Skip to main content

Showing 1–50 of 58 results for author: Sivaraman, V

.
  1. arXiv:2404.16017  [pdf, other

    cs.CV cs.AI cs.GT cs.LG

    RetinaRegNet: A Versatile Approach for Retinal Image Registration

    Authors: Vishal Balaji Sivaraman, Muhammad Imran, Qingyue Wei, Preethika Muralidharan, Michelle R. Tamplin, Isabella M . Grumbach, Randy H. Kardon, Jui-Kai Wang, Yuyin Zhou, Wei Shao

    Abstract: We introduce the RetinaRegNet model, which can achieve state-of-the-art performance across various retinal image registration tasks. RetinaRegNet does not require training on any retinal images. It begins by establishing point correspondences between two retinal images using image features derived from diffusion models. This process involves the selection of feature points from the moving image us… ▽ More

    Submitted 20 May, 2024; v1 submitted 24 April, 2024; originally announced April 2024.

  2. arXiv:2404.07148  [pdf, other

    cs.LG cs.HC

    How Consistent are Clinicians? Evaluating the Predictability of Sepsis Disease Progression with Dynamics Models

    Authors: Unnseo Park, Venkatesh Sivaraman, Adam Perer

    Abstract: Reinforcement learning (RL) is a promising approach to generate treatment policies for sepsis patients in intensive care. While retrospective evaluation metrics show decreased mortality when these policies are followed, studies with clinicians suggest their recommendations are often spurious. We propose that these shortcomings may be due to lack of diversity in observed actions and outcomes in the… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

    Comments: 6 pages, 3 figures; accepted workshop paper at Time Series for Health @ ICLR 2024

  3. arXiv:2403.15496  [pdf, ps, other

    math.CO

    Extending matroid classes closed under flats

    Authors: Jagdeep Singh, Vaidy Sivaraman

    Abstract: We call a class $\mathcal{M}$ of matroids hereditary if it is closed under flats. We denote by $\mathcal{M}^{ext}$ the class of matroids $M$ that is in $\mathcal{M}$, or has an element $e$ such that $M \backslash e$ is in $\mathcal{M}$. We prove that if $\mathcal{M}$ has finitely many forbidden flats, then so does $\mathcal{M}^{ext} $.

    Submitted 21 March, 2024; originally announced March 2024.

    Comments: 2 pages

  4. arXiv:2403.09456  [pdf, other

    math.CO cs.DM

    Edge-apexing in hereditary classes of graphs

    Authors: Jagdeep Singh, Vaidy Sivaraman

    Abstract: A class $\mathcal{G}$ of graphs is called hereditary if it is closed under taking induced subgraphs. We denote by $G^{epex}$ the class of graphs that are at most one edge away from being in $\mathcal{G}$. We note that $G^{epex}$ is hereditary and prove that if a hereditary class $\mathcal{G}$ has finitely many forbidden induced subgraphs, then so does $G^{epex}$. The hereditary class of cographs… ▽ More

    Submitted 14 March, 2024; originally announced March 2024.

    Comments: 10 pages, 4 figures

    MSC Class: 05C75

  5. Sketching AI Concepts with Capabilities and Examples: AI Innovation in the Intensive Care Unit

    Authors: Nur Yildirim, Susanna Zlotnikov, Deniz Sayar, Jeremy M. Kahn, Leigh A. Bukowski, Sher Shah Amin, Kathryn A. Riman, Billie S. Davis, John S. Minturn, Andrew J. King, Dan Ricketts, Lu Tang, Venkatesh Sivaraman, Adam Perer, Sarah M. Preum, James McCann, John Zimmerman

    Abstract: Advances in artificial intelligence (AI) have enabled unprecedented capabilities, yet innovation teams struggle when envisioning AI concepts. Data science teams think of innovations users do not want, while domain experts think of innovations that cannot be built. A lack of effective ideation seems to be a breakdown point. How might multidisciplinary teams identify buildable and desirable use case… ▽ More

    Submitted 20 February, 2024; originally announced February 2024.

    Comments: to appear at CHI 2024

  6. MetaVRadar: Measuring Metaverse Virtual Reality Network Activity

    Authors: Minzhao Lyu, Rahul Dev Tripathi, Vijay Sivaraman

    Abstract: The "metaverse", wherein users can enter virtual worlds to work, study, play, shop, socialize, and entertain, is fast becoming a reality, attracting billions of dollars in investment from companies such as Meta, Microsoft, and Clipo Labs. Further, virtual reality (VR) headsets from entities like Oculus, HTC, and Microsoft are rapidly maturing to provide fully immersive experiences to metaverse use… ▽ More

    Submitted 13 February, 2024; originally announced February 2024.

    Comments: This paper is accepted at ACM SIGMETRICS/IFIP PERFORMANCE 2024 and is published by the Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS)

    Journal ref: Proc. ACM Meas. Anal. Comput. Syst. 7, 3, Article 55 (December 2023), 29 pages

  7. arXiv:2401.13049  [pdf, other

    eess.IV cs.AI cs.CV cs.GT cs.LG

    CIS-UNet: Multi-Class Segmentation of the Aorta in Computed Tomography Angiography via Context-Aware Shifted Window Self-Attention

    Authors: Muhammad Imran, Jonathan R Krebs, Veera Rajasekhar Reddy Gopu, Brian Fazzone, Vishal Balaji Sivaraman, Amarjeet Kumar, Chelsea Viscardi, Robert Evans Heithaus, Benjamin Shickel, Yuyin Zhou, Michol A Cooper, Wei Shao

    Abstract: Advancements in medical imaging and endovascular grafting have facilitated minimally invasive treatments for aortic diseases. Accurate 3D segmentation of the aorta and its branches is crucial for interventions, as inaccurate segmentation can lead to erroneous surgical planning and endograft construction. Previous methods simplified aortic segmentation as a binary image segmentation problem, overlo… ▽ More

    Submitted 23 January, 2024; originally announced January 2024.

  8. Network Anatomy and Real-Time Measurement of Nvidia GeForce NOW Cloud Gaming

    Authors: Minzhao Lyu, Sharat Chandra Madanapalli, Arun Vishwanath, Vijay Sivaraman

    Abstract: Cloud gaming, wherein game graphics is rendered in the cloud and streamed back to the user as real-time video, expands the gaming market to billions of users who do not have gaming consoles or high-power graphics PCs. Companies like Nvidia, Amazon, Sony and Microsoft are investing in building cloud gaming platforms to tap this large unserved market. However, cloud gaming requires the user to have… ▽ More

    Submitted 13 February, 2024; v1 submitted 11 January, 2024; originally announced January 2024.

    Comments: This paper is accepted at Passive and Active Measurement (PAM) conference Mar 2024

    Journal ref: M. Lyu, S. C. Madanapalli, A. Vishwanath, and V. Sivaraman, "Network Anatomy and Real-Time Measurement of Nvidia GeForce NOW Cloud Gaming", in Proc. PAM, Virtual Event, Mar 2024

  9. arXiv:2310.02551  [pdf, other

    math.CO

    Apex Graphs and Cographs

    Authors: Jagdeep Singh, Vaidy Sivaraman, Thomas Zaslavsky

    Abstract: A class $\mathcal{G}$ of graphs is called hereditary if it is closed under taking induced subgraphs. We denote by $\mathcal{G}^\mathrm{apex}$ the class of graphs $G$ that contain a vertex $v$ such that $G-v$ is in $\mathcal{G}$. We prove that if a hereditary class $\mathcal{G}$ has finitely many forbidden induced subgraphs, then so does $\mathcal{G}^\mathrm{apex}$. The hereditary class of cograp… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

    Comments: 11 pp., 7 figures

    MSC Class: 05C75

  10. arXiv:2310.02336  [pdf, other

    math.CO

    Hereditary Nordhaus-Gaddum Graphs

    Authors: Vaidy Sivaraman, Rebecca Whitman

    Abstract: Nordhaus and Gaddum proved in 1956 that the sum of the chromatic number $χ$ of a graph $G$ and its complement is at most $|G|+1$. The Nordhaus-Gaddum graphs are the class of graphs satisfying this inequality with equality, and are well-understood. In this paper we consider a hereditary generalization: graphs $G$ for which all induced subgraphs $H$ of $G$ satisfy $χ(H) + χ(\overline{H}) \le |H|$. W… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

    Comments: 21 pages, 3 figures

    MSC Class: 05C75; 05C17

  11. arXiv:2309.16869  [pdf, other

    cs.NI

    Vidaptive: Efficient and Responsive Rate Control for Real-Time Video on Variable Networks

    Authors: Pantea Karimi, Sadjad Fouladi, Vibhaalakshmi Sivaraman, Mohammad Alizadeh

    Abstract: Real-time video streaming relies on rate control mechanisms to adapt video bitrate to network capacity while maintaining high utilization and low delay. However, the current video rate controllers, such as Google Congestion Control (GCC), are very slow to respond to network changes, leading to link under-utilization and latency spikes. While recent delay-based congestion control algorithms promise… ▽ More

    Submitted 25 February, 2024; v1 submitted 28 September, 2023; originally announced September 2023.

  12. A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection

    Authors: Minzhao Lyu, Hassan Habibi Gharakheili, Vijay Sivaraman

    Abstract: Enterprise networks that host valuable assets and services are popular and frequent targets of distributed network attacks. In order to cope with the ever-increasing threats, industrial and research communities develop systems and methods to monitor the behaviors of their assets and protect them from critical attacks. In this paper, we systematically survey related research articles and industrial… ▽ More

    Submitted 29 June, 2023; originally announced June 2023.

    Comments: Journal paper submitted to Elseiver

    Journal ref: in IEEE Access, vol. 12, pp. 89363-89383, 2024

  13. arXiv:2305.14135  [pdf, other

    cs.NI cs.CV

    Reparo: Loss-Resilient Generative Codec for Video Conferencing

    Authors: Tianhong Li, Vibhaalakshmi Sivaraman, Pantea Karimi, Lijie Fan, Mohammad Alizadeh, Dina Katabi

    Abstract: Packet loss during video conferencing often leads to poor quality and video freezing. Attempting to retransmit lost packets is often impractical due to the need for real-time playback. Employing Forward Error Correction (FEC) for recovering the lost packets is challenging as it is difficult to determine the appropriate redundancy level. To address these issues, we introduce Reparo -- a loss-resili… ▽ More

    Submitted 20 February, 2024; v1 submitted 23 May, 2023; originally announced May 2023.

  14. arXiv:2304.04987  [pdf, ps, other

    cs.CR cs.LG cs.NI

    Detecting Anomalous Microflows in IoT Volumetric Attacks via Dynamic Monitoring of MUD Activity

    Authors: Ayyoob Hamza, Hassan Habibi Gharakheili, Theophilus A. Benson, Gustavo Batista, Vijay Sivaraman

    Abstract: IoT networks are increasingly becoming target of sophisticated new cyber-attacks. Anomaly-based detection methods are promising in finding new attacks, but there are certain practical challenges like false-positive alarms, hard to explain, and difficult to scale cost-effectively. The IETF recent standard called Manufacturer Usage Description (MUD) seems promising to limit the attack surface on IoT… ▽ More

    Submitted 11 April, 2023; originally announced April 2023.

    Comments: 18 pages, 13 figures

    ACM Class: C.2

  15. arXiv:2302.00096  [pdf, other

    cs.HC

    Ignore, Trust, or Negotiate: Understanding Clinician Acceptance of AI-Based Treatment Recommendations in Health Care

    Authors: Venkatesh Sivaraman, Leigh A. Bukowski, Joel Levin, Jeremy M. Kahn, Adam Perer

    Abstract: Artificial intelligence (AI) in healthcare has the potential to improve patient outcomes, but clinician acceptance remains a critical barrier. We developed a novel decision support interface that provides interpretable treatment recommendations for sepsis, a life-threatening condition in which decisional uncertainty is common, treatment practices vary widely, and poor outcomes can occur even with… ▽ More

    Submitted 31 January, 2023; originally announced February 2023.

    Comments: CHI 2023

  16. arXiv:2209.10507  [pdf, other

    cs.NI cs.CV

    Gemino: Practical and Robust Neural Compression for Video Conferencing

    Authors: Vibhaalakshmi Sivaraman, Pantea Karimi, Vedantha Venkatapathy, Mehrdad Khani, Sadjad Fouladi, Mohammad Alizadeh, Frédo Durand, Vivienne Sze

    Abstract: Video conferencing systems suffer from poor user experience when network conditions deteriorate because current video codecs simply cannot operate at extremely low bitrates. Recently, several neural alternatives have been proposed that reconstruct talking head videos at very low bitrates using sparse representations of each frame such as facial landmark information. However, these approaches produ… ▽ More

    Submitted 19 October, 2023; v1 submitted 21 September, 2022; originally announced September 2022.

    Comments: 13 pages, 5 appendix

    Journal ref: USENIX NSDI 2024

  17. arXiv:2204.13872  [pdf, other

    cs.HC

    Extended Analysis of "How Child Welfare Workers Reduce Racial Disparities in Algorithmic Decisions"

    Authors: Logan Stapleton, Hao-Fei Cheng, Anna Kawakami, Venkatesh Sivaraman, Yanghuidi Cheng, Diana Qing, Adam Perer, Kenneth Holstein, Zhiwei Steven Wu, Haiyi Zhu

    Abstract: This is an extended analysis of our paper "How Child Welfare Workers Reduce Racial Disparities in Algorithmic Decisions," which looks at racial disparities in the Allegheny Family Screening Tool, an algorithm used to help child welfare workers decide which families the Allegheny County child welfare agency (CYF) should investigate. On April 27, 2022, Allegheny County CYF sent us an updated dataset… ▽ More

    Submitted 29 April, 2022; originally announced April 2022.

  18. arXiv:2204.09717  [pdf

    cs.CL cs.AI

    LSTM-RASA Based Agri Farm Assistant for Farmers

    Authors: Narayana Darapaneni, Selvakumar Raj, Raghul V, Venkatesh Sivaraman, Sunil Mohan, Anwesh Reddy Paduri

    Abstract: The application of Deep Learning and Natural Language based ChatBots are growing rapidly in recent years. They are used in many fields like customer support, reservation system and as personal assistant. The Enterprises are using such ChatBots to serve their customers in a better and efficient manner. Even after such technological advancement, the expert advice does not reach the farmers on timely… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

  19. arXiv:2204.02310  [pdf, other

    cs.HC cs.AI cs.CY

    Improving Human-AI Partnerships in Child Welfare: Understanding Worker Practices, Challenges, and Desires for Algorithmic Decision Support

    Authors: Anna Kawakami, Venkatesh Sivaraman, Hao-Fei Cheng, Logan Stapleton, Yanghuidi Cheng, Diana Qing, Adam Perer, Zhiwei Steven Wu, Haiyi Zhu, Kenneth Holstein

    Abstract: AI-based decision support tools (ADS) are increasingly used to augment human decision-making in high-stakes, social contexts. As public sector agencies begin to adopt ADS, it is critical that we understand workers' experiences with these systems in practice. In this paper, we present findings from a series of interviews and contextual inquiries at a child welfare agency, to understand how they cur… ▽ More

    Submitted 5 April, 2022; originally announced April 2022.

    Comments: 2022 Conference on Human Factors in Computing Systems

    ACM Class: K.4.0

  20. arXiv:2202.02641  [pdf, other

    cs.HC cs.LG

    Emblaze: Illuminating Machine Learning Representations through Interactive Comparison of Embedding Spaces

    Authors: Venkatesh Sivaraman, Yiwei Wu, Adam Perer

    Abstract: Modern machine learning techniques commonly rely on complex, high-dimensional embedding representations to capture underlying structure in the data and improve performance. In order to characterize model flaws and choose a desirable representation, model builders often need to compare across multiple embedding spaces, a challenging analytical task supported by few existing tools. We first intervie… ▽ More

    Submitted 16 February, 2022; v1 submitted 5 February, 2022; originally announced February 2022.

    Comments: 23 pages, 5 figures, 2 tables. To be presented at IUI'22. arXiv version updated Feb 16 2022 with corrected publication year and copyright

  21. Analyzing Enterprise DNS Traffic to Classify Assets and Track Cyber-Health

    Authors: Minzhao Lyu, Hassan Habibi Gharakheili, Craig Russell, Vijay Sivaraman

    Abstract: The Domain Name System (DNS) is a critical service that enables domain names to be converted to IP addresses (or vice versa); consequently, it is generally permitted through enterprise security systems (e.g., firewalls) with little restriction. This has exposed organizational networks to DDoS, exfiltration, and reflection attacks, inflicting significant financial and reputational damage. Large org… ▽ More

    Submitted 18 January, 2022; originally announced January 2022.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

    Journal ref: IEEE Transactions on Network and Service Management, 2023

  22. arXiv:2201.00900  [pdf, other

    cs.CR cs.NI

    A Survey on DNS Encryption: Current Development, Malware Misuse, and Inference Techniques

    Authors: Minzhao Lyu, Hassan Habibi Gharakheili, Vijay Sivaraman

    Abstract: The domain name system (DNS) that maps alphabetic names to numeric Internet Protocol (IP) addresses plays a foundational role for Internet communications. By default, DNS queries and responses are exchanged in unencrypted plaintext, and hence, can be read and/or hijacked by third parties. To protect user privacy, the networking community has proposed standard encryption technologies such as DNS ov… ▽ More

    Submitted 7 July, 2022; v1 submitted 3 January, 2022; originally announced January 2022.

    Comments: to be Published in ACM Computing Surveys (2022)

    Journal ref: ACM Comput. Surv. 55, 8, Article 162 (August 2023), 28 pages (2022)

  23. arXiv:2112.02637  [pdf, other

    cs.NI cs.AI cs.LG

    Modeling Live Video Streaming: Real-Time Classification, QoE Inference, and Field Evaluation

    Authors: Sharat Chandra Madanapalli, Alex Mathai, Hassan Habibi Gharakheili, Vijay Sivaraman

    Abstract: Social media, professional sports, and video games are driving rapid growth in live video streaming, on platforms such as Twitch and YouTube Live. Live streaming experience is very susceptible to short-time-scale network congestion since client playback buffers are often no more than a few seconds. Unfortunately, identifying such streams and measuring their QoE for network management is challengin… ▽ More

    Submitted 5 December, 2021; originally announced December 2021.

  24. arXiv:2106.10368  [pdf, ps, other

    math.CO

    Two Hamiltonian cycles

    Authors: Vaidy Sivaraman, Thomas Zaslavsky

    Abstract: If the line graph of a graph $G$ decomposes into Hamiltonian cycles, what is $G$? We answer this question for decomposition into two cycles.

    Submitted 18 June, 2021; originally announced June 2021.

    Comments: 4 pp

    MSC Class: Primary 05C45; Secondary 05C76

    Journal ref: Discrete Math., 345 (2022), article 112797, 3 pp

  25. Modeling Classroom Occupancy using Data of WiFi Infrastructure in a University Campus

    Authors: Iresha Pasquel Mohottige, Hassan Habibi Gharakheili, Vijay Sivaraman, Tim Moors

    Abstract: Universities worldwide are experiencing a surge in enrollments, therefore campus estate managers are seeking continuous data on attendance patterns to optimize the usage of classroom space. As a result, there is an increasing trend to measure classrooms attendance by employing various sensing technologies, among which pervasive WiFi infrastructure is seen as a low cost method. In a dense campus en… ▽ More

    Submitted 19 April, 2021; originally announced April 2021.

    Comments: 23 pages, 20 figures, 8 tables

  26. arXiv:2104.02807  [pdf, ps, other

    math.CO cs.DM

    Coloring graph classes with no induced fork via perfect divisibility

    Authors: T. Karthick, Jenny Kaufmann, Vaidy Sivaraman

    Abstract: For a graph $G$, $χ(G)$ will denote its chromatic number, and $ω(G)$ its clique number. A graph $G$ is said to be perfectly divisible if for all induced subgraphs $H$ of $G$, $V(H)$ can be partitioned into two sets $A$, $B$ such that $H[A]$ is perfect and $ω(H[B]) < ω(H)$. An integer-valued function $f$ is called a $χ$-binding function for a hereditary class of graphs $\cal C$ if… ▽ More

    Submitted 6 April, 2021; originally announced April 2021.

    Comments: 16 pages

  27. arXiv:2104.02322  [pdf, other

    cs.CV cs.AI cs.LG eess.IV

    Efficient Video Compression via Content-Adaptive Super-Resolution

    Authors: Mehrdad Khani, Vibhaalakshmi Sivaraman, Mohammad Alizadeh

    Abstract: Video compression is a critical component of Internet video delivery. Recent work has shown that deep learning techniques can rival or outperform human-designed algorithms, but these methods are significantly less compute and power-efficient than existing codecs. This paper presents a new approach that augments existing codecs with a small, content-adaptive super-resolution model that significantl… ▽ More

    Submitted 6 April, 2021; originally announced April 2021.

  28. arXiv:2103.11029  [pdf, other

    cs.CL cs.AI cs.HC

    TextEssence: A Tool for Interactive Analysis of Semantic Shifts Between Corpora

    Authors: Denis Newman-Griffis, Venkatesh Sivaraman, Adam Perer, Eric Fosler-Lussier, Harry Hochheiser

    Abstract: Embeddings of words and concepts capture syntactic and semantic regularities of language; however, they have seen limited use as tools to study characteristics of different corpora and how they relate to one another. We introduce TextEssence, an interactive system designed to enable comparative analysis of corpora using embeddings. TextEssence includes visual, neighbor-based, and similarity-based… ▽ More

    Submitted 19 March, 2021; originally announced March 2021.

    Comments: Accepted as a Systems Demonstration at NAACL-HLT 2021. Video demonstration at https://youtu.be/1xEEfsMwL0k

  29. The Effect of Network Topology on Credit Network Throughput

    Authors: Vibhaalakshmi Sivaraman, Weizhao Tang, Shaileshh Bojja Venkatakrishnan, Giulia Fanti, Mohammad Alizadeh

    Abstract: Credit networks rely on decentralized, pairwise trust relationships (channels) to exchange money or goods. Credit networks arise naturally in many financial systems, including the recent construct of payment channel networks in blockchain systems. An important performance metric for these networks is their transaction throughput. However, predicting the throughput of a credit network is nontrivial… ▽ More

    Submitted 28 September, 2021; v1 submitted 4 March, 2021; originally announced March 2021.

    Journal ref: Performance Evaluation, 2021, 102235, ISSN 0166-5316

  30. arXiv:2102.06836  [pdf, other

    cs.SI cs.CY

    Pulse of the Pandemic: Iterative Topic Filtering for Clinical Information Extraction from Social Media

    Authors: Julia Wu, Venkatesh Sivaraman, Dheekshita Kumar, Juan M. Banda, David Sontag

    Abstract: The rapid evolution of the COVID-19 pandemic has underscored the need to quickly disseminate the latest clinical knowledge during a public-health emergency. One surprisingly effective platform for healthcare professionals (HCPs) to share knowledge and experiences from the front lines has been social media (for example, the "#medtwitter" community on Twitter). However, identifying clinically-releva… ▽ More

    Submitted 28 June, 2021; v1 submitted 12 February, 2021; originally announced February 2021.

    Comments: 24 pages, 5 figures. To be published in the Journal of Biomedical Informatics

  31. arXiv:2101.09795  [pdf, other

    cs.PF

    Comparing Broadband ISP Performance using Big Data from M-Lab

    Authors: Xiaohong Deng, Yun Feng, Thanchanok Sutjarittham, Hassan Habibi Gharakheili, Blanca Gallego, Vijay Sivaraman

    Abstract: Comparing ISPs on broadband speed is challenging, since measurements can vary due to subscriber attributes such as operation system and test conditions such as access capacity, server distance, TCP window size, time-of-day, and network segment size. In this paper, we draw inspiration from observational studies in medicine, which face a similar challenge in comparing the effect of treatments on pat… ▽ More

    Submitted 24 January, 2021; originally announced January 2021.

    Comments: 14 pages, 16 figures. arXiv admin note: text overlap with arXiv:1901.07059

  32. arXiv:2012.11712  [pdf, other

    math.CO

    The family of bicircular matroids closed under duality

    Authors: Vaidy Sivaraman, Daniel Slilaty

    Abstract: We characterize the 3-connected members of the intersection of the class of bicircular and cobicircular matroids. Aside from some exceptional matroids with rank and corank at most 5, this class consists of just the free swirls and their minors.

    Submitted 21 December, 2020; originally announced December 2020.

    Comments: 15 pages

  33. arXiv:2010.10509  [pdf, other

    cs.NI cs.DC

    Software-Defined Multi-domain Tactical Networks: Foundations and Future Directions

    Authors: Redowan Mahmud, Adel N. Toosi, Maria Alejandra Rodriguez, Sharat Chandra Madanapalli, Vijay Sivaraman, Len Sciacca, Christos Sioutis, Rajkumar Buyya

    Abstract: Software Defined Networking (SDN) has emerged as a programmable approach for provisioning and managing network resources by defining a clear separation between the control and data forwarding planes. Nowadays SDN has gained significant attention in the military domain. Its use in the battlefield communication facilitates the end-to-end interactions and assists the exploitation of edge computing re… ▽ More

    Submitted 21 October, 2020; originally announced October 2020.

  34. arXiv:2008.09339  [pdf, other

    cs.CR cs.NI

    IoT Network Security: Requirements, Threats, and Countermeasures

    Authors: Ayyoob Hamza, Hassan Habibi Gharakheili, Vijay Sivaraman

    Abstract: IoT devices are increasingly utilized in critical infrastructure, enterprises, and households. There are several sophisticated cyber-attacks that have been reported and many networks have proven vulnerable to both active and passive attacks by leaking private information, allowing unauthorized access, and being open to denial of service attacks. This paper aims firstly, to assist network operato… ▽ More

    Submitted 21 August, 2020; originally announced August 2020.

    Comments: 13 pages, 2 figures

  35. Optimal Witnessing of Healthcare IoT Data Using Blockchain Logging Contract

    Authors: Mohammad Hossein Chinaei, Hassan Habibi Gharakheili, Vijay Sivaraman

    Abstract: Verification of data generated by wearable sensors is increasingly becoming of concern to health service providers and insurance companies. There is a need for a verification framework that various authorities can request a verification service for the local network data of a target IoT device. In this paper, we leverage blockchain as a distributed platform to realize an on-demand verification sch… ▽ More

    Submitted 7 July, 2020; originally announced July 2020.

    Comments: 12 pages, 12 figures

  36. arXiv:2005.13745  [pdf, other

    cs.CY cs.HC

    HazeDose: Design and Analysis of a Personal Air Pollution Inhaled Dose Estimation System using Wearable Sensors

    Authors: Ke Hu, Ashfaqur Rahman, Hassan Habibi Gharakheili, Vijay Sivaraman

    Abstract: Nowadays air pollution becomes one of the biggest world issues in both develo** and developed countries. Hel** individuals understand their air pollution exposure and health risks, the traditional way is to utilize data from static monitoring stations and estimate air pollution qualities in a large area by government agencies. Data from such sensing system is very sparse and cannot reflect rea… ▽ More

    Submitted 27 May, 2020; originally announced May 2020.

    Comments: 29 pages, 8 figures

    ACM Class: I.6.4; I.6.5; H.5.2

  37. arXiv:2001.00477  [pdf, ps, other

    math.CO cs.DM

    Cop number of graphs without long holes

    Authors: Vaidy Sivaraman

    Abstract: A hole in a graph is an induced cycle of length at least 4. We give a simple winning strategy for t-3 cops to capture a robber in the game of cops and robbers played in a graph that does not contain a hole of length at least t. This strengthens a theorem of Joret-Kaminski-Theis, who proved that t-2 cops have a winning strategy in such graphs. As a consequence of our bound, we also give an inequali… ▽ More

    Submitted 29 December, 2019; originally announced January 2020.

    Comments: arXiv admin note: text overlap with arXiv:1903.01338

  38. arXiv:1903.11484  [pdf, ps, other

    math.CO cs.DM

    Cop number of $2K_2$-free graphs

    Authors: Vaidy Sivaraman, Stephen Testa

    Abstract: We prove that the cop number of a $2K_2$-free graph is at most $2$ if it has diameter $3$ or does not have an induced cycle of length $k$, where $k \ \in \{3,4,5\}$. We conjecture that the cop number of every $2K_2$-free graph is at most $2$.

    Submitted 27 March, 2019; originally announced March 2019.

  39. arXiv:1903.01338  [pdf, ps, other

    math.CO cs.DM

    An application of the Gyárfás path argument

    Authors: Vaidy Sivaraman

    Abstract: We adapt the Gyárfás path argument to prove that $t-2$ cops can capture a robber, in at most $t-1$ moves, in the game of cops and robbers played in a graph that does not contain the $t$-vertex path as an induced subgraph.

    Submitted 4 March, 2019; originally announced March 2019.

  40. Verifying and Monitoring IoTs Network Behavior using MUD Profiles

    Authors: Ayyoob Hamza, Dinesha Ranathunga, Hassan Habibi Gharakheili, Theophilus A. Benson, Matthew Roughan, Vijay Sivaraman

    Abstract: IoT devices are increasingly being implicated in cyber-attacks, raising community concern about the risks they pose to critical infrastructure, corporations, and citizens. In order to reduce this risk, the IETF is pushing IoT vendors to develop formal specifications of the intended purpose of their IoT devices, in the form of a Manufacturer Usage Description (MUD), so that their network behavior i… ▽ More

    Submitted 7 February, 2019; originally announced February 2019.

    Comments: 17 pages, 17 figures. arXiv admin note: text overlap with arXiv:1804.04358

  41. arXiv:1901.07059  [pdf, other

    cs.NI

    Estimating Residential Broadband Capacity using Big Data from M-Lab

    Authors: Xiaohong Deng, Yun Feng, Hassan Habibi Gharakheili, Vijay Sivaraman

    Abstract: Knowing residential broadband capacity profiles across a population is of interest to both consumers and regulators who want to compare or audit performance of various broadband service offerings. Unfortunately, extracting broadband capacity from speed tests in public datasets like M-Lab is challenging because tests are indexed by client IP address which can be dynamic and/or obfuscated by NAT, an… ▽ More

    Submitted 21 January, 2019; originally announced January 2019.

    Comments: 10 pages, 9 figures

  42. arXiv:1809.05088  [pdf, other

    cs.NI

    High Throughput Cryptocurrency Routing in Payment Channel Networks

    Authors: Vibhaalakshmi Sivaraman, Shaileshh Bojja Venkatakrishnan, Kathy Ruan, Parimarjan Negi, Lei Yang, Radhika Mittal, Mohammad Alizadeh, Giulia Fanti

    Abstract: Despite growing adoption of cryptocurrencies, making fast payments at scale remains a challenge. Payment channel networks (PCNs) such as the Lightning Network have emerged as a viable scaling solution. However, completing payments on PCNs is challenging: payments must be routed on paths with sufficient funds. As payments flow over a single channel (link) in the same direction, the channel eventual… ▽ More

    Submitted 23 March, 2020; v1 submitted 13 September, 2018; originally announced September 2018.

  43. Classes of graphs with no long cycle as a vertex-minor are polynomially $χ$-bounded

    Authors: Ringi Kim, O-joung Kwon, Sang-il Oum, Vaidy Sivaraman

    Abstract: A class $\mathcal G$ of graphs is $χ$-bounded if there is a function $f$ such that for every graph $G\in \mathcal G$ and every induced subgraph $H$ of $G$, $χ(H)\le f(ω(H))$. In addition, we say that $\mathcal G$ is polynomially $χ$-bounded if $f$ can be taken as a polynomial function. We prove that for every integer $n\ge3$, there exists a polynomial $f$ such that $χ(G)\le f(ω(G))$ for all graphs… ▽ More

    Submitted 17 May, 2019; v1 submitted 12 September, 2018; originally announced September 2018.

    Comments: 15 pages, 2 figures

    MSC Class: 05C15

    Journal ref: J. Combin. Theory Ser. B, 2019

  44. iTeleScope: Intelligent Video Telemetry and Classification in Real-Time using Software Defined Networking

    Authors: Hassan Habibi Gharakheili, Minzhao Lyu, Yu Wang, Himal Kumar, Vijay Sivaraman

    Abstract: Video continues to dominate network traffic, yet operators today have poor visibility into the number, duration, and resolutions of the video streams traversing their domain. Current approaches are inaccurate, expensive, or unscalable, as they rely on statistical sampling, middle-box hardware, or packet inspection software. We present {\em iTelescope}, the first intelligent, inexpensive, and scala… ▽ More

    Submitted 26 April, 2018; originally announced April 2018.

    Comments: 12 pages, 16 figures

  45. Clear as MUD: Generating, Validating and Applying IoT Behaviorial Profiles (Technical Report)

    Authors: Ayyoob Hamza, Dinesha Ranathunga, H. Habibi Gharakheili, Matthew Roughan, Vijay Sivaraman

    Abstract: IoT devices are increasingly being implicated in cyber-attacks, driving community concern about the risks they pose to critical infrastructure, corporations, and citizens. In order to reduce this risk, the IETF is pushing IoT vendors to develop formal specifications of the intended purpose of their IoT devices, in the form of a Manufacturer Usage Description (MUD), so that their network behavior i… ▽ More

    Submitted 12 April, 2018; originally announced April 2018.

  46. arXiv:1803.03315  [pdf, other

    math.CO

    The class of $(P_7,C_4,C_5)$-free graphs: decomposition, algorithms, and $χ$-boundedness

    Authors: Kathie Cameron, Shenwei Huang, Irena Penev, Vaidy Sivaraman

    Abstract: As usual, $P_n$ ($n \geq 1$) denotes the path on $n$ vertices, and $C_n$ ($n \geq 3$) denotes the cycle on $n$ vertices. For a family $\mathcal{H}$ of graphs, we say that a graph $G$ is $\mathcal{H}$-free if no induced subgraph of $G$ is isomorphic to any graph in $\mathcal{H}$. We present a decomposition theorem for the class of $(P_7,C_4,C_5)$-free graphs; in fact, we give a complete structural… ▽ More

    Submitted 8 March, 2018; originally announced March 2018.

    MSC Class: 05C75; 05C85

  47. Sum-perfect graphs

    Authors: Bart Litjens, Sven Polak, Vaidy Sivaraman

    Abstract: Inspired by a famous characterization of perfect graphs due to Lovász, we define a graph $G$ to be sum-perfect if for every induced subgraph $H$ of $G$, $α(H) + ω(H) \geq |V(H)|$. (Here $α$ and $ω$ denote the stability number and clique number, respectively.) We give a set of $27$ graphs and we prove that a graph $G$ is sum-perfect if and only if $G$ does not contain any of the graphs in the set a… ▽ More

    Submitted 20 October, 2017; originally announced October 2017.

    Comments: 10 pages, 3 figures

    MSC Class: 05C17; 05C69; 05C75

    Journal ref: Discrete Applied Mathematics, 259 (2019), 232-239

  48. arXiv:1705.05911  [pdf, ps, other

    math.CO

    Four NP-complete problems about generalizations of perfect graphs

    Authors: Vaidy Sivaraman

    Abstract: We show that the following problems are NP-complete. 1. Can the vertex set of a graph be partitioned into two sets such that each set induces a perfect graph? 2. Is the difference between the chromatic number and clique number at most $1$ for every induced subgraph of a graph? 3. Can the vertex set of every induced subgraph of a graph be partitioned into two sets such that the first set indu… ▽ More

    Submitted 16 May, 2017; originally announced May 2017.

    MSC Class: 05C17; 05C85

  49. arXiv:1704.06667  [pdf, ps, other

    math.CO

    Perfect divisibility and 2-divisibility

    Authors: Maria Chudnovsky, Vaidy Sivaraman

    Abstract: A graph $G$ is said to be $2$-divisible if for all (nonempty) induced subgraphs $H$ of $G$, $V(H)$ can be partitioned into two sets $A,B$ such that $ω(A) < ω(H)$ and $ω(B) < ω(H)$. A graph $G$ is said to be perfectly divisible if for all induced subgraphs $H$ of $G$, $V(H)$ can be partitioned into two sets $A,B$ such that $H[A]$ is perfect and $ω(B) < ω(H)$. We prove that if a graph is… ▽ More

    Submitted 21 April, 2017; originally announced April 2017.

    MSC Class: 05C15

  50. arXiv:1704.04262  [pdf, ps, other

    math.CO cs.DM

    Odd holes in bull-free graphs

    Authors: Maria Chudnovsky, Vaidy Sivaraman

    Abstract: The complexity of testing whether a graph contains an induced odd cycle of length at least five is currently unknown. In this paper we show that this can be done in polynomial time if the input graph has no induced subgraph isomorphic to the bull (a triangle with two disjoint pendant edges).

    Submitted 13 April, 2017; originally announced April 2017.

    MSC Class: 05C85