Javad Ghaderi
Columbia University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Javad Ghaderi.
conference on decision and control | 2010
Javad Ghaderi; R. Srikant
Recently, it has been shown that CSMA algorithms which use queue length-based link weights can achieve throughput optimality in wireless networks. In particular, a key result by Rajagopalan, Shah, and Shin (2009) shows that, if the link weights are chosen to be of the form log log(q) (where q is the queue-length), then throughput optimality is achieved. In this paper, we tighten their result by showing that throughput optimality is preserved even with weight functions of the form log(q)/g(q), where g(q) can be a function that increases arbitrarily slowly. The significance of the result is due to the fact that weight functions of the form log(q)/g(q) seem to achieve the best delay performance in practice.
IEEE Transactions on Information Theory | 2009
Javad Ghaderi; Liang-Liang Xie; Xuemin Shen
For a wireless network with n nodes distributed in an area A, and with n source-destination pairs communicating with each other at some common rate, the hierarchical cooperation scheme proposed in (Ozgur, Leveque, and Tse, 2007) is analyzed and optimized by choosing the number of hierarchical stages and the corresponding cluster sizes that maximize the total throughput. It turns out that increasing the number of stages does not necessarily improve the throughput, and the closed-form solutions for the optimization problem can be explicitly obtained. Based on the expression of the maximum achievable throughput, it is found that the hierarchical scheme achieves a scaling with the exponent depending on n . In addition, to apply the hierarchical cooperation scheme to random networks, a clustering algorithm is developed, which divides the whole network into quadrilateral clusters, each with exactly the number of nodes required.
international conference on computer communications | 2012
Javad Ghaderi; R. Srikant
It has been recently shown that queue-based CSMA algorithms can be throughput optimal. In these algorithms, each link of the wireless network has two parameters: a transmission probability and an access probability. The transmission probability of each link is chosen as an appropriate function of its queue-length, however, the access probabilities are simply regarded as some random numbers since they do not play any role in establishing the network stability. In this paper, we show that the access probabilities control the mixing time of the CSMA Markov chain and, as a result, affect the delay performance of the CSMA. In particular, we derive formulas that relate the mixing time to access probabilities and use these to develop the following guideline for choosing access probabilities: each link i should choose its access probability equal to 1/(di + 1), where di is the number of links which interfere with link i. Simulation results show that this choice of access probabilities results in good delay performance.
international conference on computer communications | 2010
Javad Ghaderi; R. Srikant
The problem of anonymous networking when an eavesdropper observes packet timings in a communication network is considered. The goal is to hide the identities of source-destination nodes, and paths of information flow in the network. One way to achieve such an anonymity is to use mixers. Mixers are nodes that receive packets from multiple sources and change the timing of packets, by mixing packets at the output links, to prevent the eavesdropper from finding sources of outgoing packets. In this paper, we consider two simple but fundamental scenarios: double input-single output mixer and double input-double output mixer. For the first case, we use the information-theoretic definition of the anonymity, based on average entropy per packet, and find an optimal mixing strategy under a strict latency constraint. For the second case, perfect anonymity is considered, and a maximal throughput strategy with perfect anonymity is found that minimizes the average delay.
Queueing Systems | 2015
Sharayu Moharir; Javad Ghaderi; Sujay Sanghavi; Sanjay Shakkottai
In this paper, we look at content placement in the high-dimensional regime: there are
measurement and modeling of computer systems | 2014
Javad Ghaderi; Yuan Zhong; R. Srikant
IEEE Transactions on Automatic Control | 2014
Javad Ghaderi; Tianxiong Ji; R. Srikant
n
international conference on computer communications | 2012
Javad Ghaderi; Tianxiong Ji; R. Srikant
IEEE ACM Transactions on Networking | 2013
Javad Ghaderi; R. Srikant
n servers, and
international conference on communications | 2008
Javad Ghaderi; Liang-Liang Xie; Xuemin Shen