Skip to main content

Showing 1–50 of 97 results for author: Avestimehr, A S

.
  1. arXiv:2110.02177  [pdf, other

    cs.LG cs.CR cs.DC cs.IT stat.ML

    Secure Aggregation for Buffered Asynchronous Federated Learning

    Authors: **hyun So, Ramy E. Ali, Başak Güler, A. Salman Avestimehr

    Abstract: Federated learning (FL) typically relies on synchronous training, which is slow due to stragglers. While asynchronous training handles stragglers efficiently, it does not ensure privacy due to the incompatibility with the secure aggregation protocols. A buffered asynchronous training protocol known as FedBuff has been proposed recently which bridges the gap between synchronous and asynchronous tra… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

    Comments: arXiv admin note: substantial overlap with arXiv:2109.14236

  2. arXiv:2109.09868  [pdf, other

    cs.LG cs.DC cs.IT

    ApproxIFER: A Model-Agnostic Approach to Resilient and Robust Prediction Serving Systems

    Authors: Mahdi Soleymani, Ramy E. Ali, Hessam Mahdavifar, A. Salman Avestimehr

    Abstract: Due to the surge of cloud-assisted AI services, the problem of designing resilient prediction serving systems that can effectively cope with stragglers/failures and minimize response delays has attracted much interest. The common approach for tackling this problem is replication which assigns the same prediction task to multiple workers. This approach, however, is very inefficient and incurs signi… ▽ More

    Submitted 20 September, 2021; originally announced September 2021.

  3. Basil: A Fast and Byzantine-Resilient Approach for Decentralized Training

    Authors: Ahmed Roushdy Elkordy, Saurav Prakash, A. Salman Avestimehr

    Abstract: Detection and mitigation of Byzantine behaviors in a decentralized learning setting is a daunting task, especially when the data distribution at the users is heterogeneous. As our main contribution, we propose Basil, a fast and computationally efficient Byzantine robust algorithm for decentralized training systems, which leverages a novel sequential, memory assisted and performance-based criteria… ▽ More

    Submitted 6 October, 2022; v1 submitted 16 September, 2021; originally announced September 2021.

    Comments: Final version was accepted for publication in IEEE JSAC Series on Machine Learning for Communications and Networks. A part of the work was presented at the NeurIPS Workshop on Privacy in Machine Learning, 2021

  4. arXiv:2101.11653  [pdf, other

    cs.IT cs.DC cs.LG

    List-Decodable Coded Computing: Breaking the Adversarial Toleration Barrier

    Authors: Mahdi Soleymani, Ramy E. Ali, Hessam Mahdavifar, A. Salman Avestimehr

    Abstract: We consider the problem of coded computing, where a computational task is performed in a distributed fashion in the presence of adversarial workers. We propose techniques to break the adversarial toleration threshold barrier previously known in coded computing. More specifically, we leverage list-decoding techniques for folded Reed-Solomon codes and propose novel algorithms to recover the correct… ▽ More

    Submitted 19 August, 2021; v1 submitted 27 January, 2021; originally announced January 2021.

  5. arXiv:2011.05530  [pdf, other

    cs.LG cs.CR cs.IT

    On Polynomial Approximations for Privacy-Preserving and Verifiable ReLU Networks

    Authors: Ramy E. Ali, **hyun So, A. Salman Avestimehr

    Abstract: Outsourcing deep neural networks (DNNs) inference tasks to an untrusted cloud raises data privacy and integrity concerns. While there are many techniques to ensure privacy and integrity for polynomial-based computations, DNNs involve non-polynomial computations. To address these challenges, several privacy-preserving and verifiable inference techniques have been proposed based on replacing the non… ▽ More

    Submitted 6 February, 2024; v1 submitted 10 November, 2020; originally announced November 2020.

  6. arXiv:2011.01963  [pdf, ps, other

    cs.LG cs.CR cs.IT stat.ML

    A Scalable Approach for Privacy-Preserving Collaborative Machine Learning

    Authors: **hyun So, Basak Guler, A. Salman Avestimehr

    Abstract: We consider a collaborative learning scenario in which multiple data-owners wish to jointly train a logistic regression model, while kee** their individual datasets private from the other parties. We propose COPML, a fully-decentralized training framework that achieves scalability and privacy-protection simultaneously. The key idea of COPML is to securely encode the individual datasets to distri… ▽ More

    Submitted 3 November, 2020; originally announced November 2020.

  7. arXiv:2009.14388  [pdf, other

    cs.IT eess.SY

    Secure Aggregation with Heterogeneous Quantization in Federated Learning

    Authors: Ahmed Roushdy Elkordy, A. Salman Avestimehr

    Abstract: Secure model aggregation across many users is a key component of federated learning systems. The state-of-the-art protocols for secure model aggregation, which are based on additive masking, require all users to quantize their model updates to the same level of quantization. This severely degrades their performance due to lack of adaptation to available bandwidth at different users. We propose thr… ▽ More

    Submitted 15 November, 2021; v1 submitted 29 September, 2020; originally announced September 2020.

  8. arXiv:2008.08565  [pdf, other

    cs.IT cs.DC cs.LG

    Analog Lagrange Coded Computing

    Authors: Mahdi Soleymani, Hessam Mahdavifar, A. Salman Avestimehr

    Abstract: A distributed computing scenario is considered, where the computational power of a set of worker nodes is used to perform a certain computation task over a dataset that is dispersed among the workers. Lagrange coded computing (LCC), proposed by Yu et al., leverages the well-known Lagrange polynomial to perform polynomial evaluation of the dataset in such a scenario in an efficient parallel fashion… ▽ More

    Submitted 29 January, 2021; v1 submitted 19 August, 2020; originally announced August 2020.

  9. arXiv:2007.11115  [pdf, ps, other

    cs.CR cs.DC cs.LG stat.ML

    Byzantine-Resilient Secure Federated Learning

    Authors: **hyun So, Basak Guler, A. Salman Avestimehr

    Abstract: Secure federated learning is a privacy-preserving framework to improve machine learning models by training over large volumes of data collected by mobile users. This is achieved through an iterative process where, at each iteration, users update a global model using their local datasets. Each user then masks its local model via random keys, and the masked models are aggregated at a central server… ▽ More

    Submitted 20 February, 2021; v1 submitted 21 July, 2020; originally announced July 2020.

  10. arXiv:2007.08803  [pdf, other

    cs.LG cs.CR cs.DC cs.IT stat.ML

    Privacy-Preserving Distributed Learning in the Analog Domain

    Authors: Mahdi Soleymani, Hessam Mahdavifar, A. Salman Avestimehr

    Abstract: We consider the critical problem of distributed learning over data while kee** it private from the computational servers. The state-of-the-art approaches to this problem rely on quantizing the data into a finite field, so that the cryptographic approaches for secure multiparty computing can then be employed. These approaches, however, can result in substantial accuracy losses due to fixed-point… ▽ More

    Submitted 17 July, 2020; originally announced July 2020.

  11. arXiv:2007.03273  [pdf, other

    cs.DC cs.LG stat.ML

    Coded Computing for Federated Learning at the Edge

    Authors: Saurav Prakash, Sagar Dhakal, Mustafa Akdeniz, A. Salman Avestimehr, Nageen Himayat

    Abstract: Federated Learning (FL) is an exciting new paradigm that enables training a global model from data generated locally at the client nodes, without moving client data to a centralized server. Performance of FL in a multi-access edge computing (MEC) network suffers from slow convergence due to heterogeneity and stochastic fluctuations in compute power and communication link qualities across clients.… ▽ More

    Submitted 9 May, 2021; v1 submitted 7 July, 2020; originally announced July 2020.

    Comments: Work accepted for presentation at the International Workshop on Federated Learning for User Privacy and Data Confidentiality, in Conjunction with ICML 2020 (FL-ICML'20). This work was part of Saurav Prakash's internship projects at Intel. arXiv admin note: text overlap with arXiv:2011.06223

  12. arXiv:2006.10581  [pdf, other

    cs.LG cs.IT stat.ML

    Minimax Lower Bounds for Transfer Learning with Linear and One-hidden Layer Neural Networks

    Authors: Seyed Mohammadreza Mousavi Kalan, Zalan Fabian, A. Salman Avestimehr, Mahdi Soltanolkotabi

    Abstract: Transfer learning has emerged as a powerful technique for improving the performance of machine learning models on new domains where labeled training data may be scarce. In this approach a model trained for a source task, where plenty of labeled training data is available, is used as a starting point for training a model on a related target task with only few labeled training data. Despite recent e… ▽ More

    Submitted 16 June, 2020; originally announced June 2020.

  13. arXiv:2002.04156  [pdf, ps, other

    cs.LG cs.CR cs.DC cs.IT stat.ML

    Turbo-Aggregate: Breaking the Quadratic Aggregation Barrier in Secure Federated Learning

    Authors: **hyun So, Basak Guler, A. Salman Avestimehr

    Abstract: Federated learning is a distributed framework for training machine learning models over the data residing at mobile devices, while protecting the privacy of individual users. A major bottleneck in scaling federated learning to a large number of users is the overhead of secure model aggregation across many users. In particular, the overhead of the state-of-the-art protocols for secure model aggrega… ▽ More

    Submitted 20 February, 2021; v1 submitted 10 February, 2020; originally announced February 2020.

  14. arXiv:2001.08720  [pdf, other

    cs.DC cs.IT

    Coded Computing for Secure Boolean Computations

    Authors: Chien-Sheng Yang, A. Salman Avestimehr

    Abstract: The growing size of modern datasets necessitates splitting a large scale computation into smaller computations and operate in a distributed manner. Adversaries in a distributed system deliberately send erroneous data in order to affect the computation for their benefit. Boolean functions are the key components of many applications, e.g., verification functions in blockchain systems and design of c… ▽ More

    Submitted 4 March, 2021; v1 submitted 23 January, 2020; originally announced January 2020.

  15. arXiv:2001.05101  [pdf, other

    cs.IT cs.DC

    Entangled Polynomial Codes for Secure, Private, and Batch Distributed Matrix Multiplication: Breaking the "Cubic" Barrier

    Authors: Qian Yu, A. Salman Avestimehr

    Abstract: In distributed matrix multiplication, a common scenario is to assign each worker a fraction of the multiplication task, by partitioning the input matrices into smaller submatrices. In particular, by dividing two input matrices into $m$-by-$p$ and $p$-by-$n$ subblocks, a single multiplication task can be viewed as computing linear combinations of $pmn$ submatrix products, which can be assigned to… ▽ More

    Submitted 13 April, 2020; v1 submitted 14 January, 2020; originally announced January 2020.

    Comments: To appear in ISIT 2020

  16. arXiv:1912.09512  [pdf, other

    cs.DC

    Edge Computing in the Dark: Leveraging Contextual-Combinatorial Bandit and Coded Computing

    Authors: Chien-Sheng Yang, Ramtin Pedarsani, A. Salman Avestimehr

    Abstract: With recent advancements in edge computing capabilities, there has been a significant increase in utilizing the edge cloud for event-driven and time-sensitive computations. However, large-scale edge computing networks can suffer substantially from unpredictable and unreliable computing resources which can result in high variability of service quality. Thus, it is crucial to design efficient task s… ▽ More

    Submitted 4 March, 2021; v1 submitted 19 December, 2019; originally announced December 2019.

  17. arXiv:1904.13206  [pdf, other

    cs.IT cs.DC

    Harmonic Coding: An Optimal Linear Code for Privacy-Preserving Gradient-Type Computation

    Authors: Qian Yu, A. Salman Avestimehr

    Abstract: We consider the problem of distributedly computing a general class of functions, referred to as gradient-type computation, while maintaining the privacy of the input dataset. Gradient-type computation evaluates the sum of some `partial gradients', defined as polynomials of subsets of the input. It underlies many algorithms in machine learning and data analytics. We propose Harmonic Coding, which u… ▽ More

    Submitted 30 April, 2019; originally announced April 2019.

    Comments: To appear in ISIT 2019

  18. arXiv:1904.05522  [pdf, other

    cs.DC

    Timely-Throughput Optimal Coded Computing over Cloud Networks

    Authors: Chien-Sheng Yang, Ramtin Pedarsani, A. Salman Avestimehr

    Abstract: In modern distributed computing systems, unpredictable and unreliable infrastructures result in high variability of computing resources. Meanwhile, there is significantly increasing demand for timely and event-driven services with deadline constraints. Motivated by measurements over Amazon EC2 clusters, we consider a two-state Markov model for variability of computing speed in cloud networks. In t… ▽ More

    Submitted 11 April, 2019; originally announced April 2019.

    Comments: to appear in MobiHoc 2019

  19. arXiv:1902.01981  [pdf, other

    stat.ML cs.DC cs.IT cs.LG stat.CO

    CodedReduce: A Fast and Robust Framework for Gradient Aggregation in Distributed Learning

    Authors: Amirhossein Reisizadeh, Saurav Prakash, Ramtin Pedarsani, Amir Salman Avestimehr

    Abstract: We focus on the commonly used synchronous Gradient Descent paradigm for large-scale distributed learning, for which there has been a growing interest to develop efficient and robust gradient aggregation strategies that overcome two key system bottlenecks: communication bandwidth and stragglers' delays. In particular, Ring-AllReduce (RAR) design has been proposed to avoid bandwidth bottleneck at an… ▽ More

    Submitted 29 September, 2021; v1 submitted 5 February, 2019; originally announced February 2019.

    Comments: Final version to appear in IEEE Transactions on Networking

  20. arXiv:1902.00641  [pdf, ps, other

    cs.LG cs.CR cs.IT stat.ML

    CodedPrivateML: A Fast and Privacy-Preserving Framework for Distributed Machine Learning

    Authors: **hyun So, Basak Guler, A. Salman Avestimehr

    Abstract: How to train a machine learning model while kee** the data private and secure? We present CodedPrivateML, a fast and scalable approach to this critical problem. CodedPrivateML keeps both the data and the model information-theoretically private, while allowing efficient parallelization of training across distributed workers. We characterize CodedPrivateML's privacy threshold and prove its converg… ▽ More

    Submitted 20 February, 2021; v1 submitted 2 February, 2019; originally announced February 2019.

  21. arXiv:1901.06587  [pdf, other

    cs.LG cs.DC cs.IT stat.ML

    Fitting ReLUs via SGD and Quantized SGD

    Authors: Seyed Mohammadreza Mousavi Kalan, Mahdi Soltanolkotabi, A. Salman Avestimehr

    Abstract: In this paper we focus on the problem of finding the optimal weights of the shallowest of neural networks consisting of a single Rectified Linear Unit (ReLU). These functions are of the form $\mathbf{x}\rightarrow \max(0,\langle\mathbf{w},\mathbf{x}\rangle)$ with $\mathbf{w}\in\mathbb{R}^d$ denoting the weight vector. We focus on a planted model where the inputs are chosen i.i.d. from a Gaussian d… ▽ More

    Submitted 1 April, 2019; v1 submitted 19 January, 2019; originally announced January 2019.

  22. arXiv:1901.03379  [pdf, ps, other

    cs.CR cs.IT

    INTERPOL: Information Theoretically Verifiable Polynomial Evaluation

    Authors: Saeid Sahraei, A. Salman Avestimehr

    Abstract: We study the problem of verifiable polynomial evaluation in the user-server and multi-party setups. We propose {INTERPOL}, an information-theoretically verifiable algorithm that allows a user to delegate the evaluation of a polynomial to a server, and verify the correctness of the results with high probability and in sublinear complexity. Compared to the existing approaches which typically rely on… ▽ More

    Submitted 27 April, 2019; v1 submitted 10 January, 2019; originally announced January 2019.

  23. arXiv:1809.10361  [pdf, other

    cs.CR cs.DC cs.IT

    PolyShard: Coded Sharding Achieves Linearly Scaling Efficiency and Security Simultaneously

    Authors: Songze Li, Mingchao Yu, Chien-Sheng Yang, A. Salman Avestimehr, Sreeram Kannan, Pramod Viswanath

    Abstract: Today's blockchain designs suffer from a trilemma claiming that no blockchain system can simultaneously achieve decentralization, security, and performance scalability. For current blockchain systems, as more nodes join the network, the efficiency of the system (computation, communication, and storage) stays constant at best. A leading idea for enabling blockchains to scale efficiency is the notio… ▽ More

    Submitted 24 January, 2020; v1 submitted 27 September, 2018; originally announced September 2018.

  24. arXiv:1805.09934  [pdf, other

    cs.IT cs.DC cs.LG

    Polynomially Coded Regression: Optimal Straggler Mitigation via Data Encoding

    Authors: Songze Li, Seyed Mohammadreza Mousavi Kalan, Qian Yu, Mahdi Soltanolkotabi, A. Salman Avestimehr

    Abstract: We consider the problem of training a least-squares regression model on a large dataset using gradient descent. The computation is carried out on a distributed system consisting of a master node and multiple worker nodes. Such distributed systems are significantly slowed down due to the presence of slow-running machines (stragglers) as well as various communication bottlenecks. We propose "polynom… ▽ More

    Submitted 24 May, 2018; originally announced May 2018.

  25. arXiv:1805.01993  [pdf, other

    cs.IT cs.DC

    Compressed Coded Distributed Computing

    Authors: Songze Li, Mohammad Ali Maddah-Ali, A. Salman Avestimehr

    Abstract: Communication overhead is one of the major performance bottlenecks in large-scale distributed computing systems, in particular for machine learning applications. Conventionally, compression techniques are used to reduce the load of communication by combining intermediate results of the same computation task as much as possible. Recently, via the development of coded distributed computing (CDC), it… ▽ More

    Submitted 4 May, 2018; originally announced May 2018.

    Comments: A shorter version to appear in ISIT 2018

  26. arXiv:1804.06468  [pdf, other

    cs.DC eess.SY

    Communication-Aware Scheduling of Serial Tasks for Dispersed Computing

    Authors: Chien-Sheng Yang, Ramtin Pedarsani, A. Salman Avestimehr

    Abstract: There is a growing interest in development of in-network dispersed computing paradigms that leverage the computing capabilities of heterogeneous resources dispersed across the network for processing massive amount of data is collected at the edge of the network. We consider the problem of task scheduling for such networks, in a dynamic setting in which arriving computation jobs are modeled as chai… ▽ More

    Submitted 25 May, 2019; v1 submitted 17 April, 2018; originally announced April 2018.

    Comments: accepted to appear in IEEE/ACM Transactions on Networking

  27. arXiv:1804.00217  [pdf, ps, other

    cs.IT cs.LG stat.ML

    Fundamental Resource Trade-offs for Encoded Distributed Optimization

    Authors: A. Salman Avestimehr, Seyed Mohammadreza Mousavi Kalan, Mahdi Soltanolkotabi

    Abstract: Dealing with the shear size and complexity of today's massive data sets requires computational platforms that can analyze data in a parallelized and distributed fashion. A major bottleneck that arises in such modern distributed computing environments is that some of the worker nodes may run slow. These nodes a.k.a.~stragglers can significantly slow down computation as the slowest node may dictate… ▽ More

    Submitted 1 April, 2019; v1 submitted 31 March, 2018; originally announced April 2018.

  28. Straggler Mitigation in Distributed Matrix Multiplication: Fundamental Limits and Optimal Coding

    Authors: Qian Yu, Mohammad Ali Maddah-Ali, A. Salman Avestimehr

    Abstract: We consider the problem of massive matrix multiplication, which underlies many data analytic applications, in a large-scale distributed system comprising a group of worker nodes. We target the stragglers' delay performance bottleneck, which is due to the unpredictable latency in waiting for slowest nodes (or stragglers) to finish their tasks. We propose a novel coding strategy, named \emph{entangl… ▽ More

    Submitted 9 April, 2020; v1 submitted 23 January, 2018; originally announced January 2018.

    Journal ref: Published in: IEEE Transactions on Information Theory (Jan. 2020)

  29. Coded Computing for Distributed Graph Analytics

    Authors: Saurav Prakash, Amirhossein Reisizadeh, Ramtin Pedarsani, Amir Salman Avestimehr

    Abstract: Performance of distributed graph processing systems significantly suffers from 'communication bottleneck' as a large number of messages are exchanged among servers at each step of the computation. Motivated by graph based MapReduce, we propose a coded computing framework that leverages computation redundancy to alleviate the communication bottleneck in distributed graph processing. We develop a no… ▽ More

    Submitted 9 June, 2020; v1 submitted 16 January, 2018; originally announced January 2018.

    Comments: Accepted for publication in the IEEE Transactions on Information Theory

  30. An Approximation Algorithm for Optimal Clique Cover Delivery in Coded Caching

    Authors: Seyed Mohammad Asghari, Yi Ouyang, Ashutosh Nayyar, A. Salman Avestimehr

    Abstract: Coded caching can significantly reduce the communication bandwidth requirement for satisfying users' demands by utilizing the multicasting gain among multiple users. Most existing works assume that the users follow the prescriptions for content placement made by the system. However, users may prefer to decide what files to cache. To address this issue, we consider a network consisting of a file se… ▽ More

    Submitted 28 March, 2019; v1 submitted 29 October, 2017; originally announced October 2017.

    Comments: Accepted for publication in IEEE Transactions on Communications

  31. arXiv:1710.09990  [pdf, other

    cs.IT cs.DC

    Near-Optimal Straggler Mitigation for Distributed Gradient Methods

    Authors: Songze Li, Seyed Mohammadreza Mousavi Kalan, A. Salman Avestimehr, Mahdi Soltanolkotabi

    Abstract: Modern learning algorithms use gradient descent updates to train inferential models that best explain data. Scaling these approaches to massive data sizes requires proper distributed gradient descent schemes where distributed worker nodes compute partial gradients based on their partial and local data sets, and send the results to a master node where all the computations are aggregated into a full… ▽ More

    Submitted 27 October, 2017; originally announced October 2017.

  32. arXiv:1710.06471  [pdf, other

    cs.DC cs.IT cs.LG

    Coded Fourier Transform

    Authors: Qian Yu, Mohammad Ali Maddah-Ali, A. Salman Avestimehr

    Abstract: We consider the problem of computing the Fourier transform of high-dimensional vectors, distributedly over a cluster of machines consisting of a master node and multiple worker nodes, where the worker nodes can only store and process a fraction of the inputs. We show that by exploiting the algebraic structure of the Fourier transform operation and leveraging concepts from coding theory, one can ef… ▽ More

    Submitted 17 October, 2017; originally announced October 2017.

  33. arXiv:1709.00196  [pdf, other

    cs.DC cs.IT

    On Heterogeneous Coded Distributed Computing

    Authors: Mehrdad Kiamari, Chenwei Wang, A. Salman Avestimehr

    Abstract: We consider the recently proposed Coded Distributed Computing (CDC) framework that leverages carefully designed redundant computations to enable coding opportunities that substantially reduce the communication load of distributed computing. We generalize this framework to heterogeneous systems where different nodes in the computing cluster can have different storage (or processing) capabilities. W… ▽ More

    Submitted 1 September, 2017; originally announced September 2017.

    Comments: To appear in IEEE GLOBECOM 2017

  34. arXiv:1708.09596  [pdf, other

    cs.IT

    SINR-Threshold Scheduling with Binary Power Control for D2D Networks

    Authors: Mehrdad Kiamari, Chenwei Wang, A. Salman Avestimehr, Haralabos Papadopoulos

    Abstract: In this paper, we consider a device-to-device communication network in which $K$ transmitter-receiver pairs are sharing spectrum with each other. We propose a novel but simple binary scheduling scheme for this network to maximize the average sum rate of the pairs. According to the scheme, each receiver predicts its Signal-to-Interference-plus-Noise Ratio (SINR), assuming \emph{all} other user pair… ▽ More

    Submitted 31 August, 2017; originally announced August 2017.

    Comments: To appear in IEEE GLOBECOM 2017

  35. arXiv:1706.07523  [pdf, other

    cs.IT

    Communication-Aware Computing for Edge Processing

    Authors: Songze Li, Mohammad Ali Maddah-Ali, A. Salman Avestimehr

    Abstract: We consider a mobile edge computing problem, in which mobile users offload their computation tasks to computing nodes (e.g., base stations) at the network edge. The edge nodes compute the requested functions and communicate the computed results to the users via wireless links. For this problem, we propose a Universal Coded Edge Computing (UCEC) scheme for linear functions to simultaneously minimiz… ▽ More

    Submitted 22 June, 2017; originally announced June 2017.

    Comments: To Appear in ISIT 2017

  36. arXiv:1705.10464  [pdf, other

    cs.IT cs.DC

    Polynomial Codes: an Optimal Design for High-Dimensional Coded Matrix Multiplication

    Authors: Qian Yu, Mohammad Ali Maddah-Ali, A. Salman Avestimehr

    Abstract: We consider a large-scale matrix multiplication problem where the computation is carried out using a distributed system with a master node and multiple worker nodes, where each worker can store parts of the input matrices. We propose a computation strategy that leverages ideas from coding theory to design intermediate computations at the worker nodes, in order to efficiently deal with straggling w… ▽ More

    Submitted 24 January, 2018; v1 submitted 30 May, 2017; originally announced May 2017.

  37. arXiv:1705.00412  [pdf, other

    cs.IT

    Capacity Region of the Symmetric Injective K-User Deterministic Interference Channel

    Authors: Mehrdad Kiamari, A. Salman Avestimehr

    Abstract: We characterize the capacity region of the symmetric injective K-user Deterministic Interference Channel (DIC) for all channel parameters. The achievable rate region is derived by first projecting the achievable rate region of Han-Kobayashi (HK) scheme, which is in terms of common and private rates for each user, along the direction of aggregate rates for each user (i.e., the sum of common and pri… ▽ More

    Submitted 30 April, 2017; originally announced May 2017.

    Comments: A shorter version of this paper to appear in International Symposium on Information Theory (ISIT) 2017

  38. arXiv:1702.07297  [pdf, other

    cs.IT cs.DC

    How to Optimally Allocate Resources for Coded Distributed Computing?

    Authors: Qian Yu, Songze Li, Mohammad Ali Maddah-Ali, A. Salman Avestimehr

    Abstract: Today's data centers have an abundance of computing resources, hosting server clusters consisting of as many as tens or hundreds of thousands of machines. To execute a complex computing task over a data center, it is natural to distribute computations across many nodes to take advantage of parallel processing. However, as we allocate more and more computing resources to a computation task and furt… ▽ More

    Submitted 23 February, 2017; originally announced February 2017.

  39. arXiv:1702.06082  [pdf, other

    cs.IT cs.DC

    Coding for Distributed Fog Computing

    Authors: Songze Li, Mohammad Ali Maddah-Ali, A. Salman Avestimehr

    Abstract: Redundancy is abundant in Fog networks (i.e., many computing and storage points) and grows linearly with network size. We demonstrate the transformational role of coding in Fog computing for leveraging such redundancy to substantially reduce the bandwidth consumption and latency of computing. In particular, we discuss two recently proposed coding concepts, namely Minimum Bandwidth Codes and Minimu… ▽ More

    Submitted 20 February, 2017; originally announced February 2017.

    Comments: To appear in IEEE Communications Magazine, Issue on Fog Computing and Networking

  40. arXiv:1702.04850  [pdf, other

    cs.DC cs.IT

    Coded TeraSort

    Authors: Songze Li, Sucha Supittayapornpong, Mohammad Ali Maddah-Ali, A. Salman Avestimehr

    Abstract: We focus on sorting, which is the building block of many machine learning algorithms, and propose a novel distributed sorting algorithm, named Coded TeraSort, which substantially improves the execution time of the TeraSort benchmark in Hadoop MapReduce. The key idea of Coded TeraSort is to impose structured redundancy in data, in order to enable in-network coding opportunities that overcome the da… ▽ More

    Submitted 15 February, 2017; originally announced February 2017.

    Comments: to appear in proceedings of 2017 International Workshop on Parallel and Distributed Computing for Large Scale Machine Learning and Big Data Analytics

  41. arXiv:1702.04563  [pdf, other

    cs.IT

    Characterizing the Rate-Memory Tradeoff in Cache Networks within a Factor of 2

    Authors: Qian Yu, Mohammad Ali Maddah-Ali, A. Salman Avestimehr

    Abstract: We consider a basic caching system, where a single server with a database of $N$ files (e.g. movies) is connected to a set of $K$ users through a shared bottleneck link. Each user has a local cache memory with a size of $M$ files. The system operates in two phases: a placement phase, where each cache memory is populated up to its size from the database, and a following delivery phase, where each u… ▽ More

    Submitted 31 August, 2018; v1 submitted 15 February, 2017; originally announced February 2017.

  42. arXiv:1701.05973  [pdf, ps, other

    cs.DC cs.IT

    Coded Computation over Heterogeneous Clusters

    Authors: Amirhossein Reisizadeh, Saurav Prakash, Ramtin Pedarsani, Amir Salman Avestimehr

    Abstract: In large-scale distributed computing clusters, such as Amazon EC2, there are several types of "system noise" that can result in major degradation of performance: bottlenecks due to limited communication bandwidth, latency due to straggler nodes, etc. On the other hand, these systems enjoy abundance of redundancy - a vast number of computing nodes and large storage capacity. There have been recent… ▽ More

    Submitted 19 June, 2019; v1 submitted 20 January, 2017; originally announced January 2017.

    Comments: This work is published in IEEE Transaction on Information Theory (2019). A preliminary version of this work was published in IEEE International Symposium on Information Theory (ISIT) 2017

  43. arXiv:1701.05881   

    cs.IT

    On the Optimality of Separation between Caching and Delivery in General Cache Networks

    Authors: Navid Naderializadeh, Mohammad Ali Maddah-Ali, A. Salman Avestimehr

    Abstract: We consider a system, containing a library of multiple files and a general memoryless communication network through which a server is connected to multiple users, each equipped with a local isolated cache of certain size that can be used to store part of the library. Each user will ask for one of the files in the library, which needs to be delivered by the server through the intermediate communica… ▽ More

    Submitted 5 May, 2018; v1 submitted 20 January, 2017; originally announced January 2017.

    Comments: Presented in part at the 2017 IEEE International Symposium on Information Theory (ISIT) -- withdrawn due to possible errors in the achievability proof in Section IV-A

  44. The Exact Rate-Memory Tradeoff for Caching with Uncoded Prefetching

    Authors: Qian Yu, Mohammad Ali Maddah-Ali, A. Salman Avestimehr

    Abstract: We consider a basic cache network, in which a single server is connected to multiple users via a shared bottleneck link. The server has a database of files (content). Each user has an isolated memory that can be used to cache content in a prefetching phase. In a following delivery phase, each user requests a file from the database, and the server needs to deliver users' demands as efficiently as p… ▽ More

    Submitted 18 February, 2019; v1 submitted 25 September, 2016; originally announced September 2016.

    Journal ref: Published in: IEEE Transactions on Information Theory ( Volume: 64, Issue: 2, Feb. 2018 )

  45. arXiv:1609.01690  [pdf, other

    cs.IT cs.DC

    A Unified Coding Framework for Distributed Computing with Straggling Servers

    Authors: Songze Li, Mohammad Ali Maddah-Ali, A. Salman Avestimehr

    Abstract: We propose a unified coded framework for distributed computing with straggling servers, by introducing a tradeoff between "latency of computation" and "load of communication" for some linear computation tasks. We show that the coded scheme of [1]-[3] that repeats the intermediate computations to create coded multicasting opportunities to reduce communication load, and the coded scheme of [4], [5]… ▽ More

    Submitted 6 September, 2016; originally announced September 2016.

    Comments: a shorter version to appear in NetCod 2016

  46. arXiv:1608.05743  [pdf, ps, other

    cs.IT cs.DC

    A Scalable Framework for Wireless Distributed Computing

    Authors: Songze Li, Qian Yu, Mohammad Ali Maddah-Ali, A. Salman Avestimehr

    Abstract: We consider a wireless distributed computing system, in which multiple mobile users, connected wirelessly through an access point, collaborate to perform a computation task. In particular, users communicate with each other via the access point to exchange their locally computed intermediate computation results, which is known as data shuffling. We propose a scalable framework for this system, in w… ▽ More

    Submitted 5 May, 2017; v1 submitted 19 August, 2016; originally announced August 2016.

    Comments: To appear in IEEE/ACM Transactions on Networking

  47. arXiv:1605.05710  [pdf, other

    cs.LG

    Active Learning On Weighted Graphs Using Adaptive And Non-adaptive Approaches

    Authors: Eyal En Gad, Akshay Gadde, A. Salman Avestimehr, Antonio Ortega

    Abstract: This paper studies graph-based active learning, where the goal is to reconstruct a binary signal defined on the nodes of a weighted graph, by sampling it on a small subset of the nodes. A new sampling algorithm is proposed, which sequentially selects the graph nodes to be sampled, based on an aggressive search for the boundary of the signal over the graph. The algorithm generalizes a recent method… ▽ More

    Submitted 18 May, 2016; originally announced May 2016.

    Comments: In ICASSP 2016

  48. Topological Interference Management with Reconfigurable Antennas

    Authors: Heecheol Yang, Navid Naderializadeh, Amir Salman Avestimehr, Jungwoo Lee

    Abstract: We study the symmetric degrees-of-freedom (DoF) of partially connected interference networks under linear coding strategies at transmitters without channel state information beyond topology. We assume that the receivers are equipped with reconfigurable antennas that can switch among their preset modes. In such a network setting, we characterize the class of network topologies in which half linear… ▽ More

    Submitted 4 May, 2016; originally announced May 2016.

    Comments: This work will be presented in part at the 2016 IEEE International Symposium on Information Theory (ISIT)

  49. arXiv:1604.07086  [pdf, other

    cs.IT cs.DC

    A Fundamental Tradeoff between Computation and Communication in Distributed Computing

    Authors: Songze Li, Mohammad Ali Maddah-Ali, Qian Yu, A. Salman Avestimehr

    Abstract: How can we optimally trade extra computing power to reduce the communication load in distributed computing? We answer this question by characterizing a fundamental tradeoff between computation and communication in distributed computing, i.e., the two are inversely proportional to each other. More specifically, a general distributed computing framework, motivated by commonly used structures like… ▽ More

    Submitted 22 September, 2017; v1 submitted 24 April, 2016; originally announced April 2016.

    Comments: To appear in IEEE Transactions on Information Theory

  50. Fundamental Limits of Cache-Aided Interference Management

    Authors: Navid Naderializadeh, Mohammad Ali Maddah-Ali, A. Salman Avestimehr

    Abstract: We consider a system comprising a library of $N$ files (e.g., movies) and a wireless network with $K_T$ transmitters, each equipped with a local cache of size of $M_T$ files, and $K_R$ receivers, each equipped with a local cache of size of $M_R$ files. Each receiver will ask for one of the $N$ files in the library, which needs to be delivered. The objective is to design the cache placement (withou… ▽ More

    Submitted 20 April, 2016; v1 submitted 12 February, 2016; originally announced February 2016.

    Comments: Submitted for publication. Short version to appear at the 2016 IEEE International Symposium on Information Theory (ISIT)