Skip to main content

Showing 1–9 of 9 results for author: Kiamari, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.06470  [pdf, other

    cs.LG cs.AI stat.ML

    GKAN: Graph Kolmogorov-Arnold Networks

    Authors: Mehrdad Kiamari, Mohammad Kiamari, Bhaskar Krishnamachari

    Abstract: We introduce Graph Kolmogorov-Arnold Networks (GKAN), an innovative neural network architecture that extends the principles of the recently proposed Kolmogorov-Arnold Networks (KAN) to graph-structured data. By adopting the unique characteristics of KANs, notably the use of learnable univariate functions instead of fixed linear weights, we develop a powerful model for graph-based learning tasks. U… ▽ More

    Submitted 10 June, 2024; originally announced June 2024.

  2. arXiv:2201.02002  [pdf, other

    cs.DC

    Blizzard: a Distributed Consensus Protocol for Mobile Devices

    Authors: Mehrdad Kiamari, Bhaskar Krishnamachari, Muhammad Naveed, Seokgu Yun

    Abstract: We present Blizzard, a Byzantine Fault Tolerant (BFT) distributed ledger protocol that is aimed at making mobile devices first-class citizens in the consensus process. Blizzard introduces a novel two-tier architecture by having the mobile nodes communicate through online brokers, and includes a decentralized matching scheme to ensure each node connects to a certain number of random brokers. Throug… ▽ More

    Submitted 6 January, 2022; originally announced January 2022.

  3. arXiv:2110.11552  [pdf, other

    cs.DC cs.AI cs.LG

    GCNScheduler: Scheduling Distributed Computing Applications using Graph Convolutional Networks

    Authors: Mehrdad Kiamari, Bhaskar Krishnamachari

    Abstract: We consider the classical problem of scheduling task graphs corresponding to complex applications on distributed computing systems. A number of heuristics have been previously proposed to optimize task scheduling with respect to metrics such as makespan and throughput. However, they tend to be slow to run, particularly for larger problem instances, limiting their applicability in more dynamic syst… ▽ More

    Submitted 21 October, 2021; originally announced October 2021.

  4. arXiv:2106.15048  [pdf, other

    cs.DC

    Bottleneck Time Minimization for Distributed Iterative Processes: Speeding Up Gossip-Based Federated Learning on Networked Computers

    Authors: Mehrdad Kiamari, Bhaskar Krishnamachari

    Abstract: We present a novel task scheduling scheme for accelerating computational applications involving distributed iterative processes that are executed on networked computing resources. Such an application consists of multiple tasks, each of which outputs data at each iteration to be processed by neighboring tasks; these dependencies between the tasks can be represented as a directed graph. We first mat… ▽ More

    Submitted 28 June, 2021; originally announced June 2021.

  5. arXiv:1904.07098  [pdf, other

    cs.DC cs.IT

    Slack Squeeze Coded Computing for Adaptive Straggler Mitigation

    Authors: Krishna Giri Narra, Zhifeng Lin, Mehrdad Kiamari, Salman Avestimehr, Murali Annavaram

    Abstract: While performing distributed computations in today's cloud-based platforms, execution speed variations among compute nodes can significantly reduce the performance and create bottlenecks like stragglers. Coded computation techniques leverage coding theory to inject computational redundancy and mitigate stragglers in distributed computations. In this paper, we propose a dynamic workload distributio… ▽ More

    Submitted 31 August, 2019; v1 submitted 15 April, 2019; originally announced April 2019.

    Comments: 13 pages, SC 2019

  6. arXiv:1709.00196  [pdf, other

    cs.DC cs.IT

    On Heterogeneous Coded Distributed Computing

    Authors: Mehrdad Kiamari, Chenwei Wang, A. Salman Avestimehr

    Abstract: We consider the recently proposed Coded Distributed Computing (CDC) framework that leverages carefully designed redundant computations to enable coding opportunities that substantially reduce the communication load of distributed computing. We generalize this framework to heterogeneous systems where different nodes in the computing cluster can have different storage (or processing) capabilities. W… ▽ More

    Submitted 1 September, 2017; originally announced September 2017.

    Comments: To appear in IEEE GLOBECOM 2017

  7. arXiv:1708.09596  [pdf, other

    cs.IT

    SINR-Threshold Scheduling with Binary Power Control for D2D Networks

    Authors: Mehrdad Kiamari, Chenwei Wang, A. Salman Avestimehr, Haralabos Papadopoulos

    Abstract: In this paper, we consider a device-to-device communication network in which $K$ transmitter-receiver pairs are sharing spectrum with each other. We propose a novel but simple binary scheduling scheme for this network to maximize the average sum rate of the pairs. According to the scheme, each receiver predicts its Signal-to-Interference-plus-Noise Ratio (SINR), assuming \emph{all} other user pair… ▽ More

    Submitted 31 August, 2017; originally announced August 2017.

    Comments: To appear in IEEE GLOBECOM 2017

  8. arXiv:1705.00412  [pdf, other

    cs.IT

    Capacity Region of the Symmetric Injective K-User Deterministic Interference Channel

    Authors: Mehrdad Kiamari, A. Salman Avestimehr

    Abstract: We characterize the capacity region of the symmetric injective K-user Deterministic Interference Channel (DIC) for all channel parameters. The achievable rate region is derived by first projecting the achievable rate region of Han-Kobayashi (HK) scheme, which is in terms of common and private rates for each user, along the direction of aggregate rates for each user (i.e., the sum of common and pri… ▽ More

    Submitted 30 April, 2017; originally announced May 2017.

    Comments: A shorter version of this paper to appear in International Symposium on Information Theory (ISIT) 2017

  9. arXiv:1510.03951  [pdf, other

    cs.IT

    Are Generalized Cut-Set Bounds Tight for the Deterministic Interference Channel?

    Authors: Mehrdad Kiamari, A. Salman Avestimehr

    Abstract: We propose the idea of extended networks, which is constructed by replicating the users in the two-user deterministic interference channel (DIC) and designing the interference structure among them, such that any rate that can be achieved by each user in the original network can also be achieved simultaneously by all replicas of that user in the extended network. We demonstrate that by carefully de… ▽ More

    Submitted 13 October, 2015; originally announced October 2015.

    Comments: Part of this work has been presented in the 53rd Annual Allerton Conference on Communication, Control, and Computing, 2015