Ken Duffy | Hamilton Institute, National University of Ireland Maynooth
Ken Duffy
Hamilton Institute
NUI Maynooth

Drafts

Journal papers by year



    2016
  1. Re-tracing the in vivo hematopoietic tree using single cell methods.
    Leïla Perié and Ken R. Duffy.
    FEBS Letters, to appear.
  2. Site-specific recombinatorics: in situ cellular barcoding with the Cre Lox system.
    Tom S. Weber, Mark Dukes, Denise C. Miles, Stefan P. Glaser, Shalin H. Naik, and Ken R. Duffy.
    BMC Systems Biology, 10:42, 2016.
  3. Inferring average generation via division-linked labeling.
    Tom S. Weber, Leïla Perié and Ken R. Duffy.
    Journal of Mathematical Biology, 73 (2), 491-523, 2016.

    2015
  4. The branching point in erythro-myeloid differentiation.
    Leïla Perié, Ken R. Duffy, Lianne Kok, Rob J. de Boer and Ton N. Schumacher.
    Cell, 163 (7), 1655-1662, 2015.
  5. Multi-user guesswork and brute force security.
    Mark M. Christiansen, Ken R. Duffy, Flávio du Pin Calmon and Muriel Médard.
  6. IEEE Transactions on Information Theory, 61 (12), 6876-6886, 2015.
  7. Probabilistic characterisation of baseline noise in STR profiles.
    Ullrich J. Mönich, Ken R. Duffy, Muriel Médard, Viveck Cadambe, Lauren E. Alfonse and Catherine Grgicak.
    Forensic Science International: Genetics, 19, 107-122, 2015.


  8. 2014
  9. Antigen affinity, costimulation, and cytokine inputs sum linearly to amplify T cell expansion.
    Julia M. Marchingo, Andrey Kan, Robyn M. Sutherland, Ken R. Duffy, Cameron J. Wellard, Gabrielle T. Belz, Andrew M. Lew, Mark R. Dowling, Susanne Heinzel, Philip D. Hodgkin.
    Science, 346 (6213), 1123-1127, 2014.
  10. Determining lineage pathways from cellular barcoding experiments.
    Leïla Periè, Philip D. Hodgkin, Shalin H. Naik, Ton N. Schumacher, Rob J. de Boer and Ken R. Duffy.
    Cell Reports 6 (4), 617-624, 2014.
  11. Large deviation asymptotics for busy periods.
    Ken R. Duffy and Sean P. Meyn.
    Stochastic Systems 4 (1), 300-319, 2014.


    2013
  12. Decentralized constraint satisfaction.
    Ken R. Duffy, Charles Bordenave and Douglas J. Leith.
    IEEE/ACM Transactions on Networking, 21 (4), 1298-1308, 2013.
  13. H-RCA: 802.11 collision-aware rate control.
    K. D. Huang, Ken R. Duffy and David Malone.
    IEEE/ACM Transactions on Networking, 21 (4), 1021-1034, 2013.
  14. Guesswork, large deviations and Shannon entropy.
    Mark M. Christiansen and Ken R. Duffy.
    IEEE Transactions on Information Theory, 59 (2), 796-802, 2013.
  15. Decentralised learning MACs for collision-free access in WLANs.
    Minyu Fang, David Malone, Ken R. Duffy and Douglas J. Leith.
    Wireless Networks, 19 (1), 83-98, 2013.

    2012
  16. Intracellular competition for fates in the immune system.
    Ken R. Duffy and Philip D. Hodgkin.
    Trends in Cell Biology, 22 (9), 457-464, 2012.
  17. Activation-induced B cell fates are selected by intracellular stochastic competition.
    Ken R. Duffy, Cameron J. Wellard, John F. Markham, Jie H. S. Zhou, Ross Holmberg,
    Edwin D. Hawkins, Jhagvaral Hasbold, Mark R. Dowling and Philip D. Hodgkin.
    Science, 335 (6066), 338-341, 2012.


    2011
  18. Sample path large deviations of Poisson shot noise with heavy tail semi-exponential distributions.
    Ken R. Duffy and Giovanni Luca Torrisi.
    Journal of Applied Probability, 48 (3), 688-698, 2011.
  19. Estimating Loynes' exponent.
    Ken R. Duffy and Sean P. Meyn.
    Queueing Systems: Theory & Applications, 68 (3-4), 285-293, 2011.
  20. The 802.11g 11 Mb/s rate is more robust than 6 Mb/s.
    K. D. Huang, David Malone and Ken R. Duffy.
    IEEE Transactions on Wireless Communcations, 10 (4), 1015-1020, 2011.
  21. Sample path large deviations for order statistics.
    Ken R. Duffy, Claudio Macci and Giovanni Luca Torrisi.
    Journal of Applied Probability, 48 (1), 238-257, 2011.
  22. On the large deviations of a class of modulated additive processes.
    Ken R. Duffy, Claudio Macci and Giovanni Luca Torrisi.
    ESAIM: Probability and Statistics, 2011 (15), 83-109, 2011.

    2010
  23. Most likely paths to error when estimating the mean of a reflected random walk.
    Ken R. Duffy and Sean P. Meyn.
    Performance Evaluation, 67 (12), 1290-1303, 2010.
  24. On the validity of IEEE 802.11 MAC modeling hypotheses.
    K. D. Huang, Ken R. Duffy and David Malone.
    IEEE/ACM Transactions on Networking, 18 (6), 1935-1948, 2010.
  25. Mean field Markov models of wireless local area networks.
    Ken R. Duffy.
    Markov Processes and Related Fields, 16 (2), 295-328, 2010.
  26. A minimum of two distinct heritable factors are required to explain correlation structures in proliferating lymphocytes.
    John F. Markham, Cameron J. Wellard, Edwin D. Hawkins, Ken R. Duffy and Philip D. Hodgkin.
    Journal of the Royal Society Interface, 7 (48), 1049-1059, 2010.
  27. Log-convexity of rate region in 802.11e WLANs.
    Douglas J. Leith, Vijay G. Subramanian and Ken R. Duffy.
    IEEE Communications Letters, 14 (1), 57-59, 2010.

    2009
  28. Existence and uniqueness of fair rate allocations in lossy wireless networks.
    Vijay G. Subramanian, Ken R. Duffy and Douglas J. Leith.
    IEEE Transactions on Wireless Communications, 8 (7), 3401-3406, 2009.
  29. On a buffering hypothesis in 802.11 analytic models.
    K. D. Huang and Ken R. Duffy
    IEEE Communications Letters, 13 (5), 312-314, 2009.
  30. On the impact of correlation between collaterally consanguineous cells on lymphocyte population dynamics.
    Ken R. Duffy and Vijay G. Subramanian.
    Journal of Mathematical Biology, 59 (2), 255-285, 2009.

    2008
  31. Complexity analysis of a decentralised graph colouring algorithm.
    Ken R. Duffy, Neil O'Connell and Artem Sapozhnikov.
    Information Processing Letters, 107 (2), 60-63, 2008.
  32. The large deviation principle for the on/off Weibull sojourn process.
    Ken R. Duffy and Artem Sapozhnikov.
    Journal of Applied Probability, 45 (1), 107-117, 2008.
  33. Determining the expected variability of immune responses using the Cyton Model.
    Vijay G. Subramanian, Ken R. Duffy, Marian L. Turner and Philip D. Hodgkin.
    Journal of Mathematical Biology, 56 (6), 861-892, 2008.
  34. Logarithmic asymptotics for a single-server processing distinguishable sources.
    Ken R. Duffy and David Malone.
    Mathematical Methods of Operations Research, 68 (3), 509-537, 2008.

    2007
  35. Loss aversion, large deviation preferences and optimal portfolio weights for some classes of return processes.
    Ken Duffy, Olena Lobunets and Yuri Suhov.
    Physica A, 378 (2), 408-422, 2007.
  36. Modeling the impact of buffering on 802.11.
    Ken Duffy and Ayalvadi J. Ganesh.
    IEEE Communications Letters, 11 (2), 219-221, 2007.
  37. Ambiguities in estimates of critical exponents for long-range dependent processes.
    Ken Duffy, Christopher King and David Malone.
    Physica A, 377 (1), 43-52, 2007.
  38. Some remarks on LD plots for heavy-tailed traffic.
    David Malone, Ken Duffy and Christopher King.
    ACM SIGCOMM Computer Communications Review, 37 (1), 41-42, 2007.
  39. Using estimated entropy in a queueing system with dynamic routing.
    Ken Duffy, Eugene A. Pechersky, Yuri M. Suhov and Nikita D. Vvedenskaya.
    Markov Processes and Related Fields, 13 (1-2), 57-84, 2007.
  40. Modeling the 802.11 distributed coordination function in non-saturated heterogeneous conditions.
    David Malone, Ken Duffy and Douglas J. Leith.
    IEEE/ACM Transactions on Networking, 15 (1), 159-172, 2007.

    2006
  41. Modeling 802.11 Mesh Networks.
    Ken Duffy, Douglas J. Leith, Tianji Li and David Malone.
    IEEE Communications Letters 10 (8), 635-637, 2006.

    2005
  42. How to estimate a cumulative process's rate-function.
    Ken Duffy and Anthony P. Metcalfe.
    Journal of Applied Probability 42 (4), 1044-1052, 2005.
  43. Modeling the 802.11 distributed coordination function in non-saturated conditions.
    Ken Duffy, David Malone and Douglas J. Leith.
    IEEE Communications Letters, 9 (8), 715-717, 2005.
  44. The large deviations of estimating rate-functions.
    Ken Duffy and Anthony P. Metcalfe.
    Journal of Applied Probability 42 (1), 267-274, 2005.

    2004
  45. Some useful functions for functional large deviations.
    Ken Duffy and Mark Rodgers-Lee.
    Stochastics and Stochastics Reports 76 (3), 267-279, 2004.
  46. Logarithmic asymptotics for unserved messages at a FIFO.
    Ken Duffy and Wayne G. Sullivan.
    Markov Processes and Related Fields 10 (1), 175-189, 2004.
  47. On Knuth's generalization of Banach's matchbox problem.
    Ken Duffy and W. M. B. Dukes.
    Mathematical Proceedings of the Royal Irish Academy 104A, 107-118, 2004.

    2003
  48. Logarithmic asymptotics for the supremum of a stochastic process.
    Ken Duffy, John T. Lewis and Wayne G. Sullivan.
    Annals of Applied Probability 13:2, 430-445, 2003.

    2000
  49. Distribution-free confidence intervals for measurements of effective bandwidth.
    Laszlo Gyorfi, Andras Racz, Ken Duffy, John T. Lewis and Fergal Toomey.
    Journal of Applied Probability 37:1, 224-235, 2000.

Quotes from friends

  1. "Research requires the use of imagination. It is akin to humour. A research institute which never echoes with laughter is highly suspect. Those engaged in research must feel free to throw around crazy-seeming ideas. There is a strong element of play in research."
    John T. Lewis (1932-2004)
  2. "The modelling technology has far outstripped the level of our understanding of the physical processes being modelled. Making use of this technology then requires that the gaps in the factual knowledge be filled with assumptions which, although often appearing logical, have not been verified and may sometimes be wrong".
    Vit Klemes, WCP-98, WHO, 1985.