Caching systems have long been crucial for improving the performance of a wide variety of network and web based online applications. In such systems, end-to-end application performance heavily depends on the fraction of objects transfered from the cache, also known as the cache hit probability. Many cache eviction policies have been proposed...
-
2022 (v1)Journal articleUploaded on: December 3, 2022
-
August 26, 2020 (v1)Conference paper
Consensus-based distributed optimization methods have recently been advocated as alternatives to parameter server and ring all-reduce paradigms for large scale training of machine learning models. In this case, each worker maintains a local estimate of the optimal parameter vector and iteratively updates it by averaging the estimates obtained...
Uploaded on: December 4, 2022 -
August 2022 (v1)Journal article
We study a quantum switch that distributes tripartite entangled states to sets of users. The entanglement switching process requires two steps: first, each user attempts to generate bipartite entanglement between itself and the switch; and second, the switch performs local operations and a measurement to create multipartite entanglement for a...
Uploaded on: December 3, 2022 -
June 2020 (v1)Journal article
We study a quantum switch that distributes maximally entangled multipartite states to sets of users. e entanglement switching process requires two steps: rst, each user a empts to generate bipartite entanglement between itself and the switch; and second, the switch performs local operations and a measurement to create multipartite entanglement...
Uploaded on: December 4, 2022 -
March 5, 2021 (v1)Journal article
We study a quantum switch serving a set of users in a star topology. The function of the switch is to create bipartite or tripartite entangled state among users at the highest possible rates at a fixed ratio. We model a set of randomized switching policies. Discovering that some are better than others, we present analytical results for the case...
Uploaded on: March 25, 2023 -
April 29, 2019 (v1)Conference paper
Many learning problems are formulated as minimization of some loss function on a training set of examples. Distributed gradient methods on a cluster are often used for this purpose. In this paper, we study how the variability of task execution times at cluster nodes affects the system throughput. In particular, a simple but accurate model...
Uploaded on: December 4, 2022 -
October 9, 2012 (v1)Conference paper
Many researchers have been working on the performance analysis of caching in Information-Centric Networks (ICNs) under various replacement policies like Least Recently Used (LRU), FIFO or Random (RND). However, no exact results are provided, and many approximate models do not scale even for the simple network of two caches connected in tandem....
Uploaded on: December 2, 2022 -
November 2021 (v1)Journal article
Botnets such as Mirai use insecure home devices to conduct distributed denial of service attacks on the Internet infrastructure. Although some of those attacks involve large amounts of traffic, they are generated from a large number of homes, which hampers their early detection. In this paper, our goal is to answer the following question: what...
Uploaded on: December 4, 2022 -
April 2014 (v1)Report
In this paper, we propose approximate models to assess the performance of a cache network with arbitrary topology where nodes run the Least Recently Used (LRU), First-In First-Out (FIFO), or Random (RND) replacement policies on arbitrary size caches. Our model takes advantage of the notions of cache characteristic time and Time-To-Live...
Uploaded on: December 3, 2022 -
April 2014 (v1)Report
In this paper, we propose approximate models to assess the performance of a cache network with arbitrary topology where nodes run the Least Recently Used (LRU), First-In First-Out (FIFO), or Random (RND) replacement policies on arbitrary size caches. Our model takes advantage of the notions of cache characteristic time and Time-To-Live...
Uploaded on: October 11, 2023 -
October 28, 2024 (v1)Conference paper
This paper investigates the damage that an adversary can effect while remaining covert in the presence of the Cumulative Sum (CuSum) procedure. An adversary is covert if the time to detection is on the same order as the time to false alarm. Damage is given as an increasing function of the KL-divergence of the adversarial actions and the normal...
Uploaded on: October 22, 2024