483 results on '"Shroff, Ness B."'
Search Results
452. A Utility-Based Power-Control Scheme in Wireless Cellular Systems.
- Author
-
Mingbo Xiao, Shroff, Ness B., and Chong, Edwin K.P.
- Subjects
ENERGY consumption ,COMPUTER networks ,WIRELESS communications - Abstract
Presents a power-control framework called utility-based power control by reformulating the problem using a softened signal-to-interference ratio requirement and adding a penalty on power consumption. Characteristics of a wireless networks; Component of the resource management problem in wireless networks; Difference between a utility function and a cost function.
- Published
- 2003
- Full Text
- View/download PDF
453. Opportunistic Transmission Scheduling With Resource-Sharing Constraints in Wireless Networks.
- Author
-
Xin Liu, Chong, Edwin K. P., and Shroff, Ness B.
- Subjects
PRODUCTION scheduling ,WIRELESS communications ,RESOURCE allocation ,QUALITY of service ,TELECOMMUNICATION systems - Abstract
Introduces an opportunistic transmission scheduling policy that exploits time-varying channel conditions and maximizes the system performance stochastically under a certain resource allocation constraint in wireless networks. Roles of resource allocation schemes and scheduling policies in providing quality of service; Details of the opportunistic scheduling policy and its properties; Numerical results from simulations of the proposed scheduling scheme.
- Published
- 2001
- Full Text
- View/download PDF
454. Resource management in power-controlled cellular wireless systems.
- Author
-
Mingbo Xiao, Shroff, Ness B., and Chong, Edwin K. P.
- Subjects
MOBILE communication systems ,CELL phone systems ,WIRELESS communications ,RESOURCE management ,QUALITY of service - Abstract
The efficient management of wireless resource is essential to the success of wireless systems. While power control is traditionally considered as a means to counteract the detrimental effects of channel fading, it is also a flexible mechanism to provide Quality of Service to individual users, and can be used as a platform for radio resource management. In this paper, we review the developments of distributed power control and related resource management problems in cellular wireless systems. We highlight the feasibility issue in a power-controlled system, which enables us to push the system toward high efficiency, and prevent the system from collapsing at the same time. Considering the unique features of multimedia traffic to be supported in future wireless systems, we also review power and rate control schemes proposed for wireless data, and present a framework for utility-based power control as a possible candidate for distributed power control of multimedia wireless systems. Copyright © 2001 John Wiley & Sons, Ltd. [ABSTRACT FROM AUTHOR]
- Published
- 2001
- Full Text
- View/download PDF
455. Sample-Adaptive Product Quantization: Asymptomatic Analysis and Examples.
- Author
-
Dong Sik Kim and Shroff, Ness B.
- Subjects
- *
DATA encryption , *DATA compression , *ELECTRIC distortion - Abstract
Presents a study that examined the use of the sample-adaptive product quantizer to reduce encoding complexity. Background on the application of vector quantization in data compression; Analysis of the relationship between distortion and encoding complexity; Results and implications.
- Published
- 2000
- Full Text
- View/download PDF
456. Submodular Utility Maximization for Deadline Constrained Data Collection in Sensor Networks.
- Author
-
Zheng, Zizhan and Shroff, Ness B.
- Subjects
- *
ACQUISITION of data , *WIRELESS sensor networks , *ROUTING (Computer network management) , *UTILITY functions , *APPROXIMATION theory - Abstract
We study the utility maximization problem for data collection in a wireless sensor network subject to a deadline constraint, where the data on a selected subset of nodes are collected through a routing tree subject to the 1-hop interference model. Our problem is closely related to the traditional utility maximization problems in networking and communications. However, instead of a separable concave form of utility functions commonly seen in this area, we consider the class of monotone submodular utility functions defined on subsets of nodes, which is more appropriate for the applications we consider. While submodular maximization subject to a cardinality constraint has been well understood, our problem is more challenging due to the multi-hop data forwarding nature even under the simple interference model. We have derived efficient approximation solutions to this problem both for raw data collection and when in-network data aggregation is applied. [ABSTRACT FROM PUBLISHER]
- Published
- 2014
- Full Text
- View/download PDF
457. Quantization Based on a Novel Sample-Adaptive Product Quantizer (SAPQ).
- Author
-
Kim, Dong Sik and Shroff, Ness B.
- Subjects
- *
CODING theory , *ADAPTIVE sampling (Statistics) - Abstract
Presents information on a study which proposed a novel feedforward adaptive quantization scheme called the sample-adaptive product quantizer (SAPQ). Description of the proposed adaptive quantization scheme; Theoretical observations on SAPQ; Codebook design for nonuniform SAPQ; Simulation results and discussion.
- Published
- 1999
- Full Text
- View/download PDF
458. Near Optimal Power and Rate Control of Multi-Hop Sensor Networks With Energy Replenishment: Basic Limitations With Finite Energy and Data Storage.
- Author
-
Mao, Zhoujia, Koksal, Can Emre, and Shroff, Ness B.
- Subjects
FINITE element method ,INFORMATION retrieval ,RENEWABLE energy sources ,WIRELESS sensor nodes ,NUMERICAL solutions to equations ,ELECTRIC discharges ,QUALITY of service - Abstract
Renewable energy sources can be attached to sensor nodes to provide energy replenishment for extending the battery life and prolonging the overall lifetime of sensor networks. For networks with replenishment, conservative energy expenditure may lead to missed recharging opportunities due to battery capacity limitations, while aggressive usage of energy may result in reduced coverage or connectivity for certain time periods. Thus, new power allocation schemes need to be designed to balance these seemingly contradictory goals, in order to maximize sensor network performance. In this paper, we study the problem of how to jointly control the data queue and battery buffer to maximize the long-term average sensing rate of a wireless sensor network with replenishment under certain QoS constraints for the data and battery queues. We propose a unified algorithm structure and analyze the performance of the algorithm for all combinations of finite and infinite data and battery buffer sizes. We also provide a distributed version of the algorithm with provably efficient performance. [ABSTRACT FROM PUBLISHER]
- Published
- 2012
- Full Text
- View/download PDF
459. Characterizing highly correlated video traffic in high-speed asynchronous transfer mode networks.
- Author
-
Shroff, Ness B. and Schwartz, Mischa
- Published
- 1996
- Full Text
- View/download PDF
460. Greedy Maximal Matching: Performance Limits for Arbitrary Network Graphs Under the Node-Exclusive Interference Model.
- Author
-
Joo, Changhee, Lin, Xiaojun, and Shroff, Ness B.
- Subjects
COMPUTER scheduling ,WIRELESS communications ,ELECTRIC network topology ,TELECOMMUNICATION lines ,STATISTICAL matching ,ALGORITHMS - Abstract
Greedy Maximal Matching (GMM) is an important scheduling scheme for multi-hop wireless networks. It is computationally simple, and has often been numerically shown to achieve throughput that is close to optimal. However, to date the performance limits of GMM have not been well understood. In particular, although a lower bound on its performance has been well known, this bound has been empirically found to be quite loose. In this paper, we focus on the well-established node-exclusive interference model and provide new analytical results that characterize the performance of GMM through a topological notion called the local-pooling factor. We show that for a given network graph with single-hop traffic, the efficiency ratio of GMM (i.e., the worst-case ratio of the throughput of GMM to that of the optimal) is equal to its local-pooling factor. Further, we estimate the local-pooling factor for arbitrary network graphs under the node-exclusive interference model and show that the efficiency ratio of GMM is no smaller than d* /2d* - 1 in a network topology of maximum node-degree d*. Using these results, we identify specific network topologies for which the efficiency ratio of GMM is strictly less than 1. We also extend the results to the more general scenario with multi-hop traffic, and show that GMM can achieve similar efficiency ratios when a flow-regulator is used at each hop. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
461. Node weighted scheduling
- Author
-
Gupta, Gagan R., Sanghavi, Sujay, and Shroff, Ness B.
- Published
- 2009
- Full Text
- View/download PDF
462. Utility Maximization for Communication Networks With Multipath Routing.
- Author
-
Xiaojun Lin and Shroff, Ness B.
- Subjects
- *
MAXIMA & minima , *TELECOMMUNICATION systems , *INFORMATION networks , *DATA transmission systems , *MAXIMAL functions , *ROUTING (Computer network management) , *COMPUTER network management , *MATHEMATICAL optimization , *TELECOMMUNICATION - Abstract
In this paper, we study utility maximization problems for communication networks where each user (or class) can have multiple alternative paths through the network. This type of multi-path utility maximization problems appear naturally in several resource allocation problems in communication networks, such as the multi-path flow control problem, the optimal quality-of-service (QoS) routing problem, and the optimal network pricing problem. We develop a distributed solution to this problem that is amenable to online implementation. We analyze the convergence of our algorithm in both continuous-time and discrete-time, and with and without measurement noise. These analyses provide us with guidelines on how to choose the parameters of the algorithm to ensure efficient network control. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
463. Special issue on models and algorithms for wireless mesh networks.
- Author
-
Cesana, Matteo, Lin, Xiaojun, Shroff, Ness B., and Zhang, Qian
- Published
- 2014
- Full Text
- View/download PDF
464. Scheduling of real‐time traffic in IEEE 802.11 wireless LANs
- Author
-
Coutras, Constantine, Gupta, Sanjay, and Shroff, Ness B.
- Abstract
The desire to provide universal connectivity for mobile computers and communication devices is fueling a growing interest in wireless packet networks. To satisfy the needs of wireless data networking, study group 802.11 was formed under IEEE project 802 to recommend an international standard for Wireless Local Area Networks (WLANs). A key part of the standard are the Medium Access Control (MAC) protocols. Given the growing popularity of real‐time services and multimedia based applications it is critical that the 802.11 MAC protocols be tailored to meet their requirements. The 802.11 MAC layer protocol provides asynchronous, time‐bounded, and contention free access control on a variety of physical layers. In this paper we examine the ability of the point coordination function to support time bounded services. We present our proposal to support real‐time services within the framework of the point coordination function and discuss the specifics of the connection establishment procedure. We conduct performance evaluation and present numerical results to help understand the issues involved.
- Published
- 2000
- Full Text
- View/download PDF
465. WLAN-log-based superspreader detection in the COVID-19 pandemic
- Author
-
Zhang, Cheng, Pan, Yunze, Zhang, Yunqi, Champion, Adam C., Shen, Zhaohui, Xuan, Dong, Lin, Zhiqiang, and Shroff, Ness B.
- Abstract
Identifying “superspreaders” of disease is a pressing concern for society during pandemics such as COVID-19. Superspreaders represent a group of people who have much more social contacts than others. The widespread deployment of WLAN infrastructure enables non-invasive contact tracing via people’s ubiquitous mobile devices. This technology offers promise for detecting superspreaders. In this paper, we propose a general framework for WLAN-log-based superspreader detection. In our framework, we first use WLAN logs to construct contact graphs by jointly considering human symmetric and asymmetric interactions. Next, we adopt three vertex centrality measurements over the contact graphs to generate three groups of superspreader candidates. Finally, we leverage SEIR simulation to determine groups of superspreaders among these candidates, who are the most critical individuals for the spread of disease based on the simulation results. We have implemented our framework and evaluate it over a WLAN dataset with 41 million log entries from a large-scale university. Our evaluation shows superspreaders exist on university campuses. They change over the first few weeks of a semester, but stabilize throughout the rest of the term. The data also demonstrate that both symmetric and asymmetric contact tracing can discover superspreaders, but the latter performs better with daily contact graphs. Further, the evaluation shows no consistent differences among three vertex centrality measures for long-term (i.e., weekly) contact graphs, which necessitates the inclusion of SEIR simulation in our framework. We believe our proposed framework and these results can provide timely guidance for public health administrators regarding effective testing, intervention, and vaccination policies.
- Published
- 2021
- Full Text
- View/download PDF
466. supp1-3194417.pdf
- Author
-
Shroff, Ness B., primary
- Full Text
- View/download PDF
467. Distributed optimal load shedding for disaster recovery in smart electric power grids.
- Author
-
Liu, Jia, Xia, Cathy H., Shroff, Ness B., and Sherali, Hanif D.
- Published
- 2014
- Full Text
- View/download PDF
468. Scheduling with queue length guarantees for shared resource systems.
- Author
-
Gupta, Gagan R. and Shroff, Ness B.
- Published
- 2008
- Full Text
- View/download PDF
469. Minimizing the Age of Information Through Queues.
- Author
-
Bedewy, Ahmed M., Sun, Yin, and Shroff, Ness B.
- Subjects
- *
INFORMATION society , *STOCHASTIC orders , *STOCHASTIC processes - Abstract
In this paper, we investigate scheduling policies that minimize the age of information in single-hop queueing systems. We propose a Last-Generated, First-Serve (LGFS) scheduling policy, in which the packet with the earliest generation time is processed with the highest priority. If the service times are i.i.d. exponentially distributed, the preemptive LGFS policy is proven to be age-optimal in a stochastic ordering sense. If the service times are i.i.d. and satisfy a New-Better-than-Used (NBU) distributional property, the non-preemptive LGFS policy is shown to be within a constant gap from the optimum age performance. These age-optimality results are quite general: (i) they hold for arbitrary packet generation times and arrival times (including out-of-order packet arrivals); (ii) they hold for multi-server packet scheduling with the possibility of replicating a packet over multiple servers; (iii) and they hold for minimizing not only the time-average age and mean peak age, but also for minimizing the age stochastic process and any non-decreasing functional of the age stochastic process. If the packet generation time is equal to the packet arrival time, the LGFS policies reduce to the Last-Come, First-Serve (LCFS) policies. Hence, the age optimality results of LCFS-type policies are also established. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
470. Out-of-Band Millimeter Wave Beamforming and Communications to Achieve Low Latency and High Energy Efficiency in 5G Systems.
- Author
-
Hashemi, Morteza, Koksal, C. Emre, and Shroff, Ness B.
- Subjects
- *
MILLIMETER wave communication systems , *5G networks , *BEAMFORMING , *TELECOMMUNICATION traffic , *BIT rate - Abstract
Communications in the millimeter wave (mmWave) band faces significant challenges due to variable channels, intermittent connectivity, and high energy usage. Moreover, speeds for electronic processing of data is of the same order as typical rates for mmWave interfaces, making the use of complex algorithms for tracking channel variations and adjusting resources impractical. In order to mitigate some of these challenges, we propose an architecture that integrates the sub-6 GHz and mmWave technologies. Our system exploits the spatial correlations between the sub-6 GHz and mmWave interfaces for beamforming and data transfer. Based on extensive experimentation in indoor and outdoor settings, we demonstrate that analog beamforming can be used in mmWave without incurring large overhead, thanks to the spatial correlations with sub-6 GHz. In addition, we incorporate the sub-6 GHz interface as a fallback (secondary) data transfer mechanism such that: 1) the negative effects of highly intermittent mmWave connectivity are mitigated and 2) the abundant mmWave capacity is fully exploited. To achieve these goals, we consider the problem of scheduling the arrival traffic over the mmWave or sub-6 GHz in order to maximize the mmWave throughput while delay (due to mmWave outages) is guaranteed to be bounded. We prove using subadditivity analysis that the optimal scheduling policy is based on a single threshold that can be easily adopted despite high link variations. Numerical results demonstrate that our scheduler provides a bounded mmWave delay performance, while it achieves a similar throughput performance as the throughput-optimal policies (e.g., MaxWeight). [ABSTRACT FROM PUBLISHER]
- Published
- 2018
- Full Text
- View/download PDF
471. Incentive design and profit sharing in multi-modal transportation networks.
- Author
-
Deng, Yuntian, Shao, Shiping, Mittal, Archak, Twumasi-Boakye, Richard, Fishelson, James, Gupta, Abhishek, and Shroff, Ness B.
- Subjects
- *
PROFIT-sharing , *COOPERATIVE game theory , *APPROXIMATION algorithms , *STOCHASTIC approximation , *MARKET design & structure (Economics) , *DISCOUNT prices - Abstract
We consider the situation where multiple transportation service providers cooperate to offer an integrated multi-modal platform to enhance the convenience to the passengers through ease in multi-modal journey planning, payment, and first and last mile connectivity. This market structure allows the multi-modal platform to coordinate profits across modes and also provide incentives to the passengers. Accordingly, in this paper, we use cooperative game theory coupled with the hyperpath-based stochastic user equilibrium framework to study such a market. We assume that the platform sets incentives (price discount or excess charge on passengers) along every edge in the transportation network. We derive the continuity and monotonicity properties of the equilibrium flow with respect to the incentives along every edge. The optimal incentives that maximize the profit of the platform are obtained through a two time-scale stochastic approximation algorithm. We use the asymmetric Nash bargaining solution to design a fair profit sharing scheme among the service providers. We show that the profit for each service provider increases after cooperation on such a platform. Finally, we complement the theoretical results through two numerical simulations. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
472. Delay Asymptotics With Retransmissions and Incremental Redundancy Codes Over Erasure Channels.
- Author
-
Yang, Tan, Jian, Shroff, Ness B., and Gamal, Hesham El
- Subjects
- *
ASYMPTOTIC expansions , *TIME delay systems , *BINARY erasure channels (Telecommunications) , *MARKOV processes , *CODING theory - Abstract
Recent studies have shown that retransmissions can cause heavy-tailed transmission delays even when packet sizes are light tailed. In addition, the impact of heavy-tailed delays persists even when packets size are upper bounded. The key question we study in this paper is how the use of coding techniques to transmit information, together with different system configurations, would affect the distribution of delay. To investigate this problem, we model the underlying channel as a Markov modulated binary erasure channel, where transmitted bits are either received successfully or erased. Erasure codes are used to encode information prior to transmission, which ensures that a fixed fraction of the bits in the codeword can lead to successful decoding. We use incremental redundancy codes, where the codeword is divided into codeword trunks and these trunks are transmitted one at a time to provide incremental redundancies to the receiver until the information is recovered. We characterize the distribution of delay under two different scenarios: 1) decoder uses memory to cache all previously successfully received bits and 2) decoder does not use memory, where received bits are discarded if the corresponding information cannot be decoded. In both cases, we consider codeword length with infinite and finite support. From a theoretical perspective, our results provide a benchmark to quantify the tradeoff between system complexity and the distribution of delay. [ABSTRACT FROM AUTHOR]
- Published
- 2014
- Full Text
- View/download PDF
473. Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting.
- Author
-
Swapna, B. T., Eryilmaz, Atilla, and Shroff, Ness B.
- Subjects
- *
LINEAR network coding , *TIME delay systems , *RADIO broadcasting , *WIRELESS communications , *PHASE transitions , *ASYMPTOTIC expansions , *DATA packeting - Abstract
In an unreliable single-hop broadcast network setting, we investigate the throughput and decoding-delay performance of random linear network coding as a function of the coding window size and the network size. Our model consists of a source transmitting packets of a single flow to a set of n users over independent time-correlated erasure channels. The source performs random linear network coding (RLNC) over k (coding window size) packets and broadcasts them to the users. We note that the broadcast throughput of RLNC must vanish with increasing n, for any fixed k. Hence, in contrast to other works in the literature, we investigate how the coding window size k must scale for increasing n. Our analysis reveals that the coding window size of \Theta (\ln (n)) represents a phase transition rate, below which the throughput converges to zero, and above which, it converges to the broadcast capacity. Further, we characterize the asymptotic distribution of decoding delay and provide approximate expressions for the mean and variance of decoding delay for the scaling regime of k=\omega (\ln (n)). These asymptotic expressions reveal the impact of channel correlations on the throughput and delay performance of RLNC. We also show that how our analysis can be extended to other rateless block coding schemes such as the LT codes. Finally, we comment on the extension of our results to the cases of dependent channels across users and asymmetric channel model. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
474. Optimal Sampling and Scheduling for Timely Status Updates in Multi-Source Networks.
- Author
-
Bedewy, Ahmed M., Sun, Yin, Kompella, Sastry, and Shroff, Ness B.
- Subjects
- *
SCHEDULING , *INFORMATION society , *WIRELESS sensor networks , *HAMILTON-Jacobi-Bellman equation - Abstract
We consider a joint sampling and scheduling problem for optimizing data freshness in multi-source systems. Data freshness is measured by a non-decreasing penalty function of age of information, where all sources have the same age-penalty function. Sources take turns to generate update packets, and forward them to their destinations one-by-one through a shared channel with random delay. There is a scheduler, that chooses the update order of the sources, and a sampler, that determines when a source should generate a new packet in its turn. We aim to find the optimal scheduler-sampler pairs that minimize the total-average age-penalty at delivery times (Ta-APD) and the total-average age-penalty (Ta-AP). We prove that the Maximum Age First (MAF) scheduler and the zero-wait sampler are jointly optimal for minimizing the Ta-APD. Meanwhile, the MAF scheduler and a relative value iteration with reduced complexity (RVI-RC) sampler are jointly optimal for minimizing the Ta-AP. The RVI-RC sampler is based on a relative value iteration algorithm whose complexity is reduced by exploiting a threshold property in the optimal sampler. Finally, a low-complexity threshold-type sampler is devised via an approximate analysis of Bellman’s equation. This threshold-type sampler reduces to a simple water-filling sampler for a linear age-penalty function. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
475. Delay-Optimal and Energy-Efficient Communications With Markovian Arrivals.
- Author
-
Zhao, Xiaoyu, Chen, Wei, Lee, Joohyun, and Shroff, Ness B.
- Subjects
- *
MARKOV processes , *QUEUING theory , *LINEAR programming , *CROSS layer optimization , *ADDITIVE white Gaussian noise , *RELAXATION methods (Mathematics) , *ALGORITHMS - Abstract
In this paper, delay-optimal and energy-efficient communication is studied for a single link under Markov random arrivals. We present the optimal tradeoff between delay and power over Additive White Gaussian Noise (AWGN) channels and extend the optimal tradeoff for block fading channels. Under time-correlated traffic arrivals, we develop a cross-layer solution that jointly considers the arrival rate, the queue length, and the channel state in order to minimize the average delay subject to a power constraint. For this purpose, we formulate the average delay and power problem as a Constrained Markov Decision Process (CMDP). Based on steady-state analysis for the CMDP, a Linear Programming (LP) problem is formulated to obtain the optimal delay-power tradeoff. We further show the optimal transmission strategy using a Lagrangian relaxation technique. Specifically, the optimal adaptive transmission is shown to have a threshold type of structure, where the thresholds on the queue length are presented for different transmission rates under the given arrival rates and channel states. By exploiting the result, we develop a threshold-based algorithm to efficiently obtain the optimal delay-power tradeoff. We show how a trajectory-sampling version of the proposed algorithm can be developed without the prior need of arrival statistics. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
476. Finding minimum node separators: A Markov chain Monte Carlo method.
- Author
-
Lee, Joohyun, Kwak, Jaewook, Lee, Hyang-Won, and Shroff, Ness B.
- Subjects
- *
MARKOV chain Monte Carlo , *ELECTRIC power distribution grids , *METROPOLIS , *COMPUTATIONAL complexity , *WATER distribution - Abstract
In networked systems such as communication networks or power grids, graph separation from node failures can damage the overall operation severely. One of the most important goals of network attackers is thus to separate nodes so that the sizes of connected components become small. In this work, we consider the problem of finding a minimum α -separator, that partitions the graph into connected components of sizes at most αn , where n is the number of nodes. To solve the α -separator problem, we develop a random walk algorithm based on Metropolis chain. We characterize the conditions for the first passage time (to find an optimal solution) of our algorithm. We also find an optimal cooling schedule, under which the random walk converges to an optimal solution almost surely. Furthermore, we generalize our algorithm to non-uniform node weights. We show through extensive simulations that the first passage time is less than O ( n 3 ), thereby validating our analysis. The solution found by our algorithm allows us to identify the weakest points in the network that need to be strengthened. Simulations in real topologies show that attacking a dense area is often not an efficient solution for partitioning a network into small components. [ABSTRACT FROM AUTHOR]
- Published
- 2018
- Full Text
- View/download PDF
477. Reward Maximization Under Uncertainty: Leveraging Side-Observations on Networks.
- Author
-
Buccapatnam, Swapna, Fang Liu, Eryilmaz, Atilla, and Shroff, Ness B.
- Subjects
- *
MULTI-armed bandit problem (Probability theory) , *ONLINE social networks , *MATHEMATICAL bounds , *MATHEMATICAL functions , *UNCERTAINTY - Abstract
We study the stochastic multi-armed bandit (MAB) problem in the presence of sideobservations across actions that occur as a result of an underlying network structure. In our model, a bipartite graph captures the relationship between actions and a common set of unknowns such that choosing an action reveals observations for the unknowns that it is connected to. This models a common scenario in online social networks where users respond to their friends' activity, thus providing side information about each other's preferences. Our contributions are as follows: 1) We derive an asymptotic lower bound (with respect to time) as a function of the bi-partite network structure on the regret of any uniformly good policy that achieves the maximum long-term average reward. 2) We propose two policies - a randomized policy; and a policy based on the well-known upper confidence bound (UCB) policies - both of which explore each action at a rate that is a function of its network position. We show, under mild assumptions, that these policies achieve the asymptotic lower bound on the regret up to a multiplicative factor, independent of the network structure. Finally, we use numerical examples on a real-world social network and a routing example network to demonstrate the benefits obtained by our policies over other existing policies. [ABSTRACT FROM AUTHOR]
- Published
- 2018
478. Update or Wait: How to Keep Your Data Fresh.
- Author
-
Sun, Yin, Uysal-Biyikoglu, Elif, Yates, Roy D., Koksal, C. Emre, and Shroff, Ness B.
- Subjects
- *
DATA , *PARTIALLY observable Markov decision processes , *QUEUEING networks , *SIGNAL filtering - Abstract
In this paper, we study how to optimally manage the freshness of information updates sent from a source node to a destination via a channel. A proper metric for data freshness at the destination is the age-of-information, or simply age, which is defined as how old the freshest received update is, since the moment that this update was generated at the source node (e.g., a sensor). A reasonable update policy is the zero-wait policy, i.e., the source node submits a fresh update once the previous update is delivered, which achieves the maximum throughput and the minimum delay. Surprisingly, this zero-wait policy does not always minimize the age. This counter-intuitive phenomenon motivates us to study how to optimally control information updates to keep the data fresh and to understand when the zero-wait policy is optimal. We introduce a general age penalty function to characterize the level of dissatisfaction on data staleness and formulate the average age penalty minimization problem as a constrained semi-Markov decision problem with an uncountable state space. We develop efficient algorithms to find the optimal update policy among all causal policies and establish sufficient and necessary conditions for the optimality of the zero-wait policy. Our investigation shows that the zero-wait policy is far from the optimum if: 1) the age penalty function grows quickly with respect to the age; 2) the packet transmission times over the channel are positively correlated over time; or 3) the packet transmission times are highly random (e.g., following a heavy-tail distribution). [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
479. Delay-Optimal Buffer-Aware Scheduling With Adaptive Transmission.
- Author
-
Chen, Xiang, Chen, Wei, Lee, Joohyun, and Shroff, Ness B.
- Subjects
- *
TELECOMMUNICATION systems , *LINEAR programming , *ALGORITHMS , *COMPUTER simulation , *MARKOV processes - Abstract
In this paper, we aim to obtain the optimal tradeoff between the average delay and the average power consumption in a communication system. In our system, the arrivals occur at each timeslot according to a Bernoulli arrival process, and are buffered at the transmitter waiting to be scheduled. We consider a finite buffer and allow the scheduling decision to depend on the buffer occupancy. In order to capture the realism in communication systems, the transmission power is assumed to be an increasing and convex function of the number of packets transmitted in each timeslot. This problem is modeled as a constrained Markov decision process (CMDP). We first prove that the optimal policy of the Lagrangian relaxation of the CMDP is deterministic and threshold-based. We then show that the optimal delay-power tradeoff curve is convex and piecewise linear, and the optimal policies of the original problem are also threshold-based. Based on the results, we propose an algorithm to obtain the optimal policy and the optimal tradeoff curve. We also show that the proposed algorithm is much more efficient than using general methods. The theoretical results and the algorithm are validated by linear programming and simulations. [ABSTRACT FROM PUBLISHER]
- Published
- 2017
- Full Text
- View/download PDF
480. Exploiting Channel Memory for Joint Estimation and Scheduling in Downlink Networks—a Whittle’s Indexability Analysis.
- Author
-
Ouyang, Wenzhuo, Murugesan, Sugumar, Eryilmaz, Atilla, and Shroff, Ness B.
- Subjects
- *
MULTIUSER computer systems , *CHANNEL estimation , *MARKOV processes , *AUTOMATIC Repeat reQuest (Data transmission system) , *COMPUTER scheduling , *INFORMATION theory - Abstract
We study opportunistic multiuser scheduling in downlink networks with Markov-modeled outage channels. We consider the scenario that the scheduler does not have full knowledge of the channel state information, but instead estimates the channel state by exploiting the memory inherent in the Markov channels along with Automatic-Repeat-reQues-styled-styled feedback from the scheduled users. Opportunistic scheduling is optimized in two stages: 1) channel estimation and rate adaptation are performed to maximize the short-term throughput, i.e., the successful transmission rate of the scheduled user in the current slot and 2) user scheduling is performed, based on the short-term throughput, to maximize the overall long-term sum-throughput of the downlink. The scheduling problem is a partially observable Markov decision process with the classic exploitation versus exploration tradeoff that is difficult to quantify. We, therefore, study the problem in the framework of restless multiarmed bandit processes, and perform a Whittle’s indexability analysis. Whittle’s indexability is traditionally known to be hard to establish and the index policy derived based on Whittle’s indexability is known to have optimality properties in various settings. We show that the problem of downlink scheduling under imperfect channel state information is Whittle indexable and derive the Whittle’s index policy in closed form. Through extensive numerical experiments, we show that the Whittle’s index policy has near-optimal performance and is robust against various imperfections in channel state feedback. Our work reveals that, under incomplete channel state information, exploiting channel memory for opportunistic scheduling can result in significant system-level performance gains and that almost all of these gains can be realized using the polynomial-complexity Whittle’s index policy. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
481. Optimal Energy-Aware Epidemic Routing in DTNs.
- Author
-
Eshghi, Soheil, Khouzani, M. H. R., Sarkar, Saswati, Shroff, Ness B., and Venkatesh, Santosh S.
- Subjects
- *
OPTIMAL control theory , *DELAY-tolerant networks , *QUALITY of service , *HEURISTIC algorithms , *MARKOV processes - Abstract
In this work, we investigate the use of epidemic routing in energy constrained delay tolerant networks (DTNs). In epidemic routing, messages are relayed by intermediate nodes at contact opportunities, i.e., when pairs of nodes come within the transmission range of each other. Each node needs to decide whether to forward its message upon contact with a new node based on its own residual energy level and the age of that message. We mathematically characterize the fundamental trade-off between energy conservation and a measure of Quality of Service as a dynamic energy-dependent optimal control problem. We prove that in the mean-field regime, the optimal dynamic forwarding decisions follow simple threshold-based structures in which the forwarding threshold for each node depends on its current remaining energy. We then characterize the nature of this dependence. Our simulations reveal that the optimal dynamic policy significantly outperforms heuristics. [ABSTRACT FROM AUTHOR]
- Published
- 2015
- Full Text
- View/download PDF
482. Secrecy Outage Capacity of Fading Channels.
- Author
-
Gungor, Onur, Tan, Jian, Koksal, Can Emre, El-Gamal, Hesham, and Shroff, Ness B.
- Subjects
- *
RADIO transmitter fading , *ERGODIC theory , *PROBABILITY theory , *COMMUNICATION , *INFORMATION theory , *COMPUTER network protocols , *WIRELESS communications - Abstract
This paper considers point-to-point secure communication over flat fading channels under an outage constraint. More specifically, we extend the definition of outage capacity to account for the secrecy constraint and obtain sharp characterizations of the corresponding fundamental limits under two different assumptions on the transmitter channel state information (CSI). First, we find the outage secrecy capacity assuming that the transmitter has perfect knowledge of the legitimate and eavesdropper channel gains. In this scenario, the capacity achieving scheme relies on opportunistically exchanging private keys between the legitimate nodes. These keys are stored in a key buffer and later used to secure delay sensitive data using the Vernam's one time pad technique. We then extend our results to the more practical scenario where the transmitter is assumed to know only the legitimate channel gain. Here, our achievability arguments rely on privacy amplification techniques to generate secret key bits. In the two cases, we also characterize the optimal power control policies which, interestingly, turn out to be a judicious combination of channel inversion and the optimal ergodic strategy. Finally, we analyze the effect of key buffer overflow on the overall outage probability. [ABSTRACT FROM AUTHOR]
- Published
- 2013
- Full Text
- View/download PDF
483. Distributed Signal Decorrelation and Detection in Multi View Camera Networks Using the Vector Sparse Matrix Transform.
- Author
-
Bachega LR, Hariharan S, Bouman CA, and Shroff NB
- Abstract
This paper introduces the vector sparse matrix transform (vector SMT), a new decorrelating transform suitable for performing distributed processing of high-dimensional signals in sensor networks. We assume that each sensor in the network encodes its measurements into vector outputs instead of scalar ones. The proposed transform decorrelates a sequence of pairs of vector outputs, until these vectors are decorrelated. In our experiments, we simulate distributed anomaly detection by a network of cameras, monitoring a spatial region. Each camera records an image of the monitored environment from its particular viewpoint and outputs a vector encoding the image. Our results, with both artificial and real data, show that the proposed vector SMT transform effectively decorrelates image measurements from the multiple cameras in the network while maintaining low overall communication energy consumption. Since it enables joint processing of the multiple vector outputs, our method provides significant improvements to anomaly detection accuracy when compared with the baseline case when the images are processed independently.
- Published
- 2015
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.