Skip to main content

Showing 1–9 of 9 results for author: Towsley, D

Searching in archive math. Search in all archives.
.
  1. arXiv:2405.00842  [pdf, other

    math.ST cs.IT cs.LG eess.SP math.OC

    Quickest Change Detection with Confusing Change

    Authors: Yu-Zhen Janice Chen, Jinhang Zuo, Venugopal V. Veeravalli, Don Towsley

    Abstract: In the problem of quickest change detection (QCD), a change occurs at some unknown time in the distribution of a sequence of independent observations. This work studies a QCD problem where the change is either a bad change, which we aim to detect, or a confusing change, which is not of our interest. Our objective is to detect a bad change as quickly as possible while avoiding raising a false alarm… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

  2. arXiv:2003.05135  [pdf, ps, other

    math.PR cs.PF

    Covert Cycle Stealing in a Single FIFO Server

    Authors: Bo Jiang, Philippe Nain, Don Towsley

    Abstract: Consider a setting where Willie generates a Poisson stream of jobs and routes them to a single server that follows the first-in first-out discipline. Suppose there is an adversary Alice, who desires to receive service without being detected. We ask the question: what is the number of jobs that she can receive covertly, i.e. without being detected by Willie? In the case where both Willie and Alice… ▽ More

    Submitted 4 May, 2021; v1 submitted 11 March, 2020; originally announced March 2020.

  3. arXiv:2002.12688  [pdf, other

    cs.LG cs.DC math.OC stat.ML

    Decentralized gradient methods: does topology matter?

    Authors: Giovanni Neglia, Chuan Xu, Don Towsley, Gianmarco Calbi

    Abstract: Consensus-based distributed optimization methods have recently been advocated as alternatives to parameter server and ring all-reduce paradigms for large scale training of machine learning models. In this case, each worker maintains a local estimate of the optimal parameter vector and iteratively updates it by averaging the estimates obtained from its neighbors, and applying a correction on the ba… ▽ More

    Submitted 28 February, 2020; originally announced February 2020.

    Comments: A version of this paper is to appear at AISTATS 2020

  4. arXiv:1910.09151  [pdf, ps, other

    math.ST eess.SP

    Quickest Detection of Growing Dynamic Anomalies in Networks

    Authors: Georgios Rovatsos, Venugopal V. Veeravalli, Don Towsley, Ananthram Swami

    Abstract: The problem of quickest growing dynamic anomaly detection in sensor networks is studied. Initially, the observations at the sensors, which are sampled sequentially by the decision maker, are generated according to a pre-change distribution. At some unknown but deterministic time instant, a dynamic anomaly emerges in the network, affecting a different set of sensors as time progresses. The observat… ▽ More

    Submitted 2 February, 2020; v1 submitted 21 October, 2019; originally announced October 2019.

    Comments: 2 figures, conference style+appendix

  5. arXiv:1811.01800  [pdf, ps, other

    math.PR

    Planting trees in graphs, and finding them back

    Authors: Laurent Massoulié, Ludovic Stephan, Don Towsley

    Abstract: In this paper we study detection and reconstruction of planted structures in Erdős-Rényi random graphs. Motivated by a problem of communication security, we focus on planted structures that consist in a tree graph. For planted line graphs, we establish the following phase diagram. In a low density region where the average degree $λ$ of the initial graph is below some critical value $λ_c=1$, detect… ▽ More

    Submitted 25 June, 2019; v1 submitted 5 November, 2018; originally announced November 2018.

  6. arXiv:1711.10079  [pdf, other

    cs.NI cs.CR cs.IT math.PR

    Towards Provably Invisible Network Flow Fingerprints

    Authors: Ramin Soltani, Dennis Goeckel, Don Towsley, Amir Houmansadr

    Abstract: Network traffic analysis reveals important information even when messages are encrypted. We consider active traffic analysis via flow fingerprinting by invisibly embedding information into packet timings of flows. In particular, assume Alice wishes to embed fingerprints into flows of a set of network input links, whose packet timings are modeled by Poisson processes, without being detected by a wa… ▽ More

    Submitted 22 September, 2018; v1 submitted 27 November, 2017; originally announced November 2017.

  7. arXiv:1604.02097  [pdf, other

    cs.PF math.PR

    On the Duration and Intensity of Competitions in Nonlinear Pólya Urn Processes with Fitness

    Authors: Bo Jiang, Daniel R. Figueiredo, Bruno Ribeiro, Don Towsley

    Abstract: Cumulative advantage (CA) refers to the notion that accumulated resources foster the accumulation of further resources in competitions, a phenomenon that has been empirically observed in various contexts. The oldest and arguably simplest mathematical model that embodies this general principle is the Pólya urn process, which finds applications in a myriad of problems. The original model captures th… ▽ More

    Submitted 7 April, 2017; v1 submitted 5 April, 2016; originally announced April 2016.

  8. arXiv:1405.4882  [pdf, other

    math.PR

    Nonstandard regular variation of in-degree and out-degree in the preferential attachment model

    Authors: Gennady Samorodnitsky, Sidney Resnick, Don Towsley, Richard Davis, Amy Willis, Phyllis Wan

    Abstract: For the directed edge preferential attachment network growth model studied by Bollobas et al. (2003) and Krapivsky and Redner (2001), we prove that the joint distribution of in-degree and out-degree has jointly regularly varying tails. Typically the marginal tails of the in-degree distribution and the out-degree distribution have different regular variation indices and so the joint regular variati… ▽ More

    Submitted 19 May, 2014; originally announced May 2014.

    MSC Class: 60F99; 60K35; 05C20

  9. arXiv:1209.0736  [pdf, other

    math.ST cs.IT cs.SI

    On Set Size Distribution Estimation and the Characterization of Large Networks via Sampling

    Authors: Fabricio Murai, Bruno Ribeiro, Don Towsley, Pinghui Wang

    Abstract: In this work we study the set size distribution estimation problem, where elements are randomly sampled from a collection of non-overlapping sets and we seek to recover the original set size distribution from the samples. This problem has applications to capacity planning, network theory, among other areas. Examples of real-world applications include characterizing in-degree distributions in large… ▽ More

    Submitted 2 December, 2012; v1 submitted 4 September, 2012; originally announced September 2012.

    Report number: Technical Report UM-CS-2012-023v2