Skip to main content

Showing 1–50 of 60 results for author: Mandayam, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.02336  [pdf, other

    cs.AI cs.LG cs.NI

    Artificial General Intelligence (AGI)-Native Wireless Systems: A Journey Beyond 6G

    Authors: Walid Saad, Omar Hashash, Christo Kurisummoottil Thomas, Christina Chaccour, Merouane Debbah, Narayan Mandayam, Zhu Han

    Abstract: Building future wireless systems that support services like digital twins (DTs) is challenging to achieve through advances to conventional technologies like meta-surfaces. While artificial intelligence (AI)-native networks promise to overcome some limitations of wireless technologies, developments still rely on AI tools like neural networks. Such tools struggle to cope with the non-trivial challen… ▽ More

    Submitted 29 April, 2024; originally announced May 2024.

  2. arXiv:2203.02892  [pdf, other

    cs.LG cs.AI cs.MA cs.NI

    Watch from sky: machine-learning-based multi-UAV network for predictive police surveillance

    Authors: Ryusei Sugano, Ryoichi Shinkuma, Takayuki Nishio, Sohei Itahara, Narayan B. Mandayam

    Abstract: This paper presents the watch-from-sky framework, where multiple unmanned aerial vehicles (UAVs) play four roles, i.e., sensing, data forwarding, computing, and patrolling, for predictive police surveillance. Our framework is promising for crime deterrence because UAVs are useful for collecting and distributing data and have high mobility. Our framework relies on machine learning (ML) technology f… ▽ More

    Submitted 6 March, 2022; originally announced March 2022.

  3. arXiv:2111.14992  [pdf, other

    eess.SP cs.CR

    Network Traffic Sha** for Enhancing Privacy in IoT Systems

    Authors: Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam

    Abstract: Motivated by privacy issues caused by inference attacks on user activities in the packet sizes and timing information of Internet of Things (IoT) network traffic, we establish a rigorous event-level differential privacy (DP) model on infinite packet streams. We propose a memoryless traffic sha** mechanism satisfying a first-come-first-served queuing discipline that outputs traffic dependent on t… ▽ More

    Submitted 29 November, 2021; originally announced November 2021.

    Comments: 18 pages, 10 figures, submitted to IEEE Transactions on Networking

  4. A hybrid model-based and learning-based approach for classification using limited number of training samples

    Authors: Alireza Nooraiepour, Waheed U. Bajwa, Narayan B. Mandayam

    Abstract: The fundamental task of classification given a limited number of training data samples is considered for physical systems with known parametric statistical models. The standalone learning-based and statistical model-based classifiers face major challenges towards the fulfillment of the classification task using a small training set. Specifically, classifiers that solely rely on the physics-based s… ▽ More

    Submitted 1 December, 2021; v1 submitted 25 June, 2021; originally announced June 2021.

    Comments: An extended version of the paper accepted in the open journal of signal processing. This version includes the following extra materials compared to the accepted paper: 1. Appendix D: Proof of Lemma 5, 2. Appendix E: Proof of Lemma 6, 3. Appendix F: A heuristic approach for channel parameter estimation for CDMA system

    MSC Class: I.5 ACM Class: I.5

    Journal ref: IEEE Open J. Signal Proc., vol. 3, pp. 49-70, Jan. 2022

  5. arXiv:2105.07966  [pdf, other

    cs.GT

    A Game-Theoretic Analysis of Competitive Editing in Wikipedia: Contributors' Effort to Influence Articles and the Community's Attempt to Ensure Neutrality

    Authors: Santhanakrishnan Anand, Ofer Arazy, Narayan B. Mandayam, Oded Nov

    Abstract: Peer production, such as the collaborative authoring of Wikipedia articles, involves both cooperation and competition between contributors, and we focus on the latter. As individuals, contributors compete to align Wikipedia articles with their personal perspectives. As a community, they work collectively to ensure a neutral point of view (NPOV). We study the interplay between individuals' competit… ▽ More

    Submitted 17 May, 2021; originally announced May 2021.

    Comments: 37 pages, 6 figures, 1 Table

  6. arXiv:2103.03932  [pdf, other

    eess.SY cs.GT

    Prosumer Behavior: Decision Making with Bounded Horizon

    Authors: Mohsen Rajabpour, Arnold Glass, Robert Mulligan, Narayan B. Mandayam

    Abstract: Most studies of prosumer decision making in the smart grid have focused on single, temporally discrete decisions within the framework of expected utility theory (EUT) and behavioral theories such as prospect theory. In this work, we study prosumer decision making in a more natural, ongoing market situation in which a prosumer has to decide every day whether to sell any surplus energy units generat… ▽ More

    Submitted 5 March, 2021; originally announced March 2021.

    Comments: To Appear in Advanced Data Analytics for Power Systems, Cambridge University Press, 2021

  7. arXiv:2102.00589  [pdf, other

    cs.HC

    Tale of Seven Alerts: Enhancing Wireless Emergency Alerts (WEAs) to Reduce Cellular Network Usage During Disasters

    Authors: Demetrios Lambropoulos, Mohammad Yousefvand, Narayan Mandayam

    Abstract: In weather disasters, first responders access dedicated communication channels different from civilian commercial channels to facilitate rescues. However, rescues in recent disasters have increasingly involved civilian and volunteer forces, requiring civilian channels not to be overloaded with traffic. We explore seven enhancements to the wording of Wireless Emergency Alerts (WEAs) and their effec… ▽ More

    Submitted 31 January, 2021; originally announced February 2021.

  8. arXiv:2009.09371  [pdf, other

    cs.LG cs.NI

    Estimation of Individual Device Contributions for Incentivizing Federated Learning

    Authors: Takayuki Nishio, Ryoichi Shinkuma, Narayan B. Mandayam

    Abstract: Federated learning (FL) is an emerging technique used to train a machine-learning model collaboratively using the data and computation resource of the mobile devices without exposing privacy-sensitive user data. Appropriate incentive mechanisms that motivate the data and mobile-device owner to participate in FL is key to building a sustainable platform for FL. However, it is difficult to evaluat… ▽ More

    Submitted 20 September, 2020; originally announced September 2020.

    Comments: Submitted to IEEE Globecom Workshop

  9. arXiv:1909.05679  [pdf, other

    eess.SY cs.NI

    Learning End-User Behavior for Optimized Bidding in HetNets: Impact on User/Network Association

    Authors: Mohammad Yousefvand, Narayan Mandayam

    Abstract: We study the impact of end-user behavior on service provider (SP) bidding and user/network association in a HetNet with multiple SPs while considering the uncertainty in the service guarantees offered by the SPs. Using Prospect Theory (PT) to model end-user decision making that deviates from expected utility theory (EUT), we formulate user association with SPs as a multiple leader Stackelberg game… ▽ More

    Submitted 11 September, 2019; originally announced September 2019.

    Comments: Submitted to IEEE J-SAC Special issue on Smart Data Pricing. arXiv admin note: text overlap with arXiv:1806.03213

  10. arXiv:1908.00195  [pdf, other

    cs.LG cs.CR eess.SP stat.ML

    Learning-Aided Physical Layer Attacks Against Multicarrier Communications in IoT

    Authors: Alireza Nooraiepour, Waheed U. Bajwa, Narayan B. Mandayam

    Abstract: Internet-of-Things (IoT) devices that are limited in power and processing are susceptible to physical layer (PHY) spoofing (signal exploitation) attacks owing to their inability to implement a full-blown protocol stack for security. The overwhelming adoption of multicarrier techniques such as orthogonal frequency division multiplexing (OFDM) for the PHY layer makes IoT devices further vulnerable t… ▽ More

    Submitted 4 July, 2020; v1 submitted 31 July, 2019; originally announced August 2019.

    Comments: 15 pages; 20 figures; 3 tables; preprint of a paper accepted for publication in IEEE Trans. Cognitive Commun. Netw

    Journal ref: IEEE Trans. Cognitive Commun. Netw., vol. 7, no. 1, pp. 239-254, Mar. 2021

  11. arXiv:1905.04788  [pdf, other

    cs.NI cs.LG eess.SP

    Learning-based Resource Optimization in Ultra Reliable Low Latency HetNets

    Authors: Mohammad Yousefvand, Kenza Hamidouche, Narayan B. Mandayam

    Abstract: In this paper, the problems of user offloading and resource optimization are jointly addressed to support ultra-reliable and low latency communications (URLLC) in HetNets. In particular, a multi-tier network with a single macro base station (MBS) and multiple overlaid small cell base stations (SBSs) is considered that includes users with different latency and reliability constraints. Modeling the… ▽ More

    Submitted 12 May, 2019; originally announced May 2019.

    Comments: Submitted to IEEE Globecom 2019

  12. Optimizing Throughput Performance in Distributed MIMO Wi-Fi Networks using Deep Reinforcement Learning

    Authors: Neelakantan Nurani Krishnan, Eric Torkildson, Narayan Mandayam, Dipankar Raychaudhuri, Enrico-Henrik Rantala, Klaus Doppler

    Abstract: This paper explores the feasibility of leveraging concepts from deep reinforcement learning (DRL) to enable dynamic resource management in Wi-Fi networks implementing distributed multi-user MIMO (D-MIMO). D-MIMO is a technique by which a set of wireless access points are synchronized and grouped together to jointly serve multiple users simultaneously. This paper addresses two dynamic resource mana… ▽ More

    Submitted 29 April, 2019; v1 submitted 17 December, 2018; originally announced December 2018.

    Comments: 30 pages, 12 figures. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  13. arXiv:1812.05298  [pdf, other

    eess.SY cs.LG

    Cyber-Physical Security and Safety of Autonomous Connected Vehicles: Optimal Control Meets Multi-Armed Bandit Learning

    Authors: Aidin Ferdowsi, Samad Ali, Walid Saad, Narayan B. Mandayam

    Abstract: Autonomous connected vehicles (ACVs) rely on intra-vehicle sensors such as camera and radar as well as inter-vehicle communication to operate effectively. This reliance on cyber components exposes ACVs to cyber and physical attacks in which an adversary can manipulate sensor readings and physically take control of an ACV. In this paper, a comprehensive framework is proposed to thwart cyber and phy… ▽ More

    Submitted 13 December, 2018; originally announced December 2018.

    Comments: 30 pages, 11 figures

  14. arXiv:1809.06550  [pdf, ps, other

    cs.NI

    Joint User Association and Resource Allocation Optimization for Ultra Reliable Low Latency HetNets

    Authors: Mohammad Yousefvand, Narayan B. Mandayam

    Abstract: Ensuring ultra-reliable and low latency communications (URLLC) is necessary for enabling delay critical applications in 5G HetNets. We propose a joint user to BS association and resource optimization method that is attractive for URLLC in HetNets with Cellular Base Stations (CBSs) and Small Cell Base Stations (SBSs), while also reducing energy and bandwidth consumption. In our scheme, CBSs share p… ▽ More

    Submitted 18 September, 2018; originally announced September 2018.

    Comments: 8 Pages, 4 Figures, 1 Table

  15. arXiv:1806.03213  [pdf, other

    cs.NI cs.GT

    Impact of End-User Behavior on User/Network Association in HetNets

    Authors: Mohammad Yousefvand, Mohammad Hajimirsadeghi, Narayan B. Mandayam

    Abstract: We study the impact of end-user behavior on user/network association in a HetNet with multiple service providers (SPs). Specifically, we consider the uncertainty in the service guarantees offered by SPs in a HetNet, and use Prospect Theory (PT) to model end-user decision making. We formulate user association with SPs as a multiple leader Stackelberg game where each SP offers a data rate to each us… ▽ More

    Submitted 1 June, 2018; originally announced June 2018.

    Comments: 7 pages, 5 figures, IEEE ICC 2018 Conference Paper

  16. arXiv:1805.00983  [pdf, other

    eess.SY cs.AI math.OC

    Robust Deep Reinforcement Learning for Security and Safety in Autonomous Vehicle Systems

    Authors: Aidin Ferdowsi, Ursula Challita, Walid Saad, Narayan B. Mandayam

    Abstract: To operate effectively in tomorrow's smart cities, autonomous vehicles (AVs) must rely on intra-vehicle sensors such as camera and radar as well as inter-vehicle communication. Such dependence on sensors and communication links exposes AVs to cyber-physical (CP) attacks by adversaries that seek to take control of the AVs by manipulating their data. Thus, to ensure safe and optimal AV dynamics cont… ▽ More

    Submitted 8 May, 2018; v1 submitted 2 May, 2018; originally announced May 2018.

    Comments: 8 pages, 4 figures

  17. arXiv:1804.07428  [pdf, other

    cs.NI eess.SY

    Design of Ad Hoc Wireless Mesh Networks Formed by Unmanned Aerial Vehicles with Advanced Mechanical Automation

    Authors: Ryoichi Shinkuma, Narayan B. Mandayam

    Abstract: Ad hoc wireless mesh networks formed by unmanned aerial vehicles (UAVs) equipped with wireless transceivers (access points (APs)) are increasingly being touted as being able to provide a flexible "on-the-fly" communications infrastructure that can collect and transmit sensor data from sensors in remote, wilderness, or disaster-hit areas. Recent advances in the mechanical automation of UAVs have re… ▽ More

    Submitted 19 April, 2018; originally announced April 2018.

    Comments: 12 pages

  18. arXiv:1801.06270  [pdf, ps, other

    cs.CR

    Defense Against Advanced Persistent Threats in Dynamic Cloud Storage: A Colonel Blotto Game Approach

    Authors: Minghui Min, Liang Xiao, Caixia Xie, Mohammad Hajimirsadeghi, Narayan B. Mandayam

    Abstract: Advanced Persistent Threat (APT) attackers apply multiple sophisticated methods to continuously and stealthily steal information from the targeted cloud storage systems and can even induce the storage system to apply a specific defense strategy and attack it accordingly. In this paper, the interactions between an APT attacker and a defender allocating their Central Processing Units (CPUs) over mul… ▽ More

    Submitted 18 January, 2018; originally announced January 2018.

  19. arXiv:1709.09768  [pdf, other

    eess.SY cs.GT cs.IT

    Colonel Blotto Game for Secure State Estimation in Interdependent Critical Infrastructure

    Authors: Aidin Ferdowsi, Walid Saad, Narayan B. Mandayam

    Abstract: Securing the physical components of a city's interdependent critical infrastructure (ICI) such as power, natural gas, and water systems is a challenging task due to their interdependence and a large number of involved sensors. In this paper, using a novel integrated state-space model that captures the interdependence, a two-stage cyber attack on an ICI is studied in which the attacker first compro… ▽ More

    Submitted 5 November, 2019; v1 submitted 27 September, 2017; originally announced September 2017.

    Comments: 30 pages, 6 figures

  20. arXiv:1709.06071  [pdf, ps, other

    cs.GT cs.MA eess.SY

    Managing Price Uncertainty in Prosumer-Centric Energy Trading: A Prospect-Theoretic Stackelberg Game Approach

    Authors: Georges El Rahi, S. Rasoul Etesami, Walid Saad, Narayan Mandayam, H. Vincent Poor

    Abstract: In this paper, the problem of energy trading between smart grid prosumers, who can simultaneously consume and produce energy, and a grid power company is studied. The problem is formulated as a single-leader, multiple-follower Stackelberg game between the power company and multiple prosumers. In this game, the power company acts as a leader who determines the pricing strategy that maximizes its pr… ▽ More

    Submitted 18 September, 2017; originally announced September 2017.

  21. arXiv:1707.04589  [pdf, other

    eess.SY cs.GT cs.IT

    Game Theory for Secure Critical Interdependent Gas-Power-Water Infrastructure

    Authors: Aidin Ferdowsi, Anibal Sanjab, Walid Saad, Narayan B. Mandayam

    Abstract: A city's critical infrastructure such as gas, water, and power systems, are largely interdependent since they share energy, computing, and communication resources. This, in turn, makes it challenging to endow them with fool-proof security solutions. In this paper, a unified model for interdependent gas-power-water infrastructure is presented and the security of this model is studied using a novel… ▽ More

    Submitted 14 July, 2017; originally announced July 2017.

    Comments: 7 pages, in proceedings of Resilience Week 2017

  22. arXiv:1705.08338  [pdf, ps, other

    cs.GT cs.IT eess.SY

    A Colonel Blotto Game for Interdependence-Aware Cyber-Physical Systems Security in Smart Cities

    Authors: Aidin Ferdowsi, Walid Saad, Behrouz Maham, Narayan B. Mandayam

    Abstract: Smart cities must integrate a number of interdependent cyber-physical systems that operate in a coordinated manner to improve the well-being of the city's residents. A cyber-physical system (CPS) is a system of computational elements controlling physical entities. Large-scale CPSs are more vulnerable to attacks due to the cyber-physical interdependencies that can lead to cascading failures which c… ▽ More

    Submitted 23 May, 2017; originally announced May 2017.

  23. arXiv:1705.03805  [pdf, other

    cs.GT cs.MA eess.SY

    Smart Routing of Electric Vehicles for Load Balancing in Smart Grids

    Authors: S. Rasoul Etesami, Walid Saad, Narayan Mandayam, H. V. Poor

    Abstract: Electric vehicles (EVs) are expected to be a major component of the smart grid. The rapid proliferation of EVs will introduce an unprecedented load on the existing electric grid due to the charging/discharging behavior of the EVs, thus motivating the need for novel approaches for routing EVs across the grid. In this paper, a novel gametheoretic framework for smart routing of EVs within the smart g… ▽ More

    Submitted 27 December, 2019; v1 submitted 10 May, 2017; originally announced May 2017.

  24. arXiv:1705.03364  [pdf, other

    cs.NI

    Coexistence of Radar and Communication Systems in CBRS Bands Through Downlink Power Control

    Authors: Neelakantan Nurani Krishnan, Ratnesh Kumbhkar, Narayan B. Mandayam, Ivan Seskar, Sastry Kompella

    Abstract: Citizen Broadband Radio Service band (3550 - 3700 GHz) is seen as one of the key frequency bands to enable improvements in performance of wireless broadband and cellular systems. A careful study of interference caused by a secondary cellular communication system coexisting with an incumbent naval radar is required to establish a pragmatic protection distance, which not only protects the incumbent… ▽ More

    Submitted 9 May, 2017; originally announced May 2017.

    Comments: This paper has been submitted to IEEE MILCOM 2017. arXiv admin note: text overlap with arXiv:1704.07491

  25. arXiv:1704.08152  [pdf, other

    cs.IT

    Coverage and Rate Analysis of Super Wi-Fi Networks Using Stochastic Geometry

    Authors: Neelakantan Nurani Krishnan, Gokul Sridharan, Ivan Seskar, Narayan Mandayam

    Abstract: Recent regulatory changes proposed by the Federal Communications Commission (FCC) permitting unlicensed use of television white space (TVWS) channels present new opportunities for designing wireless networks that make efficient use of this spectrum. The favorable propagation characteristics of these channels and their widespread availability, especially in rural areas, make them well-suited for pr… ▽ More

    Submitted 26 April, 2017; originally announced April 2017.

    Comments: Published in IEEE International Symposium on Dynamic Spectrum Access Networks (DySPAN), 2017 held at Baltimore, MD

  26. arXiv:1704.07491  [pdf, other

    cs.NI cs.IT

    How Close Can I Be? - A Comprehensive Analysis of Cellular Interference on ATC Radar

    Authors: Neelakantan Nurani Krishnan, Ratnesh Kumbhkar, Narayan B. Mandayam, Ivan Seskar, Sastry Kompella

    Abstract: Increasing data traffic demands over wireless spectrum have necessitated spectrum sharing and coexistence between heterogeneous systems such as radar and cellular communications systems. In this context, we specifically investigate the co-channel coexistence between an air traffic control (ATC) radar and a wide area cellular communication (comms) system. We present a comprehensive characterization… ▽ More

    Submitted 24 April, 2017; originally announced April 2017.

    Comments: This paper has been submitted to IEEE Globecom 2017

  27. arXiv:1610.02103  [pdf, ps, other

    cs.GT cs.IT

    Prospect Theory for Enhanced Smart Grid Resilience Using Distributed Energy Storage

    Authors: Georges El Rahi, Anibal Sanjab, Walid Saad, Narayan B. Mandayam, H. Vincent Poor

    Abstract: The proliferation of distributed generation and storage units is leading to the development of local, small-scale distribution grids, known as microgrids (MGs). In this paper, the problem of optimizing the energy trading decisions of MG operators (MGOs) is studied using game theory. In the formulated game, each MGO chooses the amount of energy that must be sold immediately or stored for future eme… ▽ More

    Submitted 6 October, 2016; originally announced October 2016.

    Comments: 54th Annual Allerton Conference on Communication, Control, and Computing

  28. arXiv:1610.02067  [pdf, other

    cs.GT cs.IT cs.LG eess.SY

    Stochastic Games for Smart Grid Energy Management with Prospect Prosumers

    Authors: Seyed Rasoul Etesami, Walid Saad, Narayan Mandayam, H. Vincent Poor

    Abstract: In this paper, the problem of smart grid energy management under stochastic dynamics is investigated. In the considered model, at the demand side, it is assumed that customers can act as prosumers who own renewable energy sources and can both produce and consume energy. Due to the coupling between the prosumers' decisions and the stochastic nature of renewable energy, the interaction among prosume… ▽ More

    Submitted 7 August, 2017; v1 submitted 6 October, 2016; originally announced October 2016.

  29. arXiv:1609.00852  [pdf, other

    cs.GT cs.NI

    Joint Caching and Pricing Strategies for Popular Content in Information Centric Networks

    Authors: Mohammad Hajimirsadeghi, Narayan B. Mandayam, Alex Reznik

    Abstract: We develop an analytical framework for distribution of popular content in an Information Centric Network (ICN) that comprises of Access ICNs, a Transit ICN and a Content Provider. Using a generalized Zipf distribution to model content popularity, we devise a game theoretic approach to jointly determine caching and pricing strategies in such an ICN. Under the assumption that the caching cost of the… ▽ More

    Submitted 30 January, 2017; v1 submitted 3 September, 2016; originally announced September 2016.

    Comments: Accepted to be published in Journal of Selected Area in Communication(JSAC special issue on game theory in networks)

  30. arXiv:1604.01720  [pdf, other

    cs.CV cs.GR cs.MM cs.NI

    Reading Between the Pixels: Photographic Steganography for Camera Display Messaging

    Authors: Eric Wengrowski, Kristin Dana, Marco Gruteser, Narayan Mandayam

    Abstract: We exploit human color metamers to send light-modulated messages less visible to the human eye, but recoverable by cameras. These messages are a key component to camera-display messaging, such as handheld smartphones capturing information from electronic signage. Each color pixel in the display image is modified by a particular color gradient vector. The challenge is to find the color gradient tha… ▽ More

    Submitted 6 April, 2016; originally announced April 2016.

    Comments: 16 pages with references 8 tables and figures

    ACM Class: I.4.8

  31. arXiv:1511.01065  [pdf, ps, other

    eess.SY cs.IT

    Towards a Consumer-Centric Grid: A Behavioral Perspective

    Authors: Walid Saad, Arnold Glass, Narayan Mandayam, H. Vincent Poor

    Abstract: Active consumer participation is seen as an integral part of the emerging smart grid. Examples include demand-side management programs, incorporation of consumer-owned energy storage or renewable energy units, and active energy trading. However, despite the foreseen technological benefits of such consumer-centric grid features, to date, their widespread adoption in practice remains modest. To shed… ▽ More

    Submitted 1 November, 2015; originally announced November 2015.

    Comments: to appear, Proceedings of the IEEE

  32. Prospect Pricing in Cognitive Radio Networks

    Authors: Yingxiang Yang, Leonard T. Park, Narayan B. Mandayam, Ivan Seskar, Arnold Glass, Neha Sinha

    Abstract: Advances in cognitive radio networks have primarily focused on the design of spectrally agile radios and novel spectrum sharing techniques that are founded on Expected Utility Theory (EUT). In this paper, we consider the development of novel spectrum sharing algorithms in such networks taking into account human psychological behavior of the end-users, which often deviates from EUT. Specifically, w… ▽ More

    Submitted 3 October, 2015; originally announced October 2015.

    Comments: To appear in IEEE TCCN

  33. arXiv:1509.07963  [pdf, ps, other

    cs.GT

    Load Shifting in the Smart Grid: To Participate or Not?

    Authors: Yunpeng Wang, Walid Saad, Narayan B. Mandayam, H. Vincent Poor

    Abstract: Demand-side management (DSM) has emerged as an important smart grid feature that allows utility companies to maintain desirable grid loads. However, the success of DSM is contingent on active customer participation. Indeed, most existing DSM studies are based on game-theoretic models that assume customers will act rationally and will voluntarily participate in DSM. In contrast, in this paper, the… ▽ More

    Submitted 26 September, 2015; originally announced September 2015.

    Comments: 9 pages, 7 figures, journal, accepted

  34. arXiv:1505.00463  [pdf, other

    cs.NI

    Opportunistic Spectrum Allocation for Max-Min Rate in NC-OFDMA

    Authors: Ratnesh Kumbhkar, Tejashri Kuber, Narayan B. Mandayam, Ivan Seskar

    Abstract: We envision a scenario of opportunistic spectrum access among multiple links when the available spectrum is not contiguous due to the presence of external interference sources. Non-contiguous Orthogonal Frequency Division Multiplexing (NC-OFDM) is a promising technique to utilize such disjoint frequency bands in an efficient manner. In this paper we study the problem of fair spectrum allocation ac… ▽ More

    Submitted 3 May, 2015; originally announced May 2015.

  35. arXiv:1501.01744  [pdf, other

    cs.CV

    Optimal Radiometric Calibration for Camera-Display Communication

    Authors: Wenjia Yuan, Eric Wengrowski, Kristin J. Dana, Ashwin Ashok, Marco Gruteser, Narayan Mandayam

    Abstract: We present a novel method for communicating between a camera and display by embedding and recovering hidden and dynamic information within a displayed image. A handheld camera pointed at the display can receive not only the display image, but also the underlying message. These active scenes are fundamentally different from traditional passive scenes like QR codes because image formation is based o… ▽ More

    Submitted 8 January, 2015; originally announced January 2015.

    Comments: 10 pages, Submitted to CVPR 2015

  36. arXiv:1411.2953  [pdf, other

    cs.NI

    HetNetwork Coding: Scaling Throughput in Heterogeneous Networks using Multiple Radio Interfaces

    Authors: Ratnesh Kumbhkar, Narayan Mandayam, Ivan Seskar

    Abstract: The explosive demand for data has called for solution approaches that range from spectrally agile cognitive radios with novel spectrum sharing, to use of higher frequency spectrum as well as smaller and denser cell deployments with diverse access technologies, referred to as heterogeneous networks (HetNets). Simultaneously, advances in electronics and storage, has led to the advent of wireless dev… ▽ More

    Submitted 11 November, 2014; originally announced November 2014.

  37. arXiv:1410.2662  [pdf, ps, other

    cs.NI

    Evaluating Opportunistic Delivery of Large Content with TCP over WiFi in I2V Communication

    Authors: Shreyasee Mukherjee, Kai Su, Narayan B. Mandayam, K. K. Ramakrishnan, Dipankar Raychaudhuri, Ivan Seskar

    Abstract: With the increasing interest in connected vehicles, it is useful to evaluate the capability of delivering large content over a WiFi infrastructure to vehicles. The throughput achieved over WiFi channels can be highly variable and also rapidly degrades as the distance from the access point increases. While this behavior is well understood at the data link layer, the interactions across the various… ▽ More

    Submitted 9 October, 2014; originally announced October 2014.

  38. Rate Optimal design of a Wireless Backhaul Network using TV White Space

    Authors: Ratnesh Kumbhkar, Muhammad Nazmul Islam, Narayan B. Mandayam, Ivan Seskar

    Abstract: The penetration of wireless broadband services in remote areas has primarily been limited due to the lack of economic incentives that service providers encounter in sparsely populated areas. Besides, wireless backhaul links like satellite and microwave are either expensive or require strict line of sight communication making them unattractive. TV white space channels with their desirable radio pro… ▽ More

    Submitted 5 May, 2015; v1 submitted 5 September, 2014; originally announced September 2014.

  39. arXiv:1409.1606  [pdf, other

    cs.NI cs.IT

    Power Optimal Non-contiguous Spectrum Access in Multi Front End Radio Enabled Point-to-Point Link

    Authors: Muhammad Nazmul Islam, Narayan B. Mandayam, Sastry Kompella, Ivan Seskar

    Abstract: Non-contiguous spectrum chunks allow wireless links to flexibly access a wide amount of bandwidth. Multi- Channel Multi-Radio (MC-MR) and Non-Contiguous Orthogonal Frequency Division Multiplexing (NC-OFDM) are the two commercially viable strategies to access non-contiguous spectrum chunks. MC-MR accesses multiple non-contiguous chunks by activating multiple front ends which, in turn, increases the… ▽ More

    Submitted 4 September, 2014; originally announced September 2014.

    Comments: 5 pages, 3 figure. To be submitted to IEEE Communication Letters

  40. arXiv:1404.2656  [pdf, other

    cs.IT cs.NI

    Wireless Backhaul Node Placement for Small Cell Networks

    Authors: Muhammad Nazmul Islam, Ashwin Sampath, Atul Maharshi, Ozge Koymen, Narayan B. Mandayam

    Abstract: Small cells have been proposed as a vehicle for wireless networks to keep up with surging demand. Small cells come with a significant challenge of providing backhaul to transport data to(from) a gateway node in the core network. Fiber based backhaul offers the high rates needed to meet this requirement, but is costly and time-consuming to deploy, when not readily available. Wireless backhaul is an… ▽ More

    Submitted 9 April, 2014; originally announced April 2014.

    Comments: Invited paper at Conference on Information Science & Systems (CISS) 2014

  41. arXiv:1403.1248  [pdf, ps, other

    cs.GT cs.IT

    Integrating Energy Storage into the Smart Grid: A Prospect Theoretic Approach

    Authors: Yunpeng Wang, Walid Saad, Narayan B. Mandayam, H. Vincent Poor

    Abstract: In this paper, the interactions and energy exchange decisions of a number of geographically distributed storage units are studied under decision-making involving end-users. In particular, a noncooperative game is formulated between customer-owned storage units where each storage unit's owner can decide on whether to charge or discharge energy with a given probability so as to maximize a utility th… ▽ More

    Submitted 5 March, 2014; originally announced March 2014.

    Comments: 5 pages, 4 figures, conference

  42. arXiv:1402.0794  [pdf, ps, other

    cs.GT cs.SI physics.soc-ph

    A Game Theoretic Analysis of Collaboration in Wikipedia

    Authors: S. Anand, Ofer Arazy, Narayan Mandayam, Oded Nov

    Abstract: Peer production projects such as Wikipedia or open-source software development allow volunteers to collectively create knowledge based products. The inclusive nature of such projects poses difficult challenges for ensuring trustworthiness and combating vandalism. Prior studies in the area deal with descriptive aspects of peer production, failing to capture the idea that while contributors collabor… ▽ More

    Submitted 4 February, 2014; originally announced February 2014.

    Comments: 16 pages 5 figures 2 tables

    Journal ref: Proceedings of the 4th International Conference on Decision and Game Theory for Security (GameSec 2013), LNCS 8252, pp. 29-44, Springer 2013

  43. arXiv:1309.0861  [pdf, other

    cs.NI cs.IT

    System Power Minimization to Access Non-Contiguous Spectrum in Cognitive Radio Networks

    Authors: Muhammad Nazmul Islam, Narayan B. Mandayam, Sastry Kompella, Ivan Seskar

    Abstract: Wireless transmission using non-contiguous chunks of spectrum is becoming increasingly important due to a variety of scenarios such as: secondary users avoiding incumbent users in TV white space; anticipated spectrum sharing between commercial and military systems; and spectrum sharing among uncoordinated interferers in unlicensed bands. Multi-Channel Multi-Radio (MCMR) platforms and Non-Contiguou… ▽ More

    Submitted 14 February, 2016; v1 submitted 3 September, 2013; originally announced September 2013.

    Comments: Submitted to IEEE Transactions on Cognitive Communications and Networking

  44. Uplink Linear Receivers for Multi-cell Multiuser MIMO with Pilot Contamination: Large System Analysis

    Authors: Narayanan Krishnan, Roy D. Yates, Narayan B. Mandayam

    Abstract: Base stations with a large number of transmit antennas have the potential to serve a large number of users at high rates. However, the receiver processing in the uplink relies on channel estimates which are known to suffer from pilot interference. In this work, making use of the similarity of the uplink received signal in CDMA with that of a multi-cell multi-antenna system, we perform a large syst… ▽ More

    Submitted 14 April, 2014; v1 submitted 16 July, 2013; originally announced July 2013.

    Comments: Accepted for publication in IEEE Transactions on Wireless Communications

  45. arXiv:1303.6541  [pdf, ps, other

    cs.NI

    Dynamic Radio Resource Management for Random Network Coding: Power Control and CSMA Backoff Control

    Authors: Kai Su, Dan Zhang, Narayan B. Mandayam

    Abstract: Resource allocation in wireless networks typically occurs at PHY/MAC layers, while random network coding (RNC) is a network layer strategy. An interesting question is how resource allocation mechanisms can be tuned to improve RNC performance. By means of a differential equation framework which models RNC throughput in terms of lower layer parameters, we propose a gradient based approach that can d… ▽ More

    Submitted 26 March, 2013; originally announced March 2013.

    Comments: 28 pages, 9 figures. Submitted to IEEE Transactions on Wireless Communications

  46. Cellular Systems with Many Antennas: Large System Analysis under Pilot Contamination

    Authors: Narayanan Krishnan, Roy D. Yates, Narayan B. Mandayam

    Abstract: Base stations with a large number of transmit antennas have the potential to serve a large number of users simultaneously at higher rates. They also promise a lower power consumption due to coherent combining at the receiver. However, the receiver processing in the uplink relies on the channel estimates which are known to suffer from pilot interference. In this work, we perform an uplink large sys… ▽ More

    Submitted 5 January, 2013; originally announced January 2013.

    Comments: 5 pages, 4 figures

  47. Implementation of Distributed Time Exchange Based Cooperative Forwarding

    Authors: Muhammad Nazmul Islam, Shantharam Balasubramanian, Narayan B. Mandayam, Ivan Seskar, Sastry Kompella

    Abstract: In this paper, we design and implement time exchange (TE) based cooperative forwarding where nodes use transmission time slots as incentives for relaying. We focus on distributed joint time slot exchange and relay selection in the sum goodput maximization of the overall network. We formulate the design objective as a mixed integer nonlinear programming (MINLP) problem and provide a polynomial time… ▽ More

    Submitted 19 October, 2012; originally announced October 2012.

    Comments: Accepted in 2012 Military Communications Conference

    Journal ref: Military Communications Conference 2012 (Page 1-6)

  48. arXiv:1112.5767  [pdf, other

    cs.IT

    Optimal Resource Allocation and Relay Selection in Bandwidth Exchange Based Cooperative Forwarding

    Authors: Muhammad Nazmul Islam, Narayan Mandayam, Sastry Kompella

    Abstract: In this paper, we investigate joint optimal relay selection and resource allocation under bandwidth exchange (BE) enabled incentivized cooperative forwarding in wireless networks. We consider an autonomous network where N nodes transmit data in the uplink to an access point (AP) / base station (BS). We consider the scenario where each node gets an initial amount (equal, optimal based on direct pat… ▽ More

    Submitted 13 October, 2012; v1 submitted 24 December, 2011; originally announced December 2011.

    Comments: 8 pages, 7 figures

    Journal ref: Proceedings of WiOpt 2012 (Page 192-199)

  49. arXiv:1004.5108   

    cs.IT cs.NI math.DS

    Analyzing Random Network Coding with Differential Equations and Differential Inclusions

    Authors: Dan Zhang, Narayan B. Mandayam

    Abstract: We develop a framework based on differential equations (DE) and differential inclusions (DI) for analyzing Random Network Coding (RNC), as well as a nonlinear variant referred to as Random Coupon (RC), in a wireless network. The DEDI framework serves as a powerful numerical and analytical tool to study RNC. We demonstrate its versatility by proving theoretical results on multicast information flow… ▽ More

    Submitted 7 January, 2012; v1 submitted 28 April, 2010; originally announced April 2010.

    Comments: A more up-to-date version has been published on IEEE Trans. Inform. Theory

    ACM Class: H.1.1

  50. arXiv:0910.5027  [pdf, ps, other

    cs.CR cs.IT

    Information-theoretically Secret Key Generation for Fading Wireless Channels

    Authors: Chunxuan Ye, Suhas Mathur, Alex Reznik, Yogendra Shah, Wade Trappe, Narayan Mandayam

    Abstract: The multipath-rich wireless environment associated with typical wireless usage scenarios is characterized by a fading channel response that is time-varying, location-sensitive, and uniquely shared by a given transmitter-receiver pair. The complexity associated with a richly scattering environment implies that the short-term fading process is inherently hard to predict and best modeled stochastic… ▽ More

    Submitted 26 October, 2009; originally announced October 2009.

    Comments: 32 pages, 9 figures. Manuscript first submitted to the IEEE Transactions on Information Forensics and Security on 23 February, 2009.Portions of this work have been previous presented at the IEEE International Symposium on Information Theory, Seattle, WA, July 2006 and ACM Conference on Mobile Computing and Networking, San Francisco, CA, Sept. 2008