Skip to main content

Showing 1–43 of 43 results for author: Jagannathan, K

.
  1. arXiv:2406.19738  [pdf, other

    quant-ph cs.AI cs.LG

    Classical Bandit Algorithms for Entanglement Detection in Parameterized Qubit States

    Authors: Bharati. K, Vikesh Siddhu, Krishna Jagannathan

    Abstract: Entanglement is a key resource for a wide range of tasks in quantum information and computing. Thus, verifying availability of this quantum resource is essential. Extensive research on entanglement detection has led to no-go theorems (Lu et al. [Phys. Rev. Lett., 116, 230501 (2016)]) that highlight the need for full state tomography (FST) in the absence of adaptive or joint measurements. Recent ad… ▽ More

    Submitted 28 June, 2024; originally announced June 2024.

    Comments: 20 pages, 5 figures

  2. arXiv:2406.07892  [pdf, ps, other

    cs.LG cs.AI

    Finite Time Analysis of Temporal Difference Learning for Mean-Variance in a Discounted MDP

    Authors: Tejaram Sangadi, L. A. Prashanth, Krishna Jagannathan

    Abstract: Motivated by risk-sensitive reinforcement learning scenarios, we consider the problem of policy evaluation for variance in a discounted reward Markov decision process (MDP). For this problem, a temporal difference (TD) type learning algorithm with linear function approximation (LFA) exists in the literature, though only asymptotic guarantees are available for this algorithm. We derive finite sampl… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

  3. arXiv:2405.20933  [pdf, ps, other

    cs.LG stat.ML

    Concentration Bounds for Optimized Certainty Equivalent Risk Estimation

    Authors: Ayon Ghosh, L. A. Prashanth, Krishna Jagannathan

    Abstract: We consider the problem of estimating the Optimized Certainty Equivalent (OCE) risk from independent and identically distributed (i.i.d.) samples. For the classic sample average approximation (SAA) of OCE, we derive mean-squared error as well as concentration bounds (assuming sub-Gaussianity). Further, we analyze an efficient stochastic approximation-based OCE estimator, and derive finite sample b… ▽ More

    Submitted 31 May, 2024; originally announced May 2024.

  4. arXiv:2305.04155  [pdf, ps, other

    cs.IT eess.SY

    Capacity Achieving Codes for an Erasure Queue-Channel

    Authors: Jaswanthi Mandalapu, Krishna Jagannathan, Avhishek Chatterjee, Andrew Thangaraj

    Abstract: We consider a queue-channel model that captures the waiting time-dependent degradation of information bits as they wait to be transmitted. Such a scenario arises naturally in quantum communications, where quantum bits tend to decohere rapidly. Trailing the capacity results obtained recently for certain queue-channels, this paper aims to construct practical channel codes for the erasure queue-chann… ▽ More

    Submitted 6 May, 2023; originally announced May 2023.

    Comments: 10 pages, 5 figures, accepted to IEEE ISIT 2023

  5. arXiv:2212.13387  [pdf, ps, other

    cs.SI

    Finite Time Bounds for Stochastic Bounded Confidence Dynamics

    Authors: Sushmitha Shree S, Avhishek Chatterjee, Krishna Jagannathan

    Abstract: In this era of fast and large-scale opinion formation, a mathematical understanding of opinion evolution, a.k.a. opinion dynamics, acquires importance. Linear graph-based dynamics and bounded confidence dynamics are the two popular models for opinion dynamics in social networks. Stochastic bounded confidence (SBC) opinion dynamics was proposed as a general framework that incorporates both these dy… ▽ More

    Submitted 27 December, 2022; originally announced December 2022.

    Comments: A preliminary version of this paper appeared in the proceedings of COMmunication Systems & NETworkS (COMSNETS) 2022. arXiv admin note: substantial text overlap with arXiv:2112.04373

  6. arXiv:2211.00367  [pdf, ps, other

    cs.PF

    Towards Maximizing Nonlinear Delay Sensitive Rewards in Queuing Systems

    Authors: Sushmitha Shree S, Avijit Mandal, Avhishek Chatterjee, Krishna Jagannathan

    Abstract: We consider maximizing the long-term average reward in a single server queue, where the reward obtained for a job is a non-increasing function of its sojourn time. The motivation behind this work comes from multiple applications, including quantum information processing and multimedia streaming. We introduce a new service discipline, shortest predicted sojourn time (SPST), which, in simulations, p… ▽ More

    Submitted 1 November, 2022; originally announced November 2022.

    Comments: 8 pages, 6 figures

  7. arXiv:2206.04262  [pdf, ps, other

    quant-ph cs.IT eess.SY

    The Classical Capacity of Quantum Jackson Networks with Waiting Time-Dependent Erasures

    Authors: Jaswanthi Mandalapu, Krishna Jagannathan

    Abstract: We study the fundamental limits of classical communication using quantum states that decohere as they traverse through a network of queues. We consider a network of Markovian queues, known as a Jackson network, with a single source or multiple sources and a single destination. Qubits are communicated through this network with inevitable buffering at intermediate nodes. We model each node as a `que… ▽ More

    Submitted 9 June, 2022; originally announced June 2022.

    Comments: 8 pages

  8. arXiv:2205.05843  [pdf, ps, other

    stat.ML cs.IT cs.LG

    A Survey of Risk-Aware Multi-Armed Bandits

    Authors: Vincent Y. F. Tan, Prashanth L. A., Krishna Jagannathan

    Abstract: In several applications such as clinical trials and financial portfolio optimization, the expected value (or the average reward) does not satisfactorily capture the merits of a drug or a portfolio. In such applications, risk plays a crucial role, and a risk-aware performance measure is preferable, so as to capture losses in the case of adverse events. This survey aims to consolidate and summarise… ▽ More

    Submitted 11 May, 2022; originally announced May 2022.

    Comments: 11 pages; Unabridged version of a a survey paper of the same title accepted to IJCAI-ECAI, 2022

  9. arXiv:2112.04373  [pdf, ps, other

    cs.SI

    Stochastic Bounded Confidence Opinion Dynamics: How Far Apart Do Opinions Drift?

    Authors: Sushmitha Shree S, Kishore G V, Avhishek Chatterjee, Krishna Jagannathan

    Abstract: In this era of fast and large-scale opinion formation, a mathematical understanding of opinion evolution, a.k.a. opinion dynamics, is especially important. Linear graph-based dynamics and bounded confidence dynamics are the two most popular models for opinion dynamics in social networks. Recently, stochastic bounded confidence opinion dynamics were proposed as a general framework that incorporates… ▽ More

    Submitted 8 December, 2021; originally announced December 2021.

    Comments: Accepted in COMSNETS 2022

  10. arXiv:2111.08805  [pdf, ps, other

    stat.ML cs.LG q-fin.RM

    Online Estimation and Optimization of Utility-Based Shortfall Risk

    Authors: Vishwajit Hegde, Arvind S. Menon, L. A. Prashanth, Krishna Jagannathan

    Abstract: Utility-Based Shortfall Risk (UBSR) is a risk metric that is increasingly popular in financial applications, owing to certain desirable properties that it enjoys. We consider the problem of estimating UBSR in a recursive setting, where samples from the underlying loss distribution are available one-at-a-time. We cast the UBSR estimation problem as a root finding problem, and propose stochastic app… ▽ More

    Submitted 27 November, 2023; v1 submitted 16 November, 2021; originally announced November 2021.

  11. arXiv:2110.02800  [pdf, other

    quant-ph cs.IT

    Unital Qubit Queue-channels: Classical Capacity and Product Decoding

    Authors: Vikesh Siddhu, Avhishek Chatterjee, Krishna Jagannathan, Prabha Mandayam, Sridhar Tayur

    Abstract: Quantum queue-channels arise naturally in the context of buffering in quantum networks, wherein the noise suffered by the quantum states depends on the time spent waiting in the buffer. It has been shown that the upper-bound on the classical capacity of an additive queue-channel has a simple expression, and is achievable for the erasure and depolarizing channels [IEEE JSAIT, 1(2):432-444]. In this… ▽ More

    Submitted 26 October, 2022; v1 submitted 6 October, 2021; originally announced October 2021.

    Comments: 25 pages with 3 Figures. Merges and supersedes our prior submissions arXiv:2107.13486 and arXiv:2110.02800

  12. arXiv:2107.13486  [pdf, other

    quant-ph cs.IT

    Queue-Channel Capacities with Generalized Amplitude Dam**

    Authors: Vikesh Siddhu, Avhishek Chatterjee, Krishna Jagannathan, Prabha Mandayam, Sridhar Tayur

    Abstract: The generalized amplitude dam** channel (GADC) is considered an important model for quantum communications, especially over optical networks. We make two salient contributions in this paper apropos of this channel. First, we consider a symmetric GAD channel characterized by the parameter $n=1/2,$ and derive its exact classical capacity, by constructing a specific induced classical channel. We sh… ▽ More

    Submitted 28 July, 2021; originally announced July 2021.

    Comments: Comments welcome!

  13. arXiv:2008.13629  [pdf, other

    cs.LG stat.ML

    Statistically Robust, Risk-Averse Best Arm Identification in Multi-Armed Bandits

    Authors: Anmol Kagrecha, Jayakrishnan Nair, Krishna Jagannathan

    Abstract: Traditional multi-armed bandit (MAB) formulations usually make certain assumptions about the underlying arms' distributions, such as bounds on the support or their tail behaviour. Moreover, such parametric information is usually 'baked' into the algorithms. In this paper, we show that specialized algorithms that exploit such parametric information are prone to inconsistent learning performance whe… ▽ More

    Submitted 27 March, 2022; v1 submitted 28 August, 2020; originally announced August 2020.

    Comments: 21 pages. Preliminary version appeared in NeurIPS 2019. Accepted for publication at IEEE Transactions of Information Theory. arXiv admin note: text overlap with arXiv:1906.00569

  14. arXiv:2006.12038  [pdf, ps, other

    cs.LG stat.ML

    Bandit algorithms: Letting go of logarithmic regret for statistical robustness

    Authors: Kumar Ashutosh, Jayakrishnan Nair, Anmol Kagrecha, Krishna Jagannathan

    Abstract: We study regret minimization in a stochastic multi-armed bandit setting and establish a fundamental trade-off between the regret suffered under an algorithm, and its statistical robustness. Considering broad classes of underlying arms' distributions, we show that bandit learning algorithms with logarithmic regret are always inconsistent and that consistent learning algorithms always suffer a super… ▽ More

    Submitted 22 June, 2020; originally announced June 2020.

  15. arXiv:2006.09649  [pdf, other

    cs.LG stat.ML

    Constrained regret minimization for multi-criterion multi-armed bandits

    Authors: Anmol Kagrecha, Jayakrishnan Nair, Krishna Jagannathan

    Abstract: We consider a stochastic multi-armed bandit setting and study the problem of constrained regret minimization over a given time horizon. Each arm is associated with an unknown, possibly multi-dimensional distribution, and the merit of an arm is determined by several, possibly conflicting attributes. The aim is to optimize a 'primary' attribute subject to user-provided constraints on other 'secondar… ▽ More

    Submitted 3 January, 2023; v1 submitted 17 June, 2020; originally announced June 2020.

    Comments: 26 pages

  16. arXiv:1911.08793  [pdf, ps, other

    cs.LG eess.SP stat.ML

    A Framework for End-to-End Deep Learning-Based Anomaly Detection in Transportation Networks

    Authors: Neema Davis, Gaurav Raina, Krishna Jagannathan

    Abstract: We develop an end-to-end deep learning-based anomaly detection model for temporal data in transportation networks. The proposed EVT-LSTM model is derived from the popular LSTM (Long Short-Term Memory) network and adopts an objective function that is based on fundamental results from EVT (Extreme Value Theory). We compare the EVT-LSTM model with some established statistical, machine learning, and h… ▽ More

    Submitted 20 November, 2019; originally announced November 2019.

    Comments: Preprint submitted to Elsevier TRIP. arXiv admin note: text overlap with arXiv:1909.06041

  17. LSTM-Based Anomaly Detection: Detection Rules from Extreme Value Theory

    Authors: Neema Davis, Gaurav Raina, Krishna Jagannathan

    Abstract: In this paper, we explore various statistical techniques for anomaly detection in conjunction with the popular Long Short-Term Memory (LSTM) deep learning model for transportation networks. We obtain the prediction errors from an LSTM model, and then apply three statistical models based on (i) the Gaussian distribution, (ii) Extreme Value Theory (EVT), and (iii) the Tukey's method. Using statistic… ▽ More

    Submitted 13 September, 2019; originally announced September 2019.

    Comments: Proceedings of the EPIA Conference on Artificial Intelligence 2019. The final publication is available at Springer via https://doi.org/10.1007/978-3-030-30241-2_48

  18. The Classical Capacity of Additive Quantum Queue-Channels

    Authors: Prabha Mandayam, Krishna Jagannathan, Avhishek Chatterjee

    Abstract: We consider a setting where a stream of qubits is processed sequentially. We derive fundamental limits on the rate at which classical information can be transmitted using qubits that decohere as they wait to be processed. Specifically, we model the sequential processing of qubits using a single server queue, and derive expressions for the classical capacity of such a quantum `queue-channel.' Focus… ▽ More

    Submitted 10 August, 2020; v1 submitted 4 June, 2019; originally announced June 2019.

    Comments: This paper will appear in the IEEE Journal of Selected Areas in Information Theory (Special Issue on Quantum Information Science), 2020. It generalizes arXiv:1804.00906 to include arbitrary encodings and measurements

  19. arXiv:1906.00569  [pdf, other

    cs.LG stat.ML

    Distribution oblivious, risk-aware algorithms for multi-armed bandits with unbounded rewards

    Authors: Anmol Kagrecha, Jayakrishnan Nair, Krishna Jagannathan

    Abstract: Classical multi-armed bandit problems use the expected value of an arm as a metric to evaluate its goodness. However, the expected value is a risk-neutral metric. In many applications like finance, one is interested in balancing the expected return of an arm (or portfolio) with the risk associated with that return. In this paper, we consider the problem of selecting the arm that optimizes a linear… ▽ More

    Submitted 3 June, 2019; originally announced June 2019.

  20. arXiv:1904.00647  [pdf, other

    cs.IT cs.NI

    On Minimizing the Maximum Age-of-Information For Wireless Erasure Channels

    Authors: Arunabh Srivastava, Abhishek Sinha, Krishna Jagannathan

    Abstract: Age-of-Information (AoI) is a recently proposed metric for quantifying the freshness of information from the UE's perspective in a communication network. Recently, Kadota et al. [1] have proposed an index-type approximately optimal scheduling policy for minimizing the average-AoI metric for a downlink transmission problem. For delay-sensitive applications, including real-time control of a cyber-ph… ▽ More

    Submitted 1 April, 2019; originally announced April 2019.

    Comments: To appear in RAWNET 2019, Avignon, France

  21. arXiv:1902.06515  [pdf, ps, other

    cs.LG stat.ML

    Grids versus Graphs: Partitioning Space for Improved Taxi Demand-Supply Forecasts

    Authors: Neema Davis, Gaurav Raina, Krishna Jagannathan

    Abstract: Accurate taxi demand-supply forecasting is a challenging application of ITS (Intelligent Transportation Systems), due to the complex spatial and temporal patterns. We investigate the impact of different spatial partitioning techniques on the prediction performance of an LSTM (Long Short-Term Memory) network, in the context of taxi demand-supply forecasting. We consider two tessellation schemes: (i… ▽ More

    Submitted 18 February, 2019; originally announced February 2019.

    Comments: Submitted to IEEE Transactions on Intelligent Transportation Systems

  22. arXiv:1901.00997  [pdf, ps, other

    cs.LG stat.ML

    Concentration bounds for CVaR estimation: The cases of light-tailed and heavy-tailed distributions

    Authors: Prashanth L. A., Krishna Jagannathan, Ravi Kumar Kolla

    Abstract: Conditional Value-at-Risk (CVaR) is a widely used risk metric in applications such as finance. We derive concentration bounds for CVaR estimates, considering separately the cases of light-tailed and heavy-tailed distributions. In the light-tailed case, we use a classical CVaR estimator based on the empirical distribution constructed from the samples. For heavy-tailed random variables, we assume a… ▽ More

    Submitted 25 August, 2019; v1 submitted 4 January, 2019; originally announced January 2019.

  23. arXiv:1812.03699  [pdf, ps, other

    cs.LG stat.ML

    Taxi Demand-Supply Forecasting: Impact of Spatial Partitioning on the Performance of Neural Networks

    Authors: Neema Davis, Gaurav Raina, Krishna Jagannathan

    Abstract: In this paper, we investigate the significance of choosing an appropriate tessellation strategy for a spatio-temporal taxi demand-supply modeling framework. Our study compares (i) the variable-sized polygon based Voronoi tessellation, and (ii) the fixed-sized grid based Geohash tessellation, using taxi demand-supply GPS data for the cities of Bengaluru, India and New York, USA. Long Short-Term Mem… ▽ More

    Submitted 10 December, 2018; originally announced December 2018.

    Comments: Presented at the NIPS Workshop on Machine Learning in Intelligent Transportation Systems, 2018

  24. arXiv:1808.01739  [pdf, ps, other

    cs.LG stat.ML

    Concentration bounds for empirical conditional value-at-risk: The unbounded case

    Authors: Ravi Kumar Kolla, Prashanth L. A., Sanjay P. Bhat, Krishna Jagannathan

    Abstract: In several real-world applications involving decision making under uncertainty, the traditional expected value objective may not be suitable, as it may be necessary to control losses in the case of a rare but extreme event. Conditional Value-at-Risk (CVaR) is a popular risk measure for modeling the aforementioned objective. We consider the problem of estimating CVaR from i.i.d. samples of an unbou… ▽ More

    Submitted 6 August, 2018; originally announced August 2018.

  25. arXiv:1805.09743  [pdf, ps, other

    eess.SY

    Impact of delayed acceleration feedback on the classical car-following model

    Authors: Gopal Krishna Kamath, Krishna Jagannathan, Gaurav Raina

    Abstract: Delayed feedback plays a vital role in determining the qualitative dynamical properties of a platoon of vehicles driving on a straight road. Motivated by the positive impact of Delayed Acceleration Feedback (DAF) in various scenarios, in this paper, we incorporate DAF into the Classical Car-Following Model (CCFM). We begin by deriving the Classical Car-Following Model with Delayed Acceleration Fee… ▽ More

    Submitted 24 May, 2018; originally announced May 2018.

  26. arXiv:1805.06619  [pdf, ps, other

    cs.LG stat.AP stat.ML

    Taxi demand forecasting: A HEDGE based tessellation strategy for improved accuracy

    Authors: Neema Davis, Gaurav Raina, Krishna Jagannathan

    Abstract: A key problem in location-based modeling and forecasting lies in identifying suitable spatial and temporal resolutions. In particular, judicious spatial partitioning can play a significant role in enhancing the performance of location-based forecasting models. In this work, we investigate two widely used tessellation strategies for partitioning city space, in the context of real-time taxi demand f… ▽ More

    Submitted 29 May, 2018; v1 submitted 17 May, 2018; originally announced May 2018.

    Comments: Under revision in Special Issue on Knowledge Discovery from Mobility Data for Intelligent Transportation Systems (Transactions on ITS)

    Journal ref: IEEE Transactions on Intelligent Transportation Systems ( Volume: 19 , Issue: 11 , Nov. 2018 )

  27. arXiv:1804.00906  [pdf, other

    cs.IT quant-ph

    Qubits through Queues: The Capacity of Channels with Waiting Time Dependent Errors

    Authors: Avhishek Chatterjee, Krishna Jagannathan, Prabha Mandayam

    Abstract: We consider a setting where qubits are processed sequentially, and derive fundamental limits on the rate at which classical information can be transmitted using quantum states that decohere in time. Specifically, we model the sequential processing of qubits using a single server queue, and derive explicit expressions for the capacity of such a `queue-channel.' We also demonstrate a sweet-spot phen… ▽ More

    Submitted 12 April, 2019; v1 submitted 3 April, 2018; originally announced April 2018.

    Comments: 9 pages, 2 figures

  28. arXiv:1712.10041  [pdf, ps, other

    cs.NI

    Caching under Content Freshness Constraints

    Authors: Pawan Poojary, Sharayu Moharir, Krishna Jagannathan

    Abstract: Several real-time delay-sensitive applications pose varying degrees of freshness demands on the requested content. The performance of cache replacement policies that are agnostic to these demands is likely to be sub-optimal. Motivated by this concern, in this paper, we study caching policies under a request arrival process which incorporates user freshness demands. We consider the performance metr… ▽ More

    Submitted 28 December, 2017; originally announced December 2017.

  29. arXiv:1708.08984  [pdf, ps, other

    physics.soc-ph

    Congestion costs incurred on Indian Roads: A case study for New Delhi

    Authors: Neema Davis, Harry Raymond Joseph, Gaurav Raina, Krishna Jagannathan

    Abstract: We conduct a preliminary investigation into the levels of congestion in New Delhi, motivated by concerns due to rapidly growing vehicular congestion in Indian cities. First, we provide statistical evidence for the rising congestion levels on the roads of New Delhi from taxi GPS traces. Then, we estimate the economic costs of congestion in New Delhi. In particular, we estimate the marginal and the… ▽ More

    Submitted 5 August, 2017; originally announced August 2017.

  30. The Modified Optimal Velocity Model: Stability Analyses and Design Guidelines

    Authors: Gopal Krishna Kamath, Krishna Jagannathan, Gaurav Raina

    Abstract: Reaction delays are important in determining the qualitative dynamical properties of a platoon of vehicles traveling on a straight road. In this paper, we investigate the impact of delayed feedback on the dynamics of the Modified Optimal Velocity Model (MOVM). Specifically, we analyze the MOVM in three regimes -- no delay, small delay and arbitrary delay. In the absence of reaction delays, we show… ▽ More

    Submitted 20 July, 2017; v1 submitted 29 June, 2017; originally announced June 2017.

    Comments: arXiv admin note: text overlap with arXiv:1607.08779

  31. arXiv:1702.06772  [pdf, other

    cs.NI cs.IT

    Efficient CSMA using Regional Free Energy Approximations

    Authors: Peruru Subrahmanya Swamy, Venkata Pavan Kumar Bellam, Radha Krishna Ganti, Krishna Jagannathan

    Abstract: CSMA (Carrier Sense Multiple Access) algorithms based on Gibbs sampling can achieve throughput optimality if certain parameters called the fugacities are appropriately chosen. However, the problem of computing these fugacities is NP-hard. In this work, we derive estimates of the fugacities by using a framework called the regional free energy approximations. In particular, we derive explicit expres… ▽ More

    Submitted 22 February, 2017; originally announced February 2017.

    Comments: Submitted to IEEE Transactions on Mobile Computing

  32. arXiv:1611.10283  [pdf, ps, other

    cs.LG stat.ML

    Bandit algorithms to emulate human decision making using probabilistic distortions

    Authors: Ravi Kumar Kolla, Prashanth L. A., Aditya Gopalan, Krishna Jagannathan, Michael Fu, Steve Marcus

    Abstract: Motivated by models of human decision making proposed to explain commonly observed deviations from conventional expected value preferences, we formulate two stochastic multi-armed bandit problems with distorted probabilities on the reward distributions: the classic $K$-armed bandit and the linearly parameterized bandit settings. We consider the aforementioned problems in the regret minimization as… ▽ More

    Submitted 31 October, 2023; v1 submitted 30 November, 2016; originally announced November 2016.

    Comments: The material in this paper was presented in part at the 2017 AAAI Conference on Artificial Intelligence

  33. Stability, convergence and Hopf bifurcation analyses of the classical car-following model

    Authors: Gopal Krishna Kamath, Krishna Jagannathan, Gaurav Raina

    Abstract: Reaction delays play an important role in determining the qualitative dynamical properties of a platoon of vehicles traversing a straight road. In this paper, we investigate the impact of delayed feedback on the dynamics of the Classical Car-Following Model (CCFM). Specifically, we analyze the CCFM in no delay, small delay and arbitrary delay regimes. First, we derive a sufficient condition for lo… ▽ More

    Submitted 29 March, 2018; v1 submitted 29 July, 2016; originally announced July 2016.

    Comments: Extended the existing results to the general model (the CCFM)

  34. arXiv:1605.00802  [pdf, other

    cs.IT

    Queuing Approaches to Principal-Agent Communication under Information Overload

    Authors: Aseem Sharma, Krishna Jagannathan, Lav R. Varshney

    Abstract: In the information overload regime, human communication tasks such as responding to email are well-modeled as priority queues, where priority is determined by a mix of intrinsic motivation and extrinsic motivation corresponding to the task's importance to the sender. We view priority queuing from a principal-agent perspective, and characterize the effect of priority-misalignment and information as… ▽ More

    Submitted 3 May, 2016; originally announced May 2016.

    Comments: 33 pages excluding the main page, 5 figures

  35. arXiv:1604.05549  [pdf, ps, other

    math.DS

    Local stability and Hopf bifurcation analysis for Compound TCP

    Authors: Debayani Ghosh, Krishna Jagannathan, Gaurav Raina

    Abstract: We conduct a local stability and Hopf bifurcation analysis for Compound TCP, with small Drop-tail buffers, in three topologies. The first topology consists of two sets of TCP flows having different round trip times, and feeding into a core router. The second topology corresponds to two queues in tandem, and consists of two distinct sets of TCP flows, regulated by a single edge router and feeding i… ▽ More

    Submitted 19 April, 2016; originally announced April 2016.

  36. arXiv:1604.05516  [pdf, ps, other

    cs.NI cs.PF eess.SY

    Right buffer sizing matters: some dynamical and statistical studies on Compound TCP

    Authors: Debayani Ghosh, Krishna Jagannathan, Gaurav Raina

    Abstract: Motivated by recent concerns that queuing delays in the Internet are on the rise, we conduct a performance evaluation of Compound TCP (C-TCP) in two topologies: a single bottleneck and a multi-bottleneck topology, under different traffic scenarios. The first topology consists of a single bottleneck router, and the second consists of two distinct sets of TCP flows, regulated by two edge routers, fe… ▽ More

    Submitted 24 December, 2018; v1 submitted 19 April, 2016; originally announced April 2016.

  37. arXiv:1602.08886  [pdf, other

    cs.LG stat.ML

    Collaborative Learning of Stochastic Bandits over a Social Network

    Authors: Ravi Kumar Kolla, Krishna Jagannathan, Aditya Gopalan

    Abstract: We consider a collaborative online learning paradigm, wherein a group of agents connected through a social network are engaged in playing a stochastic multi-armed bandit game. Each time an agent takes an action, the corresponding reward is instantaneously observed by the agent, as well as its neighbours in the social network. We perform a regret analysis of various policies in this collaborative l… ▽ More

    Submitted 11 July, 2016; v1 submitted 29 February, 2016; originally announced February 2016.

    Comments: 14 Pages, 6 Figures

  38. arXiv:1601.06065  [pdf, other

    cs.IT cs.NI math.PR stat.AP

    Adaptive CSMA under the SINR Model: Efficient Approximation Algorithms for Throughput and Utility Maximization

    Authors: Peruru Subrahmanya Swamy, Radha Krishna Ganti, Krishna Jagannathan

    Abstract: We consider a Carrier Sense Multiple Access (CSMA) based scheduling algorithm for a single-hop wireless network under a realistic Signal-to-interference-plus-noise ratio (SINR) model for the interference. We propose two local optimization based approximation algorithms to efficiently estimate certain attempt rate parameters of CSMA called fugacities. It is known that adaptive CSMA can achieve thro… ▽ More

    Submitted 23 February, 2017; v1 submitted 22 January, 2016; originally announced January 2016.

    Comments: Accepted for publication in the IEEE/ACM Transactions on Networking

  39. arXiv:1509.04553  [pdf, other

    physics.soc-ph

    Contagion processes on urban bus networks in Indian cities

    Authors: Atanu Chatterjee, Gitakrishnan Ramadurai, Krishna Jagannathan

    Abstract: Bus transportation is considered as one of the most convenient and cheapest modes of public transportation in Indian cities. Due to their cost-effectiveness and wide reachability, they help a significant portion of the human population in cities to reach their destinations every day. Although from a transportation point of view they have numerous advantages over other modes of public transportatio… ▽ More

    Submitted 19 May, 2016; v1 submitted 14 September, 2015; originally announced September 2015.

    Comments: Dynamical Systems: Theory and Application 2015, Poland

    Journal ref: Complexity, 21, pp. 451-458, 2016

  40. arXiv:1504.07825  [pdf, ps, other

    cs.NI

    Spatial CSMA: A Distributed Scheduling Algorithm for the SIR Model with Time-varying Channels

    Authors: Peruru Subrahmanya Swamy, Radha Krishna Ganti, Krishna Jagannathan

    Abstract: Recent work has shown that adaptive CSMA algorithms can achieve throughput optimality. However, these adaptive CSMA algorithms assume a rather simplistic model for the wireless medium. Specifically, the interference is typically modelled by a conflict graph, and the channels are assumed to be static. In this work, we propose a distributed and adaptive CSMA algorithm under a more realistic signal-t… ▽ More

    Submitted 29 April, 2015; originally announced April 2015.

    Comments: This work has been presented at National Conference on Communication, 2015, held at IIT Bombay, Mumbai, India

  41. arXiv:1405.4657  [pdf, ps, other

    cs.IT

    Finite-Horizon Optimal Transmission Policies for Energy Harvesting Sensors

    Authors: Rahul Vaze, Krishna Jagannathan

    Abstract: In this paper, we derive optimal transmission policies for energy harvesting sensors to maximize the utility obtained over a finite horizon. First, we consider a single energy harvesting sensor, with discrete energy arrival process, and a discrete energy consumption policy. Under this model, we show that the optimal finite horizon policy is a threshold policy, and explicitly characterize the thres… ▽ More

    Submitted 19 May, 2014; originally announced May 2014.

    Comments: Appeared in IEEE ICASSP 2014

  42. arXiv:1007.4286  [pdf, ps, other

    cs.NI cs.IT math.PR

    Queue Length Asymptotics for Generalized Max-Weight Scheduling in the presence of Heavy-Tailed Traffic

    Authors: Krishna Jagannathan, Mihalis Markakis, Eytan Modiano, John N. Tsitsiklis

    Abstract: We investigate the asymptotic behavior of the steady-state queue length distribution under generalized max-weight scheduling in the presence of heavy-tailed traffic. We consider a system consisting of two parallel queues, served by a single server. One of the queues receives heavy-tailed traffic, and the other receives light-tailed traffic. We study the class of throughput optimal max-weight-alpha… ▽ More

    Submitted 24 July, 2010; originally announced July 2010.

  43. arXiv:physics/0212043  [pdf

    physics.class-ph physics.ed-ph

    Illustrating Dynamical Symmetries in Classical Mechanics: The Laplace-Runge-Lenz Vector Revisited

    Authors: Ross C. O'Connell, Kannan Jagannathan

    Abstract: The inverse square force law admits a conserved vector that lies in the plane of motion. This vector has been associated with the names of Laplace, Runge, and Lenz, among others. Many workers have explored aspects of the symmetry and degeneracy associated with this vector and with analogous dynamical symmetris. We define a conserved dynamical variable $α$ that characterizes the orientation of th… ▽ More

    Submitted 10 December, 2002; originally announced December 2002.

    Comments: 15 pages, 1 figure, to be published in American Journal of Physics