Thesis: Ph. D., Massachusetts Institute of Technology, Department of Aeronautics and Astronautics, 2018.Cataloged from PDF version of thesis. "There are no tables included in this thesis. Please disregard the list of tables"--Disclaimer Notice page.Includes bibliographical references (pages 193-197).Stochastic models have been dominant in network optimization theory for over two decades, due to their analytical tractability. However, an increasing number of real-world networked systems exhibit complex behaviors that cannot be captured by the simple stochastic models, such as networks under malicious attacks and networks with uncontrollable nodes. In this thesis, we study efficient network control policies that can optimize network performan...
Abstract-In this paper, we investigate the impact of hacker attacks by malicious nodes on the overal...
Thesis (Ph.D.)--Boston UniversityNetwork interdiction problems consist of games between an attacker ...
Malware attacks constitute a serious security risk that threatens our ever-expanding wireless networ...
The effectiveness of many well-known network control algorithms (e.g., MaxWeight) relies on the prem...
Stochastic models have been dominant in network optimization theory for over two decades, due to the...
Stochastic models have been dominant in network optimization theory for over two decades, due tothei...
With the rapid development of information technology, modern network systems are becoming increasing...
The effectiveness of many optimal network control algorithms (e.g., BackPressure) relies on the prem...
In this paper we consider the MAX-WEIGHT protocol for routing and scheduling in wireless networks un...
This thesis focuses on designing efficient mechanisms for controlling information spread in networks...
Abstract—We study stability and delay in dynamic networks under adversarial conditions. Adversarial ...
We study stability and delay in dynamic networks under adversarial conditions. Adversarial condition...
labs.com In this paper we consider the Max-Weight protocol for routing and scheduling in wireless ne...
We study throughput utility maximization in a multi-user network with partially observable Markovian...
This paper considers maximizing throughput utility in a multi-user network with partially observable...
Abstract-In this paper, we investigate the impact of hacker attacks by malicious nodes on the overal...
Thesis (Ph.D.)--Boston UniversityNetwork interdiction problems consist of games between an attacker ...
Malware attacks constitute a serious security risk that threatens our ever-expanding wireless networ...
The effectiveness of many well-known network control algorithms (e.g., MaxWeight) relies on the prem...
Stochastic models have been dominant in network optimization theory for over two decades, due to the...
Stochastic models have been dominant in network optimization theory for over two decades, due tothei...
With the rapid development of information technology, modern network systems are becoming increasing...
The effectiveness of many optimal network control algorithms (e.g., BackPressure) relies on the prem...
In this paper we consider the MAX-WEIGHT protocol for routing and scheduling in wireless networks un...
This thesis focuses on designing efficient mechanisms for controlling information spread in networks...
Abstract—We study stability and delay in dynamic networks under adversarial conditions. Adversarial ...
We study stability and delay in dynamic networks under adversarial conditions. Adversarial condition...
labs.com In this paper we consider the Max-Weight protocol for routing and scheduling in wireless ne...
We study throughput utility maximization in a multi-user network with partially observable Markovian...
This paper considers maximizing throughput utility in a multi-user network with partially observable...
Abstract-In this paper, we investigate the impact of hacker attacks by malicious nodes on the overal...
Thesis (Ph.D.)--Boston UniversityNetwork interdiction problems consist of games between an attacker ...
Malware attacks constitute a serious security risk that threatens our ever-expanding wireless networ...