ECE
ECE
ECE ECE

Program

Thursday, July 28, 2016


8:00–8:45am

Light Breakfast

8:45–9:00am

Opening Remarks

9:00–9:45am

pravin varaiya

Reaching a Rational Expectations Equilibrium Among a Group of Agents

Pravin Varaiya
Nortel Networks Distinguished Professor
Department of Electrical Engineering and Computer Sciences
University of California, Berkeley

  Abstract: Each agent i = 1,··· ,N seeks to estimate the expected value of a random variable X. Agent i’s estimate at time t is denoted Xi(t). This estimate is based on i’s initial private observation zi and and messages mj(τ),1 ≤ τ ≤ t −1 broadcast by agent j to the entire group. Thus Xi(t) = E{X | zi N, τ ≤ t −1}. A random variable X for all i. The existence and uniqueness of a REE depends on the structure of the broadcast messages. Borkar-Varaiya studied the situation wherein mi(τ) = Xi(τ) and when all agents have the same prior. Teneketzis-Varaiya examined the same setting but permitted different priors. In this discussion we consider other signal structures.

9:45–10:30am

rajeev agrawal

Mobile Networks Evolution from LTE to 5G: Algorithms and Architecture

Rajeev Agrawal
Head of RAN and Networks Architecture & Algorithms
Mobile Networks CTO Office
Nokia
Former doctoral student of Prof. Teneketzis

  Abstract: In this talk we will provide an overview of the recent developments in the mobile networks industry and also the upcoming opportunities and challenges with the move towards 5G. We will focus on the radio access part of the network and highlight the algorithmic and architectural solutions central to some of the key problems areas covering spectrum, site densification, and spectral efficiency improvements. Through the talk we will illustrate issues of centralization versus decentralization, (stochastic) optimization and control, learning versus optimization - key themes of Prof. Teneketzis' research.

10:30–11:00am

Break

11:00–11:45am

pr kumar

The Prices of Packets and Watts: Optimal Control of Decentralized Systems


PR Kumar
Professor and College of Engineering Chair in Computer Engineering
Dept of Electrical and Computer Engineering, Texas A&M University
  Abstract: We examine two problems of contemporary interest, both involving the optimal operation of distributed stochastic dynamic systems, one in power systems and another in communication networks.

In power systems we address the problem faced by an Independent System Operator which has to optimally utilize a mix of fossil fuel based and renewable generators, controllable and uncontrollable loads, prosumers and storage services, so as to maximize social welfare, without knowing details of any of the entities involved. We revisit general equilibrium theory, addressing the complexity raised by dynamic stochastic agents with privacy concerns. We show how optimality can be attained through stochastic prices discovered by iterative tatonnement mechanisms.

In communication networks we address the problem of how to optimally schedule multiple flows with hard end-to-end deadlines over a network of unreliable links with average power constraints so as to maximize their throughput. We exhibit an exactly optimal policy for this distributed system that employs easily determined prices to distributedly schedule link transmissions throughput the entire network.

[Joint work with Rahul Singh and Le Xie]

11:45–12:30pm

jan van schuppen

Interaction of Controllers in Decentralized Control

Jan van Schuppen
Professor
Department of Mathematics
Delft University of Technology

  Abstract: The control theoretic problem of decentralized control is to synthesize two or more controllers which together achieve control objectives of performance and of stability. Effective examples of control engineering and of communication engineering provide motivation for the research on decentralized control. Demosthenis Teneketzis and his students have substantially contributed to the theory of decentralized control partly based on the fundamental framework developed by H.S. Witsenhausen. However, the theory of decentralized control is far from complete.

In this lecture the focus is on the interactions of the controllers via the control system, for which concepts and theory are needed. Research issues include: What information should a controller communicate to which other controllers via the control system? How is this communication best carried out? How should a controller use information received from other controllers to attain the control objectives? Concepts of a system theory of decentralized control systems leading to system decompositions and based on conditional independence and on information theory, will be formulated. The theory of decentralized control can be advanced using these concepts.

The research is partly based on cooperation with Cesar Uribe.

12:30–2:00pm

Lunch (provided)

2:00–2:45pm

Backoff Algorithms for Random Access Protocols

Nah-Oak Song
Research Professor
Center for Collaborative Internet Ecosystems
Korea Advanced Institute of Science and Technology

  Abstract: Random access protocols are widely used in wireless and wired networks where centralized resource scheduling is not feasible. Random access schemes use backoff algorithms for contention resolution. In this talk, analytical results for exponential backoff (EB) algorithm are presented. EB has been extensively studied, but most available studies on EB focus on the stability and little attention has been paid to the performance of EB. We present analytical saturation throughput and medium access delay of a packet when the number of nodes N is given. The analysis considers the general case of EB with backoff factor r, and the optimal backoff factor r opt is derived. Binary exponential backoff (BEB) algorithm is a special case with backoff factor r=2. Also analyzed are truncated EB, which is a practical version of EB. The analysis technique is used to evaluate the performance of IEEE 802.11 DCF, a well known random access scheme for WLAN which uses BEB.

In the second half of the talk, we present exponential increase exponential decrease (EIED) backoff algorithm. The analytical performance of EIED is compared with BEB in the context of WLAN. The analytical and simulation results show that EIED significantly improves the performance of WLAN.

2:45–3:30pm

 

armand makowski

Intersecting Random Graphs

Armand Makowski
Professor
Department of Electrical and Computer Engineering
University of Maryland

  Abstract: Given two graphs $G_1 = (V,E_1)$ and $G_2 = (V,E_2)$ with same vertex set $V$, we define their intersection as the graph $(V,E)$ with vertex set $V$ and edge set $E = E_1 \cap E_2$. In this talk we consider the situation where each of the component graphs is itself a random graph, e.g.,a Bernoulli random graph, a geometric random graph or a random key graph. Random graphs obtained in this manner occur naturally as simple models for a number of issues in wireless networking.

We are interested in understanding how the structural properties of the component random graphs shape those of the random graph obtained by intersection. Particular attention will be given to the existence of zero-one laws for graph connectivity and for the property that there are no isolated nodes, and the form of the associated critical scalings.

3:30–4:00pm

Break

4:00–4:45pm

 

manjari asawa

Scheduling Problems in NFV

Manjari Asawa
Senior Product Manager
Hewlett Packard
Former doctoral student of Prof. Teneketzis

  Abstract: Network Functions Virtualization (NFV) is an evolving network architecture to bring advantages of virtualization to telecommunications operations. NFV will allow telecommunication operators to replace special purpose networking equipment with commodity servers running virtualized network functions (VNFs). Shifting dedicated, hardware-based network function processing to software running on commoditized hardware has the potential to enable flexible and cost-effective provisioning of network functions. This does come with additional complexity and presents new operational and management challenges. This talk will provide an overview of ETSI NFV architecture and the effective placement and scheduling issues in the context of virtual IP Multimedia Service (vIMS) use case. We will also discuss some of the work being done by open-source organizations, industry and academia as well as the complexity and need of an end-to-end framework for efficient scheduling of VNFs onto physical infrastructure while meeting end-to-end use experience requirements.

4:45–5:30pm

david castanon

Dynamic Stochastic Network Interdiction Games

David Castañón
Professor and Chair
Department of Electrical and Computer Engineering
Boston University

  Abstract: Network interdiction problems consist of zero-sum games between an attacker and an intelligent network, where the attacker seeks to degrade network operations while the network adapts its operations to counteract the effects of the attacker. This problem has received significant attention in recent years due to its relevance to network security in different contexts. When the attacker’s actions achieve uncertain effects, the resulting problems become stochastic network interdiction problems. In this talk, we discuss recent results in network interdiction problems when attacks occur over a sequence of times. In particular, we discuss network interdiction games when there is an asymmetry of information concerning the network state between the attacker and the defender, and present algorithms for the solution of the resulting dynamic stochastic games.

6:30pm

Dinner at the Gandy Dancer (401 Depot Street, Ann Arbor)

Directions (Google Maps)   (Map and Written Directions)


Friday, July 29, 2016


8:00–9:00am

Light Breakfast

9:00–9:45am

mark andersland

Service-State Based Scheduling

Mark Andersland
Professor
Department of Electrical and Computer Engineering
University of Iowa
Former doctoral student of Prof. Teneketzis

  Abstract: The scheduling of competing task flows' unit-sized requests for service from a shared, slotted-time, constant capacity server is a standard abstraction of many resource allocation problems.  In deterministic settings, the typical aim is to schedule service to maintain per-flow, worst-case guarantees.  In this talk we outline how, when the guarantees are viewed as states that evolve as tasks arrive and are served, the scheduling problem can be reduced to that of scheduling service so as to maintain, slot by slot, the collective service state in an acceptable set. Additionally we characterize, slot by slot, the schedules capable of maintaining the collective service state in this set.  This perspective exposes, in a setting rich enough to include both H-FSC and time-varying SCED scheduling, tradeoffs among all policies capable of maintaining a particular set of guarantees.

(This is based on joint work with Yike Xu)

9:45–10:30am

tamar basar

Strategic Information Transmission

Tamer Başar
Professor, Swanlund Endowed Chair
Department of Electrical and Computer Engineering
University of Illinois, Urbana Champaign

  Abstract: Strategic information transmission refers to a variation (and a substantial one) of the standard paradigm of information transmission in communication (design of an encoder and a decoder in unison to minimize some distortion measure), where now the encoder and the decoder have (intentionally) misaligned objectives. This leads to a non- cooperative game with a dynamic (non-classical) information structure, where one can adopt as a solution concept either the Nash or the Stackelberg equilibrium. This talk will introduce this class of problems, which have been of interest to multiple communities, including economics, information theory, communication, signal processing, and control, since the early 1980s, having picked up considerable steam very recently. As an overview of the topic, both old and new results will be presented, with one of the highlights (and perhaps a surprising element) being that there appears to be a major difference between the structures of the encoders and the decoders under Nash and Stackelberg equilibria, even when the channel is Gaussian and the (misaligned) distortion measures are quadratic.

(Joint work with Emrah Akyol and Cedric Langbort)

10:30–11:00am

Break

11:00–11:45am

 

john baras

Multi-Agent Collaborative Decision Making: Constrained Event Algebras, New Logics and Their Game Theoretic Semantics

John Baras
Professor
Department of Electrical and Computer Engineering
University of Maryland

  Abstract: We briefly review various instances of non-commutative probability models from quantum mechanics, directed information, nonlinear control systems, Web-based inference, multi-agent systems, collective human cognition and decision making from psychology. We then investigate how the probability models in these areas could be constructed from observational data following a "Kolmogorov-like" construction. We develop an axiomatic method for such a construction that reveals some new foundational principles including: multiple non-collocated observers, existence of incompatible events, notions of information sharing, directed information, probabilities on constrained event algebras. We next describe independence-friendly logic (IF Logic) and its multi-agent game theory semantics. We close with our recent work on an approach for unifying these various non-commutative probability models and their utilization.

11:45–12:30pm

 

Venkat Anantharam

A Relative Entropy Characterization of the Growth Rate of Reward in Risk-Sensitive Control

Venkat Anantharam
Professor
Department of Electrical Engineering and Computer Sciences
University of California, Berkeley

 

We study the infinite horizon risk-sensitive control problem for discrete time Markov decision processes with compact metric state and action spaces. We derive a variational formula for the optimal growth rate of risk­sensitive reward. This parallels the usual variational formulation of the long term average reward in the absence of risk­sensitivity given by the ergodic control viewpoint, with an additional relative entropy penalty on occupation measures. It can also be viewed as an extension of the characterization of Donsker and Varadhan for the Perron­Frobenius eigenvalue of a positive operator. The problem of determining this optimal growth rate of risk­sensitive reward is thereby presented as a problem of maximizing a concave function over a convex set.

(Joint work with Vivek Borkar, IIT Bombay)

12:30–2:00pm

Lunch (provided)

2:00–2:45pm

 

dimitris pandelis

Optimal Server Allocation in Tandem Systems

Dimitris Pandelis
Associate Professor
Department of Mechanical Engineering
University of Thessaly
Former doctoral student of Prof. Teneketzis

  Abstract: We consider two-stage tandem systems (both clearing systems and with Poisson arrivals) with one dedicated server in each station and one flexible server that can serve both stations. We assume exponential service times and linear holding costs for jobs present in the system. We study the optimal dynamic assignment of servers to jobs in the class of preemptive and non-preemptive policies.

Preemptive policies. We assume that two servers can collaborate to work on the same job with a total service rate that is less than the sum of their individual service rates (partial collaboration). For larger holding costs in the first station we show that (i) non-idling policies are optimal and (ii) identify conditions under which the optimal allocation strategy for the flexible server has a threshold-type structure and a cμ-type rule is optimal. For larger holding costs in the second station we characterize the optimal policy for a large number of jobs downstream. Finally, we show by examples that the optimal policy may have counterintuitive properties, which is not the case when full collaboration is assumed.

Non-preemptive policies. We assume that collaboration is not allowed and that the flexible server is slower than each of the dedicated servers (a two-stage version of the slow server problem). We show that the dedicated server in station 2 should always work and the same is true for the dedicated server upstream for larger holding costs there. As for the optimal allocation of the slow server we conjecture that it is characterized by two thresholds. When the slow server is constrained to work in one station, numerical experiments suggest that the optimal policy is closely related to that of the classical slow server problem.

2:45–3:30pm

Manju Hegde

When we Should Trust Self-Driving Cars

Manju Hegde
CEO
Uhnder Inc.
Former doctoral student of Prof. Teneketzis

  Abstract: The automotive industry, one of the workhorse segments of the world’s economy, is undergoing a sea change as the automotive industry embraces Advanced Driver Assisted Systems (ADAS) and Self-Driving Cars. Safety and robustness are the hallmarks of automotive engineering and in order to meet this criteria for ADAS and self-driving car, multiple sensor systems are being utilized in cars gathering data about the car’s environment at a prodigious rate. This data from the sensors must be fused at multiple levels in order to prevent confounding of the decisions and to be conformant with the requirements of automobile OEMs. In addition, once the fused data is understood, inferences must be made about the actions of the other “drivers” and concomitant actions in order to ensure safe driving.

In this talk we talk about these trends in the automotive industry and pose problems that need to be resolved for this self-driving paradigm to emerge and be accepted as a mainstream "driving" experience.

3:30–4:15pm

stephane lafortune

101 Definitions of Diagnosability or Lack Thereof

Stéphane Lafortune
Professor
Electrical Engineering and Computer Science
University of Michigan

  Abstract: We will review the work of Sampath et al. on diagnosis of discrete event systems, focusing on the definition of diagnosability and of its many variants that have appeared in the literature over the last 20 years. Then we will describe the property of opacity, which is receiving considerable attention lately in security and privacy research. Opacity is almost, but not quite, the negation of diagnosability.

4:15–4:30pm

Closing