Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Javad Ghaderi is active.

Publication


Featured researches published by Javad Ghaderi.


conference on decision and control | 2010

On the design of efficient CSMA algorithms for wireless networks

Javad Ghaderi; R. Srikant

Recently, it has been shown that CSMA algorithms which use queue length-based link weights can achieve throughput optimality in wireless networks. In particular, a key result by Rajagopalan, Shah, and Shin (2009) shows that, if the link weights are chosen to be of the form log log(q) (where q is the queue-length), then throughput optimality is achieved. In this paper, we tighten their result by showing that throughput optimality is preserved even with weight functions of the form log(q)/g(q), where g(q) can be a function that increases arbitrarily slowly. The significance of the result is due to the fact that weight functions of the form log(q)/g(q) seem to achieve the best delay performance in practice.


IEEE Transactions on Information Theory | 2009

Hierarchical Cooperation in Ad Hoc Networks: Optimal Clustering and Achievable Throughput

Javad Ghaderi; Liang-Liang Xie; Xuemin Shen

For a wireless network with n nodes distributed in an area A, and with n source-destination pairs communicating with each other at some common rate, the hierarchical cooperation scheme proposed in (Ozgur, Leveque, and Tse, 2007) is analyzed and optimized by choosing the number of hierarchical stages and the corresponding cluster sizes that maximize the total throughput. It turns out that increasing the number of stages does not necessarily improve the throughput, and the closed-form solutions for the optimization problem can be explicitly obtained. Based on the expression of the maximum achievable throughput, it is found that the hierarchical scheme achieves a scaling with the exponent depending on n . In addition, to apply the hierarchical cooperation scheme to random networks, a clustering algorithm is developed, which divides the whole network into quadrilateral clusters, each with exactly the number of nodes required.


international conference on computer communications | 2012

Effect of access probabilities on the delay performance of Q-CSMA algorithms

Javad Ghaderi; R. Srikant

It has been recently shown that queue-based CSMA algorithms can be throughput optimal. In these algorithms, each link of the wireless network has two parameters: a transmission probability and an access probability. The transmission probability of each link is chosen as an appropriate function of its queue-length, however, the access probabilities are simply regarded as some random numbers since they do not play any role in establishing the network stability. In this paper, we show that the access probabilities control the mixing time of the CSMA Markov chain and, as a result, affect the delay performance of the CSMA. In particular, we derive formulas that relate the mixing time to access probabilities and use these to develop the following guideline for choosing access probabilities: each link i should choose its access probability equal to 1/(di + 1), where di is the number of links which interfere with link i. Simulation results show that this choice of access probabilities results in good delay performance.


international conference on computer communications | 2010

Towards a Theory of Anonymous Networking

Javad Ghaderi; R. Srikant

The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination nodes, and paths of information flow in the network. One way to achieve such an anonymity is to use mixers. Mixers are nodes that receive packets from multiple sources and change the timing of packets, by mixing packets at the output links, to prevent the eavesdropper from finding sources of outgoing packets. In this paper, we consider two simple but fundamental scenarios: double input-single output mixer and double input-double output mixer. For the first case, we use the information-theoretic definition of the anonymity, based on average entropy per packet, and find an optimal mixing strategy under a strict latency constraint. For the second case, perfect anonymity is considered, and a maximal throughput strategy with perfect anonymity is found that minimizes the average delay.


Queueing Systems | 2015

Serving content with unknown demand: the high-dimensional regime

Sharayu Moharir; Javad Ghaderi; Sujay Sanghavi; Sanjay Shakkottai

In this paper, we look at content placement in the high-dimensional regime: there are


measurement and modeling of computer systems | 2014

Asymptotic optimality of BestFit for stochastic bin packing

Javad Ghaderi; Yuan Zhong; R. Srikant


IEEE Transactions on Automatic Control | 2014

Flow-Level Stability of Wireless Networks: Separation of Congestion Control and Scheduling

Javad Ghaderi; Tianxiong Ji; R. Srikant

n


international conference on computer communications | 2012

Connection-level scheduling in wireless networks using only MAC-layer information

Javad Ghaderi; Tianxiong Ji; R. Srikant


IEEE ACM Transactions on Networking | 2013

The impact of access probabilities on the delay performance of Q-CSMA algorithms in wireless networks

Javad Ghaderi; R. Srikant

n servers, and


international conference on communications | 2008

Throughput Optimization for Hierarchical Cooperation in Ad Hoc Networks

Javad Ghaderi; Liang-Liang Xie; Xuemin Shen

Collaboration


Dive into the Javad Ghaderi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sanjay Shakkottai

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sujay Sanghavi

University of Texas at Austin

View shared research outputs
Researchain Logo
Decentralizing Knowledge