Skip to main content

Showing 1–43 of 43 results for author: Nair, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.14861  [pdf, other

    eess.SY cs.ET

    Resilience of the Electric Grid through Trustable IoT-Coordinated Assets

    Authors: Vineet J. Nair, Venkatesh Venkataramanan, Priyank Srivastava, Partha S. Sarker, Anurag Srivastava, Laurentiu D. Marinovici, Jun Zha, Christopher Irwin, Prateek Mittal, John Williams, H. Vincent Poor, Anuradha M. Annaswamy

    Abstract: The electricity grid has evolved from a physical system to a cyber-physical system with digital devices that perform measurement, control, communication, computation, and actuation. The increased penetration of distributed energy resources (DERs) that include renewable generation, flexible loads, and storage provides extraordinary opportunities for improvements in efficiency and sustainability. Ho… ▽ More

    Submitted 21 June, 2024; originally announced June 2024.

    Comments: Submitted to the Proceedings of the National Academy of Sciences (PNAS), under review

  2. arXiv:2404.14632  [pdf, other

    cs.AR cs.DC

    Workload-Aware Hardware Accelerator Mining for Distributed Deep Learning Training

    Authors: Muhammad Adnan, Amar Phanishayee, Janardhan Kulkarni, Prashant J. Nair, Divya Mahajan

    Abstract: In this paper, we present a novel technique to search for hardware architectures of accelerators optimized for end-to-end training of deep neural networks (DNNs). Our approach addresses both single-device and distributed pipeline and tensor model parallel scenarios, latter being addressed for the first time. The search optimized accelerators for training relevant metrics such as throughput/TDP und… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

  3. arXiv:2404.04270  [pdf, other

    cs.IR cs.LG

    Accelerating Recommender Model Training by Dynamically Skip** Stale Embeddings

    Authors: Yassaman Ebrahimzadeh Maboud, Muhammad Adnan, Divya Mahajan, Prashant J. Nair

    Abstract: Training recommendation models pose significant challenges regarding resource utilization and performance. Prior research has proposed an approach that categorizes embeddings into popular and non-popular classes to reduce the training time for recommendation models. We observe that, even among the popular embeddings, certain embeddings undergo rapid training and exhibit minimal subsequent variatio… ▽ More

    Submitted 21 March, 2024; originally announced April 2024.

  4. arXiv:2403.17480  [pdf, other

    cs.DS cs.LG

    Capacity Provisioning Motivated Online Non-Convex Optimization Problem with Memory and Switching Cost

    Authors: Rahul Vaze, Jayakrishnan Nair

    Abstract: An online non-convex optimization problem is considered where the goal is to minimize the flow time (total delay) of a set of jobs by modulating the number of active servers, but with a switching cost associated with changing the number of active servers over time. Each job can be processed by at most one fixed speed server at any time. Compared to the usual online convex optimization (OCO) proble… ▽ More

    Submitted 1 July, 2024; v1 submitted 26 March, 2024; originally announced March 2024.

  5. arXiv:2403.09054  [pdf, other

    cs.LG cs.AI cs.AR cs.CL

    Keyformer: KV Cache Reduction through Key Tokens Selection for Efficient Generative Inference

    Authors: Muhammad Adnan, Akhil Arunkumar, Gaurav Jain, Prashant J. Nair, Ilya Soloveychik, Purushotham Kamath

    Abstract: Transformers have emerged as the underpinning architecture for Large Language Models (LLMs). In generative language models, the inference process involves two primary phases: prompt processing and token generation. Token generation, which constitutes the majority of the computational workload, primarily entails vector-matrix multiplications and interactions with the Key-Value (KV) Cache. This phas… ▽ More

    Submitted 5 April, 2024; v1 submitted 13 March, 2024; originally announced March 2024.

    MSC Class: 68U35 ACM Class: I.2.7; C.0

    Journal ref: Proceedings of the 7th Annual Conference on Machine Learning and Systems (MLSys), 2024

  6. arXiv:2309.12687  [pdf, other

    math.ST cs.DS

    Fixed confidence community mode estimation

    Authors: Meera Pai, Nikhil Karamchandani, Jayakrishnan Nair

    Abstract: Our aim is to estimate the largest community (a.k.a., mode) in a population composed of multiple disjoint communities. This estimation is performed in a fixed confidence setting via sequential sampling of individuals with replacement. We consider two sampling models: (i) an identityless model, wherein only the community of each sampled individual is revealed, and (ii) an identity-based model, wher… ▽ More

    Submitted 22 September, 2023; originally announced September 2023.

    Comments: To appear in Performance Evaluation

  7. arXiv:2308.14902  [pdf, other

    cs.IR cs.LG

    Ad-Rec: Advanced Feature Interactions to Address Covariate-Shifts in Recommendation Networks

    Authors: Muhammad Adnan, Yassaman Ebrahimzadeh Maboud, Divya Mahajan, Prashant J. Nair

    Abstract: Recommendation models are vital in delivering personalized user experiences by leveraging the correlation between multiple input features. However, deep learning-based recommendation models often face challenges due to evolving user behaviour and item features, leading to covariate shifts. Effective cross-feature learning is crucial to handle data distribution drift and adapting to changing user b… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

  8. arXiv:2307.02623  [pdf, other

    cs.LG cs.DC

    FLuID: Mitigating Stragglers in Federated Learning using Invariant Dropout

    Authors: Irene Wang, Prashant J. Nair, Divya Mahajan

    Abstract: Federated Learning (FL) allows machine learning models to train locally on individual mobile devices, synchronizing model updates via a shared server. This approach safeguards user privacy; however, it also generates a heterogeneous training environment due to the varying performance capabilities across devices. As a result, straggler devices with lower performance often dictate the overall traini… ▽ More

    Submitted 26 September, 2023; v1 submitted 5 July, 2023; originally announced July 2023.

    Comments: Accepted at the 37th Conference on Neural Information Processing Systems (NeurIPS), 2023

  9. arXiv:2305.06082  [pdf, ps, other

    cs.LG cs.AI cs.IT math.ST stat.ML

    Best Arm Identification in Bandits with Limited Precision Sampling

    Authors: Kota Srinivas Reddy, P. N. Karthik, Nikhil Karamchandani, Jayakrishnan Nair

    Abstract: We study best arm identification in a variant of the multi-armed bandit problem where the learner has limited precision in arm selection. The learner can only sample arms via certain exploration bundles, which we refer to as boxes. In particular, at each sampling epoch, the learner selects a box, which in turn causes an arm to get pulled as per a box-specific probability distribution. The pulled a… ▽ More

    Submitted 10 May, 2023; originally announced May 2023.

    Comments: ISIT 2023

  10. arXiv:2304.12902  [pdf, other

    cs.GT

    On the ubiquity of duopolies in constant sum congestion games

    Authors: Shiksha Singhal, Veeraruna Kavitha, Jayakrishnan Nair

    Abstract: We analyse a coalition formation game between strategic service providers of a congestible service. The key novelty of our formulation is that it is a constant sum game, i.e., the total payoff across all service providers (or coalitions of providers) is fixed, and dictated by the size of the market. The game thus captures the tension between resource pooling (to benefit from the resulting statisti… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

    Comments: arXiv admin note: text overlap with arXiv:2109.12840

  11. Local retail electricity markets for distribution grid services

    Authors: Vineet Jagadeesan Nair, Anuradha Annaswamy

    Abstract: We propose a hierarchical local electricity market (LEM) at the primary and secondary feeder levels in a distribution grid, to optimally coordinate and schedule distributed energy resources (DER) and provide valuable grid services like voltage control. At the primary level, we use a current injection-based model that is valid for both radial and meshed, balanced and unbalanced, multi-phase systems… ▽ More

    Submitted 11 July, 2023; v1 submitted 13 February, 2023; originally announced February 2023.

    Comments: 9 pages, 13 figures, Accepted to the 7th IEEE Conference on Control Technology and Applications (CCTA) 2023

  12. Scalable and Secure Row-Swap: Efficient and Safe Row Hammer Mitigation in Memory Systems

    Authors: Jeonghyun Woo, Gururaj Saileshwar, Prashant J. Nair

    Abstract: As Dynamic Random Access Memories (DRAM) scale, they are becoming increasingly susceptible to Row Hammer. By rapidly activating rows of DRAM cells (aggressor rows), attackers can exploit inter-cell interference through Row Hammer to flip bits in neighboring rows (victim rows). A recent work, called Randomized Row-Swap (RRS), proposed proactively swap** aggressor rows with randomly selected rows… ▽ More

    Submitted 23 December, 2022; originally announced December 2022.

    Journal ref: The 29th IEEE International Symposium on High-Performance Computer Architecture (HPCA 2022)

  13. arXiv:2211.14768  [pdf, ps, other

    cs.LG stat.ML

    Constrained Pure Exploration Multi-Armed Bandits with a Fixed Budget

    Authors: Fathima Zarin Faizal, Jayakrishnan Nair

    Abstract: We consider a constrained, pure exploration, stochastic multi-armed bandit formulation under a fixed budget. Each arm is associated with an unknown, possibly multi-dimensional distribution and is described by multiple attributes that are a function of this distribution. The aim is to optimize a particular attribute subject to user-defined constraints on the other attributes. This framework models… ▽ More

    Submitted 27 November, 2022; originally announced November 2022.

    Comments: 14 pages

  14. arXiv:2207.11656  [pdf, other

    math.OC cs.PF

    Non-asymptotic near optimal algorithms for two sided matchings

    Authors: Rahul Vaze, Jayakrishnan Nair

    Abstract: A two-sided matching system is considered, where servers are assumed to arrive at a fixed rate, while the arrival rate of customers is modulated via a price-control mechanism. We analyse a loss model, wherein customers who are not served immediately upon arrival get blocked, as well as a queueing model, wherein customers wait in a queue until they receive service. The objective is to maximize the… ▽ More

    Submitted 24 July, 2022; originally announced July 2022.

  15. The Dirty Secret of SSDs: Embodied Carbon

    Authors: Swamit Tannu, Prashant J. Nair

    Abstract: Scalable Solid-State Drives (SSDs) have ushered in a transformative era in data storage and accessibility, spanning both data centers and portable devices. However, the strides made in scaling this technology can bear significant environmental consequences. On a global scale, a notable portion of semiconductor manufacturing relies on electricity derived from coal and natural gas sources. A strikin… ▽ More

    Submitted 28 September, 2023; v1 submitted 8 July, 2022; originally announced July 2022.

    Journal ref: Energy Informatics Review (Volume 3 Issue 3, October 2023)

  16. arXiv:2207.09372  [pdf, other

    cs.RO cs.AI

    On Decentralizing Federated Reinforcement Learning in Multi-Robot Scenarios

    Authors: Jayprakash S. Nair, Divya D. Kulkarni, Ajitem Joshi, Sruthy Suresh

    Abstract: Federated Learning (FL) allows for collaboratively aggregating learned information across several computing devices and sharing the same amongst them, thereby tackling issues of privacy and the need of huge bandwidth. FL techniques generally use a central server or cloud for aggregating the models received from the devices. Such centralized FL techniques suffer from inherent problems such as failu… ▽ More

    Submitted 7 September, 2022; v1 submitted 19 July, 2022; originally announced July 2022.

    Comments: Submitted to SEEDA 2022. This arxiv is a preprint and NOT the final version

  17. arXiv:2207.01988  [pdf, other

    cs.LG cs.HC

    Unsupervised Crowdsourcing with Accuracy and Cost Guarantees

    Authors: Yashvardhan Didwania, Jayakrishnan Nair, N. Hemachandra

    Abstract: We consider the problem of cost-optimal utilization of a crowdsourcing platform for binary, unsupervised classification of a collection of items, given a prescribed error threshold. Workers on the crowdsourcing platform are assumed to be divided into multiple classes, based on their skill, experience, and/or past performance. We model each worker class via an unknown confusion matrix, and a (known… ▽ More

    Submitted 5 July, 2022; originally announced July 2022.

    Comments: To be presented at WiOpt 2022

  18. arXiv:2204.05436  [pdf, other

    cs.AR cs.AI cs.LG

    Heterogeneous Acceleration Pipeline for Recommendation System Training

    Authors: Muhammad Adnan, Yassaman Ebrahimzadeh Maboud, Divya Mahajan, Prashant J. Nair

    Abstract: Recommendation models rely on deep learning networks and large embedding tables, resulting in computationally and memory-intensive processes. These models are typically trained using hybrid CPU-GPU or GPU-only configurations. The hybrid mode combines the GPU's neural network acceleration with the CPUs' memory storage and supply for embedding tables but may incur significant CPU-to-GPU transfer tim… ▽ More

    Submitted 28 April, 2024; v1 submitted 11 April, 2022; originally announced April 2022.

    Comments: Accepted at The International Symposium on Computer Architecture (ISCA), 2024

  19. arXiv:2111.08535  [pdf, other

    stat.ML cs.LG

    Sequential Community Mode Estimation

    Authors: Shubham Anand Jain, Shreyas Goenka, Divyam Bapna, Nikhil Karamchandani, Jayakrishnan Nair

    Abstract: We consider a population, partitioned into a set of communities, and study the problem of identifying the largest community within the population via sequential, random sampling of individuals. There are multiple sampling domains, referred to as \emph{boxes}, which also partition the population. Each box may consist of individuals of different communities, and each community may in turn be spread… ▽ More

    Submitted 16 November, 2021; originally announced November 2021.

    Comments: Presented in part at Performance'21. Full version in Elsevier Performance Evaluation, Dec. 21

  20. arXiv:2109.12840  [pdf, other

    cs.GT math.OC

    Coalition Formation in Constant Sum Queueing Games

    Authors: Shiksha Singhal, Veeraruna Kavitha, Jayakrishnan Nair

    Abstract: We analyse a coalition formation game between strategic service providers of a congestible service. The key novelty of our formulation is that it is a constant sum game, i.e., the total payoff across all service providers (or coalitions of providers) is fixed, and dictated by the total size of the market. The game thus captures the tension between resource pooling (to benefit from the resulting st… ▽ More

    Submitted 27 September, 2021; originally announced September 2021.

    Comments: 15 pages, 3 figures

  21. arXiv:2109.07137  [pdf, other

    cs.LG

    Optimal Cycling of a Heterogenous Battery Bank via Reinforcement Learning

    Authors: Vivek Deulkar, Jayakrishnan Nair

    Abstract: We consider the problem of optimal charging/discharging of a bank of heterogenous battery units, driven by stochastic electricity generation and demand processes. The batteries in the battery bank may differ with respect to their capacities, ramp constraints, losses, as well as cycling costs. The goal is to minimize the degradation costs associated with battery cycling in the long run; this is pos… ▽ More

    Submitted 15 September, 2021; originally announced September 2021.

    Comments: Appeared on IEEE SmartGridComm 2021 conference

  22. arXiv:2108.06935  [pdf, ps, other

    cs.DS cs.NI

    Speed Scaling with Multiple Servers Under A Sum Power Constraint

    Authors: Rahul Vaze, Jayakrishnan Nair

    Abstract: The problem of scheduling jobs and choosing their respective speeds with multiple servers under a sum power constraint to minimize the flow time + energy is considered. This problem is a generalization of the flow time minimization problem with multiple unit-speed servers, when jobs can be parallelized, however, with a sub-linear, concave speedup function $k^{1/α}, α>1$ when allocated $k$ servers,… ▽ More

    Submitted 18 August, 2021; v1 submitted 16 August, 2021; originally announced August 2021.

    Comments: To appear in Performance 2021

  23. arXiv:2105.08967  [pdf, ps, other

    cs.DS cs.NI

    Speed Scaling On Parallel Servers with MapReduce Type Precedence Constraints

    Authors: Rahul Vaze, Jayakrishnan Nair

    Abstract: A multiple server setting is considered, where each server has tunable speed, and increasing the speed incurs an energy cost. Jobs arrive to a single queue, and each job has two types of sub-tasks, map and reduce, and a {\bf precedence} constraint among them: any reduce task of a job can only be processed once all the map tasks of the job have been completed. In addition to the scheduling problem,… ▽ More

    Submitted 19 May, 2021; originally announced May 2021.

  24. arXiv:2103.00686  [pdf, other

    cs.IR cs.AI cs.AR cs.LG

    Accelerating Recommendation System Training by Leveraging Popular Choices

    Authors: Muhammad Adnan, Yassaman Ebrahimzadeh Maboud, Divya Mahajan, Prashant J. Nair

    Abstract: Recommender models are commonly used to suggest relevant items to a user for e-commerce and online advertisement-based applications. These models use massive embedding tables to store numerical representation of items' and users' categorical variables (memory intensive) and employ neural networks (compute intensive) to generate final recommendations. Training these large-scale recommendation model… ▽ More

    Submitted 28 September, 2021; v1 submitted 28 February, 2021; originally announced March 2021.

    ACM Class: I.2.6; C.5.0

    Journal ref: Proceedings of the VLDB Endowment, 2022

  25. arXiv:2008.13629  [pdf, other

    cs.LG stat.ML

    Statistically Robust, Risk-Averse Best Arm Identification in Multi-Armed Bandits

    Authors: Anmol Kagrecha, Jayakrishnan Nair, Krishna Jagannathan

    Abstract: Traditional multi-armed bandit (MAB) formulations usually make certain assumptions about the underlying arms' distributions, such as bounds on the support or their tail behaviour. Moreover, such parametric information is usually 'baked' into the algorithms. In this paper, we show that specialized algorithms that exploit such parametric information are prone to inconsistent learning performance whe… ▽ More

    Submitted 27 March, 2022; v1 submitted 28 August, 2020; originally announced August 2020.

    Comments: 21 pages. Preliminary version appeared in NeurIPS 2019. Accepted for publication at IEEE Transactions of Information Theory. arXiv admin note: text overlap with arXiv:1906.00569

  26. arXiv:2006.12038  [pdf, ps, other

    cs.LG stat.ML

    Bandit algorithms: Letting go of logarithmic regret for statistical robustness

    Authors: Kumar Ashutosh, Jayakrishnan Nair, Anmol Kagrecha, Krishna Jagannathan

    Abstract: We study regret minimization in a stochastic multi-armed bandit setting and establish a fundamental trade-off between the regret suffered under an algorithm, and its statistical robustness. Considering broad classes of underlying arms' distributions, we show that bandit learning algorithms with logarithmic regret are always inconsistent and that consistent learning algorithms always suffer a super… ▽ More

    Submitted 22 June, 2020; originally announced June 2020.

  27. arXiv:2006.09649  [pdf, other

    cs.LG stat.ML

    Constrained regret minimization for multi-criterion multi-armed bandits

    Authors: Anmol Kagrecha, Jayakrishnan Nair, Krishna Jagannathan

    Abstract: We consider a stochastic multi-armed bandit setting and study the problem of constrained regret minimization over a given time horizon. Each arm is associated with an unknown, possibly multi-dimensional distribution, and the merit of an arm is determined by several, possibly conflicting attributes. The aim is to optimize a 'primary' attribute subject to user-provided constraints on other 'secondar… ▽ More

    Submitted 3 January, 2023; v1 submitted 17 June, 2020; originally announced June 2020.

    Comments: 26 pages

  28. arXiv:1912.10619  [pdf, other

    cs.NI

    Adaptive flow-level scheduling for the IoT MAC

    Authors: Pragya Sharma, Jayakrishnan Nair, Raman Singh

    Abstract: Over the past decade, distributed CSMA, which forms the basis for WiFi, has been deployed ubiquitously to provide seamless and high-speed mobile internet access. However, distributed CSMA might not be ideal for future IoT/M2M applications, where the density of connected devices/sensors/controllers is expected to be orders of magnitude higher than that in present wireless networks. In such high-den… ▽ More

    Submitted 23 December, 2019; originally announced December 2019.

  29. arXiv:1910.12894  [pdf, other

    cs.PF

    Please come back later: Benefiting from deferrals in service systems

    Authors: Anmol Kagrecha, Jayakrishnan Nair

    Abstract: The performance evaluation of loss service systems, where customers who cannot be served upon arrival get dropped, has a long history going back to the classical Erlang B model. In this paper, we consider the performance benefits arising from the possibility of deferring customers who cannot be served upon arrival. Specifically, we consider an Erlang B type loss system where the system operator ca… ▽ More

    Submitted 28 October, 2019; originally announced October 2019.

  30. arXiv:1909.00553  [pdf, ps, other

    cs.AR cs.DC cs.PF eess.SY

    Touché: Towards Ideal and Efficient Cache Compression By Mitigating Tag Area Overheads

    Authors: Seokin Hong, Bulent Abali, Alper Buyuktosunoglu, Michael B. Healy, Prashant J. Nair

    Abstract: Compression is seen as a simple technique to increase the effective cache capacity. Unfortunately, compression techniques either incur tag area overheads or restrict data placement to only include neighboring compressed cache blocks to mitigate tag area overheads. Ideally, we should be able to place arbitrary compressed cache blocks without any placement restrictions and tag area overheads. This… ▽ More

    Submitted 2 September, 2019; originally announced September 2019.

    Comments: Keywords: Compression, Caches, Tag Array, Data Array, Hashing

    Journal ref: Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture, October 2019, Pages 453-465

  31. arXiv:1908.09580  [pdf, other

    econ.GN cs.GT

    Revenue Sharing in the Internet: A Moral Hazard Approach and a Net-neutrality Perspective

    Authors: Fehmina Malik, Manjesh K. ~Hanawal, Yezekael Hayel, Jayakrishnan Nair

    Abstract: Revenue sharing contracts between Content Providers (CPs) and Internet Service Providers (ISPs) can act as leverage for enhancing the infrastructure of the Internet. ISPs can be incentivized to make investments in network infrastructure that improve Quality of Service (QoS) for users if attractive contracts are negotiated between them and CPs. The idea here is that part of the net profit gained by… ▽ More

    Submitted 26 August, 2019; originally announced August 2019.

  32. arXiv:1907.09049  [pdf, ps, other

    cs.PF cs.DS

    Multiple Server SRPT with speed scaling is competitive

    Authors: Rahul Vaze, Jayakrishnan Nair

    Abstract: Can the popular shortest remaining processing time (SRPT) algorithm achieve a constant competitive ratio on multiple servers when server speeds are adjustable (speed scaling) with respect to the flow time plus energy consumption metric? This question has remained open for a while, where a negative result in the absence of speed scaling is well known. The main result of this paper is to show that m… ▽ More

    Submitted 5 May, 2020; v1 submitted 21 July, 2019; originally announced July 2019.

    Comments: To appear in IEEE/ACM Transactions on Networking

  33. arXiv:1907.04498  [pdf, other

    cs.DS cs.NI

    Speed Scaling with Tandem Servers

    Authors: Rahul Vaze, Jayakrishnan Nair

    Abstract: Speed scaling for a tandem server setting is considered, where there is a series of servers, and each job has to be processed by each of the servers in sequence. Servers have a variable speed, their power consumption being a convex increasing function of the speed. We consider the worst case setting as well as the stochastic setting. In the worst case setting, the jobs are assumed to be of unit si… ▽ More

    Submitted 9 July, 2019; originally announced July 2019.

  34. arXiv:1906.03587  [pdf, other

    cs.NI

    Partial Server Pooling in Redundancy Systems

    Authors: Akshay Mete, D. Manjunath, Jayakrishnan Nair, Balakrishna Prabhu

    Abstract: Partial sharing allows providers to possibly pool a fraction of their resources when full pooling is not beneficial to them. Recent work in systems without sharing has shown that redundancy can improve performance considerably. In this paper, we combine partial sharing and redundancy by develo** partial sharing models for providers operating multi-server systems with redundancy. Two M/M/N queues… ▽ More

    Submitted 9 June, 2019; originally announced June 2019.

  35. arXiv:1906.00581  [pdf, ps, other

    cs.NI

    Sponsored data with ISP competition

    Authors: Pooja Vyavahare, D. Manjunath, Jayakrishnan Nair

    Abstract: We analyze the effect of sponsored data platforms when Internet service providers (ISPs) compete for subscribers and content providers (CPs) compete for a share of the bandwidth usage by the customers. Our analytical model is of a full information, leader-follower game. ISPs lead and set prices for sponsorship. CPs then make the binary decision of sponsoring or not sponsoring their content on the… ▽ More

    Submitted 3 June, 2019; originally announced June 2019.

  36. arXiv:1906.00569  [pdf, other

    cs.LG stat.ML

    Distribution oblivious, risk-aware algorithms for multi-armed bandits with unbounded rewards

    Authors: Anmol Kagrecha, Jayakrishnan Nair, Krishna Jagannathan

    Abstract: Classical multi-armed bandit problems use the expected value of an arm as a metric to evaluate its goodness. However, the expected value is a risk-neutral metric. In many applications like finance, one is interested in balancing the expected return of an arm (or portfolio) with the risk associated with that return. In this paper, we consider the problem of selecting the arm that optimizes a linear… ▽ More

    Submitted 3 June, 2019; originally announced June 2019.

  37. arXiv:1904.06480  [pdf, other

    cs.PF math.OC

    Dynamic scheduling in a partially fluid, partially lossy queueing system

    Authors: Kiran Chaudhary, Veeraruna Kavitha, Jayakrishnan Nair

    Abstract: We consider a single server queueing system with two classes of jobs: eager jobs with small sizes that require service to begin almost immediately upon arrival, and tolerant jobs with larger sizes that can wait for service. While blocking probability is the relevant performance metric for the eager class, the tolerant class seeks to minimize its mean sojourn time. In this paper, we discuss the per… ▽ More

    Submitted 23 December, 2021; v1 submitted 13 April, 2019; originally announced April 2019.

  38. Sharing within limits: Partial resource pooling in loss systems

    Authors: Anvitha Nandigam, Suraj Jog, D. Manjunath, Jayakrishnan Nair, B. J. Prabhu

    Abstract: Fragmentation of expensive resources, e.g., spectrum for wireless services, between providers can introduce inefficiencies in resource utilisation and worsen overall system performance. In such cases, resource pooling between independent service providers can be used to improve performance. However, for providers to agree to pool their resources, the arrangement has to be mutually beneficial. The… ▽ More

    Submitted 19 August, 2018; originally announced August 2018.

  39. arXiv:1805.10831  [pdf, ps, other

    cs.NI

    On QoS-Compliant Telehaptic Communication over Shared Networks

    Authors: Vineet Gokhale, Jayakrishnan Nair, Subhasis Chaudhuri, Jan Fesl

    Abstract: The development of communication protocols for teleoperation with force feedback (generally known as telehaptics) has gained widespread interest over the past decade. Several protocols have been proposed for performing telehaptic interaction over shared networks. However, a comprehensive analysis of the impact of network cross-traffic on telehaptic streams, and the feasibility of Quality of Servic… ▽ More

    Submitted 28 May, 2018; originally announced May 2018.

    Comments: 28 pages, 11 figures

  40. arXiv:1805.03184  [pdf, other

    cs.AR

    LISA: Increasing Internal Connectivity in DRAM for Fast Data Movement and Low Latency

    Authors: Kevin K. Chang, Prashant J. Nair, Saugata Ghose, Donghyuk Lee, Moinuddin K. Qureshi, Onur Mutlu

    Abstract: This paper summarizes the idea of Low-Cost Interlinked Subarrays (LISA), which was published in HPCA 2016, and examines the work's significance and future potential. Contemporary systems perform bulk data movement movement inefficiently, by transferring data from DRAM to the processor, and then back to DRAM, across a narrow off-chip channel. The use of this narrow channel results in high latency a… ▽ More

    Submitted 8 May, 2018; originally announced May 2018.

  41. arXiv:1704.03991  [pdf, ps, other

    cs.AR cs.ET

    Architectural Techniques to Enable Reliable and Scalable Memory Systems

    Authors: Prashant J. Nair

    Abstract: High capacity and scalable memory systems play a vital role in enabling our desktops, smartphones, and pervasive technologies like Internet of Things (IoT). Unfortunately, memory systems are becoming increasingly prone to faults. This is because we rely on technology scaling to improve memory density, and at small feature sizes, memory cells tend to break easily. Today, memory reliability is seen… ▽ More

    Submitted 13 April, 2017; originally announced April 2017.

    Comments: PhD thesis, Georgia Institute of Technology (May 2017)

  42. arXiv:1610.00609  [pdf, ps, other

    cs.NI cs.MM

    Congestion Control for Network-Aware Telehaptic Communication

    Authors: Vineet Gokhale, Jayakrishnan Nair, Subhasis Chaudhuri

    Abstract: Telehaptic applications involve delay-sensitive multimedia communication between remote locations with distinct Quality of Service (QoS) requirements for different media components. These QoS constraints pose a variety of challenges, especially when the communication occurs over a shared network, with unknown and time-varying cross-traffic. In this work, we propose a transport layer congestion con… ▽ More

    Submitted 11 January, 2017; v1 submitted 3 October, 2016; originally announced October 2016.

    Comments: 25 pages, 19 figures

  43. arXiv:1412.7532  [pdf

    cs.SE

    Toward Refactoring of DMARF and GIPSY Case Studies -- A Team XI SOEN6471-S14 Project Report

    Authors: Zinia Das, Mohammad Iftekharul Hoque, Renuka Milkoori, Jithin Nair, Rohan Nayak, Swamy Yogya Reddy, Dhana Shree Sankini, Arslan Zaffar

    Abstract: This report focuses on improving the internal structure of the Distributed Modular Audio recognition Framework (DMARF) and the General Intensional Programming System (GIPSY) case studies without affecting their original behavior. At first, the general principles, and the working of DMARF and GIPSY are understood by mainly stressing on the architecture of the systems by looking at their frameworks… ▽ More

    Submitted 23 December, 2014; originally announced December 2014.

    Comments: 84 pages, 69 figures, 7 tables

    ACM Class: D.2; K.6; H.5.2