-
SGPRS: Seamless GPU Partitioning Real-Time Scheduler for Periodic Deep Learning Workloads
Authors:
Amir Fakhim Babaei,
Thidapat Chantem
Abstract:
Deep Neural Networks (DNNs) are useful in many applications, including transportation, healthcare, and speech recognition. Despite various efforts to improve accuracy, few works have studied DNN in the context of real-time requirements. Coarse resource allocation and sequential execution in existing frameworks result in underutilization. In this work, we conduct GPU speedup gain analysis and propo…
▽ More
Deep Neural Networks (DNNs) are useful in many applications, including transportation, healthcare, and speech recognition. Despite various efforts to improve accuracy, few works have studied DNN in the context of real-time requirements. Coarse resource allocation and sequential execution in existing frameworks result in underutilization. In this work, we conduct GPU speedup gain analysis and propose SGPRS, the first real-time GPU scheduler considering zero configuration partition switch. The proposed scheduler not only meets more deadlines for parallel tasks but also sustains overall performance beyond the pivot point.
△ Less
Submitted 13 April, 2024;
originally announced June 2024.
-
CHIRON: Accelerating Node Synchronization without Security Trade-offs in Distributed Ledgers
Authors:
Ray Neiheiser,
Arman Babaei,
Giannis Alexopoulos,
Marios Kogias,
Eleftherios Kokoris Kogias
Abstract:
Blockchain performance has historically faced challenges posed by the throughput limitations of consensus algorithms. Recent breakthroughs in research have successfully alleviated these constraints by introducing a modular architecture that decouples consensus from execution. The move toward independent optimization of the consensus layer has shifted attention to the execution layer.
While concu…
▽ More
Blockchain performance has historically faced challenges posed by the throughput limitations of consensus algorithms. Recent breakthroughs in research have successfully alleviated these constraints by introducing a modular architecture that decouples consensus from execution. The move toward independent optimization of the consensus layer has shifted attention to the execution layer.
While concurrent transaction execution is a promising solution for increasing throughput, practical challenges persist. Its effectiveness varies based on the workloads, and the associated increased hardware requirements raise concerns about undesirable centralization. This increased requirement results in full nodes and stragglers synchronizing from signed checkpoints, decreasing the trustless nature of blockchain systems.
In response to these challenges, this paper introduces Chiron, a system designed to extract execution hints for the acceleration of straggling and full nodes. Notably, Chiron achieves this without compromising the security of the system or introducing overhead on the critical path of consensus. Evaluation results demonstrate a notable speedup of up to 30%, effectively addressing the gap between theoretical research and practical deployment. The quantification of this speedup is achieved through realistic blockchain benchmarks derived from a comprehensive analysis of Ethereum and Solana workloads, constituting an independent contribution.
△ Less
Submitted 31 January, 2024; v1 submitted 25 January, 2024;
originally announced January 2024.
-
A Review of Machine Learning-based Security in Cloud Computing
Authors:
Aptin Babaei,
Parham M. Kebria,
Mohsen Moradi Dalvand,
Saeid Nahavandi
Abstract:
Cloud Computing (CC) is revolutionizing the way IT resources are delivered to users, allowing them to access and manage their systems with increased cost-effectiveness and simplified infrastructure. However, with the growth of CC comes a host of security risks, including threats to availability, integrity, and confidentiality. To address these challenges, Machine Learning (ML) is increasingly bein…
▽ More
Cloud Computing (CC) is revolutionizing the way IT resources are delivered to users, allowing them to access and manage their systems with increased cost-effectiveness and simplified infrastructure. However, with the growth of CC comes a host of security risks, including threats to availability, integrity, and confidentiality. To address these challenges, Machine Learning (ML) is increasingly being used by Cloud Service Providers (CSPs) to reduce the need for human intervention in identifying and resolving security issues. With the ability to analyze vast amounts of data, and make high-accuracy predictions, ML can transform the way CSPs approach security. In this paper, we will explore some of the most recent research in the field of ML-based security in Cloud Computing. We will examine the features and effectiveness of a range of ML algorithms, highlighting their unique strengths and potential limitations. Our goal is to provide a comprehensive overview of the current state of ML in cloud security and to shed light on the exciting possibilities that this emerging field has to offer.
△ Less
Submitted 9 September, 2023;
originally announced September 2023.
-
Tit-for-Token: Understanding Fairness when Forwarding Data by Incentivized Peers in Decentralized Storage Networks
Authors:
Vahid Heidaripour Lakhani,
Arman Babaei,
Leander Jehl,
Georgy Ishmaev,
Vero Estrada-GaliƱanes
Abstract:
Decentralized storage networks offer services with intriguing possibilities to reduce inequalities in an extremely centralized market. The challenge is to conceive incentives that are fair in regard to the income distribution among peers. Despite many systems using tokens to incentivize forwarding data, like Swarm, little is known about the interplay between incentives, storage-, and network-param…
▽ More
Decentralized storage networks offer services with intriguing possibilities to reduce inequalities in an extremely centralized market. The challenge is to conceive incentives that are fair in regard to the income distribution among peers. Despite many systems using tokens to incentivize forwarding data, like Swarm, little is known about the interplay between incentives, storage-, and network-parameters. This paper aims to help fill this gap by develo** Tit-for-Token (Tit4Tok), a framework to understand fairness. Tit4Tok realizes a triad of altruism (acts of kindness such as debt forgiveness), reciprocity (Tit-for-Tat's mirroring cooperation), and monetary rewards as desired in the free market. Tit4Tok sheds light on incentives across the accounting and settlement layers. We present a comprehensive exploration of different factors when incentivized peers share bandwidth in a libp2p-based network, including uneven distributions emerging when gateways provide data to users outside the network. We quantified the Income-Fairness with the Gini coefficient, using multiple model instantiations and diverse approaches for debt cancellation. We propose regular changes to the gateway neighborhood and show that our shuffling method improves the Income-Fairness from 0.66 to 0.16. We quantified the non-negligible cost of tolerating free-riding (altruism). The performance is evaluated by extensive computer simulations and using an IPFS workload to study the effects of caching.
△ Less
Submitted 2 October, 2023; v1 submitted 5 July, 2023;
originally announced July 2023.
-
On the Impact of LTE-U on Wi-Fi Performance
Authors:
Alireza Babaei,
Jennifer Andreoli-Fang,
Belal Hamzeh
Abstract:
With the exponential growth in mobile data traffic taking place currently and projected into the future, mobile operators need cost effective ways to manage the load of their networks. Traditionally, this has been achieved by offloading mobile traffic onto Wi-Fi networks due to their low cost and ubiquitous deployment. Recently, LTE operating in the unlicensed spectrum has drawn significant intere…
▽ More
With the exponential growth in mobile data traffic taking place currently and projected into the future, mobile operators need cost effective ways to manage the load of their networks. Traditionally, this has been achieved by offloading mobile traffic onto Wi-Fi networks due to their low cost and ubiquitous deployment. Recently, LTE operating in the unlicensed spectrum has drawn significant interests from mobile operators due to the availability of the unlicensed spectrum. However, the deployment of LTE networks in the unlicensed band poses significant challenges to the performance of current and future Wi-Fi networks. We discuss the LTE and Wi-Fi coexistence challenges and present analysis on performance degradation of the Wi-Fi networks at the presence of LTE.
△ Less
Submitted 17 November, 2022;
originally announced November 2022.
-
Trust Challenges in Reusing Open Source Software: An Interview-based Initial Study
Authors:
Javad Ghofrani,
Paria Heravi,
Kambiz A. Babaei,
Mohammad Soorati
Abstract:
Open source projects play a significant role in software production. Most of the software projects reuse and build upon the existing open source projects and libraries. While reusing is a time and cost-saving strategy, some of the key factors are often neglected that create vulnerability in the software system. We look beyond the static code analysis and dependency chain tracing to prevent vulnera…
▽ More
Open source projects play a significant role in software production. Most of the software projects reuse and build upon the existing open source projects and libraries. While reusing is a time and cost-saving strategy, some of the key factors are often neglected that create vulnerability in the software system. We look beyond the static code analysis and dependency chain tracing to prevent vulnerabilities at the human factors level. The literature lacks a comprehensive study of the human factors perspective on the issue of trust in reusing open source projects. We performed an interview-based initial study with software developers to get an understanding of the trust issue and limitations among the practitioners. We outline some of the key trust issues in this paper and lay out the first steps toward the trustworthy reuse of software.
△ Less
Submitted 1 August, 2022;
originally announced August 2022.
-
Optimal Trajectory-Planning of UAVs via B-Splines and Disjunctive Programming
Authors:
Alireza Babaei,
Amirhossein Karimi
Abstract:
This paper investigates an efficient algorithm for trajectory planning problem of autonomous unmanned aerial vehicles which fly over three-dimensional terrains. The proposed algorithm combines convex optimization with disjunctive programming and receding horizon concept, which has many advantages, such as a high computational speed. Disjunctive programming is applied in order to relax the non-conv…
▽ More
This paper investigates an efficient algorithm for trajectory planning problem of autonomous unmanned aerial vehicles which fly over three-dimensional terrains. The proposed algorithm combines convex optimization with disjunctive programming and receding horizon concept, which has many advantages, such as a high computational speed. Disjunctive programming is applied in order to relax the non-convex constraints of the problem. Moreover, the B-spline curves are employed to represent the trajectories which should be generated in the optimization process.
△ Less
Submitted 8 July, 2018;
originally announced July 2018.
-
Wi-Fi Coexistence with Duty Cycled LTE-U
Authors:
Yimin Pang,
Alireza Babaei,
Jennifer Andreoli-Fang,
Belal Hamzeh
Abstract:
Coexistence of Wi-Fi and LTE-Unlicensed (LTE-U) technologies has drawn significant concern in industry. In this paper, we investigate the Wi-Fi performance in the presence of duty cycle based LTE-U transmission on the same channel. More specifically, one LTE-U cell and one Wi-Fi basic service set (BSS) coexist by allowing LTE-U devices transmit their signals only in predetermined duty cycles. Wi-F…
▽ More
Coexistence of Wi-Fi and LTE-Unlicensed (LTE-U) technologies has drawn significant concern in industry. In this paper, we investigate the Wi-Fi performance in the presence of duty cycle based LTE-U transmission on the same channel. More specifically, one LTE-U cell and one Wi-Fi basic service set (BSS) coexist by allowing LTE-U devices transmit their signals only in predetermined duty cycles. Wi-Fi stations, on the other hand, simply contend the shared channel using the distributed coordination function (DCF) protocol without cooperation with the LTE-U system or prior knowledge about the duty cycle period or duty cycle of LTE-U transmission. We define the fairness of the above scheme as the difference between Wi-Fi performance loss ratio (considering a defined reference performance) and the LTE-U duty cycle (or function of LTE-U duty cycle). Depending on the interference to noise ratio (INR) being above or below -62dbm, we classify the LTE-U interference as strong or weak and establish mathematical models accordingly. The average throughput and average service time of Wi-Fi are both formulated as functions of Wi-Fi and LTE-U system parameters using probability theory. Lastly, we use the Monte Carlo analysis to demonstrate the fairness of Wi-Fi and LTE-U air time sharing.
△ Less
Submitted 2 December, 2016; v1 submitted 25 June, 2016;
originally announced June 2016.
-
On self-similar finite $p$-groups
Authors:
Azam Babai,
Khadijeh Fathalikhani,
Gustavo A. Fernandez-Alcober,
Matteo Vannacci
Abstract:
In this paper, we address the following question: when is a finite $p$-group $G$ self-similar, i.e. when can $G$ be faithfully represented as a self-similar group of automorphisms of the $p$-adic tree? We show that, if $G$ is a self-similar finite $p$-group of rank $r$, then its order is bounded by a function of $p$ and $r$. This applies in particular to finite $p$-groups of a given coclass. In th…
▽ More
In this paper, we address the following question: when is a finite $p$-group $G$ self-similar, i.e. when can $G$ be faithfully represented as a self-similar group of automorphisms of the $p$-adic tree? We show that, if $G$ is a self-similar finite $p$-group of rank $r$, then its order is bounded by a function of $p$ and $r$. This applies in particular to finite $p$-groups of a given coclass. In the particular case of groups of maximal class, that is, of coclass $1$, we can fully answer the question above: a $p$-group of maximal class $G$ is self-similar if and only if it contains an elementary abelian maximal subgroup over which $G$ splits. Furthermore, in that case the order of $G$ is at most $p^p+1$, and this bound is sharp.
△ Less
Submitted 15 March, 2016;
originally announced March 2016.