º Ë ÑÔÐ Ò P(x) testing training Ø ÒÓÓÔ Ò x ÓÑÔÐ Ü ØÝ Ó h ÓÑÔÐ Ü ØÝ Ó H ¼ ¾¼ ½¼ ¼ ¹½¼ ÒÓÓÔ Ò ÒÓ ÒÓÓÔ Ò ÙÒÐ ÐÝ Ú ÒØ Ò

More information

Ó ÔÔÐ Å Ø Ñ Ø ÔÐ Ò Ó Å Ø Ñ Ø Ð Ë Ò Ë ÓÓÐ Ð ØÙÖ Ö ÓÑ ÓÑÑÓÒ Ò ØÛÓÖ ÓÔØ Ñ Þ Ø ÓÒ Ó Ð Ò ÓÒ ØÖ ÒØ Ò Û Ý Ì ÓÙÖº ÓÑÑÙÒ Ø ÓÒ Æ ØÛÓÖ Ò Ð ØÙÖ ¼ Å ØØ Û ÊÓÙ Ò Æ ØÛÓÖ ÇÔØ Ñ Þ Ø ÓÒ

More information

Biogeography-Based Optimization Combined with Evolutionary Strategy and Immigration Refusal

Biogeography-Based Optimization Combined with Evolutionary Strategy and Immigration Refusal Biogeography-Based Optimization Combined with Evolutionary Strategy and Immigration Refusal Dawei Du, Dan Simon, and Mehmet Ergezer Department of Electrical and Computer Engineering Cleveland State University

More information

38050 Povo (Trento), Italy Tel.: Fax: e mail: url:

38050 Povo (Trento), Italy Tel.: Fax: e mail: url: CENTRO PER LA RICERCA SCIENTIFICA E TECNOLOGICA 38050 Povo (Trento), Italy Tel.: +39 0461 314312 Fax: +39 0461 302040 e mail: prdoc@itc.it url: http://www.itc.it HISTORY DEPENDENT AUTOMATA Montanari U.,

More information

Batch binary Edwards. D. J. Bernstein University of Illinois at Chicago NSF ITR

Batch binary Edwards. D. J. Bernstein University of Illinois at Chicago NSF ITR Batch binary Edwards D. J. Bernstein University of Illinois at Chicago NSF ITR 0716498 Nonnegative elements of Z: etc. 0 meaning 0 1 meaning 2 0 10 meaning 2 1 11 meaning 2 0 + 2 1 100 meaning 2 2 101

More information

Arrow s Impossibility Theorem on Social Choice Systems

Arrow s Impossibility Theorem on Social Choice Systems Arrow s Impossibility Theorem on Social Choice Systems Ashvin A. Swaminathan January 11, 2013 Abstract Social choice theory is a field that concerns methods of aggregating individual interests to determine

More information

CMD MDS Recovery DLD

CMD MDS Recovery DLD CMD MDS Recovery DLD Mike Pershin February 6, 2008 1 Introduction This document describes recovery changes in CMD. 2 Requirements The CMD environment requires the reviewed recovery due to major changes

More information

Priority Queues & Heaps

Priority Queues & Heaps Priority Queues & Heaps - 1 - Outline Ø The Priority Queue ADT Ø Total orderings, the Comparable Interface and the Comparator Class Ø Heaps Ø Adaptable Priority Queues - 2 - Outcomes Ø By understanding

More information

Ó ÔÔÐ Å Ø Ñ Ø ÔÐ Ò Ó Å Ø Ñ Ø Ð Ë Ò Ë ÓÓÐ Ð ØÙÖ ÒØÖÓ Ù Ø ÖÓÙØ Ò ÔÖÓ Ð Ñ Ò Ö ÓÑÑÓÒ ÔÔÖÓ ØÓ Ø ÓÐÙØ ÓÒ Ì Ð ÓÖ Ø Ñµ ÓÖ ÓÖØ Ø¹Ô Ø ÖÓÙØ Ò º ØÖ ³ ÓÑÑÙÒ Ø ÓÒ Æ ØÛÓÖ Ò Ð ØÙÖ ¼ ÊÓÙØ Ò Å ØØ Û ÊÓÙ Ò

More information

Infinite-Horizon Policy-Gradient Estimation

Infinite-Horizon Policy-Gradient Estimation Journal of Artificial Intelligence Research 15 (2001) 319-350 Submitted 9/00; published 11/01 Infinite-Horizon Policy-Gradient Estimation Jonathan Baxter WhizBang! Labs. 4616 Henry Street Pittsburgh, PA

More information

Liveness: The Readers / Writers Problem

Liveness: The Readers / Writers Problem Liveness: The Readers / Writers Problem Admin stuff: Minute paper for concurrency revision lecture Please take one, fill out in 1st 5min & return to box at front by end of lecture Labs week 4 review: event

More information

Predicting Information Diffusion Initiated from Multiple Sources in Online Social Networks

Predicting Information Diffusion Initiated from Multiple Sources in Online Social Networks Predicting Information Diffusion Initiated from Multiple Sources in Online Social Networks Chuan Peng School of Computer science, Wuhan University Email: chuan.peng@asu.edu Kuai Xu, Feng Wang, Haiyan Wang

More information

Political Economics II Spring Lectures 4-5 Part II Partisan Politics and Political Agency. Torsten Persson, IIES

Political Economics II Spring Lectures 4-5 Part II Partisan Politics and Political Agency. Torsten Persson, IIES Lectures 4-5_190213.pdf Political Economics II Spring 2019 Lectures 4-5 Part II Partisan Politics and Political Agency Torsten Persson, IIES 1 Introduction: Partisan Politics Aims continue exploring policy

More information

Ë ÁÌÇ ÌÓ Ó ÍÒ Ú Ö Øݵ Ç ¼ Ô Û Ö ÙÒÓ Ø Ò Ð Ä Ò ÙÖ ÖÝ ÓÒ ÒÓØ Ý ÛÓÖ Û Ø Ã ÞÙ ÖÓ Á Ö Ó ÒØ Ë Ò ÝÓ ÍÒ Ú Ö Øݵ Ç

Ë ÁÌÇ ÌÓ Ó ÍÒ Ú Ö Øݵ Ç ¼ Ô Û Ö ÙÒÓ Ø Ò Ð Ä Ò ÙÖ ÖÝ ÓÒ ÒÓØ Ý ÛÓÖ Û Ø Ã ÞÙ ÖÓ Á Ö Ó ÒØ Ë Ò ÝÓ ÍÒ Ú Ö Øݵ Ç Ë ÁÌÇ ÌÓ Ó ÍÒ Ú Ö Øݵ Ç ¼ Ô Û Ö ÙÒÓ Ø Ò Ð Ä Ò ÙÖ ÖÝ ÓÒ ÒÓØ Ý ÛÓÖ Û Ø Ã ÞÙ ÖÓ Á Ö Ó ÒØ Ë Ò ÝÓ ÍÒ Ú Ö Øݵ Ç ½ Ä Ò Ô Ô Ä Ô Õµ Ø ¹Ñ Ò ÓÐ Ó Ø Ò Ý Ä Ò ÓÒ Ø ØÖ Ú Ð ÒÓØ Ò Ë º Ô Õ¹ ÙÖ ÖÝ Ô Õµ¹ÙÖÚ ¾ ÈÖÓ Ð Ñ Ø Ð

More information

Priority Queues & Heaps

Priority Queues & Heaps Priority Queues & Heaps - 1 - Outline Ø The Priority Queue class of the Java Collections Framework Ø Total orderings, the Comparable Interface and the Comparator Class Ø Heaps Ø Adaptable Priority Queues

More information

A New Method of the Single Transferable Vote and its Axiomatic Justification

A New Method of the Single Transferable Vote and its Axiomatic Justification A New Method of the Single Transferable Vote and its Axiomatic Justification Fuad Aleskerov ab Alexander Karpov a a National Research University Higher School of Economics 20 Myasnitskaya str., 101000

More information

THE EFFECT OF OFFER-OF-SETTLEMENT RULES ON THE TERMS OF SETTLEMENT

THE EFFECT OF OFFER-OF-SETTLEMENT RULES ON THE TERMS OF SETTLEMENT Last revision: 12/97 THE EFFECT OF OFFER-OF-SETTLEMENT RULES ON THE TERMS OF SETTLEMENT Lucian Arye Bebchuk * and Howard F. Chang ** * Professor of Law, Economics, and Finance, Harvard Law School. ** Professor

More information

Hoboken Public Schools. College Algebra Curriculum

Hoboken Public Schools. College Algebra Curriculum Hoboken Public Schools College Algebra Curriculum College Algebra HOBOKEN PUBLIC SCHOOLS Course Description College Algebra reflects the New Jersey learning standards at the high school level and is designed

More information

Estimating the Margin of Victory for an IRV Election Part 1 by David Cary November 6, 2010

Estimating the Margin of Victory for an IRV Election Part 1 by David Cary November 6, 2010 Summary Estimating the Margin of Victory for an IRV Election Part 1 by David Cary November 6, 2010 New procedures are being developed for post-election audits involving manual recounts of random samples

More information

Accept() Reject() Connect() Connect() Above Threshold. Threshold. Below Threshold. Connection A. Connection B. Time. Activity (cells/unit time) CAC

Accept() Reject() Connect() Connect() Above Threshold. Threshold. Below Threshold. Connection A. Connection B. Time. Activity (cells/unit time) CAC Ú ÐÙ Ø Ò Å ÙÖ Ñ Òع Ñ ÓÒ ÓÒØÖÓÐ Ò Ö Û ÅÓÓÖ Å Ú ÐÙ Ø ÓÒ Ò Ö Û ÅÓÓÖ ½ ÐÐ Ñ ÓÒ ÓÒØÖÓÐ ÅÓ Ð ß Ö Ø ÓÖ ÙÒ Ö ØÓÓ ØÖ Æ ÓÙÖ ß ÒÓØ Ö Ø ÓÖ «Ö ÒØ ØÖ Æ ÓÙÖ Å ÙÖ Ñ ÒØ ß ÛÓÖ ÓÖ ÒÝ ØÖ Æ ÓÙÖ ß ÙØ Û Å ØÓ Ù Ç Ø Ú Ú ÐÙ Ø

More information

Regression. Linear least squares. Support vector regression. increasing the dimensionality fitting polynomials to data over fitting regularization

Regression. Linear least squares. Support vector regression. increasing the dimensionality fitting polynomials to data over fitting regularization Regression Linear least squares increasing the dimensionality fitting polynomials to data over fitting regularization Support vector regression Fitting a degree 1 polynomial Fitting a degree 2 polynomial

More information

A Formal Architecture for the 3APL Agent Programming Language

A Formal Architecture for the 3APL Agent Programming Language A Formal Architecture for the 3APL Agent Programming Language Mark d Inverno, Koen Hindriks Ý, and Michael Luck Þ Ý Þ Cavendish School of Computer Science, 115 New Cavendish Street, University of Westminster,

More information

A New Proposal on Special Majority Voting 1 Christian List

A New Proposal on Special Majority Voting 1 Christian List C. List A New Proposal on Special Majority Voting Christian List Abstract. Special majority voting is usually defined in terms of the proportion of the electorate required for a positive decision. This

More information

Ò ÓÛ Æ ØÛÓÖ Ð ÓÖ Ø Ñ ÓÖ ¹ ÙÐ Ö ÓÒ

Ò ÓÛ Æ ØÛÓÖ Ð ÓÖ Ø Ñ ÓÖ ¹ ÙÐ Ö ÓÒ Ò ÓÛ ÆØÛÓÖ ÐÓÖØÑ ÓÖ¹ÙÐÖ ÓÒ ÚÐÙÒ Øµ E µ ÙÚµ Ò Úµ µ E µ ÚÙµ ÐÐ ¹ÒÖ Ò ¹ÓÙØÖ Ó ÚÖØÜ Ú Î Ö Ö ÔØÚÐݺ ÄØ Î µ ÖØ ÖÔº ÓÖ ÚÖØÜ Ú Î Û Ò ÓÙØÖ Úµ Ò Ò Ø ÒÖ Ò Øµ Úµº ÓÖ Úµ Ø ÚÖØÜ Ú ÐÐ ÓÙÖ Úµ Á е ÓÖ Ò ÙÙµ Ó ÖÔ Ö ÔØÚÐݺ

More information

É ÀÓÛ Ó Ý Ò ² Ö Ò ÁÒ Ö Ò «Ö ÓØ ÑÔ Ù ÔÖÓ Ð ØÝ ØÓ Ö ÙÒ ÖØ ÒØÝ ÙØ Ø Ý ÓÒ Ø ÓÒ ÓÒ «Ö ÒØ Ø Ò º Ü ÑÔÐ ÁÑ Ò Ð Ò Ð ØÖ Ð Û Ø Ò ½ Ñ Ø Ô Ö Ó Ù Ø º ÁÒ Ô Ö ÓÒ Ù Ø

É ÀÓÛ Ó Ý Ò ² Ö Ò ÁÒ Ö Ò «Ö ÓØ ÑÔ Ù ÔÖÓ Ð ØÝ ØÓ Ö ÙÒ ÖØ ÒØÝ ÙØ Ø Ý ÓÒ Ø ÓÒ ÓÒ «Ö ÒØ Ø Ò º Ü ÑÔÐ ÁÑ Ò Ð Ò Ð ØÖ Ð Û Ø Ò ½ Ñ Ø Ô Ö Ó Ù Ø º ÁÒ Ô Ö ÓÒ Ù Ø ËØ Ø Ø Ð È Ö Ñ Ý Ò ² Ö ÕÙ ÒØ Ø ÊÓ ÖØ Ä ÏÓÐÔ ÖØ Ù ÍÒ Ú Ö ØÝ Ô ÖØÑ ÒØ Ó ËØ Ø Ø Ð Ë Ò ¾¼½ Ë Ô ½¼ ÈÖÓ Ñ Ò Ö É ÀÓÛ Ó Ý Ò ² Ö Ò ÁÒ Ö Ò «Ö ÓØ ÑÔ Ù ÔÖÓ Ð ØÝ ØÓ Ö ÙÒ ÖØ ÒØÝ ÙØ Ø Ý ÓÒ Ø ÓÒ ÓÒ «Ö ÒØ Ø Ò º Ü ÑÔÐ ÁÑ

More information

Contact 3-Manifolds, Holomorphic Curves and Intersection Theory

Contact 3-Manifolds, Holomorphic Curves and Intersection Theory Contact 3-Manifolds, Holomorphic Curves and Intersection Theory (Durham University, August 2013) Chris Wendl University College London These slides plus detailed lecture notes (in progress) available at:

More information

Last Time. Bit banged SPI I2C LIN Ethernet. u Embedded networks. Ø Characteristics Ø Requirements Ø Simple embedded LANs

Last Time. Bit banged SPI I2C LIN Ethernet. u Embedded networks. Ø Characteristics Ø Requirements Ø Simple embedded LANs Last Time u Embedded networks Ø Characteristics Ø Requirements Ø Simple embedded LANs Bit banged SPI I2C LIN Ethernet Today u CAN Bus Ø Intro Ø Low-level stuff Ø Frame types Ø Arbitration Ø Filtering Ø

More information

Hoboken Public Schools. AP Calculus Curriculum

Hoboken Public Schools. AP Calculus Curriculum Hoboken Public Schools AP Calculus Curriculum AP Calculus HOBOKEN PUBLIC SCHOOLS Course Description An Advanced Placement (AP) course in calculus consists of a full high school academic year of work that

More information

ONLINE APPENDIX: Why Do Voters Dismantle Checks and Balances? Extensions and Robustness

ONLINE APPENDIX: Why Do Voters Dismantle Checks and Balances? Extensions and Robustness CeNTRe for APPlieD MACRo - AND PeTRoleuM economics (CAMP) CAMP Working Paper Series No 2/2013 ONLINE APPENDIX: Why Do Voters Dismantle Checks and Balances? Extensions and Robustness Daron Acemoglu, James

More information

Real-Time Scheduling Single Processor. Chenyang Lu

Real-Time Scheduling Single Processor. Chenyang Lu Real-Time Scheduling Single Processor Chenyang Lu Critiques Ø 1/2 page critiques of research papers. q Back-of-envelop comments - NOT whole essays. q Guidelines: http://www.cs.wustl.edu/%7elu/cse521s/critique.html

More information

Sequential Voting with Externalities: Herding in Social Networks

Sequential Voting with Externalities: Herding in Social Networks Sequential Voting with Externalities: Herding in Social Networks Noga Alon Moshe Babaioff Ron Karidi Ron Lavi Moshe Tennenholtz February 7, 01 Abstract We study sequential voting with two alternatives,

More information

Handcuffs for the Grabbing Hand? Media Capture and Government Accountability by Timothy Besley and Andrea Prat (2006)

Handcuffs for the Grabbing Hand? Media Capture and Government Accountability by Timothy Besley and Andrea Prat (2006) Handcuffs for the Grabbing Hand? Media Capture and Government Accountability by Timothy Besley and Andrea Prat (2006) Group Hicks: Dena, Marjorie, Sabina, Shehryar To the press alone, checkered as it is

More information

CS 5523: Operating Systems

CS 5523: Operating Systems Lecture1: OS Overview CS 5523: Operating Systems Instructor: Dr Tongping Liu Midterm Exam: Oct 2, 2017, Monday 7:20pm 8:45pm Operating System: what is it?! Evolution of Computer Systems and OS Concepts

More information

How hard is it to control sequential elections via the agenda?

How hard is it to control sequential elections via the agenda? How hard is it to control sequential elections via the agenda? Vincent Conitzer Department of Computer Science Duke University Durham, NC 27708, USA conitzer@cs.duke.edu Jérôme Lang LAMSADE Université

More information

½º»¾¼ º»¾¼ ¾º»¾¼ º»¾¼ º»¾¼ º»¾¼ º»¾¼ º»¾¼» ¼» ¼ ÌÓØ Ð»½ ¼

½º»¾¼ º»¾¼ ¾º»¾¼ º»¾¼ º»¾¼ º»¾¼ º»¾¼ º»¾¼» ¼» ¼ ÌÓØ Ð»½ ¼ Ò Ð Ü Ñ Ò Ø ÓÒ ËÌ ½½ ÈÖÓ Ð ØÝ ² Å ÙÖ Ì ÓÖÝ ÌÙ Ý ¾¼½ ½¼ ¼¼ Ñ ß ½¾ ¼¼Ò Ì ÐÓ ¹ ÓÓ Ü Ñ Ò Ø ÓÒº ÓÙ Ñ Ý Ù Ø Ó ÔÖ Ô Ö ÒÓØ ÝÓÙ Û ÙØ ÝÓÙ Ñ Ý ÒÓØ Ö Ñ Ø Ö Ð º Á ÕÙ Ø ÓÒ Ñ Ñ ÙÓÙ ÓÖ ÓÒ Ù Ò ÔÐ Ñ ØÓ Ð Ö Ý Øº ÍÒÐ ÔÖÓ

More information

ECE250: Algorithms and Data Structures Trees

ECE250: Algorithms and Data Structures Trees ECE250: Algorithms and Data Structures Trees Ladan Tahvildari, PEng, SMIEEE Professor Software Technologies Applied Research (STAR) Group Dept. of Elect. & Comp. Eng. University of Waterloo Materials from

More information

Computational Inelasticity FHLN05. Assignment A non-linear elasto-plastic problem

Computational Inelasticity FHLN05. Assignment A non-linear elasto-plastic problem Computational Inelasticity FHLN05 Assignment 2016 A non-linear elasto-plastic problem General instructions A written report should be submitted to the Division of Solid Mechanics no later than 1 November

More information

Midterm Review. EECS 2011 Prof. J. Elder - 1 -

Midterm Review. EECS 2011 Prof. J. Elder - 1 - Midterm Review - 1 - Topics on the Midterm Ø Data Structures & Object-Oriented Design Ø Run-Time Analysis Ø Linear Data Structures Ø The Java Collections Framework Ø Recursion Ø Trees Ø Priority Queues

More information

Strong normalization of lambda-bar-mu-mu-tilde-calculus with explicit substitutions

Strong normalization of lambda-bar-mu-mu-tilde-calculus with explicit substitutions Strong normalization of lambda-bar-mu-mu-tilde-calculus with explicit substitutions Emmanuel Polonovski To cite this version: Emmanuel Polonovski. Strong normalization of lambda-bar-mu-mu-tilde-calculus

More information

Æ ÛØÓÒ³ Å Ø Ó ÐÓ Ì ÓÖÝ Ò ËÓÑ Ø Ò ÓÙ ÈÖÓ ÐÝ Ò³Ø ÃÒÓÛ ÓÙØ Ú º ÓÜ Ñ Ö Ø ÓÐÐ

Æ ÛØÓÒ³ Å Ø Ó ÐÓ Ì ÓÖÝ Ò ËÓÑ Ø Ò ÓÙ ÈÖÓ ÐÝ Ò³Ø ÃÒÓÛ ÓÙØ Ú º ÓÜ Ñ Ö Ø ÓÐÐ Æ ÛØÓÒ³ Å Ø Ó ÐÓ Ì ÓÖÝ Ò ËÓÑ Ø Ò ÓÙ ÈÖÓ ÐÝ Ò³Ø ÃÒÓÛ ÓÙØ Ú º ÓÜ Ñ Ö Ø ÓÐÐ Ê Ö Ò ÃÐ Ò Ä ØÙÖ ÓÒ Ø ÁÓ ÖÓÒ Ì Ù Ò Ö ½ ËÑ Ð ÇÒ Ø Æ ÒÝ Ó Ð ÓÖ Ø Ñ Ò ÐÝ ÙÐк ÅË ½ ÅÅÙÐÐ Ò Ñ Ð Ó Ö Ø ÓÒ Ð Ñ Ô Ò Ø Ö Ø Ú ÖÓÓع Ò Ò Ð

More information

Approval Voting and Scoring Rules with Common Values

Approval Voting and Scoring Rules with Common Values Approval Voting and Scoring Rules with Common Values David S. Ahn University of California, Berkeley Santiago Oliveros University of Essex June 2016 Abstract We compare approval voting with other scoring

More information

CS 5523 Operating Systems: Synchronization in Distributed Systems

CS 5523 Operating Systems: Synchronization in Distributed Systems CS 5523 Operating Systems: Synchronization in Distributed Systems Instructor: Dr. Tongping Liu Thank Dr. Dakai Zhu and Dr. Palden Lama for providing their slides. Outline Physical clock/time in distributed

More information

A representation theorem for minmax regret policies

A representation theorem for minmax regret policies Artificial Intelligence 171 (2007) 19 24 Research note www.elsevier.com/locate/artint A representation theorem for minmax regret policies Sanjiang Li a,b a State Key Laboratory of Intelligent Technology

More information

Sampling Equilibrium, with an Application to Strategic Voting Martin J. Osborne 1 and Ariel Rubinstein 2 September 12th, 2002.

Sampling Equilibrium, with an Application to Strategic Voting Martin J. Osborne 1 and Ariel Rubinstein 2 September 12th, 2002. Sampling Equilibrium, with an Application to Strategic Voting Martin J. Osborne 1 and Ariel Rubinstein 2 September 12th, 2002 Abstract We suggest an equilibrium concept for a strategic model with a large

More information

United States District Court, D. Delaware. LUCENT TECHNOLOGIES, INC. Plaintiff. v. NEWBRIDGE NETWORKS CORP. and Newbridge Networks, Inc. Defendants.

United States District Court, D. Delaware. LUCENT TECHNOLOGIES, INC. Plaintiff. v. NEWBRIDGE NETWORKS CORP. and Newbridge Networks, Inc. Defendants. United States District Court, D. Delaware. LUCENT TECHNOLOGIES, INC. Plaintiff. v. NEWBRIDGE NETWORKS CORP. and Newbridge Networks, Inc. Defendants. No. 97-347-JJF Sept. 21, 2001. Action was brought alleging

More information

An Algebraic Semantics for Duration Calculus. August 2005 ß ½ ß ESSLLI 2005 Student Session

An Algebraic Semantics for Duration Calculus. August 2005 ß ½ ß ESSLLI 2005 Student Session ÝÓÙ Ö Ý ÆÙÐØÝ ÓÖ ÓÒØÖÓÚ Ö Ý Ò Ò Á ÓÙÒ Ó ÐÖ ÛÓÖØ ØÓÒ Ó Ú Ö Ð Ö ÙÑ Òغ Ò An Algebraic Semantics for Duration Calculus ÐÖ Ë Ñ ÒØ ÓÖ ÙÖ Ø ÓÒ Ò ÐÙÐÙ È Ø Ö ÀĐÓ Ò Ö ÁÒ Ø ØÙØ Ó ÓÑÔÙØ Ö Ë Ò ÍÒ Ú Ö ØÝ Ó Ù ÙÖ Âº

More information

An Integer Linear Programming Approach for Coalitional Weighted Manipulation under Scoring Rules

An Integer Linear Programming Approach for Coalitional Weighted Manipulation under Scoring Rules An Integer Linear Programming Approach for Coalitional Weighted Manipulation under Scoring Rules Antonia Maria Masucci, Alonso Silva To cite this version: Antonia Maria Masucci, Alonso Silva. An Integer

More information

arxiv: v1 [cs.gt] 11 Jul 2018

arxiv: v1 [cs.gt] 11 Jul 2018 Sequential Voting with Confirmation Network Yakov Babichenko yakovbab@tx.technion.ac.il Oren Dean orendean@campus.technion.ac.il Moshe Tennenholtz moshet@ie.technion.ac.il arxiv:1807.03978v1 [cs.gt] 11

More information

Deadlock. deadlock analysis - primitive processes, parallel composition, avoidance

Deadlock. deadlock analysis - primitive processes, parallel composition, avoidance Deadlock CDS News: Brainy IBM Chip Packs One Million Neuron Punch Overview: ideas, 4 four necessary and sufficient conditions deadlock analysis - primitive processes, parallel composition, avoidance the

More information

VOTING ON INCOME REDISTRIBUTION: HOW A LITTLE BIT OF ALTRUISM CREATES TRANSITIVITY DONALD WITTMAN ECONOMICS DEPARTMENT UNIVERSITY OF CALIFORNIA

VOTING ON INCOME REDISTRIBUTION: HOW A LITTLE BIT OF ALTRUISM CREATES TRANSITIVITY DONALD WITTMAN ECONOMICS DEPARTMENT UNIVERSITY OF CALIFORNIA 1 VOTING ON INCOME REDISTRIBUTION: HOW A LITTLE BIT OF ALTRUISM CREATES TRANSITIVITY DONALD WITTMAN ECONOMICS DEPARTMENT UNIVERSITY OF CALIFORNIA SANTA CRUZ wittman@ucsc.edu ABSTRACT We consider an election

More information

Tensor. Field. Vector 2D Length. SI BG cgs. Tensor. Units. Template. DOFs u v. Distribution Functions. Domain

Tensor. Field. Vector 2D Length. SI BG cgs. Tensor. Units. Template. DOFs u v. Distribution Functions. Domain ÁÒØÖÓ ÙØ ÓÒ ØÓ Ø ÁÌ ÈË Ð ÁÒØ Ö ÖÐ ÇÐÐ Ú Ö¹ ÓÓ Ì ÍÒ Ú Ö ØÝ Ó Ö Ø ÓÐÙÑ Å Ö Å ÐÐ Ö Ä ÛÖ Ò Ä Ú ÖÑÓÖ Æ Ø ÓÒ Ð Ä ÓÖ ØÓÖÝ Ò Ð ÐÓÒ Ö Ê Ò Ð Ö ÈÓÐÝØ Ò ÁÒ Ø ØÙØ ¾¼½½ ËÁ Å Ë ÓÒ Ö Ò Ê ÒÓ Æ Ú Å Ö ¾¼½½ ÇÐÐ Ú Ö¹ ÓÓ Å

More information

The cost of ruling, cabinet duration, and the median-gap model

The cost of ruling, cabinet duration, and the median-gap model Public Choice 113: 157 178, 2002. 2002 Kluwer Academic Publishers. Printed in the Netherlands. 157 The cost of ruling, cabinet duration, and the median-gap model RANDOLPH T. STEVENSON Department of Political

More information

½ Ê Ú Û Ó ÆÒ ÕÙÓØ ÒØ ¾ ÇÖØ Ó ÓÒ Ð ÒÚ Ö ÒØ ÓÙ Ð Ö Ø ÓÒ Ý ÕÙÓØ ÒØ Ñ Ô ÇÖ Ø ÓÖÖ ÔÓÒ Ò Ü ÑÔÐ Ó ÓÖ Ø ÓÖÖ ÔÓÒ Ò Ü ÑÔÐ Ø Ò ÓÖ ÔÖÓ ÙØ Ü ÑÔÐ ÓÒØÖ Ø ÓÒ Ñ Ô ÇÔ Ò

½ Ê Ú Û Ó ÆÒ ÕÙÓØ ÒØ ¾ ÇÖØ Ó ÓÒ Ð ÒÚ Ö ÒØ ÓÙ Ð Ö Ø ÓÒ Ý ÕÙÓØ ÒØ Ñ Ô ÇÖ Ø ÓÖÖ ÔÓÒ Ò Ü ÑÔÐ Ó ÓÖ Ø ÓÖÖ ÔÓÒ Ò Ü ÑÔÐ Ø Ò ÓÖ ÔÖÓ ÙØ Ü ÑÔÐ ÓÒØÖ Ø ÓÒ Ñ Ô ÇÔ Ò ÆÒ ÕÙÓØ ÒØ Ò Ø ÓÖÖ ÔÓÒ Ò Ó ÓÖ Ø ÃÝÓ Æ Ý Ñ Ö Ù Ø Ë ÓÓÐ Ó Ë Ò ÃÝÓØÓ ÍÒ Ú Ö ØÝ ÁÒØ ÖÒ Ø ÓÒ Ð ÓÒ Ö Ò ÓÒ Ê ÒØ Ú Ò Ò Å Ø Ñ Ø Ò Ø ÔÔÐ Ø ÓÒ º Ë ÔØ Ñ Ö ¾ ß ¼ ¾¼¼ µ Ô ÖØÑ ÒØ Ó Å Ø Ñ Ø ÃÍ ÈÓ Ø Ö Ù Ø ÒØ Ö Ð ÙÑ Ã ÖÒ

More information

Communications Network Design: lecture 20 p.1/29

Communications Network Design: lecture 20 p.1/29 Ó ÔÔÐ Å Ø Ñ Ø ÔÐ Ò Ó Å Ø Ñ Ø Ð Ë Ò Ë ÓÓÐ ÓÑÑÙÒ Ø ÓÒ Æ ØÛÓÖ Ò Ð ØÙÖ ¾¼ Å ØØ Û ÊÓÙ Ò ÍÒ Ú Ö ØÝ Ó Ð Å Ö ¾ ¾¼¼ Communications Network Design: lecture 20 p.1/29 È È Ø ÓÖ Ö

More information

Contents. Bibliography 121. Index 123

Contents. Bibliography 121. Index 123 Contents 5 Advanced Data Types page 2 5.1 Sparse Arrays: Dictionary Arrays, Hashing Arrays, and Maps 2 5.2 The Implementation of the Data Type Map 14 5.3 Dictionaries and Sets 27 5.4 Priority Queues 28

More information

Tengyu Ma Facebook AI Research. Based on joint work with Yuanzhi Li (Princeton) and Hongyang Zhang (Stanford)

Tengyu Ma Facebook AI Research. Based on joint work with Yuanzhi Li (Princeton) and Hongyang Zhang (Stanford) Tengyu Ma Facebook AI Research Based on joint work with Yuanzhi Li (Princeton) and Hongyang Zhang (Stanford) Ø Over-parameterization: # parameters # examples Ø a set of parameters that can Ø fit to training

More information

Communications Network Design: lecture 19 p.1/32

Communications Network Design: lecture 19 p.1/32 Ó ÔÔÐ Å Ø Ñ Ø ÔÐ Ò Ó Å Ø Ñ Ø Ð Ë Ò Ë ÓÓÐ ÓÑÑÙÒ Ø ÓÒ Æ ØÛÓÖ Ò Ð ØÙÖ ½ Å ØØ Û ÊÓÙ Ò ÍÒ Ú Ö ØÝ Ó Ð Å Ö ¾ ¾¼¼ Communications Network Design: lecture 19 p.1/32 Æ ØÛÓÖ Ó Ò ØÛÓÖ

More information

Version-Based Recovery DLD

Version-Based Recovery DLD Version-Based Recovery DLD Mike Pershin 2008-04-15 1 Requirements 1. a server only replays a client update request when the update affects exactly the same versions of objects as it did in the original

More information

Verification. Lecture 3. Bernd Finkbeiner

Verification. Lecture 3. Bernd Finkbeiner Verification Lecture 3 Bernd Finkbeiner Plan for today CTL model checking Thebasicalgorithm Fairness Counterexamplesandwitnesses Review: Computation tree logic modal logic over infinite trees[clarke& Emerson

More information

Priority Queues & Heaps

Priority Queues & Heaps Priority Queues & Heaps Chapter 8-1 - The Java Collections Framework (Ordered Data Types) Interface Abstract Class Class Iterable Collection Queue Abstract Collection List Abstract Queue Abstract List

More information

The Effectiveness of Receipt-Based Attacks on ThreeBallot

The Effectiveness of Receipt-Based Attacks on ThreeBallot The Effectiveness of Receipt-Based Attacks on ThreeBallot Kevin Henry, Douglas R. Stinson, Jiayuan Sui David R. Cheriton School of Computer Science University of Waterloo Waterloo, N, N2L 3G1, Canada {k2henry,

More information

Game theoretical techniques have recently

Game theoretical techniques have recently [ Walid Saad, Zhu Han, Mérouane Debbah, Are Hjørungnes, and Tamer Başar ] Coalitional Game Theory for Communication Networks [A tutorial] Game theoretical techniques have recently become prevalent in many

More information

Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case

Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case Yevgeniy Dodis Department of Computer Science New York University Email: dodis@cs.nyu.edu Moti Yung Department of Computer Science

More information

Mathematical Theory of Democracy

Mathematical Theory of Democracy Andranik Tangian Mathematical Theory of Democracy 4y Springer Parti History 1 Athenian Democracy 3 1.1 Introduction 4 1.2 Path to Democracy 6 1.3 Establishing Democracy 15 1.4 Culmination of Democracy

More information

Real- Time Wireless Control Networks for Cyber- Physical Systems

Real- Time Wireless Control Networks for Cyber- Physical Systems Real- Time Wireless Control Networks for Cyber- Physical Systems Chenyang Lu Cyber- Physical Systems Laboratory Department of Computer Science and Engineering Wireless Control Networks Ø Real-time Ø Reliability

More information

Supporting Information Political Quid Pro Quo Agreements: An Experimental Study

Supporting Information Political Quid Pro Quo Agreements: An Experimental Study Supporting Information Political Quid Pro Quo Agreements: An Experimental Study Jens Großer Florida State University and IAS, Princeton Ernesto Reuben Columbia University and IZA Agnieszka Tymula New York

More information

Chapter. Sampling Distributions Pearson Prentice Hall. All rights reserved

Chapter. Sampling Distributions Pearson Prentice Hall. All rights reserved Chapter 8 Sampling Distributions 2010 Pearson Prentice Hall. All rights reserved Section 8.1 Distribution of the Sample Mean 2010 Pearson Prentice Hall. All rights reserved Objectives 1. Describe the distribution

More information

COULD SIMULATION OPTIMIZATION HAVE PREVENTED 2012 CENTRAL FLORIDA ELECTION LINES?

COULD SIMULATION OPTIMIZATION HAVE PREVENTED 2012 CENTRAL FLORIDA ELECTION LINES? Proceedings of the 2013 Winter Simulation Conference R. Pasupathy, S.-H. Kim, A. Tolk, R. Hill, and M. E. Kuhl, eds. COULD SIMULATION OPTIMIZATION HAVE PREVENTED 2012 CENTRAL FLORIDA ELECTION LINES? Jingsheng

More information

Homework 4 solutions

Homework 4 solutions Homework 4 solutions ASSIGNMENT: exercises 2, 3, 4, 8, and 17 in Chapter 2, (pp. 65 68). Solution to Exercise 2. A coalition that has exactly 12 votes is winning because it meets the quota. This coalition

More information

HOTELLING-DOWNS MODEL OF ELECTORAL COMPETITION AND THE OPTION TO QUIT

HOTELLING-DOWNS MODEL OF ELECTORAL COMPETITION AND THE OPTION TO QUIT HOTELLING-DOWNS MODEL OF ELECTORAL COMPETITION AND THE OPTION TO QUIT ABHIJIT SENGUPTA AND KUNAL SENGUPTA SCHOOL OF ECONOMICS AND POLITICAL SCIENCE UNIVERSITY OF SYDNEY SYDNEY, NSW 2006 AUSTRALIA Abstract.

More information

Thema Working Paper n Université de Cergy Pontoise, France

Thema Working Paper n Université de Cergy Pontoise, France Thema Working Paper n 2011-13 Université de Cergy Pontoise, France A comparison between the methods of apportionment using power indices: the case of the U.S. presidential elections Fabrice Barthelemy

More information

Real-Time Wireless Control Networks for Cyber-Physical Systems

Real-Time Wireless Control Networks for Cyber-Physical Systems Real-Time Wireless Control Networks for Cyber-Physical Systems Chenyang Lu Cyber-Physical Systems Laboratory Department of Computer Science and Engineering Wireless Control Networks Ø Real-time Sensor

More information

CS269I: Incentives in Computer Science Lecture #4: Voting, Machine Learning, and Participatory Democracy

CS269I: Incentives in Computer Science Lecture #4: Voting, Machine Learning, and Participatory Democracy CS269I: Incentives in Computer Science Lecture #4: Voting, Machine Learning, and Participatory Democracy Tim Roughgarden October 5, 2016 1 Preamble Last lecture was all about strategyproof voting rules

More information