Skip to main content

Showing 1–10 of 10 results for author: Bestavros, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2009.09104  [pdf, other

    cs.OS

    Akita: A CPU scheduler for virtualized Clouds

    Authors: Esmail Asyabi, Azer Bestavros, Renato Mancuso, Richard West, Erfan Sharafzadeh

    Abstract: Clouds inherit CPU scheduling policies of operating systems. These policies enforce fairness while leveraging best-effort mechanisms to enhance responsiveness of all schedulable entities, irrespective of their service level objectives (SLOs). This leads to unpredictable performance that forces cloud providers to enforce strict reservation and isolation policies to prevent high-criticality services… ▽ More

    Submitted 18 September, 2020; originally announced September 2020.

  2. arXiv:1912.00549  [pdf, ps, other

    cs.DC

    MORPHOSYS: Efficient Colocation of QoS-Constrained Workloads in the Cloud

    Authors: Vatche Ishakian, Azer Bestavros, Assaf Kfoury

    Abstract: In hosting environments such as IaaS clouds, desirable application performance is usually guaranteed through the use of Service Level Agreements (SLAs), which specify minimal fractions of resource capacities that must be allocated for use for proper operation. Arbitrary colocation of applications with different SLAs on a single host may result in inefficient utilization of the host's resources. In… ▽ More

    Submitted 1 December, 2019; originally announced December 2019.

  3. Conclave: secure multi-party computation on big data (extended TR)

    Authors: Nikolaj Volgushev, Malte Schwarzkopf, Ben Getchell, Mayank Varia, Andrei Lapets, Azer Bestavros

    Abstract: Secure Multi-Party Computation (MPC) allows mutually distrusting parties to run joint computations without revealing private data. Current MPC algorithms scale poorly with data size, which makes MPC on "big data" prohibitively slow and inhibits its practical use. Many relational analytics queries can maintain MPC's end-to-end security guarantee without using cryptographic MPC techniques for all… ▽ More

    Submitted 17 February, 2019; originally announced February 2019.

    Comments: Extended technical report for EuroSys 2019 paper

  4. arXiv:1901.06553  [pdf, other

    cs.RO

    Neuroflight: Next Generation Flight Control Firmware

    Authors: William Koch, Renato Mancuso, Azer Bestavros

    Abstract: Little innovation has been made to low-level attitude flight control used by uncrewed aerial vehicles (UAVs), which still predominantly uses the classical PID controller. In this work we introduce Neuroflight, the first open source neuro-flight controller firmware. We present our toolchain for training a neural network in simulation and compiling it to run on embedded hardware. Challenges faced ju… ▽ More

    Submitted 16 September, 2019; v1 submitted 19 January, 2019; originally announced January 2019.

  5. arXiv:1804.04154  [pdf, other

    cs.RO

    Reinforcement Learning for UAV Attitude Control

    Authors: William Koch, Renato Mancuso, Richard West, Azer Bestavros

    Abstract: Autopilot systems are typically composed of an "inner loop" providing stability and control, while an "outer loop" is responsible for mission-level objectives, e.g. way-point navigation. Autopilot systems for UAVs are predominately implemented using Proportional, Integral Derivative (PID) control systems, which have demonstrated exceptional performance in stable environments. However more sophisti… ▽ More

    Submitted 11 April, 2018; originally announced April 2018.

    Comments: 13 pages, 9 figures

  6. arXiv:1703.08762  [pdf, other

    cs.AI

    Team Formation for Scheduling Educational Material in Massive Online Classes

    Authors: Sanaz Bahargam, Dóra Erdos, Azer Bestavros, Evimaria Terzi

    Abstract: Whether teaching in a classroom or a Massive Online Open Course it is crucial to present the material in a way that benefits the audience as a whole. We identify two important tasks to solve towards this objective, 1 group students so that they can maximally benefit from peer interaction and 2 find an optimal schedule of the educational material for each group. Thus, in this paper, we solve the pr… ▽ More

    Submitted 25 March, 2017; originally announced March 2017.

  7. arXiv:1604.00060  [pdf, other

    cs.NI cs.FL

    Using Alloy to Formally Model and Reason About an OpenFlow Network Switch

    Authors: Saber Mirzaei, Sanaz Bahargam, Richard Skowyra, Assaf Kfoury, Azer Bestavros

    Abstract: Openflow provides a standard interface for separating a network into a data plane and a programmatic control plane. This enables easy network reconfiguration, but introduces the potential for programming bugs to cause network effects. To study OpenFlow switch behavior, we used Alloy to create a software abstraction describing the internal state of a network and its OpenFlow switches. This work is… ▽ More

    Submitted 31 March, 2016; originally announced April 2016.

  8. arXiv:1406.4173  [pdf, other

    cs.DS

    A Divide-and-Conquer Algorithm for Betweenness Centrality

    Authors: Dora Erdos, Vatche Ishakian, Azer Bestavros, Evimaria Terzi

    Abstract: The problem of efficiently computing the betweenness centrality of nodes has been researched extensively. To date, the best known exact and centralized algorithm for this task is an algorithm proposed in 2001 by Brandes. The contribution of our paper is Brandes++, an algorithm for exact efficient computation of betweenness centrality. The crux of our algorithm is that we create a sketch of the gra… ▽ More

    Submitted 4 June, 2015; v1 submitted 16 June, 2014; originally announced June 2014.

    Comments: Shorter version of this paper appeared in Siam Data Mining 2015

  9. arXiv:1201.6565  [pdf, other

    cs.DB

    The Filter-Placement Problem and its Application to Minimizing Information Multiplicity

    Authors: Dóra Erdös, Vatche Ishakian, Andrei Lapets, Evimaria Terzi, Azer Bestavros

    Abstract: In many information networks, data items -- such as updates in social networks, news flowing through interconnected RSS feeds and blogs, measurements in sensor networks, route updates in ad-hoc networks -- propagate in an uncoordinated manner: nodes often relay information they receive to neighbors, independent of whether or not these neighbors received the same information from other sources. Thi… ▽ More

    Submitted 31 January, 2012; originally announced January 2012.

    Comments: VLDB2012

    Journal ref: Proceedings of the VLDB Endowment (PVLDB), Vol. 5, No. 5, pp. 418-429 (2012)

  10. arXiv:1109.0775  [pdf, ps, other

    cs.PL cs.DC cs.LO cs.SE

    A Domain-Specific Language for Incremental and Modular Design of Large-Scale Verifiably-Safe Flow Networks (Preliminary Report)

    Authors: Azer Bestavros, Assaf Kfoury

    Abstract: We define a domain-specific language (DSL) to inductively assemble flow networks from small networks or modules to produce arbitrarily large ones, with interchangeable functionally-equivalent parts. Our small networks or modules are "small" only as the building blocks in this inductive definition (there is no limit on their size). Associated with our DSL is a type theory, a system of formal annot… ▽ More

    Submitted 4 September, 2011; originally announced September 2011.

    Comments: In Proceedings DSL 2011, arXiv:1109.0323

    Journal ref: EPTCS 66, 2011, pp. 24-47