Skip to main content

Showing 1–44 of 44 results for author: Leith, D J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2302.01890  [pdf, other

    cs.CR

    Android OS Privacy Under the Loupe -- A Tale from the East

    Authors: Haoyu Liu, Douglas J. Leith, Paul Patras

    Abstract: China is currently the country with the largest number of Android smartphone users. We use a combination of static and dynamic code analysis techniques to study the data transmitted by the preinstalled system apps on Android smartphones from three of the most popular vendors in China. We find that an alarming number of preinstalled system, vendor and third-party apps are granted dangerous privileg… ▽ More

    Submitted 3 February, 2023; originally announced February 2023.

  2. arXiv:2204.02197  [pdf, other

    cs.LG cs.NI

    Penalised FTRL With Time-Varying Constraints

    Authors: Douglas J. Leith, George Iosifidis

    Abstract: In this paper we extend the classical Follow-The-Regularized-Leader (FTRL) algorithm to encompass time-varying constraints, through adaptive penalization. We establish sufficient conditions for the proposed Penalized FTRL algorithm to achieve $O(\sqrt{t})$ regret and violation with respect to strong benchmark $\hat{X}^{max}_t$. Lacking prior knowledge of the constraints, this is probably the large… ▽ More

    Submitted 6 April, 2022; v1 submitted 5 April, 2022; originally announced April 2022.

  3. arXiv:2201.02890  [pdf, other

    cs.LG cs.NI stat.ML

    Lazy Lagrangians with Predictions for Online Learning

    Authors: Daron Anderson, George Iosifidis, Douglas J. Leith

    Abstract: We consider the general problem of online convex optimization with time-varying additive constraints in the presence of predictions for the next cost and constraint functions. A novel primal-dual algorithm is designed by combining a Follow-The-Regularized-Leader iteration with prediction-adaptive dynamic steps. The algorithm achieves $\mathcal O(T^{\frac{3-β}{4}})$ regret and… ▽ More

    Submitted 8 January, 2022; originally announced January 2022.

  4. arXiv:2201.02840  [pdf, other

    cs.NI cs.PF

    Selective Edge Computing for Mobile Analytics

    Authors: Apostolos Galanopoulos, George Iosifidis, Theodoros Salonidis, Douglas J. Leith

    Abstract: An increasing number of mobile applications rely on Machine Learning (ML) routines for analyzing data. Executing such tasks at the user devices saves the energy spent on transmitting and processing large data volumes at distant cloud-deployed servers. However, due to memory and computing limitations, the devices often cannot support the required resource-intensive routines and fail to accurately e… ▽ More

    Submitted 8 January, 2022; originally announced January 2022.

  5. arXiv:2101.07562  [pdf, other

    cs.NI

    Modelling Downlink Packet Aggregation in Paced 802.11ac WLANs

    Authors: Francesco Gringoli, Douglas J. Leith

    Abstract: We derive an analytic model of packet aggregation on the the downlink of an 802.11ac WLAN when packet arrivals are paced. The model is closed-form and so suitable for both analysis and design of next generation edge architectures that aim to achieve high rate and low delay. The model is validated against both simulations and experimental measurements and found to be remarkably accurate despite its… ▽ More

    Submitted 19 January, 2021; originally announced January 2021.

    Comments: arXiv admin note: substantial text overlap with arXiv:1910.09651

  6. Measurement-Based Evaluation Of Google/Apple Exposure Notification API For Proximity Detection in a Commuter Bus

    Authors: Douglas J. Leith, Stephen Farrell

    Abstract: We report on the results of a measurement study carried out on a commuter bus in Dublin, Ireland using the Google/Apple Exposure Notification (GAEN) API. This API is likely to be widely used by Covid-19 contact tracing apps. Measurements were collected between 60 pairs of handset locations and are publicly available. We find that the attenuation level reported by the GAEN API need not increase wit… ▽ More

    Submitted 15 June, 2020; originally announced June 2020.

  7. arXiv:2006.06822  [pdf, other

    eess.SP cs.LG cs.NI

    Coronavirus Contact Tracing: Evaluating The Potential Of Using Bluetooth Received Signal Strength For Proximity Detection

    Authors: Douglas J. Leith, Stephen Farrell

    Abstract: We report on measurements of Bluetooth Low Energy (LE) received signal strength taken on mobile handsets in a variety of common, real-world settings. We note that a key difficulty is obtaining the ground truth as to when people are in close proximity to one another. Knowledge of this ground truth is important for accurately evaluating the accuracy with which contact events are detected by Bluetoot… ▽ More

    Submitted 19 May, 2020; originally announced June 2020.

  8. arXiv:2003.03588  [pdf, ps, other

    cs.NI cs.LG

    Improving IoT Analytics through Selective Edge Execution

    Authors: A. Galanopoulos, A. G. Tasiopoulos, G. Iosifidis, T. Salonidis, D. J. Leith

    Abstract: A large number of emerging IoT applications rely on machine learning routines for analyzing data. Executing such tasks at the user devices improves response time and economizes network resources. However, due to power and computing limitations, the devices often cannot support such resource-intensive routines and fail to accurately execute the analytics. In this work, we propose to improve the per… ▽ More

    Submitted 7 March, 2020; originally announced March 2020.

    Comments: 7 pages, 6 figures. This paper has been accepted for publication in the Proceedings of IEEE International Conference on Communications (ICC) 2020

  9. arXiv:2003.03584  [pdf, ps, other

    cs.NI cs.LG

    Measurement-driven Analysis of an Edge-Assisted Object Recognition System

    Authors: A. Galanopoulos, V. Valls, G. Iosifidis, D. J. Leith

    Abstract: We develop an edge-assisted object recognition system with the aim of studying the system-level trade-offs between end-to-end latency and object recognition accuracy. We focus on develo** techniques that optimize the transmission delay of the system and demonstrate the effect of image encoding rate and neural network size on these two performance metrics. We explore optimal trade-offs between th… ▽ More

    Submitted 7 March, 2020; originally announced March 2020.

    Comments: 7 pages, 9 figures. This paper has been accepted for publication in the Proceedings of IEEE International Conference on Communications (ICC) 2020

  10. arXiv:1911.04307  [pdf, ps, other

    cs.LG stat.ML

    Learning The Best Expert Efficiently

    Authors: Daron Anderson, Douglas J. Leith

    Abstract: We consider online learning problems where the aim is to achieve regret which is efficient in the sense that it is the same order as the lowest regret amongst K experts. This is a substantially stronger requirement that achieving $O(\sqrt{n})$ or $O(\log n)$ regret with respect to the best expert and standard algorithms are insufficient, even in easy cases where the regrets of the available action… ▽ More

    Submitted 11 November, 2019; originally announced November 2019.

  11. arXiv:1910.09651  [pdf, other

    cs.NI eess.SY

    Low-Delay High-Rate Operation of 802.11ac WLAN Downlink: Nonlinear Controller Analysis & Design

    Authors: Francesco Gringoli, Douglas J. Leith

    Abstract: In this paper we consider a next generation edge architecture where traffic is routed via a proxy located close to the network edge (e.g. within a cloudlet). This creates freedom to implement new transport layer behaviour over the wireless path between proxy and clients. We use this freedom to develop a novel traffic sha** controller for the downlink in 802.11ac WLANs that adjusts the send rate… ▽ More

    Submitted 19 January, 2021; v1 submitted 21 October, 2019; originally announced October 2019.

  12. arXiv:1806.07761  [pdf, other

    cs.NI

    Quick and Plenty: Achieving Low Delay and High Rate in 802.11ac Edge Networks

    Authors: Hamid Hassani, Franceso Gringoli, Douglas J. Leith

    Abstract: We consider transport layer approaches for achieving high rate, low delay communication over edge paths where the bottleneck is an 802.11ac WLAN. We first show that by regulating send rate so as to maintain a target aggregation level it is possible to realise high rate, low delay communication over 802.11ac WLANs. We then address two important practical issues arising in production networks, namel… ▽ More

    Submitted 13 October, 2019; v1 submitted 20 June, 2018; originally announced June 2018.

  13. arXiv:1802.01360  [pdf, other

    cs.NI

    ORLA/OLAA: Orthogonal Coexistence of LAA and WiFi in Unlicensed Spectrum

    Authors: Andres Garcia-Saavedra, Paul Patras, Victor Valls, Xavier Costa-Perez, Douglas J. Leith

    Abstract: Future mobile networks will exploit unlicensed spectrum to boost capacity and meet growing user demands cost-effectively. The 3GPP has recently defined a Licensed-Assisted Access (LAA) scheme to enable global Unlicensed LTE (U-LTE) deployment, aiming at ($i$) ensuring fair coexistence with incumbent WiFi networks, i.e., impacting on their performance no more than another WiFi device, and ($ii$) ac… ▽ More

    Submitted 5 February, 2018; originally announced February 2018.

    Comments: 14 pages, 7 figures, submitted to IEEE/ACM Transactions on Networking

  14. arXiv:1703.03471  [pdf, other

    cs.CR

    Plausible Deniability in Web Search -- From Detection to Assessment

    Authors: Pol Mac Aonghusa, Douglas J. Leith

    Abstract: We ask how to defend user ability to plausibly deny their interest in topics deemed sensitive in the face of search engine learning. We develop a practical and scalable tool called \PDE{} allowing a user to detect and assess threats to plausible deniability. We show that threats to plausible deniability of interest are readily detectable for all topics tested in an extensive testing program. Of pa… ▽ More

    Submitted 23 June, 2017; v1 submitted 9 March, 2017; originally announced March 2017.

    Comments: 14 pages, 1 figure. arXiv admin note: substantial text overlap with arXiv:1609.07922

  15. Optimal Differentially Private Mechanisms for Randomised Response

    Authors: Naoise Holohan, Douglas J. Leith, Oliver Mason

    Abstract: We examine a generalised Randomised Response (RR) technique in the context of differential privacy and examine the optimality of such mechanisms. Strict and relaxed differential privacy are considered for binary outputs. By examining the error of a statistical estimator, we present closed solutions for the optimal mechanism(s) in both cases. The optimal mechanism is also given for the specific cas… ▽ More

    Submitted 16 December, 2016; originally announced December 2016.

  16. arXiv:1610.07141  [pdf, ps, other

    cs.NI

    An Efficient Web Traffic Defence Against Timing-Analysis Attacks

    Authors: Saman Feghhi, Douglas J. Leith

    Abstract: We introduce a new class of lower overhead tunnel that is resistant to traffic analysis. The tunnel opportunistically reduces the number of dummy packets transmitted during busy times when many flows are simultaneously active while maintaining well-defined privacy properties. We find that the dummy packet overhead is typically less than 20% on lightly loaded links and falls to zero as the traffic… ▽ More

    Submitted 2 June, 2018; v1 submitted 23 October, 2016; originally announced October 2016.

  17. arXiv:1609.07922  [pdf, other

    cs.CR cs.CY

    It wasn't me! Plausible Deniability in Web Search

    Authors: Pól Mac Aonghusa, Douglas J. Leith

    Abstract: Our ability to control the flow of sensitive personal information to online systems is key to trust in personal privacy on the internet. We ask how to detect, assess and defend user privacy in the face of search engine personalisation? We develop practical and scalable tools allowing a user to detect, assess and defend against threats to plausible deniability. We show that threats to plausible den… ▽ More

    Submitted 26 September, 2016; originally announced September 2016.

    Comments: 34 pages, 1 figure

  18. arXiv:1605.00409  [pdf, ps, other

    cs.NI

    Fair Coexistence of Scheduled and Random Access Wireless Networks: Unlicensed LTE/WiFi

    Authors: Cristina Cano, Douglas J. Leith, Andres Garcia-Saavedra, Pablo Serrano

    Abstract: We study the fair coexistence of scheduled and random access transmitters sharing the same frequency channel. Interest in coexistence is topical due to the need for emerging unlicensed LTE technologies to coexist fairly with WiFi. However, this interest is not confined to LTE/WiFi as coexistence is likely to become increasingly commonplace in IoT networks and beyond 5G. In this article we show tha… ▽ More

    Submitted 2 May, 2016; originally announced May 2016.

    Comments: 14 pages, 8 figures, journal

  19. arXiv:1603.01392  [pdf, ps, other

    cs.NI

    Proportional Fair Rate Allocation for Private Shared Networks

    Authors: Saman Feghhi, Douglas J. Leith, Mohammad Karzand

    Abstract: In this paper, we consider fair privacy in a shared network subject to traffic analysis attacks by an eavesdropper. We initiate the study of the joint trade-off between privacy, throughput and delay in such a shared network as a utility fairness problem and derive the proportional fair rate allocation for networks of flows subject to privacy constraints and delay deadlines.

    Submitted 4 March, 2016; originally announced March 2016.

  20. arXiv:1602.04629  [pdf, ps, other

    cs.NI

    srsLTE: An Open-Source Platform for LTE Evolution and Experimentation

    Authors: Ismael Gomez-Miguelez, Andres Garcia-Saavedra, Paul D. Sutton, Pablo Serrano, Cristina Cano, Douglas J. Leith

    Abstract: Testbeds are essential for experimental evaluation as well as for product development. In the context of LTE networks, existing testbed platforms are limited either in functionality and/or extensibility or are too complex to modify and customise. In this work we present srsLTE, an open-source platform for LTE experimentation designed for maximum modularity and code reuse and fully compliant with L… ▽ More

    Submitted 15 February, 2016; originally announced February 2016.

    Comments: 7 pages, 5 figures

  21. arXiv:1511.06244  [pdf, ps, other

    cs.NI

    Unlicensed LTE/WiFi Coexistence: Is LBT Inherently Fairer Than CSAT?

    Authors: Cristina Cano, Douglas J. Leith

    Abstract: Ensuring fair co-existence between unlicensed LTE and WiFi networks is currently of major concern to both cellular operators and WiFi providers. Two main unlicensed LTE approaches currently being discussed, namely Carrier Sense Adaptive Transmission (CSAT) and Listen Before Talk (LBT). While these mechanisms differ in their compatibility with existing LTE specifications and regulatory compliance i… ▽ More

    Submitted 19 November, 2015; originally announced November 2015.

    Comments: 6 pages, 3 figures

  22. arXiv:1509.00167  [pdf, ps, other

    cs.IT

    FEC for Lower In-Order Delivery Delay in Packet Networks

    Authors: Mohammad Karzand, Douglas J. Leith, Jason Cloud, Muriel Medard

    Abstract: We consider use of FEC to reduce in-order delivery delay over packet erasure channels. We propose a class of streaming codes that is capacity achieving and provides a superior throughput-delay trade-off compared to block codes by introducing flexibility in where and when redundancy is placed. This flexibility results in significantly lower in-order delay for a given throughput for a wide range of… ▽ More

    Submitted 2 September, 2016; v1 submitted 1 September, 2015; originally announced September 2015.

  23. arXiv:1507.08499  [pdf, ps, other

    cs.NI cs.IT cs.PF

    Low Delay Random Linear Coding and Scheduling Over Multiple Interfaces

    Authors: Andres Garcia-Saavedra, Mohammad Karzand, Douglas J. Leith

    Abstract: Multipath transport protocols like MPTCP transfer data across multiple routes in parallel and deliver it in order at the receiver. When the delay on one or more of the paths is variable, as is commonly the case, out of order arrivals are frequent and head of line blocking leads to high latency. This is exacerbated when packet loss, which is also common with wireless links, is tackled using ARQ. Th… ▽ More

    Submitted 30 July, 2015; originally announced July 2015.

  24. arXiv:1506.02804  [pdf, ps, other

    cs.NI

    Measurement-Based Modelling of LTE Performance in Dublin City

    Authors: Miguel Báguena Albaladejo, Douglas J. Leith, Pietro Manzoni

    Abstract: LTE/4G is the next generation of cellular network which specifically aims to improve the network performance for data traffic and is currently being rolled out by many network operators. We present results from an extensive LTE measurement campaign in Dublin, Ireland using a custom performance measurement tool. Performance data was measured at a variety of locations within the city (including cell… ▽ More

    Submitted 9 June, 2015; originally announced June 2015.

  25. Utility Fair Rate Allocation in LTE/802.11 Networks

    Authors: Bahar Partov, Douglas J. Leith

    Abstract: We consider proportional fair rate allocation in a heterogeneous network with a mix of LTE and 802.11 cells which supports multipath and multihomed operation (simultaneous connection of a user device to multiple LTE BSs and 802.11 APs). We show that the utility fair optimisation problem is non-convex but that a global optimum can be found by solving a sequence of convex optimisations in a distribu… ▽ More

    Submitted 2 June, 2015; originally announced June 2015.

    Comments: 13 pages, submitted to IEEE/ACM Transactions on Networking

  26. arXiv:1504.08043  [pdf, other

    cs.CR cs.SI

    Don't let Google know I'm lonely!

    Authors: Pól Mac Aonghusa, Douglas J. Leith

    Abstract: From buying books to finding the perfect partner, we share our most intimate wants and needs with our favourite online systems. But how far should we accept promises of privacy in the face of personal profiling? In particular we ask how can we improve detection of sensitive topic profiling by online systems? We propose a definition of privacy disclosure we call ε-indistinguishability from which we… ▽ More

    Submitted 19 August, 2016; v1 submitted 29 April, 2015; originally announced April 2015.

    Comments: 26 pages, 7 figures in ACM Transactions on Privacy and Security (TOPS), Volume 19 Issue 1, August 2016

  27. arXiv:1411.6685  [pdf, ps, other

    cs.NI

    Rigorous and Practical Proportional-fair Allocation for Multi-rate Wi-Fi

    Authors: Paul Patras, Andres Garcia-Saavedra, David Malone, Douglas J. Leith

    Abstract: Recent experimental studies confirm the prevalence of the widely known performance anomaly problem in current Wi-Fi networks, and report on the severe network utility degradation caused by this phenomenon. Although a large body of work addressed this issue, we attribute the refusal of prior solutions to their poor implementation feasibility with off-the-shelf hardware and their imprecise modelling… ▽ More

    Submitted 19 May, 2015; v1 submitted 24 November, 2014; originally announced November 2014.

    Comments: 21 pages, 11 figures

  28. arXiv:1410.2087  [pdf, ps, other

    cs.NI

    A Web Traffic Analysis Attack Using Only Timing Information

    Authors: Saman Feghhi, Douglas J. Leith

    Abstract: We introduce an attack against encrypted web traffic that makes use only of packet timing information on the uplink. This attack is therefore impervious to existing packet padding defences. In addition, unlike existing approaches this timing-only attack does not require knowledge of the start/end of web fetches and so is effective against traffic streams. We demonstrate the effectiveness of the at… ▽ More

    Submitted 9 July, 2016; v1 submitted 8 October, 2014; originally announced October 2014.

  29. arXiv:1406.0899  [pdf, ps, other

    math.OC cs.IT

    Max-Weight Revisited: Sequences of Non-Convex Optimisations Solving Convex Optimisations

    Authors: Víctor Valls, Douglas J. Leith

    Abstract: We investigate the connections between max-weight approaches and dual subgradient methods for convex optimisation. We find that strong connections exist and we establish a clean, unifying theoretical framework that includes both max-weight and dual subgradient approaches as special cases. Our analysis uses only elementary methods, and is not asymptotic in nature. It also allows us to establish an… ▽ More

    Submitted 26 August, 2015; v1 submitted 3 June, 2014; originally announced June 2014.

    Comments: convex optimisation, max-weight scheduling, backpressure, subgradient methods

  30. arXiv:1405.6987  [pdf, other

    cs.DS

    Fast, Responsive Decentralised Graph Colouring

    Authors: Alessandro Checco, Douglas J. Leith

    Abstract: We solve, in a fully decentralised way (\ie with no message passing), the classic problem of colouring a graph. We propose a novel algorithm that is automatically responsive to topology changes, and we prove that it converges quickly to a proper colouring in $O(N\log{N})$ time with high probability for generic graphs (and in $O(\log{N})$ time if $Δ=O(1)$) when the number of available colours is gr… ▽ More

    Submitted 2 September, 2017; v1 submitted 27 May, 2014; originally announced May 2014.

  31. arXiv:1403.6985  [pdf, other

    cs.DB

    A Fast Minimal Infrequent Itemset Mining Algorithm

    Authors: Kostyantyn Demchuk, Douglas J. Leith

    Abstract: A novel fast algorithm for finding quasi identifiers in large datasets is presented. Performance measurements on a broad range of datasets demonstrate substantial reductions in run-time relative to the state of the art and the scalability of the algorithm to realistically-sized datasets up to several million records.

    Submitted 16 October, 2014; v1 submitted 27 March, 2014; originally announced March 2014.

  32. Updating Neighbour Cell List via Crowdsourced User Reports: a Framework for Measuring Time Performance

    Authors: Alessandro Checco, Carlo Lancia, Douglas J. Leith

    Abstract: In this paper we introduce the idea of estimating local topology in wireless networks by means of crowdsourced user reports. In this approach each user periodically reports to the serving basestation information about the set of neighbouring basestations observed by the user. We show that, by map** the local topological structure of the network onto states of increasing knowledge, a crisp mathem… ▽ More

    Submitted 20 November, 2019; v1 submitted 7 January, 2014; originally announced January 2014.

  33. arXiv:1311.6280  [pdf, ps, other

    cs.NI

    Thwarting Selfish Behavior in 802.11 WLANs

    Authors: Albert Banchs, Jorge Ortin, Andres Garcia-Saavedra, Douglas J. Leith, Pablo Serrano

    Abstract: The 802.11e standard enables user configuration of several MAC parameters, making WLANs vulnerable to users that selfishly configure these parameters to gain throughput. In this paper we propose a novel distributed algorithm to thwart such selfish behavior. The key idea of the algorithm is for honest stations to react, upon detecting a selfish station, by using a more aggressive configuration that… ▽ More

    Submitted 25 November, 2013; originally announced November 2013.

    Comments: 14 pages, 7 figures, journal

  34. arXiv:1311.5014  [pdf, ps, other

    cs.NI

    Policing 802.11 MAC Misbehaviours

    Authors: P. Patras, H. Feghhi, D. Malone, D. J. Leith

    Abstract: With the increasing availability of flexible wireless 802.11 devices, the potential exists for users to selfishly manipulate their channel access parameters and gain a performance advantage. Such practices can have a severe negative impact on compliant stations. To enable access points to counteract these selfish behaviours and preserve fairness in wireless networks, in this paper we propose a pol… ▽ More

    Submitted 13 October, 2014; v1 submitted 20 November, 2013; originally announced November 2013.

    Comments: 14 pages, 18 figures

  35. arXiv:1310.1015  [pdf, other

    cs.NI

    Utility Fair Optimisation of Antenna Tilt Angles in LTE Networks

    Authors: Bahar Partov, Douglas J. Leith, Rouzbeh Razavi

    Abstract: We formulate adaptation of antenna tilt angle as a utility fair optimisation task. This optimisation problem is non-convex, but in this paper we show that under reasonable conditions it can be reformulated as a convex optimisation. Using this insight, we develop a lightweight method for finding the optimal antenna tilt angles, making use of measurements which are already available at base stations… ▽ More

    Submitted 3 October, 2013; originally announced October 2013.

    Comments: 11 pages, submitted to IEEE/ACM Transactions on Networking

  36. Proportional Fair MU-MIMO in 802.11 WLANs

    Authors: Víctor Valls, Douglas J. Leith

    Abstract: We consider the proportional fair rate allocation in an 802.11 WLAN that supports multi-user MIMO (MU-MIMO) transmission by one or more stations. We characterise, for the first time, the proportional fair allocation of MU-MIMO spatial streams and station transmission opportunities. While a number of features carry over from the case without MU-MIMO, in general neither flows nor stations need to be… ▽ More

    Submitted 23 April, 2014; v1 submitted 20 May, 2013; originally announced May 2013.

  37. arXiv:1206.3120  [pdf, ps, other

    cs.NI cs.IT

    Convexity Conditions for 802.11 WLANs

    Authors: Vijay G. Subramanian, Douglas J. Leith

    Abstract: In this paper we characterise the maximal convex subsets of the (non-convex) rate region in 802.11 WLANs. In addition to being of intrinsic interest as a fundamental property of 802.11 WLANs, this characterisation can be exploited to allow the wealth of convex optimisation approaches to be applied to 802.11 WLANs.

    Submitted 14 June, 2012; originally announced June 2012.

  38. arXiv:1107.5468  [pdf, ps, other

    cs.NI

    Measuring Pulsed Interference in 802.11 Links

    Authors: Brad W. Zarikoff, Douglas J. Leith

    Abstract: Wireless 802.11 links operate in unlicensed spectrum and so must accommodate other unlicensed transmitters which generate pulsed interference. We propose a new approach for detecting the presence of pulsed interference affecting 802.11 links, and for estimating temporal statistics of this interference. This approach builds on recent work on distinguishing collision losses from noise losses in 802.… ▽ More

    Submitted 27 July, 2011; originally announced July 2011.

    Comments: 13 pages, submitted to IEEE/ACM Transactions on Networking

  39. arXiv:1107.1890  [pdf, ps, other

    cs.IT cs.NI

    Utility Optimal Coding for Packet Transmission over Wireless Networks - Part II: Networks of Packet Erasure Channels

    Authors: Premkumar Karumbu, Xiaomin Chen, Douglas J. Leith

    Abstract: We define a class of multi--hop erasure networks that approximates a wireless multi--hop network. The network carries unicast flows for multiple users, and each information packet within a flow is required to be decoded at the flow destination within a specified delay deadline. The allocation of coding rates amongst flows/users is constrained by network capacity. We propose a proportional fair tra… ▽ More

    Submitted 10 July, 2011; originally announced July 2011.

    Comments: Submitted to the Forty-Ninth Annual Allerton Conference on Communication, Control, and Computing, Monticello, Illinois, USA

  40. arXiv:1107.1886  [pdf, ps, other

    cs.IT cs.NI

    Utility Optimal Coding for Packet Transmission over Wireless Networks - Part I: Networks of Binary Symmetric Channels

    Authors: Premkumar Karumbu, Xiaomin Chen, Douglas J. Leith

    Abstract: We consider multi--hop networks comprising Binary Symmetric Channels ($\mathsf{BSC}$s). The network carries unicast flows for multiple users. The utility of the network is the sum of the utilities of the flows, where the utility of each flow is a concave function of its throughput. Given that the network capacity is shared by the flows, there is a contention for network resources like coding rate… ▽ More

    Submitted 10 July, 2011; originally announced July 2011.

    Comments: Submitted to Forty-Ninth Annual Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA

  41. Decentralized Constraint Satisfaction

    Authors: K. R. Duffy, C. Bordenave, D. J. Leith

    Abstract: We show that several important resource allocation problems in wireless networks fit within the common framework of Constraint Satisfaction Problems (CSPs). Inspired by the requirements of these applications, where variables are located at distinct network devices that may not be able to communicate but may interfere, we define natural criteria that a CSP solver must possess in order to be practic… ▽ More

    Submitted 9 October, 2012; v1 submitted 2 March, 2011; originally announced March 2011.

    ACM Class: F.2.0

    Journal ref: IEEE/ACM Transactions on Networking, 21 (4), 1298-1308, 2013

  42. Log-Convexity of Rate Region in 802.11e WLANs

    Authors: Douglas J. Leith, Vijay G. Subramanian, Ken R. Duffy

    Abstract: In this paper we establish the log-convexity of the rate region in 802.11 WLANs. This generalises previous results for Aloha networks and has immediate implications for optimisation based approaches to the analysis and design of 802.11 wireless networks.

    Submitted 22 February, 2011; originally announced February 2011.

    Journal ref: IEEE Communications Letters, 14(1), pp57-59, 2010

  43. Decentralised Learning MACs for Collision-free Access in WLANs

    Authors: Minyu Fang, David Malone, Ken R. Duffy, Douglas J. Leith

    Abstract: By combining the features of CSMA and TDMA, fully decentralised WLAN MAC schemes have recently been proposed that converge to collision-free schedules. In this paper we describe a MAC with optimal long-run throughput that is almost decentralised. We then design two \changed{schemes} that are practically realisable, decentralised approximations of this optimal scheme and operate with different amou… ▽ More

    Submitted 2 March, 2011; v1 submitted 22 September, 2010; originally announced September 2010.

    Journal ref: Springer Wireless Networks 2013, Volume 19, Issue 1, pp 83-98

  44. arXiv:1002.1581  [pdf, ps, other

    cs.NI

    Max-min Fairness in 802.11 Mesh Networks

    Authors: Douglas J. Leith, Qizhi Cao, Vijay G. Subramanian

    Abstract: In this paper we build upon the recent observation that the 802.11 rate region is log-convex and, for the first time, characterise max-min fair rate allocations for a large class of 802.11 wireless mesh networks. By exploiting features of the 802.11e/n MAC, in particular TXOP packet bursting, we are able to use this characterisation to establish a straightforward, practically implementable appro… ▽ More

    Submitted 3 March, 2010; v1 submitted 8 February, 2010; originally announced February 2010.