Skip to main content

Showing 51–100 of 169 results for author: Towsley, D

.
  1. arXiv:2101.00082  [pdf, other

    cs.LG

    Bosonic Random Walk Networks for Graph Learning

    Authors: Shiv Shankar, Don Towsley

    Abstract: The development of Graph Neural Networks (GNNs) has led to great progress in machine learning on graph-structured data. These networks operate via diffusing information across the graph nodes while capturing the structure of the graph. Recently there has also seen tremendous progress in quantum computing techniques. In this work, we explore applications of multi-particle quantum walks on diffusing… ▽ More

    Submitted 31 December, 2020; originally announced January 2021.

  2. arXiv:2012.12191  [pdf, ps, other

    cs.NI

    Efficient Identification of Additive Link Metrics: Theorem Proof and Evaluations

    Authors: Liang Ma, Ting He, Kin K. Leung, Don Towsley, Ananthram Swami

    Abstract: This is a technical report, containing all the theorem proofs and additional evaluations in paper "Efficient Identification of Additive Link Metrics via Network Tomography" by Liang Ma, Ting He, Kin K. Leung, Don Towsley, and Ananthram Swami, published in IEEE ICDCS, 2013.

    Submitted 17 December, 2020; originally announced December 2020.

  3. arXiv:2012.12190  [pdf, ps, other

    cs.NI

    Identification of Additive Link Metrics: Proof of Selected Theorems

    Authors: Liang Ma, Ting He, Kin K. Leung, Ananthram Swami, Don Towsley

    Abstract: This is a technical report, containing all the theorem proofs in the following two papers: (1) Liang Ma, Ting He, Kin K. Leung, Ananthram Swami, and Don Towsley, "Identifiability of Link Metrics Based on End-to-end Path Measurements," in ACM IMC, 2013. (2) Liang Ma, Ting He, Kin K. Leung, Ananthram Swami, and Don Towsley, "Inferring Link Metrics from End-to-end Path Measurements: Identifiability a… ▽ More

    Submitted 23 December, 2020; v1 submitted 17 December, 2020; originally announced December 2020.

    Comments: References are updated

  4. arXiv:2012.11378  [pdf, ps, other

    cs.NI

    Partial Network Identifiability: Theorem Proof and Evaluation

    Authors: Liang Ma, Ting He, Kin K. Leung, Ananthram Swami, Don Towsley

    Abstract: This is a technical report, containing all the theorem proofs and additional evaluations in paper "Monitor Placement for Maximal Identifiability in Network Tomography" by Liang Ma, Ting He, Kin K. Leung, Ananthram Swami, Don Towsley, published in IEEE INFOCOM, 2014.

    Submitted 17 December, 2020; originally announced December 2020.

  5. arXiv:2012.09972  [pdf, ps, other

    cs.NI

    Link Identifiability with Two Monitors: Proof of Selected Theorems

    Authors: Liang Ma, Ting He, Kin K. Leung, Ananthram Swami, Don Towsley

    Abstract: This is a technical report, containing all the theorem proofs in paper "Link Identifiability in Communication Networks with Two Monitors" by Liang Ma, Ting He, Kin K. Leung, Ananthram Swami, and Don Towsley, published in IEEE Globecom, 2013.

    Submitted 24 December, 2020; v1 submitted 17 December, 2020; originally announced December 2020.

    Comments: Auxiliary algorithms are removed from this report as they exist in the main (IEEE Globecom'13) paper. arXiv admin note: substantial text overlap with arXiv:2012.11378

  6. arXiv:2012.09964  [pdf, ps, other

    cs.NI

    Fundamental Theories in Node Failure Localization

    Authors: Liang Ma, Ting He, Ananthram Swami, Don Towsley, Kin K. Leung, Jessica Lowe

    Abstract: This is a technical report, containing all the theorem proofs in paper "Node Failure Localization in Communication Networks via Network Tomography" by Liang Ma, Ting He, Ananthram Swami, Don Towsley, Kin K. Leung, and Jessica Lowe, published in ITA Annual Fall Meeting, 2014.

    Submitted 17 December, 2020; originally announced December 2020.

    Comments: arXiv admin note: text overlap with arXiv:2012.09959

  7. arXiv:2012.09959  [pdf, ps, other

    cs.NI

    Failure Localization Capability: Theorem Proof and Evaluation

    Authors: Liang Ma, Ting He, Ananthram Swami, Don Towsley, Kin K. Leung

    Abstract: This is a technical report, containing all the theorem proofs and additional evaluations in paper "Network Capability in Localizing Node Failures via End-to-end Path Measurements" by Liang Ma, Ting He, Ananthram Swami, Don Towsley, and Kin K. Leung, published in IEEE/ACM Transactions on Networking, vol. 25, no. 1, pp. 434-450, 2017.

    Submitted 26 December, 2020; v1 submitted 17 December, 2020; originally announced December 2020.

    Comments: Updated references

  8. arXiv:2012.09381  [pdf, ps, other

    cs.NI

    Node Failure Localization: Theorem Proof

    Authors: Liang Ma, Ting He, Ananthram Swami, Don Towsley, Kin K. Leung

    Abstract: This is a technical report, containing all the theorem proofs in paper "On Optimal Monitor Placement for Localizing Node Failures via Network Tomography" by Liang Ma, Ting He, Ananthram Swami, Don Towsley, and Kin K. Leung, published in IFIP WG 7.3 Performance, 2015.

    Submitted 16 December, 2020; originally announced December 2020.

  9. arXiv:2011.06767  [pdf, other

    cs.DS

    Matching through Embedding in Dense Graphs

    Authors: Nitish K. Panigrahy, Prithwish Basu, Don Towsley

    Abstract: Finding optimal matchings in dense graphs is of general interest and of particular importance in social, transportation and biological networks. While develo** optimal solutions for various matching problems is important, the running times of the fastest available optimal matching algorithms are too costly. However, when the vertices of the graphs are point-sets in $R^d$ and edge weights corresp… ▽ More

    Submitted 13 November, 2020; originally announced November 2020.

  10. arXiv:2011.05716  [pdf, other

    cs.LG

    Filtered Manifold Alignment

    Authors: Stefan Dernbach, Don Towsley

    Abstract: Domain adaptation is an essential task in transfer learning to leverage data in one domain to bolster learning in another domain. In this paper, we present a new semi-supervised manifold alignment technique based on a two-step approach of projecting and filtering the source and target domains to low dimensional spaces followed by joining the two spaces. Our proposed approach, filtered manifold ali… ▽ More

    Submitted 11 November, 2020; originally announced November 2020.

  11. arXiv:2011.04893  [pdf, other

    cs.PF cs.DC

    Resource Allocation in One-dimensional Distributed Service Networks with Applications

    Authors: Nitish K. Panigrahy, Prithwish Basu, Philippe Nain, Don Towsley, Ananthram Swami, Kevin S. Chan, Kin K. Leung

    Abstract: We consider assignment policies that allocate resources to users, where both resources and users are located on a one-dimensional line. First, we consider unidirectional assignment policies that allocate resources only to users located to their left. We propose the Move to Right (MTR) policy, which scans from left to right assigning nearest rightmost available resource to a user, and contrast it t… ▽ More

    Submitted 8 November, 2020; originally announced November 2020.

    Comments: arXiv admin note: text overlap with arXiv:1901.02414

  12. arXiv:2011.02653  [pdf, other

    cs.DC cs.NI cs.PF

    On the Analysis of Spatially Constrained Power of Two Choice Policies

    Authors: Nitish K. Panigrahy, Prithwish Basu, Don Towsley, Ananthram Swami, Kin K. Leung

    Abstract: We consider a class of power of two choice based assignment policies for allocating users to servers, where both users and servers are located on a two-dimensional Euclidean plane. In this framework, we investigate the inherent tradeoff between the communication cost, and load balancing performance of different allocation policies. To this end, we first design and evaluate a Spatial Power of two (… ▽ More

    Submitted 4 November, 2020; originally announced November 2020.

  13. arXiv:2011.01485  [pdf, other

    cs.PF

    Proximity Based Load Balancing Policies on Graphs: A Simulation Study

    Authors: Nitish K. Panigrahy, Thirupathaiah Vasantam, Prithwish Basu, Don Towsley

    Abstract: Distributed load balancing is the act of allocating jobs among a set of servers as evenly as possible. There are mainly two versions of the load balancing problem that have been studied in the literature: static and dynamic. The static interpretation leads to formulating the load balancing problem as a case with jobs (balls) never leaving the system and accumulating at the servers (bins) whereas t… ▽ More

    Submitted 3 November, 2020; originally announced November 2020.

  14. arXiv:2009.10888  [pdf, ps, other

    quant-ph

    Distributing Graph States Across Quantum Networks

    Authors: Alex Fischer, Don Towsley

    Abstract: Graph states are an important class of multipartite entangled quantum states. We propose a new approach for distributing graph states across a quantum network. We consider a quantum network consisting of nodes-quantum computers within which local operations are free-and EPR pairs shared between nodes that can continually be generated. We prove upper bounds for our approach on the number of EPR pai… ▽ More

    Submitted 23 August, 2021; v1 submitted 22 September, 2020; originally announced September 2020.

    Comments: 10 pages, 9 figures. This is the final version to be published in QCE2021

  15. arXiv:2006.14496  [pdf, other

    physics.soc-ph cond-mat.stat-mech

    Percolation Thresholds for Robust Network Connectivity

    Authors: Arman Mohseni-Kabir, Mihir Pant, Don Towsley, Saikat Guha, Ananthram Swami

    Abstract: Communication networks, power grids, and transportation networks are all examples of networks whose performance depends on reliable connectivity of their underlying network components even in the presence of usual network dynamics due to mobility, node or edge failures, and varying traffic loads. Percolation theory quantifies the threshold value of a local control parameter such as a node occupati… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

  16. arXiv:2005.07247  [pdf, other

    quant-ph physics.optics

    Entanglement generation in a quantum network at distance-independent rate

    Authors: Ashlesha Patil, Mihir Pant, Dirk Englund, Don Towsley, Saikat Guha

    Abstract: We develop a protocol for entanglement generation in the quantum internet that allows a repeater node to use $n$-qubit Greenberger-Horne-Zeilinger (GHZ) projective measurements that can fuse $n$ successfully-entangled {\em links}, i.e., two-qubit entangled Bell pairs shared across $n$ network edges, incident at that node. Implementing $n$-fusion, for $n \ge 3$, is in principle not much harder than… ▽ More

    Submitted 10 August, 2020; v1 submitted 14 May, 2020; originally announced May 2020.

  17. Practical Traffic Analysis Attacks on Secure Messaging Applications

    Authors: Alireza Bahramali, Ramin Soltani, Amir Houmansadr, Dennis Goeckel, Don Towsley

    Abstract: Instant Messaging (IM) applications like Telegram, Signal, and WhatsApp have become extremely popular in recent years. Unfortunately, such IM services have been targets of continuous governmental surveillance and censorship, as these services are home to public and private communication channels on socially and politically sensitive topics. To protect their clients, popular IM services deploy stat… ▽ More

    Submitted 1 May, 2020; originally announced May 2020.

    Journal ref: Network and Distributed Systems Security (NDSS) Symposium 2020

  18. arXiv:2004.09655  [pdf, other

    cs.NI cs.LG

    Network Anomaly Detection based on Tensor Decomposition

    Authors: Ananda Streit, Gustavo H. A. Santos, Rosa Leão, Edmundo de Souza e Silva, Daniel Menasché, Don Towsley

    Abstract: The problem of detecting anomalies in time series from network measurements has been widely studied and is a topic of fundamental importance. Many anomaly detection methods are based on packet inspection collected at the network core routers, with consequent disadvantages in terms of computational cost and privacy. We propose an alternative method in which packet header inspection is not needed. T… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

  19. arXiv:2003.05135  [pdf, ps, other

    math.PR cs.PF

    Covert Cycle Stealing in a Single FIFO Server

    Authors: Bo Jiang, Philippe Nain, Don Towsley

    Abstract: Consider a setting where Willie generates a Poisson stream of jobs and routes them to a single server that follows the first-in first-out discipline. Suppose there is an adversary Alice, who desires to receive service without being detected. We ask the question: what is the number of jobs that she can receive covertly, i.e. without being detected by Willie? In the case where both Willie and Alice… ▽ More

    Submitted 4 May, 2021; v1 submitted 11 March, 2020; originally announced March 2020.

  20. arXiv:2002.12688  [pdf, other

    cs.LG cs.DC math.OC stat.ML

    Decentralized gradient methods: does topology matter?

    Authors: Giovanni Neglia, Chuan Xu, Don Towsley, Gianmarco Calbi

    Abstract: Consensus-based distributed optimization methods have recently been advocated as alternatives to parameter server and ring all-reduce paradigms for large scale training of machine learning models. In this case, each worker maintains a local estimate of the optimal parameter vector and iteratively updates it by averaging the estimates obtained from its neighbors, and applying a correction on the ba… ▽ More

    Submitted 28 February, 2020; originally announced February 2020.

    Comments: A version of this paper is to appear at AISTATS 2020

  21. arXiv:2002.04834  [pdf, other

    cs.NI cs.PF

    On the Performance Analysis of Epidemic Routing in Non-Sparse Delay Tolerant Networks

    Authors: Leila Rashidi, Don Towsley, Arman Mohseni-Kabir, Ali Movaghar

    Abstract: We study the behavior of epidemic routing in a delay tolerant network as a function of node density. Focusing on the probability of successful delivery to a destination within a deadline (PS), we show that PS experiences a phase transition as node density increases. Specifically, we prove that PS exhibits a phase transition when nodes are placed according to a Poisson process and allowed to move a… ▽ More

    Submitted 12 February, 2020; originally announced February 2020.

  22. arXiv:2001.06932  [pdf, other

    cs.CR cs.IT

    Covert Communication in Continuous-Time Systems

    Authors: Ke Li, Don Towsley, Dennis Goeckel

    Abstract: Recent works have considered the ability of transmitter Alice to communicate reliably to receiver Bob without being detected by warden Willie. These works generally assume a standard discrete-time model. But the assumption of a discrete-time model in standard communication scenarios is often predicated on its equivalence to a continuous-time model, which has not been established for the covert com… ▽ More

    Submitted 19 January, 2020; originally announced January 2020.

    Comments: 8 pages, 5 figures, concise version submitted to 2020 IEEE International Symposium on Information Theory (ISIT)

  23. arXiv:2001.04229  [pdf, other

    cs.GT cs.DC cs.MA cs.NI

    Resource Sharing in the Edge: A Distributed Bargaining-Theoretic Approach

    Authors: Faheem Zafari, Prithwish Basu, Kin K. Leung, Jian Li, Ananthram Swami, Don Towsley

    Abstract: The growing demand for edge computing resources, particularly due to increasing popularity of Internet of Things (IoT), and distributed machine/deep learning applications poses a significant challenge. On the one hand, certain edge service providers (ESPs) may not have sufficient resources to satisfy their applications according to the associated service-level agreements. On the other hand, some E… ▽ More

    Submitted 4 July, 2020; v1 submitted 13 January, 2020; originally announced January 2020.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  24. arXiv:2001.00567  [pdf, other

    cs.NI cs.DC cs.MA

    Let's Share: A Game-Theoretic Framework for Resource Sharing in Mobile Edge Clouds

    Authors: Faheem Zafari, Kin K. Leung, Don Towsley, Prithwish Basu, Ananthram Swami, Jian Li

    Abstract: Mobile edge computing seeks to provide resources to different delay-sensitive applications. This is a challenging problem as an edge cloud-service provider may not have sufficient resources to satisfy all resource requests. Furthermore, allocating available resources optimally to different applications is also challenging. Resource sharing among different edge cloud-service providers can address t… ▽ More

    Submitted 2 January, 2020; originally announced January 2020.

    Comments: The paper is currently under review in IEEE Transactions on Network and Service Management

  25. arXiv:1910.11658  [pdf

    quant-ph physics.optics

    Quantum Networks For Open Science

    Authors: Thomas Ndousse-Fetter, Nicholas Peters, Warren Grice, Prem Kumar, Tom Chapuran, Saikat Guha, Scott Hamilton, Inder Monga, Ray Newell, Andrei Nomerotski, Don Towsley, Ben Yoo

    Abstract: The United States Department of Energy convened the Quantum Networks for Open Science (QNOS) Workshop in September 2018. The workshop was primarily focused on quantum networks optimized for scientific applications with the expectation that the resulting quantum networks could be extended to lay the groundwork for a generalized network that will evolve into a quantum internet.

    Submitted 27 March, 2019; originally announced October 2019.

    Comments: Workshop Report

  26. arXiv:1910.09151  [pdf, ps, other

    math.ST eess.SP

    Quickest Detection of Growing Dynamic Anomalies in Networks

    Authors: Georgios Rovatsos, Venugopal V. Veeravalli, Don Towsley, Ananthram Swami

    Abstract: The problem of quickest growing dynamic anomaly detection in sensor networks is studied. Initially, the observations at the sensors, which are sampled sequentially by the decision maker, are generated according to a pre-change distribution. At some unknown but deterministic time instant, a dynamic anomaly emerges in the network, affecting a different set of sensors as time progresses. The observat… ▽ More

    Submitted 2 February, 2020; v1 submitted 21 October, 2019; originally announced October 2019.

    Comments: 2 figures, conference style+appendix

  27. arXiv:1906.08938  [pdf, ps, other

    cs.IT

    LPD Communication: A Sequential Change-Point Detection Perspective

    Authors: Ke-Wen Huang, Hui-Ming Wang, Don Towsley, H. Vincent Poor

    Abstract: In this paper, we establish a framework for low probability of detection (LPD) communication from a sequential change-point detection (SCPD) perspective, where a transmitter, Alice, wants to hide her signal transmission to a receiver, Bob, under the surveillance of an adversary, Willie. The new framework facilitates to model LPD communication and further evaluate its performance under the conditio… ▽ More

    Submitted 3 February, 2020; v1 submitted 21 June, 2019; originally announced June 2019.

    Comments: Accepted by IEEE TCOM

  28. arXiv:1904.08139  [pdf, other

    cs.SI

    Understanding the Signature of Controversial Wikipedia Articles through Motifs in Editor Revision Networks

    Authors: James R. Ashford, Liam D. Turner, Roger M. Whitaker, Alun Preece, Diane Felmlee, Don Towsley

    Abstract: Wikipedia serves as a good example of how editors collaborate to form and maintain an article. The relationship between editors, derived from their sequence of editing activity, results in a directed network structure called the revision network, that potentially holds valuable insights into editing activity. In this paper we create revision networks to assess differences between controversial and… ▽ More

    Submitted 17 April, 2019; originally announced April 2019.

  29. arXiv:1904.00820  [pdf, other

    cs.MA cs.NI

    A Game-Theoretic Framework for Resource Sharing in Clouds

    Authors: Faheem Zafari, Kin K. Leung, Don Towsley, Prithwish Basu, Ananthram Swami

    Abstract: Providing resources to different users or applications is fundamental to cloud computing. This is a challenging problem as a cloud service provider may have insufficient resources to satisfy all user requests. Furthermore, allocating available resources optimally to different applications is also challenging. Resource sharing among different cloud service providers can improve resource availabilit… ▽ More

    Submitted 28 May, 2019; v1 submitted 1 April, 2019; originally announced April 2019.

    Comments: The paper has been accepted for publication in IFIP WMNC 2019, Paris France

  30. arXiv:1903.11640  [pdf, other

    cs.CR

    Fundamental Limits of Covert Packet Insertion

    Authors: Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr

    Abstract: Covert communication conceals the existence of the transmission from a watchful adversary. We consider the fundamental limits for covert communications via packet insertion over packet channels whose packet timings are governed by a renewal process of rate $λ$. Authorized transmitter Jack sends packets to authorized receiver Steve, and covert transmitter Alice wishes to transmit packets to covert… ▽ More

    Submitted 27 March, 2019; originally announced March 2019.

  31. arXiv:1903.04420  [pdf, other

    quant-ph cs.NI cs.PF

    On the Stochastic Analysis of a Quantum Entanglement Switch

    Authors: Gayane Vardoyan, Saikat Guha, Philippe Nain, Don Towsley

    Abstract: We study a quantum entanglement switch that serves $k$ users in a star topology. We model variants of the system using Markov chains and standard queueing theory and obtain expressions for switch capacity and the expected number of qubits stored in memory at the switch. While it is more accurate to use a discrete-time Markov chain (DTMC) to model such systems, we quickly encounter practical constr… ▽ More

    Submitted 18 July, 2019; v1 submitted 11 March, 2019; originally announced March 2019.

    Journal ref: IEEE Transactions on Quantum Engineering 2021

  32. arXiv:1901.06786  [pdf, other

    cs.NI cs.PF quant-ph

    On the Capacity Region of Bipartite and Tripartite Entanglement Switching

    Authors: Gayane Vardoyan, Philippe Nain, Saikat Guha, Don Towsley

    Abstract: We study a quantum entanglement distribution switch serving a set of users in a star topology with equal-length links. The quantum switch, much like a quantum repeater, can perform entanglement swap** to extend entanglement across longer distances. Additionally, the switch is equipped with entanglement switching logic, enabling it to implement switching policies to better serve the needs of the… ▽ More

    Submitted 21 June, 2022; v1 submitted 20 January, 2019; originally announced January 2019.

  33. arXiv:1901.02414  [pdf, other

    cs.PF

    Resource Allocation in One-dimensional Distributed Service Networks

    Authors: Nitish K. Panigrahy, Prithwish Basu, Philippe Nain, Don Towsley, Ananthram Swami, Kevin S. Chan, Kin K. Leung

    Abstract: We consider assignment policies that allocate resources to users, where both resources and users are located on a one-dimensional line. First, we consider unidirectional assignment policies that allocate resources only to users located to their left. We propose the Move to Right (MTR) policy, which scans from left to right assigning nearest rightmost available resource to a user, and contrast it t… ▽ More

    Submitted 11 February, 2020; v1 submitted 8 January, 2019; originally announced January 2019.

  34. arXiv:1812.05473  [pdf, other

    cs.SI cs.LG

    Learning Features of Network Structures Using Graphlets

    Authors: Kun Tu, Jian Li, Don Towsley, Dave Braines, Liam Turner

    Abstract: Networks are fundamental to the study of complex systems, ranging from social contacts, message transactions, to biological regulations and economical networks. In many realistic applications, these networks may vary over time. Modeling and analyzing such temporal properties is of additional interest as it can provide a richer characterization of relations between nodes in networks. In this paper,… ▽ More

    Submitted 5 April, 2020; v1 submitted 13 December, 2018; originally announced December 2018.

    Comments: A conference version has been published in IEEE/ACM ASONAM'19 with title "gl2vec: Learning feature representation using graphlets for directed networks" and can be found at https://dl.acm.org/doi/abs/10.1145/3341161.3342908

  35. arXiv:1811.09126  [pdf, other

    cs.DS

    Utilizing Dynamic Properties of Sharing Bits and Registers to Estimate User Cardinalities over Time

    Authors: **hui Wang, Peng Jia, Xiangliang Zhang, **g Tao, Xiaohong Guan, Don Towsley

    Abstract: Online monitoring user cardinalities (or degrees) in graph streams is fundamental for many applications. For example in a bipartite graph representing user-website visiting activities, user cardinalities (the number of distinct visited websites) are monitored to report network anomalies. These real-world graph streams may contain user-item duplicates and have a huge number of distinct user-item pa… ▽ More

    Submitted 25 November, 2018; v1 submitted 22 November, 2018; originally announced November 2018.

    Comments: Accepted in ICDE 2019

  36. arXiv:1811.01800  [pdf, ps, other

    math.PR

    Planting trees in graphs, and finding them back

    Authors: Laurent Massoulié, Ludovic Stephan, Don Towsley

    Abstract: In this paper we study detection and reconstruction of planted structures in Erdős-Rényi random graphs. Motivated by a problem of communication security, we focus on planted structures that consist in a tree graph. For planted line graphs, we establish the following phase diagram. In a low density region where the average degree $λ$ of the initial graph is below some critical value $λ_c=1$, detect… ▽ More

    Submitted 25 June, 2019; v1 submitted 5 November, 2018; originally announced November 2018.

  37. arXiv:1810.03510  [pdf, other

    cs.NI cs.CR cs.IT

    Fundamental Limits of Covert Bit Insertion in Packets

    Authors: Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr

    Abstract: Covert communication is necessary when revealing the mere existence of a message leaks sensitive information to an attacker. Consider a network link where an authorized transmitter Jack sends packets to an authorized receiver Steve, and the packets visit Alice, Willie, and Bob, respectively, before they reach Steve. Covert transmitter Alice wishes to alter the packet stream in some way to send inf… ▽ More

    Submitted 8 October, 2018; originally announced October 2018.

    Comments: This work has been presented at the 56th Annual Allerton Conference on Communication, Control, and Computing, October 2018

  38. arXiv:1809.08514  [pdf, other

    cs.NI cs.CR cs.IT eess.SP

    Fundamental Limits of Invisible Flow Fingerprinting

    Authors: Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr

    Abstract: Network flow fingerprinting can be used to de-anonymize communications on anonymity systems such as Tor by linking the ingress and egress segments of anonymized connections. Assume Alice and Bob have access to the input and the output links of an anonymous network, respectively, and they wish to collaboratively reveal the connections between the input and the output links without being detected by… ▽ More

    Submitted 27 March, 2019; v1 submitted 22 September, 2018; originally announced September 2018.

  39. A Game-Theoretic Approach to Multi-Objective Resource Sharing and Allocation in Mobile Edge Clouds

    Authors: Faheem Zafari, Jian Li, Kin K Leung, Don Towsley, Ananthram Swami

    Abstract: Mobile edge computing seeks to provide resources to different delay-sensitive applications. However, allocating the limited edge resources to a number of applications is a challenging problem. To alleviate the resource scarcity problem, we propose sharing of resources among multiple edge computing service providers where each service provider has a particular utility to optimize. We model the reso… ▽ More

    Submitted 25 August, 2018; v1 submitted 21 August, 2018; originally announced August 2018.

    Comments: The paper has been accepted for publication in ACM Mobicom workshop "Technologies for the Wireless Edge" 2018

  40. arXiv:1807.06143  [pdf, other

    eess.SP cs.IT stat.AP

    Quickest Detection of Dynamic Events in Networks

    Authors: Shaofeng Zou, Venugopal V. Veeravalli, Jian Li, Don Towsley

    Abstract: The problem of quickest detection of dynamic events in networks is studied. At some unknown time, an event occurs, and a number of nodes in the network are affected by the event, in that they undergo a change in the statistics of their observations. It is assumed that the event is dynamic, in that it can propagate along the edges in the network, and affect more and more nodes with time. The event… ▽ More

    Submitted 16 July, 2018; originally announced July 2018.

  41. arXiv:1807.03733  [pdf, other

    cs.SI cs.LG

    Network Classification in Temporal Networks Using Motifs

    Authors: Kun Tu, Jian Li, Don Towsley, Dave Braines, Liam D. Turner

    Abstract: Network classification has a variety of applications, such as detecting communities within networks and finding similarities between those representing different aspects of the real world. However, most existing work in this area focus on examining static undirected networks without considering directed edges or temporality. In this paper, we propose a new methodology that utilizes feature represe… ▽ More

    Submitted 7 August, 2018; v1 submitted 10 July, 2018; originally announced July 2018.

  42. arXiv:1807.03650  [pdf, other

    cs.SI physics.soc-ph

    On a Class of Stochastic Multilayer Networks

    Authors: Bo Jiang, Philippe Nain, Don Towsley, Saikat Guha

    Abstract: In this paper, we introduce a new class of stochastic multilayer networks. A stochastic multilayer network is the aggregation of $M$ networks (one per layer) where each is a subgraph of a foundational network $G$. Each layer network is the result of probabilistically removing links and nodes from $G$. The resulting network includes any link that appears in at least $K$ layers. This model is an ins… ▽ More

    Submitted 10 July, 2018; originally announced July 2018.

  43. arXiv:1806.03542  [pdf, other

    cs.NI

    OCCAM: An Optimization-Based Approach to Network Inference

    Authors: Anirudh Sabnis, Ramesh K. Sitaraman, Donald Towsley

    Abstract: We study the problem of inferring the structure of a communication network based only on network measurements made from a set of hosts situated at the network periphery. Our novel approach called "OCCAM" is based on the principle of occam's razor and finds the "simplest" network that explains the observed network measurements. OCCAM infers the internal topology of a communication network, includin… ▽ More

    Submitted 1 June, 2019; v1 submitted 9 June, 2018; originally announced June 2018.

  44. arXiv:1805.11721  [pdf, other

    cs.NI

    The Role of Caching in Future Communication Systems and Networks

    Authors: Georgios S. Paschos, George Iosifidis, Meixia Tao, Don Towsley, Giuseppe Caire

    Abstract: This paper has the following ambitious goal: to convince the reader that content caching is an exciting research topic for the future communication systems and networks. Caching has been studied for more than 40 years, and has recently received increased attention from industry and academia. Novel caching techniques promise to push the network performance to unprecedented limits, but also pose sig… ▽ More

    Submitted 29 May, 2018; originally announced May 2018.

    Comments: to appear in IEEE JSAC

    Journal ref: JSAC Special Issue in Caching, 2018

  45. arXiv:1803.04100  [pdf, ps, other

    cs.NI

    Multi-Hop Routing in Covert Wireless Networks

    Authors: Azadeh Sheikholeslami, Majid Ghaderi, Don Towsley, Boulat A. Bash, Saikat Guha, Dennis Goeckel

    Abstract: In covert communication, Alice tries to communicate with Bob without being detected by a warden Willie. When the distance between Alice and Bob becomes large compared to the distance between Alice and Willie(s), the performance of covert communication will be degraded. In this case, multi-hop message transmission via intermediate relays can help to improve performance. Hence, in this work multi-ho… ▽ More

    Submitted 11 March, 2018; originally announced March 2018.

    Comments: Accepted in IEEE Transactions of Wireless Communications

  46. arXiv:1801.05417  [pdf, other

    quant-ph

    Quantum Walk Inspired Neural Networks for Graph-Structured Data

    Authors: Stefan Dernbach, Arman Mohseni-Kabir, Siddharth Pal, Don Towsley, Miles Gepner

    Abstract: In recent years, new neural network architectures designed to operate on graph-structured data have pushed the state-of-the-art in the field. A large set of these architectures utilize a form of classical random walks to diffuse information. We propose quantum walk neural networks (QWNN), a novel graph neural network architecture based on quantum random walks, the quantum parallel to classical ran… ▽ More

    Submitted 15 June, 2018; v1 submitted 16 January, 2018; originally announced January 2018.

    Comments: In submission to NIPS 2018

  47. Towards Stability Analysis of Data Transport Mechanisms: a Fluid Model and an Application

    Authors: Gayane Vardoyan, C. V. Hollot, Don Towsley

    Abstract: The Transmission Control Protocol (TCP) utilizes congestion avoidance and control mechanisms as a preventive measure against congestive collapse and as an adaptive measure in the presence of changing network conditions. The set of available congestion control algorithms is diverse, and while many have been studied from empirical and simulation perspectives, there is a notable lack of analytical wo… ▽ More

    Submitted 8 January, 2018; originally announced January 2018.

    Comments: IEEE INFOCOM 2018

    Journal ref: IEEE/ACM Transactions on Networking 2021

  48. arXiv:1801.02099  [pdf, other

    cs.NI cs.PF

    Joint Data Compression and Caching: Approaching Optimality with Guarantees

    Authors: Jian Li, Faheem Zafari, Don Towsley, Kin K. Leung, Ananthram Swami

    Abstract: We consider the problem of optimally compressing and caching data across a communication network. Given the data generated at edge nodes and a routing path, our goal is to determine the optimal data compression ratios and caching decisions across the network in order to minimize average latency, which can be shown to be equivalent to maximizing the compression and caching gain under an energy cons… ▽ More

    Submitted 24 January, 2018; v1 submitted 6 January, 2018; originally announced January 2018.

  49. arXiv:1712.07307  [pdf, other

    cs.NI cs.PF

    Network Cache Design under Stationary Requests: Exact Analysis and Poisson Approximation

    Authors: Nitish K. Panigrahy, Jian Li, Don Towsley, Christopher V. Hollot

    Abstract: The design of caching algorithms to maximize hit probability has been extensively studied. In this paper, we associate each content with a utility, which is a function of either the corresponding content hit rate or hit probability. We formulate a cache optimization problem to maximize the sum of utilities over all contents under stationary and ergodic request processes. This problem is non-convex… ▽ More

    Submitted 5 March, 2019; v1 submitted 19 December, 2017; originally announced December 2017.

  50. arXiv:1712.03565  [pdf, other

    cs.NI cs.PF

    Optimal Energy Consumption with Communication, Computation, Caching and QoI-Guarantee

    Authors: Faheem Zafari, Jian Li, Kin K. Leung, Don Towsley, Ananthram Swami

    Abstract: Energy efficiency is a fundamental requirement of modern data communication systems, and its importance is reflected in much recent work on performance analysis of system energy consumption. However, most works have only focused on communication and computation costs, but do not account for caching costs. Given the increasing interest in cache networks, this is a serious deficiency. {In this paper… ▽ More

    Submitted 26 January, 2019; v1 submitted 10 December, 2017; originally announced December 2017.