Skip to main content

Showing 1–13 of 13 results for author: Shroff, N B

Searching in archive math. Search in all archives.
.
  1. arXiv:2309.16880  [pdf, ps, other

    cs.NI math.OC math.PR

    Near Delay-Optimal Scheduling of Batch Jobs in Multi-Server Systems

    Authors: Yin Sun, C. Emre Koksal, Ness B. Shroff

    Abstract: We study a class of scheduling problems, where each job is divided into a batch of unit-size tasks and these tasks can be executed in parallel on multiple servers with New-Better-than-Used (NBU) service time distributions. While many delay optimality results are available for single-server queueing systems, generalizing these results to the multi-server case has been challenging. This motivated us… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

    Comments: This is a preprint prepared in 2017. arXiv admin note: substantial text overlap with arXiv:1603.07322

  2. arXiv:2212.02376  [pdf, other

    cs.LG math.OC

    DIAMOND: Taming Sample and Communication Complexities in Decentralized Bilevel Optimization

    Authors: Peiwen Qiu, Yining Li, Zhuqing Liu, Prashant Khanduri, Jia Liu, Ness B. Shroff, Elizabeth Serena Bentley, Kurt Turck

    Abstract: Decentralized bilevel optimization has received increasing attention recently due to its foundational role in many emerging multi-agent learning paradigms (e.g., multi-agent meta-learning and multi-agent reinforcement learning) over peer-to-peer edge networks. However, to work with the limited computation and communication capabilities of edge networks, a major challenge in develo** decentralize… ▽ More

    Submitted 19 January, 2023; v1 submitted 5 December, 2022; originally announced December 2022.

  3. arXiv:2206.02047  [pdf, ps, other

    cs.LG math.ST stat.ML

    On the Generalization Power of the Overfitted Three-Layer Neural Tangent Kernel Model

    Authors: Peizhong Ju, Xiaojun Lin, Ness B. Shroff

    Abstract: In this paper, we study the generalization performance of overparameterized 3-layer NTK models. We show that, for a specific set of ground-truth functions (which we refer to as the "learnable set"), the test error of the overfitted 3-layer NTK is upper bounded by an expression that decreases with the number of neurons of the two hidden layers. Different from 2-layer NTK where there exists only one… ▽ More

    Submitted 4 June, 2022; originally announced June 2022.

  4. arXiv:2103.05243  [pdf, ps, other

    cs.LG math.ST stat.ML

    On the Generalization Power of Overfitted Two-Layer Neural Tangent Kernel Models

    Authors: Peizhong Ju, Xiaojun Lin, Ness B. Shroff

    Abstract: In this paper, we study the generalization performance of min $\ell_2$-norm overfitting solutions for the neural tangent kernel (NTK) model of a two-layer neural network with ReLU activation that has no bias term. We show that, depending on the ground-truth function, the test error of overfitted NTK models exhibits characteristics that are different from the "double-descent" of other overparameter… ▽ More

    Submitted 7 March, 2023; v1 submitted 9 March, 2021; originally announced March 2021.

    Comments: Published in ICML21. This version fixes an error of Lemma 31 and other parts affected by this error. The main results remain the same except some small changes on certain coefficients of Eq.(9)

  5. arXiv:2007.13023  [pdf, other

    cs.LG math.OC stat.ML

    A Partially Observable MDP Approach for Sequential Testing for Infectious Diseases such as COVID-19

    Authors: Rahul Singh, Fang Liu, Ness B. Shroff

    Abstract: The outbreak of the novel coronavirus (COVID-19) is unfolding as a major international crisis whose influence extends to every aspect of our daily lives. Effective testing allows infected individuals to be quarantined, thus reducing the spread of COVID-19, saving countless lives, and hel** to restart the economy safely and securely. Develo** a good testing strategy can be greatly aided by cont… ▽ More

    Submitted 25 July, 2020; originally announced July 2020.

  6. arXiv:2002.12435  [pdf, ps, other

    cs.LG math.OC stat.ML

    Learning in Markov Decision Processes under Constraints

    Authors: Rahul Singh, Abhishek Gupta, Ness B. Shroff

    Abstract: We consider reinforcement learning (RL) in Markov Decision Processes in which an agent repeatedly interacts with an environment that is modeled by a controlled Markov process. At each time step $t$, it earns a reward, and also incurs a cost-vector consisting of $M$ costs. We design model-based RL algorithms that maximize the cumulative reward earned over a time horizon of $T$ time-steps, while sim… ▽ More

    Submitted 5 January, 2022; v1 submitted 27 February, 2020; originally announced February 2020.

    Journal ref: IEEE Transactions on Control of Network Systems, 31 August 2022

  7. arXiv:1809.03032  [pdf, ps, other

    math.OC cs.NI

    Simulated Annealing for Optimal Resource Allocation in Wireless Networks with ImperfectCommunications

    Authors: Jaewook Kwak, Ness B. Shroff

    Abstract: Simulated annealing (SA) method has had significant recent success in designing distributed control algorithms for wireless networks. These SA based techniques formed the basis of new CSMA algorithms and gave rise to the development of numerous variants to achieve the best system performance accommodating different communication technologies and more realistic system conditions. However, these alg… ▽ More

    Submitted 9 September, 2018; originally announced September 2018.

    Comments: 12 pages. A short version (8-page) of this paper has been published in Annual Allerton Conference on Communication, Control, and Computing (Allerton) in 2018

  8. arXiv:1603.07322  [pdf, ps, other

    cs.PF cs.DC cs.IT cs.NI math.PR

    On Delay-Optimal Scheduling in Queueing Systems with Replications

    Authors: Yin Sun, C. Emre Koksal, Ness B. Shroff

    Abstract: In modern computer systems, jobs are divided into short tasks and executed in parallel. Empirical observations in practical systems suggest that the task service times are highly random and the job service time is bottlenecked by the slowest straggling task. One common solution for straggler mitigation is to replicate a task on multiple servers and wait for one replica of the task to finish early.… ▽ More

    Submitted 6 February, 2017; v1 submitted 23 March, 2016; originally announced March 2016.

  9. arXiv:1502.06004  [pdf, other

    math.OC cs.CR cs.NI

    The Impact of Stealthy Attacks on Smart Grid Performance: Tradeoffs and Implications

    Authors: Yara Abdallah, Zizhan Zheng, Ness B. Shroff, Hesham El Gamal, Tarek M. El-Fouly

    Abstract: The smart grid is envisioned to significantly enhance the efficiency of energy consumption, by utilizing two-way communication channels between consumers and operators. For example, operators can opportunistically leverage the delay tolerance of energy demands in order to balance the energy load over time, and hence, reduce the total operational cost. This opportunity, however, comes with security… ▽ More

    Submitted 14 June, 2016; v1 submitted 9 December, 2014; originally announced February 2015.

    Comments: Technical report - this work was accepted to IEEE Transactions on Control of Network Systems, 2016. arXiv admin note: substantial text overlap with arXiv:1209.1763

  10. arXiv:1403.1642  [pdf, other

    eess.SY cs.DC cs.NI math.OC

    Optimal Energy-Aware Epidemic Routing in DTNs

    Authors: Soheil Eshghi, MHR. Khouzani, Saswati Sarkar, Ness B. Shroff, Santosh S. Venkatesh

    Abstract: In this work, we investigate the use of epidemic routing in energy constrained Delay Tolerant Networks (DTNs). In epidemic routing, messages are relayed by intermediate nodes at contact opportunities, i.e., when pairs of nodes come within the transmission range of each other. Each node needs to decide whether to forward its message upon contact with a new node based on its own residual energy leve… ▽ More

    Submitted 2 June, 2015; v1 submitted 6 March, 2014; originally announced March 2014.

    Comments: 17 pages, 9 figures

  11. arXiv:1208.6308   

    cs.NI cs.DC cs.IT eess.SY math.OC

    Distributed Cross-Layer Optimization in Wireless Networks: A Second-Order Approach

    Authors: Jia Liu, Cathy H. Xia, Ness B. Shroff, Hanif D. Sherali

    Abstract: Due to the rapidly growing scale and heterogeneity of wireless networks, the design of distributed cross-layer optimization algorithms have received significant interest from the networking research community. So far, the standard distributed cross-layer approach in the literature is based on first-order Lagrangian dual decomposition and the subgradient method, which suffers a slow convergence rat… ▽ More

    Submitted 15 February, 2013; v1 submitted 30 August, 2012; originally announced August 2012.

    Comments: This paper is going to appear in IEEE INFOCOM 2013, Turin, Italy

  12. arXiv:1203.1687  [pdf, other

    eess.SY math.OC

    An Analytical Approach to the Adoption of Asymmetric Bidirectional Firewalls: Need for Regulation?

    Authors: M. H. R. Khouzani, Soumya Sen, Ness B. Shroff

    Abstract: Recent incidents of cybersecurity violations have revealed the importance of having firewalls and other intrusion detection systems to monitor traffic entering and leaving access networks. But the adoption of such security measures is often stymied by `free-riding' effects and `shortsightedness' among Internet service providers (ISPs). In this work, we develop an analytical framework that not only… ▽ More

    Submitted 7 March, 2012; originally announced March 2012.

    Comments: 9 pages, 1 figure, technical report (detailed version) of a conference submission

  13. arXiv:1002.3312  [pdf, ps, other

    cs.IT eess.SY math.OC

    Multiuser Scheduling in a Markov-modeled Downlink using Randomly Delayed ARQ Feedback

    Authors: Sugumar Murugesan, Philip Schniter, Ness B. Shroff

    Abstract: We focus on the downlink of a cellular system, which corresponds to the bulk of the data transfer in such wireless systems. We address the problem of opportunistic multiuser scheduling under imperfect channel state information, by exploiting the memory inherent in the channel. In our setting, the channel between the base station and each user is modeled by a two-state Markov chain and the schedule… ▽ More

    Submitted 27 April, 2011; v1 submitted 17 February, 2010; originally announced February 2010.

    Comments: Contains 22 pages, 6 figures and 8 tables; revised version including additional analytical and numerical results; work submitted, Feb 2010, to IEEE Transactions on Information Theory, revised April 2011; authors can be reached at [email protected]/[email protected]/[email protected]