Skip to main content

Showing 1–50 of 51 results for author: Amiri, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.04257  [pdf, ps, other

    cs.LG cs.IR

    Data Measurements for Decentralized Data Markets

    Authors: Charles Lu, Mohammad Mohammadi Amiri, Ramesh Raskar

    Abstract: Decentralized data markets can provide more equitable forms of data acquisition for machine learning. However, to realize practical marketplaces, efficient techniques for seller selection need to be developed. We propose and benchmark federated data measurements to allow a data buyer to find sellers with relevant and diverse datasets. Diversity and relevance measures enable a buyer to make relativ… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

    Comments: 20 pages, 11 figures

  2. arXiv:2404.07267  [pdf, other

    cs.RO math.OC

    Closed-Loop Model Identification and MPC-based Navigation of Quadcopters: A Case Study of Parrot Bebop 2

    Authors: Mohsen Amiri, Mehdi Hosseinzadeh

    Abstract: The growing potential of quadcopters in various domains, such as aerial photography, search and rescue, and infrastructure inspection, underscores the need for real-time control under strict safety and operational constraints. This challenge is compounded by the inherent nonlinear dynamics of quadcopters and the on-board computational limitations they face. This paper aims at addressing these chal… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

  3. arXiv:2403.18536  [pdf

    cs.IR cs.AI cs.HC

    A Novel Behavior-Based Recommendation System for E-commerce

    Authors: Reza Barzegar Nozari, Mahdi Divsalar, Sepehr Akbarzadeh Abkenar, Mohammadreza Fadavi Amiri, Ali Divsalar

    Abstract: The majority of existing recommender systems rely on user ratings, which are limited by the lack of user collaboration and the sparsity problem. To address these issues, this study proposes a behavior-based recommender system that leverages customers' natural behaviors, such as browsing and clicking, on e-commerce platforms. The proposed recommendation system involves clustering active customers,… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  4. arXiv:2401.07644  [pdf, other

    cs.IT eess.SP

    Resource Allocation in STAR-RIS-Aided SWIPT with RSMA via Meta-Learning

    Authors: Mojtaba Amiri, Elaheh Vaezpour, Sepideh Javadi, Mohammad Robat Mili, Halim Yanikomeroglu, Mehdi Bennis

    Abstract: Simultaneously transmitting and reflecting reconfigurable intelligent surface (STAR-RIS) is a cutting-edge concept for the sixth-generation (6G) wireless networks. In this paper, we propose a novel system that incorporates STAR-RIS with simultaneous wireless information and power transfer (SWIPT) using rate splitting multiple access (RSMA). The proposed system facilitates communication from a mult… ▽ More

    Submitted 6 May, 2024; v1 submitted 15 January, 2024; originally announced January 2024.

  5. arXiv:2311.00079  [pdf, other

    cs.CV cs.LG

    Spuriosity Rankings for Free: A Simple Framework for Last Layer Retraining Based on Object Detection

    Authors: Mohammad Azizmalayeri, Reza Abbasi, Amir Hosein Haji Mohammad rezaie, Reihaneh Zohrabi, Mahdi Amiri, Mohammad Taghi Manzuri, Mohammad Hossein Rohban

    Abstract: Deep neural networks have exhibited remarkable performance in various domains. However, the reliance of these models on spurious features has raised concerns about their reliability. A promising solution to this problem is last-layer retraining, which involves retraining the linear classifier head on a small subset of data without spurious cues. Nevertheless, selecting this subset requires human s… ▽ More

    Submitted 31 October, 2023; originally announced November 2023.

    Comments: Accepted at ICML 2023 Workshop on Spurious Correlations, Invariance, and Stability (SCIS)

  6. arXiv:2310.18975  [pdf, other

    cs.CV cs.LG

    Blacksmith: Fast Adversarial Training of Vision Transformers via a Mixture of Single-step and Multi-step Methods

    Authors: Mahdi Salmani, Alireza Dehghanpour Farashah, Mohammad Azizmalayeri, Mahdi Amiri, Navid Eslami, Mohammad Taghi Manzuri, Mohammad Hossein Rohban

    Abstract: Despite the remarkable success achieved by deep learning algorithms in various domains, such as computer vision, they remain vulnerable to adversarial perturbations. Adversarial Training (AT) stands out as one of the most effective solutions to address this issue; however, single-step AT can lead to Catastrophic Overfitting (CO). This scenario occurs when the adversarially trained network suddenly… ▽ More

    Submitted 29 October, 2023; originally announced October 2023.

  7. arXiv:2309.03179  [pdf, other

    cs.CV cs.LG

    SLiMe: Segment Like Me

    Authors: Aliasghar Khani, Saeid Asgari Taghanaki, Aditya Sanghi, Ali Mahdavi Amiri, Ghassan Hamarneh

    Abstract: Significant strides have been made using large vision-language models, like Stable Diffusion (SD), for a variety of downstream tasks, including image editing, image correspondence, and 3D shape generation. Inspired by these advancements, we explore leveraging these extensive vision-language models for segmenting images at any desired granularity using as few as one annotated sample by proposing SL… ▽ More

    Submitted 14 March, 2024; v1 submitted 6 September, 2023; originally announced September 2023.

  8. arXiv:2301.11497  [pdf, other

    cs.CV cs.GR

    D$^2$CSG: Unsupervised Learning of Compact CSG Trees with Dual Complements and Dropouts

    Authors: Fenggen Yu, Qimin Chen, Maham Tanveer, Ali Mahdavi Amiri, Hao Zhang

    Abstract: We present D$^2$CSG, a neural model composed of two dual and complementary network branches, with dropouts, for unsupervised learning of compact constructive solid geometry (CSG) representations of 3D CAD shapes. Our network is trained to reconstruct a 3D shape by a fixed-order assembly of quadric primitives, with both branches producing a union of primitive intersections or inverses. A key differ… ▽ More

    Submitted 1 June, 2023; v1 submitted 26 January, 2023; originally announced January 2023.

    Comments: 9 pages

  9. arXiv:2212.12044  [pdf, other

    q-fin.ST cs.AI

    Design interpretable experience of dynamical feed forward machine learning model for forecasting NASDAQ

    Authors: Pouriya Khalilian, Sara Azizi, Mohammad Hossein Amiri, Javad T. Firouzjaee

    Abstract: National Association of Securities Dealers Automated Quotations(NASDAQ) is an American stock exchange based. It is one of the most valuable stock economic indices in the world and is located in New York City \cite{pagano2008quality}. The volatility of the stock market and the influence of economic indicators such as crude oil, gold, and the dollar in the stock market, and NASDAQ shares are also af… ▽ More

    Submitted 22 December, 2022; originally announced December 2022.

    Comments: 21 pages, 5 figures

  10. AdaChain: A Learned Adaptive Blockchain

    Authors: Chenyuan Wu, Bhavana Mehta, Mohammad Javad Amiri, Ryan Marcus, Boon Thau Loo

    Abstract: This paper presents AdaChain, a learning-based blockchain framework that adaptively chooses the best permissioned blockchain architecture in order to optimize effective throughput for dynamic transaction workloads. AdaChain addresses the challenge in the Blockchain-as-a-Service (BaaS) environments, where a large variety of possible smart contracts are deployed with different workload characteristi… ▽ More

    Submitted 17 July, 2023; v1 submitted 3 November, 2022; originally announced November 2022.

  11. arXiv:2208.12354  [pdf, other

    cs.LG cs.AI cs.CY cs.IT stat.ML

    Fundamentals of Task-Agnostic Data Valuation

    Authors: Mohammad Mohammadi Amiri, Frederic Berdoz, Ramesh Raskar

    Abstract: We study valuing the data of a data owner/seller for a data seeker/buyer. Data valuation is often carried out for a specific task assuming a particular utility metric, such as test accuracy on a validation set, that may not exist in practice. In this work, we focus on task-agnostic data valuation without any validation requirements. The data buyer has access to a limited amount of data (which coul… ▽ More

    Submitted 25 August, 2022; originally announced August 2022.

  12. arXiv:2207.13827  [pdf, other

    cs.SE

    Declarative Smart Contracts

    Authors: Haoxian Chen, Gerald Whitters, Mohammad Javad Amiri, Yuepeng Wang, Boon Thau Loo

    Abstract: This paper presents DeCon, a declarative programming language for implementing smart contracts and specifying contract-level properties. Driven by the observation that smart contract operations and contract-level properties can be naturally expressed as relational constraints, DeCon models each smart contract as a set of relational tables that store transaction records. This relational representat… ▽ More

    Submitted 27 July, 2022; originally announced July 2022.

  13. arXiv:2207.03652  [pdf, other

    math.ST cs.CR cs.LG stat.ME

    Private independence testing across two parties

    Authors: Praneeth Vepakomma, Mohammad Mohammadi Amiri, Clément L. Canonne, Ramesh Raskar, Alex Pentland

    Abstract: We introduce $π$-test, a privacy-preserving algorithm for testing statistical independence between data distributed across multiple parties. Our algorithm relies on privately estimating the distance correlation between datasets, a quantitative measure of independence introduced in Székely et al. [2007]. We establish both additive and multiplicative error bounds on the utility of our differentially… ▽ More

    Submitted 26 September, 2023; v1 submitted 7 July, 2022; originally announced July 2022.

  14. arXiv:2206.05723  [pdf, ps, other

    cs.IT cs.DC

    Communication-Efficient Federated Learning over MIMO Multiple Access Channels

    Authors: Yo-Seb Jeon, Mohammad Mohammadi Amiri, Namyoon Lee

    Abstract: Communication efficiency is of importance for wireless federated learning systems. In this paper, we propose a communication-efficient strategy for federated learning over multiple-input multiple-output (MIMO) multiple access channels (MACs). The proposed strategy comprises two components. When sending a locally computed gradient, each device compresses a high dimensional local gradient to multipl… ▽ More

    Submitted 12 June, 2022; originally announced June 2022.

  15. arXiv:2205.04534  [pdf, other

    cs.DC

    The Bedrock of Byzantine Fault Tolerance: A Unified Platform for BFT Protocol Design and Implementation

    Authors: Mohammad Javad Amiri, Chenyuan Wu, Divyakant Agrawal, Amr El Abbadi, Boon Thau Loo, Mohammad Sadoghi

    Abstract: Byzantine Fault-Tolerant (BFT) protocols have recently been extensively used by decentralized data management systems with non-trustworthy infrastructures, e.g., permissioned blockchains. BFT protocols cover a broad spectrum of design dimensions from infrastructure settings such as the communication topology, to more technical features such as commitment strategy and even fundamental social choice… ▽ More

    Submitted 3 August, 2022; v1 submitted 9 May, 2022; originally announced May 2022.

  16. arXiv:2107.10836  [pdf, other

    cs.DB

    Qanaat: A Scalable Multi-Enterprise Permissioned Blockchain System with Confidentiality Guarantees

    Authors: Mohammad Javad Amiri, Boon Thau Loo, Divyakant Agrawal, Amr El Abbadi

    Abstract: Today's large-scale data management systems need to address distributed applications' confidentiality and scalability requirements among a set of collaborative enterprises. This paper presents Qanaat, a scalable multi-enterprise permissioned blockchain system that guarantees the confidentiality of enterprises in collaboration workflows. Qanaat presents data collections that enable any subset of en… ▽ More

    Submitted 17 July, 2022; v1 submitted 22 July, 2021; originally announced July 2021.

    Journal ref: Proceedings of the VLDB Endowment 15, no. 11 (2022)

  17. arXiv:2107.03510  [pdf, ps, other

    cs.IT cs.AI eess.SP

    Federated Learning with Downlink Device Selection

    Authors: Mohammad Mohammadi Amiri, Sanjeev R. Kulkarni, H. Vincent Poor

    Abstract: We study federated edge learning, where a global model is trained collaboratively using privacy-sensitive data at the edge of a wireless network. A parameter server (PS) keeps track of the global model and shares it with the wireless edge devices for training using their private local data. The devices then transmit their local model updates, which are used to update the global model, to the PS. T… ▽ More

    Submitted 7 July, 2021; originally announced July 2021.

    Comments: accepted in IEEE International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2021

  18. arXiv:2101.08819  [pdf, other

    cs.DB cs.NI

    Saguaro: An Edge Computing-Enabled Hierarchical Permissioned Blockchain

    Authors: Mohammad Javad Amiri, Ziliang Lai, Liana Patel, Boon Thau Loo, Eric Lo, Wenchao Zhou

    Abstract: We present Saguaro, a permissioned blockchain system designed specifically for edge computing networks. Saguaro leverages the hierarchical structure of edge computing networks to reduce the overhead of wide-area communication by presenting several techniques. First, Saguaro proposes coordinator-based and optimistic protocols to process cross-domain transactions with low latency where the lowest co… ▽ More

    Submitted 14 September, 2022; v1 submitted 21 January, 2021; originally announced January 2021.

  19. arXiv:2012.02738  [pdf, other

    eess.IV cs.CV cs.LG

    Ultrasound Scatterer Density Classification Using Convolutional Neural Networks by Exploiting Patch Statistics

    Authors: Ali K. Z. Tehrani, Mina Amiri, Ivan M. Rosado-Mendez, Timothy J. Hall, Hassan Rivaz

    Abstract: Quantitative ultrasound (QUS) can reveal crucial information on tissue properties such as scatterer density. If the scatterer density per resolution cell is above or below 10, the tissue is considered as fully developed speckle (FDS) or low-density scatterers (LDS), respectively. Conventionally, the scatterer density has been classified using estimated statistical parameters of the amplitude of ba… ▽ More

    Submitted 4 December, 2020; originally announced December 2020.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  20. arXiv:2010.10030  [pdf, ps, other

    cs.IT cs.LG eess.SP stat.ML

    Blind Federated Edge Learning

    Authors: Mohammad Mohammadi Amiri, Tolga M. Duman, Deniz Gunduz, Sanjeev R. Kulkarni, H. Vincent Poor

    Abstract: We study federated edge learning (FEEL), where wireless edge devices, each with its own dataset, learn a global model collaboratively with the help of a wireless access point acting as the parameter server (PS). At each iteration, wireless devices perform local updates using their local data and the most recent global model received from the PS, and send their local updates to the PS over a wirele… ▽ More

    Submitted 19 October, 2020; originally announced October 2020.

    Comments: submitted for publication. arXiv admin note: text overlap with arXiv:1907.03909

  21. arXiv:2009.13269  [pdf, other

    eess.SP cs.IT cs.LG

    Communicate to Learn at the Edge

    Authors: Deniz Gunduz, David Burth Kurka, Mikolaj Jankowski, Mohammad Mohammadi Amiri, Emre Ozfatura, Sreejith Sreekumar

    Abstract: Bringing the success of modern machine learning (ML) techniques to mobile devices can enable many new services and businesses, but also poses significant technical and research challenges. Two factors that are critical for the success of ML algorithms are massive amounts of data and processing power, both of which are plentiful, yet highly distributed at the network edge. Moreover, edge devices ar… ▽ More

    Submitted 28 September, 2020; originally announced September 2020.

    Comments: 13 pages, 5 figures

  22. arXiv:2008.13492  [pdf, other

    eess.SP cs.LG

    Wireless for Machine Learning

    Authors: Henrik Hellström, José Mairton B. da Silva Jr, Mohammad Mohammadi Amiri, Mingzhe Chen, Viktoria Fodor, H. Vincent Poor, Carlo Fischione

    Abstract: As data generation increasingly takes place on devices without a wired connection, machine learning (ML) related traffic will be ubiquitous in wireless networks. Many studies have shown that traditional wireless protocols are highly inefficient or unsustainable to support ML, which creates the need for new wireless communication methods. In this survey, we give an exhaustive review of the state-of… ▽ More

    Submitted 9 June, 2022; v1 submitted 31 August, 2020; originally announced August 2020.

  23. arXiv:2008.11141  [pdf, ps, other

    cs.IT cs.DC cs.LG eess.SP stat.ML

    Convergence of Federated Learning over a Noisy Downlink

    Authors: Mohammad Mohammadi Amiri, Deniz Gunduz, Sanjeev R. Kulkarni, H. Vincent Poor

    Abstract: We study federated learning (FL), where power-limited wireless devices utilize their local datasets to collaboratively train a global model with the help of a remote parameter server (PS). The PS has access to the global model and shares it with the devices for local training, and the devices return the result of their local updates to the PS to update the global model. This framework requires dow… ▽ More

    Submitted 25 August, 2020; originally announced August 2020.

    Comments: submitted for publication

  24. arXiv:2006.10672  [pdf, ps, other

    cs.IT cs.DC cs.LG

    Federated Learning With Quantized Global Model Updates

    Authors: Mohammad Mohammadi Amiri, Deniz Gunduz, Sanjeev R. Kulkarni, H. Vincent Poor

    Abstract: We study federated learning (FL), which enables mobile devices to utilize their local datasets to collaboratively train a global model with the help of a central server, while kee** data localized. At each iteration, the server broadcasts the current global model to the devices for local training, and aggregates the local model updates from the devices to update the global model. Previous work o… ▽ More

    Submitted 6 October, 2020; v1 submitted 18 June, 2020; originally announced June 2020.

  25. arXiv:2005.01038  [pdf, other

    cs.DB cs.CR cs.DC

    SEPAR: Towards Regulating Future of Work Multi-Platform Crowdworking Environments with Privacy Guarantees

    Authors: Mohammad Javad Amiri, Joris Duguépéroux, Tristan Allard, Divyakant Agrawal, Amr El Abbadi

    Abstract: Crowdworking platforms provide the opportunity for diverse workers to execute tasks for different requesters. The popularity of the "gig" economy has given rise to independent platforms that provide competing and complementary services. Workers as well as requesters with specific tasks may need to work for or avail from the services of multiple platforms resulting in the rise of multi-platform cro… ▽ More

    Submitted 21 October, 2020; v1 submitted 3 May, 2020; originally announced May 2020.

  26. arXiv:2003.08059  [pdf, ps, other

    eess.SP cs.DC cs.LG

    A Compressive Sensing Approach for Federated Learning over Massive MIMO Communication Systems

    Authors: Yo-Seb Jeon, Mohammad Mohammadi Amiri, Jun Li, H. Vincent Poor

    Abstract: Federated learning is a privacy-preserving approach to train a global model at a central server by collaborating with wireless devices, each with its own local training data set. In this paper, we present a compressive sensing approach for federated learning over massive multiple-input multiple-output communication systems in which the central server equipped with a massive antenna array communica… ▽ More

    Submitted 5 August, 2020; v1 submitted 18 March, 2020; originally announced March 2020.

    Comments: The title of the paper has been changed from "Gradient Estimation for Federated Learning over Massive MIMO Communication Systems" to "A Compressive Sensing Approach for Federated Learning over Massive MIMO Communication Systems"

  27. arXiv:2002.08438  [pdf, other

    eess.IV cs.CV cs.LG

    Fine tuning U-Net for ultrasound image segmentation: which layers?

    Authors: Mina Amiri, Rupert Brooks, Hassan Rivaz

    Abstract: Fine-tuning a network which has been trained on a large dataset is an alternative to full training in order to overcome the problem of scarce and expensive data in medical applications. While the shallow layers of the network are usually kept unchanged, deeper layers are modified according to the new dataset. This approach may not work for ultrasound images due to their drastically different appea… ▽ More

    Submitted 19 February, 2020; originally announced February 2020.

  28. arXiv:2001.10402  [pdf, ps, other

    cs.IT cs.DC cs.LG

    Convergence of Update Aware Device Scheduling for Federated Learning at the Wireless Edge

    Authors: Mohammad Mohammadi Amiri, Deniz Gunduz, Sanjeev R. Kulkarni, H. Vincent Poor

    Abstract: We study federated learning (FL) at the wireless edge, where power-limited devices with local datasets collaboratively train a joint model with the help of a remote parameter server (PS). We assume that the devices are connected to the PS through a bandwidth-limited shared wireless channel. At each iteration of FL, a subset of the devices are scheduled to transmit their local model updates to the… ▽ More

    Submitted 8 May, 2020; v1 submitted 28 January, 2020; originally announced January 2020.

    Comments: submitted for publication

  29. arXiv:2001.07322  [pdf, other

    eess.IV cs.CV cs.LG stat.ML

    Breast lesion segmentation in ultrasound images with limited annotated data

    Authors: Bahareh Behboodi, Mina Amiri, Rupert Brooks, Hassan Rivaz

    Abstract: Ultrasound (US) is one of the most commonly used imaging modalities in both diagnosis and surgical interventions due to its low-cost, safety, and non-invasive characteristic. US image segmentation is currently a unique challenge because of the presence of speckle noise. As manual segmentation requires considerable efforts and time, the development of automatic segmentation algorithms has attracted… ▽ More

    Submitted 20 January, 2020; originally announced January 2020.

    Comments: Accepted to ISBI 2020

  30. arXiv:2001.01255  [pdf, other

    cs.IT

    Multi-Antenna Coded Content Delivery with Caching: A Low-Complexity Solution

    Authors: Junlin Zhao, Mohammad Mohammadi Amiri, Deniz Gündüz

    Abstract: We study downlink beamforming in a single-cell network with a multi-antenna base station serving cache-enabled users. Assuming a library of files with a common rate, we formulate the minimum transmit power with proactive caching and coded delivery as a non-convex optimization problem. While this multiple multicast problem can be efficiently solved by successive convex approximation (SCA), the comp… ▽ More

    Submitted 23 July, 2020; v1 submitted 5 January, 2020; originally announced January 2020.

    Comments: to appear in IEEE Transactions on Wireless Communications

  31. arXiv:1910.00765  [pdf, other

    cs.DB cs.DC

    SharPer: Sharding Permissioned Blockchains Over Network Clusters

    Authors: Mohammad Javad Amiri, Divyakant Agrawal, Amr El Abbadi

    Abstract: Scalability is one of the main roadblocks to business adoption of blockchain systems. Despite recent intensive research on using sharding techniques to enhance the scalability of blockchain systems, existing solutions do not efficiently address cross-shard transactions. In this paper, we introduce SharPer, a permissioned blockchain system that improves scalability by clustering (partitioning) the… ▽ More

    Submitted 16 February, 2020; v1 submitted 1 October, 2019; originally announced October 2019.

  32. arXiv:1907.09769  [pdf, ps, other

    cs.IT cs.DC cs.LG

    Federated Learning over Wireless Fading Channels

    Authors: Mohammad Mohammadi Amiri, Deniz Gunduz

    Abstract: We study federated machine learning at the wireless network edge, where limited power wireless devices, each with its own dataset, build a joint model with the help of a remote parameter server (PS). We consider a bandwidth-limited fading multiple access channel (MAC) from the wireless devices to the PS, and propose various techniques to implement distributed stochastic gradient descent (DSGD). We… ▽ More

    Submitted 10 February, 2020; v1 submitted 23 July, 2019; originally announced July 2019.

    Comments: to appear, IEEE Transactions on Wireless Communications

  33. arXiv:1907.03909  [pdf, ps, other

    cs.IT cs.DC cs.LG

    Collaborative Machine Learning at the Wireless Edge with Blind Transmitters

    Authors: Mohammad Mohammadi Amiri, Tolga M. Duman, Deniz Gunduz

    Abstract: We study wireless collaborative machine learning (ML), where mobile edge devices, each with its own dataset, carry out distributed stochastic gradient descent (DSGD) over-the-air with the help of a wireless access point acting as the parameter server (PS). At each iteration of the DSGD algorithm wireless devices compute gradient estimates with their local datasets, and send them to the PS over a w… ▽ More

    Submitted 8 July, 2019; originally announced July 2019.

  34. arXiv:1906.07850  [pdf, other

    cs.DC cs.DB

    SeeMoRe: A Fault-Tolerant Protocol for Hybrid Cloud Environments

    Authors: Mohammad Javad Amiri, Sujaya Maiyya, Divyakant Agrawal, Amr El Abbadi

    Abstract: Large scale data management systems utilize State Machine Replication to provide fault tolerance and to enhance performance. Fault-tolerant protocols are extensively used in the distributed database infrastructure of large enterprises such as Google, Amazon, and Facebook, as well as permissioned blockchain systems like IBM's Hyperledger Fabric. However, and in spite of years of intensive research,… ▽ More

    Submitted 18 June, 2019; originally announced June 2019.

  35. arXiv:1905.09359  [pdf, other

    cs.DB cs.CR cs.DC

    Towards Global Asset Management in Blockchain Systems

    Authors: Victor Zakhary, Mohammad Javad Amiri, Sujaya Maiyya, Divyakant Agrawal, Amr El Abbadi

    Abstract: Permissionless blockchains (e.g., Bitcoin, Ethereum, etc) have shown a wide success in implementing global scale peer-to-peer cryptocurrency systems. In such blockchains, new currency units are generated through the mining process and are used in addition to transaction fees to incentivize miners to maintain the blockchain. Although it is clear how currency units are generated and transacted on, i… ▽ More

    Submitted 22 May, 2019; originally announced May 2019.

  36. arXiv:1903.03856  [pdf, other

    cs.IT

    A Low-Complexity Cache-Aided Multi-antenna Content Delivery Scheme

    Authors: Junlin Zhao, Mohammad Mohammadi Amiri, Deniz Gündüz

    Abstract: We study downlink beamforming in a single-cell network with a multi-antenna base station (BS) serving cache-enabled users. For a given common rate of the files in the system, we first formulate the minimum transmit power with beamforming at the BS as a non-convex optimization problem. This corresponds to a multiple multicast problem, to which a stationary solution can be efficiently obtained throu… ▽ More

    Submitted 16 May, 2019; v1 submitted 9 March, 2019; originally announced March 2019.

    Comments: Accepted in IEEE SPAWC 2019

  37. arXiv:1902.01457  [pdf, other

    cs.DC cs.DB

    ParBlockchain: Leveraging Transaction Parallelism in Permissioned Blockchain Systems

    Authors: Mohammad Javad Amiri, Divyakant Agrawal, Amr El Abbadi

    Abstract: Many existing blockchains do not adequately address all the characteristics of distributed system applications and suffer from serious architectural limitations resulting in performance and confidentiality issues. While recent permissioned blockchain systems, have tried to overcome these limitations, their focus has mainly been on workloads with no-contention, i.e., no conflicting transactions. In… ▽ More

    Submitted 4 February, 2019; originally announced February 2019.

  38. arXiv:1901.00844  [pdf, ps, other

    cs.DC cs.IT cs.LG

    Machine Learning at the Wireless Edge: Distributed Stochastic Gradient Descent Over-the-Air

    Authors: Mohammad Mohammadi Amiri, Deniz Gunduz

    Abstract: We study federated machine learning (ML) at the wireless edge, where power- and bandwidth-limited wireless devices with local datasets carry out distributed stochastic gradient descent (DSGD) with the help of a remote parameter server (PS). Standard approaches assume separate computation and communication, where local gradient estimates are compressed and transmitted to the PS over orthogonal link… ▽ More

    Submitted 7 April, 2020; v1 submitted 3 January, 2019; originally announced January 2019.

    Comments: IEEE Transactions on Signal Processing, Early Access, Mar. 2020

  39. Computation Scheduling for Distributed Machine Learning with Straggling Workers

    Authors: Mohammad Mohammadi Amiri, Deniz Gunduz

    Abstract: We study scheduling of computation tasks across n workers in a large scale distributed learning problem with the help of a master. Computation and communication delays are assumed to be random, and redundant computations are assigned to workers in order to tolerate stragglers. We consider sequential computation of tasks assigned to a worker, while the result of each computation is sent to the mast… ▽ More

    Submitted 23 May, 2019; v1 submitted 23 October, 2018; originally announced October 2018.

    Comments: Submitted for publication

  40. arXiv:1808.04835  [pdf, other

    cs.IT

    Audience-Retention-Rate-Aware Caching and Coded Video Delivery with Asynchronous Demands

    Authors: Qianqian Yang, Mohammad Mohammadi Amiri, Deniz Gündüz

    Abstract: Most results on coded caching focus on a static scenario, in which a fixed number of users synchronously place their requests from a content library, and the performance is measured in terms of the latency in satisfying all of these demands. In practice, however, users start watching an online video content asynchronously over time, and often abort watching a video before it is completed. The latt… ▽ More

    Submitted 14 August, 2018; originally announced August 2018.

    Comments: 30 pages, 5 figures

  41. arXiv:1806.09894  [pdf, ps, other

    cs.IT

    On the Capacity Region of a Cache-Aided Gaussian Broadcast Channel with Multi-Layer Messages

    Authors: Mohammad Mohammadi Amiri, Deniz Gunduz

    Abstract: A cache-aided $K$-user Gaussian broadcast channel (BC) is studied. The transmitter has a library of $N$ files, from which each user requests one. The users are equipped with caches of different sizes, which are filled without the knowledge of the user requests in a centralized manner. Differently from the literature, it is assumed that each file can be delivered to different users at different rat… ▽ More

    Submitted 26 June, 2018; originally announced June 2018.

    Comments: Part of this work was presented at the IEEE International Symposium on Information Theory, Colorado, USA, June 2018

  42. arXiv:1802.03316  [pdf, other

    cs.DC

    Parallelizing Workload Execution in Embedded and High-Performance Heterogeneous Systems

    Authors: Jose Nunez-Yanez, Mohammad Hosseinabady, Moslem Amiri, Andrés Rodríguez, Rafael Asenjo, Angeles Navarro, Rubén Gran-Tejero, Darío Suárez-Gracia

    Abstract: In this paper, we introduce a software-defined framework that enables the parallel utilization of all the programmable processing resources available in heterogeneous system-on-chip (SoC) including FPGA-based hardware accelerators and programmable CPUs. Two platforms with different architectures are considered, and a single C/C++ source code is used in both of them for the CPU and FPGA resources.… ▽ More

    Submitted 9 February, 2018; originally announced February 2018.

    Comments: Presented at HIP3ES, 2018

    Report number: HIP3ES/2018/2

  43. arXiv:1712.03433  [pdf, ps, other

    cs.IT

    Caching and Coded Delivery over Gaussian Broadcast Channels for Energy Efficiency

    Authors: Mohammad Mohammadi Amiri, Deniz Gunduz

    Abstract: A cache-aided $K$-user Gaussian broadcast channel (BC) is considered. The transmitter has a library of $N$ equal-rate files, from which each user demands one. The impact of the equal-capacity receiver cache memories on the minimum required transmit power to satisfy all user demands is studied. Considering uniformly random demands across the library, both the minimum average power (averaged over al… ▽ More

    Submitted 30 April, 2018; v1 submitted 9 December, 2017; originally announced December 2017.

    Comments: IEEE Journal on Selected Areas in Communications, to appear

  44. arXiv:1707.02547  [pdf

    cs.SE

    Validation of Collaborative Business Processes using Goals Model

    Authors: Amir Ebrahimifard, Mostafa Khoramabadi Arani, Mohammad Javad Amiri, Saeed Parsa

    Abstract: Validating process model against corresponding requirements is one of the most important problems in domain of collaborative processes. In this paper collaborative processes are modeled using the interaction view of BPMN 2.0 standard. Then, requirements are extracted with a goal modeling technique. Different scenarios of each requirement show possible paths for the system. These paths are modeled… ▽ More

    Submitted 9 July, 2017; originally announced July 2017.

  45. arXiv:1702.05454  [pdf, ps, other

    cs.IT

    Cache-Aided Content Delivery over Erasure Broadcast Channels

    Authors: Mohammad Mohammadi Amiri, Deniz Gunduz

    Abstract: A cache-aided broadcast network is studied, in which a server delivers contents to a group of receivers over a packet erasure broadcast channel (BC). The receivers are divided into two sets with regards to their channel qualities: the weak and strong receivers, where all the weak receivers have statistically worse channel qualities than all the strong receivers. The weak receivers, in order to com… ▽ More

    Submitted 31 May, 2017; v1 submitted 17 February, 2017; originally announced February 2017.

  46. arXiv:1611.01579  [pdf, ps, other

    cs.IT

    Decentralized Caching and Coded Delivery with Distinct Cache Capacities

    Authors: Mohammad Mohammadi Amiri, Qianqian Yang, Deniz Gunduz

    Abstract: Decentralized proactive caching and coded delivery is studied in a content delivery network, where each user is equipped with a cache memory, not necessarily of equal capacity. Cache memories are filled in advance during the off-peak traffic period in a decentralized manner, i.e., without the knowledge of the number of active users, their identities, or their particular demands. User demands are r… ▽ More

    Submitted 31 July, 2017; v1 submitted 4 November, 2016; originally announced November 2016.

    Comments: to appear, IEEE Transactions on Communications

  47. arXiv:1610.03792  [pdf, other

    cs.IT

    Decentralized Coded Caching with Distinct Cache Capacities

    Authors: Mohammad Mohammadi Amiri, Qianqian Yang, Deniz Gündüz

    Abstract: Decentralized coded caching is studied for a content server with $N$ files, each of size $F$ bits, serving $K$ active users, each equipped with a cache of distinct capacity. It is assumed that the users' caches are filled in advance during the off-peak traffic period without the knowledge of the number of active users, their identities, or the particular demands. User demands are revealed during t… ▽ More

    Submitted 12 October, 2016; originally announced October 2016.

    Comments: To be presented in ASILOMAR conference, 2016

  48. Fog Data: Enhancing Telehealth Big Data Through Fog Computing

    Authors: Harishchandra Dubey, **g Yang, Nick Constant, Amir Mohammad Amiri, Qing Yang, Kunal Makodiya

    Abstract: The size of multi-modal, heterogeneous data collected through various sensors is growing exponentially. It demands intelligent data reduction, data mining and analytics at edge devices. Data compression can reduce the network bandwidth and transmission power consumed by edge devices. This paper proposes, validates and evaluates Fog Data, a service-oriented architecture for Fog computing. The cente… ▽ More

    Submitted 1 June, 2016; v1 submitted 30 May, 2016; originally announced May 2016.

    Comments: 6 pages, 4 figures in ASE BD&SI '15 Proceedings of the ASE BigData & SocialInformatics 2015, ACM, NY

  49. arXiv:1605.01993  [pdf, other

    cs.IT

    Coded Caching for a Large Number Of Users

    Authors: Mohammad Mohammadi Amiri, Qianqian Yang, Deniz Gunduz

    Abstract: Information theoretic analysis of a coded caching system is considered, in which a server with a database of N equal-size files, each F bits long, serves K users. Each user is assumed to have a local cache that can store M files, i.e., capacity of MF bits. Proactive caching to user terminals is considered, in which the caches are filled by the server in advance during the placement phase, without… ▽ More

    Submitted 6 May, 2016; originally announced May 2016.

  50. arXiv:1604.03888  [pdf, other

    cs.IT

    Fundamental Limits of Coded Caching: Improved Delivery Rate-Cache Capacity Trade-off

    Authors: Mohammad Mohammadi Amiri, Deniz Gunduz

    Abstract: A centralized coded caching system, consisting of a server delivering N popular files, each of size F bits, to K users through an error-free shared link, is considered. It is assumed that each user is equipped with a local cache memory with capacity MF bits, and contents can be proactively cached into these caches over a low traffic period; however, without the knowledge of the user demands. Durin… ▽ More

    Submitted 13 December, 2016; v1 submitted 13 April, 2016; originally announced April 2016.

    Comments: To appear in IEEE Transactions on Communications