Skip to main content

Showing 1–20 of 20 results for author: Aktas, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.10360  [pdf, other

    cs.DC cs.IT

    Controlling Data Access Load in Distributed Systems

    Authors: Mehmet Aktas, Emina Soljanin

    Abstract: Distributed systems store data objects redundantly to balance the data access load over multiple nodes. Load balancing performance depends mainly on 1) the level of storage redundancy and 2) the assignment of data objects to storage nodes. We analyze the performance implications of these design choices by considering four practical storage schemes that we refer to as clustering, cyclic, block and… ▽ More

    Submitted 16 December, 2023; originally announced December 2023.

    Comments: Submitted to Transactions on Networking

  2. arXiv:2310.09657  [pdf, other

    cs.LG

    Topology-guided Hypergraph Transformer Network: Unveiling Structural Insights for Improved Representation

    Authors: Khaled Mohammed Saifuddin, Mehmet Emin Aktas, Esra Akbas

    Abstract: Hypergraphs, with their capacity to depict high-order relationships, have emerged as a significant extension of traditional graphs. Although Graph Neural Networks (GNNs) have remarkable performance in graph representation learning, their extension to hypergraphs encounters challenges due to their intricate structures. Furthermore, current hypergraph transformers, a special variant of GNN, utilize… ▽ More

    Submitted 21 May, 2024; v1 submitted 14 October, 2023; originally announced October 2023.

    Comments: 9 pages, 3 figures

  3. arXiv:2308.12115  [pdf, other

    cs.DC cs.IT

    Theory vs. Practice in Modeling Edge Storage Systems

    Authors: Oleg Kolosov, Mehmet Fatih Aktas, Emina Soljanin, Gala Yadgar

    Abstract: Edge systems promise to bring data and computing closer to the users of time-critical applications. Specifically, edge storage systems are emerging as a new system paradigm, where users can retrieve data from small-scale servers inter-operating at the network's edge. The analysis, design, and optimization of such systems require a tractable model that will reflect their costs and bottlenecks. Alas… ▽ More

    Submitted 23 August, 2023; originally announced August 2023.

    Comments: Accepted to 2023 IEEE International Performance, Computing, and Communications Conference (IPCCC)

  4. arXiv:2306.11484  [pdf, other

    math.AT cs.SI

    Hypergraph Classification via Persistent Homology

    Authors: Mehmet Emin Aktas, Thu Nguyen, Rakin Riza, Muhammad Ifte Islam, Esra Akbas

    Abstract: Persistent homology is a mathematical tool used for studying the shape of data by extracting its topological features. It has gained popularity in network science due to its applicability in various network mining problems, including clustering, graph classification, and graph neural networks. The definition of persistent homology for graphs is relatively straightforward, as graphs possess distinc… ▽ More

    Submitted 20 June, 2023; originally announced June 2023.

    MSC Class: 55N31; 62R40

  5. arXiv:2203.11275  [pdf, other

    cs.SI math.AT

    Liars are more influential: Effect of Deception in Influence Maximization on Social Networks

    Authors: Mehmet Emin Aktas, Esra Akbas, Ashley Hahn

    Abstract: Detecting influential users, called the influence maximization problem on social networks, is an important graph mining problem with many diverse applications such as information propagation, market advertising, and rumor controlling. There are many studies in the literature for influential users detection problem in social networks. Although the current methods are successfully used in many diffe… ▽ More

    Submitted 21 March, 2022; originally announced March 2022.

    MSC Class: 91D30; 55N30

  6. arXiv:2105.02763  [pdf, other

    cs.SI

    Identifying critical higher-order interactions in complex networks

    Authors: Mehmet Emin Aktas, Thu Nguyen, Sidra Jawaid, Rakin Riza, Esra Akbas

    Abstract: Information diffusion on networks is an important concept in network science observed in many situations such as information spreading and rumor controlling in social networks, disease contagion between individuals, cascading failures in power grids. The critical interactions in networks are the ones that play critical roles in information diffusion and primarily affect network structure and funct… ▽ More

    Submitted 7 May, 2021; v1 submitted 6 May, 2021; originally announced May 2021.

    MSC Class: 55U10; 91D30

  7. arXiv:2102.08867  [pdf, other

    cs.SI math.SP

    Hypergraph Laplacians in Diffusion Framework

    Authors: Mehmet Emin Aktas, Esra Akbas

    Abstract: Networks are important structures used to model complex systems where interactions take place. In a basic network model, entities are represented as nodes, and interaction and relations among them are represented as edges. However, in a complex system, we cannot describe all relations as pairwise interactions, rather should describe as higher-order interactions. Hypergraphs are successfully used t… ▽ More

    Submitted 17 February, 2021; originally announced February 2021.

    MSC Class: 55U10; 91D30

  8. arXiv:2009.01598  [pdf, other

    cs.IT cs.DM cs.PF

    Service Rate Region: A New Aspect of Coded Distributed System Design

    Authors: Mehmet Aktas, Gauri Joshi, Swanand Kadhe, Fatemeh Kazemi, Emina Soljanin

    Abstract: Erasure coding has been recognized as a powerful method to mitigate delays due to slow or straggling nodes in distributed systems. This work shows that erasure coding of data objects can flexibly handle skews in the request rates. Coding can help boost the \emph{service rate region}, that is, increase the overall volume of data access requests that the system can handle. This paper aims to postula… ▽ More

    Submitted 27 June, 2021; v1 submitted 3 September, 2020; originally announced September 2020.

  9. arXiv:2007.00434  [pdf, other

    cs.SI math.AT

    Graph Classification via Heat Diffusion on Simplicial Complexes

    Authors: Mehmet Emin Aktas, Esra Akbas

    Abstract: In this paper, we study the graph classification problem in vertex-labeled graphs. Our main goal is to classify the graphs comparing their higher-order structures thanks to heat diffusion on their simplices. We first represent vertex-labeled graphs as simplex-weighted super-graphs. We then define the diffusion Frechet function over their simplices to encode the higher-order network topology and fi… ▽ More

    Submitted 26 June, 2020; originally announced July 2020.

    MSC Class: 55U10

  10. arXiv:1912.09765  [pdf, other

    cs.PF cs.DC cs.IT

    Download Time Analysis for Distributed Storage Codes with Locality and Availability

    Authors: Mehmet Fatih Aktas, Swanand Kadhe, Emina Soljanin, Alex Sprintson

    Abstract: The paper presents techniques for analyzing the expected download time in distributed storage systems that employ systematic availability codes. These codes provide access to hot data through the systematic server containing the object and multiple recovery groups. When a request for an object is received, it can be replicated (forked) to the systematic server and all recovery groups. We first con… ▽ More

    Submitted 10 March, 2021; v1 submitted 20 December, 2019; originally announced December 2019.

    Comments: Accepted for a publication in IEEE Transactions on Communications

  11. Evaluating Load Balancing Performance in Distributed Storage with Redundancy

    Authors: Mehmet Fatih Aktas, Amir Behrouzi-Far, Emina Soljanin, Philip Whiting

    Abstract: To facilitate load balancing, distributed systems store data redundantly. We evaluate the load balancing performance of storage schemes in which each object is stored at $d$ different nodes, and each node stores the same number of objects. In our model, the load offered for the objects is sampled uniformly at random from all the load vectors with a fixed cumulative value. We find that the load bal… ▽ More

    Submitted 22 January, 2021; v1 submitted 13 October, 2019; originally announced October 2019.

    Comments: To appear in Transactions on Information Theory

  12. arXiv:1907.11603  [pdf, other

    cs.PF cs.IT

    Anonymity Mixes as (Partial) Assembly Queues: Modeling and Analysis

    Authors: Mehmet Fatih Aktas, Emina Soljanin

    Abstract: Anonymity platforms route the traffic over a network of special routers that are known as mixes and implement various traffic disruption techniques to hide the communicating users' identities. Batch mixes in particular anonymize communicating peers by allowing message exchange to take place only after a sufficient number of messages (a batch) accumulate, thus introducing delay. We introduce a queu… ▽ More

    Submitted 26 July, 2019; originally announced July 2019.

    Comments: IEEE Information Theory Workshop, 2019

  13. arXiv:1907.08708  [pdf, other

    math.AT cs.SI

    Persistence Homology of Networks: Methods and Applications

    Authors: Mehmet Emin Aktas, Esra Akbas, Ahmed El Fatmaoui

    Abstract: Information networks are becoming increasingly popular to capture complex relationships across various disciplines, such as social networks, citation networks, and biological networks. The primary challenge in this domain is measuring similarity or distance between networks based on topology. However, classical graph-theoretic measures are usually local and mainly based on differences between eith… ▽ More

    Submitted 19 July, 2019; originally announced July 2019.

    Comments: Submitted to Applied Network Science Special Issue on Machine Learning with Graphs

    MSC Class: 55U99; 55N35; 05C82

  14. arXiv:1907.02811  [pdf, ps, other

    cs.SI cs.LG

    Network Embedding: on Compression and Learning

    Authors: Esra Akbas, Mehmet Aktas

    Abstract: Recently, network embedding that encodes structural information of graphs into a vector space has become popular for network analysis. Although recent methods show promising performance for various applications, the huge sizes of graphs may hinder a direct application of existing network embedding method to them. This paper presents NECL, a novel efficient Network Embedding method with two goals.… ▽ More

    Submitted 8 July, 2019; v1 submitted 5 July, 2019; originally announced July 2019.

    Comments: arXiv admin note: text overlap with arXiv:1706.07845, arXiv:1607.00653 by other authors

  15. arXiv:1906.10664  [pdf, other

    cs.PF cs.DC cs.IT

    Straggler Mitigation at Scale

    Authors: Mehmet Fatih Aktas, Emina Soljanin

    Abstract: Runtime performance variability at the servers has been a major issue, hindering the predictable and scalable performance in modern distributed systems. Executing requests or jobs redundantly over multiple servers has been shown to be effective for mitigating variability, both in theory and practice. Systems that employ redundancy has drawn significant attention, and numerous papers have analyzed… ▽ More

    Submitted 9 October, 2019; v1 submitted 25 June, 2019; originally announced June 2019.

    Comments: To appear in Transactions on Networking

  16. arXiv:1906.05345  [pdf, other

    cs.PF cs.DC cs.IT

    Optimizing Redundancy Levels in Master-Worker Compute Clusters for Straggler Mitigation

    Authors: Mehmet Fatih Aktas, Emina Soljanin

    Abstract: Runtime variability in computing systems causes some tasks to straggle and take much longer than expected to complete. These straggler tasks are known to significantly slowdown distributed computation. Job execution with speculative execution of redundant tasks has been the most widely deployed technique for mitigating the impact of stragglers, and many recent theoretical papers have studied the a… ▽ More

    Submitted 12 June, 2019; originally announced June 2019.

  17. arXiv:1804.06489  [pdf, other

    cs.IT cs.PF

    Simplex Queues for Hot-Data Download

    Authors: Mehmet Fatih Aktas, Elie Najm, Emina Soljanin

    Abstract: In cloud storage systems, hot data is usually replicated over multiple nodes in order to accommodate simultaneous access by multiple users as well as increase the fault tolerance of the system. Recent cloud storage research has proposed using availability codes, which is a special class of erasure codes, as a more storage efficient way to store hot data. These codes enable data recovery from multi… ▽ More

    Submitted 17 April, 2018; originally announced April 2018.

  18. arXiv:1710.03376  [pdf, other

    cs.IT

    On the Service Capacity Region of Accessing Erasure Coded Content

    Authors: Mehmet Aktas, Sarah E. Anderson, Ann Johnston, Gauri Joshi, Swanand Kadhe, Gretchen L. Matthews, Carolyn Mayer, Emina Soljanin

    Abstract: Cloud storage systems generally add redundancy in storing content files such that $K$ files are replicated or erasure coded and stored on $N > K$ nodes. In addition to providing reliability against failures, the redundant copies can be used to serve a larger volume of content access requests. A request for one of the files can be either be sent to a systematic node, or one of the repair groups. In… ▽ More

    Submitted 9 October, 2017; originally announced October 2017.

    Comments: To be published in 2017 55th Annual Allerton Conference on Communication, Control, and Computing

  19. arXiv:1710.00748  [pdf, other

    cs.PF cs.DC cs.IT

    Effective Straggler Mitigation: Which Clones Should Attack and When?

    Authors: Mehmet Fatih Aktas, Pei Peng, Emina Soljanin

    Abstract: Redundancy for straggler mitigation, originally in data download and more recently in distributed computing context, has been shown to be effective both in theory and practice. Analysis of systems with redundancy has drawn significant attention and numerous papers have studied pain and gain of redundancy under various service models and assumptions on the straggler characteristics. We here present… ▽ More

    Submitted 2 October, 2017; originally announced October 2017.

    Comments: Published at MAMA Workshop in conjunction with ACM Sigmetrics, June 5, 2017

  20. arXiv:1710.00414  [pdf, other

    cs.PF cs.DC cs.IT

    Straggler Mitigation by Delayed Relaunch of Tasks

    Authors: Mehmet Fatih Aktas, Pei Peng, Emina Soljanin

    Abstract: Redundancy for straggler mitigation, originally in data download and more recently in distributed computing context, has been shown to be effective both in theory and practice. Analysis of systems with redundancy has drawn significant attention and numerous papers have studied pain and gain of redundancy under various service models and assumptions on the straggler characteristics. We here present… ▽ More

    Submitted 1 October, 2017; originally announced October 2017.

    Comments: Accepted for IFIP WG 7.3 Performance 2017. Nov. 14-16, 2017, New York, NY USA