Skip to main content

Showing 1–12 of 12 results for author: Golubchik, L

.
  1. arXiv:2311.02287  [pdf, other

    cs.LG cs.AI

    Predicting Ground Reaction Force from Inertial Sensors

    Authors: Bowen Song, Marco Paolieri, Harper E. Stewart, Leana Golubchik, Jill L. McNitt-Gray, Vishal Misra, Devavrat Shah

    Abstract: The study of ground reaction forces (GRF) is used to characterize the mechanical loading experienced by individuals in movements such as running, which is clinically applicable to identify athletes at risk for stress-related injuries. Our aim in this paper is to determine if data collected with inertial measurement units (IMUs), that can be worn by athletes during outdoor runs, can be used to pred… ▽ More

    Submitted 3 November, 2023; originally announced November 2023.

  2. arXiv:2303.01745  [pdf, other

    math.OC cs.LG cs.PF eess.SY

    Queue Scheduling with Adversarial Bandit Learning

    Authors: Jiatai Huang, Leana Golubchik, Longbo Huang

    Abstract: In this paper, we study scheduling of a queueing system with zero knowledge of instantaneous network conditions. We consider a one-hop single-server queueing system consisting of $K$ queues, each with time-varying and non-stationary arrival and service rates. Our scheduling approach builds on an innovative combination of adversarial bandit learning and Lyapunov drift minimization, without knowledg… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

  3. arXiv:2210.02620  [pdf, other

    cs.PF cs.LG

    Inference Latency Prediction at the Edge

    Authors: Zhuo** Li, Marco Paolieri, Leana Golubchik

    Abstract: With the growing workload of inference tasks on mobile devices, state-of-the-art neural architectures (NAs) are typically designed through Neural Architecture Search (NAS) to identify NAs with good tradeoffs between accuracy and efficiency (e.g., latency). Since measuring the latency of a huge set of candidate architectures during NAS is not scalable, approaches are needed for predicting end-to-en… ▽ More

    Submitted 5 October, 2022; originally announced October 2022.

  4. arXiv:2205.12891   

    cs.PF

    Scheduling to Optimize Sojourn Time of Successful Jobs

    Authors: Yuan Yao, Marco Paolieri, Leana Golubchik

    Abstract: Deep neural networks training jobs and other iterative computations frequently include checkpoints where jobs can be canceled based on the current value of monitored metrics. While most of existing results focus on the performance of all jobs (both successfully completed and canceled), in this work we explore scheduling policies that improve the sojourn time of successful jobs, which are typically… ▽ More

    Submitted 29 September, 2022; v1 submitted 25 May, 2022; originally announced May 2022.

    Comments: We found that theorem III.4 is incorrect and we have a different theorem for the performance of the algorithm

  5. arXiv:2104.00137  [pdf, ps, other

    cs.LG

    Achieving Transparency Report Privacy in Linear Time

    Authors: Chien-Lun Chen, Leana Golubchik, Ranjan Pal

    Abstract: An accountable algorithmic transparency report (ATR) should ideally investigate the (a) transparency of the underlying algorithm, and (b) fairness of the algorithmic decisions, and at the same time preserve data subjects' privacy. However, a provably formal study of the impact to data subjects' privacy caused by the utility of releasing an ATR (that investigates transparency and fairness), is yet… ▽ More

    Submitted 15 April, 2021; v1 submitted 31 March, 2021; originally announced April 2021.

    Comments: 56 pages, 5 figures, accepted in ACM Journal of Data and Information Quality (JDIQ), Special Issue on Data Transparency

  6. arXiv:2006.07026  [pdf, other

    cs.LG cs.CR cs.DC stat.ML

    Backdoor Attacks on Federated Meta-Learning

    Authors: Chien-Lun Chen, Leana Golubchik, Marco Paolieri

    Abstract: Federated learning allows multiple users to collaboratively train a shared classification model while preserving data privacy. This approach, where model updates are aggregated by a central server, was shown to be vulnerable to poisoning backdoor attacks: a malicious user can alter the shared model to arbitrarily classify specific inputs from a given class. In this paper, we analyze the effects of… ▽ More

    Submitted 16 December, 2020; v1 submitted 12 June, 2020; originally announced June 2020.

    Comments: 13 pages, 19 figures, NeurIPS Workshop on Scalability, Privacy, and Security in Federated Learning (NeurIPS-SpicyFL), 2020

  7. arXiv:1911.04650  [pdf, other

    cs.DC cs.LG cs.PF

    Throughput Prediction of Asynchronous SGD in TensorFlow

    Authors: Zhuo** Li, Wumo Yan, Marco Paolieri, Leana Golubchik

    Abstract: Modern machine learning frameworks can train neural networks using multiple nodes in parallel, each computing parameter updates with stochastic gradient descent (SGD) and sharing them asynchronously through a central parameter server. Due to communication overhead and bottlenecks, the total throughput of SGD updates in a cluster scales sublinearly, saturating as the number of nodes increases. In t… ▽ More

    Submitted 28 February, 2020; v1 submitted 11 November, 2019; originally announced November 2019.

  8. arXiv:1704.00845  [pdf, other

    cs.DC cs.GT

    The Cloudlet Bazaar Dynamic Markets for the Small Cloud

    Authors: Ranjan Pal, Sung-Han Lin, Aditya Ahujay, Leana Golubchik

    Abstract: The recent emergence of the small cloud (SC), both in concept and in practice, has been driven mainly by issues related to service cost and complexity of commercial cloud providers (e.g., Amazon) employing massive data centers. However, the resource inelasticity problem faced by the SCs due to their relatively scarce resources (e.g., virtual machines) might lead to a potential degradation of custo… ▽ More

    Submitted 13 February, 2018; v1 submitted 3 April, 2017; originally announced April 2017.

  9. arXiv:1703.10318  [pdf, other

    cs.DC

    SC-Share: Performance Driven Resource Sharing Markets for the Small Cloud

    Authors: Sung-Han Lin, Ranjan Pal, Marco Paolieri, Leana Golubchik

    Abstract: Small-scale clouds (SCs) often suffer from resource under-provisioning during peak demand, leading to inability to satisfy service level agreements (SLAs) and consequent loss of customers. One approach to address this problem is for a set of autonomous SCs to share resources among themselves in a cost-induced cooperative fashion, thereby increasing their individual capacities (when needed) without… ▽ More

    Submitted 6 August, 2017; v1 submitted 30 March, 2017; originally announced March 2017.

    Comments: To be published in ICDCS 2017

  10. arXiv:1607.02598  [pdf, other

    cs.GT

    Security Pricing as an Enabler of Cyber-Insurance: A First Look at Differentiated Pricing Markets

    Authors: Ranjan Pal, Leana Golubchik, Konstantinos Psounis, Pan Hui

    Abstract: Despite the promising potential of network risk management services (e.g., cyber-insurance) to improve information security, their deployment is relatively scarce, primarily due to such service companies being unable to guarantee profitability. As a novel approach to making cyber-insurance services more viable, we explore a symbiotic relationship between security vendors (e.g., Symantec) capable o… ▽ More

    Submitted 9 July, 2016; originally announced July 2016.

    Comments: arXiv admin note: text overlap with arXiv:1101.5617 by other authors without attribution

  11. arXiv:1107.4785  [pdf, ps, other

    cs.CR

    A Novel Cyber-Insurance for Internet Security

    Authors: Ranjan Pal, Leana Golubchik, Konstantinos Psounis

    Abstract: Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an Internet user generally invests in self-defense mechanisms like antivirus and antispam software. However, such software does not completely eliminate risk. Recent works have considered the problem of residual risk eliminati… ▽ More

    Submitted 24 July, 2011; originally announced July 2011.

  12. arXiv:1103.1552  [pdf, ps, other

    cs.CR

    Pricing and Investments in Internet Security: A Cyber-Insurance Perspective

    Authors: Ranjan Pal, Leana Golubchik

    Abstract: Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, spams, and botnets. To reduce the probability of risk, an Internet user generally invests in traditional security mechanisms like anti-virus and anti-spam software, sometimes also known as self-defense mechanisms. However, such software does not completely eliminate risk. R… ▽ More

    Submitted 8 March, 2011; originally announced March 2011.