Skip to main content

Showing 1–50 of 151 results for author: Aalizadeh, M

.
  1. arXiv:2406.17145  [pdf, other

    cs.DC cs.AI cs.LG

    GraphPipe: Improving Performance and Scalability of DNN Training with Graph Pipeline Parallelism

    Authors: Byungsoo Jeon, Mengdi Wu, Shiyi Cao, Sunghyun Kim, Sunghyun Park, Neeraj Aggarwal, Colin Unger, Daiyaan Arfeen, Peiyuan Liao, Xupeng Miao, Mohammad Alizadeh, Gregory R. Ganger, Tianqi Chen, Zhihao Jia

    Abstract: Deep neural networks (DNNs) continue to grow rapidly in size, making them infeasible to train on a single device. Pipeline parallelism is commonly used in existing DNN systems to support large-scale DNN training by partitioning a DNN into multiple stages, which concurrently perform DNN training for different micro-batches in a pipeline fashion. However, existing pipeline-parallel approaches only c… ▽ More

    Submitted 24 June, 2024; originally announced June 2024.

  2. On a Generalization of Heyting Algebras I

    Authors: Amirhossein Akbar Tabatabai, Majid Alizadeh, Masoud Memarzadeh

    Abstract: $\nabla$-algebra is a natural generalization of Heyting algebra, unifying many algebraic structures including bounded lattices, Heyting algebras, temporal Heyting algebras and the algebraic presentation of the dynamic topological systems. In a series of two papers, we will systematically study the algebro-topological properties of different varieties of $\nabla… ▽ More

    Submitted 18 May, 2024; originally announced May 2024.

    Comments: 49 pages

  3. arXiv:2405.00965  [pdf, other

    cs.LG cs.DC

    Robust Decentralized Learning with Local Updates and Gradient Tracking

    Authors: Sajjad Ghiasvand, Amirhossein Reisizadeh, Mahnoosh Alizadeh, Ramtin Pedarsani

    Abstract: As distributed learning applications such as Federated Learning, the Internet of Things (IoT), and Edge Computing grow, it is critical to address the shortcomings of such technologies from a theoretical perspective. As an abstraction, we consider decentralized learning over a network of communicating clients or nodes and tackle two major challenges: data heterogeneity and adversarial robustness. W… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

  4. arXiv:2403.05786  [pdf, other

    cs.LG math.OC

    Optimistic Safety for Online Convex Optimization with Unknown Linear Constraints

    Authors: Spencer Hutchinson, Tianyi Chen, Mahnoosh Alizadeh

    Abstract: We study the problem of online convex optimization (OCO) under unknown linear constraints that are either static, or stochastically time-varying. For this problem, we introduce an algorithm that we term Optimistically Safe OCO (OSOCO) and show that it enjoys $\tilde{\mathcal{O}}(\sqrt{T})$ regret and no constraint violation. In the case of static linear constraints, this improves on the previous b… ▽ More

    Submitted 27 May, 2024; v1 submitted 8 March, 2024; originally announced March 2024.

    Comments: 33 pages, 2 figures

  5. arXiv:2402.15597  [pdf, ps, other

    math.FA

    Generalized convex functions and their applications in optimality conditions

    Authors: Mohammad Hossein Alizadeh, Alireza Youhannaee Zanjani

    Abstract: We introduce and study the notion of (e,y)-conjugate for a proper and e-convex function in locally convex spaces, which is an extension of the concept of the conjugate. The mutual relationships between the concepts of (e,y)-conjugacy and e-subdifferential are presented. Moreover, some applications of these notions in optimization are established.

    Submitted 29 February, 2024; v1 submitted 23 February, 2024; originally announced February 2024.

    Comments: 20 pages, 0 figure

    MSC Class: 47H05 ACM Class: F.2.2

  6. arXiv:2402.04879  [pdf, other

    cs.SI

    Comparing Methods for Creating a National Random Sample of Twitter Users

    Authors: Meysam Alizadeh, Darya Zare, Zeynab Samei, Mohammadamin Alizadeh, Mael Kubli, Mohammadhadi Aliahmadi, Sarvenaz Ebrahimi, Fabrizio Gilardi

    Abstract: Twitter data has been widely used by researchers across various social and computer science disciplines. A common aim when working with Twitter data is the construction of a random sample of users from a given country. However, while several methods have been proposed in the literature, their comparative performance is mostly unexplored. In this paper, we implement four common methods to collect a… ▽ More

    Submitted 11 March, 2024; v1 submitted 7 February, 2024; originally announced February 2024.

  7. Practical Rateless Set Reconciliation

    Authors: Lei Yang, Yossi Gilad, Mohammad Alizadeh

    Abstract: Set reconciliation, where two parties hold fixed-length bit strings and run a protocol to learn the strings they are missing from each other, is a fundamental task in many distributed systems. We present Rateless Invertible Bloom Lookup Tables (Rateless IBLT), the first set reconciliation protocol, to the best of our knowledge, that achieves low computation cost and near-optimal communication cost… ▽ More

    Submitted 19 June, 2024; v1 submitted 4 February, 2024; originally announced February 2024.

    Comments: SIGCOMM 2024

    Journal ref: In ACM SIGCOMM 2024 Conference, August 4-8, 2024, Sydney, NSW, Australia. ACM, New York, NY, USA, 18 pages (2024)

  8. arXiv:2401.14109  [pdf, other

    cs.CL cs.AI cs.LG quant-ph

    CompactifAI: Extreme Compression of Large Language Models using Quantum-Inspired Tensor Networks

    Authors: Andrei Tomut, Saeed S. Jahromi, Abhijoy Sarkar, Uygar Kurt, Sukhbinder Singh, Faysal Ishtiaq, Cesar Muñoz, Prabdeep Singh Bajaj, Ali Elborady, Gianni del Bimbo, Mehrazin Alizadeh, David Montero, Pablo Martin-Ramiro, Muhammad Ibrahim, Oussama Tahiri Alaoui, John Malcolm, Samuel Mugel, Roman Orus

    Abstract: Large Language Models (LLMs) such as ChatGPT and LlaMA are advancing rapidly in generative Artificial Intelligence (AI), but their immense size poses significant challenges, such as huge training and inference costs, substantial energy demands, and limitations for on-site deployment. Traditional compression methods such as pruning, distillation, and low-rank approximation focus on reducing the eff… ▽ More

    Submitted 13 May, 2024; v1 submitted 25 January, 2024; originally announced January 2024.

    Comments: 5 pages, 4 figures, 2 tables, and supplementary information of 2 pages and 1 figure. Revised version with new benchmarks for LlaMA2-7B

  9. arXiv:2311.17568  [pdf, other

    math.ST

    Stochastic orderings between two finite mixture models with inverted-Kumaraswamy distributed components

    Authors: Raju Bhakta, Pradip Kundu, Suchandan Kayal, Morad Alizadeh

    Abstract: In this paper, we consider two finite mixture models (FMMs), with inverted-Kumaraswamy distributed components' lifetimes. Several stochastic ordering results between the FMMs have been obtained. Mainly, we focus on three different cases in terms of the heterogeneity of parameters. The usual stochastic order between the FMMs have been established when heterogeneity presents in one parameter as well… ▽ More

    Submitted 7 March, 2024; v1 submitted 29 November, 2023; originally announced November 2023.

    Comments: 27

    MSC Class: 60E15; 90B25

  10. arXiv:2311.07753  [pdf, other

    cs.NI

    Bringing Reconfigurability to the Network Stack

    Authors: Akshay Narayan, Aurojit Panda, Mohammad Alizadeh, Hari Balakrishnan, Arvind Krishnamurthy, Scott Shenker

    Abstract: Reconfiguring the network stack allows applications to specialize the implementations of communication libraries depending on where they run, the requests they serve, and the performance they need to provide. Specializing applications in this way is challenging because developers need to choose the libraries they use when writing a program and cannot easily change them at runtime. This paper intro… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

    Comments: 12 pages, 10 figures

  11. arXiv:2310.03808  [pdf, other

    math.OC eess.SY

    A Safe First-Order Method for Pricing-Based Resource Allocation in Safety-Critical Networks

    Authors: Berkay Turan, Spencer Hutchinson, Mahnoosh Alizadeh

    Abstract: We introduce a novel algorithm for solving network utility maximization (NUM) problems that arise in resource allocation schemes over networks with known safety-critical constraints, where the constraints form an arbitrary convex and compact feasible set. Inspired by applications where customers' demand can only be affected through posted prices and real-time two-way communication with customers i… ▽ More

    Submitted 17 May, 2024; v1 submitted 5 October, 2023; originally announced October 2023.

    Comments: 14 pages, 3 figures

  12. arXiv:2310.03610  [pdf, other

    eess.SY

    Interpreting the Value of Flexibility in AC Security-Constrained Transmission Expansion Planning via a Cooperative Game Framework

    Authors: Andrey Churkin, Wangwei Kong, Mohammad Iman Alizadeh, Florin Capitanescu, Pierluigi Mancarella, Eduardo A. Martínez Ceseña

    Abstract: Security-constrained transmission expansion planning (SCTEP) is an inherently complex problem that requires simultaneously solving multiple contingency states of the system (usually corresponding to N-1 security criterion). Existing studies focus on effectively finding optimal solutions; however, single optimal solutions are not sufficient to interpret the value of flexibility (e.g., from energy s… ▽ More

    Submitted 14 March, 2024; v1 submitted 5 October, 2023; originally announced October 2023.

    Comments: Submitted to PSCC 2024

  13. arXiv:2309.16869  [pdf, other

    cs.NI

    Vidaptive: Efficient and Responsive Rate Control for Real-Time Video on Variable Networks

    Authors: Pantea Karimi, Sadjad Fouladi, Vibhaalakshmi Sivaraman, Mohammad Alizadeh

    Abstract: Real-time video streaming relies on rate control mechanisms to adapt video bitrate to network capacity while maintaining high utilization and low delay. However, the current video rate controllers, such as Google Congestion Control (GCC), are very slow to respond to network changes, leading to link under-utilization and latency spikes. While recent delay-based congestion control algorithms promise… ▽ More

    Submitted 25 February, 2024; v1 submitted 28 September, 2023; originally announced September 2023.

  14. arXiv:2308.15006  [pdf, other

    cs.LG

    Directional Optimism for Safe Linear Bandits

    Authors: Spencer Hutchinson, Berkay Turan, Mahnoosh Alizadeh

    Abstract: The safe linear bandit problem is a version of the classical stochastic linear bandit problem where the learner's actions must satisfy an uncertain constraint at all rounds. Due its applicability to many real-world settings, this problem has received considerable attention in recent years. By leveraging a novel approach that we call directional optimism, we find that it is possible to achieve impr… ▽ More

    Submitted 11 March, 2024; v1 submitted 28 August, 2023; originally announced August 2023.

    Comments: 37 pages, 4 figures

  15. arXiv:2308.14299  [pdf, other

    cs.GT eess.SY

    Reinforcement Strategies in General Lotto Games

    Authors: Keith Paarporn, Rahul Chandan, Mahnoosh Alizadeh, Jason R. Marden

    Abstract: Strategic decisions are often made over multiple periods of time, wherein decisions made earlier impact a competitor's success in later stages. In this paper, we study these dynamics in General Lotto games, a class of models describing the competitive allocation of resources between two opposing players. We propose a two-stage formulation where one of the players has reserved resources that can be… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

    Comments: 14 pages. arXiv admin note: text overlap with arXiv:2209.06090

  16. arXiv:2307.15785  [pdf, other

    eess.SY

    Safe Pricing Mechanisms for Distributed Resource Allocation with Bandit Feedback

    Authors: Spencer Hutchinson, Berkay Turan, Mahnoosh Alizadeh

    Abstract: In societal-scale infrastructures, such as electric grids or transportation networks, pricing mechanisms are often used as a way to shape users' demand in order to lower operating costs and improve reliability. Existing approaches to pricing design for safety-critical networks often require that users are queried beforehand to negotiate prices, which has proven to be challenging to implement in th… ▽ More

    Submitted 28 July, 2023; originally announced July 2023.

    Comments: 19 pages, 2 figures

  17. arXiv:2307.02179  [pdf, other

    cs.CL

    Open-Source LLMs for Text Annotation: A Practical Guide for Model Setting and Fine-Tuning

    Authors: Meysam Alizadeh, Maël Kubli, Zeynab Samei, Shirin Dehghani, Mohammadmasiha Zahedivafa, Juan Diego Bermeo, Maria Korobeynikova, Fabrizio Gilardi

    Abstract: This paper studies the performance of open-source Large Language Models (LLMs) in text classification tasks typical for political science research. By examining tasks like stance, topic, and relevance classification, we aim to guide scholars in making informed decisions about their use of LLMs for text analysis. Specifically, we conduct an assessment of both zero-shot and fine-tuned LLMs across a… ▽ More

    Submitted 29 May, 2024; v1 submitted 5 July, 2023; originally announced July 2023.

  18. arXiv:2306.01787  [pdf, other

    cs.NI cs.AI cs.LG

    Power Control with QoS Guarantees: A Differentiable Projection-based Unsupervised Learning Framework

    Authors: Mehrazin Alizadeh, Hina Tabassum

    Abstract: Deep neural networks (DNNs) are emerging as a potential solution to solve NP-hard wireless resource allocation problems. However, in the presence of intricate constraints, e.g., users' quality-of-service (QoS) constraints, guaranteeing constraint satisfaction becomes a fundamental challenge. In this paper, we propose a novel unsupervised learning framework to solve the classical power control prob… ▽ More

    Submitted 31 May, 2023; originally announced June 2023.

    Comments: accepted in IEEE Transactions on Communications

  19. arXiv:2305.14135  [pdf, other

    cs.NI cs.CV

    Reparo: Loss-Resilient Generative Codec for Video Conferencing

    Authors: Tianhong Li, Vibhaalakshmi Sivaraman, Pantea Karimi, Lijie Fan, Mohammad Alizadeh, Dina Katabi

    Abstract: Packet loss during video conferencing often leads to poor quality and video freezing. Attempting to retransmit lost packets is often impractical due to the need for real-time playback. Employing Forward Error Correction (FEC) for recovering the lost packets is challenging as it is difficult to determine the appropriate redundancy level. To address these issues, we introduce Reparo -- a loss-resili… ▽ More

    Submitted 20 February, 2024; v1 submitted 23 May, 2023; originally announced May 2023.

  20. arXiv:2305.00889  [pdf, other

    cs.LG math.OC

    The Impact of the Geometric Properties of the Constraint Set in Safe Optimization with Bandit Feedback

    Authors: Spencer Hutchinson, Berkay Turan, Mahnoosh Alizadeh

    Abstract: We consider a safe optimization problem with bandit feedback in which an agent sequentially chooses actions and observes responses from the environment, with the goal of maximizing an arbitrary function of the response while respecting stage-wise constraints. We propose an algorithm for this problem, and study how the geometric properties of the constraint set impact the regret of the algorithm. I… ▽ More

    Submitted 1 May, 2023; originally announced May 2023.

    Comments: 21 pages, 4 figures

  21. ChatGPT Outperforms Crowd-Workers for Text-Annotation Tasks

    Authors: Fabrizio Gilardi, Meysam Alizadeh, Maël Kubli

    Abstract: Many NLP applications require manual data annotations for a variety of tasks, notably to train classifiers or evaluate the performance of unsupervised models. Depending on the size and degree of complexity, the tasks may be conducted by crowd-workers on platforms such as MTurk as well as trained annotators, such as research assistants. Using a sample of 2,382 tweets, we demonstrate that ChatGPT ou… ▽ More

    Submitted 19 July, 2023; v1 submitted 27 March, 2023; originally announced March 2023.

    Comments: Gilardi, Fabrizio, Meysam Alizadeh, and Maël Kubli. 2023. "ChatGPT Outperforms Crowd Workers for Text-Annotation Tasks". Proceedings of the National Academy of Sciences 120(30): e2305016120

  22. arXiv:2302.02228  [pdf, other

    stat.ML cs.LG

    Counterfactual Identifiability of Bijective Causal Models

    Authors: Arash Nasr-Esfahany, Mohammad Alizadeh, Devavrat Shah

    Abstract: We study counterfactual identifiability in causal models with bijective generation mechanisms (BGM), a class that generalizes several widely-used causal models in the literature. We establish their counterfactual identifiability for three common causal structures with unobserved confounding, and propose a practical learning method that casts learning a BGM as structured generative modeling. Learne… ▽ More

    Submitted 6 June, 2023; v1 submitted 4 February, 2023; originally announced February 2023.

  23. arXiv:2302.02182  [pdf, other

    cs.LG cs.AI

    Online Reinforcement Learning in Non-Stationary Context-Driven Environments

    Authors: Pouya Hamadanian, Arash Nasr-Esfahany, Malte Schwarzkopf, Siddartha Sen, Mohammad Alizadeh

    Abstract: We study online reinforcement learning (RL) in non-stationary environments, where a time-varying exogenous context process affects the environment dynamics. Online RL is challenging in such environments due to "catastrophic forgetting" (CF). The agent tends to forget prior knowledge as it trains on new experiences. Prior approaches to mitigate this issue assume task labels (which are often not ava… ▽ More

    Submitted 10 February, 2024; v1 submitted 4 February, 2023; originally announced February 2023.

    Comments: 9 pages + 6 pages in the appendix, 10 Figures and 8 Tables

  24. arXiv:2301.10893  [pdf, other

    cs.RO

    Predicting Parameters for Modeling Traffic Participants

    Authors: Ahmadreza Moradipari, Sangjae Bae, Mahnoosh Alizadeh, Ehsan Moradi Pari, David Isele

    Abstract: Accurately modeling the behavior of traffic participants is essential for safely and efficiently navigating an autonomous vehicle through heavy traffic. We propose a method, based on the intelligent driver model, that allows us to accurately model individual driver behaviors from only a small number of frames using easily observable features. On average, this method makes prediction errors that ha… ▽ More

    Submitted 25 January, 2023; originally announced January 2023.

  25. arXiv:2301.05143  [pdf, other

    eess.SY

    Impacts of Distribution Network Reconfiguration on Aggregated DER Flexibility

    Authors: Andrey Churkin, Miguel Sanchez-Lopez, Mohammad Iman Alizadeh, Florin Capitanescu, Eduardo A. Martínez Ceseña, Pierluigi Mancarella

    Abstract: The ongoing integration of controllable distributed energy resources (DER) makes distribution networks capable of aggregating flexible power and providing flexibility services at both transmission and distribution levels. The aggregated flexibility of an active distribution network (ADN) can be represented as its feasible operating area in the P-Q space. The limits of this area are pivotal for arr… ▽ More

    Submitted 12 January, 2023; originally announced January 2023.

    Comments: Submitted to IEEE PowerTech 2023

  26. arXiv:2212.05526  [pdf, other

    cs.DB cs.LG

    FactorJoin: A New Cardinality Estimation Framework for Join Queries

    Authors: Ziniu Wu, Parimarjan Negi, Mohammad Alizadeh, Tim Kraska, Samuel Madden

    Abstract: Cardinality estimation is one of the most fundamental and challenging problems in query optimization. Neither classical nor learning-based methods yield satisfactory performance when estimating the cardinality of the join queries. They either rely on simplified assumptions leading to ineffective cardinality estimates or build large models to understand the data distributions, leading to long plann… ▽ More

    Submitted 11 December, 2022; originally announced December 2022.

    Comments: Paper accepted by SIGMOD 2023

  27. arXiv:2209.10507  [pdf, other

    cs.NI cs.CV

    Gemino: Practical and Robust Neural Compression for Video Conferencing

    Authors: Vibhaalakshmi Sivaraman, Pantea Karimi, Vedantha Venkatapathy, Mehrdad Khani, Sadjad Fouladi, Mohammad Alizadeh, Frédo Durand, Vivienne Sze

    Abstract: Video conferencing systems suffer from poor user experience when network conditions deteriorate because current video codecs simply cannot operate at extremely low bitrates. Recently, several neural alternatives have been proposed that reconstruct talking head videos at very low bitrates using sparse representations of each frame such as facial landmark information. However, these approaches produ… ▽ More

    Submitted 19 October, 2023; v1 submitted 21 September, 2022; originally announced September 2022.

    Comments: 13 pages, 5 appendix

    Journal ref: USENIX NSDI 2024

  28. arXiv:2209.06090  [pdf, other

    cs.GT econ.TH eess.SY

    Strategic investments in multi-stage General Lotto games

    Authors: Rahul Chandan, Keith Paarporn, Mahnoosh Alizadeh, Jason R. Marden

    Abstract: In adversarial interactions, one is often required to make strategic decisions over multiple periods of time, wherein decisions made earlier impact a player's competitive standing as well as how choices are made in later stages. In this paper, we study such scenarios in the context of General Lotto games, which models the competitive allocation of resources over multiple battlefields between two p… ▽ More

    Submitted 13 September, 2022; originally announced September 2022.

    Comments: 8 pages, 2 figures, to appear in proceedings of the 2022 IEEE Conference on Decision and Control

  29. arXiv:2208.04446  [pdf, other

    math.OC eess.SY

    Safe Dual Gradient Method for Network Utility Maximization Problems

    Authors: Berkay Turan, Mahnoosh Alizadeh

    Abstract: In this paper, we introduce a novel first-order dual gradient algorithm for solving network utility maximization problems that arise in resource allocation schemes over networks with safety-critical constraints. Inspired by applications where customers' demand can only be affected through posted prices and real-time two-way communication with customers is not available, we require an algorithm to… ▽ More

    Submitted 8 August, 2022; originally announced August 2022.

    Comments: 7 pages, 1 figure, published in the proceedings of the 61st IEEE Conference on Decision and Control

  30. arXiv:2207.11403  [pdf, other

    eess.SY

    A Deployable Online Optimization Framework for EV Smart Charging with Real-World Test Cases

    Authors: Nathaniel Tucker, Mahnoosh Alizadeh

    Abstract: We present a customizable online optimization framework for real-time EV smart charging to be readily implemented at real large-scale charging facilities. Notably, due to real-world constraints, we designed our framework around 3 main requirements. First, the smart charging strategy is readily deployable and customizable for a wide-array of facilities, infrastructure, objectives, and constraints.… ▽ More

    Submitted 22 July, 2022; originally announced July 2022.

    Comments: 7 pages. arXiv admin note: text overlap with arXiv:2203.06847

  31. arXiv:2207.06579  [pdf

    physics.ao-ph cs.LG

    Soil Erosion in the United States. Present and Future (2020-2050)

    Authors: Shahab Aldin Shojaeezadeh, Malik Al-Wardy, Mohammad Reza Nikoo, Mehrdad Ghorbani Mooselu, Mohammad Reza Alizadeh, Jan Franklin Adamowski, Hamid Moradkhani, Nasrin Alamdari, Amir H. Gandomi

    Abstract: Soil erosion is a significant threat to the environment and long-term land management around the world. Accelerated soil erosion by human activities inflicts extreme changes in terrestrial and aquatic ecosystems, which is not fully surveyed/predicted for the present and probable future at field-scales (30-m). Here, we estimate/predict soil erosion rates by water erosion, (sheet and rill erosion),… ▽ More

    Submitted 13 July, 2022; originally announced July 2022.

  32. arXiv:2205.06331  [pdf, other

    cs.LG cs.MA

    Collaborative Multi-agent Stochastic Linear Bandits

    Authors: Ahmadreza Moradipari, Mohammad Ghavamzadeh, Mahnoosh Alizadeh

    Abstract: We study a collaborative multi-agent stochastic linear bandit setting, where $N$ agents that form a network communicate locally to minimize their overall regret. In this setting, each agent has its own linear bandit problem (its own reward parameter) and the goal is to select the best global action w.r.t. the average of their reward parameters. At each round, each agent proposes an action, and one… ▽ More

    Submitted 12 May, 2022; originally announced May 2022.

    Journal ref: American Control Conference (ACC), 2022

  33. arXiv:2205.06326  [pdf, other

    cs.LG

    Multi-Environment Meta-Learning in Stochastic Linear Bandits

    Authors: Ahmadreza Moradipari, Mohammad Ghavamzadeh, Taha Rajabzadeh, Christos Thrampoulidis, Mahnoosh Alizadeh

    Abstract: In this work we investigate meta-learning (or learning-to-learn) approaches in multi-task linear stochastic bandit problems that can originate from multiple environments. Inspired by the work of [1] on meta-learning in a sequence of linear bandit problems whose parameters are sampled from a single distribution (i.e., a single environment), here we consider the feasibility of meta-learning when tas… ▽ More

    Submitted 12 May, 2022; originally announced May 2022.

    Journal ref: IEEE International Symposium on Information Theory (ISIT), 2022

  34. arXiv:2205.01797  [pdf, other

    cs.NI cs.CR cs.DC

    Coded Transaction Broadcasting for High-throughput Blockchains

    Authors: Lei Yang, Yossi Gilad, Mohammad Alizadeh

    Abstract: High-throughput blockchains require efficient transaction broadcast mechanisms that can deliver transactions to most network nodes with low bandwidth overhead and latency. Existing schemes coordinate transmissions across peers to avoid sending redundant data, but they either incur a high latency or are not robust against adversarial network nodes. We present Strokkur, a new transaction broadcastin… ▽ More

    Submitted 3 May, 2022; originally announced May 2022.

  35. arXiv:2205.01234  [pdf, other

    cs.NI

    Scalable Tail Latency Estimation for Data Center Networks

    Authors: Kevin Zhao, Prateesh Goyal, Mohammad Alizadeh, Thomas E. Anderson

    Abstract: In this paper, we consider how to provide fast estimates of flow-level tail latency performance for very large scale data center networks. Network tail latency is often a crucial metric for cloud application performance that can be affected by a wide variety of factors, including network load, inter-rack traffic skew, traffic burstiness, flow size distributions, oversubscription, and topology asym… ▽ More

    Submitted 30 September, 2022; v1 submitted 2 May, 2022; originally announced May 2022.

  36. arXiv:2203.06847  [pdf, other

    eess.SY

    Real-Time Electric Vehicle Smart Charging at Workplaces: A Real-World Case Study

    Authors: Nathaniel Tucker, Gustavo Cezar, Mahnoosh Alizadeh

    Abstract: We study a real-time smart charging algorithm for electric vehicles (EVs) at a workplace parking lot in order to minimize electricity cost from time-of-use electricity rates and demand charges while ensuring that the owners of the EVs receive adequate levels of charge. Notably, due to real-world constraints, our algorithm is agnostic to both the state-of-charge and the departure time of the EVs an… ▽ More

    Submitted 14 March, 2022; originally announced March 2022.

    Comments: 5 pages

  37. arXiv:2202.08132  [pdf, other

    cs.LG

    Prospect Pruning: Finding Trainable Weights at Initialization using Meta-Gradients

    Authors: Milad Alizadeh, Shyam A. Tailor, Luisa M Zintgraf, Joost van Amersfoort, Sebastian Farquhar, Nicholas Donald Lane, Yarin Gal

    Abstract: Pruning neural networks at initialization would enable us to find sparse models that retain the accuracy of the original network while consuming fewer computational resources for training and inference. However, current methods are insufficient to enable this optimization and lead to a large degradation in model performance. In this paper, we identify a fundamental limitation in the formulation of… ▽ More

    Submitted 5 April, 2022; v1 submitted 16 February, 2022; originally announced February 2022.

  38. arXiv:2202.04321  [pdf, other

    cs.NI

    Optimal Congestion Control for Time-varying Wireless Links

    Authors: Prateesh Goyal, Mohammad Alizadeh, Thomas E. Anderson

    Abstract: Modern networks exhibit a high degree of variability in link rates. Cellular network bandwidth inherently varies with receiver motion and orientation, while class-based packet scheduling in datacenter and service provider networks induces high variability in available capacity for network tenants. Recent work has proposed numerous congestion control protocols to cope with this variability, offerin… ▽ More

    Submitted 9 February, 2022; originally announced February 2022.

  39. arXiv:2201.12904  [pdf, other

    cs.LG cs.CV eess.IV stat.ML

    COIN++: Neural Compression Across Modalities

    Authors: Emilien Dupont, Hrushikesh Loya, Milad Alizadeh, Adam Goliński, Yee Whye Teh, Arnaud Doucet

    Abstract: Neural compression algorithms are typically based on autoencoders that require specialized encoder and decoder architectures for different data modalities. In this paper, we propose COIN++, a neural compression framework that seamlessly handles a wide range of data modalities. Our approach is based on converting data to implicit neural representations, i.e. neural functions that map coordinates (s… ▽ More

    Submitted 8 December, 2022; v1 submitted 30 January, 2022; originally announced January 2022.

    Comments: TMLR camera ready

  40. arXiv:2201.05560  [pdf, other

    cs.LG cs.AI cs.NI

    Demystifying Reinforcement Learning in Time-Varying Systems

    Authors: Pouya Hamadanian, Malte Schwarzkopf, Siddartha Sen, Mohammad Alizadeh

    Abstract: Recent research has turned to Reinforcement Learning (RL) to solve challenging decision problems, as an alternative to hand-tuned heuristics. RL can learn good policies without the need for modeling the environment's dynamics. Despite this promise, RL remains an impractical solution for many real-world systems problems. A particularly challenging case occurs when the environment changes over time,… ▽ More

    Submitted 26 January, 2023; v1 submitted 14 January, 2022; originally announced January 2022.

  41. arXiv:2201.01811  [pdf, other

    cs.LG cs.AI cs.NI stat.ML

    CausalSim: A Causal Framework for Unbiased Trace-Driven Simulation

    Authors: Abdullah Alomar, Pouya Hamadanian, Arash Nasr-Esfahany, Anish Agarwal, Mohammad Alizadeh, Devavrat Shah

    Abstract: We present CausalSim, a causal framework for unbiased trace-driven simulation. Current trace-driven simulators assume that the interventions being simulated (e.g., a new algorithm) would not affect the validity of the traces. However, real-world traces are often biased by the choices algorithms make during trace collection, and hence replaying traces under an intervention may lead to incorrect res… ▽ More

    Submitted 5 May, 2023; v1 submitted 5 January, 2022; originally announced January 2022.

    Comments: NSDI'23 Best Paper Award

    Journal ref: 20th USENIX Symposium on Networked Systems Design and Implementation (2023) 1115--1147

  42. arXiv:2112.10065  [pdf, other

    cs.DC cs.CV cs.LG

    Efficient Strong Scaling Through Burst Parallel Training

    Authors: Seo ** Park, Joshua Fried, Sunghyun Kim, Mohammad Alizadeh, Adam Belay

    Abstract: As emerging deep neural network (DNN) models continue to grow in size, using large GPU clusters to train DNNs is becoming an essential requirement to achieving acceptable training times. In this paper, we consider the case where future increases in cluster size will cause the global batch size that can be used to train models to reach a fundamental limit: beyond a certain point, larger global batc… ▽ More

    Submitted 23 May, 2022; v1 submitted 19 December, 2021; originally announced December 2021.

    Comments: MLSys'22

  43. arXiv:2111.12332  [pdf, other

    cs.CR cs.DC

    Longest Chain Consensus Under Bandwidth Constraint

    Authors: Joachim Neu, Srivatsan Sridhar, Lei Yang, David Tse, Mohammad Alizadeh

    Abstract: Spamming attacks are a serious concern for consensus protocols, as witnessed by recent outages of a major blockchain, Solana. They cause congestion and excessive message delays in a real network due to its bandwidth constraints. In contrast, longest chain (LC), an important family of consensus protocols, has previously only been proven secure assuming an idealized network model in which all messag… ▽ More

    Submitted 17 May, 2022; v1 submitted 24 November, 2021; originally announced November 2021.

  44. Strategically revealing intentions in General Lotto games

    Authors: Keith Paarporn, Rahul Chandan, Dan Kovenock, Mahnoosh Alizadeh, Jason R. Marden

    Abstract: Strategic decision-making in uncertain and adversarial environments is crucial for the security of modern systems and infrastructures. A salient feature of many optimal decision-making policies is a level of unpredictability, or randomness, which helps to keep an adversary uncertain about the system's behavior. This paper seeks to explore decision-making policies on the other end of the spectrum -… ▽ More

    Submitted 3 December, 2021; v1 submitted 22 October, 2021; originally announced October 2021.

    Comments: 12 pages

  45. Updating Street Maps using Changes Detected in Satellite Imagery

    Authors: Favyen Bastani, Songtao He, Satvat Jagwani, Mohammad Alizadeh, Hari Balakrishnan, Sanjay Chawla, Sam Madden, Mohammad Amin Sadeghi

    Abstract: Accurately maintaining digital street maps is labor-intensive. To address this challenge, much work has studied automatically processing geospatial data sources such as GPS trajectories and satellite images to reduce the cost of maintaining digital maps. An end-to-end map update system would first process geospatial data sources to extract insights, and second leverage those insights to update and… ▽ More

    Submitted 12 October, 2021; originally announced October 2021.

    Comments: SIGSPATIAL 2021

  46. arXiv:2110.04371  [pdf, other

    cs.NI

    DispersedLedger: High-Throughput Byzantine Consensus on Variable Bandwidth Networks

    Authors: Lei Yang, Seo ** Park, Mohammad Alizadeh, Sreeram Kannan, David Tse

    Abstract: The success of blockchains has sparked interest in large-scale deployments of Byzantine fault tolerant (BFT) consensus protocols over wide area networks. A central feature of such networks is variable communication bandwidth across nodes and across time. We present DispersedLedger, an asynchronous BFT protocol that provides near-optimal throughput in the presence of such variable network bandwidth… ▽ More

    Submitted 12 October, 2021; v1 submitted 8 October, 2021; originally announced October 2021.

    Comments: NSDI '22

    Journal ref: 19th USENIX Symposium on Networked Systems Design and Implementation, 2022

  47. arXiv:2110.02396  [pdf, other

    eess.SY math.OC

    An Online Scheduling Algorithm for a Community Energy Storage System

    Authors: Nathaniel Tucker, Mahnoosh Alizadeh

    Abstract: In this paper, we consider a community energy storage (CES) system that is shared by various electricity consumers who want to charge and discharge the CES throughout a given time span. We study the problem facing the manager of such a CES who must schedule the charging, discharging, and capacity reservations for numerous users. Moreover, we consider the case where requests to charge/discharge the… ▽ More

    Submitted 13 March, 2022; v1 submitted 5 October, 2021; originally announced October 2021.

    Comments: 15 pages

  48. arXiv:2106.14956  [pdf, other

    math.OC cs.DC cs.LG stat.ML

    Robust Distributed Optimization With Randomly Corrupted Gradients

    Authors: Berkay Turan, Cesar A. Uribe, Hoi-To Wai, Mahnoosh Alizadeh

    Abstract: In this paper, we propose a first-order distributed optimization algorithm that is provably robust to Byzantine failures-arbitrary and potentially adversarial behavior, where all the participating agents are prone to failure. We model each agent's state over time as a two-state Markov chain that indicates Byzantine or trustworthy behaviors at different time instants. We set no restrictions on the… ▽ More

    Submitted 17 June, 2022; v1 submitted 28 June, 2021; originally announced June 2021.

    Comments: 21 pages, 5 figures

  49. arXiv:2106.12133  [pdf, other

    cs.GT eess.SY math.OC

    A General Lotto game with asymmetric budget uncertainty

    Authors: Keith Paarporn, Rahul Chandan, Mahnoosh Alizadeh, Jason R. Marden

    Abstract: The General Lotto game is a popular variant of the famous Colonel Blotto game, in which two opposing players allocate limited resources over many battlefields. In this paper, we consider incomplete and asymmetric information formulations regarding the resource budgets of the players. In particular, one of the player's resource budget is common knowledge while the other player's is private. We prov… ▽ More

    Submitted 14 October, 2022; v1 submitted 22 June, 2021; originally announced June 2021.

  50. arXiv:2106.05378  [pdf, other

    cs.LG

    Feature and Parameter Selection in Stochastic Linear Bandits

    Authors: Ahmadreza Moradipari, Berkay Turan, Yasin Abbasi-Yadkori, Mahnoosh Alizadeh, Mohammad Ghavamzadeh

    Abstract: We study two model selection settings in stochastic linear bandits (LB). In the first setting, which we refer to as feature selection, the expected reward of the LB problem is in the linear span of at least one of $M$ feature maps (models). In the second setting, the reward parameter of the LB problem is arbitrarily selected from $M$ models represented as (possibly) overlap** balls in… ▽ More

    Submitted 17 June, 2022; v1 submitted 9 June, 2021; originally announced June 2021.

    Journal ref: International Conference on Machine Learning, 2022