829 research outputs found

    Sample path large deviations for queues with many inputs

    Get PDF
    This paper presents a large deviations principle for the average of real-valued processes indexed by the positive integers, one which is particularly suited to queueing systems with many traffic flows. Examples are given of how it may be applied to standard queues with finite and infinite buffers, to priority queues and to finding most likely paths to overflow

    Optimal scheduling algorithms for input-queued switches

    Get PDF

    Switched networks with maximum weight policies: Fluid approximation and multiplicative state space collapse

    Full text link
    We consider a queueing network in which there are constraints on which queues may be served simultaneously; such networks may be used to model input-queued switches and wireless networks. The scheduling policy for such a network specifies which queues to serve at any point in time. We consider a family of scheduling policies, related to the maximum-weight policy of Tassiulas and Ephremides [IEEE Trans. Automat. Control 37 (1992) 1936--1948], for single-hop and multihop networks. We specify a fluid model and show that fluid-scaled performance processes can be approximated by fluid model solutions. We study the behavior of fluid model solutions under critical load, and characterize invariant states as those states which solve a certain network-wide optimization problem. We use fluid model results to prove multiplicative state space collapse. A notable feature of our results is that they do not assume complete resource pooling.Comment: Published in at http://dx.doi.org/10.1214/11-AAP759 the Annals of Applied Probability (http://www.imstat.org/aap/) by the Institute of Mathematical Statistics (http://www.imstat.org

    The effect of latent confounding processes on the estimation of the strength of causal influences in chain-type networks

    Get PDF
    The authors acknowledge GTD TauRx Therapeutics centres for generous funding of this research.Peer reviewedPublisher PD

    Tau Aggregation Inhibitor Therapy : An Exploratory Phase 2 Study in Mild or Moderate Alzheimer's Disease

    Get PDF
    ACKNOWLEDGMENTS We thank patients and their caregivers for their participation in the study and are indebted to all the investigators involved in the study, particularly Drs. Douglas Fowlie and Donald Mowat for their helpful contributions to the clinical execution of the study in Scotland. We thank Sharon Eastwood, Parexel, for assistance in preparing initial drafts of the manuscript. We acknowledge constructive comments provided by Professors G. Wilcock and S. Gauthier on drafts of the article. CMW, CRH, and JMDS are officers of, and hold beneficial interests in, TauRx Therapeutics. RTS, PB, KK, and DJW are paid consultants to TauRx Therapeutics. The study was financed entirely by TauRx TherapeuticsPeer reviewedPublisher PD

    Tau-aggregation inhibitor therapy for Alzheimer's disease

    Get PDF
    Article Accepted Date: 9 December 2013 Copyright © 2014 The Authors. Published by Elsevier Inc. All rights reserved.Peer reviewedPublisher PD

    Constructing Semantics-Aware Adversarial Examples with Probabilistic Perspective

    Full text link
    In this study, we introduce a novel, probabilistic viewpoint on adversarial examples, achieved through box-constrained Langevin Monte Carlo (LMC). Proceeding from this perspective, we develop an innovative approach for generating semantics-aware adversarial examples in a principled manner. This methodology transcends the restriction imposed by geometric distance, instead opting for semantic constraints. Our approach empowers individuals to incorporate their personal comprehension of semantics into the model. Through human evaluation, we validate that our semantics-aware adversarial examples maintain their inherent meaning. Experimental findings on the MNIST and SVHN datasets demonstrate that our semantics-aware adversarial examples can effectively circumvent robust adversarial training methods tailored for traditional adversarial attacks.Comment: 17 pages, 14 figure

    Interference is not noise

    Get PDF
    This paper looks at the problem of designing wireless medium access algorithms. Inter-user interference at the receivers is an important characteristic of wireless networks. We show that decoding (or canceling) this interference results in significant improvement in the system performance over protocols that either treat interference as noise, or explicitly avoid interference at the receivers by allowing at most one of the transmitters in its range to transmit. This improvement in performance is realized by means of a medium access algorithm with: (a) polynomial computational complexity per timeslot, (b) polynomially bounded expected queue-length at the transmitters, and (c) a throughput region that is at least a polylogarithmic fraction of the largest possible throughput-region under any algorithm operating using that treats interference as noise. Thus, the hardness of low-delay network scheduling (a result by Shah, Tse and Tsitsiklis [1]) is an artifact of explicitly avoiding interference, or treating it as noise and can be overcome by a rather simple medium access algorithm that does not require information theoretic "block codes".United States. Defense Advanced Research Projects Agency. Information Theory for Mobile Ad-Hoc Networks Progra
    corecore