The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents the stability and criticality analysis of integer linear programs with respect to perturbations in stochastic data given as Markov chains. These perturbations affect the initial distribution, the transition matrix, or the stationary distribution of Markov chains. Stability analysis is concerned with obtaining the set of all perturbations for which a solution remains optimal. This...
We study the competition over epidemic networks within a game-theoretic framework. Based on the homogeneous n-intertwined Markov model for epidemic spread, we introduce a novel epidemic competition between a network designer and an intelligent adversary, where the designer can protect the network by increasing the curing rate and the adversary, on the contrary, is able to manipulate the infection...
In this paper, we identify sufficient conditions for Lyapunov Mean Square Stability (LMSS) of a contention-based network of first-order systems, with state-based schedulers. The stability analysis helps us to choose policies for adapting the scheduler threshold to the delay from the network and scheduler. We show that three scheduling laws can result in LMSS: constant-probability laws and additively...
In this work, we model a random access multicast network with cooperative relaying and analyze its throughput. The network consists of two source nodes and two destination nodes, where both source nodes generate data that needs to be transmitted to both destination nodes. We study the possibility that one of the sources can also act as a cooperative relay by transmitting some of the packets originating...
We develop a multi-input, multi-output direct adaptive controller for discrete-time, possibly nonminimum-phase, systems with unknown nonminimum-phase zeros. The adaptive controller requires limited modeling information about the system, specifically, Markov parameters from the control input to the performance variables. Often, only a single Markov parameter is required, even in the nonminimum-phase...
The applications of dynamic content updates for a group of users, for example weather report and traffic congestion broadcast, have been shown to benefit significantly from Delay Tolerant Networks (DTN) communication mechanisms such as opportunistic contact and user sharing. In this paper, we study the dynamic content updates over energy-constrained DTN, and focus on its asymptotic properties about...
In this paper, we investigate networks grow in time according to an attachment rule that is either random or preferential. Based on Markov chain theory, paper provides a rigorous proof for the existence of the steady-state degree distribution of the network generated by this model and gets its corresponding exact formulas. In particular, if attachment rule has preferential attachment, degree distribution...
In recent years, the proliferation of the world wide web has lead toan increase in the number of public auctions on the internet. One ofthe characteristics of online auctions is that a successfulimplementation requires a high volume of buyers and sellers at itswebsite. Consequently, auction sites which have a high volume oftraffic have an advantage over those in which the volume is limited.This results...
In this paper, we consider a continuous review perishable inventory system with multi-server service facility. In such systems the demanded item is delivered to the customer only after performing some service, such as assembly of parts or installation, etc. Compared to most inventory models in which inventory is depleted at the demand rate, it is depleted, in this model, at the rate that the service...
Cognitive and cooperative technologies are two core components in the design of next generation wireless networks. One key issue associated with cognitive transmission is the inefficient spectrum sharing of the secondary system, especially for secondary communications separated by long distance. To boost the spectrum sharing efficiency, cognitive multi-relay system appears to be an attractive solution...
This paper explore the swarm intelligence stability based on stochastic diffusion search (SDS) which is capable to find rapid location of the optimal solution in the search space. Population based search mechanisms employed by Swarm Intelligence methods can suffer lack of convergence resulting in ill defined stopping criteria and loss of the best solution. Conversely, as a result of the positive feedback...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.