23 results on '"Georgiadis, A."'
Search Results
2. On the Computational Aspect of Coded Caching With Uncoded Prefetching
- Author
-
Michos, Sotirios K., primary, Diamantoulakis, Panagiotis D., additional, Georgiadis, Leonidas, additional, and Karagiannidis, George K., additional
- Published
- 2023
- Full Text
- View/download PDF
3. Optimal overload response in sensor networks
- Author
-
Georgiadis, Leonidas and Tassiulas, Leandros
- Subjects
Distributed processing (Computers) ,Company business management ,Lexicography -- Analysis ,Communications traffic -- Management ,Distributed processing (Computers) -- Analysis - Abstract
A single commodity network that models the information flow in an arbitrary topology sensor field that collects and forwards information to a backbone through certain designated gateway nodes is considered. Resilient operation in overload stress situations caused by unpredictable traffic or topology variations is investigated. That amounts to studying the network in instability mode, where the traffic load distribution is outside the throughput region. A fluid model is adopted where superflows model traffic forwarding and backlog formations at the network level. Quantitative performance metrics of the overload including throughput, lexicographic minimization, most balanced allocation, and amount of lost traffic due to buffer overflow are considered to capture the information loss process due to overflow in the network. Optimal superflows with respect to these metrics are characterized and a distributed asynchronous algorithm that computes such superflows is given. The characterization of the optimal superflow amounts to obtaining a structural decomposition of the network in a sequence of disjoint subregions with decreasing overload such that traffic flows only from regions of higher overload to regions of lower overload. The optimal superflow represents the smoothest trajectory to overflow, followed by the network in case of instability. Index Terms--Distributed algorithms, lexicographic optimization, lost traffic minimization, most balanced allocation, network control, overload response, sensor networks, throughput maximization.
- Published
- 2006
4. Multicast tree structure and the power law
- Author
-
Adjih, Cedric, Georgiadis, Leonidas, Jacquet, Philippe, and Szpankowski, Wojciech
- Subjects
Algorithm ,Multicasting ,Algorithms -- Analysis - Abstract
In this paper, we investigate structural properties of multicast trees that give rise to the so-called multicast power law. The law asserts that the ratio R(n) of the average number of links in a multicast tree connecting the source to n destinations to the average number of links in a unicast path, satisfies asymptotically R(n) [approximately equal to] [cn.sup[[phi] < [phi] < 1. In order to obtain a better insight, we first analyze some simple multicast tree topologies, which under appropriately chosen parameters give rise to the multicast power law. The asymptotic analysis of R(n) in this case indicates that it is very difficult to infer the validity of power law by observing graphs of R(n) alone. Next we introduce a new metric, "reachability degree," which is easy to measure and applicable to general networks where multicast trees are constructed as subtrees of a given spanning tree which we call Global Multicast Tree. The reachability degree is indicative of the structure of the Global Multicast Tree. We show that this metric provides a more reliable means for inferring the validity of the power law. Finally, we perform experiments on real and simulated networks to demonstrate the use of the new metric. Index Terms--Analysis of algorithms, asymptotic analysis, internet topologies, multicasting, power law.
- Published
- 2006
5. Exploiting wireless channel state information for throughput maximization
- Author
-
Tsibonis, Vagelis, Georgiadis, Leonidas, and Tassiulas, Leandros
- Subjects
Information theory - Abstract
We consider the problem of scheduling packets over channels with time-varying quality. This problem has received a lot of attention lately in the context of devising methods for providing quality of service in wireless communications. Earlier work dealing with this problem considered two cases. One case is that the arrival rate vector is in the throughput region and then policies that stabilize the system are pursued. The other case is that all packet queues are saturated and then policies that optimize an objective function of the channel throughputs are investigated. In this paper, we address the case where no assumption on the arrival rates is made. We obtain a scheduling policy that maximizes the weighted sum of channel throughputs. Under the optimal policy, in the general case, the system may operate in a regime where some queues are stable, while the other become saturated. If stability for the whole system is at all possible, it is always achieved. The optimal policy is a combination of a criterion that gives priorities based on queue lengths and a strict priority rule. The scheduling mechanism switches between the two criteria based on thresholds on the queue lengths and is modulated by the availability of the channels. The analysis of the operation of the system involves the study of a vector process which in steady state has some of its components stable while others are unstable. We adopt a novel model for time-varying channel availability that dispenses with the statistical assumptions and makes a rigorous description of system dynamics possible. Index Terms--Burstiness-constrained models, channel-aware scheduling, packet arrival dynamics, stability, throughput maximization, varying channel conditions, wireless packet networks.
- Published
- 2004
6. Optimal multiplexing on a single link: delay and buffer requirements
- Author
-
Georgiadis, Leonidas, Guerin, Roch, and Parekh, Abhay
- Subjects
Multiplexing -- Analysis ,Communications traffic -- Analysis - Abstract
This paper is motivated by the need to provide per-session quality of service guarantees in fast packet-switched networks. We address the problem of characterizing and designing scheduling policies that are optimal in the sense of minimizing buffer and/or delay requirements under the assumption of commonly accepted traffic constraints. We investigate buffer requirements under three typical memory allocation mechanisms which represent tradeoffs between efficiency and complexity. For traffic with delay constraints we provide policies that are optimal in the sense of satisfying the constraints if they are satisfiable by any policy. We also investigate the tradeoff between delay and buffer optimality, and design policies that are "good" (optimal or close to) for both. Finally, we extend our results to the case of "soft" delay constraints and address the issue of designing policies that satisfy such constraints in a fair manner. Given our focus on packet switching, we mainly concern ourselves with nonpreemptive policies, but one class of nonpreemptive policies which we consider is based on tracking preemptive policies. This class is introduced in this paper and may be of interest in other applications as well. Index Terms - Buffer allocation, data networks, multiplexing, optimization, schedulable regions, scheduling.
- Published
- 1997
7. Stability analysis of quota allocation access protocols in ring networks with spatial reuse
- Author
-
Georgiadis, Leonidas, Szpankowski, Wojciech, and Tassiulas, Leandros
- Subjects
Ring networks -- Evaluation ,Computer network protocols -- Evaluation ,Data communications -- Research - Abstract
We consider a slotted ring that allows simultaneous transmissions of messages by different nodes, known as ring with spatial reuse. To alleviate fairness problems that arise in such networks, policies have been proposed that operate in cycles and guarantee that a certain number of packets, not exceeding a given number called a quota, will be transmitted by every node in every cycle. In this paper, we provide sufficient and necessary stability conditions that implicitly characterize the stability region for such rings. These conditions are derived by extending a technique developed for some networks of queues satisfying a monotonicity property. Our approach to instability is novel and its peculiar property is that it is derived from the instability of a dominant system. Interestingly, the stability region depends on the entire distribution of the message arrival process and the steady-state average cycle lengths of lower dimensional systems, leading to a region with nonlinear boundaries, the exact computation of which is in general intractable. Next, we introduce the notions of essential and absolute stability region. An arrival rate vector belongs to the former region if the system is stable under any arrival distribution with this arrival vector, while it belongs to the latter if there exists some distribution with this rate vector for which the system is stable. Using a linear programming approach, we derive bounds for these stability regions that depend only on conditional average cycle lengths. For the case of two nodes, we provide closed-form expressions for the essential stability region. Index Terms - Essential and absolute stability regions, linear programming, Loynes scheme, mathematical induction, quota policy, ring networks with spatial reuse, stability analysis.
- Published
- 1997
8. Multiuser Broadcast Erasure Channel With Feedback—Capacity and Algorithms
- Author
-
Leandros Tassiulas, Leonidas Georgiadis, Marios Gatzianas, Department of Electrical and Computer Engineering, Aristotle University of Thessaloniki, Centre for Research and Technology Hellas (CERTH), Department of Computer and Communications Engineering [Volos], University of Thessaly [Volos] (UTH), European Project: 215252,EC:FP7:ICT,FP7-ICT-2007-1,N-CRAVE(2008), Inria Sophia Antipolis-Méditerranée / I3s, Service Ist, and Network Coding for Robust Architectures in Volatile Environments - N-CRAVE - - EC:FP7:ICT2008-01-01 - 2010-12-31 - 215252 - VALID
- Subjects
FOS: Computer and information sciences ,Discrete Mathematics (cs.DM) ,Computer science ,Computer Science - Information Theory ,capacity achieving algorithms ,02 engineering and technology ,Library and Information Sciences ,01 natural sciences ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Mixing (mathematics) ,0103 physical sciences ,Computer Science::Networking and Internet Architecture ,0202 electrical engineering, electronic engineering, information engineering ,Computer Science::Information Theory ,010302 applied physics ,Channel code ,[INFO.INFO-NI] Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Network packet ,Information Theory (cs.IT) ,Transmitter ,020206 networking & telecommunications ,Binary erasure channel ,Computer Science Applications ,feedback-based coding ,Broadcast erasure channels ,Unicast ,Algorithm ,Computer Science - Discrete Mathematics ,Information Systems - Abstract
We consider the $N$-user broadcast erasure channel with $N$ unicast sessions (one for each user) where receiver feedback is regularly sent to the transmitter in the form of ACK/NACK messages. We first provide a generic outer bound to the capacity of this system; we then propose a virtual-queue-based inter-session mixing coding algorithm, determine its rate region and show that it achieves capacity under certain conditions on channel statistics, assuming that instantaneous feedback is known to all users. Removing this assumption results in a rate region that asymptotically differs from the outer bound by 1 bit as $L\to \infty$, where $L$ is the number of bits per packet (packet length). For the case of arbitrary channel statistics, we present a modification of the previous algorithm whose rate region is identical to the outer bound for N=3, when instant feedback is known to all users, and differs from the bound by 1 bit as $L\to \infty$, when the 3 users know only their own ACK. The proposed algorithms do not require any prior knowledge of channel statistics., Comment: 54 pages, 3 figures, 3 tables, submitted to IEEE Transactions on Information Theory. Updated version to match reviewer comments
- Published
- 2013
- Full Text
- View/download PDF
9. Capacity and Stable Throughput Regions for the Broadcast Erasure Channel With Feedback: An Unusual Union
- Author
-
Leonidas Georgiadis, A. Ephremides, Yalin E. Sagduyu, and Leandros Tassiulas
- Subjects
Computer science ,business.industry ,Node (networking) ,Library and Information Sciences ,Broadcasting ,Binary erasure channel ,Stability (probability) ,Computer Science Applications ,Linear network coding ,Broadcast communication network ,Overhead (computing) ,business ,Computer Science::Information Theory ,Information Systems ,Communication channel ,Computer network - Abstract
We consider a source node broadcasting to two receivers over a general erasure channel with receiver feedback. We characterize the capacity region of the channel and construct algorithms based on linear network coding (either randomized or depending on channel dynamics) that achieve this capacity. We then consider stochastic arrivals at the source for the two destinations and characterize the stable throughput region achieved by adapting the same algorithms that achieve capacity. Next, we modify these algorithms to improve their delay performance and characterize their stable throughput regions. Although the capacity and stability regions obtained by the algorithms are not always identical (because of the extra overhead needed for the algorithms to handle stochastic traffic), they are within a few bits of each other and have similar forms. This example exhibits an unusual relationship between capacity and stability regions and extends similar prior studies for multiple access channels.
- Published
- 2013
- Full Text
- View/download PDF
10. Quickest Search Over Multiple Sequences
- Author
-
H.V. Poor, G. Georgiadis, Yan Xin, and Lifeng Lai
- Subjects
Independent and identically distributed random variables ,Sequence ,business.industry ,Bayesian probability ,CUSUM ,Pattern recognition ,Library and Information Sciences ,Computer Science Applications ,Probability distribution ,Optimal stopping ,Artificial intelligence ,business ,Random variable ,Algorithm ,Information Systems ,Mathematics ,Event (probability theory) - Abstract
The problem of sequentially finding an independent and identically distributed sequence that is drawn from a probability distribution Q1 by searching over multiple sequences, some of which are drawn from Q1 and the others of which are drawn from a different distribution Q0, is considered. In the problem considered, the number of sequences with distribution Q1 is assumed to be a random variable whose value is unknown. Within a Bayesian formulation, a sequential decision rule is derived that optimizes a trade-off between the probability of false alarm and the number of samples needed for the decision. In the case in which one can observe one sequence at a time, it is shown that the cumulative sum (CUSUM) test, which is well-known to be optimal for a non-Bayesian statistical change-point detection formulation, is optimal for the problem under study. Specifically, the CUSUM test is run on the first sequence. If a reset event occurs in the CUSUM test, then the sequence under examination is abandoned and the rule switches to the next sequence. If the CUSUM test stops, then the rule declares that the sequence under examination when the test stops is generated by Q1 . The result is derived by assuming that there are infinitely many sequences so that a sequence that has been examined once is not retested. If there are finitely many sequences, the result is also valid under a memorylessness condition. Expressions for the performance of the optimal sequential decision rule are also developed. The general case in which multiple sequences can be examined simultaneously is considered. The optimal solution for this general scenario is derived.
- Published
- 2011
- Full Text
- View/download PDF
11. Optimal overload response in sensor networks
- Author
-
Leandros Tassiulas and Leonidas Georgiadis
- Subjects
business.industry ,Computer science ,Distributed computing ,Throughput ,Library and Information Sciences ,Computer Science Applications ,Distributed algorithm ,Default gateway ,Computer Science::Networking and Internet Architecture ,Resource allocation ,business ,Wireless sensor network ,Information Systems ,Computer network ,Buffer overflow - Abstract
A single commodity network that models the information flow in an arbitrary topology sensor field that collects and forwards information to a backbone through certain designated gateway nodes is considered. Resilient operation in overload stress situations caused by unpredictable traffic or topology variations is investigated. That amounts to studying the network in instability mode, where the traffic load distribution is outside the throughput region. A fluid model is adopted where superflows model traffic forwarding and backlog formations at the network level. Quantitative performance metrics of the overload including throughput, lexicographic minimization, most balanced allocation, and amount of lost traffic due to buffer overflow are considered to capture the information loss process due to overflow in the network. Optimal superflows with respect to these metrics are characterized and a distributed asynchronous algorithm that computes such superflows is given. The characterization of the optimal superflow amounts to obtaining a structural decomposition of the network in a sequence of disjoint subregions with decreasing overload such that traffic flows only from regions of higher overload to regions of lower overload. The optimal superflow represents the smoothest trajectory to overflow, followed by the network in case of instability.
- Published
- 2006
- Full Text
- View/download PDF
12. Broadcast Erasure Channel with Feedback and Message Side Information, and Related Index Coding Results
- Author
-
Papadopoulos, Athanasios, primary and Georgiadis, Leonidas, additional
- Published
- 2017
- Full Text
- View/download PDF
13. Stability analysis of quota allocation access protocols in ring networks with spatial reuse
- Author
-
Wojciech Szpankowski, Leandros Tassiulas, and Leonidas Georgiadis
- Subjects
Mathematical optimization ,Queueing theory ,Linear programming ,Computer Sciences ,Stochastic process ,Library and Information Sciences ,Network topology ,Stability (probability) ,Computer Science Applications ,Stability conditions ,Node (circuits) ,Multidimensional systems ,Information Systems ,Mathematics - Abstract
We consider a slotted ring that allows simultaneous transmissions of messages by different nodes, known as ring with spatial reuse. To alleviate fairness problems that arise in such networks, policies have been proposed that operate in cycles and guarantee that a certain number of packets, not exceeding a given number called a quota, will be transmitted by every node in every cycle. We provide sufficient and necessary stability conditions that implicitly characterize the stability region for such rings. These conditions are derived by extending a technique developed for some networks of queues satisfying a monotonicity property. Our approach to instability is novel and its peculiar property is that it is derived from the instability of a dominant system. Interestingly, the stability region depends on the entire distribution of the message arrival process and the steady-state average cycle lengths of lower dimensional systems, leading to a region with nonlinear boundaries, the exact computation of which is in general intractable. Next, we introduce the notions of essential and absolute stability region. An arrival rate vector belongs to the former region if the system is stable under any arrival distribution with this arrival vector, while it belongs to the latter if there exists some distribution with this rate vector for which the system is stable. Using a linear programming approach, we derive bounds for these stability regions that depend only on conditional average cycle lengths. For the case of two nodes, we provide closed-form expressions for the essential stability region.
- Published
- 1997
- Full Text
- View/download PDF
14. Broadcast Erasure Channel with Feedback and Message Side Information, and Related Index Coding Results
- Author
-
Leonidas Georgiadis and Athanasios Papadopoulos
- Subjects
Computer science ,business.industry ,Transmitter ,020206 networking & telecommunications ,020302 automobile design & engineering ,02 engineering and technology ,Library and Information Sciences ,Topology ,Binary erasure channel ,Binary symmetric channel ,Computer Science Applications ,Broadcast control channel ,Spread spectrum ,Channel capacity ,Receiver ,0203 mechanical engineering ,Linear network coding ,0202 electrical engineering, electronic engineering, information engineering ,business ,Computer Science::Information Theory ,Information Systems ,Computer network ,Communication channel - Abstract
We consider the $N$ -receiver broadcast erasure channel with feedback and message side information at the receivers prior to beginning of transmission. Specifically, the transmitter must deliver different, independent messages to each of the receivers, and each receiver knows a function of these messages before transmission begins. This situation can arise in multi-hop wireless networks, where a receiver may overhear transmissions consisting of possibly encoded combinations of messages (e.g., encoded using a network coding technique) prior to beginning of transmission over a given broadcast channel. We provide an outer bound to the capacity region of this system. For the case, where each message consists of a number of symbols taking values in a finite field and each receiver knows linear combinations of these symbols, the outer bound is given in terms of ranks of matrices expressing the linear combinations. For the latter case and when $N=2$ , the outer bound is tight under mild conditions on the limiting behavior of the ranks of matrices expressing the side information. We provide a capacity achieving code for this case. The special case, where each receiver either knows the entire message of another receiver or has no information about it, constitutes a generalization of the index coding problem that incorporates channel erasures. For this instance, and when there are no channel errors, we show that the outer bound reduces to the known maximum weighted acyclic induced subgraph bound.
- Published
- 2017
- Full Text
- View/download PDF
15. Multiuser Broadcast Erasure Channel With Feedback—Capacity and Algorithms
- Author
-
Gatzianas, Marios, primary, Georgiadis, Leonidas, additional, and Tassiulas, Leandros, additional
- Published
- 2013
- Full Text
- View/download PDF
16. Capacity and Stable Throughput Regions for the Broadcast Erasure Channel With Feedback: An Unusual Union
- Author
-
Sagduyu, Yalin Evren, primary, Georgiadis, Leonidas, additional, Tassiulas, Leandros, additional, and Ephremides, Anthony, additional
- Published
- 2013
- Full Text
- View/download PDF
17. Quickest Search Over Multiple Sequences
- Author
-
Lai, Lifeng, primary, Poor, H. Vincent, additional, Xin, Yan, additional, and Georgiadis, Georgios, additional
- Published
- 2011
- Full Text
- View/download PDF
18. A 0.487 throughput limited sensing algorithm.
- Author
-
Georgiadis, L. and Papantoni-Kazakos, P.
- Published
- 1987
- Full Text
- View/download PDF
19. Limited feedback sensing algorithms for the packet broadcast channel.
- Author
-
Georgiadis, L. and Papantoni-Kazakos, P.
- Published
- 1985
- Full Text
- View/download PDF
20. A 0.487 throughput limited sensing algorithm
- Author
-
Leonidas Georgiadis and P. Papantoni-Kazakos
- Subjects
Computer science ,Network packet ,Stability (learning theory) ,Throughput ,Library and Information Sciences ,Collision ,Computer Science Applications ,Transmission (telecommunications) ,Computer Science::Networking and Internet Architecture ,Algorithm ,Throughput (business) ,Information Systems ,Data transmission ,Communication channel - Abstract
We consider Poisson packet traffic accessing a single-slotted channel. We assume the existence of a ternary feedback per channel slot. We also adopt the limited feedback sensing model where each user senses the feedback only while he has a packet to transmit. For this model we develop a collision resolution algorithm with last come-first served characteristics. The algorithm attains the same throughput as Gallager's algorithm without the latter's full feedback sensing requirement. In addition, it is easy to implement, requires reasonable memory storage, induces uniformly good transmission delays, and is insensitive to feedback errors. In the presence of binary (collision versus noncollision) feedback the algorithm may attain a throughput of 0.4493 .
- Published
- 1987
- Full Text
- View/download PDF
21. Limited feedback sensing algorithms for the packet broadcast channel
- Author
-
Leonidas Georgiadis and P. Papantoni-Kazakos
- Subjects
education.field_of_study ,Network packet ,Computer science ,Population ,Stability (learning theory) ,Throughput ,Library and Information Sciences ,Collision ,Computer Science Applications ,Broadcasting (networking) ,Packet switching ,Computer Science::Networking and Internet Architecture ,education ,Throughput (business) ,Algorithm ,Information Systems - Abstract
A slotted packet broadcast channel with an infinite user population is considered. A limited feedback sensing algorithm is proposed and analyzed for collision versus noncollision binary feedback. The algorithm bas maximum throughput equal to 0.42 (packets/slot), has uniformly good delay characteristics within its stability region, and is robust in the presence of feedback errors. A variation of the algorithm, for ternary feedback, attains maximum throughput 0.425 and bas uniformly good delay characteristics within its stability region. In contrast, the highest throughput limited feedback sensing algorithm existing for ternary feedback attains maximum throughput 0.456 , but induces relatively high delays for Poisson intensities below 0.3 .
- Published
- 1985
- Full Text
- View/download PDF
22. A collision resolution protocol utilizing energy detectors (M.S. Thesis abstr.)
- Author
-
L. Georgiadis
- Subjects
Computer science ,business.industry ,Detector ,Resolution (electron density) ,Library and Information Sciences ,Collision ,Computer Science Applications ,Packet switching ,Electronic engineering ,business ,Protocol (object-oriented programming) ,Energy (signal processing) ,Information Systems ,Computer network - Published
- 1982
- Full Text
- View/download PDF
23. A collision resolution protocol utilizing energy detectors (M.S. Thesis abstr.).
- Author
-
Georgiadis, L.
- Published
- 1982
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.