829 research outputs found
Sample path large deviations for queues with many inputs
This paper presents a large deviations principle for the average of real-valued processes indexed by the positive integers, one which is particularly suited to queueing systems with many traffic flows. Examples are given of how it may be applied to standard queues with finite and infinite buffers, to priority queues and to finding most likely paths to overflow
Switched networks with maximum weight policies: Fluid approximation and multiplicative state space collapse
We consider a queueing network in which there are constraints on which queues
may be served simultaneously; such networks may be used to model input-queued
switches and wireless networks. The scheduling policy for such a network
specifies which queues to serve at any point in time. We consider a family of
scheduling policies, related to the maximum-weight policy of Tassiulas and
Ephremides [IEEE Trans. Automat. Control 37 (1992) 1936--1948], for single-hop
and multihop networks. We specify a fluid model and show that fluid-scaled
performance processes can be approximated by fluid model solutions. We study
the behavior of fluid model solutions under critical load, and characterize
invariant states as those states which solve a certain network-wide
optimization problem. We use fluid model results to prove multiplicative state
space collapse. A notable feature of our results is that they do not assume
complete resource pooling.Comment: Published in at http://dx.doi.org/10.1214/11-AAP759 the Annals of
Applied Probability (http://www.imstat.org/aap/) by the Institute of
Mathematical Statistics (http://www.imstat.org
The effect of latent confounding processes on the estimation of the strength of causal influences in chain-type networks
The authors acknowledge GTD TauRx Therapeutics centres for generous funding of this research.Peer reviewedPublisher PD
Recommended from our members
The price of choice: models, paradoxes, and inference for 'mobility as a service'
A city’s transportation network is made up of
subsystems, often under separate management, linked together
through the choices made by users. This paper introduces
a transport model which combines a discrete choice model
of users, with a resource allocation model of a subsystems.
This combined model gives a direct economic interpretation
of tradeoffs in the system. For example, it tells us how much
of a rideshare price is attributable to the cost of running the
platform and how much is profit-making. The model can also
be used to predict knock-on effects in the style of Braess’s
paradox, where an improvement in one part of the network
might induce problems in other parts because of selfish choices
made by users and by subsystems.Toyota Mobility Foundatio
Tau Aggregation Inhibitor Therapy : An Exploratory Phase 2 Study in Mild or Moderate Alzheimer's Disease
ACKNOWLEDGMENTS We thank patients and their caregivers for their participation in the study and are indebted to all the investigators involved in the study, particularly Drs. Douglas Fowlie and Donald Mowat for their helpful contributions to the clinical execution of the study in Scotland. We thank Sharon Eastwood, Parexel, for assistance in preparing initial drafts of the manuscript. We acknowledge constructive comments provided by Professors G. Wilcock and S. Gauthier on drafts of the article. CMW, CRH, and JMDS are officers of, and hold beneficial interests in, TauRx Therapeutics. RTS, PB, KK, and DJW are paid consultants to TauRx Therapeutics. The study was financed entirely by TauRx TherapeuticsPeer reviewedPublisher PD
Tau-aggregation inhibitor therapy for Alzheimer's disease
Article Accepted Date: 9 December 2013 Copyright © 2014 The Authors. Published by Elsevier Inc. All rights reserved.Peer reviewedPublisher PD
Constructing Semantics-Aware Adversarial Examples with Probabilistic Perspective
In this study, we introduce a novel, probabilistic viewpoint on adversarial
examples, achieved through box-constrained Langevin Monte Carlo (LMC).
Proceeding from this perspective, we develop an innovative approach for
generating semantics-aware adversarial examples in a principled manner. This
methodology transcends the restriction imposed by geometric distance, instead
opting for semantic constraints. Our approach empowers individuals to
incorporate their personal comprehension of semantics into the model. Through
human evaluation, we validate that our semantics-aware adversarial examples
maintain their inherent meaning. Experimental findings on the MNIST and SVHN
datasets demonstrate that our semantics-aware adversarial examples can
effectively circumvent robust adversarial training methods tailored for
traditional adversarial attacks.Comment: 17 pages, 14 figure
Interference is not noise
This paper looks at the problem of designing wireless medium access algorithms. Inter-user interference at the receivers is an important characteristic of wireless networks. We show that decoding (or canceling) this interference results in significant improvement in the system performance over protocols that either treat interference as noise, or explicitly avoid interference at the receivers by allowing at most one of the transmitters in its range to transmit. This improvement in performance is realized by means of a medium access algorithm with: (a) polynomial computational complexity per timeslot, (b) polynomially bounded expected queue-length at the transmitters, and (c) a throughput region that is at least a polylogarithmic fraction of the largest possible throughput-region under any algorithm operating using that treats interference as noise. Thus, the hardness of low-delay network scheduling (a result by Shah, Tse and Tsitsiklis [1]) is an artifact of explicitly avoiding interference, or treating it as noise and can be overcome by a rather simple medium access algorithm that does not require information theoretic "block codes".United States. Defense Advanced Research Projects Agency. Information Theory for Mobile Ad-Hoc Networks Progra
- …