- Advanced Wireless Network Optimization
- Cooperative Communication and Network Coding
- Wireless Networks and Protocols
- Network Traffic and Congestion Control
- Advanced MIMO Systems Optimization
- Wireless Communication Networks Research
- Mobile Ad Hoc Networks
- Privacy-Preserving Technologies in Data
- Caching and Content Delivery
- ICT Impact and Policies
- IoT and Edge/Fog Computing
- Peer-to-Peer Network Technologies
- Age of Information Optimization
- Cloud Computing and Resource Management
- Online Learning and Analytics
- Green IT and Sustainability
- Power Line Communications and Noise
- Internet Traffic Analysis and Secure E-voting
- Advanced Optical Network Technologies
- Adversarial Robustness in Machine Learning
- Mobile Crowdsensing and Crowdsourcing
- Software-Defined Networks and 5G
- Auction Theory and Applications
- Digital Platforms and Economics
- Network Security and Intrusion Detection
Purdue University West Lafayette
2017-2025
Princeton University
2012-2023
North Carolina State University
2020
Université d'Avignon et des Pays de Vaucluse
2019
Guangdong University of Technology
2017
Indian Institute of Technology Bombay
2017
Stanford University
2001-2014
University of Chicago
2014
Johns Hopkins University
2014
Rensselaer Polytechnic Institute
2008
Fog is an emergent architecture for computing, storage, control, and networking that distributes these services closer to end users along the cloud-to-things continuum. It covers both mobile wireline scenarios, traverses across hardware software, resides on network edge but also over access networks among users, includes data plane control plane. As architecture, it supports a growing variety of applications, including those in Internet Things (IoT), fifth-generation (5G) wireless systems,...
A systematic understanding of the decomposability structures in network utility maximization is key to both resource allocation and functionality allocation. It helps us obtain most appropriate distributed algorithm for a given problem, quantifies comparison across architectural alternatives modularized design. Decomposition theory naturally provides mathematical language build an analytic foundation design control networks. In this tutorial paper, we first review basics convexity, Lagrange...
<para xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> Network protocols in layered architectures have historically been obtained on an <emphasis emphasistype="boldital">ad hoc</emphasis> basis, and many of the recent cross-layer designs are also conducted through piecemeal approaches. protocol stacks may instead be holistically analyzed systematically designed as distributed solutions to some global optimization problems. This paper presents a...
Network virtualization is a powerful way to run multiple architectures or experiments simultaneously on shared infrastructure. However, making efficient use of the underlying resources requires effective techniques for virtual network embedding--mapping each specific nodes and links in substrate network. Since general embedding problem computationally intractable, past research restricted space allow solutions, focused designing heuristic algorithms. In this paper, we advocate different...
In wireless cellular or ad hoc networks where Quality of Service (QoS) is interference-limited, a variety power control problems can be formulated as nonlinear optimization with system-wide objective, e.g., maximizing the total system throughput worst user throughput, subject to QoS constraints from individual users, on data rate, delay, and outage probability. We show that in high Signal-to- interference Ratios (SIR) regime, these apparently difficult, nonconvex transformed into convex form...
In a wireless network with multihop transmissions and interference-limited link rates, can we balance power control in the physical layer congestion transport to enhance overall performance while maintaining architectural modularity between layers? We answer this question by presenting distributed algorithm that couples existing transmission protocols (TCPs) increase end-to-end throughput energy efficiency of network. Under rigorous framework nonlinearly constrained utility maximization,...
We present five axioms for fairness measures in resource allocation. A family of satisfying the is constructed. Special cases this include ¿-fairness, Jain's index, and entropy. Properties are proven, including Schur-concavity. Among engineering implications a generalized index that tunes resolution measure, new understanding ¿-fair utility functions, an interpretation "larger ¿ more fair". also construct alternative set to capture system efficiency feasibility constraints.
Today's data centers need efficient traffic management to improve resource utilization in their networks. In this work, we study a joint tenant (e.g., server or virtual machine) placement and routing problem minimize costs. These two complementary degrees of freedom—placement routing—are mutually-dependent, however, are often optimized separately today's centers. Leveraging expanding the technique Markov approximation, propose an online algorithm dynamic environment under changing loads. The...
Given that full duplex (FD) and MIMO both employ multiple antenna resources, an important question arises is how to make the choice between FD? We show optimal performance requires a combination of be used. Hence, we present design implementation MIDU, first system for wireless networks. MIDU employs cancellation with symmetric placement transmit receive antennas as its primary RF technique. MIDU's provides large amounts self-interference several key advantages: (i) It allows two stages...
Network utility maximization (NUM) problem formulations provide an important approach to conduct network resource allocation and view layering as optimization decomposition. In the existing literature, distributed implementations are typically achieved by means of so-called dual decomposition technique. However, span possibilities includes many other elements that, thus far, have not been fully exploited, such use primal technique, versatile introduction auxiliary variables, potential...
Distributed and efficient resource allocation is critical for fully realizing the benefits of cooperative communications in large scale communication networks. This paper proposes two auction mechanisms, SNR power auction, that determine relay selection a distributed fashion. A single-relay network considered first, existence uniqueness Nash Equilibrium (i.e., auction's outcome) are proved. It shown achieves by maximizing total rate increase, flexible trading off fairness efficiency. For...
The two largest U.S. wireless ISPs have recently moved towards usage-based pricing to better manage the growing demand on their networks. Yet still requires over-provision capacity for at peak times of day. Time-dependent (TDP) addresses this problem by considering when a user consumes data, in addition how much is used. We present architecture, implementation, and trial an end-to-end TDP system called TUBE. TUBE creates price-based feedback control loop between ISP its end users. On side,...
Fog computing is an end-to-end horizontal architecture that distributes computing, storage, control, and networking functions closer to users along the cloud-to-thing continuum. The word "edge" may carry different meanings. A common usage of term refers edge network as opposed core network, with equipment such routers, base stations, home gateways. In sense, there are several differences between fog edge. First, inclusive cloud, core, metro, edge, clients, things. will further enable...
We study user behavior in the courses offered by a major massive online open course (MOOC) provider during summer of 2013. Since social learning is key element scalable education on MOOC and done via discussion forums, our main focus understanding forum activities. Two salient features these activities drive research: (1) high decline rate: for each studied, volume declined continuously throughout duration course; (2) high-volume, noisy discussions: at least 30 percent produced new threads...
We study the dynamics of network selection in heterogeneous wireless networks (HetNets). Users such selfishly select best radio access technology (RAT) with objective maximizing their own throughputs. propose two general classes throughput models that capture basic properties random (e.g., Wi-Fi) and scheduled WiMAX, LTE, 3G) networks. Next, we formulate problem as a non-cooperative game, its convergence, efficiency, practicality. Our results reveal that: (i) Single-class RAT games converge...
Federated learning has emerged recently as a promising solution for distributing machine tasks through modern networks of mobile devices. Recent studies have obtained lower bounds on the expected decrease in model loss that is achieved each round federated learning. However, convergence generally requires large number communication rounds, which induces delay training and costly terms network resources. In this paper, we propose fast-convergent algorithm, called <inline-formula...
Sign recognition is an integral part of autonomous cars. Any misclassification traffic signs can potentially lead to a multitude disastrous consequences, ranging from life-threatening accident even large-scale interruption transportation services relying on In this paper, we propose and examine security attacks against sign systems for Deceiving Autonomous caRs with Toxic Signs (we call the proposed DARTS). particular, introduce two novel methods create these toxic signs. First,...
A game-theoretic model for studying power control in multicarrier code-division multiple-access systems is proposed. Power modeled as a noncooperative game which each user decides how much to transmit over carrier maximize its own utility. The utility function considered here measures the number of reliable bits transmitted all carriers per joule energy consumed and particularly suitable networks where efficiency important. multidimensional nature users' strategies nonquasi-concavity make...
In a wireless network with multihop transmissions and interference-limited link rates, can we balance power control in the physical layer congestion transport to enhance overall performance while maintaining architectural modularity between layers? We answer this question by presenting distributed algorithm that couples existing transmission protocols (TCPs) increase end-to-end throughput energy efficiency of network. Under rigorous framework nonlinearly constrained utility maximization,...
For wireless cellular and ad hoc networks with QoS constraints, we propose a suite of problem formulations that allocate network resources to optimize SIR, maximize throughput minimize delay. The distinguishing characteristics these resource allocation is that, by using convex optimization, they accommodate variety realistic fairness constraints. Their globally optimal solutions can be computed efficiently through polynomial time interior point methods, even though use nonlinear objectives...