Skip to main content

Showing 1–9 of 9 results for author: Babaei, A

.
  1. arXiv:2406.09425  [pdf, other

    cs.DC cs.SE eess.SY

    SGPRS: Seamless GPU Partitioning Real-Time Scheduler for Periodic Deep Learning Workloads

    Authors: Amir Fakhim Babaei, Thidapat Chantem

    Abstract: Deep Neural Networks (DNNs) are useful in many applications, including transportation, healthcare, and speech recognition. Despite various efforts to improve accuracy, few works have studied DNN in the context of real-time requirements. Coarse resource allocation and sequential execution in existing frameworks result in underutilization. In this work, we conduct GPU speedup gain analysis and propo… ▽ More

    Submitted 13 April, 2024; originally announced June 2024.

    Comments: 2 pages, accepted and presented in DATE 2024 Conference

  2. arXiv:2401.14278  [pdf, other

    cs.DC

    CHIRON: Accelerating Node Synchronization without Security Trade-offs in Distributed Ledgers

    Authors: Ray Neiheiser, Arman Babaei, Giannis Alexopoulos, Marios Kogias, Eleftherios Kokoris Kogias

    Abstract: Blockchain performance has historically faced challenges posed by the throughput limitations of consensus algorithms. Recent breakthroughs in research have successfully alleviated these constraints by introducing a modular architecture that decouples consensus from execution. The move toward independent optimization of the consensus layer has shifted attention to the execution layer. While concu… ▽ More

    Submitted 31 January, 2024; v1 submitted 25 January, 2024; originally announced January 2024.

  3. arXiv:2309.04911  [pdf, other

    cs.CR cs.AI cs.LG cs.NI

    A Review of Machine Learning-based Security in Cloud Computing

    Authors: Aptin Babaei, Parham M. Kebria, Mohsen Moradi Dalvand, Saeid Nahavandi

    Abstract: Cloud Computing (CC) is revolutionizing the way IT resources are delivered to users, allowing them to access and manage their systems with increased cost-effectiveness and simplified infrastructure. However, with the growth of CC comes a host of security risks, including threats to availability, integrity, and confidentiality. To address these challenges, Machine Learning (ML) is increasingly bein… ▽ More

    Submitted 9 September, 2023; originally announced September 2023.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  4. arXiv:2307.02231  [pdf, other

    cs.NI cs.DC

    Tit-for-Token: Understanding Fairness when Forwarding Data by Incentivized Peers in Decentralized Storage Networks

    Authors: Vahid Heidaripour Lakhani, Arman Babaei, Leander Jehl, Georgy Ishmaev, Vero Estrada-GaliƱanes

    Abstract: Decentralized storage networks offer services with intriguing possibilities to reduce inequalities in an extremely centralized market. The challenge is to conceive incentives that are fair in regard to the income distribution among peers. Despite many systems using tokens to incentivize forwarding data, like Swarm, little is known about the interplay between incentives, storage-, and network-param… ▽ More

    Submitted 2 October, 2023; v1 submitted 5 July, 2023; originally announced July 2023.

    Comments: 28 pages, 15 figures

  5. On the Impact of LTE-U on Wi-Fi Performance

    Authors: Alireza Babaei, Jennifer Andreoli-Fang, Belal Hamzeh

    Abstract: With the exponential growth in mobile data traffic taking place currently and projected into the future, mobile operators need cost effective ways to manage the load of their networks. Traditionally, this has been achieved by offloading mobile traffic onto Wi-Fi networks due to their low cost and ubiquitous deployment. Recently, LTE operating in the unlicensed spectrum has drawn significant intere… ▽ More

    Submitted 17 November, 2022; originally announced November 2022.

    Comments: 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC)

  6. arXiv:2208.01137  [pdf

    cs.SE

    Trust Challenges in Reusing Open Source Software: An Interview-based Initial Study

    Authors: Javad Ghofrani, Paria Heravi, Kambiz A. Babaei, Mohammad Soorati

    Abstract: Open source projects play a significant role in software production. Most of the software projects reuse and build upon the existing open source projects and libraries. While reusing is a time and cost-saving strategy, some of the key factors are often neglected that create vulnerability in the software system. We look beyond the static code analysis and dependency chain tracing to prevent vulnera… ▽ More

    Submitted 1 August, 2022; originally announced August 2022.

    Comments: To appear in Proceedings of 26th ACM International Systems and Software Product Line Conference - Volume B

  7. arXiv:1807.02931  [pdf, other

    math.OC

    Optimal Trajectory-Planning of UAVs via B-Splines and Disjunctive Programming

    Authors: Alireza Babaei, Amirhossein Karimi

    Abstract: This paper investigates an efficient algorithm for trajectory planning problem of autonomous unmanned aerial vehicles which fly over three-dimensional terrains. The proposed algorithm combines convex optimization with disjunctive programming and receding horizon concept, which has many advantages, such as a high computational speed. Disjunctive programming is applied in order to relax the non-conv… ▽ More

    Submitted 8 July, 2018; originally announced July 2018.

  8. arXiv:1606.07972  [pdf, other

    cs.IT

    Wi-Fi Coexistence with Duty Cycled LTE-U

    Authors: Yimin Pang, Alireza Babaei, Jennifer Andreoli-Fang, Belal Hamzeh

    Abstract: Coexistence of Wi-Fi and LTE-Unlicensed (LTE-U) technologies has drawn significant concern in industry. In this paper, we investigate the Wi-Fi performance in the presence of duty cycle based LTE-U transmission on the same channel. More specifically, one LTE-U cell and one Wi-Fi basic service set (BSS) coexist by allowing LTE-U devices transmit their signals only in predetermined duty cycles. Wi-F… ▽ More

    Submitted 2 December, 2016; v1 submitted 25 June, 2016; originally announced June 2016.

  9. arXiv:1603.04879  [pdf, ps, other

    math.GR

    On self-similar finite $p$-groups

    Authors: Azam Babai, Khadijeh Fathalikhani, Gustavo A. Fernandez-Alcober, Matteo Vannacci

    Abstract: In this paper, we address the following question: when is a finite $p$-group $G$ self-similar, i.e. when can $G$ be faithfully represented as a self-similar group of automorphisms of the $p$-adic tree? We show that, if $G$ is a self-similar finite $p$-group of rank $r$, then its order is bounded by a function of $p$ and $r$. This applies in particular to finite $p$-groups of a given coclass. In th… ▽ More

    Submitted 15 March, 2016; originally announced March 2016.

    Comments: 10 pages, submitted to Groups, Geometry, and Dynamics

    MSC Class: 20E08