-
Classical Bandit Algorithms for Entanglement Detection in Parameterized Qubit States
Authors:
Bharati. K,
Vikesh Siddhu,
Krishna Jagannathan
Abstract:
Entanglement is a key resource for a wide range of tasks in quantum information and computing. Thus, verifying availability of this quantum resource is essential. Extensive research on entanglement detection has led to no-go theorems (Lu et al. [Phys. Rev. Lett., 116, 230501 (2016)]) that highlight the need for full state tomography (FST) in the absence of adaptive or joint measurements. Recent ad…
▽ More
Entanglement is a key resource for a wide range of tasks in quantum information and computing. Thus, verifying availability of this quantum resource is essential. Extensive research on entanglement detection has led to no-go theorems (Lu et al. [Phys. Rev. Lett., 116, 230501 (2016)]) that highlight the need for full state tomography (FST) in the absence of adaptive or joint measurements. Recent advancements, as proposed by Zhu, Teo, and Englert [Phys. Rev. A, 81, 052339, 2010], introduce a single-parameter family of entanglement witness measurements which are capable of conclusively detecting certain entangled states and only resort to FST when all witness measurements are inconclusive. We find a variety of realistic noisy two-qubit quantum states $\mathcal{F}$ that yield conclusive results under this witness family. We solve the problem of detecting entanglement among $K$ quantum states in $\mathcal{F}$, of which $m$ states are entangled, with $m$ potentially unknown. We recognize a structural connection of this problem to the Bad Arm Identification problem in stochastic Multi-Armed Bandits (MAB). In contrast to existing quantum bandit frameworks, we establish a new correspondence tailored for entanglement detection and term it the $(m,K)$-quantum Multi-Armed Bandit. We implement two well-known MAB policies for arbitrary states derived from $\mathcal{F}$, present theoretical guarantees on the measurement/sample complexity and demonstrate the practicality of the policies through numerical simulations. More broadly, this paper highlights the potential for employing classical machine learning techniques for quantum entanglement detection.
△ Less
Submitted 28 June, 2024;
originally announced June 2024.
-
Finite Time Analysis of Temporal Difference Learning for Mean-Variance in a Discounted MDP
Authors:
Tejaram Sangadi,
L. A. Prashanth,
Krishna Jagannathan
Abstract:
Motivated by risk-sensitive reinforcement learning scenarios, we consider the problem of policy evaluation for variance in a discounted reward Markov decision process (MDP). For this problem, a temporal difference (TD) type learning algorithm with linear function approximation (LFA) exists in the literature, though only asymptotic guarantees are available for this algorithm. We derive finite sampl…
▽ More
Motivated by risk-sensitive reinforcement learning scenarios, we consider the problem of policy evaluation for variance in a discounted reward Markov decision process (MDP). For this problem, a temporal difference (TD) type learning algorithm with linear function approximation (LFA) exists in the literature, though only asymptotic guarantees are available for this algorithm. We derive finite sample bounds that hold (i) in the mean-squared sense; and (ii) with high probability, when tail iterate averaging is employed with/without regularization. Our bounds exhibit exponential decay for the initial error, while the overall bound is $O(1/t)$, where $t$ is the number of update iterations of the TD algorithm. Further, the bound for the regularized TD variant is for a universal step size. Our bounds open avenues for analysis of actor-critic algorithms for mean-variance optimization in a discounted MDP.
△ Less
Submitted 12 June, 2024;
originally announced June 2024.
-
Concentration Bounds for Optimized Certainty Equivalent Risk Estimation
Authors:
Ayon Ghosh,
L. A. Prashanth,
Krishna Jagannathan
Abstract:
We consider the problem of estimating the Optimized Certainty Equivalent (OCE) risk from independent and identically distributed (i.i.d.) samples. For the classic sample average approximation (SAA) of OCE, we derive mean-squared error as well as concentration bounds (assuming sub-Gaussianity). Further, we analyze an efficient stochastic approximation-based OCE estimator, and derive finite sample b…
▽ More
We consider the problem of estimating the Optimized Certainty Equivalent (OCE) risk from independent and identically distributed (i.i.d.) samples. For the classic sample average approximation (SAA) of OCE, we derive mean-squared error as well as concentration bounds (assuming sub-Gaussianity). Further, we analyze an efficient stochastic approximation-based OCE estimator, and derive finite sample bounds for the same. To show the applicability of our bounds, we consider a risk-aware bandit problem, with OCE as the risk. For this problem, we derive bound on the probability of mis-identification. Finally, we conduct numerical experiments to validate the theoretical findings.
△ Less
Submitted 31 May, 2024;
originally announced May 2024.
-
Capacity Achieving Codes for an Erasure Queue-Channel
Authors:
Jaswanthi Mandalapu,
Krishna Jagannathan,
Avhishek Chatterjee,
Andrew Thangaraj
Abstract:
We consider a queue-channel model that captures the waiting time-dependent degradation of information bits as they wait to be transmitted. Such a scenario arises naturally in quantum communications, where quantum bits tend to decohere rapidly. Trailing the capacity results obtained recently for certain queue-channels, this paper aims to construct practical channel codes for the erasure queue-chann…
▽ More
We consider a queue-channel model that captures the waiting time-dependent degradation of information bits as they wait to be transmitted. Such a scenario arises naturally in quantum communications, where quantum bits tend to decohere rapidly. Trailing the capacity results obtained recently for certain queue-channels, this paper aims to construct practical channel codes for the erasure queue-channel (EQC) -- a channel characterized by highly correlated erasures, governed by the underlying queuing dynamics. Our main contributions in this paper are twofold: (i) We propose a generic `wrapper' based on interleaving across renewal blocks of the queue to convert any capacity-achieving block code for a memoryless erasure channel to a capacity-achieving code for the EQC. Next, due to the complexity involved in implementing interleaved systems, (ii) we study the performance of LDPC and Polar codes without any interleaving. We show that standard Arıkan's Polar transform polarizes the EQC for certain restricted class of erasure probability functions. We also highlight some possible approaches and the corresponding challenges involved in proving polarization of a general EQC.
△ Less
Submitted 6 May, 2023;
originally announced May 2023.
-
Finite Time Bounds for Stochastic Bounded Confidence Dynamics
Authors:
Sushmitha Shree S,
Avhishek Chatterjee,
Krishna Jagannathan
Abstract:
In this era of fast and large-scale opinion formation, a mathematical understanding of opinion evolution, a.k.a. opinion dynamics, acquires importance. Linear graph-based dynamics and bounded confidence dynamics are the two popular models for opinion dynamics in social networks. Stochastic bounded confidence (SBC) opinion dynamics was proposed as a general framework that incorporates both these dy…
▽ More
In this era of fast and large-scale opinion formation, a mathematical understanding of opinion evolution, a.k.a. opinion dynamics, acquires importance. Linear graph-based dynamics and bounded confidence dynamics are the two popular models for opinion dynamics in social networks. Stochastic bounded confidence (SBC) opinion dynamics was proposed as a general framework that incorporates both these dynamics as special cases and also captures the inherent stochasticity and noise (errors) in real-life social exchanges. Although SBC dynamics is quite general and realistic, its analysis is more challenging. This is because SBC dynamics is nonlinear and stochastic, and belongs to the class of Markov processes that have asymptotically zero drift and unbounded jumps. The asymptotic behavior of SBC dynamics was characterized in prior works. However, they do not shed light on its finite-time behavior, which is often of interest in practice. We take a stride in this direction by analyzing the finite-time behavior of a two-agent system and a bistar graph, which are crucial to the understanding of general multi-agent dynamics. In particular, we show that the opinion difference between the two agents is well-concentrated around zero under the conditions that lead to asymptotic stability of the SBC dynamics.
△ Less
Submitted 27 December, 2022;
originally announced December 2022.
-
Towards Maximizing Nonlinear Delay Sensitive Rewards in Queuing Systems
Authors:
Sushmitha Shree S,
Avijit Mandal,
Avhishek Chatterjee,
Krishna Jagannathan
Abstract:
We consider maximizing the long-term average reward in a single server queue, where the reward obtained for a job is a non-increasing function of its sojourn time. The motivation behind this work comes from multiple applications, including quantum information processing and multimedia streaming. We introduce a new service discipline, shortest predicted sojourn time (SPST), which, in simulations, p…
▽ More
We consider maximizing the long-term average reward in a single server queue, where the reward obtained for a job is a non-increasing function of its sojourn time. The motivation behind this work comes from multiple applications, including quantum information processing and multimedia streaming. We introduce a new service discipline, shortest predicted sojourn time (SPST), which, in simulations, performs better than well-known disciplines. We also present some limited analytical guarantees for this highly intricate problem.
△ Less
Submitted 1 November, 2022;
originally announced November 2022.
-
The Classical Capacity of Quantum Jackson Networks with Waiting Time-Dependent Erasures
Authors:
Jaswanthi Mandalapu,
Krishna Jagannathan
Abstract:
We study the fundamental limits of classical communication using quantum states that decohere as they traverse through a network of queues. We consider a network of Markovian queues, known as a Jackson network, with a single source or multiple sources and a single destination. Qubits are communicated through this network with inevitable buffering at intermediate nodes. We model each node as a `que…
▽ More
We study the fundamental limits of classical communication using quantum states that decohere as they traverse through a network of queues. We consider a network of Markovian queues, known as a Jackson network, with a single source or multiple sources and a single destination. Qubits are communicated through this network with inevitable buffering at intermediate nodes. We model each node as a `queue-channel,' wherein as the qubits wait in buffer, they continue to interact with the environment and suffer a waiting time-dependent noise. Focusing on erasures, we first obtain explicit classical capacity expressions for simple topologies such as tandem queue-channel and parallel queue-channel. Using these as building blocks, we characterize the classical capacity of a general quantum Jackson network with waiting time-dependent erasures. Throughout, we study two types of quantum networks, namely, (i) Repeater-assisted and (ii) Repeater-less. We also obtain optimal pum** rates and routing probabilities to maximize capacity in simple topologies. More broadly, our work quantifies the impact of delay-induced decoherence on the fundamental limits of classical communication over quantum networks.
△ Less
Submitted 9 June, 2022;
originally announced June 2022.
-
A Survey of Risk-Aware Multi-Armed Bandits
Authors:
Vincent Y. F. Tan,
Prashanth L. A.,
Krishna Jagannathan
Abstract:
In several applications such as clinical trials and financial portfolio optimization, the expected value (or the average reward) does not satisfactorily capture the merits of a drug or a portfolio. In such applications, risk plays a crucial role, and a risk-aware performance measure is preferable, so as to capture losses in the case of adverse events. This survey aims to consolidate and summarise…
▽ More
In several applications such as clinical trials and financial portfolio optimization, the expected value (or the average reward) does not satisfactorily capture the merits of a drug or a portfolio. In such applications, risk plays a crucial role, and a risk-aware performance measure is preferable, so as to capture losses in the case of adverse events. This survey aims to consolidate and summarise the existing research on risk measures, specifically in the context of multi-armed bandits. We review various risk measures of interest, and comment on their properties. Next, we review existing concentration inequalities for various risk measures. Then, we proceed to defining risk-aware bandit problems, We consider algorithms for the regret minimization setting, where the exploration-exploitation trade-off manifests, as well as the best-arm identification setting, which is a pure exploration problem -- both in the context of risk-sensitive measures. We conclude by commenting on persisting challenges and fertile areas for future research.
△ Less
Submitted 11 May, 2022;
originally announced May 2022.
-
Stochastic Bounded Confidence Opinion Dynamics: How Far Apart Do Opinions Drift?
Authors:
Sushmitha Shree S,
Kishore G V,
Avhishek Chatterjee,
Krishna Jagannathan
Abstract:
In this era of fast and large-scale opinion formation, a mathematical understanding of opinion evolution, a.k.a. opinion dynamics, is especially important. Linear graph-based dynamics and bounded confidence dynamics are the two most popular models for opinion dynamics in social networks. Recently, stochastic bounded confidence opinion dynamics were proposed as a general framework that incorporates…
▽ More
In this era of fast and large-scale opinion formation, a mathematical understanding of opinion evolution, a.k.a. opinion dynamics, is especially important. Linear graph-based dynamics and bounded confidence dynamics are the two most popular models for opinion dynamics in social networks. Recently, stochastic bounded confidence opinion dynamics were proposed as a general framework that incorporates both these dynamics as special cases and also captures the inherent stochasticity and noise (errors) in real-life social exchanges. Although these dynamics are quite general and realistic, their analysis is particularly challenging compared to other opinion dynamics models. This is because these dynamics are nonlinear and stochastic, and belong to the class of Markov processes that have asymptotically zero drift and unbounded jumps. The asymptotic behavior of these dynamics was characterized in prior works. However, they do not shed light on their finite-time behavior, which is often of interest in practice. We take a stride in this direction by analyzing the finite time behavior of a two-agent system, which is fundamental to the understanding of multi-agent dynamics. In particular, we show that the opinion difference between the two agents is well concentrated around zero under the conditions that lead to asymptotic stability of the dynamics.
△ Less
Submitted 8 December, 2021;
originally announced December 2021.
-
Online Estimation and Optimization of Utility-Based Shortfall Risk
Authors:
Vishwajit Hegde,
Arvind S. Menon,
L. A. Prashanth,
Krishna Jagannathan
Abstract:
Utility-Based Shortfall Risk (UBSR) is a risk metric that is increasingly popular in financial applications, owing to certain desirable properties that it enjoys. We consider the problem of estimating UBSR in a recursive setting, where samples from the underlying loss distribution are available one-at-a-time. We cast the UBSR estimation problem as a root finding problem, and propose stochastic app…
▽ More
Utility-Based Shortfall Risk (UBSR) is a risk metric that is increasingly popular in financial applications, owing to certain desirable properties that it enjoys. We consider the problem of estimating UBSR in a recursive setting, where samples from the underlying loss distribution are available one-at-a-time. We cast the UBSR estimation problem as a root finding problem, and propose stochastic approximation-based estimations schemes. We derive non-asymptotic bounds on the estimation error in the number of samples. We also consider the problem of UBSR optimization within a parameterized class of random variables. We propose a stochastic gradient descent based algorithm for UBSR optimization, and derive non-asymptotic bounds on its convergence.
△ Less
Submitted 27 November, 2023; v1 submitted 16 November, 2021;
originally announced November 2021.
-
Unital Qubit Queue-channels: Classical Capacity and Product Decoding
Authors:
Vikesh Siddhu,
Avhishek Chatterjee,
Krishna Jagannathan,
Prabha Mandayam,
Sridhar Tayur
Abstract:
Quantum queue-channels arise naturally in the context of buffering in quantum networks, wherein the noise suffered by the quantum states depends on the time spent waiting in the buffer. It has been shown that the upper-bound on the classical capacity of an additive queue-channel has a simple expression, and is achievable for the erasure and depolarizing channels [IEEE JSAIT, 1(2):432-444]. In this…
▽ More
Quantum queue-channels arise naturally in the context of buffering in quantum networks, wherein the noise suffered by the quantum states depends on the time spent waiting in the buffer. It has been shown that the upper-bound on the classical capacity of an additive queue-channel has a simple expression, and is achievable for the erasure and depolarizing channels [IEEE JSAIT, 1(2):432-444]. In this paper, we characterise the classical capacity for the class of unital qubit queue-channels, and show that a simple product (non-entangled) decoding strategy is capacity-achieving. As an intermediate result, we derive an explicit capacity achieving product decoding strategy for any i.i.d. unital qubit channel, which could be of independent interest. As an important special case, we also derive the capacity and optimal decoding strategies for a symmetric generalized amplitude dam** (GAD) queue-channel. Our results provide useful insights towards designing practical quantum communication networks, and highlight the need to explicitly model the impact of buffering.
△ Less
Submitted 26 October, 2022; v1 submitted 6 October, 2021;
originally announced October 2021.
-
Queue-Channel Capacities with Generalized Amplitude Dam**
Authors:
Vikesh Siddhu,
Avhishek Chatterjee,
Krishna Jagannathan,
Prabha Mandayam,
Sridhar Tayur
Abstract:
The generalized amplitude dam** channel (GADC) is considered an important model for quantum communications, especially over optical networks. We make two salient contributions in this paper apropos of this channel. First, we consider a symmetric GAD channel characterized by the parameter $n=1/2,$ and derive its exact classical capacity, by constructing a specific induced classical channel. We sh…
▽ More
The generalized amplitude dam** channel (GADC) is considered an important model for quantum communications, especially over optical networks. We make two salient contributions in this paper apropos of this channel. First, we consider a symmetric GAD channel characterized by the parameter $n=1/2,$ and derive its exact classical capacity, by constructing a specific induced classical channel. We show that the Holevo quantity for the GAD channel equals the Shannon capacity of the induced binary symmetric channel, establishing at once the capacity result and that the GAD channel capacity can be achieved without the use of entanglement at the encoder or joint measurements at the decoder. Second, motivated by the inevitable buffering of qubits in quantum networks, we consider a generalized amplitude dam** \emph{queue-channel} -- that is, a setting where qubits suffer a waiting time dependent GAD noise as they wait in a buffer to be transmitted. This GAD queue channel is characterized by non-i.i.d. noise due to correlated waiting times of consecutive qubits. We exploit a conditional independence property in conjunction with additivity of the channel model, to obtain a capacity expression for the GAD queue channel in terms of the stationary waiting time in the queue. Our results provide useful insights towards designing practical quantum communication networks, and highlight the need to explicitly model the impact of buffering.
△ Less
Submitted 28 July, 2021;
originally announced July 2021.
-
Statistically Robust, Risk-Averse Best Arm Identification in Multi-Armed Bandits
Authors:
Anmol Kagrecha,
Jayakrishnan Nair,
Krishna Jagannathan
Abstract:
Traditional multi-armed bandit (MAB) formulations usually make certain assumptions about the underlying arms' distributions, such as bounds on the support or their tail behaviour. Moreover, such parametric information is usually 'baked' into the algorithms. In this paper, we show that specialized algorithms that exploit such parametric information are prone to inconsistent learning performance whe…
▽ More
Traditional multi-armed bandit (MAB) formulations usually make certain assumptions about the underlying arms' distributions, such as bounds on the support or their tail behaviour. Moreover, such parametric information is usually 'baked' into the algorithms. In this paper, we show that specialized algorithms that exploit such parametric information are prone to inconsistent learning performance when the parameter is misspecified. Our key contributions are twofold: (i) We establish fundamental performance limits of statistically robust MAB algorithms under the fixed-budget pure exploration setting, and (ii) We propose two classes of algorithms that are asymptotically near-optimal. Additionally, we consider a risk-aware criterion for best arm identification, where the objective associated with each arm is a linear combination of the mean and the conditional value at risk (CVaR). Throughout, we make a very mild 'bounded moment' assumption, which lets us work with both light-tailed and heavy-tailed distributions within a unified framework.
△ Less
Submitted 27 March, 2022; v1 submitted 28 August, 2020;
originally announced August 2020.
-
Bandit algorithms: Letting go of logarithmic regret for statistical robustness
Authors:
Kumar Ashutosh,
Jayakrishnan Nair,
Anmol Kagrecha,
Krishna Jagannathan
Abstract:
We study regret minimization in a stochastic multi-armed bandit setting and establish a fundamental trade-off between the regret suffered under an algorithm, and its statistical robustness. Considering broad classes of underlying arms' distributions, we show that bandit learning algorithms with logarithmic regret are always inconsistent and that consistent learning algorithms always suffer a super…
▽ More
We study regret minimization in a stochastic multi-armed bandit setting and establish a fundamental trade-off between the regret suffered under an algorithm, and its statistical robustness. Considering broad classes of underlying arms' distributions, we show that bandit learning algorithms with logarithmic regret are always inconsistent and that consistent learning algorithms always suffer a super-logarithmic regret. This result highlights the inevitable statistical fragility of all `logarithmic regret' bandit algorithms available in the literature---for instance, if a UCB algorithm designed for $σ$-subGaussian distributions is used in a subGaussian setting with a mismatched variance parameter, the learning performance could be inconsistent. Next, we show a positive result: statistically robust and consistent learning performance is attainable if we allow the regret to be slightly worse than logarithmic. Specifically, we propose three classes of distribution oblivious algorithms that achieve an asymptotic regret that is arbitrarily close to logarithmic.
△ Less
Submitted 22 June, 2020;
originally announced June 2020.
-
Constrained regret minimization for multi-criterion multi-armed bandits
Authors:
Anmol Kagrecha,
Jayakrishnan Nair,
Krishna Jagannathan
Abstract:
We consider a stochastic multi-armed bandit setting and study the problem of constrained regret minimization over a given time horizon. Each arm is associated with an unknown, possibly multi-dimensional distribution, and the merit of an arm is determined by several, possibly conflicting attributes. The aim is to optimize a 'primary' attribute subject to user-provided constraints on other 'secondar…
▽ More
We consider a stochastic multi-armed bandit setting and study the problem of constrained regret minimization over a given time horizon. Each arm is associated with an unknown, possibly multi-dimensional distribution, and the merit of an arm is determined by several, possibly conflicting attributes. The aim is to optimize a 'primary' attribute subject to user-provided constraints on other 'secondary' attributes. We assume that the attributes can be estimated using samples from the arms' distributions, and that the estimators enjoy suitable concentration properties. We propose an algorithm called Con-LCB that guarantees a logarithmic regret, i.e., the average number of plays of all non-optimal arms is at most logarithmic in the horizon. The algorithm also outputs a Boolean flag that correctly identifies, with high probability, whether the given instance is feasible/infeasible with respect to the constraints. We also show that Con-LCB is optimal within a universal constant, i.e., that more sophisticated algorithms cannot do much better universally. Finally, we establish a fundamental trade-off between regret minimization and feasibility identification. Our framework finds natural applications, for instance, in financial portfolio optimization, where risk constrained maximization of expected return is meaningful.
△ Less
Submitted 3 January, 2023; v1 submitted 17 June, 2020;
originally announced June 2020.
-
A Framework for End-to-End Deep Learning-Based Anomaly Detection in Transportation Networks
Authors:
Neema Davis,
Gaurav Raina,
Krishna Jagannathan
Abstract:
We develop an end-to-end deep learning-based anomaly detection model for temporal data in transportation networks. The proposed EVT-LSTM model is derived from the popular LSTM (Long Short-Term Memory) network and adopts an objective function that is based on fundamental results from EVT (Extreme Value Theory). We compare the EVT-LSTM model with some established statistical, machine learning, and h…
▽ More
We develop an end-to-end deep learning-based anomaly detection model for temporal data in transportation networks. The proposed EVT-LSTM model is derived from the popular LSTM (Long Short-Term Memory) network and adopts an objective function that is based on fundamental results from EVT (Extreme Value Theory). We compare the EVT-LSTM model with some established statistical, machine learning, and hybrid deep learning baselines. Experiments on seven diverse real-world data sets demonstrate the superior anomaly detection performance of our proposed model over the other models considered in the comparison study.
△ Less
Submitted 20 November, 2019;
originally announced November 2019.
-
LSTM-Based Anomaly Detection: Detection Rules from Extreme Value Theory
Authors:
Neema Davis,
Gaurav Raina,
Krishna Jagannathan
Abstract:
In this paper, we explore various statistical techniques for anomaly detection in conjunction with the popular Long Short-Term Memory (LSTM) deep learning model for transportation networks. We obtain the prediction errors from an LSTM model, and then apply three statistical models based on (i) the Gaussian distribution, (ii) Extreme Value Theory (EVT), and (iii) the Tukey's method. Using statistic…
▽ More
In this paper, we explore various statistical techniques for anomaly detection in conjunction with the popular Long Short-Term Memory (LSTM) deep learning model for transportation networks. We obtain the prediction errors from an LSTM model, and then apply three statistical models based on (i) the Gaussian distribution, (ii) Extreme Value Theory (EVT), and (iii) the Tukey's method. Using statistical tests and numerical studies, we find strong evidence against the widely employed Gaussian distribution based detection rule on the prediction errors. Next, motivated by fundamental results from Extreme Value Theory, we propose a detection technique that does not assume any parent distribution on the prediction errors. Through numerical experiments conducted on several real-world traffic data sets, we show that the EVT-based detection rule is superior to other detection rules, and is supported by statistical evidence.
△ Less
Submitted 13 September, 2019;
originally announced September 2019.
-
The Classical Capacity of Additive Quantum Queue-Channels
Authors:
Prabha Mandayam,
Krishna Jagannathan,
Avhishek Chatterjee
Abstract:
We consider a setting where a stream of qubits is processed sequentially. We derive fundamental limits on the rate at which classical information can be transmitted using qubits that decohere as they wait to be processed. Specifically, we model the sequential processing of qubits using a single server queue, and derive expressions for the classical capacity of such a quantum `queue-channel.' Focus…
▽ More
We consider a setting where a stream of qubits is processed sequentially. We derive fundamental limits on the rate at which classical information can be transmitted using qubits that decohere as they wait to be processed. Specifically, we model the sequential processing of qubits using a single server queue, and derive expressions for the classical capacity of such a quantum `queue-channel.' Focusing on two important noise models, namely the erasure channel and the depolarizing channel, we obtain explicit single-letter capacity formulas in terms of the stationary waiting time of qubits in the queue. Our capacity proof also implies that a `classical' coding/decoding strategy is optimal, i.e., an encoder which uses only orthogonal product states, and a decoder which measures in a fixed product basis, are sufficient to achieve the classical capacity of both queue-channels. Our proof technique for the converse theorem generalizes readily -- in particular, whenever the underlying quantum noise channel is additive, we can obtain a single-letter upper bound on the classical capacity of the corresponding quantum queue-channel. More broadly, our work begins to quantitatively address the impact of decoherence on the performance limits of quantum information processing systems.
△ Less
Submitted 10 August, 2020; v1 submitted 4 June, 2019;
originally announced June 2019.
-
Distribution oblivious, risk-aware algorithms for multi-armed bandits with unbounded rewards
Authors:
Anmol Kagrecha,
Jayakrishnan Nair,
Krishna Jagannathan
Abstract:
Classical multi-armed bandit problems use the expected value of an arm as a metric to evaluate its goodness. However, the expected value is a risk-neutral metric. In many applications like finance, one is interested in balancing the expected return of an arm (or portfolio) with the risk associated with that return. In this paper, we consider the problem of selecting the arm that optimizes a linear…
▽ More
Classical multi-armed bandit problems use the expected value of an arm as a metric to evaluate its goodness. However, the expected value is a risk-neutral metric. In many applications like finance, one is interested in balancing the expected return of an arm (or portfolio) with the risk associated with that return. In this paper, we consider the problem of selecting the arm that optimizes a linear combination of the expected reward and the associated Conditional Value at Risk (CVaR) in a fixed budget best-arm identification framework. We allow the reward distributions to be unbounded or even heavy-tailed. For this problem, our goal is to devise algorithms that are entirely distribution oblivious, i.e., the algorithm is not aware of any information on the reward distributions, including bounds on the moments/tails, or the suboptimality gaps across arms.
In this paper, we provide a class of such algorithms with provable upper bounds on the probability of incorrect identification. In the process, we develop a novel estimator for the CVaR of unbounded (including heavy-tailed) random variables and prove a concentration inequality for the same, which could be of independent interest. We also compare the error bounds for our distribution oblivious algorithms with those corresponding to standard non-oblivious algorithms. Finally, numerical experiments reveal that our algorithms perform competitively when compared with non-oblivious algorithms, suggesting that distribution obliviousness can be realised in practice without incurring a significant loss of performance.
△ Less
Submitted 3 June, 2019;
originally announced June 2019.
-
On Minimizing the Maximum Age-of-Information For Wireless Erasure Channels
Authors:
Arunabh Srivastava,
Abhishek Sinha,
Krishna Jagannathan
Abstract:
Age-of-Information (AoI) is a recently proposed metric for quantifying the freshness of information from the UE's perspective in a communication network. Recently, Kadota et al. [1] have proposed an index-type approximately optimal scheduling policy for minimizing the average-AoI metric for a downlink transmission problem. For delay-sensitive applications, including real-time control of a cyber-ph…
▽ More
Age-of-Information (AoI) is a recently proposed metric for quantifying the freshness of information from the UE's perspective in a communication network. Recently, Kadota et al. [1] have proposed an index-type approximately optimal scheduling policy for minimizing the average-AoI metric for a downlink transmission problem. For delay-sensitive applications, including real-time control of a cyber-physical system, or scheduling URLLC traffic in 5G, it is essential to have a more stringent uniform control on AoI across all users. In this paper, we derive an exactly optimal scheduling policy for this problem in a downlink cellular system with erasure channels. Our proof of optimality involves an explicit solution to the associated average-cost Bellman Equation, which might be of independent theoretical interest. We also establish that the resulting Age-process is positive recurrent under the optimal policy, and has an exponentially light tail, with the optimal large-deviation exponent. Finally, motivated by typical applications in small-cell residential networks, we consider the problem of minimizing the peak-AoI with throughput constraints to specific UEs, and derive a heuristic policy for this problem. Extensive numerical simulations have been carried out to compare the efficacy of the proposed policies with other well-known scheduling policies, such as Randomized scheduling and Proportional Fair.
△ Less
Submitted 1 April, 2019;
originally announced April 2019.
-
Grids versus Graphs: Partitioning Space for Improved Taxi Demand-Supply Forecasts
Authors:
Neema Davis,
Gaurav Raina,
Krishna Jagannathan
Abstract:
Accurate taxi demand-supply forecasting is a challenging application of ITS (Intelligent Transportation Systems), due to the complex spatial and temporal patterns. We investigate the impact of different spatial partitioning techniques on the prediction performance of an LSTM (Long Short-Term Memory) network, in the context of taxi demand-supply forecasting. We consider two tessellation schemes: (i…
▽ More
Accurate taxi demand-supply forecasting is a challenging application of ITS (Intelligent Transportation Systems), due to the complex spatial and temporal patterns. We investigate the impact of different spatial partitioning techniques on the prediction performance of an LSTM (Long Short-Term Memory) network, in the context of taxi demand-supply forecasting. We consider two tessellation schemes: (i) the variable-sized Voronoi tessellation, and (ii) the fixed-sized Geohash tessellation. While the widely employed ConvLSTM (Convolutional LSTM) can model fixed-sized Geohash partitions, the standard convolutional filters cannot be applied on the variable-sized Voronoi partitions. To explore the Voronoi tessellation scheme, we propose the use of GraphLSTM (Graph-based LSTM), by representing the Voronoi spatial partitions as nodes on an arbitrarily structured graph. The GraphLSTM offers competitive performance against ConvLSTM, at lower computational complexity, across three real-world large-scale taxi demand-supply data sets, with different performance metrics. To ensure superior performance across diverse settings, a HEDGE based ensemble learning algorithm is applied over the ConvLSTM and the GraphLSTM networks.
△ Less
Submitted 18 February, 2019;
originally announced February 2019.
-
Concentration bounds for CVaR estimation: The cases of light-tailed and heavy-tailed distributions
Authors:
Prashanth L. A.,
Krishna Jagannathan,
Ravi Kumar Kolla
Abstract:
Conditional Value-at-Risk (CVaR) is a widely used risk metric in applications such as finance. We derive concentration bounds for CVaR estimates, considering separately the cases of light-tailed and heavy-tailed distributions. In the light-tailed case, we use a classical CVaR estimator based on the empirical distribution constructed from the samples. For heavy-tailed random variables, we assume a…
▽ More
Conditional Value-at-Risk (CVaR) is a widely used risk metric in applications such as finance. We derive concentration bounds for CVaR estimates, considering separately the cases of light-tailed and heavy-tailed distributions. In the light-tailed case, we use a classical CVaR estimator based on the empirical distribution constructed from the samples. For heavy-tailed random variables, we assume a mild `bounded moment' condition, and derive a concentration bound for a truncation-based estimator. Notably, our concentration bounds enjoy an exponential decay in the sample size, for heavy-tailed as well as light-tailed distributions. To demonstrate the applicability of our concentration results, we consider a CVaR optimization problem in a multi-armed bandit setting. Specifically, we address the best CVaR-arm identification problem under a fixed budget. We modify the well-known successive rejects algorithm to incorporate a CVaR-based criterion. Using the CVaR concentration result, we derive an upper-bound on the probability of incorrect identification by the proposed algorithm.
△ Less
Submitted 25 August, 2019; v1 submitted 4 January, 2019;
originally announced January 2019.
-
Taxi Demand-Supply Forecasting: Impact of Spatial Partitioning on the Performance of Neural Networks
Authors:
Neema Davis,
Gaurav Raina,
Krishna Jagannathan
Abstract:
In this paper, we investigate the significance of choosing an appropriate tessellation strategy for a spatio-temporal taxi demand-supply modeling framework. Our study compares (i) the variable-sized polygon based Voronoi tessellation, and (ii) the fixed-sized grid based Geohash tessellation, using taxi demand-supply GPS data for the cities of Bengaluru, India and New York, USA. Long Short-Term Mem…
▽ More
In this paper, we investigate the significance of choosing an appropriate tessellation strategy for a spatio-temporal taxi demand-supply modeling framework. Our study compares (i) the variable-sized polygon based Voronoi tessellation, and (ii) the fixed-sized grid based Geohash tessellation, using taxi demand-supply GPS data for the cities of Bengaluru, India and New York, USA. Long Short-Term Memory (LSTM) networks are used for modeling and incorporating information from spatial neighbors into the model. We find that the LSTM model based on input features extracted from a variable-sized polygon tessellation yields superior performance over the LSTM model based on fixed-sized grid tessellation. Our study highlights the need to explore multiple spatial partitioning techniques for improving the prediction performance in neural network models.
△ Less
Submitted 10 December, 2018;
originally announced December 2018.
-
Concentration bounds for empirical conditional value-at-risk: The unbounded case
Authors:
Ravi Kumar Kolla,
Prashanth L. A.,
Sanjay P. Bhat,
Krishna Jagannathan
Abstract:
In several real-world applications involving decision making under uncertainty, the traditional expected value objective may not be suitable, as it may be necessary to control losses in the case of a rare but extreme event. Conditional Value-at-Risk (CVaR) is a popular risk measure for modeling the aforementioned objective. We consider the problem of estimating CVaR from i.i.d. samples of an unbou…
▽ More
In several real-world applications involving decision making under uncertainty, the traditional expected value objective may not be suitable, as it may be necessary to control losses in the case of a rare but extreme event. Conditional Value-at-Risk (CVaR) is a popular risk measure for modeling the aforementioned objective. We consider the problem of estimating CVaR from i.i.d. samples of an unbounded random variable, which is either sub-Gaussian or sub-exponential. We derive a novel one-sided concentration bound for a natural sample-based CVaR estimator in this setting. Our bound relies on a concentration result for a quantile-based estimator for Value-at-Risk (VaR), which may be of independent interest.
△ Less
Submitted 6 August, 2018;
originally announced August 2018.
-
Impact of delayed acceleration feedback on the classical car-following model
Authors:
Gopal Krishna Kamath,
Krishna Jagannathan,
Gaurav Raina
Abstract:
Delayed feedback plays a vital role in determining the qualitative dynamical properties of a platoon of vehicles driving on a straight road. Motivated by the positive impact of Delayed Acceleration Feedback (DAF) in various scenarios, in this paper, we incorporate DAF into the Classical Car-Following Model (CCFM). We begin by deriving the Classical Car-Following Model with Delayed Acceleration Fee…
▽ More
Delayed feedback plays a vital role in determining the qualitative dynamical properties of a platoon of vehicles driving on a straight road. Motivated by the positive impact of Delayed Acceleration Feedback (DAF) in various scenarios, in this paper, we incorporate DAF into the Classical Car-Following Model (CCFM). We begin by deriving the Classical Car-Following Model with Delayed Acceleration Feedback (CCFM-DAF). We then derive the necessary and sufficient condition for local stability of the CCFM-DAF. Next, we show that the CCFM-DAF transits from the locally stable to the unstable regime via a Hopf bifurcation; thus leading to the emergence of limit cycles in system dynamics. We then propose a suitable linear transformation that enables us to analyze the local bifurcation properties of the CCFM-DAF by studying the analogous properties of the CCFM. We also study the impact of DAF on three important dynamical properties of the CCFM; namely, non-oscillatory convergence, string stability and robust stability. Our analyses are complemented with a stability chart and a bifurcation diagram. Our work reveals the following detrimental effects of DAF on the CCFM: (i) reduction in the locally stable region, (ii) increase in the frequency of the emergent limit cycles, (iii) decrease in the amplitude of the emergent limit cycles, (iv) destruction of the non-oscillatory property, (vi) increased risk of string instability, and (vii) reduced resilience towards parametric uncertainty. Thus, we report a practically-relevant application wherein DAF degrades the performance in several metrics of interest.
△ Less
Submitted 24 May, 2018;
originally announced May 2018.
-
Taxi demand forecasting: A HEDGE based tessellation strategy for improved accuracy
Authors:
Neema Davis,
Gaurav Raina,
Krishna Jagannathan
Abstract:
A key problem in location-based modeling and forecasting lies in identifying suitable spatial and temporal resolutions. In particular, judicious spatial partitioning can play a significant role in enhancing the performance of location-based forecasting models. In this work, we investigate two widely used tessellation strategies for partitioning city space, in the context of real-time taxi demand f…
▽ More
A key problem in location-based modeling and forecasting lies in identifying suitable spatial and temporal resolutions. In particular, judicious spatial partitioning can play a significant role in enhancing the performance of location-based forecasting models. In this work, we investigate two widely used tessellation strategies for partitioning city space, in the context of real-time taxi demand forecasting. Our study compares (i) Geohash tessellation, and (ii) Voronoi tessellation, using two distinct taxi demand datasets, over multiple time scales. For the purpose of comparison, we employ classical time-series tools to model the spatio-temporal demand. Our study finds that the performance of each tessellation strategy is highly dependent on the city geography, spatial distribution of the data, and the time of the day, and that neither strategy is found to perform optimally across the forecast horizon. We propose a hybrid tessellation algorithm that picks the best tessellation strategy at each instant, based on their performance in the recent past. Our hybrid algorithm is a non-stationary variant of the well-known HEDGE algorithm for choosing the best advice from multiple experts. We show that the hybrid tessellation strategy performs consistently better than either of the two strategies across the data sets considered, at multiple time scales, and with different performance metrics. We achieve an average accuracy of above 80% per km^2 for both data sets considered at 60 minute aggregation levels.
△ Less
Submitted 29 May, 2018; v1 submitted 17 May, 2018;
originally announced May 2018.
-
Qubits through Queues: The Capacity of Channels with Waiting Time Dependent Errors
Authors:
Avhishek Chatterjee,
Krishna Jagannathan,
Prabha Mandayam
Abstract:
We consider a setting where qubits are processed sequentially, and derive fundamental limits on the rate at which classical information can be transmitted using quantum states that decohere in time. Specifically, we model the sequential processing of qubits using a single server queue, and derive explicit expressions for the capacity of such a `queue-channel.' We also demonstrate a sweet-spot phen…
▽ More
We consider a setting where qubits are processed sequentially, and derive fundamental limits on the rate at which classical information can be transmitted using quantum states that decohere in time. Specifically, we model the sequential processing of qubits using a single server queue, and derive explicit expressions for the capacity of such a `queue-channel.' We also demonstrate a sweet-spot phenomenon with respect to the arrival rate to the queue, i.e., we show that there exists a value of the arrival rate of the qubits at which the rate of information transmission (in bits/sec) through the queue-channel is maximized. Next, we consider a setting where the average rate of processing qubits is fixed, and show that the capacity of the queue-channel is maximized when the processing time is deterministic. We also discuss design implications of these results on quantum information processing systems.
△ Less
Submitted 12 April, 2019; v1 submitted 3 April, 2018;
originally announced April 2018.
-
Caching under Content Freshness Constraints
Authors:
Pawan Poojary,
Sharayu Moharir,
Krishna Jagannathan
Abstract:
Several real-time delay-sensitive applications pose varying degrees of freshness demands on the requested content. The performance of cache replacement policies that are agnostic to these demands is likely to be sub-optimal. Motivated by this concern, in this paper, we study caching policies under a request arrival process which incorporates user freshness demands. We consider the performance metr…
▽ More
Several real-time delay-sensitive applications pose varying degrees of freshness demands on the requested content. The performance of cache replacement policies that are agnostic to these demands is likely to be sub-optimal. Motivated by this concern, in this paper, we study caching policies under a request arrival process which incorporates user freshness demands. We consider the performance metric to be the steady-state cache hit probability. We first provide a universal upper bound on the performance of any caching policy. We then analytically obtain the content-wise hit-rates for the Least Popular (LP) policy and provide sufficient conditions for the asymptotic optimality of cache performance under this policy. Next, we obtain an accurate approximation for the LRU hit-rates in the regime of large content population. To this end, we map the characteristic time of a content in the LRU policy to the classical Coupon Collector's Problem and show that it sharply concentrates around its mean. Further, we develop modified versions of these policies which eject cache redundancies present in the form of stale contents. Finally, we propose a new policy which outperforms the above policies by explicitly using freshness specifications of user requests to prioritize among the cached contents. We corroborate our analytical insights with extensive simulations.
△ Less
Submitted 28 December, 2017;
originally announced December 2017.
-
Congestion costs incurred on Indian Roads: A case study for New Delhi
Authors:
Neema Davis,
Harry Raymond Joseph,
Gaurav Raina,
Krishna Jagannathan
Abstract:
We conduct a preliminary investigation into the levels of congestion in New Delhi, motivated by concerns due to rapidly growing vehicular congestion in Indian cities. First, we provide statistical evidence for the rising congestion levels on the roads of New Delhi from taxi GPS traces. Then, we estimate the economic costs of congestion in New Delhi. In particular, we estimate the marginal and the…
▽ More
We conduct a preliminary investigation into the levels of congestion in New Delhi, motivated by concerns due to rapidly growing vehicular congestion in Indian cities. First, we provide statistical evidence for the rising congestion levels on the roads of New Delhi from taxi GPS traces. Then, we estimate the economic costs of congestion in New Delhi. In particular, we estimate the marginal and the total costs of congestion. In calculating the marginal costs, we consider the following factors: (i) productivity loss, (ii) air pollution costs, and (iii) costs due to accidents. In calculating the total costs, in addition to the above factors, we also estimate the costs due to the wastage of fuel. We also project the associated costs due to productivity loss and air pollution till 2030. The projected traffic congestion costs for New Delhi comes around 14658 million US$/yr for the year 2030. The key takeaway from our current study is that costs due to productivity loss, particularly from buses, dominates the overall economic costs. Additionally, the expected increase in fuel wastage makes a strong case for intelligent traffic management systems.
△ Less
Submitted 5 August, 2017;
originally announced August 2017.
-
The Modified Optimal Velocity Model: Stability Analyses and Design Guidelines
Authors:
Gopal Krishna Kamath,
Krishna Jagannathan,
Gaurav Raina
Abstract:
Reaction delays are important in determining the qualitative dynamical properties of a platoon of vehicles traveling on a straight road. In this paper, we investigate the impact of delayed feedback on the dynamics of the Modified Optimal Velocity Model (MOVM). Specifically, we analyze the MOVM in three regimes -- no delay, small delay and arbitrary delay. In the absence of reaction delays, we show…
▽ More
Reaction delays are important in determining the qualitative dynamical properties of a platoon of vehicles traveling on a straight road. In this paper, we investigate the impact of delayed feedback on the dynamics of the Modified Optimal Velocity Model (MOVM). Specifically, we analyze the MOVM in three regimes -- no delay, small delay and arbitrary delay. In the absence of reaction delays, we show that the MOVM is locally stable. For small delays, we then derive a sufficient condition for the MOVM to be locally stable. Next, for an arbitrary delay, we derive the necessary and sufficient condition for the local stability of the MOVM. We show that the traffic flow transits from the locally stable to the locally unstable regime via a Hopf bifurcation. We also derive the necessary and sufficient condition for non-oscillatory convergence and characterize the rate of convergence of the MOVM. These conditions help ensure smooth traffic flow, good ride quality and quick equilibration to the uniform flow. Further, since a Hopf bifurcation results in the emergence of limit cycles, we provide an analytical framework to characterize the type of the Hopf bifurcation and the asymptotic orbital stability of the resulting non-linear oscillations. Finally, we corroborate our analyses using stability charts, bifurcation diagrams, numerical computations and simulations conducted using MATLAB.
△ Less
Submitted 20 July, 2017; v1 submitted 29 June, 2017;
originally announced June 2017.
-
Efficient CSMA using Regional Free Energy Approximations
Authors:
Peruru Subrahmanya Swamy,
Venkata Pavan Kumar Bellam,
Radha Krishna Ganti,
Krishna Jagannathan
Abstract:
CSMA (Carrier Sense Multiple Access) algorithms based on Gibbs sampling can achieve throughput optimality if certain parameters called the fugacities are appropriately chosen. However, the problem of computing these fugacities is NP-hard. In this work, we derive estimates of the fugacities by using a framework called the regional free energy approximations. In particular, we derive explicit expres…
▽ More
CSMA (Carrier Sense Multiple Access) algorithms based on Gibbs sampling can achieve throughput optimality if certain parameters called the fugacities are appropriately chosen. However, the problem of computing these fugacities is NP-hard. In this work, we derive estimates of the fugacities by using a framework called the regional free energy approximations. In particular, we derive explicit expressions for approximate fugacities corresponding to any feasible service rate vector. We further prove that our approximate fugacities are exact for the class of chordal graphs. A distinguishing feature of our work is that the regional approximations that we propose are tailored to conflict graphs with small cycles, which is a typical characteristic of wireless networks. Numerical results indicate that the fugacities obtained by the proposed method are quite accurate and significantly outperform the existing Bethe approximation based techniques.
△ Less
Submitted 22 February, 2017;
originally announced February 2017.
-
Bandit algorithms to emulate human decision making using probabilistic distortions
Authors:
Ravi Kumar Kolla,
Prashanth L. A.,
Aditya Gopalan,
Krishna Jagannathan,
Michael Fu,
Steve Marcus
Abstract:
Motivated by models of human decision making proposed to explain commonly observed deviations from conventional expected value preferences, we formulate two stochastic multi-armed bandit problems with distorted probabilities on the reward distributions: the classic $K$-armed bandit and the linearly parameterized bandit settings. We consider the aforementioned problems in the regret minimization as…
▽ More
Motivated by models of human decision making proposed to explain commonly observed deviations from conventional expected value preferences, we formulate two stochastic multi-armed bandit problems with distorted probabilities on the reward distributions: the classic $K$-armed bandit and the linearly parameterized bandit settings. We consider the aforementioned problems in the regret minimization as well as best arm identification framework for multi-armed bandits. For the regret minimization setting in $K$-armed as well as linear bandit problems, we propose algorithms that are inspired by Upper Confidence Bound (UCB) algorithms, incorporate reward distortions, and exhibit sublinear regret. For the $K$-armed bandit setting, we derive an upper bound on the expected regret for our proposed algorithm, and then we prove a matching lower bound to establish the order-optimality of our algorithm. For the linearly parameterized setting, our algorithm achieves a regret upper bound that is of the same order as that of regular linear bandit algorithm called Optimism in the Face of Uncertainty Linear (OFUL) bandit algorithm, and unlike OFUL, our algorithm handles distortions and an arm-dependent noise model. For the best arm identification problem in the $K$-armed bandit setting, we propose algorithms, derive guarantees on their performance, and also show that these algorithms are order optimal by proving matching fundamental limits on performance. For best arm identification in linear bandits, we propose an algorithm and establish sample complexity guarantees. Finally, we present simulation experiments which demonstrate the advantages resulting from using distortion-aware learning algorithms in a vehicular traffic routing application.
△ Less
Submitted 31 October, 2023; v1 submitted 30 November, 2016;
originally announced November 2016.
-
Stability, convergence and Hopf bifurcation analyses of the classical car-following model
Authors:
Gopal Krishna Kamath,
Krishna Jagannathan,
Gaurav Raina
Abstract:
Reaction delays play an important role in determining the qualitative dynamical properties of a platoon of vehicles traversing a straight road. In this paper, we investigate the impact of delayed feedback on the dynamics of the Classical Car-Following Model (CCFM). Specifically, we analyze the CCFM in no delay, small delay and arbitrary delay regimes. First, we derive a sufficient condition for lo…
▽ More
Reaction delays play an important role in determining the qualitative dynamical properties of a platoon of vehicles traversing a straight road. In this paper, we investigate the impact of delayed feedback on the dynamics of the Classical Car-Following Model (CCFM). Specifically, we analyze the CCFM in no delay, small delay and arbitrary delay regimes. First, we derive a sufficient condition for local stability of the CCFM in no-delay and small-delay regimes using. Next, we derive the necessary and sufficient condition for local stability of the CCFM for an arbitrary delay. We then demonstrate that the transition of traffic flow from the locally stable to the unstable regime occurs via a Hopf bifurcation, thus resulting in limit cycles in system dynamics. Physically, these limit cycles manifest as back-propagating congestion waves on highways. In the context of human-driven vehicles, our work provides phenomenological insight into the impact of reaction delays on the emergence and evolution of traffic congestion. In the context of self-driven vehicles, our work has the potential to provide design guidelines for control algorithms running in self-driven cars to avoid undesirable phenomena. Specifically, designing control algorithms that avoid jerky vehicular movements is essential. Hence, we derive the necessary and sufficient condition for non-oscillatory convergence of the CCFM. Next, we characterize the rate of convergence of the CCFM, and bring forth the interplay between local stability, non-oscillatory convergence and the rate of convergence of the CCFM. Further, to better understand the oscillations in the system dynamics, we characterize the type of the Hopf bifurcation and the asymptotic orbital stability of the limit cycles using Poincare normal forms and the center manifold theory. The analysis is complemented with stability charts, bifurcation diagrams and MATLAB simulations.
△ Less
Submitted 29 March, 2018; v1 submitted 29 July, 2016;
originally announced July 2016.
-
Queuing Approaches to Principal-Agent Communication under Information Overload
Authors:
Aseem Sharma,
Krishna Jagannathan,
Lav R. Varshney
Abstract:
In the information overload regime, human communication tasks such as responding to email are well-modeled as priority queues, where priority is determined by a mix of intrinsic motivation and extrinsic motivation corresponding to the task's importance to the sender. We view priority queuing from a principal-agent perspective, and characterize the effect of priority-misalignment and information as…
▽ More
In the information overload regime, human communication tasks such as responding to email are well-modeled as priority queues, where priority is determined by a mix of intrinsic motivation and extrinsic motivation corresponding to the task's importance to the sender. We view priority queuing from a principal-agent perspective, and characterize the effect of priority-misalignment and information asymmetry between task senders and task receivers in both single-agent and multi-agent settings. In the single-agent setting, we find that discipline can override misalignment. Although variation in human interests leads to performance loss in the single-agent setting, the same variability is useful to the principal with optimal routing of tasks, if the principal has suitable information about agents' priorities. Our approach starts to quantitatively address the effect of human dynamics in routine communication tasks.
△ Less
Submitted 3 May, 2016;
originally announced May 2016.
-
Local stability and Hopf bifurcation analysis for Compound TCP
Authors:
Debayani Ghosh,
Krishna Jagannathan,
Gaurav Raina
Abstract:
We conduct a local stability and Hopf bifurcation analysis for Compound TCP, with small Drop-tail buffers, in three topologies. The first topology consists of two sets of TCP flows having different round trip times, and feeding into a core router. The second topology corresponds to two queues in tandem, and consists of two distinct sets of TCP flows, regulated by a single edge router and feeding i…
▽ More
We conduct a local stability and Hopf bifurcation analysis for Compound TCP, with small Drop-tail buffers, in three topologies. The first topology consists of two sets of TCP flows having different round trip times, and feeding into a core router. The second topology corresponds to two queues in tandem, and consists of two distinct sets of TCP flows, regulated by a single edge router and feeding into a core router. The third topology comprises of two distinct sets of TCP flows, regulated by two separate edge routers, and feeding into a common core router. For each of these cases, we conduct a detailed local stability analysis and obtain conditions on the network and protocol parameters to ensure stability. If these conditions get marginally violated, our analysis shows that the underlying systems would lose local stability via a Hopf bifurcation. After exhibiting a Hopf, a key concern is to determine the asymptotic orbital stability of the bifurcating limit cycles. We present a detailed analytical framework to address the stability of the limit cycles, and the type of the Hopf bifurcation by invoking Poincare normal forms and the center manifold theory. We conduct packet-level simulations to highlight the existence and stability of the limit cycles in the queue size dynamics.
△ Less
Submitted 19 April, 2016;
originally announced April 2016.
-
Right buffer sizing matters: some dynamical and statistical studies on Compound TCP
Authors:
Debayani Ghosh,
Krishna Jagannathan,
Gaurav Raina
Abstract:
Motivated by recent concerns that queuing delays in the Internet are on the rise, we conduct a performance evaluation of Compound TCP (C-TCP) in two topologies: a single bottleneck and a multi-bottleneck topology, under different traffic scenarios. The first topology consists of a single bottleneck router, and the second consists of two distinct sets of TCP flows, regulated by two edge routers, fe…
▽ More
Motivated by recent concerns that queuing delays in the Internet are on the rise, we conduct a performance evaluation of Compound TCP (C-TCP) in two topologies: a single bottleneck and a multi-bottleneck topology, under different traffic scenarios. The first topology consists of a single bottleneck router, and the second consists of two distinct sets of TCP flows, regulated by two edge routers, feeding into a common core router. We focus on some dynamical and statistical properties of the underlying system. From a dynamical perspective, we develop fluid models in a regime wherein the number of flows is large, bandwidth-delay product is high, buffers are dimensioned small (independent of the bandwidth-delay product) and routers deploy a Drop-Tail queue policy. A detailed local stability analysis for these models yields the following key insight: smaller buffers favour stability. Additionally, we highlight that larger buffers, in addition to increasing latency, are prone to inducing limit cycles in the system dynamics, via a Hopf bifurcation. These limit cycles in turn cause synchronisation among the TCP flows, and also result in a loss of link utilisation. For the topologies considered, we also empirically analyse some statistical properties of the bottleneck queues. These statistical analyses serve to validate an important modelling assumption: that in the regime considered, each bottleneck queue may be approximated as either an $M/M/1/B$ or an $M/D/1/B$ queue. This immediately makes the modelling perspective attractive and the analysis tractable. Finally, we show that smaller buffers, in addition to ensuring stability and low latency, would also yield fairly good system performance, in terms of throughput and flow completion times.
△ Less
Submitted 24 December, 2018; v1 submitted 19 April, 2016;
originally announced April 2016.
-
Collaborative Learning of Stochastic Bandits over a Social Network
Authors:
Ravi Kumar Kolla,
Krishna Jagannathan,
Aditya Gopalan
Abstract:
We consider a collaborative online learning paradigm, wherein a group of agents connected through a social network are engaged in playing a stochastic multi-armed bandit game. Each time an agent takes an action, the corresponding reward is instantaneously observed by the agent, as well as its neighbours in the social network. We perform a regret analysis of various policies in this collaborative l…
▽ More
We consider a collaborative online learning paradigm, wherein a group of agents connected through a social network are engaged in playing a stochastic multi-armed bandit game. Each time an agent takes an action, the corresponding reward is instantaneously observed by the agent, as well as its neighbours in the social network. We perform a regret analysis of various policies in this collaborative learning setting. A key finding of this paper is that natural extensions of widely-studied single agent learning policies to the network setting need not perform well in terms of regret. In particular, we identify a class of non-altruistic and individually consistent policies, and argue by deriving regret lower bounds that they are liable to suffer a large regret in the networked setting. We also show that the learning performance can be substantially improved if the agents exploit the structure of the network, and develop a simple learning algorithm based on dominating sets of the network. Specifically, we first consider a star network, which is a common motif in hierarchical social networks, and show analytically that the hub agent can be used as an information sink to expedite learning and improve the overall regret. We also derive networkwide regret bounds for the algorithm applied to general networks. We conduct numerical experiments on a variety of networks to corroborate our analytical results.
△ Less
Submitted 11 July, 2016; v1 submitted 29 February, 2016;
originally announced February 2016.
-
Adaptive CSMA under the SINR Model: Efficient Approximation Algorithms for Throughput and Utility Maximization
Authors:
Peruru Subrahmanya Swamy,
Radha Krishna Ganti,
Krishna Jagannathan
Abstract:
We consider a Carrier Sense Multiple Access (CSMA) based scheduling algorithm for a single-hop wireless network under a realistic Signal-to-interference-plus-noise ratio (SINR) model for the interference. We propose two local optimization based approximation algorithms to efficiently estimate certain attempt rate parameters of CSMA called fugacities. It is known that adaptive CSMA can achieve thro…
▽ More
We consider a Carrier Sense Multiple Access (CSMA) based scheduling algorithm for a single-hop wireless network under a realistic Signal-to-interference-plus-noise ratio (SINR) model for the interference. We propose two local optimization based approximation algorithms to efficiently estimate certain attempt rate parameters of CSMA called fugacities. It is known that adaptive CSMA can achieve throughput optimality by sampling feasible schedules from a Gibbs distribution, with appropriate fugacities. Unfortunately, obtaining these optimal fugacities is an NP-hard problem. Further, the existing adaptive CSMA algorithms use a stochastic gradient descent based method, which usually entails an impractically slow (exponential in the size of the network) convergence to the optimal fugacities. To address this issue, we first propose an algorithm to estimate the fugacities, that can support a given set of desired service rates. The convergence rate and the complexity of this algorithm are independent of the network size, and depend only on the neighborhood size of a link. Further, we show that the proposed algorithm corresponds exactly to performing the well-known Bethe approximation to the underlying Gibbs distribution. Then, we propose another local algorithm to estimate the optimal fugacities under a utility maximization framework, and characterize its accuracy. Numerical results indicate that the proposed methods have a good degree of accuracy, and achieve extremely fast convergence to near-optimal fugacities, and often outperform the convergence rate of the stochastic gradient descent by a few orders of magnitude.
△ Less
Submitted 23 February, 2017; v1 submitted 22 January, 2016;
originally announced January 2016.
-
Contagion processes on urban bus networks in Indian cities
Authors:
Atanu Chatterjee,
Gitakrishnan Ramadurai,
Krishna Jagannathan
Abstract:
Bus transportation is considered as one of the most convenient and cheapest modes of public transportation in Indian cities. Due to their cost-effectiveness and wide reachability, they help a significant portion of the human population in cities to reach their destinations every day. Although from a transportation point of view they have numerous advantages over other modes of public transportatio…
▽ More
Bus transportation is considered as one of the most convenient and cheapest modes of public transportation in Indian cities. Due to their cost-effectiveness and wide reachability, they help a significant portion of the human population in cities to reach their destinations every day. Although from a transportation point of view they have numerous advantages over other modes of public transportation, they also pose a serious threat of contagious diseases spreading throughout the city. The presence of numerous local spatial constraints makes the process and extent of epidemic spreading extremely difficult to predict. Also, majority of the studies have focused on the contagion processes on scale-free network topologies whereas, spatially-constrained real-world networks such as, bus networks exhibit a wide-spectrum of network topology. Therefore, we aim in this study to understand this complex dynamical process of epidemic outbreak and information diffusion on the bus networks for six different Indian cities using SI and SIR models. This will allow us to identify epidemic thresholds for these networks which will help us in controlling outbreaks by develo** node-based immunization techniques.
△ Less
Submitted 19 May, 2016; v1 submitted 14 September, 2015;
originally announced September 2015.
-
Spatial CSMA: A Distributed Scheduling Algorithm for the SIR Model with Time-varying Channels
Authors:
Peruru Subrahmanya Swamy,
Radha Krishna Ganti,
Krishna Jagannathan
Abstract:
Recent work has shown that adaptive CSMA algorithms can achieve throughput optimality. However, these adaptive CSMA algorithms assume a rather simplistic model for the wireless medium. Specifically, the interference is typically modelled by a conflict graph, and the channels are assumed to be static. In this work, we propose a distributed and adaptive CSMA algorithm under a more realistic signal-t…
▽ More
Recent work has shown that adaptive CSMA algorithms can achieve throughput optimality. However, these adaptive CSMA algorithms assume a rather simplistic model for the wireless medium. Specifically, the interference is typically modelled by a conflict graph, and the channels are assumed to be static. In this work, we propose a distributed and adaptive CSMA algorithm under a more realistic signal-to-interference ratio (SIR) based interference model, with time-varying channels. We prove that our algorithm is throughput optimal under this generalized model. Further, we augment our proposed algorithm by using a parallel update technique. Numerical results show that our algorithm outperforms the conflict graph based algorithms, in terms of supportable throughput and the rate of convergence to steady-state.
△ Less
Submitted 29 April, 2015;
originally announced April 2015.
-
Finite-Horizon Optimal Transmission Policies for Energy Harvesting Sensors
Authors:
Rahul Vaze,
Krishna Jagannathan
Abstract:
In this paper, we derive optimal transmission policies for energy harvesting sensors to maximize the utility obtained over a finite horizon. First, we consider a single energy harvesting sensor, with discrete energy arrival process, and a discrete energy consumption policy. Under this model, we show that the optimal finite horizon policy is a threshold policy, and explicitly characterize the thres…
▽ More
In this paper, we derive optimal transmission policies for energy harvesting sensors to maximize the utility obtained over a finite horizon. First, we consider a single energy harvesting sensor, with discrete energy arrival process, and a discrete energy consumption policy. Under this model, we show that the optimal finite horizon policy is a threshold policy, and explicitly characterize the thresholds, and the thresholds can be precomputed using a recursion. Next, we address the case of multiple sensors, with only one of them allowed to transmit at any given time to avoid interference, and derive an explicit optimal policy for this scenario as well.
△ Less
Submitted 19 May, 2014;
originally announced May 2014.
-
Queue Length Asymptotics for Generalized Max-Weight Scheduling in the presence of Heavy-Tailed Traffic
Authors:
Krishna Jagannathan,
Mihalis Markakis,
Eytan Modiano,
John N. Tsitsiklis
Abstract:
We investigate the asymptotic behavior of the steady-state queue length distribution under generalized max-weight scheduling in the presence of heavy-tailed traffic. We consider a system consisting of two parallel queues, served by a single server. One of the queues receives heavy-tailed traffic, and the other receives light-tailed traffic. We study the class of throughput optimal max-weight-alpha…
▽ More
We investigate the asymptotic behavior of the steady-state queue length distribution under generalized max-weight scheduling in the presence of heavy-tailed traffic. We consider a system consisting of two parallel queues, served by a single server. One of the queues receives heavy-tailed traffic, and the other receives light-tailed traffic. We study the class of throughput optimal max-weight-alpha scheduling policies, and derive an exact asymptotic characterization of the steady-state queue length distributions. In particular, we show that the tail of the light queue distribution is heavier than a power-law curve, whose tail coefficient we obtain explicitly. Our asymptotic characterization also contains an intuitively surprising result - the celebrated max-weight scheduling policy leads to the worst possible tail of the light queue distribution, among all non-idling policies. Motivated by the above negative result regarding the max-weight-alpha policy, we analyze a log-max-weight (LMW) scheduling policy. We show that the LMW policy guarantees an exponentially decaying light queue tail, while still being throughput optimal.
△ Less
Submitted 24 July, 2010;
originally announced July 2010.
-
Illustrating Dynamical Symmetries in Classical Mechanics: The Laplace-Runge-Lenz Vector Revisited
Authors:
Ross C. O'Connell,
Kannan Jagannathan
Abstract:
The inverse square force law admits a conserved vector that lies in the plane of motion. This vector has been associated with the names of Laplace, Runge, and Lenz, among others. Many workers have explored aspects of the symmetry and degeneracy associated with this vector and with analogous dynamical symmetris. We define a conserved dynamical variable $α$ that characterizes the orientation of th…
▽ More
The inverse square force law admits a conserved vector that lies in the plane of motion. This vector has been associated with the names of Laplace, Runge, and Lenz, among others. Many workers have explored aspects of the symmetry and degeneracy associated with this vector and with analogous dynamical symmetris. We define a conserved dynamical variable $α$ that characterizes the orientation of the orbit in two-dimensional configuration space for the Kepler problem and an analogous variable $β$ for the isotropic harmonics oscillator. This orbit orientation variable is canonically conjugate to the angular momentum component normal to the plane of motion. We explore the canoncial one-parameter group of transformations generated by $α(β).$ Because we have an obvious pair of conserved canonically conjugate variables, it is desirable to us them as a coordinate-momentum pair. In terms of these phase space coordinates, the form of the Hamiltonian is nearly trivial because neither member of the pair can occur explicitly in the Hamiltonian. From these considerations we gain a simple picture of the dynamics in phase space. The procedure we use is in the spirit of the Hamilton-Jacobi method.
△ Less
Submitted 10 December, 2002;
originally announced December 2002.