Skip to main content

Showing 1–5 of 5 results for author: Attia, M A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2006.03048  [pdf, other

    cs.IT cs.DB cs.IR

    Asymmetric Leaky Private Information Retrieval

    Authors: Islam Samy, Mohamed A. Attia, Ravi Tandon, Loukas Lazos

    Abstract: Information-theoretic formulations of the private information retrieval (PIR) problem have been investigated under a variety of scenarios. Symmetric private information retrieval (SPIR) is a variant where a user is able to privately retrieve one out of $K$ messages from $N$ non-colluding replicated databases without learning anything about the remaining $K-1$ messages. However, the goal of perfect… ▽ More

    Submitted 4 June, 2020; originally announced June 2020.

  2. arXiv:2001.05998  [pdf, other

    cs.IT cs.DB cs.IR

    Latent-variable Private Information Retrieval

    Authors: Islam Samy, Mohamed A. Attia, Ravi Tandon, Loukas Lazos

    Abstract: In many applications, content accessed by users (movies, videos, news articles, etc.) can leak sensitive latent attributes, such as religious and political views, sexual orientation, ethnicity, gender, and others. To prevent such information leakage, the goal of classical PIR is to hide the identity of the content/message being accessed, which subsequently also hides the latent attributes. This so… ▽ More

    Submitted 14 May, 2020; v1 submitted 16 January, 2020; originally announced January 2020.

  3. arXiv:1805.04104  [pdf, other

    cs.IT cs.CR cs.DB cs.IR

    The Capacity of Private Information Retrieval from Uncoded Storage Constrained Databases

    Authors: Mohamed Adel Attia, Deepak Kumar, Ravi Tandon

    Abstract: Private information retrieval (PIR) allows a user to retrieve a desired message from a set of databases without revealing the identity of the desired message. The replicated databases scenario was considered by Sun and Jafar, 2016, where $N$ databases can store the same $K$ messages completely. A PIR scheme was developed to achieve the optimal download cost given by… ▽ More

    Submitted 23 October, 2018; v1 submitted 10 May, 2018; originally announced May 2018.

  4. arXiv:1801.01875  [pdf, other

    cs.IT cs.DC cs.LG

    Near Optimal Coded Data Shuffling for Distributed Learning

    Authors: Mohamed A. Attia, Ravi Tandon

    Abstract: Data shuffling between distributed cluster of nodes is one of the critical steps in implementing large-scale learning algorithms. Randomly shuffling the data-set among a cluster of workers allows different nodes to obtain fresh data assignments at each learning epoch. This process has been shown to provide improvements in the learning process. However, the statistical benefits of distributed data… ▽ More

    Submitted 5 January, 2018; originally announced January 2018.

  5. arXiv:1711.08452  [pdf, other

    cs.DC cs.IT

    Combating Computational Heterogeneity in Large-Scale Distributed Computing via Work Exchange

    Authors: Mohamed A. Attia, Ravi Tandon

    Abstract: Owing to data-intensive large-scale applications, distributed computation systems have gained significant recent interest, due to their ability of running such tasks over a large number of commodity nodes in a time efficient manner. One of the major bottlenecks that adversely impacts the time efficiency is the computational heterogeneity of distributed nodes, often limiting the task completion tim… ▽ More

    Submitted 22 November, 2017; originally announced November 2017.