1,247 research outputs found
The Embedding Capacity of Information Flows Under Renewal Traffic
Given two independent point processes and a certain rule for matching points
between them, what is the fraction of matched points over infinitely long
streams? In many application contexts, e.g., secure networking, a meaningful
matching rule is that of a maximum causal delay, and the problem is related to
embedding a flow of packets in cover traffic such that no traffic analysis can
detect it. We study the best undetectable embedding policy and the
corresponding maximum flow rate ---that we call the embedding capacity--- under
the assumption that the cover traffic can be modeled as arbitrary renewal
processes. We find that computing the embedding capacity requires the inversion
of very structured linear systems that, for a broad range of renewal models
encountered in practice, admits a fully analytical expression in terms of the
renewal function of the processes. Our main theoretical contribution is a
simple closed form of such relationship. This result enables us to explore
properties of the embedding capacity, obtaining closed-form solutions for
selected distribution families and a suite of sufficient conditions on the
capacity ordering. We evaluate our solution on real network traces, which shows
a noticeable match for tight delay constraints. A gap between the predicted and
the actual embedding capacities appears for looser constraints, and further
investigation reveals that it is caused by inaccuracy of the renewal traffic
model rather than of the solution itself.Comment: Sumbitted to IEEE Trans. on Information Theory on March 10, 201
Reachability Analysis of Communicating Pushdown Systems
The reachability analysis of recursive programs that communicate
asynchronously over reliable FIFO channels calls for restrictions to ensure
decidability. Our first result characterizes communication topologies with a
decidable reachability problem restricted to eager runs (i.e., runs where
messages are either received immediately after being sent, or never received).
The problem is EXPTIME-complete in the decidable case. The second result is a
doubly exponential time algorithm for bounded context analysis in this setting,
together with a matching lower bound. Both results extend and improve previous
work from La Torre et al
The categorical limit of a sequence of dynamical systems
Modeling a sequence of design steps, or a sequence of parameter settings,
yields a sequence of dynamical systems. In many cases, such a sequence is
intended to approximate a certain limit case. However, formally defining that
limit turns out to be subject to ambiguity. Depending on the interpretation of
the sequence, i.e. depending on how the behaviors of the systems in the
sequence are related, it may vary what the limit should be. Topologies, and in
particular metrics, define limits uniquely, if they exist. Thus they select one
interpretation implicitly and leave no room for other interpretations. In this
paper, we define limits using category theory, and use the mentioned relations
between system behaviors explicitly. This resolves the problem of ambiguity in
a more controlled way. We introduce a category of prefix orders on executions
and partial history preserving maps between them to describe both discrete and
continuous branching time dynamics. We prove that in this category all
projective limits exist, and illustrate how ambiguity in the definition of
limits is resolved using an example. Moreover, we show how various problems
with known topological approaches are now resolved, and how the construction of
projective limits enables us to approximate continuous time dynamics as a
sequence of discrete time systems.Comment: In Proceedings EXPRESS/SOS 2013, arXiv:1307.690
SPoT: Representing the Social, Spatial, and Temporal Dimensions of Human Mobility with a Unifying Framework
Modeling human mobility is crucial in the analysis and simulation of opportunistic networks, where contacts are exploited as opportunities for peer-topeer message forwarding. The current approach with human mobility modeling has been based on continuously modifying models, trying to embed in them the mobility properties (e.g., visiting patterns to locations or specific distributions of inter-contact times) as they came up from trace analysis. As
a consequence, with these models it is difficult, if not impossible, to modify the features of mobility or to control the exact shape of mobility metrics (e.g., modifying the distribution of inter-contact times). For these reasons, in this paper we propose a mobility framework rather than a mobility model, with the explicit goal of providing a exible and controllable tool for modeling mathematically and generating simulatively different possible features of human mobility. Our framework, named SPoT, is able to incorporate the three dimensions - spatial, social, and temporal - of human mobility. The way SPoT does it is by mapping the different social communities of the network into different locations, whose members visit with a configurable temporal pattern. In order to characterize the temporal patterns of user visits to locations and the relative positioning of locations based on their shared users, we analyze the traces of real user movements extracted from three location-based online social networks (Gowalla, Foursquare, and Altergeo). We observe that a Bernoulli process effectively approximates user visits to locations in the majority of cases and that locations that share many common users visiting them frequently tend to be located close to each other. In addition, we use these traces to test the exibility of the framework, and we show that SPoT is able to accurately reproduce the mobility behavior observed in traces. Finally, relying on the Bernoulli assumption for arrival processes, we provide a throughout mathematical analysis of the controllability of the framework, deriving the conditions under which heavy-tailed and exponentially-tailed aggregate inter-contact times (often observed in real traces) emerge
Optimal risk in marketing resource allocation
Marketing resource allocation is increasingly based on the optimization of expected returns on investment. If the investment is implemented in a large number of repetitive and relatively independent simple decisions, it is an acceptable method, but risk must be considered otherwise. The Markowitz classical mean-deviation approach to value marketing activities is of limited use when the probability distributions of the returns are asymmetric (a common case in marketing). In this paper we consider a unifying treatment for optimal marketing resource allocation and valuation of marketing investments in risky markets where returns can be asymmetric, using coherent risk measures recently developed in finance. We propose a set of first order conditions for the solution, and present a numerical algorithm for the computation of the optimal plan. We use this approach to design optimal advertisement investments in sales response managementResource allocation, Coherent risk measures, Optimization, Sales response models
Asymptotic optimality of maximum pressure policies in stochastic processing networks
We consider a class of stochastic processing networks. Assume that the
networks satisfy a complete resource pooling condition. We prove that each
maximum pressure policy asymptotically minimizes the workload process in a
stochastic processing network in heavy traffic. We also show that, under each
quadratic holding cost structure, there is a maximum pressure policy that
asymptotically minimizes the holding cost. A key to the optimality proofs is to
prove a state space collapse result and a heavy traffic limit theorem for the
network processes under a maximum pressure policy. We extend a framework of
Bramson [Queueing Systems Theory Appl. 30 (1998) 89--148] and Williams
[Queueing Systems Theory Appl. 30 (1998b) 5--25] from the multiclass queueing
network setting to the stochastic processing network setting to prove the state
space collapse result and the heavy traffic limit theorem. The extension can be
adapted to other studies of stochastic processing networks.Comment: Published in at http://dx.doi.org/10.1214/08-AAP522 the Annals of
Applied Probability (http://www.imstat.org/aap/) by the Institute of
Mathematical Statistics (http://www.imstat.org
- …