Skip to main content

Showing 1–9 of 9 results for author: Ghiasvand, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.00965  [pdf, other

    cs.LG cs.DC

    Robust Decentralized Learning with Local Updates and Gradient Tracking

    Authors: Sajjad Ghiasvand, Amirhossein Reisizadeh, Mahnoosh Alizadeh, Ramtin Pedarsani

    Abstract: As distributed learning applications such as Federated Learning, the Internet of Things (IoT), and Edge Computing grow, it is critical to address the shortcomings of such technologies from a theoretical perspective. As an abstraction, we consider decentralized learning over a network of communicating clients or nodes and tackle two major challenges: data heterogeneity and adversarial robustness. W… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

  2. arXiv:2402.05114  [pdf, ps, other

    cs.DC cs.LG

    A Light-weight and Unsupervised Method for Near Real-time Behavioral Analysis using Operational Data Measurement

    Authors: Tom Richard Vargis, Siavash Ghiasvand

    Abstract: Monitoring the status of large computing systems is essential to identify unexpected behavior and improve their performance and uptime. However, due to the large-scale and distributed design of such computing systems as well as a large number of monitoring parameters, automated monitoring methods should be applied. Such automatic monitoring methods should also have the ability to adapt themselves… ▽ More

    Submitted 10 January, 2024; originally announced February 2024.

  3. arXiv:2401.05049  [pdf, ps, other

    cs.CV cs.LG

    Content-Aware Depth-Adaptive Image Restoration

    Authors: Tom Richard Vargis, Siavash Ghiasvand

    Abstract: This work prioritizes building a modular pipeline that utilizes existing models to systematically restore images, rather than creating new restoration models from scratch. Restoration is carried out at an object-specific level, with each object regenerated using its corresponding class label information. The approach stands out by providing complete user control over the entire restoration process… ▽ More

    Submitted 10 January, 2024; originally announced January 2024.

  4. arXiv:2212.01101  [pdf, other

    cs.LG cs.CR

    Assessing Anonymized System Logs Usefulness for Behavioral Analysis in RNN Models

    Authors: Tom Richard Vargis, Siavash Ghiasvand

    Abstract: System logs are a common source of monitoring data for analyzing computing systems' behavior. Due to the complexity of modern computing systems and the large size of collected monitoring data, automated analysis mechanisms are required. Numerous machine learning and deep learning methods are proposed to address this challenge. However, due to the existence of sensitive data in system logs their an… ▽ More

    Submitted 2 December, 2022; originally announced December 2022.

    Comments: 12 pages, 7 main figures, 2 tables, Conference: International Workshop on Data-driven Resilience Research 2022

    Journal ref: International Workshop on Data-driven Resilience Research 2022, https://2022.dataweek.de/d2r2-22/

  5. arXiv:1906.04550  [pdf, other

    cs.DC cs.CV eess.SY

    Anomaly Detection in High Performance Computers: A Vicinity Perspective

    Authors: Siavash Ghiasvand, Florina M. Ciorba

    Abstract: In response to the demand for higher computational power, the number of computing nodes in high performance computers (HPC) increases rapidly. Exascale HPC systems are expected to arrive by 2020. With drastic increase in the number of HPC system components, it is expected to observe a sudden increase in the number of failures which, consequently, poses a threat to the continuous operation of the H… ▽ More

    Submitted 11 June, 2019; originally announced June 2019.

    Comments: 9 pages, Submitted to the 18th IEEE International Symposium on Parallel and Distributed Computing

    MSC Class: 97R99

  6. arXiv:1901.06918   

    cs.DC

    Turning Privacy Constraints into Syslog Analysis Advantage

    Authors: Siavash Ghiasvand, Florina M. Ciorba, Wolfgang E. Nagel

    Abstract: The mean time between failures (MTBF) of HPC systems is rapidly reducing, and that current failure recovery mechanisms e.g., checkpoint-restart, will no longer be able to recover the systems from failures. Early failure detection is a new class of failure recovery methods that can be beneficial for HPC systems with short MTBF. System logs (syslogs) are invaluable source of information which give u… ▽ More

    Submitted 14 March, 2019; v1 submitted 21 January, 2019; originally announced January 2019.

    Comments: This document is mistakenly submitted to arXiv

    Journal ref: 29th ACM/IEEE International Conference for High Performance Computing, Networking, Storage and Analysis (SC 2016)

  7. Assessing Data Usefulness for Failure Analysis in Anonymized System Logs

    Authors: Siavash Ghiasvand, Florina M. Ciorba

    Abstract: System logs are a valuable source of information for the analysis and understanding of systems behavior for the purpose of improving their performance. Such logs contain various types of information, including sensitive information. Information deemed sensitive can either directly be extracted from system log entries by correlation of several log entries, or can be inferred from the combination of… ▽ More

    Submitted 4 May, 2018; originally announced May 2018.

    Comments: 11 pages, 3 figures, submitted to 17th IEEE International Symposium on Parallel and Distributed Computing

  8. arXiv:1706.04345  [pdf, ps, other

    cs.DC cs.PF

    Towards Adaptive Resilience in High Performance Computing

    Authors: Siavash Ghiasvand, Florina M. Ciorba

    Abstract: Failure rates in high performance computers rapidly increase due to the growth in system size and complexity. Hence, failures became the norm rather than the exception. Different approaches on high performance computing (HPC) systems have been introduced, to prevent failures (e. g., redundancy) or at least minimize their impacts (e. g., checkpoint and restart). In most cases, when these approaches… ▽ More

    Submitted 14 June, 2017; originally announced June 2017.

    Comments: 2 pages, to be published in Proceedings of the Work in Progress Session held in connection with the 25th EUROMICRO International Conference on Parallel, Distributed and Network-based Processing, PDP 2017

    ACM Class: C.1.4; C.2.4; C.4

  9. Anonymization of System Logs for Privacy and Storage Benefits

    Authors: Siavash Ghiasvand, Florina M. Ciorba

    Abstract: System logs constitute valuable information for analysis and diagnosis of system behavior. The size of parallel computing systems and the number of their components steadily increase. The volume of generated logs by the system is in proportion to this increase. Hence, long-term collection and storage of system logs is challenging. The analysis of system logs requires advanced text processing techn… ▽ More

    Submitted 14 June, 2017; originally announced June 2017.

    Comments: 8 pages, 5 figures, for demonstration see https://www.ghiasvand.net/u/hpcmaspa17

    ACM Class: K.4.1; G.3; H.3.4; H.3.5