David Starobinski

Boston University, Boston, Massachusetts, United States

Are you David Starobinski?

Claim your profile

Publications (114)68.47 Total impact

  • Eran Simhon · David Starobinski ·

    ACM SIGMETRICS Performance Evaluation Review 11/2015; 43(3):82-82. DOI:10.1145/2847220.2847248
  • Niloofar Fazlollahi · David Starobinski ·
    [Show abstract] [Hide abstract]
    ABSTRACT: We explore and demonstrate the feasibility of implementing distributed solutions for advance reservation of network resources. We introduce a new distributed, distance-vector algorithm, called Distributed Advance Reservation (DAR), that provably returns the earliest time possible for setting up a connection between any two nodes. Our main findings are the following: (i) we prove that widest path routing and path switching (i.e, allowing a connection to switch between different paths) are necessary to guarantee earliest scheduling; (ii) we propose and analyze a novel approach for loop-free distributed widest path routing, leveraging the recently proposed DIV framework. Our routing results directly extend to on-demand and inter-domain QoS routing problems.
    Theory of Computing Systems 11/2015; DOI:10.1007/s00224-015-9665-x · 0.53 Impact Factor
  • Wei Si · David Starobinski · Moshe Laifenfeld ·
    [Show abstract] [Hide abstract]
    ABSTRACT: With the emergence of connected and autonomous vehicles, sensors are increasingly deployed within cars to support new functionalities. Traffic generated by these sensors congest traditional intra-car networks, such as CAN buses. Furthermore, the large amount of wires needed to connect sensors makes it harder to design cars in a modular way. To alleviate these limitations, we propose, simulate, and implement a hybrid wired/wireless architecture, in which each node is connected to either a wired interface or a wireless interface or both. Specifically, we propose a new protocol, called Hybrid-Backpressure Collection Protocol (Hybrid-BCP), to efficiently collect data from sensors in intra-car networks. Hybrid-BCP is backward-compatible with the CAN bus technology, and builds on the BCP protocol, designed for wireless sensor networks. Hybrid-BCP achieves high throughput and shows resilience to dynamic network conditions, including adversarial interferences. Our testbed implementation, based on CAN and ZigBee transceivers, demonstrates the load balancing and routing functionalities of Hybrid-BCP and its resilience to DoS attacks. We further provide simulation results, obtained with the ns-3 simulator and based on real intra-car RSSI traces, that compare between the performance of Hybrid-BCP and a tree-based collection protocol. Notably, the simulations show that Hybrid-BCP can achieve the same performance as the tree-based protocol while reducing the radio transmission power by a factor of 10.
  • Y. Hayel · E. Simhon · D. Starobinski · Q. Zhu ·
    [Show abstract] [Hide abstract]
    ABSTRACT: Device-to-Device (D2D) communication that enables nearby mobiles to directly communicate one with another is a new paradigm aimed at increasing the capacity of next-generation wireless networks. The coexistence of D2D and cellular communication in the same spectrum poses new challenges for resource allocations and interference management in a large-scale wireless system where each mobile strategically selects its mode of communications. This paper formulates a game-theoretic framework to capture the distributed strategic behavior of a large population of mobiles in selecting their mode of communications. In particular, we investigate the impact of Queue State Information (QSI) of the base station (BS) on the mobile decisions, and we show that the common knowledge of QSI can induce bad quality of service for standard cellular traffic, when the capacity of the base station is below a certain threshold. This paradox will be used to guide the design of optimal learning and scheduling algorithms for the coexisting D2D communication networks.
  • Source
    Wei Si · David Starobinski · Morteza Hashemi · Moshe Laifenfeld · Ari Trachtenberg ·

    IEEE Transactions on Control of Network Systems 01/2015; DOI:10.1109/TCNS.2015.2428453
  • Source
    Morteza Hashemi · Wei Si · Moshe Laifenfeld · David Starobinski · Ari Trachtenberg ·
    [Show abstract] [Hide abstract]
    ABSTRACT: Modern vehicles incorporate dozens of sensors to provide vital sensor data to electronic control units, typically through physical wires, which increase the weight, maintenance, and cost of cars. Wireless sensor networks have been contemplated for replacing the current physical wires with wireless links, although existing networks are all single-hop, presumably because cars are small enough to be covered by lowpower communication, and multihop networking requires organizational overhead. In contradiction with previous works, we experimentally investigate the use of multihop wireless communication to support intra-car sensor networking. Extensive tests, run under various vehicular environments, indicate the potential for significant reliability, robustness, and energy usage improvements over existing single-hop approaches. Our implementation is based on the Collection Tree Protocol, a state-of-the-art multihop data collection protocol.
    IEEE Communications Magazine 12/2014; 52(12):183-191. DOI:10.1109/MCOM.2014.6979972 · 4.01 Impact Factor
  • Emir Kavurmacioglu · Murat Alanyali · David Starobinski ·
    [Show abstract] [Hide abstract]
    ABSTRACT: We introduce a private commons model that consists of network providers who serve a fixed primary demand and strategically price to improve their revenues from an additional secondary demand. For general forms of secondary demand, we establish the existence and uniqueness of two characteristic prices: the break-even price and the market sharing price. We show that the market sharing price is always greater than the break-even price, leading to a price interval in which a provider is both profitable and willing to share the demand. Making use of this result, we give insight into the nature of market outcomes.
    ACM Transactions on Internet Technology 10/2014; 14(2-3):1-30. DOI:10.1145/2663495 · 0.77 Impact Factor
  • Cankut Orakcal · David Starobinski ·
    [Show abstract] [Hide abstract]
    ABSTRACT: We introduce a theoretical framework to formally analyze the vulnerability of IEEE 802.11 rate adaptation algorithms (RAAs) to selective jamming attacks, and to develop countermeasures providing provable performance guarantees. Thus, we propose a new metric called Rate of Jamming (RoJRoJ), wherein a low RoJRoJ implies that an RAA is highly vulnerable to jamming attacks, while a high RoJRoJ implies that the RAA is resilient. We prove that several state-of-the-art RAAs, such as ARF and SampleRate, have a low RoJRoJ (i.e., 10%10% or lower). Next, we propose a robust RAA, called Randomized ARF (RARF). Using tools from renewal theory, we derive a closed-form lower bound on the RoJRoJ of RARF. We validate our theoretical analysis using ns-3 simulations and show that the minimum jamming rate required against RARF is about 33%33% (i.e., at least three times higher than the RoJRoJ of other RAAs).
    Performance Evaluation 05/2014; 75. DOI:10.1016/j.peva.2014.02.002 · 1.25 Impact Factor
  • Emir Kavurmacioglu · Murat Alanyali · David Starobinski ·
    [Show abstract] [Hide abstract]
    ABSTRACT: We introduce an economic model for private commons that consists of network providers serving a fixed primary demand and making strategic pricing decisions to improve their revenues by providing service to a secondary demand. For general forms of secondary demand, we establish the existence and uniqueness of two critical prices for each provider: the break-even price and the market sharing price. The prior determines service profitability while the latter determines a provider's willingness to share the market. We further show that the market sharing price is always greater than the break-even price, leading to a price interval in which a provider is both profitable and willing to share the market. Making use of these results, we shed insight into the nature of market outcomes (Nash equilibria) when two providers compete to attract secondary demand: (i) if the market sharing intervals of the two providers overlap, then the providers end up sharing the market; (ii) else, the provider with the lower break-even price captures the entire market as the result of a price war.
    ACM SIGMETRICS Performance Evaluation Review 04/2014; 41(4):16-19. DOI:10.1145/2627534.2627539
  • Eran Simhon · David Starobinski ·
    [Show abstract] [Hide abstract]
    ABSTRACT: In many services, such as cloud computing, customers have the option to make reservations in advance. However, little is known about the strategic behavior of customers in such systems. In this paper, we use game theory to analyze several models of time-slotted systems in which customers can choose whether or not making an advance reservation of server resources in future time slots. Since neither the provider nor the customers know in advance how many customers will request service in a given slot, the models are analyzed using Poisson games, with decisions made based on statistical information. The games differ in their payment mechanisms, and the main objective is to find which mechanism yields the highest average profit for the provider. Our analysis shows that the highest profit is achieved when advance reservation fees are charged only from customers that are granted service. Furthermore, informing customers about the availability of free servers prior to their decisions do not affect the provider's profit in that case.
    2014 48th Annual Conference on Information Sciences and Systems (CISS); 03/2014
  • Sinem Kockan · David Starobinski ·
    [Show abstract] [Hide abstract]
    ABSTRACT: New regulations grant network service providers with the right to lease their spectrum to short-term leased secondary users (SUs) for opportunistic usage. In this work, we tackle the challenge of determining admission control and pricing policies on SUs that guarantee profitability under general secondary demand and general traffic models, and accurately reflect the operation of modern cellular data networks in which resources are shared rather than rigidly partitioned. We first analyze the joint problem of bandwidth allocation and admission control of elastic secondary users. We assume Poisson session arrivals, where each session is composed of arbitrarily distributed, and possibly correlated, on and off periods. Under balanced bandwidth allocation, we show that the steady state distribution of the number of active users in the network is insensitive to traffic characteristics beyond their means. This result holds for arbitrary occupancy-based admission control policies on SUs. Next, we prove that the optimal occupancy-based admission control policy is of threshold type, which means that secondary user arrivals are accepted when the total number of active users in the network is below a certain threshold; otherwise, they are rejected. Finally, we identify a price,referred to as the break-even price, and an admission control policy which, together, ensure profitability for any price greater than the break-even price, irrespective of the shape of the secondary demand function.
    7th International Conference on Performance Evaluation Methodologies and Tools; 01/2014
  • Wei Si · David Starobinski ·
    [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we study the delay performance of backpressure routing algorithms using LIFO schedulers (LIFO-backpressure). We uncover a surprising behavior in which, under certain channel conditions, the average delay of packets decreases as the traffic load in the network increases. We propose and analyze a queueing-theoretic model under which the scheduler can transmit packets only if the queue length (i.e., the number of packets in the queue) meets or exceeds a threshold, and we show that the model analytically bears out the observed phenomenon. Using matrix geometric methods, we derive a numerical solution for the average packet delay in the general case, and, using z-transform techniques, we further provide closed-form solutions for the average delay in special cases. Our analysis indicates that when the threshold is fixed (as may happen under lossless channel conditions), the average delay increases with increasing traffic load, as expected. On the other hand, when the threshold fluctuates (as may happen under changing, lossy channel conditions), the average delay may decrease, sometimes substantially, with the traffic load. We corroborate these findings with TOSSIM simulations using real channel traces and run on different types of networks.
    2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton); 10/2013
  • Source
    Morteza Hashemi · Wei Si · Moshe Laifenfeld · David Starobinski · Ari Trachtenberg ·
    [Show abstract] [Hide abstract]
    ABSTRACT: We experimentally investigate the benefits of multihop networking for intra-car data aggregation under the current state-of-the-art Collection Tree Protocol (CTP). We show how this protocol actively adjusts collection routes according to channel dynamics in various practical car environments, resulting in performance gains over single-hop aggregation. Throughout our experiments, we target traditional performance metrics such as delivery rate, number of transmissions per packet, and delay, and our results confirm, both qualitatively and quantitatively, that multi-hop communication can provide a reliable and robust approach for data collection within a car.
    Vehicular Technology Conference (VTC Spring), 2013 IEEE 77th; 06/2013
  • Avi Klausner · Ari Trachtenberg · David Starobinski · Mark Horenstein ·
    [Show abstract] [Hide abstract]
    ABSTRACT: Few technical details are available about the various sensors embedded in modern smartphones, and what details are available can be hard to assemble and interpret by the broader technical community that uses these devices. Since the physical and electromagnetic aspects of the sensors' operation can significantly affect the analysis and use of their data, it is essential for those who rely on these data to understand these details. As such, the authors provide a simplified and yet technically precise explanation of some of the sensors found on the Motorola Droid, which are representative of sensors found in most smartphones. The authors specifically explain its proximity sensor, Hall effect magnetometer, capacitive accelerometer, orientation sensor, and light sensor. Each sensor is described using illustrations and experiments that are provided to demonstrate some unexpected behaviors.
    04/2013; 4(2):69-80. DOI:10.4018/jhcr.2013040105
  • Ashraf Al Daoud · Murat Alanyali · David Starobinski ·
    [Show abstract] [Hide abstract]
    ABSTRACT: Ongoing regulatory reforms have led to several novel spectrum sharing models under the general umbrella of dynamic spectrum sharing. The private commons model introduced by FCC in 2004 allows spectrum licensees to provide secondary access to spectrum on an opportunistic basis while retaining ownership. Since wireless communication systems are typically overprovisioned in order to deliver service-level guarantees to (primary) users under short-term load variations, this model bears significant potential by facilitating utilization of temporal and spatial surplus of capacity through serving secondary users at possibly different service levels. A potential barrier to adoption of the private commons model is the uncertainty about secondary price–demand relationship which is difficult to predict in an emerging market: A selected price for secondary access may be profitable for some values of secondary demand but not for others, leading to a profound uncertainty about ultimate benefit of spectrum sharing. This paper aims to eliminate such an uncertainty by devising concrete guidelines and methods for profitability. The paper establishes that the price of secondary spectrum access can be chosen to guarantee profitability for any value of secondary demand: It is shown that for both the coordinated and uncoordinated commons regimes a profitable price should exceed a threshold value, which can be calculated. Hence profitability of private commons is insensitive to the demand function. This observation has two complementary interpretations: From a business perspective it provides a constructive approach to profitability; and from a regulatory perspective it provides reassurance that private commons is a healthy model. The paper also leverages the insensitivity property and outlines a technique to further enhance revenue via iterative spectrum offerings.
    Telecommunications Policy 03/2013; 37(s 2–3):231–240. DOI:10.1016/j.telpol.2012.06.011 · 1.41 Impact Factor
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Several collection protocols have been developed to achieve efficient gathering of data in Wireless Sensor Networks (WSN) including intra-car WSN. Though there exist WSN tools capable of controlling, monitoring, and displaying sensor data, there is still a need for a general benchmarking tool capable of visualizing, evaluating, and comparing the network layer performance of these protocols. In an effort to fill this gap, we present TeaCP, a prototype Toolkit for the evaluation and analysis of Collection Protocols in both simulation and experimental environments. Through simulation of an intra-car WSN and real lab experiments, we demonstrate the functionality of TeaCP for comparing the performance of two prominent collection protocols, the Collection Tree Protocol (CTP) and the Backpressure Collection Protocol (BCP).
    COMCAS; 01/2013
  • Huseyin Mutlu · Murat Alanyali · David Starobinski · Aylin Turhan ·
    [Show abstract] [Hide abstract]
    ABSTRACT: We consider a wireless provider who caters to two classes of customers, namely primary users (PUs) and secondary users (SUs). PUs have long term contracts while SUs are admitted and priced according to current availability of excess spectrum. The average rate at which SUs attempt to access the spectrum is a function on the currently advertised price, referred to as the demand function. We analyze the problem of maximizing the average profit gained by admissions of SUs, when the demand function is unknown. We introduce a new on-line algorithm, called Measurement-based Threshold Pricing (MTP), that requires the optimization of only two parameters, a price and a threshold, whereby SU calls are admitted and charged a fixed price when the channel occupancy is lower than the threshold and rejected otherwise. At each iteration, MTP measures the average arrival rate of SUs corresponding to a certain test price. We prove that these measurements of the secondary demand are sufficient for MTP to converge to a local optimal price and corresponding optimal threshold, within a number of measurements that is logarithmic in the total number of possible prices. We further provide an adaptive version of MTP that adjusts to time-varying demand and establish its convergence properties. We conduct numerical studies showing the convergence of MTP to near-optimal online profit and its superior performance over a traditional reinforcement learning approach.
    IEEE Journal on Selected Areas in Communications 12/2012; 30(11):2285-2294. DOI:10.1109/JSAC.2012.121220 · 3.45 Impact Factor
  • Aylin Turhan · Murat Alanyali · David Starobinski ·
    [Show abstract] [Hide abstract]
    ABSTRACT: We study optimal admission control in a two-class preemptive loss system. A class-1 customer arrival aborts service of a class-2 customer if the system is full upon arrival. Each successfully serviced class-2 customer leads to a reward, whereas each aborted class-2 customer incurs a cost. Using dynamic programming, we characterize optimal admission control for class-2 customers that maximizes the long-run average profit. The optimal admission control policy depends only on the total occupancy and is of threshold type.
    Operations Research Letters 11/2012; 40(6):510–515. DOI:10.1016/j.orl.2012.08.012 · 0.62 Impact Factor
  • Source
    Niloofar Fazlollahi · David Starobinski · Ari Trachtenberg ·
    [Show abstract] [Hide abstract]
    ABSTRACT: We consider the problem of generating a connected identifying code for an arbitrary graph. After a brief motivation, we show that the decision problem regarding the existence of such a code is NP-complete, and we propose a novel polynomial-time approximation ${\tt ConnectID}$ that transforms any identifying code into a connected version of at most twice the size, thus leading to an asymptotically optimal approximation bound. When the input identifying code to ${\tt ConnectID}$ is robust to graph distortions, we show that the size of the resulting connected code is related to the best error-correcting code of a given minimum distance, permitting the use of known coding bounds. In addition, we show that the size of the input and output codes converge for increasing robustness, meaning that highly robust identifying codes are almost connected. Finally, we evaluate the performance of ${\tt ConnectID}$ on various random graphs. Simulations for Erdős–Rényi random graphs show that the connected codes generated are actually at most 25% larger than their unconnected counterparts, while simulations with robust input identifying codes confirm that robustness often provides connectivity for free.
    IEEE Transactions on Information Theory 07/2012; 58(7):4814-4824. DOI:10.1109/TIT.2012.2191934 · 2.33 Impact Factor
  • Source
    Aylin Turhan · Murat Alanyali · David Starobinski ·
    [Show abstract] [Hide abstract]
    ABSTRACT: We study optimal admission control of secondary users (SUs) in cognitive radio (CR) networks in presence of preemption. In this model, when a primary user (PU) arrives to the system and finds all the channels busy, it preempts an SU unless all the users in the system are PUs. We apply admission control on the SUs only. Using dynamic programming (DP), we find the optimal admission control policy that maximizes the long-run average profit. As our main contribution, we show that the optimal admission control of the SUs depends only on the total number of users in the system (i.e. it does not depend on the number of PUs and SUs in the system individually) and is of threshold type. Therefore, although the system is modeled as a two-dimensional Markov chain, our findings allow simple and efficient computation of the optimal control policy.
    Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt), 2012 10th International Symposium on; 05/2012

Publication Stats

2k Citations
68.47 Total Impact Points


  • 2001-2014
    • Boston University
      • Department of Electrical and Computer Engineering
      Boston, Massachusetts, United States
    • University of California, Berkeley
      • Department of Electrical Engineering and Computer Sciences
      Berkeley, California, United States
  • 2007
    • Massachusetts Institute of Technology
      • Department of Physics
      Cambridge, Massachusetts, United States
  • 2000
    • Technion - Israel Institute of Technology
      • Electrical Engineering Group
      H̱efa, Haifa District, Israel