-
Pricing Mobile Data Offloading: A Distributed Market Framework
Authors:
Kehao Wang,
Francis C. M. Lau,
Lin Chen,
Robert Schober
Abstract:
Mobile data offloading is an emerging technology to avoid congestion in cellular networks and improve the level of user satisfaction. In this paper, we develop a distributed market framework to price the offloading service, and conduct a detailed analysis of the incentives for offloading service providers and conflicts arising from the interactions of different participators. Specifically, we form…
▽ More
Mobile data offloading is an emerging technology to avoid congestion in cellular networks and improve the level of user satisfaction. In this paper, we develop a distributed market framework to price the offloading service, and conduct a detailed analysis of the incentives for offloading service providers and conflicts arising from the interactions of different participators. Specifically, we formulate a multi-leader multi-follower Stackelberg game (MLMF-SG) to model the interactions between the offloading service providers and the offloading service consumers in the considered market framework, and investigate the cases where the offloading capacity of APs is unlimited and limited, respectively. For the case without capacity limit, we decompose the followers' game of the MLMF-SG (FG-MLMF-SG) into a number of simple follower games (FGs), and prove the existence and uniqueness of the equilibrium of the FGs from which the existence and uniqueness of the FG-MLMF-SG also follows. For the leaders' game of the MLMF-SG, we also prove the existence and uniqueness of the equilibrium. For the case with capacity limit, by considering a symmetric strategy profile, we establish the existence and uniqueness of the equilibrium of the corresponding MLMF-SG, and present a distributed algorithm that allows the leaders to achieve the equilibrium. Finally, extensive numerical experiments demonstrate that the Stackelberg equilibrium is very close to the corresponding social optimum for both considered cases.
△ Less
Submitted 16 September, 2014;
originally announced September 2014.
-
Optimal Rendezvous Strategies for Different Environments in Cognitive Radio Networks
Authors:
Haisheng Tan,
Jiajun Yu,
Hongyu Liang,
Tiancheng Lou,
Francis C. M. Lau
Abstract:
In Cognitive Radio Networks (CRNs), the secondary users (SUs) are allowed to access the licensed channels opportunistically. A fundamental and essential operation for SUs is to establish communication through choosing a common channel at the same time slot, which is referred to as rendezvous problem. In this paper, we study strategies to achieve fast rendezvous for two secondary users.
The chann…
▽ More
In Cognitive Radio Networks (CRNs), the secondary users (SUs) are allowed to access the licensed channels opportunistically. A fundamental and essential operation for SUs is to establish communication through choosing a common channel at the same time slot, which is referred to as rendezvous problem. In this paper, we study strategies to achieve fast rendezvous for two secondary users.
The channel availability for secondary nodes is subject to temporal and spatial variation. Moreover, in a distributed system, one user is oblivious of the other user's channel status. Therefore, a fast rendezvous is not trivial. Recently, a number of rendezvous strategies have been proposed for different system settings, but rarely have they taken the temporal variation of the channels into account. In this work, we first derive a time-adaptive strategy with optimal expected time-to-rendezvous (TTR) for synchronous systems in stable environments, where channel availability is assumed to be static over time. Next, in dynamic environments, which better represent temporally dynamic channel availability in CRNs, we first derive optimal strategies for two special cases, and then prove that our strategy is still asymptotically optimal in general dynamic cases.
Numerous simulations are conducted to demonstrate the performance of our strategies, and validate the theoretical analysis. The impacts of different parameters on the TTR are also investigated, such as the number of channels, the channel open possibilities, the extent of the environment being dynamic, and the existence of an intruder.
△ Less
Submitted 12 April, 2014;
originally announced April 2014.
-
RMCMC: A System for Updating Bayesian Models
Authors:
F. Din-Houn Lau,
Axel Gandy
Abstract:
A system to update estimates from a sequence of probability distributions is presented. The aim of the system is to quickly produce estimates with a user-specified bound on the Monte Carlo error. The estimates are based upon weighted samples stored in a database. The stored samples are maintained such that the accuracy of the estimates and quality of the samples is satisfactory. This maintenance i…
▽ More
A system to update estimates from a sequence of probability distributions is presented. The aim of the system is to quickly produce estimates with a user-specified bound on the Monte Carlo error. The estimates are based upon weighted samples stored in a database. The stored samples are maintained such that the accuracy of the estimates and quality of the samples is satisfactory. This maintenance involves varying the number of samples in the database and updating their weights. New samples are generated, when required, by a Markov chain Monte Carlo algorithm. The system is demonstrated using a football league model that is used to predict the end of season table. Correctness of the estimates and their accuracy is shown in a simulation using a linear Gaussian model.
△ Less
Submitted 3 June, 2014; v1 submitted 2 July, 2013;
originally announced July 2013.
-
A 2.0 Gb/s Throughput Decoder for QC-LDPC Convolutional Codes
Authors:
Chiu-Wing Sham,
Xu Chen,
Francis C. M. Lau,
Yue Zhao,
Wai M. Tam
Abstract:
This paper propose a decoder architecture for low-density parity-check convolutional code (LDPCCC). Specifically, the LDPCCC is derived from a quasi-cyclic (QC) LDPC block code. By making use of the quasi-cyclic structure, the proposed LDPCCC decoder adopts a dynamic message storage in the memory and uses a simple address controller. The decoder efficiently combines the memories in the pipelining…
▽ More
This paper propose a decoder architecture for low-density parity-check convolutional code (LDPCCC). Specifically, the LDPCCC is derived from a quasi-cyclic (QC) LDPC block code. By making use of the quasi-cyclic structure, the proposed LDPCCC decoder adopts a dynamic message storage in the memory and uses a simple address controller. The decoder efficiently combines the memories in the pipelining processors into a large memory block so as to take advantage of the data-width of the embedded memory in a modern field-programmable gate array (FPGA). A rate-5/6 QC-LDPCCC has been implemented on an Altera Stratix FPGA. It achieves up to 2.0 Gb/s throughput with a clock frequency of 100 MHz. Moreover, the decoder displays an excellent error performance of lower than $10^{-13}$ at a bit-energy-to-noise-power-spectral-density ratio ($E_b/N_0$) of 3.55 dB.
△ Less
Submitted 1 May, 2013;
originally announced May 2013.
-
Virtual Machine Trading in a Federation of Clouds: Individual Profit and Social Welfare Maximization
Authors:
Hongxing Li,
Chuan Wu,
Zongpeng Li,
Francis C. M. Lau
Abstract:
By sharing resources among different cloud providers, the paradigm of federated clouds exploits temporal availability of resources and geographical diversity of operational costs for efficient job service. While interoperability issues across different cloud platforms in a cloud federation have been extensively studied, fundamental questions on cloud economics remain: When and how should a cloud t…
▽ More
By sharing resources among different cloud providers, the paradigm of federated clouds exploits temporal availability of resources and geographical diversity of operational costs for efficient job service. While interoperability issues across different cloud platforms in a cloud federation have been extensively studied, fundamental questions on cloud economics remain: When and how should a cloud trade resources (e.g., virtual machines) with others, such that its net profit is maximized over the long run, while a close-to-optimal social welfare in the entire federation can also be guaranteed? To answer this question, a number of important, inter-related decisions, including job scheduling, server provisioning and resource pricing, should be dynamically and jointly made, while the long-term profit optimality is pursued. In this work, we design efficient algorithms for inter-cloud virtual machine (VM) trading and scheduling in a cloud federation. For VM transactions among clouds, we design a double-auction based mechanism that is strategyproof, individual rational, ex-post budget balanced, and efficient to execute over time. Closely combined with the auction mechanism is a dynamic VM trading and scheduling algorithm, which carefully decides the true valuations of VMs in the auction, optimally schedules stochastic job arrivals with different SLAs onto the VMs, and judiciously turns on and off servers based on the current electricity prices. Through rigorous analysis, we show that each individual cloud, by carrying out the dynamic algorithm in the online double auction, can achieve a time-averaged profit arbitrarily close to the offline optimum. Asymptotic optimality in social welfare is also achieved under homogeneous cloud settings. We carry out trace-driven simulations to examine the effectiveness of our algorithms and the achievable social welfare under heterogeneous cloud settings.
△ Less
Submitted 24 April, 2013;
originally announced April 2013.
-
vSkyConf: Cloud-assisted Multi-party Mobile Video Conferencing
Authors:
Yu Wu,
Chuan Wu,
Bo Li,
Francis C. M. Lau
Abstract:
As an important application in the busy world today, mobile video conferencing facilitates virtual face-to-face communication with friends, families and colleagues, via their mobile devices on the move. However, how to provision high-quality, multi-party video conferencing experiences over mobile devices is still an open challenge. The fundamental reason behind is the lack of computation and commu…
▽ More
As an important application in the busy world today, mobile video conferencing facilitates virtual face-to-face communication with friends, families and colleagues, via their mobile devices on the move. However, how to provision high-quality, multi-party video conferencing experiences over mobile devices is still an open challenge. The fundamental reason behind is the lack of computation and communication capacities on the mobile devices, to scale to large conferencing sessions. In this paper, we present vSkyConf, a cloud-assisted mobile video conferencing system to fundamentally improve the quality and scale of multi-party mobile video conferencing. By novelly employing a surrogate virtual machine in the cloud for each mobile user, we allow fully scalable communication among the conference participants via their surrogates, rather than directly. The surrogates exchange conferencing streams among each other, transcode the streams to the most appropriate bit rates, and buffer the streams for the most efficient delivery to the mobile recipients. A fully decentralized, optimal algorithm is designed to decide the best paths of streams and the most suitable surrogates for video transcoding along the paths, such that the limited bandwidth is fully utilized to deliver streams of the highest possible quality to the mobile recipients. We also carefully tailor a buffering mechanism on each surrogate to cooperate with optimal stream distribution. We have implemented vSkyConf based on Amazon EC2 and verified the excellent performance of our design, as compared to the widely adopted unicast solutions.
△ Less
Submitted 25 March, 2013;
originally announced March 2013.
-
Implement Blind Interference Alignment over Homogeneous 3-user 2x1 Broadcast Channel
Authors:
Qing F. Zhou,
Q. T. Zhang,
Francis C. M. Lau
Abstract:
This paper first studies the homogeneous 3-user 2x1 broadcast channel (BC) with no CSIT. We show a sufficient condition for it to achieve the optimal 3/2 degrees of freedom (DoF) by using Blind Interference Alignment (BIA). BIA refers to the interference alignment method without the need of CSIT. It further studies the 2x1 broadcast network in which there are K>=3 homogeneous single-antenna users,…
▽ More
This paper first studies the homogeneous 3-user 2x1 broadcast channel (BC) with no CSIT. We show a sufficient condition for it to achieve the optimal 3/2 degrees of freedom (DoF) by using Blind Interference Alignment (BIA). BIA refers to the interference alignment method without the need of CSIT. It further studies the 2x1 broadcast network in which there are K>=3 homogeneous single-antenna users, and their coherence time offsets are independently and uniformly distributed. We show that, if K>=11, the two-antenna transmitter can find, with more than 95% certainty, three users to form a BIA-feasible 3-user BC and achieve the optimal 3/2 DoF.
△ Less
Submitted 11 October, 2012; v1 submitted 15 September, 2012;
originally announced September 2012.
-
Diophantine Approach to Blind Interference Alignment of Homogeneous K-user 2x1 MISO Broadcast Channels
Authors:
Qing F. Zhou,
Q. T. Zhang,
Francis C. M. Lau
Abstract:
Although the sufficient condition for a blindly interference-aligned (BIA) 2-user 2x1 broadcast channel (BC) in homogeneous fading to achieve its maximal 4/3 DoF is well understood, its counterpart for the general K-user 2x1 MISO BC in homogeneous block fading to achieve the corresponding 2k/(2+K-1) (DoF) remains unsolved and is, thus, the focus of this paper. An interference channel is said BIA-f…
▽ More
Although the sufficient condition for a blindly interference-aligned (BIA) 2-user 2x1 broadcast channel (BC) in homogeneous fading to achieve its maximal 4/3 DoF is well understood, its counterpart for the general K-user 2x1 MISO BC in homogeneous block fading to achieve the corresponding 2k/(2+K-1) (DoF) remains unsolved and is, thus, the focus of this paper. An interference channel is said BIA-feasible if it achieves its maximal DoF only via BIA. In this paper, we cast this general feasibility problem in the framework of finding integer solutions for a system of linear Diophantine equations. By assuming independent user links each of the same coherence time and by studying the solvability of the Diophantine system, we derive the sufficient and necessary conditions on the K users' fading block offsets to ensure the BIA feasibility of the K-user BC. If the K offsets are independent and uniformly distributed over a coherence block, we can further prove that 11 users are enough for one to find, with certainty of 95%, 3 users among them to form a BIA-feasible 3-user 2x1 BC.
△ Less
Submitted 28 March, 2013; v1 submitted 14 September, 2012;
originally announced September 2012.
-
Performance Analysis of Protograph-based LDPC Codes with Spatial Diversity
Authors:
Yi Fang,
**** Chen,
Lin Wang,
Francis C. M. Lau,
Kai-Kit Wong
Abstract:
In wireless communications, spatial diversity techniques, such as space-time block code (STBC) and single-input multiple-output (SIMO), are employed to strengthen the robustness of the transmitted signal against channel fading. This paper studies the performance of protograph-based low-density parity-check (LDPC) codes with receive antenna diversity. We first propose a modified version of the prot…
▽ More
In wireless communications, spatial diversity techniques, such as space-time block code (STBC) and single-input multiple-output (SIMO), are employed to strengthen the robustness of the transmitted signal against channel fading. This paper studies the performance of protograph-based low-density parity-check (LDPC) codes with receive antenna diversity. We first propose a modified version of the protograph extrinsic information transfer (PEXIT) algorithm and use it for deriving the threshold of the protograph codes in a single-input multiple-output (SIMO) system. We then calculate the decoding threshold and simulate the bit error rate (BER) of two protograph codes (accumulate-repeat-by-3-accumulate (AR3A) code and accumulate-repeat-by-4-jagged-accumulate (AR4JA) code), a regular (3, 6) LDPC code and two optimized irregular LDPC codes. The results reveal that the irregular codes achieve the best error performance in the low signal-to-noise-ratio (SNR) region and the AR3A code outperforms all other codes in the high-SNR region. Utilizing the theoretical analyses and the simulated results, we further discuss the effect of the diversity order on the performance of the protograph codes. Accordingly, the AR3A code stands out as a good candidate for wireless communication systems with multiple receive antennas.
△ Less
Submitted 12 August, 2012;
originally announced August 2012.
-
Towards a better understanding of testing if conditionals
Authors:
Shimul Kumar Nath,
Robert Merkel,
Man Fai Lau,
Tanay Kanti Paul
Abstract:
Fault based testing is a technique in which test cases are chosen to reveal certain classes of faults. At present, testing professionals use their personal experience to select testing methods for fault classes considered the most likely to be present. However, there is little empirical evidence available in the open literature to support these intuitions. By examining the source code changes when…
▽ More
Fault based testing is a technique in which test cases are chosen to reveal certain classes of faults. At present, testing professionals use their personal experience to select testing methods for fault classes considered the most likely to be present. However, there is little empirical evidence available in the open literature to support these intuitions. By examining the source code changes when faults were fixed in seven open source software artifacts, we have classified bug fix patterns into fault classes, and recorded the relative frequencies of the identified fault classes. This paper reports our findings related to "if-conditional" fixes. We have classified the "if-conditional" fixes into fourteen fault classes and calculated their frequencies. We found the most common fault class related to changes within a single "atom". The next most common fault was the omission of an "atom". We analysed these results in the context of Boolean specification testing.
△ Less
Submitted 30 May, 2012;
originally announced May 2012.
-
Optimality of Non-Restarting CUSUM charts
Authors:
F. Din-Houn Lau,
Axel Gandy
Abstract:
We show optimality, in a well-defined sense, using cumulative sum (CUSUM) charts for detecting changes in distributions. We consider a setting with multiple changes between two known distributions. This result advocates the use of non-restarting CUSUM charts with an upper boundary. Typically, after signalling, a CUSUM chart is restarted by setting it to some value below the threshold. A non-restar…
▽ More
We show optimality, in a well-defined sense, using cumulative sum (CUSUM) charts for detecting changes in distributions. We consider a setting with multiple changes between two known distributions. This result advocates the use of non-restarting CUSUM charts with an upper boundary. Typically, after signalling, a CUSUM chart is restarted by setting it to some value below the threshold. A non-restarting CUSUM chart is not reset after signalling; thus is able to signal continuously. Imposing an upper boundary prevents the CUSUM chart rising too high, which facilitates detection in our setting. We discuss, via simulations, how the choice of the upper boundary changes the signals made by the non-restarting CUSUM charts.
△ Less
Submitted 9 May, 2012;
originally announced May 2012.
-
Non-Restarting CUSUM charts and Control of the False Discovery Rate
Authors:
Axel Gandy,
F. Din-Houn Lau
Abstract:
Cumulative sum (CUSUM) charts are typically used to detect changes in a stream of observations e.g. shifts in the mean. Usually, after signalling, the chart is restarted by setting it to some value below the signalling threshold. We propose a non-restarting CUSUM chart which is able to detect periods during which the stream is out of control. Further, we advocate an upper boundary to prevent the C…
▽ More
Cumulative sum (CUSUM) charts are typically used to detect changes in a stream of observations e.g. shifts in the mean. Usually, after signalling, the chart is restarted by setting it to some value below the signalling threshold. We propose a non-restarting CUSUM chart which is able to detect periods during which the stream is out of control. Further, we advocate an upper boundary to prevent the CUSUM chart rising too high, which helps detecting a change back into control. We present a novel algorithm to control the false discovery rate (FDR) pointwise in time when considering CUSUM charts based on multiple streams of data. We prove that the FDR is controlled under two definitions of a false discovery simultaneously. Simulations reveal the difference in FDR control when using these two definitions and other desirable definitions of a false discovery.
△ Less
Submitted 19 April, 2012;
originally announced April 2012.
-
Implementation Of Decoders for LDPC Block Codes and LDPC Convolutional Codes Based on GPUs
Authors:
Yue Zhao,
Francis C. M. Lau
Abstract:
With the use of belief propagation (BP) decoding algorithm, low-density parity-check (LDPC) codes can achieve near-Shannon limit performance. In order to evaluate the error performance of LDPC codes, simulators running on CPUs are commonly used. However, the time taken to evaluate LDPC codes with very good error performance is excessive. In this paper, efficient LDPC block-code decoders/simulators…
▽ More
With the use of belief propagation (BP) decoding algorithm, low-density parity-check (LDPC) codes can achieve near-Shannon limit performance. In order to evaluate the error performance of LDPC codes, simulators running on CPUs are commonly used. However, the time taken to evaluate LDPC codes with very good error performance is excessive. In this paper, efficient LDPC block-code decoders/simulators which run on graphics processing units (GPUs) are proposed. We also implement the decoder for the LDPC convolutional code (LDPCCC). The LDPCCC is derived from a pre-designed quasi-cyclic LDPC block code with good error performance. Compared to the decoder based on the randomly constructed LDPCCC code, the complexity of the proposed LDPCCC decoder is reduced due to the periodicity of the derived LDPCCC and the properties of the quasi-cyclic structure. In our proposed decoder architecture, $Γ$ (a multiple of a warp) codewords are decoded together and hence the messages of $Γ$ codewords are also processed together. Since all the $Γ$ codewords share the same Tanner graph, messages of the $Γ$ distinct codewords corresponding to the same edge can be grouped into one package and stored linearly. By optimizing the data structures of the messages used in the decoding process, both the read and write processes can be performed in a highly parallel manner by the GPUs. In addition, a thread hierarchy minimizing the divergence of the threads is deployed, and it can maximize the efficiency of the parallel execution. With the use of a large number of cores in the GPU to perform the simple computations simultaneously, our GPU-based LDPC decoder can obtain hundreds of times speedup compared with a serial CPU-based simulator and over 40 times speedup compared with an 8-thread CPU-based simulator.
△ Less
Submitted 26 July, 2012; v1 submitted 2 April, 2012;
originally announced April 2012.
-
Analysis of telephone network traffic based on a complex user network
Authors:
Yongxiang Xia,
Chi K. Tse,
Francis C. M. Lau,
Wai Man Tam,
Michael Small
Abstract:
The traffic in telephone networks is analyzed in this paper. Unlike the classical traffic analysis where call blockings are due to the limited channel capacity, we consider here a more realistic cause for call blockings which is due to the way in which users are networked in a real-life human society. Furthermore, two kinds of user network, namely, the fully-connected user network and the scale-…
▽ More
The traffic in telephone networks is analyzed in this paper. Unlike the classical traffic analysis where call blockings are due to the limited channel capacity, we consider here a more realistic cause for call blockings which is due to the way in which users are networked in a real-life human society. Furthermore, two kinds of user network, namely, the fully-connected user network and the scale-free network, are employed to model the way in which telephone users are connected. We show that the blocking probability is generally higher in the case of the scale-free user network, and that the carried traffic intensity is practically limited not only by the network capacity but also by the property of the user network.
△ Less
Submitted 5 January, 2006;
originally announced January 2006.