Maxwell Young

Maxwell Young
Are you Maxwell Young?

Claim your profile, edit publications, add additional information:

Contact Details

Name
Maxwell Young
Affiliation
Location

Pubs By Year

Pub Categories

 
Computer Science - Data Structures and Algorithms (4)
 
Computer Science - Distributed; Parallel; and Cluster Computing (4)
 
Physics - Physics and Society (2)
 
Physics - Data Analysis; Statistics and Probability (2)
 
Computer Science - Networking and Internet Architecture (2)
 
Physics - Disordered Systems and Neural Networks (2)
 
Physics - Other (1)
 
Mathematics - Information Theory (1)
 
Computer Science - Information Theory (1)

Publications Authored By Maxwell Young

Alice and Bob want to run a protocol over a noisy channel, where a certain number of bits are flipped adversarially. Several results take a protocol requiring $L$ bits of noise-free communication and make it robust over such a channel. In a recent breakthrough result, Haeupler described an algorithm that sends a number of bits that is conjectured to be near optimal in such a model. Read More

Randomized exponential backoff is a widely deployed technique for coordinating access to a shared resource. A good backoff protocol should, arguably, satisfy three natural properties: (i) it should provide constant throughput, wasting as little time as possible; (ii) it should require few failed access attempts, minimizing the amount of wasted effort; and (iii) it should be robust, continuing to work efficiently even if some of the access attempts fail for spurious reasons. Unfortunately, exponential backoff has some well-known limitations in two of these areas: it provides poor (sub-constant) throughput (in the worst case), and is not robust (to resource acquisition failures). Read More

Consider the general scenario where Alice wishes to transmit a message m to Bob. These two players share a communication channel; however, there exists an adversary, Carol, who aims to prevent the transmission of m by blocking this channel. There are costs to send, receive or block m on the channel, and we ask: How much do Alice and Bob need to spend relative to the adversary Carol in order to guarantee transmission of m? We show that in a time-slotted network with constant costs to send, receive and block m in a slot, if Carol spends a total of B slots trying to block m, then both Alice and Bob must be active for only O(B^{\varphi - 1} + 1)=O(B^{. Read More

Consider a time-slotted, single-hop, wireless sensor network (WSN) consisting of n correct devices and and t=f*n Byzantine devices where f>=0 is any constant; that is, the Byzantine devices may outnumber the correct ones. There exists a trusted sender Alice who wishes to deliver a message m over a single channel to the correct devices. There also exists a malicious user Carol who controls the t Byzantine devices and uses them to disrupt the communication channel. Read More

he segment minimization problem consists of finding the smallest set of integer matrices that sum to a given intensity matrix, such that each summand has only one non-zero value, and the non-zeroes in each row are consecutive. This has direct applications in intensity-modulated radiation therapy, an effective form of cancer treatment. We develop three approximation algorithms for matrices with arbitrarily many rows. Read More

We address the problem of minimizing power consumption when performing reliable broadcast on a radio network under the following popular model. Each node in the network is located on a point in a two dimensional grid, and whenever a node sends a message, all awake nodes within distance r receive the message. In the broadcast problem, some node wants to successfully send a message to all other nodes in the network even when up to a 1/2 fraction of the nodes within every neighborhood can be deleted by an adversary. Read More

In the spirit of Richardson's original (1948) study of the statistics of deadly conflicts, we study the frequency and severity of terrorist attacks worldwide since 1968. We show that these events are uniformly characterized by the phenomenon of scale invariance, i.e. Read More

Traditional analyses of international terrorism have not sought to explain the emergence of rare but extremely severe events. Using the tools of extremal statistics to analyze the set of terrorist attacks worldwide between 1968 and 2004, as compiled by the National Memorial Institute for the Prevention of Terrorism (MIPT), we find that the relationship between the frequency and severity of terrorist attacks exhibits the ``scale-free'' property with an exponent of close to two. This property is robust, even when we restrict our analysis to events from a single type of weapon or events within major industrialized nations. Read More

We present a simple stochastic agent-based community finding algorithm. Our algorithm is tested on network data from the Zachary karate club study, data from Victor Hugo's "Les Miserables", and data obtained from a musical piece by J.S. Read More

In this paper we study the resilience of peer-to-peer networks to preferential attacks. We define a network model and experiment with three di erent simple repairing algorithms, out of which the so called 2nd neighbor rewiring algorithm is found to be e ective and plausible for keeping a large connected component in the network, in spite of the continuous attacks. While our motivation comes from peer-to-peer file sharing networks, we believe that our results are more general and applicable in a wide range of networks. Read More