scispace - formally typeset
Search or ask a question
Author

Stefan Leigh

Bio: Stefan Leigh is an academic researcher. The author has contributed to research in topics: Multivariate random variable & Random function. The author has an hindex of 1, co-authored 1 publications receiving 1435 citations.

Papers
More filters
Book
01 Jan 1989
TL;DR: In this article, the authors present an axiomatic approach to a theory of probability, based on the axiomatization of probability models, for the analysis and design of wireless networks.
Abstract: 1. Probability Models in Electrical and Computer Engineering. Mathematical models as tools in analysis and design. Deterministic models. Probability models. Statistical regularity. Properties of relative frequency. The axiomatic approach to a theory of probability. Building a probability model. A detailed example: a packet voice transmission system. Other examples. Communication over unreliable channels. Processing of random signals. Resource sharing systems. Reliability of systems. Overview of book. Summary. Problems. 2. Basic Concepts of Probability Theory. Specifying random experiments. The sample space. Events. Set operations. The axioms of probability. Discrete sample spaces. Continuous sample spaces. Computing probabilities using counting methods. Sampling with replacement and with ordering. Sampling without replacement and with ordering. Permutations of n distinct objects. Sampling without replacement and without ordering. Sampling with replacement and without ordering. Conditional probability. Bayes' Rule. Independence of events. Sequential experiments. Sequences of independent experiments. The binomial probability law. The multinomial probability law. The geometric probability law. Sequences of dependent experiments. A computer method for synthesizing randomness: random number generators. Summary. Problems. 3. Random Variables. The notion of a random variable. The cumulative distribution function. The three types of random variables. The probability density function. Conditional cdf's and pdf's. Some important random variables. Discrete random variables. Continuous random variables. Functions of a random variable. The expected value of random variables. The expected value of X. The expected value of Y = g(X). Variance of X. The Markov and Chebyshev inequalities. Testing the fit of a distribution to data. Transform methods. The characteristic function. The probability generating function. The laplace transform of the pdf. Basic reliability calculations. The failure rate function. Reliability of systems. Computer methods for generating random variables. The transformation method. The rejection method. Generation of functions of a random variable. Generating mixtures of random variables. Entropy. The entropy of a random variable. Entropy as a measure of information. The method of a maximum entropy. Summary. Problems. 4. Multiple Random Variables. Vector random variables. Events and probabilities. Independence. Pairs of random variables. Pairs of discrete random variables. The joint cdf of X and Y. The joint pdf of two jointly continuous random variables. Random variables that differ in type. Independence of two random variables. Conditional probability and conditional expectation. Conditional probability. Conditional expectation. Multiple random variables. Joint distributions. Independence. Functions of several random variables. One function of several random variables. Transformation of random vectors. pdf of linear transformations. pdf of general transformations. Expected value of functions of random variables. The correlation and covariance of two random variables. Joint characteristic function. Jointly Gaussian random variables. n jointly Gaussian random variables. Linear transformation of Gaussian random variables. Joint characteristic function of Gaussian random variables. Mean square estimation. Linear prediction. Generating correlated vector random variables. Generating vectors of random variables with specified covariances. Generating vectors of jointly Gaussian random variables. Summary. Problems. 5. Sums of Random Variables and Long-Term Averages. Sums of random variables. Mean and variance of sums of random variables. pdf of sums of independent random variables. Sum of a random number of random variables. The sample mean and the laws of large numbers. The central limit theorem. Gaussian approximation for binomial probabilities. Proof of the central limit theorem. Confidence intervals. Case 1: Xj's Gaussian unknown mean and known variance. Case 2: Xj's Gaussian mean and variance unknown. Case 3: Xj's Non-Gaussian mean and variance unknown. Convergence of sequences of random variables. Long-term arrival rates and associated averages. Long-term time averages. A computer method for evaluating the distribution of a random variable using the discrete Fourier transform. Discrete random variables. Continuous random variables. Summary. Problems. Appendix: subroutine FFT(A,M,N). 6. Random Processes. Definition of a random process. Specifying of a random process. Joint distributions of time samples. The mean, autocorrelation, and autocovariance functions. Gaussian random processes. Multiple random processes. Examples of discrete-time random processes. iid random processes. Sum processes the binomial counting and random walk processes. Examples of continuous-time random processes. Poisson process. Random telegraph signal and other processes derived from the Poisson Process. Wiener process and Brownian motion. Stationary random processes. Wide-sense stationary random processes. Wide-sense stationary Gaussian random processes. Cylostationary random processes. Continuity, derivative, and integrals of random processes. Mean square continuity. Mean square derivatives. Mean square integrals. Response of a linear system to random input. Time averages of random processes and ergodic theorems. Fourier series and Karhunen-Loeve expansion. Karhunen-Loeve expansion. Summary. Problems. 7. Analysis and Processing of Random Signals. Power spectral density. Continuous-time random processes. Discrete-time random processes. Power spectral density as a time average. Response of linear systems to random signals. Continuous-time systems. Discrete-time systems. Amplitude modulation by random signals. Optimum linear systems. The orthogonality condition. Prediction. Estimation using the entire realization of the observed process. Estimation using causal filters. The Kalman filter. Estimating the power spectral density. Variance of periodogram estimate. Smoothing of periodogram estimate. Summary. Problems. 8. Markov Chains. Markov processes. Discrete-time Markov chains. The n-step transition probabilities. The state probabilities. Steady state probabilities. Continuous-time Markov chains. State occupancy times. Transition rates and time-dependent state probabilities. Steady state probabilities and global balance equations. Classes of states, recurrence properties, and limiting probabilities. Classes of states. Recurrence properties. Limiting probabilities. Limiting probabilities for continuous-time Markov chains. Time-reversed Markov chains. Time-reversible Markov chains. Time-reversible continuous-time Markov chains. Summary. Problems. 9. Introduction to Queueing Theory. The elements of a queueing system. Little's formula. The M/M/I queue. Distribution of number in the system. Delay distribution in M/M/I system and arriving customer's distribution. The M/M/I system with finite capacity. Multi-server systems: M/M/c, M/M/c/c, and M/M/infinity. Distribution of number in the M/M/c system. Waiting time distribution for M/M/c. The M/M/c/c queueing system. The M/M/infinity queueing system. Finite-source queueing systems. Arriving customer's distribution. M/G/I queueing systems. The residual service time. Mean delay in M/G/I systems. Mean delay in M/G/I systems with priority service discipline. M/G/I analysis using embedded Markov chains. The embedded Markov chains. The number of customers in an M/G/I system. Delay and waiting time distribution in an M/G/I system. Burke's theorem: Departures from M/M/c systems Proof of Burke's theorem using time reversibility. Networks of queues: Jackson's theorem. Open networks of queues. Proof of Jackson's theorem. Closed networks of queues. Mean value analysis. Proof of the arrival theorem. Summary. Problems. Appendix A. Mathematical Tables. Appendix B. Tables of Fourier Transformation. Appendix C. Computer Programs for Generating Random Variables. Answers to Selected Problems. Index.

1,438 citations


Cited by
More filters
Proceedings ArticleDOI
07 Mar 2004
TL;DR: It is shown that the performance of sensor networks can be substantially improved with the use of the proposed random key pre-distribution scheme, which exploits deployment knowledge and avoids unnecessary key assignments.
Abstract: To achieve security in wireless sensor networks, it is important to he able to encrypt messages sent among sensor nodes. Keys for encryption purposes must he agreed upon by communicating nodes. Due to resource constraints, achieving such key agreement in wireless sensor networks is nontrivial. Many key agreement schemes used in general networks, such as Diffie-Hellman and public-key based schemes, are not suitable for wireless sensor networks. Pre-distribution of secret keys for all pairs of nodes is not viable due to the large amount of memory used when the network size is large. Recently, a random key pre-distribution scheme and its improvements have been proposed. A common assumption made by these random key pre-distribution schemes is that no deployment knowledge is available. Noticing that in many practical scenarios, certain deployment knowledge may be available a priori, we propose a novel random key pre-distribution scheme that exploits deployment knowledge and avoids unnecessary key assignments. We show that the performance (including connectivity, memory usage, and network resilience against node capture) of sensor networks can he substantially improved with the use of our proposed scheme. The scheme and its detailed performance evaluation are presented in this paper.

1,001 citations

Journal ArticleDOI
TL;DR: The proposed technique would also allow precise coregistration of images for the measurement of surface displacements due to ice-flow or geomorphic processes, or for any other change detection applications.
Abstract: We describe a procedure to accurately measure ground deformations from optical satellite images. Precise orthorectification is obtained owing to an optimized model of the imaging system, where look directions are linearly corrected to compensate for attitude drifts, and sensor orientation uncertainties are accounted for. We introduce a new computation of the inverse projection matrices for which a rigorous resampling is proposed. The irregular resampling problem is explicitly addressed to avoid introducing aliasing in the ortho-rectified images. Image registration and correlation is achieved with a new iterative unbiased processor that estimates the phase plane in the Fourier domain for subpixel shift detection. Without using supplementary data, raw images are wrapped onto the digital elevation model and coregistered with a 1/50 pixel accuracy. The procedure applies to images from any pushbroom imaging system. We analyze its performance using Satellite pour l'Observation de la Terre (SPOT) images in the case of a null test (no coseismic deformation) and in the case of large coseismic deformations due to the Mw 7.1 Hector Mine, California, earthquake of 1999. The proposed technique would also allow precise coregistration of images for the measurement of surface displacements due to ice-flow or geomorphic processes, or for any other change detection applications. A complete software package, the Coregistration of Optically Sensed Images and Correlation, is available for download from the Caltech Tectonics Observatory website

777 citations

Proceedings ArticleDOI
07 Mar 2004
TL;DR: This paper develops the framework for analyzing a simple positioning system that employs the Euclidean distance between a sample signal vector and the location fingerprints of an area stored in a database and analyzes the effect of the number of access points that are visible and radio propagation parameters on the performance of the positioning system.
Abstract: In previous years, positioning systems for indoor areas using the existing wireless local area network infrastructure have been suggested. Such systems make use of location fingerprinting rather than time or direction of arrival techniques for determining the location of mobile stations. While experimental results related to such positioning systems have been presented, there is a lack of analytical models that can be used as a framework for designing and deploying the positioning systems. In this paper, we present an analytical model for analyzing such positioning systems. We develop the framework for analyzing a simple positioning system that employs the Euclidean distance between a sample signal vector and the location fingerprints of an area stored in a database. We analyze the effect of the number of access points that are visible and radio propagation parameters on the performance of the positioning system and provide some preliminary guidelines on its design.

712 citations

Book
25 Oct 2011
TL;DR: This comprehensive handbook offers gaps of available localization books presenting in-depth coverage from fundamentals of coordinates to advanced application examples.
Abstract: Radio systems capable of localization have emerging applications in homeland security, law enforcement, emergency response, defense command and control, multi-robot coordination and vehicle-to-vehicle and vehicle-to-pedestrian collision avoidance. In fact, high resolution localization is vital for many applications, including: traffic alert, emergency services, e.g., indoor localization for firefighters, and battlefield command and control. These systems promise to dramatically reduce society's vulnerabilities to catastrophic events and improve its quality of of life.While work this important area is progressing, limited resources are available to support graduate students and researchers in this important area. Specifically, a limited number of books has been published in this area covering selected subjects. This comprehensive handbook offers gaps of available localization books presenting in-depth coverage from fundamentals of coordinates to advanced application examples.

647 citations

Journal ArticleDOI
TL;DR: This paper provides a survey of key management schemes in wireless sensor networks and notices that no key distribution technique is ideal to all the scenarios where sensor networks are used; therefore the techniques employed must depend upon the requirements of target applications and resources of each individual sensor network.

630 citations