Skip to main content

Showing 1–37 of 37 results for author: Yates, R D

.
  1. arXiv:2405.07274  [pdf, other

    eess.SY

    Timely Offloading in Mobile Edge Cloud Systems

    Authors: Nitya Sathyavageeswaran, Roy D. Yates, Anand D. Sarwate, Narayan Mandayam

    Abstract: Future real-time applications like smart cities will use complex Machine Learning (ML) models for a variety of tasks. Timely status information is required for these applications to be reliable. Offloading computation to a mobile edge cloud (MEC) can reduce the completion time of these tasks. However, using the MEC may come at a cost such as related to use of a cloud service or privacy. In this pa… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  2. arXiv:2404.14596  [pdf, other

    eess.SY cs.IT

    Efficient and Timely Memory Access

    Authors: Vishakha Ramani, Ivan Seskar, Roy D. Yates

    Abstract: This paper investigates the optimization of memory sampling in status updating systems, where source updates are published in shared memory, and reader process samples the memory for source updates by paying a sampling cost. We formulate a discrete-time decision problem to find a sampling policy that minimizes average cost comprising age at the client and the cost incurred due to sampling. We esta… ▽ More

    Submitted 23 May, 2024; v1 submitted 22 April, 2024; originally announced April 2024.

    Comments: To be presented at ISIT 2024

  3. arXiv:2402.06860  [pdf, other

    cs.IT cs.OS

    Age-Memory Trade-off in Read-Copy-Update

    Authors: Vishakha Ramani, Jiachen Chen, Roy D. Yates

    Abstract: In the realm of shared memory systems, the challenge of reader-writer synchronization is closely coupled with the potential for readers to access outdated updates. Read-Copy-Update (RCU) is a synchronization primitive that allows for concurrent and non-blocking read access to fresh data. This is achieved through the creation of updated data copies, with each prior version retained until all associ… ▽ More

    Submitted 9 February, 2024; originally announced February 2024.

    Comments: Submitted to IEEE INFOCOM Age and Semantics of Information (ASoI) Workshop 2024

  4. arXiv:2306.14677  [pdf, other

    cs.IT

    Timely Processing Of Updates From Multiple Sources

    Authors: Vishakha Ramani, Ivan Seskar, Roy D. Yates

    Abstract: We consider a system where the updates from independent sources are disseminated via a publish-subscribe mechanism. The sources are the publishers and a decision process (DP), acting as a subscriber, derives decision updates from the source data. We derive the stationary expected age of information (AoI) of decision updates delivered to a monitor. We show that a lazy computation policy in which th… ▽ More

    Submitted 26 June, 2023; originally announced June 2023.

    Comments: Accepted at WiOpt 2023

  5. arXiv:2304.14603  [pdf, other

    cs.NI

    Timely Mobile Routing: An Experimental Study

    Authors: Vishakha Ramani, Jiachen Chen, Roy D. Yates

    Abstract: Time-critical cyber-physical applications demand the timely delivery of information. In this work, we employ a high-speed packet processing testbed to quantitatively analyze a packet forwarding application running on a shared memory multi-processor architecture, where efficient synchronization of concurrent access to a Forwarding Information Base is essential for low-latency and timely delivery of… ▽ More

    Submitted 27 April, 2023; originally announced April 2023.

    Comments: To be published in IEEE INFOCOM 2023 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)

  6. arXiv:2304.11683  [pdf, other

    cs.IT

    Lock-based or Lock-less: Which Is Fresh?

    Authors: Vishakha Ramani, Jiachen Chen, Roy D. Yates

    Abstract: We examine status updating systems in which time-stamped status updates are stored/written in shared-memory. Specifically, we compare Read-Copy-Update (RCU) and Readers-Writer lock (RWL) as shared-memory synchronization primitives on the update freshness. To demonstrate the tension between readers and writers accessing shared-memory, we consider a network scenario with a pair of coupled updating p… ▽ More

    Submitted 23 April, 2023; originally announced April 2023.

    Comments: To be published in IEEE INFOCOM 2023

  7. arXiv:2210.12539  [pdf, other

    cs.NI

    ACP+: An Age Control Protocol for the Internet

    Authors: Tanya Shreedhar, Sanjit K. Kaul, Roy D. Yates

    Abstract: We present ACP+, an age control protocol, which is a transport layer protocol that regulates the rate at which update packets from a source are sent over the Internet to a monitor. The source would like to keep the average age of sensed information at the monitor to a minimum, given the network conditions. Extensive experimentation helps us shed light on age control over the current Internet and i… ▽ More

    Submitted 22 October, 2022; originally announced October 2022.

    Comments: Under submission. arXiv admin note: text overlap with arXiv:2103.07797, arXiv:1811.03353

  8. arXiv:2208.06177  [pdf, other

    cs.IT

    Status Update Control and Analysis under Two-Way Delay

    Authors: Mohammad Moltafet, Markus Leinonen, Marian Codreanu, Roy D. Yates

    Abstract: We study status updating under two-way delay in a system consisting of a sampler, a sink, and a controller residing at the sink. The controller controls the sampling process by sending request packets to the sampler. Upon receiving a request, the sampler generates a sample and transmits the status update packet to the sink. Transmissions of both request and status update packets encounter random d… ▽ More

    Submitted 24 May, 2024; v1 submitted 12 August, 2022; originally announced August 2022.

  9. arXiv:2205.15630  [pdf, other

    eess.SY

    Privacy Leakage in Discrete Time Updating Systems

    Authors: Nitya Sathyavageeswaran, Roy D. Yates, Anand D. Sarwate, Narayan Mandayam

    Abstract: A source generates time-stamped update packets that are sent to a server and then forwarded to a monitor. This occurs in the presence of an adversary that can infer information about the source by observing the output process of the server. The server wishes to release updates in a timely way to the monitor but also wishes to minimize the information leaked to the adversary. We analyze the trade-o… ▽ More

    Submitted 31 May, 2022; originally announced May 2022.

  10. arXiv:2203.00647  [pdf, other

    cs.NI

    Coexistence of Age Sensitive Traffic and High Throughput Flows: Does Prioritization Help?

    Authors: Tanya Shreedhar, Sanjit K. Kaul, Roy D. Yates

    Abstract: We study the coexistence of high throughput traffic flows with status update flows that require timely delivery of updates. A mix of these flows share an end-to-end path that includes a WiFi access network followed by paths over the Internet to a server in the cloud. Using real-world experiments, we show that commonly used methods of prioritization (DSCP at the IP layer and EDCA at the 802.11 MAC… ▽ More

    Submitted 1 March, 2022; originally announced March 2022.

    Comments: Accepted at IEEE INFOCOM Age of Information Workshop 2022

  11. arXiv:2103.07797  [pdf, other

    cs.NI

    An Empirical Study of Ageing in the Cloud

    Authors: Tanya Shreedhar, Sanjit K. Kaul, Roy D. Yates

    Abstract: We quantify, over inter-continental paths, the ageing of TCP packets, throughput and delay for different TCP congestion control algorithms containing a mix of loss-based, delay-based and hybrid congestion control algorithms. In comparing these TCP variants to ACP+, an improvement over ACP, we shed better light on the ability of ACP+ to deliver timely updates over fat pipes and long paths. ACP+ est… ▽ More

    Submitted 13 March, 2021; originally announced March 2021.

    Comments: Accepted at IEEE INFOCOM Age of Information Workshop 2021

  12. arXiv:2102.02893  [pdf, other

    cs.IT cs.NI

    The Age of Gossip in Networks

    Authors: Roy D. Yates

    Abstract: A source node updates its status as a point process and also forwards its updates to a network of observer nodes. Within the network of observers, these updates are forwarded as point processes from node to node. Each node wishes its knowledge of the source to be as timely as possible. In this network, timeliness is measured by a discrete form of age of information: each status change at the sourc… ▽ More

    Submitted 4 February, 2021; originally announced February 2021.

    Comments: Submitted to ISIT 2021

  13. arXiv:2010.04787  [pdf, ps, other

    cs.IT

    Cache Updating Strategy Minimizing the Age of Information with Time-Varying Files' Popularities

    Authors: Haoyue Tang, Philippe Ciblat, **tao Wang, Michele Wigger, Roy D. Yates

    Abstract: We consider updating strategies for a local cache which downloads time-sensitive files from a remote server through a bandwidth-constrained link. The files are requested randomly from the cache by local users according to a popularity distribution which varies over time according to a Markov chain structure. We measure the freshness of the requested time-sensitive files through their Age of Inform… ▽ More

    Submitted 21 January, 2021; v1 submitted 9 October, 2020; originally announced October 2020.

    Comments: To appear ITW2020

  14. arXiv:2007.08564  [pdf, other

    cs.IT cs.NI

    Age of Information: An Introduction and Survey

    Authors: Roy D. Yates, Yin Sun, D. Richard Brown III, Sanjit K. Kaul, Eytan Modiano, Sennur Ulukus

    Abstract: We summarize recent contributions in the broad area of age of information (AoI). In particular, we describe the current state of the art in the design and optimization of low-latency cyberphysical systems and applications in which sources send time-stamped status updates to interested recipients. These applications desire status updates at the recipients to be as timely as possible; however, this… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

  15. arXiv:2005.07798  [pdf, other

    cs.DC cs.DB cs.IT

    Data Freshness in Leader-Based Replicated Storage

    Authors: Amir Behrouzi-Far, Emina Soljanin, Roy D. Yates

    Abstract: Leader-based data replication improves consistency in highly available distributed storage systems via sequential writes to the leader nodes. After a write has been committed by the leaders, follower nodes are written by a multicast mechanism and are only guaranteed to be eventually consistent. With Age of Information (AoI) as the freshness metric, we characterize how the number of leaders affects… ▽ More

    Submitted 15 May, 2020; originally announced May 2020.

  16. arXiv:2002.02817  [pdf, other

    cs.IT

    Timely Updates By Multiple Sources: The M/M/1 Queue Revisited

    Authors: Sanjit K. Kaul, Roy D. Yates

    Abstract: Multiple sources submit updates to a monitor through an M/M/1 queue. A stochastic hybrid system (SHS) approach is used to derive the average age of information (AoI) for an individual source as a function of the offered load of that source and the competing update traffic offered by other sources. This work corrects an error in a prior analysis. By numerical evaluation, this error is observed to b… ▽ More

    Submitted 7 February, 2020; originally announced February 2020.

  17. arXiv:2002.02026  [pdf, other

    cs.IT

    Age of Information in Uncoordinated Unslotted Updating

    Authors: Roy D. Yates, Sanjit K. Kaul

    Abstract: Sensor sources submit updates to a monitor through an unslotted, uncoordinated, unreliable multiple access collision channel. The channel is unreliable; a collision-free transmission is received successfully at the monitor with some transmission success probability. For an infinite-user model in which the sensors collectively transmit updates as a Poisson process and each update has an independent… ▽ More

    Submitted 5 February, 2020; originally announced February 2020.

    Comments: This has been submitted to ISIT 2020

  18. arXiv:1907.05408  [pdf, ps, other

    cs.IT cs.NI eess.SP

    Timely Cloud Computing: Preemption and Waiting

    Authors: Ahmed Arafa, Roy D. Yates, H. Vincent Poor

    Abstract: The notion of timely status updating is investigated in the context of cloud computing. Measurements of a time-varying process of interest are acquired by a sensor node, and uploaded to a cloud server to undergo some required computations. These computations consume random amounts of service time that are independent and identically distributed across different uploads. After the computations are… ▽ More

    Submitted 11 July, 2019; originally announced July 2019.

  19. arXiv:1811.03353  [pdf, other

    cs.NI

    ACP: An End-to-End Transport Protocol for Delivering Fresh Updates in the Internet-of-Things

    Authors: Tanya Shreedhar, Sanjit K. Kaul, Roy D. Yates

    Abstract: The next generation of networks must support billions of connected devices in the Internet-of-Things (IoT). To support IoT applications, sources sense and send their measurement updates over the Internet to a monitor (control station) for real-time monitoring and actuation. Ideally, these updates would be delivered at a high rate, only constrained by the sensing rate supported by the sources. Howe… ▽ More

    Submitted 4 May, 2019; v1 submitted 8 November, 2018; originally announced November 2018.

    Comments: This is an extended version of paper accepted in the Proceedings of 20th IEEE International Conference on the World of Wireless, Mobile and Multimedia Networks (IEEE WoWMoM 2019). A short version of this work is published as a poster in ACM MobiCom 2018 proceedings. The poster proceedings are available at: https://dl.acm.org/citation.cfm?id=3267740

  20. arXiv:1810.01533  [pdf, other

    cs.IT

    Timely Lossless Source Coding for Randomly Arriving Symbols

    Authors: **g Zhong, Roy D. Yates, Emina Soljanin

    Abstract: We consider a real-time streaming source coding system in which an encoder observes a sequence of randomly arriving symbols from an i.i.d. source, and feeds binary codewords to a FIFO buffer that outputs one bit per time unit to a decoder. Each source symbol represents a status update by the source, and the timeliness of the system is quantified by the age of information (AoI), defined as the time… ▽ More

    Submitted 2 October, 2018; originally announced October 2018.

    Comments: IEEE Information Theory Workshop (ITW) 2018

  21. arXiv:1808.05738  [pdf, ps, other

    cs.IT cs.NI

    Multicast With Prioritized Delivery: How Fresh is Your Data?

    Authors: **g Zhong, Roy D. Yates, Emina Soljanin

    Abstract: We consider a multicast network in which real-time status updates generated by a source are replicated and sent to multiple interested receiving nodes through independent links. The receiving nodes are divided into two groups: one priority group consists of $k$ nodes that require the reception of every update packet, the other non-priority group consists of all other nodes without the delivery req… ▽ More

    Submitted 16 August, 2018; originally announced August 2018.

    Comments: IEEE SPAWC 2018

  22. arXiv:1806.03487  [pdf, other

    cs.IT

    The Age of Information in Networks: Moments, Distributions, and Sampling

    Authors: Roy D. Yates

    Abstract: A source provides status updates to monitors through a network with state defined by a continuous-time finite Markov chain. An age of information (AoI) metric is used to characterize timeliness by the vector of ages tracked by the monitors. Based on a stochastic hybrid systems (SHS) approach, first order linear differential equations are derived for the temporal evolution of both the moments and t… ▽ More

    Submitted 10 April, 2020; v1 submitted 9 June, 2018; originally announced June 2018.

    Comments: This work was presented in part at the 2018 IEEE Infocom Age of Information Workshop. This version will be (more or less) the same as what will appear in the IEEE Transactions on Information Theory. This work was supported by NSF award 1717041

  23. arXiv:1804.00742  [pdf, ps, other

    cs.DC cs.DB cs.NI

    Minimizing Content Staleness in Dynamo-Style Replicated Storage Systems

    Authors: **g Zhong, Roy D. Yates, Emina Soljanin

    Abstract: Consistency in data storage systems requires any read operation to return the most recent written version of the content. In replicated storage systems, consistency comes at the price of delay due to large-scale write and read operations. Many applications with low latency requirements tolerate data staleness in order to provide high availability and low operation latency. Using age of information… ▽ More

    Submitted 2 April, 2018; originally announced April 2018.

    Comments: INFOCOM AoI Workshop 2018

  24. arXiv:1803.07993  [pdf, other

    cs.IT cs.NI

    Age of Information in a Network of Preemptive Servers

    Authors: Roy D. Yates

    Abstract: A source submits status updates to a network for delivery to a destination monitor. Updates follow a route through a series of network nodes. Each node is a last-come-first-served queue supporting preemption in service. We characterize the average age of information at the input and output of each node in the route induced by the updates passing through. For Poisson arrivals to a line network of p… ▽ More

    Submitted 21 March, 2018; originally announced March 2018.

    Comments: This work was supported by NSF award CNS-1422988 and will be presented at the 2018 IEEE Infocom Age of Information workshop

  25. arXiv:1802.09167  [pdf, other

    cs.IT

    Timeliness in Lossless Block Coding

    Authors: **g Zhong, Roy D. Yates

    Abstract: We examine lossless data compression from an average delay perspective. An encoder receives input symbols one per unit time from an i.i.d. source and submits binary codewords to a FIFO buffer that transmits bits at a fixed rate to a receiver/decoder. Each input symbol at the encoder is viewed as a status update by the source and the system performance is characterized by the status update age, def… ▽ More

    Submitted 26 February, 2018; originally announced February 2018.

    Comments: Data Compression Conference (DCC), 2016

  26. arXiv:1709.02427  [pdf, ps, other

    cs.IT cs.NI

    Status Updates Through Multicast Networks

    Authors: **g Zhong, Emina Soljanin, Roy D. Yates

    Abstract: Using age of information as the freshness metric, we examine a multicast network in which real-time status updates are generated by the source and sent to a group of $n$ interested receivers. We show that in order to keep the information freshness at each receiver, the source should terminate the transmission of the current update and start sending a new update packet as soon as it receives the ac… ▽ More

    Submitted 21 September, 2018; v1 submitted 7 September, 2017; originally announced September 2017.

    Comments: 55th Allerton Conference on Communication, Control and Computing, 2017

  27. arXiv:1705.02521  [pdf, other

    cs.IT

    Status Updates Over Unreliable Multiaccess Channels

    Authors: Sanjit K. Kaul, Roy D. Yates

    Abstract: Applications like environmental sensing, and health and activity sensing, are supported by networks of devices (nodes) that send periodic packet transmissions over the wireless channel to a sink node. We look at simple abstractions that capture the following commonalities of such networks (a) the nodes send periodically sensed information that is temporal and must be delivered in a timely manner,… ▽ More

    Submitted 6 May, 2017; originally announced May 2017.

  28. arXiv:1704.04155  [pdf, ps, other

    cs.IT

    Timely Updates over an Erasure Channel

    Authors: Roy D. Yates, Elie Najm, Emina Soljanin, **g Zhong

    Abstract: Using an age of information (AoI) metric, we examine the transmission of coded updates through a binary erasure channel to a monitor/receiver. We start by deriving the average status update age of an infinite incremental redundancy (IIR) system in which the transmission of a k-symbol update continuesuntil k symbols are received. This system is then compared to a fixed redundancy (FR) system in whi… ▽ More

    Submitted 3 October, 2018; v1 submitted 13 April, 2017; originally announced April 2017.

  29. arXiv:1704.03937  [pdf, ps, other

    cs.IT

    Status updates through M/G/1/1 queues with HARQ

    Authors: Elie Najm, Roy D. Yates, Emina Soljanin

    Abstract: We consider a system where randomly generated updates are to be transmitted to a monitor, but only a single update can be in the transmission service at a time. Therefore, the source has to prioritize between the two possible transmission policies: preempting the current update or discarding the new one. We consider Poisson arrivals and general service time, and refer to this system as the M/G/1/1… ▽ More

    Submitted 4 May, 2017; v1 submitted 12 April, 2017; originally announced April 2017.

  30. arXiv:1608.08622  [pdf, other

    cs.IT

    The Age of Information: Real-Time Status Updating by Multiple Sources

    Authors: Roy D. Yates, Sanjit K. Kaul

    Abstract: We examine multiple independent sources providing status updates to a monitor through simple queues. We formulate an Age of Information (AoI) timeliness metric and derive a general result for the AoI that is applicable to a wide variety of multiple source service systems. For first-come first-served and two types of last-come first-served systems with Poisson arrivals and exponential service times… ▽ More

    Submitted 11 December, 2017; v1 submitted 30 August, 2016; originally announced August 2016.

    Comments: Submitted to the IEEE Transactions on Information Theory

  31. arXiv:1601.02284  [pdf, ps, other

    cs.IT

    Update or Wait: How to Keep Your Data Fresh

    Authors: Yin Sun, Elif Uysal-Biyikoglu, Roy D. Yates, C. Emre Koksal, Ness B. Shroff

    Abstract: In this work, we study how to optimally manage the freshness of information updates sent from a source node to a destination via a channel. A proper metric for data freshness at the destination is the age-of-information, or simply age, which is defined as how old the freshest received update is since the moment that this update was generated at the source node (e.g., a sensor). A reasonable update… ▽ More

    Submitted 21 April, 2017; v1 submitted 10 January, 2016; originally announced January 2016.

  32. Bits Through Bufferless Queues

    Authors: Mehrnaz Tavan, Roy D. Yates, Waheed U. Bajwa

    Abstract: This paper investigates the capacity of a channel in which information is conveyed by the timing of consecutive packets passing through a queue with independent and identically distributed service times. Such timing channels are commonly studied under the assumption of a work-conserving queue. In contrast, this paper studies the case of a bufferless queue that drops arriving packets while a packet… ▽ More

    Submitted 18 December, 2013; originally announced January 2014.

    Comments: 8 pages, 3 figures, accepted in 51st Annual Allerton Conference on Communication, Control, and Computing, University of Illinois, Monticello, Illinois, Oct 2-4, 2013

    Journal ref: Proc. 51st Annu. Allerton Conf. Communication, Control, and Computing, Monticello, IL, Oct. 2-4, 2013, pp. 755-762

  33. Uplink Linear Receivers for Multi-cell Multiuser MIMO with Pilot Contamination: Large System Analysis

    Authors: Narayanan Krishnan, Roy D. Yates, Narayan B. Mandayam

    Abstract: Base stations with a large number of transmit antennas have the potential to serve a large number of users at high rates. However, the receiver processing in the uplink relies on channel estimates which are known to suffer from pilot interference. In this work, making use of the similarity of the uplink received signal in CDMA with that of a multi-cell multi-antenna system, we perform a large syst… ▽ More

    Submitted 14 April, 2014; v1 submitted 16 July, 2013; originally announced July 2013.

    Comments: Accepted for publication in IEEE Transactions on Wireless Communications

  34. Cellular Systems with Many Antennas: Large System Analysis under Pilot Contamination

    Authors: Narayanan Krishnan, Roy D. Yates, Narayan B. Mandayam

    Abstract: Base stations with a large number of transmit antennas have the potential to serve a large number of users simultaneously at higher rates. They also promise a lower power consumption due to coherent combining at the receiver. However, the receiver processing in the uplink relies on the channel estimates which are known to suffer from pilot interference. In this work, we perform an uplink large sys… ▽ More

    Submitted 5 January, 2013; originally announced January 2013.

    Comments: 5 pages, 4 figures

  35. arXiv:0809.3035  [pdf, ps, other

    cs.IT

    Interference Alignment for Line-of-Sight Channels

    Authors: Leonard Grokop, David N. C. Tse, Roy D. Yates

    Abstract: The fully connected K-user interference channel is studied in a multipath environment with bandwidth W. We show that when each link consists of D physical paths, the total spectral efficiency can grow {\it linearly} with K. This result holds not merely in the limit of large transmit power P, but for any fixed P, and is therefore a stronger characterization than degrees of freedom. It is achieved… ▽ More

    Submitted 17 September, 2008; originally announced September 2008.

  36. Discrete Memoryless Interference and Broadcast Channels with Confidential Messages: Secrecy Rate Regions

    Authors: Ruoheng Liu, Ivana Maric, Predrag Spasojevic, Roy D. Yates

    Abstract: We study information-theoretic security for discrete memoryless interference and broadcast channels with independent confidential messages sent to two receivers. Confidential messages are transmitted to their respective receivers with information-theoretic secrecy. That is, each receiver is kept in total ignorance with respect to the message intended for the other receiver. The secrecy level is… ▽ More

    Submitted 11 December, 2007; v1 submitted 17 February, 2007; originally announced February 2007.

    Comments: to appear Special Issue of IEEE Transactions on Information Theory on Information Theoretic Security

  37. arXiv:cs/0605005  [pdf, ps, other

    cs.IT

    The Discrete Memoryless Multiple Access Channel with Confidential Messages

    Authors: Ruoheng Liu, Ivana Maric, Roy D. Yates, Predrag Spasojevic

    Abstract: A multiple-access channel is considered in which messages from one encoder are confidential. Confidential messages are to be transmitted with perfect secrecy, as measured by equivocation at the other encoder. The upper bounds and the achievable rates for this communication situation are determined.

    Submitted 17 February, 2007; v1 submitted 1 May, 2006; originally announced May 2006.

    Comments: 1 figure, accepted by ISIT 2006 conference