Skip to main content

Showing 1–31 of 31 results for author: Menasche, D

.
  1. arXiv:2406.14141  [pdf, other

    eess.SY cs.AI cs.NI

    Online Learning of Weakly Coupled MDP Policies for Load Balancing and Auto Scaling

    Authors: S. R. Eshwar, Lucas Lopes Felipe, Alexandre Reiffers-Masson, Daniel Sadoc Menasché, Gugan Thoppe

    Abstract: Load balancing and auto scaling are at the core of scalable, contemporary systems, addressing dynamic resource allocation and service rate adjustments in response to workload changes. This paper introduces a novel model and algorithms for tuning load balancers coupled with auto scalers, considering bursty traffic arriving at finite queues. We begin by presenting the problem as a weakly coupled Mar… ▽ More

    Submitted 20 June, 2024; originally announced June 2024.

  2. arXiv:2311.11219  [pdf

    cond-mat.mtrl-sci

    Grain boundary migration in polycrystalline $α$-Fe

    Authors: Zipeng Xu, Yu-Feng Shen, S. Kiana Naghibzadeh, Xiaoyao Peng, Vivekanand Muralikrishnan, Siddharth Maddali, David Menasche, Amanda R. Krause, Kaushik Dayal, Robert M. Suter, Gregory S. Rohrer

    Abstract: High energy x-ray diffraction microscopy was used to image the microstructure of $α$-Fe before and after a 600 $^\circ$C anneal. These data were used to determine the areas, curvatures, energies, and velocities of approximately 40,000 grain boundaries. The measured grain boundary properties depend on the five macroscopic grain boundary parameters. The velocities are not correlated with the product… ▽ More

    Submitted 18 November, 2023; originally announced November 2023.

    Comments: 33 pages, double spaced, accepted for publication in Acta Materialia

  3. arXiv:2309.12149  [pdf, other

    cs.NI cs.PF

    Performance Model for Similarity Caching

    Authors: Younes Ben Mazziane, Sara Alouf, Giovanni Neglia, Daniel S. Menasche

    Abstract: Similarity caching allows requests for an item to be served by a similar item. Applications include recommendation systems, multimedia retrieval, and machine learning. Recently, many similarity caching policies have been proposed, like SIM-LRU and RND-LRU, but the performance analysis of their hit rate is still wanting. In this paper, we show how to extend the popular time-to-live approximation in… ▽ More

    Submitted 21 September, 2023; originally announced September 2023.

    Comments: arXiv admin note: text overlap with arXiv:2209.03174

  4. arXiv:2308.02581  [pdf, other

    cs.CR cs.LG

    Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums

    Authors: Felipe Moreno-Vera, Mateus Nogueira, Cainã Figueiredo, Daniel Sadoc Menasché, Miguel Bicudo, Ashton Woiwood, Enrico Lovat, Anton Kocheturov, Leandro Pfleger de Aguiar

    Abstract: This paper proposes a machine learning-based approach for detecting the exploitation of vulnerabilities in the wild by monitoring underground hacking forums. The increasing volume of posts discussing exploitation in the wild calls for an automatic approach to process threads and posts that will eventually trigger alarms depending on their content. To illustrate the proposed system, we use the Crim… ▽ More

    Submitted 3 August, 2023; originally announced August 2023.

    Comments: 2023 IEEE International Conference on Cyber Security and Resilience (IEEE CSR)

  5. arXiv:2307.16852  [pdf, other

    cs.CR

    Learning When to Say Goodbye: What Should be the Shelf Life of an Indicator of Compromise?

    Authors: Breno Tostes, Leonardo Ventura, Enrico Lovat, Matheus Martins, Daniel Sadoc Menasché

    Abstract: Indicators of Compromise (IOCs), such as IP addresses, file hashes, and domain names associated with known malware or attacks, are cornerstones of cybersecurity, serving to identify malicious activity on a network. In this work, we leverage real data to compare different parameterizations of IOC aging models. Our dataset comprises traffic at a real environment for more than 1 year. Among our trace… ▽ More

    Submitted 31 July, 2023; originally announced July 2023.

    Comments: 2023 IEEE International Conference on Cyber Security and Resilience (IEEE CSR)

    ACM Class: K.6.5; D.4.6

  6. arXiv:2307.06442  [pdf, other

    cs.LG cs.DC cs.MA stat.ML

    On Collaboration in Distributed Parameter Estimation with Resource Constraints

    Authors: Yu-Zhen Janice Chen, Daniel S. Menasché, Don Towsley

    Abstract: We study sensor/agent data collection and collaboration policies for parameter estimation, accounting for resource constraints and correlation between observations collected by distinct sensors/agents. Specifically, we consider a group of sensors/agents each samples from different variables of a multivariate Gaussian distribution and has different estimation objectives, and we formulate a sensor/a… ▽ More

    Submitted 12 July, 2023; originally announced July 2023.

  7. arXiv:2209.03174  [pdf, other

    cs.DS

    Computing the Hit Rate of Similarity Caching

    Authors: Younes Ben Mazziane, Sara Alouf, Giovanni Neglia, Daniel Sadoc Menasche

    Abstract: Similarity caching allows requests for an item \(i\) to be served by a similar item \(i'\). Applications include recommendation systems, multimedia retrieval, and machine learning. Recently, many similarity caching policies have been proposed, but still we do not know how to compute the hit rate even for the simplest policies, like SIM-LRU and RND-LRU that are straightforward modifications of clas… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

  8. arXiv:2206.00111  [pdf, ps, other

    cs.DC stat.ML

    To Collaborate or Not in Distributed Statistical Estimation with Resource Constraints?

    Authors: Yu-Zhen Janice Chen, Daniel S. Menasche, Don Towsley

    Abstract: We study how the amount of correlation between observations collected by distinct sensors/learners affects data collection and collaboration strategies by analyzing Fisher information and the Cramer-Rao bound. In particular, we consider a simple setting wherein two sensors sample from a bivariate Gaussian distribution, which already motivates the adoption of various strategies, depending on the co… ▽ More

    Submitted 31 May, 2022; originally announced June 2022.

    Comments: 2021 55th Annual Conference on Information Sciences and Systems (CISS)

  9. arXiv:2201.07615  [pdf, other

    cs.NI

    Joint Traffic Offloading and Aging Control in 5G IoT Networks

    Authors: Naresh Modina, Rachid El-Azouzi, Francesco De Pellegrini, Daniel Sadoc Menasche, Rosa Figueiredo

    Abstract: The widespread adoption of 5G cellular technology will evolve as one of the major drivers for the growth of IoT-based applications. In this paper, we consider a Service Provider (SP) that launches a smart city service based on IoT data readings: in order to serve IoT data collected across different locations, the SP dynamically negotiates and rescales bandwidth and service functions. 5G network sl… ▽ More

    Submitted 19 January, 2022; originally announced January 2022.

  10. arXiv:2101.00851  [pdf, other

    cs.CR cs.NI

    Blockchain Privacy Through Merge Avoidance and Mixing Services: a Hardness and an Impossibility Result

    Authors: Jefferson E. Simoes, Eduardo Ferreira, Daniel S. Menasche, Carlos A. V. Campos

    Abstract: Cryptocurrencies typically aim at preserving the privacy of their users. Different cryptocurrencies preserve privacy at various levels, some of them requiring users to rely on strategies to raise the privacy level to their needs. Among those strategies, we focus on two of them: merge avoidance and mixing services. Such strategies may be adopted on top of virtually any blockchain-based cryptocurren… ▽ More

    Submitted 4 January, 2021; originally announced January 2021.

    Journal ref: Symposium on Cryptocurrency Analysis (SOCCA) 2020

  11. arXiv:2101.00845  [pdf, other

    cs.CR cs.NI

    Crypto-Hotwire: Illegal Blockchain Mining at Zero Cost Using Public Infrastructures

    Authors: Felipe Ribas Coutinho, Victor Pires, Claudio Miceli, Daniel Sadoc Menasche

    Abstract: Blockchains and cryptocurrencies disrupted the conversion of energy into a medium of exchange. Numerous applications for blockchains and cryptocurrencies are now envisioned for purposes ranging from inventory control to banking applications. Naturally, in order to mine in an economically viable way, regions where energy is plentiful and cheap, e.g., close to hydroelectric plants, are sought. The p… ▽ More

    Submitted 4 January, 2021; originally announced January 2021.

    Journal ref: Symposium on Cryptocurrency Analysis (SOCCA) 2020

  12. Improving Predictability of User-Affecting Metrics to Support Anomaly Detection in Cloud Services

    Authors: Vilc Rufino, Mateus Nogueira, Alberto Avritzer, Daniel Menasché, Barbara Russo, Andrea Janes, Vincenzo Ferme, André Van Hoorn, Henning Schulz, Cabral Lima

    Abstract: Anomaly detection systems aim to detect and report attacks or unexpected behavior in networked systems. Previous work has shown that anomalies have an impact on system performance, and that performance signatures can be effectively used for implementing an IDS. In this paper, we present an analytical and an experimental study on the trade-off between anomaly detection based on performance signatur… ▽ More

    Submitted 24 December, 2020; originally announced December 2020.

    Journal ref: IEEE Access, vol. 8, p.198152-198167, 2020

  13. arXiv:2010.03183  [pdf, ps, other

    cs.NI cs.MM

    Network-aware Recommendations in the Wild: Methodology, Realistic Evaluations, Experiments

    Authors: Savvas Kastanakis, Pavlos Sermpezis, Vasileios Kotronis, Daniel Menasché, Thrasyvoulos Spyropoulos

    Abstract: Joint caching and recommendation has been recently proposed as a new paradigm for increasing the efficiency of mobile edge caching. Early findings demonstrate significant gains for the network performance. However, previous works evaluated the proposed schemes exclusively on simulation environments. Hence, it still remains uncertain whether the claimed benefits would change in real settings. In th… ▽ More

    Submitted 6 October, 2020; originally announced October 2020.

    Comments: arXiv admin note: text overlap with arXiv:1806.02704

  14. arXiv:2006.08811  [pdf, other

    cs.CR cs.SE

    A Model-Based Approach to Anomaly Detection Trading Detection Time and False Alarm Rate

    Authors: Charles F. Gonçalves, Daniel S. Menasché, Alberto Avritzer, Nuno Antunes, Marco Vieira

    Abstract: The complexity and ubiquity of modern computing systems is a fertile ground for anomalies, including security and privacy breaches. In this paper, we propose a new methodology that addresses the practical challenges to implement anomaly detection approaches. Specifically, it is challenging to define normal behavior comprehensively and to acquire data on anomalies in diverse cloud environments. To… ▽ More

    Submitted 15 June, 2020; originally announced June 2020.

    Comments: 2020 Mediterranean Communication and Computer Networking Conference (MedComNet)

    ACM Class: C.4

  15. arXiv:2004.09655  [pdf, other

    cs.NI cs.LG

    Network Anomaly Detection based on Tensor Decomposition

    Authors: Ananda Streit, Gustavo H. A. Santos, Rosa Leão, Edmundo de Souza e Silva, Daniel Menasché, Don Towsley

    Abstract: The problem of detecting anomalies in time series from network measurements has been widely studied and is a topic of fundamental importance. Many anomaly detection methods are based on packet inspection collected at the network core routers, with consequent disadvantages in terms of computational cost and privacy. We propose an alternative method in which packet header inspection is not needed. T… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

  16. How often should I access my online social networks?

    Authors: Eduardo Hargreaves, Daniel Sadoc Menasché, Giovanni Neglia

    Abstract: Users of online social networks are faced with a conundrum of trying to be always informed without having enough time or attention budget to do so. The retention of users on online social networks has important implications, encompassing economic, psychological and infrastructure aspects. In this paper, we pose the following question: what is the optimal rate at which users should access a social… ▽ More

    Submitted 13 August, 2019; originally announced August 2019.

    Comments: 27th IEEE International Symposium on the Modeling, Analysis, and Simulation of Computer and Telecommunication Systems, affectionately known as MASCOTS

  17. arXiv:1907.06392  [pdf, ps, other

    cs.MM cs.NI

    Towards QoS-Aware Recommendations

    Authors: Pavlos Sermpezis, Savvas Kastanakis, João Ismael Pinheiro, Felipe Assis, Mateus Nogueira, Daniel Menasché, Thrasyvoulos Spyropoulos

    Abstract: In this paper we propose that recommendation systems (RSs) for multimedia services should be "QoS-aware", i.e., take into account the expected QoS with which a content can be delivered, to increase the user satisfaction. Network-aware recommendations have been very recently proposed as a promising solution to improve network performance. However, the idea of QoS-aware RSs has been studied from the… ▽ More

    Submitted 1 October, 2020; v1 submitted 15 July, 2019; originally announced July 2019.

    Journal ref: ACM RecSys 2020 workshops (CARS: workshop on Context-Aware Recommender Systems)

  18. Fairness in Online Social Network Timelines: Measurements, Models and Mechanism Design

    Authors: Eduardo Hargreaves, Claudio Agosti, Daniel Menasché, Giovanni Neglia, Alexandre Reiffers-Masson, Eitan Altman

    Abstract: Facebook News Feed personalization algorithm has a significant impact, on a daily basis, on the lifestyle, mood and opinion of millions of Internet users. Nonetheless, the behavior of such algorithm lacks transparency, motivating measurements, modeling and analysis in order to understand and improve its properties. In this paper, we propose a reproducible methodology encompassing measurements, an… ▽ More

    Submitted 30 October, 2018; v1 submitted 11 September, 2018; originally announced September 2018.

    Comments: IFIP Perfomance 2018 - 36th International Symposium on Computer Performance, Modeling, Measurements and Evaluation

    Journal ref: Performance Evaluation, 129, 15-39 (2019)

  19. Biases in the Facebook News Feed: a Case Study on the Italian Elections

    Authors: Eduardo Hargreaves, Claudio Agosti, Daniel Menasché, Giovanni Neglia, Alexandre Reiffers-Masson, Eitan Altman

    Abstract: Facebook News Feed personalization algorithm has a significant impact, on a daily basis, on the lifestyle, mood and opinion of millions of Internet users. Nonetheless, the behavior of such algorithms usually lacks transparency, motivating measurements, modeling and analysis in order to understand and improve its properties. In this paper, we propose a reproducible methodology encompassing measurem… ▽ More

    Submitted 27 July, 2018; v1 submitted 22 July, 2018; originally announced July 2018.

    Comments: International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI 2018). In conjunction with ASONAM 2018. Barcelona, Spain, August 28-31, 2018

    Journal ref: 2018 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)

  20. arXiv:1610.05598  [pdf, other

    cs.IT cs.NI

    An SMDP Approach to Optimal PHY Configuration in Wireless Networks

    Authors: Mark Shifrin, Daniel S. Menasché, Asaf Cohen, Omer Gurewitz, Dennis Goeckel

    Abstract: In this work, we study the optimal configuration of the physical layer in wireless networks by means of Semi-Markov Decision Process (SMDP) modeling. In particular, assume the physical layer is characterized by a set of potential operating points, with each point corresponding to a rate and reliability pair; for example, these pairs might be obtained through a now-standard diversity-vs-multiplexin… ▽ More

    Submitted 6 February, 2017; v1 submitted 18 October, 2016; originally announced October 2016.

    Comments: arXiv admin note: text overlap with arXiv:1601.06859

  21. Search and Placement in Tiered Cache Networks

    Authors: Guilherme Domingues, Edmundo de Souza e Silva, Rosa M. M. Leão, Daniel S. Menasché, Don Towsley

    Abstract: Content distribution networks have been extremely successful in today's Internet. Despite their success, there are still a number of scalability and performance challenges that motivate clean slate solutions for content dissemination, such as content centric networking. In this paper, we address two of the fundamental problems faced by any content dissemination system: content search and content p… ▽ More

    Submitted 15 June, 2016; originally announced June 2016.

    Journal ref: Computer Networks, 119, 17-34 (2017)

  22. arXiv:1601.06859   

    cs.IT eess.SY

    Optimal Dynamic Routing for the Wireless Relay Channel

    Authors: Asaf Cohen, Dennis Goeckel, Omer Gurewitz, Daniel S. Menasche, Mark Shifrin

    Abstract: Consider a communication network with a source, a relay and a destination. Each time interval, the source may dynamically choose between a few possible coding schemes, based on the channel state, traffic pattern and its own queue status. For example, the source may choose between a direct route to the destination and a relay-assisted scheme. Clearly, due to the difference in the performance achiev… ▽ More

    Submitted 7 February, 2017; v1 submitted 25 January, 2016; originally announced January 2016.

    Comments: This paper was replaced by arXiv:1610.05598

  23. A Utility Optimization Approach to Network Cache Design

    Authors: Mostafa Dehghan, Laurent Massoulie, Don Towsley, Daniel Menasche, Y. C. Tay

    Abstract: In any caching system, the admission and eviction policies determine which contents are added and removed from a cache when a miss occurs. Usually, these policies are devised so as to mitigate staleness and increase the hit probability. Nonetheless, the utility of having a high hit probability can vary across contents. This occurs, for instance, when service level agreements must be met, or if cer… ▽ More

    Submitted 25 January, 2016; originally announced January 2016.

    Comments: IEEE INFOCOM 2016

  24. arXiv:1601.03976  [pdf, other

    cs.NI

    Modeling and Analysis of Converged Network-Cloud Services

    Authors: Eduardo Hargreaves, Paulo H De Aguiar Rodrigues, Daniel S. Menasché

    Abstract: Networks connecting distributed cloud services through multiple data centers are called cloud networks. These types of networks play a crucial role in cloud computing and a holistic performance evaluation is essential before planning a converged network-cloud environment. We analyze a specific case where some resources can be centralized in one datacenter or distributed among multiple data centers… ▽ More

    Submitted 15 January, 2016; originally announced January 2016.

    Comments: XIII Workshop em Clouds e Aplicações (WCGA2015)

  25. arXiv:1512.08469  [pdf, other

    cs.NI

    Q-caching: an integrated reinforcement-learning approach for caching and routing in information-centric networks

    Authors: Wouter Caarls, Eduardo Hargreaves, Daniel S. Menasché

    Abstract: Content delivery, such as video streaming, is one of the most prevalent Internet applications. Although very popular, the continuous growth of such applications poses novel performance and scalability challenges. Information-centric networks put content at the center, and propose novel solutions to such challenges but also pose new questions on the interface between caching and routing. In this pa… ▽ More

    Submitted 28 December, 2015; originally announced December 2015.

  26. arXiv:1501.03446  [pdf, ps, other

    cs.NI

    Flexible Content Placement in Cache Networks using Reinforced Counters

    Authors: Guilherme Domingues, Edmundo de Souza e Silva, Rosa M. M. Leao, Daniel S. Menasche

    Abstract: In this paper we study the problem of content placement in a cache network. We consider a network where routing of requests is based on random walks. Content placement is done using a novel mechanism referred to as reinforced counters. To each content we associate a counter, which is incremented every time the content is requested, and which is decremented at a fixed rate. We model and analyze thi… ▽ More

    Submitted 18 March, 2015; v1 submitted 14 January, 2015; originally announced January 2015.

    Comments: Submitted to 33rd Brazilian Symposium on Computer Networks and Distributed Systems, SBRC' 2015

  27. On The Scalability of P2P Swarming Systems

    Authors: Edmundo de Souza e Silva, Rosa M. Leao, Daniel S. Menasche, Don Towsley

    Abstract: One of the fundamental problems in the realm of peer-to-peer systems is that of determining their service capacities. In this paper, we focus on P2P scalability issues and propose models to compute the achievable throughput under distinct policies for selecting both peers and blocks. From these models, we obtain novel insights on the behavior of P2P swarming systems that motivate new mechanisms fo… ▽ More

    Submitted 4 March, 2019; v1 submitted 23 May, 2014; originally announced May 2014.

    Journal ref: Computer Networks, 151, 93-113 (2019)

  28. Enabling Information Centric Networks through Opportunistic Search, Routing and Caching

    Authors: Guilherme de Melo Baptista Domingues, Edmundo Albuquerque de Souza e Silva, Rosa Maria Meri Leão, Daniel Sadoc Menasché

    Abstract: Content dissemination networks are pervasive in todays Internet. Examples of content dissemination networks include peer-to-peer networks (P2P), content distribution networks (CDN) and information centric networks (ICN). In this paper, we propose a new system design for information centric networks which leverages opportunistic searching, routing and caching. Our system design is based on an hiera… ▽ More

    Submitted 30 October, 2013; originally announced October 2013.

    Comments: 31st Brazilian Symposium on Computer Networks and Distributed Systems, SBRC' 2013

    Journal ref: Computer Networks, 119, 17-34 (2017)

  29. Forever Young: Aging Control For Smartphones In Hybrid Networks

    Authors: Eitan Altman, Rachid El-Azouzi, Daniel Sadoc Menasche, Yuedong Xu

    Abstract: The demand for Internet services that require frequent updates through small messages, such as microblogging, has tremendously grown in the past few years. Although the use of such applications by domestic users is usually free, their access from mobile devices is subject to fees and consumes energy from limited batteries. If a user activates his mobile device and is in range of a service provider… ▽ More

    Submitted 25 July, 2011; v1 submitted 23 September, 2010; originally announced September 2010.

    Comments: See also http://www-net.cs.umass.edu/~sadoc/agecontrol/

    Journal ref: Altman, E., El-Azouzi, R., Menasche, D. S., & Xu, Y. (2019, July). Forever Young: Aging Control For Hybrid Networks. In Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing (pp. 91-100). ACM

  30. Estimating Self-Sustainability in Peer-to-Peer Swarming Systems

    Authors: Daniel S. Menasche, Antonio A. A. Rocha, Edmundo A. de Souza e Silva, Rosa M. Leao, Don Towsley, Arun Venkataramani

    Abstract: Peer-to-peer swarming is one of the \emph{de facto} solutions for distributed content dissemination in today's Internet. By leveraging resources provided by clients, swarming systems reduce the load on and costs to publishers. However, there is a limit to how much cost savings can be gained from swarming; for example, for unpopular content peers will always depend on the publisher in order to comp… ▽ More

    Submitted 9 August, 2010; v1 submitted 2 April, 2010; originally announced April 2010.

    Comments: 27 pages, 5 figures

    ACM Class: C.4

    Journal ref: Performance Evaluation, 67(11), 1243-1258 (2010)

  31. arXiv:cs/0703099  [pdf, ps, other

    cs.IT cs.GT

    Constrained Cost-Coupled Stochastic Games with Independent State Processes

    Authors: E. Altman, K. Avrachenkov, N. Bonneau, M. Debbah, R. El-Azouzi, D. Sadoc Menasche

    Abstract: We consider a non-cooperative constrained stochastic games with N players with the following special structure. With each player there is an associated controlled Markov chain. The transition probabilities of the i-th Markov chain depend only on the state and actions of controller i. The information structure that we consider is such that each player knows the state of its own MDP and its own ac… ▽ More

    Submitted 21 March, 2007; originally announced March 2007.

    Comments: 7 pages, submitted in september 2006 to Operations Research Letters