Show simple item record

dc.contributor.authorLiang, Qingkai
dc.contributor.authorModiano, Eytan H
dc.date.accessioned2020-07-23T11:22:19Z
dc.date.available2020-07-23T11:22:19Z
dc.date.issued2018-03
dc.identifier.issn2476-1249
dc.identifier.urihttps://hdl.handle.net/1721.1/126332
dc.description.abstractStochastic models have been dominant in network optimization theory for over two decades, due totheir analytical tractability. However, these models fail to capture non-stationary or even adversarialnetwork dynamics which are of increasing importance for modeling the behavior of networksunder malicious attacks or characterizing short-term transient behavior. In this paper, we focuson minimizing queue length regret under adversarial network models, which measures the finite-time queue length difference between a causal policy and an “oracle” that knows the future. Twoadversarial network models are developed to characterize the adversary’s behavior. We provide lowerbounds on queue length regret under these adversary models and analyze the performance of twocontrol policies (i.e., the MaxWeight policy and the Tracking Algorithm). We further characterizethe stability region under adversarial network models, and show that both the MaxWeight policyand the Tracking Algorithm are throughput-optimal even in adversarial settings.en_US
dc.description.sponsorshipNational Science Foundation (U.S.) (Grant CNS-1524317)en_US
dc.description.sponsorshipUnited States. Defense Advanced Research Projects Agency. Information Innovation Office (Contract HROO l l-l 5-C-0097)en_US
dc.language.isoen
dc.publisherAssociation for Computing Machinery (ACM)en_US
dc.relation.isversionof10.1145/3179414en_US
dc.rightsCreative Commons Attribution-Noncommercial-Share Alikeen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/4.0/en_US
dc.sourceMIT web domainen_US
dc.titleMinimizing Queue Length Regret Under Adversarial Network Modelsen_US
dc.typeArticleen_US
dc.identifier.citationLiang, Qingkai and Eytan Modiano. “Minimizing Queue Length Regret Under Adversarial Network Models.” Proceedings of the ACM on measurement and analysis of computing systems, vol. 2, no. 1, 2018, Article 11 © 2018 The Author(s)en_US
dc.contributor.departmentMassachusetts Institute of Technology. Laboratory for Information and Decision Systemsen_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Aeronautics and Astronauticsen_US
dc.relation.journalProceedings of the ACM on measurement and analysis of computing systemsen_US
dc.eprint.versionAuthor's final manuscripten_US
dc.type.urihttp://purl.org/eprint/type/JournalArticleen_US
eprint.statushttp://purl.org/eprint/status/PeerRevieweden_US
dc.date.updated2019-10-30T14:57:56Z
dspace.date.submission2019-10-30T14:58:00Z
mit.journal.volume2en_US
mit.journal.issue1en_US
mit.metadata.statusComplete


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record