
Stability Analysis of a Quantum Network with MaxWeight Scheduling
We study a quantum network that distributes entangled quantum states to ...
read it

Robust Adversarial Attacks Against DNNBased Wireless Communication Systems
Deep Neural Networks (DNNs) have become prevalent in wireless communicat...
read it

Bosonic Random Walk Networks for Graph Learning
The development of Graph Neural Networks (GNNs) has led to great progres...
read it

Additive Link Metrics Identification: Proof of Selected Lemmas and Propositions
This is a technical report, containing all the lemma and proposition pro...
read it

Identification of Additive Link Metrics: Proof of Selected Theorems
This is a technical report, containing all the theorem proofs in the fol...
read it

Efficient Identification of Additive Link Metrics: Theorem Proof and Evaluations
This is a technical report, containing all the theorem proofs and additi...
read it

Partial Network Identifiability: Theorem Proof and Evaluation
This is a technical report, containing all the theorem proofs and additi...
read it

Link Identifiability with Two Monitors: Proof of Selected Theorems
This is a technical report, containing all the theorem proofs in paper "...
read it

Fundamental Theories in Node Failure Localization
This is a technical report, containing all the theorem proofs in paper "...
read it

Failure Localization Capability: Theorem Proof and Evaluation
This is a technical report, containing all the theorem proofs and additi...
read it

Node Failure Localization: Theorem Proof
This is a technical report, containing all the theorem proofs in paper "...
read it

Matching through Embedding in Dense Graphs
Finding optimal matchings in dense graphs is of general interest and of ...
read it

Filtered Manifold Alignment
Domain adaptation is an essential task in transfer learning to leverage ...
read it

Resource Allocation in Onedimensional Distributed Service Networks with Applications
We consider assignment policies that allocate resources to users, where ...
read it

On the Analysis of Spatially Constrained Power of Two Choice Policies
We consider a class of power of two choice based assignment policies for...
read it

Proximity Based Load Balancing Policies on Graphs: A Simulation Study
Distributed load balancing is the act of allocating jobs among a set of ...
read it

Practical Traffic Analysis Attacks on Secure Messaging Applications
Instant Messaging (IM) applications like Telegram, Signal, and WhatsApp ...
read it

Network Anomaly Detection based on Tensor Decomposition
The problem of detecting anomalies in time series from network measureme...
read it

Covert Cycle Stealing in a Single FIFO Server
Consider a setting where Willie generates a Poisson stream of jobs and r...
read it

Decentralized gradient methods: does topology matter?
Consensusbased distributed optimization methods have recently been advo...
read it

On the Performance Analysis of Epidemic Routing in NonSparse Delay Tolerant Networks
We study the behavior of epidemic routing in a delay tolerant network as...
read it

Covert Communication in ContinuousTime Systems
Recent works have considered the ability of transmitter Alice to communi...
read it

Resource Sharing in the Edge: A Distributed BargainingTheoretic Approach
The growing demand for edge computing resources, particularly due to inc...
read it

Let's Share: A GameTheoretic Framework for Resource Sharing in Mobile Edge Clouds
Mobile edge computing seeks to provide resources to different delaysens...
read it

Quickest Detection of Growing Dynamic Anomalies in Networks
The problem of quickest growing dynamic anomaly detection in sensor netw...
read it

LPD Communication: A Sequential ChangePoint Detection Perspective
In this paper, we establish a framework for low probability of detection...
read it

A GameTheoretic Framework for Resource Sharing in Clouds
Providing resources to different users or applications is fundamental to...
read it

Fundamental Limits of Covert Packet Insertion
Covert communication conceals the existence of the transmission from a w...
read it

On the Stochastic Analysis of a Quantum Entanglement Switch
We study a quantum entanglement switch that serves k users in a star top...
read it

Performance Evaluation of a Quantum Entanglement Switch
We study a quantum entanglement switch that serves k users in a star top...
read it

On the Capacity Region of Bipartite and Tripartite Entanglement Switching
We study a quantum switch serving a set of users. The function of the sw...
read it

Resource Allocation in Onedimensional Distributed Service Networks
We consider assignment policies that allocate resources to users, where ...
read it

A queueingtheoretic model for resource allocation in onedimensional distributed service network
We consider assignment policies that allocate resources to requesting us...
read it

gl2vec: Learning Feature Representation Using Graphlets for Directed Networks
Learning network representations has a variety of applications, such as ...
read it

Utilizing Dynamic Properties of Sharing Bits and Registers to Estimate User Cardinalities over Time
Online monitoring user cardinalities (or degrees) in graph streams is fu...
read it

Fundamental Limits of Covert Bit Insertion in Packets
Covert communication is necessary when revealing the mere existence of a...
read it

Fundamental Limits of Invisible Flow Fingerprinting
Network flow fingerprinting can be used to deanonymize communications o...
read it

A GameTheoretic Approach to MultiObjective Resource Sharing and Allocation in Mobile Edge Clouds
Mobile edge computing seeks to provide resources to different delaysens...
read it

Quickest Detection of Dynamic Events in Networks
The problem of quickest detection of dynamic events in networks is studi...
read it

Network Classification in Temporal Networks Using Motifs
Network classification has a variety of applications, such as detecting ...
read it

The Role of Caching in Future Communication Systems and Networks
This paper has the following ambitious goal: to convince the reader that...
read it

MultiHop Routing in Covert Wireless Networks
In covert communication, Alice tries to communicate with Bob without bei...
read it

Towards Stability Analysis of Data Transport Mechanisms: a Fluid Model and an Application
The Transmission Control Protocol (TCP) utilizes congestion avoidance an...
read it

Joint Data Compression and Caching: Approaching Optimality with Guarantees
We consider the problem of optimally compressing and caching data across...
read it

Network Cache Design under Stationary Requests: Exact Analysis and Poisson Approximation
The design of caching algorithms to maximize hit probability has been ex...
read it

Network Cache Design under Stationary Requests: Challenges, Algorithms and Experiments
The design of caching algorithms to maximize hit probability has been ex...
read it

Optimal Energy Consumption with Communication, Computation, Caching and QoIGuarantee
Energy efficiency is a fundamental requirement of modern data communicat...
read it

Optimal Energy Tradeoff among Communication, Computation and Caching with QoIGuarantee
Many applications must ingest and analyze data that are continuously gen...
read it

Towards Provably Invisible Network Flow Fingerprints
Network traffic analysis reveals important information even when message...
read it

Optimizing Timerbased Policies for General Cache Networks
Caching algorithms are usually described by the eviction method and anal...
read it
Don Towsley
is this you? claim profile
Distinguished Professor of Computer Science at University of Massachusetts, PhD Comptuer Science, University of Texas (1975), BA Physics, University of Texas (1971).