 Research
 Open Access
 Published:
Structurebased learning in wireless networks via sparse approximation
EURASIP Journal on Wireless Communications and Networking volume 2012, Article number: 278 (2012)
Abstract
A novel framework for the online learning of expected costtogo functions characterizing wireless networks performance is proposed. The framework is based on the observation that wireless protocols induce structured and correlated behavior of the finite state machine (FSM) modeling the operations of the network. As a result, a significant dimension reduction can be achieved by projecting the costtogo function on a graph wavelet basis set capturing typical substructures in the graph associated with the FSM. Sparse approximation with random projection is then used to identify a concise set of coefficients representing the costtogo function in the wavelet domain. This Compressed Sensing (CS) approach enables a considerable reduction in the number of observations needed to achieve an accurate estimate of the costtogo function. The proposed method is characterized via stability analysis. In particular, we prove that the standard CS approach of the Least Angle Selection and Shrinkage Operator (LASSO) will not provide stability. We also determine a connection between the structure of the FSM induced by the wireless protocols and the restricted isometry property of the effective projection matrix. Simulation results of our approximation method show that 15 wavelet functions can accurately represent a costtogo function defined on a state space of 2000 states. Moreover, the number of statecost observations needed to estimate the costtogo function is orders of magnitude smaller than that required by traditional online learning techniques.
Introduction
Given the recent explosion in the number and types of wireless devices, new design and optimization paradigms are needed to effectively manage the complex and heterogeneous nature of modern wireless networks. We propose a novel approach for the online learning of costtogo functions in networks modeled via large finite state machines (FSM). Typical cost functions measure performance metrics such as throughput, packet delivery probability and delay. Costtogo functions measure the expected longterm cost incurred by the network from any state of the FSM. Estimation of costtogo functions is instrumental for the optimization of network control strategies. Our estimation approach is based on the observation that wireless networking protocols induce a structured behavior of the FSM, enabling dimension reduction of its state space via waveletprojection and compressed sensinglike techniques. The sparse approximation approach proposed herein considerably reduces the length of the trajectory of the FSM required to achieve an accurate estimate of the costtogo function compared to traditional learning techniques.
Markov models have been widely used for the analysis and optimization of wireless networks[1–9]. In one of the earliest works on protocol modeling[1], a Markov chain is proposed to analyze the saturation throughput of IEEE 802.11 medium access control. The FSM models the backoff countdown counter controlling channel sensing and access of a wireless terminal and the retransmission index of the packet under transmission. In general, the Markov chains defined in these models track the logical state of the wireless protocols (e.g., the retransmission index of the packet being transmitted, the number of packets in the buffer and the backoff counter) as well as environmental variables (e.g., the channel state).
The online optimization of control strategies based on these models requires the estimation of costtogo functions from a samplepath of statecost observations[10–12]. However, the immense size of the state space of FSMs associated with practical wireless networks limits the applicability of traditional online learning techniques to toy networks and extremely simple case studies. In fact, the estimation of costtogo functions in traditional online learning (e.g., Qlearning and Reinforcement learning[10–12]) requires sufficient observation of a samplepath such that it hits all the states of the FSM a large number of times. Approximations of costtogo functions[13, 14] are generally based on oversimplified models and thus cannot be accurately used in general practical networks. For instance, the fluid approximation proposed in[14] is based on the assumption that the costtogo function is smooth in the state space of the FSM, meaning that only small variations of its value computed in neighboring states are allowed. This assumption is suitable for simple cases (e.g., buffer models and cost functions modeling buffer congestion), but does not hold for more complex FSM models and general cost functions.
This work provides the following contributions: 1) we present a framework based on CS for the approximation of costtogo functions; 2) we analyze the structure of the FSMs modeling wireless networks based on their decomposition into fundamental components; 3) we connect the structure of the FSM to the Restricted Isometry properties of the effective projection matrix; 4) we analyze the stability of CS in this context via perturbation analysis; 5) we present a methodology for the use of Diffusion Wavelets (DW) in online learning; 6) we present numerical results illustrating the performance of the proposed approach.
The framework proposed herein is not tailored to a specific canonical network example, but is rather based on the inherent structure of the FSMs modeling the operations of general wireless networks. The fundamental observation behind our framework is that the directed graph associated with the temporal evolution of the state of the FSM is inherently regular and local. As a consequence, typical trajectories on the FSM can be described by a number of graph substructures considerably smaller than the number of possible edges between states. Figure1 depicts a schematic of the proposed online learning algorithm. A trajectory of the FSM associated with the operations of the physical network is used to estimate the transition probability matrix and the cost function and formulate the estimation problem. The costtogo function is projected onto a graph wavelet basis set capturing relevant and typical substructures in the graph. Sparse approximation (and in particular the leastsquares CS (LS CS) algorithm[15]) is then employed to identify a concise set of substructures to represent the cost function of interest.
We characterize the performance of sparse approximation applied to the estimation problem addressed herein in terms of the minimum number of states that need to be observed to achieve an accurate estimate of the costtogo function. Our analysis is based on the decomposition of the FSM in fundamental structures we refer to as subchains. The transition matrix associated with the individual subchains is analyzed to measure the incoherence^{a} of the overall transition matrix, which is exploited to determine the conditions under which the restricted isometry property (RIP)[16] holds for our effective random projection matrix.
Note that whereas most prior work on sparse approximation focuses on static scenarios, the framework considered in this article addresses the problem of learning in dynamical systems. The inclusion of states visited a small number of times in the samplepath of the FSM results in instability of the estimation algorithm. To reduce this effect, we use the LS CS algorithm proposed in[15]. LS CS correlates the output of the sparse approximation algorithm by constraining variations in the support of the solution.
Relevant to the approach proposed herein, Mahadevan et al. in[17] proposed the use of DW[18] as a projection basis for the sparse approximation of costtogo functions. In[17], offline estimation of the costtogo function is considered, however, no performance analysis is undertaken. In contrast, we examine online learning and we provide a detailed analysis to assess the performance of sparse approximation applied to Markov models of wireless networks. Compressed sensingbased techniques have been previously applied to estimation problems in networks[19–24]. These works address graphs related to the physical connectivity of the network, where nodes are terminals and links are specific wired or wireless links or modeled by undirected graphs. We address the fundamentally different problem of estimating functions defined on the state space of the FSM, i.e., the logical graph of the wireless network, modeling the temporal evolution of the network from a small number of state observations.
Numerical results for a case of interest show that a small number of graph wavelets (∼15) are sufficient to accurately approximate a costtogo function defined on a state space of approximately 2000 states. Moreover, the proposed algorithm can estimate the costtogo function by observing a trajectory of the state of the FSM visiting a small subset of states in the state space.
The rest of this article is organized as follows. Section ‘System model and problem formulation’ describes the model of the network and defines the estimation problem. The sparse learning algorithm is presented in Section ‘Sparse estimation of cost functions’. Section ‘Structure of the graph’ proposes the decomposition of the overall graph into subchains and analyzes the properties of the transition probability matrix. Section ‘Perturbation analysis and performance bounds’ discusses the stability of sparse approximation applied in our context and characterizes the performance of the learning algorithm in terms of how the number of state observations grows with the network size. Numerical results are presented in Section ‘Numerical results’. Section ‘Conclusions’ concludes the article. The proof of the stated theorems are in Appendices Appendix 1 and Appendix 2.
System model and problem formulation
The network is modeled as a FSM whose state evolves within the state space\mathcal{S} with N = S. DefineS\left(t\right)\in \mathcal{S} as the state of the FSM at time t = 0,1,2,…. We assume that the sequence S = {S(0),S(1),S(2),…} is a Markov process with transition probabilities
where P(·) denotes the probability of an event. The performance of the network is measured by a function c(s,s^{′}) that assigns a positive and bounded cost to the transition from state s to state s^{′}. The average cost from state s is
The function
where E[·] denotes expectation and γ ∈ (0,1) is the discount factor, is the expected discounted longterm cost. This function is also known as the costtogo function and is central to DP and optimal control[10].
For any fixedS\left(t\right)=s\in \mathcal{S} the function\overline{c}(\xb7) is independent of the time index t and can be rewritten as
where
is the τstep transition from state s to s^{′}.^{c} Consider the graph associated with the FSM, where vertices are states in\mathcal{S} and edges are statetransitions with nonzero probability. The temporal distance τ in the evolution of the FSM translates into some number of hops in the graphical representation. Starting from a vertex s,\overline{c}\left(s\right) is computed by sequentially summing the discounted and weighed cost of the reachable vertices for an increasing number of hops in the graph. The representation as a graph of the temporal evolution of the network is the key for the sparse learning algorithm proposed herein.
In online learning, the function\overline{c} is estimated from a samplepath of statecost observations. The samplepath O_{ T } of observations up to time T includes the sequence of states {S(0),S(1),…,S(T)} and state transition costs {c(S(0),S(1)),…,c(S(T−1),S(T))}. Denote by\overline{\mathbf{c}} the vector collecting the expected longterm cost\overline{c}\left(s\right) for alls\in \mathcal{S}, i.e.,\overline{\mathbf{c}}=\left[c\right(1),c(2),\dots ,c(N\left)\right].^{d} The objective is to build an estimator of\overline{\mathbf{c}} based on the observations O_{ T } minimizing a distance metric such as\parallel {\widehat{\mathbf{c}}}_{T}\overline{\mathbf{c}}{\parallel}_{2}^{2}, where{\widehat{\mathbf{c}}}_{T} is the estimate at time T.
The main challenge to achieve an accurate estimation of\overline{\mathbf{c}} in wireless networks is the enormous size of the state space\mathcal{S} underlying the associated FSM. In fact, in traditional online learning an accurate estimation of\overline{\mathbf{c}} requires a samplepath of observations where each state in\mathcal{S} is visited a considerable number of times. In fact, all the allowed state transitions need to be observed a sufficient number of times to estimate their probability.
Sparse estimation of cost functions
We now present an algorithm for the online learning of costtogo functions in wireless networks from the observation of a statecost trajectory of the associated FSM. The baseline observation is that networking protocols induce a structured behavior of the network, which is reflected in a structured graph associated with the FSM. Thus, every statecost observation conveys information about multiple states due to the correlated behavior of the network. As a result, we can propose an algorithm to estimate\overline{\mathbf{c}} exploiting this structure from fewer observations than in traditional learning. The algorithm is composed of three elements:

observation: the transition probabilities and cost function c(·) are estimated by observing a statecost samplepath;

projection:\overline{\mathbf{c}} is projected onto a graph wavelet basis set capturing typical structures in the graph;

sparse estimation of\overline{\mathbf{c}}: a sparse estimation algorithm is used to identify a concise set of basis functions providing the best fit with the estimated transition probabilities and cost function.
We define the N × N matrix P to be the probability transition matrix where P[s,s^{′}] = p(s,s^{′}) as in Equation (1).
The longterm cost\overline{\mathbf{c}} can be rewritten as
Thus,\overline{\mathbf{c}} can be computed as the fixed point solution\overline{\mathbf{c}}=\mathrm{\Omega}\left(\overline{\mathbf{c}}\right) of the operator\mathrm{\Omega}\left(\overline{\mathbf{c}}\right)=\mathbf{c}+\gamma \mathbf{P}\overline{\mathbf{c}}\phantom{\rule{1em}{0ex}}. The transition matrix P and cost vector c are not known a priori and need to be estimated from observation. At time T, the samplepath O_{ T } is used to compute the estimates\widehat{\mathbf{P}}\left(T\right) and\widehat{\mathbf{c}}\left(T\right) of P and c. We use the estimator
where 1(·) is the indicator function. More refined estimators can be employed to reduce the sampling rate[25].
The estimates\widehat{\mathbf{P}}\left(T\right) and\widehat{\mathbf{c}}\left(T\right) may be very noisy and incomplete estimates of P and c even for T≫N. In fact, an accurate estimation of the transition probabilities from a state s in\mathcal{S} and the cost function c(s) may require a considerable number of visits to s. For asymptotically large T, the average number of times the FSM is in state s is TΠ(s), where\Pi \left(s\right)=\underset{t\to \infty}{lim}P\left(S\right(t)=sS\left(0\right)={s}_{0}) is the steadystate probability of s. Note that the average steadystate probability of the states in\mathcal{S} is 1/N, and thus the average number of visits to a state is T/N. However, in a finitelength samplepath, the trajectory of the state of the FSM may remain confined in a region of\mathcal{S} even for lengths T larger than N and the number of states visited may be much smaller than T. Thus, due to the large size of the state space of FSMs modeling wireless networks, the number of observations needed to achieve an accurate estimation of the costtogo function is generally enormous, and it may be larger than the coherence time of the network, meaning that the statistics of the stochastic process modeling the operation of the network may change before the learning process achieves a meaningful estimate of\overline{\mathbf{c}}.
To cope with this issue we exploit the fact that FSMs modeling the operations of wireless networks and their associated graphs present a very regular connectivity structure and the transition probabilities are determined by a limited set of parameters, e.g., packet arrival probability in the buffer of the nodes and packet failure (see Section ‘Structure of the graph’). By regular, we mean that the connectivity structure from many nodes of the graph to their 1hop neighbors is similar. Thus, the representation of the graph provided by the transition matrix is intrinsically redundant and trajectories of the network on the graph can thus presumably be described by a small number of functions capturing typical substructures of the graph. We observe that these substructures involve neighborhoods of states at different numbers of hops, corresponding to different temporal distances between observations in the samplepath.
A fundamental element of the proposed framework is the projection of the costtogo function\overline{\mathbf{c}} on a set of basis functions capturing the typical substructures of the graph at various time scales. In fact, every new observation updates the estimate of all the substructures including the observed transition. We employ the recently proposed DWs[18] as a basis set for the projection. DWs are a multiresolution geometric construction for the multiscale analysis of operators on graphs. DW functions are computed by sequentially applying a diffusion operator (for instance, the transition matrix P) at the current scale k, compressing the range via a local orthonormalization procedure, representing the operator in the compressed range and computing the P^{2k} on this range. Functions defined on the support space are analyzed in multiresolution fashion, where dyadic powers of the diffusion operator correspond to dilations, and projections correspond to downsampling. Even if P is not known a priori, we assume that the location of the nonzero elements of P, that is, the connectivity structure of P, is known ^{e}. Define I(P) = sgn(P + P^{T}). The basis set W is then computed on P_{ symm }where the i th row of P_{ symm }is
The symmetrization step is required as DWs presume symmetric diffusion operators. The design of wavelet functions tailored to the compression of directed graphs will further improve the performance of the algorithm proposed herein.
Define W as a diffusion wavelet basis set computed on P_{ symm }, where the DW functions are the columns of W. We have then\stackrel{~}{\mathbf{c}}\approx \mathbf{Wx}, where x is the representation vector collecting the coefficients of the wavelet functions in W. Given P and c, the representation vector x^{∗} providing the most accurate approximation of\overline{\mathbf{c}} on W minimizes the Bellman residual\parallel \mathrm{\Omega}\left(\mathbf{W}\mathbf{x}\right)\mathbf{Wx}{\parallel}_{2}^{2}. We have then
The main idea behind the estimation paradigm proposed herein is that the DW set of functions is a sparsifying basis for the costtogo function\overline{\mathbf{c}}. Due to the structured behavior defined by networking protocols, a small number of functions can represent the evolution and, thus, the collected cost, from large groups of states. The Least Angle Selection and Shrinkage Operator (LASSO) algorithm[26] minimizes the residual norm of the residual plus a regularization term. For the considered problem, the LASSO is formulated as
where\widehat{\mathbf{B}}\left(T\right)=\mathbf{R}\left(T\right)(\mathbf{I}\gamma \widehat{\mathbf{P}}(T\left)\right) and R(T) is a random projection matrix. The ℓ1 regularization term λ∥x∥_{1}is a sparsitypromoting term, meaning that the least significant coefficients in x are pushed toward zero.
In the Compressed Sensing (CS) literature, the matrix\widehat{\mathbf{B}}\left(T\right) and W in the above equation are generally referred to as the sensing and representation matrices, respectively. Note that the elements in the rows of\widehat{\mathbf{P}}\left(T\right) and\widehat{\mathbf{c}}\left(T\right) corresponding to states not visited in the trajectory O_{ T }are set to zero and can be eliminated in the projection.
Structure of the graph
Wireless networking protocols induce a very structured temporal evolution of the network, and, thus, a very structured graph associated with the FSM. This structure is the key to show some general properties of the transition matrix P that determines the performance of the sparse reconstruction in terms of the minimum number of states that needs to be included in Equation (11) to achieve an accurate reconstruction. Our analysis is based on the decomposition of the overall graph into smaller graphs, which we refer to as subchains. The good incoherence properties of the transition matrices associated with the subchains are reflected in good incoherence of the overall transition matrix and, thus, result in good performance of the sparse reconstruction.
The decomposition into subchains of the complex graph associated with the FSM modeling the temporal evolution of wireless networks results from the observation that the state of the network is the collection of many individual descriptors tracking counters and variables associated with the functioning of protocols and the environment. The temporal evolution of each individual descriptor follows simple rules that can be easily analyzed to retrieve properties of the overall graph. We then define S(t) = {S_{1}(t),…,S_{ D }(t)}, where S_{ d }(t) is the state of the d th subchain at time t. We denote by{\mathcal{S}}_{d} the state space of the d th subchain, with\left{\mathcal{S}}_{d}\right={N}_{d}.
The subchains track the evolution of the individual components of the state space. Although in the overall FSM the transition probabilities are a function of the overall state of the network, the connectivity structure of the subchains is preserved in the overall FSM. In fact, the state transition froms=\{{s}_{1},\dots ,{s}_{D}\}\in \mathcal{S} to{s}^{\prime}=\{{s}_{1}^{\prime},\dots ,{s}_{D}^{\prime}\}\in \mathcal{S} in the overall FSM is allowed^{f} only if the state transition from s_{ d }to{s}_{d}^{\prime} is allowed in the corresponding subchain, for all d = 1,…,D. Thus, the properties of the connectivity structure of the subchains are inherited by the overall graph.
In stochastic models for wireless networks two classes of subchains can be identified:

Counterlike subchains (see, Figure2a,b: the FSM is associated with a counter. The value of the counter increments/decrements until it is reset to a given value. Examples of counterlike subchains are: the number of retransmissions of a packet in ARQ protocols, the backoff timers in DCF and the transmission windows and timers in TCP. This class can be further divided into forward counters (Figure2a and backward counters (Figure2b, depending on whether the counter is incremented or decremented until being reset to a predefined value;

Random walk subchains (see, Figure2c): the value of the descriptor variable is subject to random, but constrained, increments and decrements. Examples of random walk subchains are channel state descriptors and variables tracking the number of packets in a buffer.
For instance, in the pioneering work[1], the Markov chain used to analyze the network is the composition of a random walk and a counterlike subchain. It can be observed that counterlike and random walk subchains present a very local and regular connectivity structure. By local, we mean that every state connects to a small neighborhood of states. Regularity implies that states connect to 1hop neighbors in a similar fashion. For instance, in counterlike subchains, states connect to the state corresponding to a reset counter and the state associated with an incremented or decremented value (possibly plus a selfloop). As a result, the overall graph is regular and local. This property is instrumental towards having an efficient compression in the wavelet domain, meaning that only a limited number of notable substructures is needed to model the temporal evolution of the state of the network.
Define an indexing in\mathcal{S} and{\mathcal{S}}_{d} assigning an integer in {1,2,…,N} to each states\in \mathcal{S} and an integer in {1,2,…,N_{ d }} to each state{s}_{d}\in {\mathcal{S}}_{d}. Define also{\mathcal{S}}_{d}^{\leftarrow}\left({i}_{d}\right)\subseteq {\mathcal{S}}_{d} and{\mathcal{S}}_{d}^{\to}\left({i}_{d}\right)\subseteq {\mathcal{S}}_{d} as all the states of which i_{ d } is a 1hop neighbor and the 1hop neighbors of{i}_{d}\in {\mathcal{S}}_{d}, respectively. Note that the sets{\mathcal{S}}_{d}^{\leftarrow}\left({i}_{d}\right) and{\mathcal{S}}_{d}^{\to}\left({i}_{d}\right) do not coincide due to the directionality of the graph modeling the behavior of the network. In fact, Markov processes modeling the operations of wireless networks are not invertible. In the counterlike and random walk structures, the connections from most of the states are the repetition of the same (local) connectivity structure. Thus, except in a few particular states whose effect decreases as the dimension of the Markov chain increases, given two states i_{ d },j_{ d }∈ {1,…,n_{ d }}, with i_{ d }≠ j_{ d }, the number of states in{\mathcal{S}}_{d}^{\leftarrow}\left({i}_{d}\right)\cap {\mathcal{S}}_{d}^{\leftarrow}\left({j}_{d}\right) is generally small and so is the inner product\sum _{{k}_{d}=1}^{{N}_{d}}{p}_{d}({k}_{d},{i}_{d}){p}_{d}({k}_{d},{j}_{d}). Since the connectivity structure of the overall graph results from the composition of the connectivity structures of the subchains, the inner product of the columns of P is intuitively small. In order to perform a quantitative analysis of the inner products of P, we focus on the natural random walk defined on the subchains^{g}, that is we assign equal probability to all the allowed transitions from a given state. We have, then,
where p_{ d }(i_{ d },j_{ d }) is the transition probability from state i_{ d }and j_{ d } in the state space of the d th subchain. Then, the inner product between the i th and the j th columns of P is
where i_{ d }, j_{ d }, and k_{ d } are the state of the d th subchain in the states associated with states i, j, and k, respectively.
We then need to compute the inner products of the columns of the transition matrices associated with the classes of subchains. The average inner products of the backward counter, forward counter and random walk subchains are, respectively,
where in a random walk subchain the transition probability from state i_{ d } to state j_{ d } is larger than zero only if j_{ d }−i_{ d } ≤ ℓ and we assume N_{ d }≫2ℓ + 1. We observe that all these mean inner products are of orderO\left(\frac{1}{{N}_{d}}\right). As an example of how these quantities are computed, consider the forward counterlike subchain. The associated transition matrix is
We remark that the value of the transition probability p_{ d }(i_{ d },j_{ d }) is the inverse of the number of outgoing links, i.e., allowed transitions, from i_{ d }. The average inner product{E}_{{i}_{d},{j}_{d}}\left[\sum _{{k}_{d}=1}^{{N}_{d}}{p}_{d}({k}_{d},{i}_{d}){p}_{d}({k}_{d},{j}_{d})\right] is calculated by sequentially considering all the columns indexed by i_{ d }= 1,…,N_{ d }−1 and computing the product with the columns indexed by j_{ d }> i_{ d }.
The average inner products of the subchains decrease on average with the number of states of the associated FSM. Although in the general case the probability of transition from a state to its neighbors may be much different from that provided by the natural random walk associated with the graph structure, the locality and regularity of the structure of the subchains cause the average overlap of the sets{\mathcal{S}}_{d}^{\leftarrow}\left({j}_{d}\right) to vanish as N_{ d }increases. Thus, sufficiently large subchains are associated with incoherent transition matrices.
The average inner product of a column with itself is also relevant to the performance of the sparse reconstruction (these means appear in the mean of the Gram matrix in the effective random projection). It is easy to compute that the average of this quantity for the counterlike backward subchain, counterlike forward subchain and random walk subchain is
where C is a positive constant smaller than 1. We observe that each of these means can be expressed asO\left(\frac{1}{{N}_{d}}\right)+{\alpha}_{d}, where α_{ d }= 1/4,2/3,1/(2ℓ + 1) are for the backward counter, forward counter and random walk, respectively. The fact that α_{ d }< 1 for all the subchains is critical for the performance analysis of the CS approach.
Perturbation analysis and performance bounds
In this section, we characterize the performance of the sparse approximation of the costtogo function proposed herein. We first discuss the stability of the solution of (11) and then determine how much compression is possible to ensure good reconstruction of the value function v. The number of observations required for good reconstruction directly translates to the learning rate of our proposed algorithm. An exact analysis of the transition matrix is challenging; however, by exploiting the average behavior of several key structures, we can determine the relationship between the minimum number of observations for this compressed sensing problem and the size of the logical graph.
Perturbation analysis
We discuss in this section how estimation noise in the sensing matrix\widehat{\mathbf{B}}\left(T\right)=(\mathbf{I}\gamma \widehat{\mathbf{P}}(T\left)\right) affects the stability of the reconstruction provided by (11) as new states are visited by the samplepath. We show that the inclusion in (11) of a row in\widehat{\mathbf{c}}\left(T\right) and\widehat{\mathbf{P}}\left(T\right) associated with a state hit by the FSM a small number of times may result in a dramatic change of x^{∗}(T) with respect to x^{∗}(T−1). As we are looking for the fixed point solution of the operator Ω, instability and large variations of the sparse solution are highly undesirable. In order to improve the stability of the algorithm, in the numerical results presented in Section ‘Numerical results’ we use the LS CS algorithm proposed in[15].
Define
In[27], Xu et al. have shown that the regularized regression problem of LASSO:
is equivalent to the robust regression (RR) problem, stated as
where\mathrm{\Delta}\widehat{\mathbf{A}}\left(T\right)=\left[{\widehat{\mathbf{a}}}_{1}\right(T),{\widehat{\mathbf{a}}}_{2}(T),\dots ,{\widehat{\mathbf{a}}}_{m}(T\left)\right],\mathcal{U} is the set of perturbation matrices\mathcal{U}=\left\{\mathrm{\Delta}\widehat{\mathbf{A}}\right(T):\parallel {\widehat{\mathbf{a}}}_{i}(T){\parallel}_{2}\le \lambda ,i=1,\dots ,m\} and m is the number of columns of\mathrm{\Delta}\widehat{\mathbf{A}}\left(T\right). We drop the dependence on T of the estimated matrices and vectors. Thus, the vector x is optimized for a worst case perturbation whose range is determined by the parameter λ, that is, the algorithm is robust to perturbations. Interestingly, the larger the value of λ, the sparser the output vector x, but also the larger the set of perturbations considered. In[27], it was also shown that LASSO is not stable, meaning that small variations of the sensing matrix\widehat{\mathbf{A}} may lead to significantly different output vectors.
The following addresses the instability issues in the solution to the RR problem. In particular, the theorem shows that the inclusion of a new sample may result in suboptimal solutions to the RR problem. Moreover, due to the equivalence between LASSO and the RR problem, the same instability result applies to LASSO as well.
Theorem 1
Let x^{∗} be the solution of the problem
where\mathcal{U}=\{\mathrm{\Delta}\widehat{\mathbf{A}}:\parallel {\widehat{\mathbf{a}}}_{i}{\parallel}_{2}\le \lambda ,i=1,\dots ,m\} and assume\widehat{\mathbf{c}}=\widehat{\mathbf{A}}{\mathbf{x}}^{\ast}. Define y^{∗} as the solution of
with{\mathcal{U}}^{\prime}=\{\mathrm{\Delta}{\widehat{\mathbf{A}}}^{\prime}:\parallel {\widehat{\mathbf{a}}}_{i}{\parallel}_{2}\le \lambda +{\lambda}^{\prime},i=1,\dots ,m\} and
Denote the support of y^{∗} and x^{∗} as{I}_{{\mathbf{y}}^{\ast}} and{I}_{{\mathbf{x}}^{\ast}}, respectively. If\exists k\in {I}_{{\mathbf{x}}^{\ast}} such that
where{\mathrm{\Gamma}}_{k}({\widehat{\mathbf{A}}}^{\prime},{I}_{{\mathbf{x}}^{\ast}})={({\widehat{\mathbf{A}}}_{k}^{\prime})}^{T}\mathbf{M}{({\mathbf{M}}^{T}\mathbf{M})}^{1}\mathbf{M}{\widehat{\mathbf{A}}}_{k}^{\prime}, and\mathbf{M}=[{\widehat{\mathbf{A}}}_{{\mathcal{I}}_{{\mathbf{x}}^{\ast}}\setminus \{k\}}^{\prime},\mathbf{c}] then{I}_{{\mathbf{y}}^{\ast}}\ne {I}_{{\mathbf{x}}^{\ast}}. Thus, the support of the solution of LASSO changes if a new state meeting the hypothesis is added to the Bellman residual.
The proof of the theorem is in Appendix 1.
Minimum number of observations
In Section ‘Numerical results’, we will employ the LS CS residual algorithm[15] to minimize the Bellman residual subject to a sparsity constraint:
We will observe the temporal evolution of the Markov Chain over multiple timesteps, as such, we will not observe the cost at every state. Thus, coupled with additional random mixing to exploit the benefits of compressed sensing, we will optimize the following modified Bellman residual:
where R is a random matrix to be defined in the sequel and R(T) is the submatrix formed by retaining the columns of R indexed by states hit in the observation interval T. If the matrix R(T)(I−γ P)W satisfies the socalled restricted isometry property, defined below, then the squared error between x and\widehat{\mathbf{x}} achieved by the Dantzig selector[28] can be bounded; in particular, there are guarantees on correctly estimating the locations of the nonzero components of x and thus the squared error is proportional to the number of nonzero components and the noise variance. Comparable analysis can be made for LASSO[29, 30]. We focus on properties of R(T)(I−γ P) recognizing that projecting onto an orthonormal W would be an isometric operation. We note that a negative result regarding RIP would call the use of our approach into question. However, a positive RIP result suggests that our method work. Analysis of LS CS also relies on RIP parameters.
Our proof exploits arguments from[31] with appropriate tailoring to our framework. We begin with the definition of the properties we wish to show.
Definition 1
(Restricted Isometry Property): The observation matrix B is said to satisfy the restricted isometry property of orderS\in \mathbb{N} with parameter δ_{ S }∈ (0,1), i.e. RIP(S,δ_{ S }) if
holds for allx\in {\mathbb{R}}^{N} having no more than S nonzero entries. Note that B is a K × N matrix. RIP implies that B is approximately an isometry for Ssparse signals.
We have the following result,
Theorem 2
The matrix R_{ H }(I−γ P) does not satisfy RIP(S,δ_{ S }) with the following probability bound,
if{K}^{2}\ge \frac{192\phantom{\rule{.3em}{0ex}}log\phantom{\rule{.3em}{0ex}}n{S}^{2}}{{\delta}_{S}^{2}64{c}_{1}} and{c}_{1}\ge \frac{{\delta}_{S}^{2}}{64}. The matrix P is the transition probability matrix for a Markov chain formed by concatenating forward and backward counterlike and random walk subchains and γ < 1. The proof of Theorem 2 can be found in Appendix 2.
We observe that this result states that if the number of observations K is of orderO\left({S}^{2}\sqrt{n\phantom{\rule{.3em}{0ex}}log\phantom{\rule{.3em}{0ex}}n}\right) then RIP is satisfied with high probability as the network grows large. We contrast this with the more typical results seen in say channel estimation problems where the order is O(S^{2} log n). We remark that our result on the RIP is not limited to LASSO, but leads to the more general conclusion that sparse estimation algorithms can be used to approximate costtogo functions of wireless networks. Furthermore, the proof of Theorem 2 shows that an arbitrary concatenation of subchains does not affect the RIP property in the limit of large wireless networks.
Numerical results
In this section, we present numerical results for an example of a wireless network to demonstrate the potential of the compressed sensing approach. We consider a wireless network where terminals store packets in a finite buffer of size Q and employ Automatic Retransmission reQuest (ARQ) to improve the delivery rate of packets. Time is divided in slots of fixed duration. For the sake of simplicity we assume that the transmission of a packet occurs in the duration of a time slot and that channel coefficients in the various slots are i.i.d.. Terminals with a nonempty buffer access the channel in a time slot with fixed probability equal to α. The failure probability of a packet transmitted by a terminal is a function of the set of terminals concurrently transmitting in the same slot. Packet arrival in the buffer of the terminals is modeled according to a Poisson process of intensity σ.
The FSM tracking the state of each individual terminal (see Figure3) is composed of two subchains: a random walklike subchain tracking the number of packets in the buffer (state space {0,1,…,Q}) and a forward counterlike subchain tracking the retransmission index of the packet being transmitted (state space {0,1,…,F}, where F is the maximum number of transmissions of a packet). An additional binary variable is added to the FSM to track transmission/idleness of the terminal. The FSM tracking the state of the overall network is the composition of the FSMs of the individual terminals. The transition probabilities of the Markov process determining the trajectory of the state of the network in the state space of the FSM are a function of the packet arrival rate, of the failure probability function and of the transmission probability α.
The cost function c measures the normalized cost in terms of throughput loss with respect to the saturation throughput achieved by the terminals in the absence of interference. In particular, the cost function is defined as the sum for all the terminals of one minus the failure probability of the transmitted packets. Idleness is assigned a cost equal to 1.
For Q = 5 and F = 4 and 2 terminals the size of the state space is 1681. The transition matrix P is used to compute P_{ symm } defined in Equation (9) and the associated set of DW functions W[18]. DW basis sets are overcomplete. In order to keep complexity low, the columns of W are subsampled. In particular, we select 400 wavelet functions at different time scales.
Figure4 and5 depict the exact and reconstructed value function using LASSO mapped on the stateaction space and the sorted magnitude of the coefficients x^{∗}, respectively. In these figures, the exact vector c and transition matrix P are used in order to show the properties of the sparse reconstruction based on DW. An accurate approximation of\overline{\mathbf{c}} is achieved with approximately 15 active coefficients in x. This result shows that the temporal evolution of complex wireless networks can be effectively represented by a small number of wavelet function capturing typical substructures in the graph.
Figure6 plots the reconstruction error (norm2 of difference between the real and reconstructed value functions weighted by the steadystate distribution) as a function of T achieved by LASSO for different values of the sampling rates. The estimated transition probability matrix\widehat{\mathbf{P}} and\widehat{\mathbf{c}} are used for the estimation of\overline{\mathbf{c}}. States are sampled by randomly eliminating rows (among the states visited by the sample path) of the cost vector\widehat{\mathbf{c}} and transition matrix\widehat{\mathbf{P}}. In the legend, the maximum number states included in the Bellman residual is reported. As expected, if only a few states are included in the estimation, LASSO achieves very poor performance irrespectively of the accuracy in the estimates of the cost vector and transition matrix. However, if all the states are included in the Bellman residual, then poorly estimated states introduce rows affected by large noise both in\widehat{\mathbf{P}} and\widehat{\mathbf{c}}. As shown in Section Perturbation analysis, noisy rows of P may destabilize the support of x and lead to poor reconstruction. However, the performance of LASSO is very sensitive to the sampling rate and it is unclear how to compute its optimal value.
Figure7 depicts the reconstruction error achieved by the LS CSbased framework and that of standard Qlearning[10] as a function of the length of the observed samplepath. All states visited by the process are included in the Bellman residual. In order to improve stability, to generate this plot we used the LS CS algorithm. LS CS correlates x^{∗}(T) to x^{∗}(T−1) by constraining changes in the support of the representation vector. Interested readers are referred to[15] for a detailed description and performance characterization of the algorithm.
The proposed algorithm achieves a considerable accuracy in the estimation of\overline{\mathbf{c}} after a very short number of statecost observations, whereas standard learning converges slowly to\overline{\mathbf{c}}. Moreover, the solution is extremely stable and the LS CSbased algorithm appears to be very robust to estimation noise.
Conclusions
A novel framework for the online estimation of costtogo functions in wireless networks was proposed. We showed that the inherent regular and local structure of the graph associated with the FSM modeling the operations of wireless networks enables the sparse representation of costtogo functions. Our analysis, based on the decomposition of the overall graph in fundamental smaller structures, connects the structure of the FSM to the RIP of the transition probability matrix. Numerical results show that sparse approximation and projection onto DW basis sets enable a considerable reduction in the number of observations needed to estimate costtogo functions in wireless networks, and have the potential to make online learning practical in this context.
Endnotes
^{a}The incoherence of the transition matrix is connected to the magnitude of the inner products of its columns.
^{b}Note that c(s,s^{′}) can be generalized to be a random variable. In this case the expectation is over all the possible values of c(s,s^{′}).
^{c}Control can be included in the model by defining statistics and cost functions conditioned on a control action.
^{d}The indexing in the vector is based on a univocal map between\mathcal{S} and {1,2,3,…,N}.
^{e}Note that this assumption does not reduce the applicability of the proposed algorithm. In fact, the connectivity structure of the transition matrix is determined by standard protocols that are shared and known by all the nodes.
^{f}By allowed, we means that the state transition has probability equal to zero for any set of parameters.
^{g}We note that numerical evaluations of incoherence for many typical Markov chains has revealed that incoherence holds on average.
^{h}In this analysis we assume that W is an orthonormal set of basis functions. We are aware that DW are overcomplete and, thus, W is not an orthonormal basis set. The design of orthonormal wavelet basis tailored to FSMs modeling wireless networks is an important research direction.
Appendix 1
Proof of Theorem 1
Fix the index k in the support{I}_{{\mathbf{x}}^{\ast}} of x^{∗}, define
and the vector
with ∥u∥_{2} = 1 and
If
and
then
Therefore, if the conditions (34) and (35) hold, then due to Theorem 5 in[27], we have y k∗ = 0 and{I}_{{\mathbf{x}}^{\ast}}\ne {I}_{{\mathbf{y}}^{\ast}}.
Define
where
Then, we find u that maximizes the lefthand side of (35) as the solution of
Let M = QSZ be the singular value decomposition of M, then (41) is equal to
where\stackrel{~}{\mathbf{d}}=\mathbf{Z}\mathbf{d} and\stackrel{~}{\mathbf{a}}=\mathbf{Q}{\widehat{\mathbf{a}}}_{k}^{\prime}. Note that
where\mathbf{g}=\mathbf{S}{({\mathbf{S}}^{T}\mathbf{S})}^{1}{\mathbf{S}}^{T}\stackrel{~}{\mathbf{a}}. Then, from
and using the Schwarz inequality we obtain
where the equality holds if\stackrel{~}{\mathbf{d}}=\mathbf{g}. Therefore,
Appendix 2
Proof of Theorem 2
In this appendix, we prove the result on the minimum number of observed states needed for perfect reconstruction of\overline{\mathbf{c}}. We first state the following lemma:
Lemma 1
(Geršgorin) The eigenvalues of an m × m matrix G all lie in the union of the n discs d_{ i }= d_{ i }(c_{ i },r_{ i }),i = 1,2,…n, centered at c_{ i }= G_{ ii }and with radius
We will apply Gersgorin’s lemma to the following Gram matrix,
For the sake of exposition we assume that R(T) is an K × n matrix whose components are drawn i.i.d. from a binary distribution i.e.{\mathbf{R}}_{\mathit{\text{ik}}}=\pm \sqrt{\frac{1}{K}} with probability\frac{1}{2}; thus we have that the R(T)_{ ik } are zero mean and\mathbf{E}\left[{\mathbf{R}}_{H}^{T}\mathbf{R}(T)\right]=\mathbf{I}. Other properly constrained distributions for R(T) can be handled. The other matrices specified in (50) are square and of dimension n × n.
We shall show that every element of the Gram matrix, G is bounded as follows, where m_{ ij }= E[G_{ ij }],
The dimension of the statespace,\leftS\right\doteq N is approximately\prod _{d}{n}_{d}, thus from the analysis of the inner products/norms of columns of the transition matrix (see Equations (14)–(16)) we find that\mathbf{E}\left[{\mathbf{p}}_{i}^{T}{\mathbf{p}}_{j}\right]\approx O\left(\frac{1}{N}\right),i\ne j and\mathbf{E}\left[\parallel {\mathbf{p}}_{i}{\parallel}^{2}\right]\approx O\left(\frac{1}{N}\right)+{\alpha}^{D}, where p_{ i }is the i’th column of P. We note that for all three subchain structures examined α < 1 and thus\underset{D\to \infty}{lim}{\alpha}^{D}=0. In fact, if we concatenate several subchains we have that\mathbf{E}[\parallel {\mathbf{p}}_{i}{\parallel}^{2}]\approx O(1/N)+\prod _{d=1}^{D}{\alpha}_{d}, where α_{ d } < 1. Thus, E[∥p_{ i }∥^{2}] diminishes, and eventually vanishes, as the number of concatenated subchains increases. Additionally,\mathbf{E}\left[{\mathbf{P}}_{\mathit{\text{ij}}}\right]=\frac{1}{n}. Thus we can show that,
where b_{ i } is the i th column of B and\mathbf{B}\doteq \mathbf{I}\gamma \mathbf{P}. The equality (a) follows from the independence of the probability transition matrix P and the random projection matrix R. Equations (52) and (54) follow from Equations (13) and (14)–(16), (18)–(20). The next needed inequality is,
Lemma 2
(McDiarmid) Consider independent random variables{Y}_{1},\dots ,{Y}_{m}\in \mathcal{Y} and a function\upsilon :{\mathcal{Y}}^{m}\to \mathbb{R}. If for all i ∈ {1,…,m} and for all{y}_{1},\dots ,{y}_{m},{y}_{i}^{\prime}\in \mathcal{Y}, the function υ satisfies
For our functions of interest, m = n^{2}. We let R^{′} = R + Δ where Δ_{j,l}= 0 except for j = j_{0},l = l_{0}, i.e.{\mathrm{\Delta}}_{{j}_{0}{l}_{0}}={\mathbf{R}}_{{j}_{0}{l}_{0}}^{\prime}{\mathbf{R}}_{{j}_{0}{l}_{0}}=\pm 2\sqrt{\frac{1}{K}} with probability\frac{1}{2}, due to our assumptions on R. For clarity, we have dropped the subscript T on R(T). Thus we have for the diagonal elements of the Gram matrix, G_{ ii }= υ_{ ii }(R) for some R,
We have that{\mathbf{B}}_{{l}_{0},i}\approx {\delta}_{K}({l}_{0}i)\frac{\gamma}{n}, where δ_{ K }(·) is the Kronecker delta function, and\sum _{m\ne {l}_{0}}^{n}{\mathbf{B}}_{m,i}\le O\left(1\right). We set{c}_{{l}_{0},{j}_{0}}=\frac{4}{K}\left({\delta}_{K}({l}_{0}i)\frac{\gamma}{n}\right), and observe from the statement of McDiarmid’s inequalities that we need to evaluate
The same bound holds for the offdiagonal elements of the Gram matrix. Using these values of{c}_{{l}_{0},{j}_{0}} we invoke McDiarmid’s inequality to show the following, wherein (a) and (b) follow from union bound arguments and (c) follows from setting{\epsilon}_{o}={\epsilon}_{d}=\frac{{\delta}_{S}}{2}
Then,
Equation (60) can be manipulated to yield the following relationship between the number of samples K and the size of the logical network, n: the RIP holds with high probability if{K}^{2}\ge \frac{192\phantom{\rule{.3em}{0ex}}log\phantom{\rule{.3em}{0ex}}n{S}^{2}}{{\delta}_{S}^{2}64{c}_{1}}, where c_{1} is constant selected to ensure that the denominator of the previous expression is positive and the Theorem is shown.
References
Bianchi G: Performance analysis of the IEEE 802.11 distributed coordination function. IEEE J. Sel. Areas Commun 2000, 18(3):535547.
Konrad A, Zhao B, Joseph A, Ludwig R: A Markovbased channel model algorithm for wireless networks. Wirel. Netw 2003, 9(3):189199. 10.1023/A:1022869025953
Wu H, Peng Y, Long K, Cheng S, Ma J: Performance of reliable transport protocol over, IEEE 802.11 wireless, LAN analysis and enhancement. In proceedings of IEEE TwentyFirst Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2002. New York, USA; 2002:599607. vol. 2, June 23–27
Zorzi M, Rao RR: On the use of renewal theory in the analysis of ARQ protocols. IEEE Trans. Commun 1996, 44(9):10771081. 10.1109/26.536913
Badia L, Levorato M, Zorzi M: Markov analysis of selective repeat type II hybrid ARQ using block codes. IEEE Trans. Commun 2008, 56(9):14341441.
Modiano E: An adaptive algorithm for optimizing the packet size used in wireless ARQ protocols. Wirel. Netw 1999, 5(4):279286. 10.1023/A:1019111430288
Zhai H, Kwon Y, Fang Y: Performance analysis of IEEE 802.11 MAC protocols in wireless LANs. Wirel. Commun. Mob. Comput 2004, 4(8):917931. 10.1002/wcm.263
Su H, Zhang X: Crosslayer based opportunistic MAC protocols for QoS provisionings over cognitive radio wireless networks. IEEE J. Sel. Areas Commun 2008, 26: 118129.
Dianati M, Ling X, Naik K, Shen X: A nodecooperative ARQ scheme for wireless ad hoc networks. IEEE Trans. Veh. Technol 2006, 55(3):10321044. 10.1109/TVT.2005.863426
Bertsekas DP: Dynamic Programming and Optimal Control. Athena Scientific, Belmont, MA,; 2001.
Mahadevan S: Average reward reinforcement learning: Foundations, algorithms, and empirical results. Mach. Learn 1996, 22: 159195.
Schwartz A: A reinforcement learning method for maximizing undiscounted rewards. In Proceedings of the Tenth International Conference on Machine Learning. Amherst, Massachusett; 1993:305305. vol. 298
Fu F, Schaar MVD: Structureaware stocastic control for transmission technology. ArXiv preprint 2010. arXiv:1003.2471
Chen W, Huang D, Kulkarni A, Unnikrishnan J, Zhu Q, Mehta P, Meyn S, Wierman A: Approximate dynamic programming using fluid and diffusion approximations with applications to power management. In Proceedings of the 48th IEEE Conference on Decision and Control. Shangai, China; 2009:35753580. Dec. 1618, 2009
Vaswani N: LSCSresidual (LSCS): compressive sensing on least squares residual. IEEE Trans. Signal Process 2010, 58(8):41084120.
Candes E, Wakin MB: An introduction to compressive sampling. IEEE Signal Process. Mag 2008, 25(2):2130.
Maggioni M, Mahadevan S: A multiscale framework for Markov decision processes using diffusion wavelets. 2006.http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.74.8956%26rep=rep1%26type=pdf
Coifman RR, Maggioni M: Diffusion wavelets. Appl. Comput. Harmonic Anal 2006, 21: 5394. 10.1016/j.acha.2006.04.004
Crovella M, Kolaczyk E: Graph wavelets for spatial traffic analysis. In INFOCOM 2003 TwentySecond Annual Joint Conference of the IEEE Computer and Communications. San Francisco, CA, USA; 2003:18481857. vol. 3, Mar. 30–Apr. 3
Firooz M, Roy S: Network tomography via compressed sensing. In proc. of IEEE Global Telecommunications Conference (GLOBECOM). Miami, Florida, USA; 2010:15. Dec. 610
Chen Y, Bindel D, Katz RH: Tomographybased overlay network monitoring. In Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement. Miami Beach, FL, USA; 2003:216231. Aug. 2529, 2003
Haupt J, Bajwa WU, Rabbat M, Nowak R: Compressed sensing for networked data. IEEE Signal Process. Mag 2008, 25(2):92101.
Wang M, Xu W, Mallada E, Tang A: Sparse recovery with graph constraints: fundamental limits and measurement construction. Arxiv preprint arXiv:1108.0443 (2011)to appear in Proceedings of IEEE INFOCOM 2012
Xu W, Mallada E, Tang A: Compressive sensing over graphs. In Proceedings of the 30th IEEE International Conference on Computer Communications (IEEE INFOCOM). Shangai, China; IEEE, 2011:20872095. Apr. 1015
SherlawJohnson C, Gallivan S, Burridge J: Estimating a Markov transition matrix from observational data. J. Operat. Res. Soc 1995, 46(3):405410.
Tibshirani R: Regression shrinkage and selection via the Lasso. J. Royal Stat. Soc. Ser. B 1996, 58: 267288.
Xu H, Caramanis C, Mannor S: Robust regression and Lasso. IEEE Trans. Inf. Theory 2010, 56(7):35613574.
Candes E, Tao T: The dantzig selector: statistical estimation when p is much larger than n. Annals Stat 2007, 35(6):23132351. 10.1214/009053606000001523
Zhang CH, Huang J: The sparsity and bias of the Lasso selection in highdimensional linear regression. Annals Stat 2008, 36(4):15671594. 10.1214/07AOS520
Zhang T: Some sharp performance bounds for least squares regression with L1 regularization. Annals Stat 2009, 37(5A):21092144. 10.1214/08AOS659
Haupt J, Bajwa W, Raz G, Nowak R: Toeplitz compressed sensing matrices with applications to sparse channel estimation. IEEE Trans. Inf. Theory 2010, 56(11):58625875.
Acknowledgements
The study was supported by AFOSR under grants FA9550080480 and FA95501210215 and by the National Science Foundation (NSF) under Grant CCF0917343.
Author information
Authors and Affiliations
Corresponding author
Additional information
Competing interests
The authors declare that they have no competing interests.
Competing interests
The authors declare that they have no competing interests.
Authors’ original submitted files for images
Below are the links to the authors’ original submitted files for images.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
About this article
Cite this article
Levorato, M., Mitra, U. & Goldsmith, A. Structurebased learning in wireless networks via sparse approximation. J Wireless Com Network 2012, 278 (2012). https://doi.org/10.1186/168714992012278
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/168714992012278
Keywords
 Wireless Network
 Transition Matrix
 Compressed Sensing
 Finite State Machine
 Connectivity Structure