• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations
Advanced Search Include Citations

Probability: Theory and Examples (1995)

by R Durrett
Add To MetaCart

Tools

Sorted by:
Results 1 - 10 of 1,331
Next 10 →

Spray and Wait: An Efficient Routing Scheme for Intermittently Connected Mobile Networks

by Thrasyvoulos Spyropoulos , Konstantinos Psounis , Cauligi S. Raghavendra , 2001
"... Intermittently connected mobile networks are sparse wireless networks where most of the time there does not exist a complete path from the source to the destination. These networks ..."
Abstract - Cited by 503 (10 self) - Add to MetaCart
Intermittently connected mobile networks are sparse wireless networks where most of the time there does not exist a complete path from the source to the destination. These networks

Introduction to the non-asymptotic analysis of random matrices

by Roman Vershynin , 2010
"... ..."
Abstract - Cited by 361 (21 self) - Add to MetaCart
Abstract not found

Efficient routing in intermittently connected mobile networks: The multiple-copy case

by Thrasyvoulos Spyropoulos, Konstantinos Psounis, Cauligi S. Raghavendra , 2008
"... Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc net ..."
Abstract - Cited by 303 (18 self) - Add to MetaCart
Intermittently connected mobile networks are wireless networks where most of the time there does not exist a complete path from the source to the destination. There are many real networks that follow this model, for example, wildlife tracking sensor networks, military networks, vehicular ad hoc networks, etc. In this context, conventional routing schemes fail, because they try to establish complete end-to-end paths, before any data is sent. To deal with such networks researchers have suggested to use flooding-based routing schemes. While flooding-based schemes have a high probability of delivery, they waste a lot of energy and suffer from severe contention which can significantly degrade their performance. Furthermore, proposed efforts to reduce the overhead of flooding-based schemes have often been plagued by large delays. With this in mind, we introduce a new family of routing schemes that “spray ” a few message copies into the network, and then route each copy independently towards the destination. We show that, if carefully designed, spray routing not only performs significantly fewer transmissions per message, but also has lower average delivery delays than existing schemes; furthermore, it is highly scalable and retains good performance under a large range of scenarios. Finally, we use our theoretical framework proposed in our 2004 paper to analyze the performance of spray routing. We also use this theory to show how to choose the number of copies to be sprayed and how to optimally distribute these copies to relays.

Consistency of the group lasso and multiple kernel learning

by Francis R. Bach - JOURNAL OF MACHINE LEARNING RESEARCH , 2007
"... We consider the least-square regression problem with regularization by a block 1-norm, i.e., a sum of Euclidean norms over spaces of dimensions larger than one. This problem, referred to as the group Lasso, extends the usual regularization by the 1-norm where all spaces have dimension one, where it ..."
Abstract - Cited by 274 (33 self) - Add to MetaCart
We consider the least-square regression problem with regularization by a block 1-norm, i.e., a sum of Euclidean norms over spaces of dimensions larger than one. This problem, referred to as the group Lasso, extends the usual regularization by the 1-norm where all spaces have dimension one, where it is commonly referred to as the Lasso. In this paper, we study the asymptotic model consistency of the group Lasso. We derive necessary and sufficient conditions for the consistency of group Lasso under practical assumptions, such as model misspecification. When the linear predictors and Euclidean norms are replaced by functions and reproducing kernel Hilbert norms, the problem is usually referred to as multiple kernel learning and is commonly used for learning from heterogeneous data sources and for non linear variable selection. Using tools from functional analysis, and in particular covariance operators, we extend the consistency results to this infinite dimensional case and also propose an adaptive scheme to obtain a consistent model estimate, even when the necessary condition required for the non adaptive scheme is not satisfied.
(Show Context)

Citation Context

...roof We give a proof by contradiction, and we thus assume that there exists M > 0 such that liminfn→∞P(µnn1/2 <M) > 0. This imposes that there exists a subsequence which is almost surely bounded byM (=-=Durrett, 2004-=-). Thus, we can take a further subsequence which converges to a limit µ0 ∈ [0,∞). We now consider such a subsequence (and still use the notation of the original sequence for simplicity). With probabil...

GALERKIN FINITE ELEMENT APPROXIMATIONS OF STOCHASTIC ELLIPTIC PARTIAL DIFFERENTIAL EQUATIONS

by Ivo Babuska, Raul Tempone, Georgios E. Zouraris , 2004
"... We describe and analyze two numerical methods for a linear elliptic problem with stochastic coefficients and homogeneous Dirichlet boundary conditions. Here the aim of the computations is to approximate statistical moments of the solution, and, in particular, we give a priori error estimates for the ..."
Abstract - Cited by 193 (11 self) - Add to MetaCart
We describe and analyze two numerical methods for a linear elliptic problem with stochastic coefficients and homogeneous Dirichlet boundary conditions. Here the aim of the computations is to approximate statistical moments of the solution, and, in particular, we give a priori error estimates for the computation of the expected value of the solution. The first method generates independent identically distributed approximations of the solution by sampling the coefficients of the equation and using a standard Galerkin finite element variational formulation. The Monte Carlo method then uses these approximations to compute corresponding sample averages. The second method is based on a finite dimensional approximation of the stochastic coefficients, turning the original stochastic problem into a deterministic parametric elliptic problem. A Galerkin finite element method, of either the h- or p-version, then approximates the corresponding deterministic solution, yielding approximations of the desired statistics. We present a priori error estimates and include a comparison of the computational work required by each numerical approximation to achieve a given accuracy. This comparison suggests intuitive conditions for an optimal selection of the numerical approximation.

Longest increasing subsequences: from patience sorting to the Baik-Deift-Johansson theorem

by David Aldous, Persi Diaconis - BULL. AMER. MATH. SOC. (N.S , 1999
"... We describe a simple one-person card game, patience sorting. Its analysis leads to a broad circle of ideas linking Young tableaux with the longest increasing subsequence of a random permutation via the Schensted correspondence. A recent highlight of this area is the work of Baik-Deift-Johansson wh ..."
Abstract - Cited by 183 (2 self) - Add to MetaCart
We describe a simple one-person card game, patience sorting. Its analysis leads to a broad circle of ideas linking Young tableaux with the longest increasing subsequence of a random permutation via the Schensted correspondence. A recent highlight of this area is the work of Baik-Deift-Johansson which yields limiting probability laws via hard analysis of Toeplitz determinants.
(Show Context)

Citation Context

... -- see (6). The purpose of that representation is a superadditivity property which easily implies E[L n ]scn 1=2 for some unspecified c. Hammersley's construction is nowadays a textbook application (=-=[13] Example 6-=-.7.2) of the subadditive ergodic theorem, which in our context implies P (jn \Gamma1=2 L n \Gamma cj ? &quot;) ! 0; &quot; ? 0: But these methods do not directly specify the value of c, which from The...

General state space Markov chains and MCMC algorithm

by Gareth O. Roberts, Jeffrey S. Rosenthal - PROBABILITY SURVEYS , 2004
"... This paper surveys various results about Markov chains on general (non-countable) state spaces. It begins with an introduction to Markov chain Monte Carlo (MCMC) algorithms, which provide the motivation and context for the theory which follows. Then, sufficient conditions for geometric and uniform e ..."
Abstract - Cited by 177 (35 self) - Add to MetaCart
This paper surveys various results about Markov chains on general (non-countable) state spaces. It begins with an introduction to Markov chain Monte Carlo (MCMC) algorithms, which provide the motivation and context for the theory which follows. Then, sufficient conditions for geometric and uniform ergodicity are presented, along with quantitative bounds on the rate of convergence to stationarity. Many of these results are proved using direct coupling constructions based on minorisation and drift conditions. Necessary and sufficient conditions for Central Limit Theorems (CLTs) are also presented, in some cases proved via the Poisson Equation or direct regeneration constructions. Finally, optimal scaling and weak convergence results for Metropolis-Hastings algorithms are discussed. None of the results presented is new, though many of the proofs are. We also describe some Open Problems.

Probability on trees and networks

by Russell Lyons, Yuval Peres , 2005
"... ..."
Abstract - Cited by 158 (9 self) - Add to MetaCart
Abstract not found
(Show Context)

Citation Context

...is natural to ask whether its speed is, in fact, smaller than (e d − 1)/(e d + 1). This is true and was shown by Virág (2000b). For a treatment of classical harmonic measure, see Garnett and Marshall =-=(2005)-=-. §16.12. Collected In-Text Exercises. 16.1. Show that Lemma 16.1 may not be true if µ is an infinite stationary measure. 16.2. Let G = (V, E) be a finite connected graph. For x ∈ V, let Tx be the uni...

Energy-efficient packet transmission over a wireless link

by Elif Uysal-biyikoglu, Balaji Prabhakar, Abbas El Gamal - IEEE/ACM TRANS. NETWORKING , 2002
"... The paper considers the problem of minimizing the energy used to transmit packets over a wireless link via lazy schedules that judiciously vary packet transmission times. The problem is motivated by the following observation. With many channel coding schemes, the energy required to transmit a packe ..."
Abstract - Cited by 149 (5 self) - Add to MetaCart
The paper considers the problem of minimizing the energy used to transmit packets over a wireless link via lazy schedules that judiciously vary packet transmission times. The problem is motivated by the following observation. With many channel coding schemes, the energy required to transmit a packet can be significantly reduced by lowering transmission power and code rate, and therefore transmitting the packet over a longer period of time. However, information is often time-critical or delay-sensitive and transmission times cannot be made arbitrarily long. We therefore consider packet transmission schedules that minimize energy subject to a deadline or a delay constraint. Specifically, we obtain an optimal offline schedule for a node operating under a deadline constraint. An inspection of the form of this schedule naturally leads us to an online schedule which is shown, through simulations, to perform closely to the optimal offline schedule. Taking the deadline to infinity, we provide an exact probabilistic analysis of our offline scheduling algorithm. The results of this analysis enable us to devise a lazy online algorithm that varies transmission times according to backlog. We show that this lazy schedule is significantly more energy-efficient compared to a deterministic (fixed transmission time) schedule that guarantees queue stability for the same range of arrival rates.

Asymptotic enumeration methods

by A. M. Odlyzko - Handbook of Combinatorics , 1995
"... ..."
Abstract - Cited by 140 (0 self) - Add to MetaCart
Abstract not found
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University