We use cookies to distinguish you from other users and to provide you with a better experience on our websites. Close this message to accept cookies or find out how to manage your cookie settings.
To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Using a new approach, for spectrally negative Lévy processes we find joint Laplace transforms involving the last exit time (from a semiinfinite interval), the value of the process at the last exit time, and the associated occupation time, which generalize some previous results.
We observe the frog model, an infinite system of interacting random walks, on ℤ with an asymmetric underlying random walk. For certain initial frog distributions we construct an explicit formula for the moments of the leftmost visited site, as well as their asymptotic scaling limits as the drift of the underlying random walk vanishes. We also provide conditions in which the lower bound can be scaled to converge in probability to the degenerate distribution at 1 as the drift vanishes.
Batch service has a wide application in manufacturing, communication networks, and cloud computing. In batch service queues with limited resources, one critical issue is to properly schedule the service so as to ensure the quality of service. In this paper we consider an M/G[a,b]/1/N batch service queue with bulking threshold a, max service capacity b, and buffer capacity N, where N can be finite or infinite. Through renewal theory, busy period analysis and decomposition techniques, we demonstrate explicitly how the bulking threshold influences the system performance such as the mean waiting time and time-averaged number of loss customers in batch service queues. We then establish a necessary and sufficient condition on the optimal bulking threshold that minimizes the expected waiting time. Enabled by this condition, we propose a simple algorithm which guarantees to find the optimal threshold in polynomial time. The performance of the algorithm is also demonstrated by numerical examples.
A critical branching process {Zk, k = 0, 1, 2, ...} in a random environment is considered. A conditional functional limit theorem for the properly scaled process {log Zpu, 0 ≤ u < ∞} is established under the assumptions that Zn > 0 and p ≪ n. It is shown that the limiting process is a Lévy process conditioned to stay nonnegative. The proof of this result is based on a limit theorem describing the distribution of the initial part of the trajectories of a driftless random walk conditioned to stay nonnegative.
Modern processing networks often consist of heterogeneous servers with widely varying capabilities, and process job flows with complex structure and requirements. A major challenge in designing efficient scheduling policies in these networks is the lack of reliable estimates of system parameters, and an attractive approach for addressing this challenge is to design robust policies, i.e. policies that do not use system parameters such as arrival and/or service rates for making scheduling decisions. In this paper we propose a general framework for the design of robust policies. The main technical novelty is the use of a stochastic gradient projection method that reacts to queue-length changes in order to find a balanced allocation of service resources to incoming tasks. We illustrate our approach on two broad classes of processing systems, namely the flexible fork-join networks and the flexible queueing networks, and prove the rate stability of our proposed policies for these networks under nonrestrictive assumptions.
We study the evolution of cooperation in an interacting particle system with two types. The model we investigate is an extension of a two-type biased voter model. One type (called defector) has a (positive) bias α with respect to the other type (called cooperator). However, a cooperator helps a neighbor (either defector or cooperator) to reproduce at rate γ. We prove that the one-dimensional nearest-neighbor interacting dynamical system exhibits a phase transition at α = γ. A special choice of interaction kernels yield that for α > γ cooperators always die out, but if γ > α, cooperation is the winning strategy.
We study the joint degree counts in linear preferential attachment random graphs and find a simple representation for the limit distribution in infinite sequence space. We show weak convergence with respect to the p-norm topology for appropriate p and also provide optimal rates of convergence of the finite-dimensional distributions. The results hold for models with any general initial seed graph and any fixed number of initial outgoing edges per vertex; we generate nontree graphs using both a lumping and a sequential rule. Convergence of the order statistics and optimal rates of convergence to the maximum of the degrees is also established.
The vertices of the kth power of a directed path with n vertices are exposed one by one to a selector in some random order. At any time the selector can see the graph induced by the vertices that have already appeared. The selector's aim is to choose online the maximal vertex (i.e. the vertex with no outgoing edges). We give upper and lower bounds for the asymptotic behaviour of pn,kn1/(k+1), where pn,k is the probability of success under the optimal algorithm. In order to derive the upper bound, we consider a model in which the selector obtains some extra information about the edges that have already appeared. We give the exact asymptotics of the probability of success under the optimal algorithm in this case. In order to derive the lower bound, we analyse a site percolation process on a sequence of the kth powers of a directed path with n vertices.
We consider a server with large capacity delivering video files encoded in various resolutions. We assume that the system is under saturation in the sense that the total demand exceeds the server capacity C. In such a case, requests may be rejected. For the policies considered in this paper, instead of rejecting a video request, it is downgraded. When the occupancy of the server is above some value C0 < C, the server delivers the video at a minimal bit rate. The quantity C0 is the bit rate adaptation threshold. For these policies, request blocking is thus replaced with bit rate adaptation. Under the assumptions of Poisson request arrivals and exponential service times, we show that, by rescaling the system, a process associated with the occupancy of the server converges to some limiting process whose invariant distribution is computed explicitly. This allows us to derive an asymptotic expression of the key performance measure of such a policy, namely the equilibrium probability that a request is transmitted at requested bitrate. Numerical applications of these results are presented.
In this paper we propose a model for biological neural nets where the activity of the network is described by Hawkes processes having a variable length memory. The particularity in this paper is that we deal with an infinite number of components. We propose a graphical construction of the process and build, by means of a perfect simulation algorithm, a stationary version of the process. To implement this algorithm, we make use of a Kalikow-type decomposition technique. Two models are described in this paper. In the first model, we associate to each edge of the interaction graph a saturation threshold that controls the influence of a neuron on another. In the second model, we impose a structure on the interaction graph leading to a cascade of spike trains. Such structures, where neurons are divided into layers, can be found in the retina.
In this paper we identify three questions concerning the management of risk networks with a central branch, which may be solved using the extensive machinery available for one-dimensional risk models. First, we propose a criterion for judging whether a subsidiary is viable by its readiness to pay dividends to the central branch, as reflected by the optimality of the zero-level dividend barrier. Next, for a deterministic central branch which must bailout a single subsidiary each time its surplus becomes negative, we determine the optimal bailout policy, as well as the ruin probability and other risk measures, in closed form. Moreover, we extend these results to the case of hierarchical networks. Finally, for nondeterministic central branches with one subsidiary, we compute approximate risk measures by applying rational approximations, and by using the recently developed matrix scale methodology.
We study a simple random process in which vertices of a connected graph reach consensus through pairwise interactions. We compute outcome probabilities, which do not depend on the graph structure, and consider the expected time until a consensus is reached. In some cases we are able to show that this is minimised by Kn. We prove an upper bound for the p=0 case and give a family of graphs which asymptotically achieve this bound. In order to obtain the mean of the waiting time we also study a gambler's ruin process with delays. We give the mean absorption time and prove that it monotonically increases with p∈[0,1∕2] for symmetric delays.
We are interested in a large queue in a GI/G/k queue with heterogeneous servers. For this, we consider tail asymptotics and weak limit approximations for the stationary distribution of its queue length process in continuous time under a stability condition. Here, two weak limit approximations are considered. One is when the variances of the interarrival and/or service times are bounded, and the other is when they become large. Both require a heavy-traffic condition. Tail asymptotics and heavy-traffic approximations have been separately studied in the literature. We develop a unified approach based on a martingale produced by a good test function for a Markov process to answer both problems.
We establish a local martingale M associate with f(X,Y) under some restrictions on f, where Y is a process of bounded variation (on compact intervals) and either X is a jump diffusion (a special case being a Lévy process) or X is some general (càdlàg metric-space valued) Markov process. In the latter case, f is restricted to the form f(x,y)=∑k=1Kξk(x)ηk(y). This local martingale unifies both Dynkin's formula for Markov processes and the Lebesgue–Stieltjes integration (change of variable) formula for (right-continuous) functions of bounded variation. For the jump diffusion case, when further relatively easily verifiable conditions are assumed, then this local martingale becomes an L2-martingale. Convergence of the product of this Martingale with some deterministic function ( of time ) to 0 both in L2 and almost sure is also considered and sufficient conditions for functions for which this happens are identified.
A service system with multiple types of customers, arriving according to Poisson processes, is considered. The system is heterogeneous in that the servers can also be of multiple types. Each customer has an independent, exponentially distributed service time, with the mean determined by its type. Multiple customers (possibly of different types) can be placed for service into one server, subject to `packing' constraints, which depend on the server type. Service times of different customers are independent, even if served simultaneously by the same server. The large-scale asymptotic regime is considered such that the customer arrival rates grow to ∞. We consider two variants of the model. For the infinite-server model, we prove asymptotic optimality of the greedy random (GRAND) algorithm in the sense of minimizing the weighted (by type) number of occupied servers in steady state. (This version of GRAND generalizes that introduced by Stolyar and Zhong (2015) for homogeneous systems, with all servers of the same type.) We then introduce a natural extension of the GRAND algorithm for finite-server systems with blocking. Assuming subcritical system load, we prove existence, uniqueness, and local stability of the large-scale system equilibrium point such that no blocking occurs. This result strongly suggests a conjecture that the steady-state blocking probability under the algorithm vanishes in the large-scale limit.
We study an M/G/1-type queueing model with the following additional feature. The server works continuously, at fixed speed, even if there are no service requirements. In the latter case, it is building up inventory, which can be interpreted as negative workload. At random times, with an intensity ω(x) when the inventory is at level x>0, the present inventory is removed, instantaneously reducing the inventory to 0. We study the steady-state distribution of the (positive and negative) workload levels for the cases ω(x) is constant and ω(x) = ax. The key tool is the Wiener–Hopf factorization technique. When ω(x) is constant, no specific assumptions will be made on the service requirement distribution. However, in the linear case, we need some algebraic hypotheses concerning the Laplace–Stieltjes transform of the service requirement distribution. Throughout the paper, we also study a closely related model arising from insurance risk theory.
The subject of this paper is the problem of estimating the service time distribution of the M/G/∞ queue from incomplete data on the queue. The goal is to estimate G from observations of the queue-length process at the points of the regular grid on a fixed time interval. We propose an estimator and analyze its accuracy over a family of target service time distributions. An upper bound on the maximal risk is derived. The problem of estimating the arrival rate is considered as well.
In this paper we present closed-form expressions for the distribution of the virtual (actual) queueing time for the BMAP/R/1 and BMAP/D/1 queues, where `R' represents a class of distributions having rational Laplace‒Stieltjes transforms. The closed-form analysis is based on the roots of the underlying characteristic equation. Numerical aspects have been tested for a variety of arrival and service-time distributions and results are matched with those obtained using the matrix-analytic method (MAM). Further, a comparative study of computation time of the proposed method with the MAM has been carried out. Finally, we also present closed-form expressions for the distribution of the virtual (actual) system time. The proposed method is analytically quite simple and easy to implement.
We consider a model of N interacting two-colour Friedman urns. The interaction model considered is such that the reinforcement of each urn depends on the fraction of balls of a particular colour in that urn as well as the overall fraction of balls of that colour in all the urns combined together. We show that the urns synchronize almost surely and that the fraction of balls of each colour converges to the deterministic limit of one-half, which matches with the limit known for a single Friedman urn. Furthermore, we use the notion of stable convergence to obtain limit theorems for fluctuations around the synchronization limit.
We propose a stochastic model describing a process of awareness, evaluation, and decision making by agents on the d-dimensional integer lattice. Each agent may be in any of the three states belonging to the set {0, 1, 2. In this model 0 stands for ignorants, 1 for aware, and 2 for adopters. Aware and adopters inform its nearest ignorant neighbors about a new product innovation at rate λ. At rate α an agent in aware state becomes an adopter due to the influence of adopters' neighbors. Finally, aware and adopters forget the information about the new product, thus becoming ignorant, at rate 1. Our purpose is to analyze the influence of the parameters on the qualitative behavior of the process. We obtain sufficient conditions under which the innovation diffusion (and adoption) either becomes extinct or propagates through the population with positive probability.