Skip to main content

Showing 1–25 of 25 results for author: Khonsari, A

.
  1. arXiv:2501.16763  [pdf

    cs.CR cs.NI

    Utilizing Transaction Prioritization to Enhance Confirmation Speed in the IOTA Network

    Authors: Seyyed Ali Aghamiri, Reza Sharifnia, Ahmad Khonsari

    Abstract: With the rapid advancement of blockchain technology, a significant trend is the adoption of Directed Acyclic Graphs (DAGs) as an alternative to traditional chain-based architectures for organizing ledger records. Systems like IOTA, which are specially designed for the Internet of Things (IoT), leverage DAG-based architectures to achieve greater scalability by enabling multiple attachment points in… ▽ More

    Submitted 14 February, 2025; v1 submitted 28 January, 2025; originally announced January 2025.

    Comments: 5 pages

  2. arXiv:2403.00725  [pdf, ps, other

    cs.SI cs.MA

    Cost-Effective Activity Control of Asymptomatic Carriers in Layered Temporal Social Networks

    Authors: Masoumeh Moradian, Aresh Dadlani, Rasul Kairgeldin, Ahmad Khonsari

    Abstract: The robustness of human social networks against epidemic propagation relies on the propensity for physical contact adaptation. During the early phase of infection, asymptomatic carriers exhibit the same activity level as susceptible individuals, which presents challenges for incorporating control measures in epidemic projection models. This paper focuses on modeling and cost-efficient activity con… ▽ More

    Submitted 1 March, 2024; originally announced March 2024.

  3. arXiv:2401.07288  [pdf, other

    cs.IT cs.NI

    Hybrid Coded-Uncoded Caching in Multi-Access Networks with Non-uniform Demands

    Authors: Abdollah Ghaffari Sheshjavani, Ahmad Khonsari, Masoumeh Moradian, Seyed Pooya Shariatpanahi, Seyedeh Bahereh Hassanpour

    Abstract: To address the massive growth of data traffic over cellular networks, increasing spatial reuse of the frequency spectrum by the deployment of small base stations (SBSs) has been considered. For rapid deployment of SBSs in the networks, caching popular content along with new coded caching schemes are proposed. To maximize the cellular network's capacity, densifying it with small base stations is in… ▽ More

    Submitted 14 January, 2024; originally announced January 2024.

    Comments: 10 pages

  4. arXiv:2401.01424  [pdf, ps, other

    cs.NI eess.SY

    Age-Aware Dynamic Frame Slotted ALOHA for Machine-Type Communications

    Authors: Masoumeh Moradian, Aresh Dadlani, Ahmad Khonsari, Hina Tabassum

    Abstract: Information aging has gained prominence in characterizing communication protocols for timely remote estimation and control applications. This work proposes an Age of Information (AoI)-aware threshold-based dynamic frame slotted ALOHA (T-DFSA) for contention resolution in random access machine-type communication networks. Unlike conventional DFSA that maximizes the throughput in each frame, the fra… ▽ More

    Submitted 2 January, 2024; originally announced January 2024.

  5. arXiv:2208.01619  [pdf, ps, other

    cs.NI cs.PF

    On the Age of Status Updates in Unreliable Multi-Source M/G/1 Queueing Systems

    Authors: Muthukrishnan Senthil Kumar, Aresh Dadlani, Masoumeh Moradian, Ahmad Khonsari, Theodoros A. Tsiftsis

    Abstract: The timeliness of status message delivery in communications networks is subjective to time-varying wireless channel transmissions. In this paper, we investigate the age of information (AoI) of each source in a multi-source M/G/1 queueing update system with active server failures. In particular, we adopt the method of supplementary variables to derive a closed-form expression for the average AoI in… ▽ More

    Submitted 31 October, 2022; v1 submitted 2 August, 2022; originally announced August 2022.

    Comments: 5 pages, 6 figures, journal

  6. Privacy-Preserving Edge Caching: A Probabilistic Approach

    Authors: Seyedeh Bahereh Hassanpour, Ahmad Khonsari, Masoumeh Moradian, Seyed Pooya Shariatpanahi

    Abstract: Edge caching (EC) decreases the average access delay of the end-users through caching popular content at the edge network, however, it increases the leakage probability of valuable information such as users preferences. Most of the existing privacy-preserving approaches focus on adding layers of encryption, which confronts the network with more challenges such as energy and computation limitations… ▽ More

    Submitted 30 July, 2022; originally announced August 2022.

  7. arXiv:2108.01292  [pdf, ps, other

    cs.PF cs.CC math.PR

    Scaling Power Management in Cloud Data Centers: A Multi-Level Continuous-Time MDP Approach

    Authors: Behzad Chitsaz, Ahmad Khonsari, Masoumeh Moradian, Aresh Dadlani, Mohammad Sadegh Talebi

    Abstract: Power management in multi-server data centers~especially at scale is a vital issue of increasing importance in cloud computing paradigm. Existing studies mostly consider thresholds on the number of idle servers to switch the servers on or off and suffer from scalability issues. As a natural approach in view~of~the Markovian assumption, we present a multi-level continuous-time Markov decision proce… ▽ More

    Submitted 19 July, 2023; v1 submitted 3 August, 2021; originally announced August 2021.

    Comments: 12 pages, 7 figures

  8. arXiv:2107.13437  [pdf, ps, other

    cs.SI math.DS

    Co-evolution of Viral Processes and Structural Stability in Signed Social Networks

    Authors: Temirlan Kalimzhanov, Amir Haji Ali Khamseh'i, Aresh Dadlani, Muthukrishnan Senthil Kumar, Ahmad Khonsari

    Abstract: Prediction and control of spreading processes in social networks (SNs) are closely tied to the underlying connectivity patterns. Contrary to most existing efforts that exclusively focus on positive social user interactions, the impact of contagion processes on the temporal evolution of signed SNs (SSNs) with distinctive friendly (positive) and hostile (negative) relationships yet, remains largely… ▽ More

    Submitted 26 July, 2022; v1 submitted 28 July, 2021; originally announced July 2021.

    Comments: 6 pages, 9 figures, under review

  9. Content Caching for Shared Medium Networks Under Heterogeneous Users' Behaviours

    Authors: Abdollah Ghaffari Sheshjavani, Ahmad Khonsari, Seyed Pooya Shariatpanahi, Masoumeh Moradian

    Abstract: Content caching is a widely studied technique aimed to reduce the network load imposed by data transmission during peak time while ensuring users' quality of experience. It has been shown that when there is a common link between caches and the server, delivering contents via the coded caching scheme can significantly improve performance over conventional caching. However, finding the optimal conte… ▽ More

    Submitted 7 May, 2021; originally announced May 2021.

    Comments: 12 pages

  10. TaxoNN: A Light-Weight Accelerator for Deep Neural Network Training

    Authors: Reza Hojabr, Kamyar Givaki, Kossar Pourahmadi, Parsa Nooralinejad, Ahmad Khonsari, Dara Rahmati, M. Hassan Najafi

    Abstract: Emerging intelligent embedded devices rely on Deep Neural Networks (DNNs) to be able to interact with the real-world environment. This interaction comes with the ability to retrain DNNs, since environmental conditions change continuously in time. Stochastic Gradient Descent (SGD) is a widely used algorithm to train DNNs by optimizing the parameters over the training data iteratively. In this work,… ▽ More

    Submitted 11 October, 2020; originally announced October 2020.

    Comments: Accepted to ISCAS 2020. 5 pages, 5 figures

    Journal ref: 2020 IEEE International Symposium on Circuits and Systems (ISCAS), 2020, pp. 1-5

  11. arXiv:2003.14348  [pdf, ps, other

    cs.CV cs.LG

    UniformAugment: A Search-free Probabilistic Data Augmentation Approach

    Authors: Tom Ching LingChen, Ava Khonsari, Amirreza Lashkari, Mina Rafi Nazari, Jaspreet Singh Sambee, Mario A. Nascimento

    Abstract: Augmenting training datasets has been shown to improve the learning effectiveness for several computer vision tasks. A good augmentation produces an augmented dataset that adds variability while retaining the statistical properties of the original dataset. Some techniques, such as AutoAugment and Fast AutoAugment, have introduced a search phase to find a set of suitable augmentation policies for a… ▽ More

    Submitted 31 March, 2020; originally announced March 2020.

  12. arXiv:2001.00053  [pdf, other

    cs.LG cs.NE

    On the Resilience of Deep Learning for Reduced-voltage FPGAs

    Authors: Kamyar Givaki, Behzad Salami, Reza Hojabr, S. M. Reza Tayaranian, Ahmad Khonsari, Dara Rahmati, Saeid Gorgin, Adrian Cristal, Osman S. Unsal

    Abstract: Deep Neural Networks (DNNs) are inherently computation-intensive and also power-hungry. Hardware accelerators such as Field Programmable Gate Arrays (FPGAs) are a promising solution that can satisfy these requirements for both embedded and High-Performance Computing (HPC) systems. In FPGAs, as well as CPUs and GPUs, aggressive voltage scaling below the nominal level is an effective technique for p… ▽ More

    Submitted 26 December, 2019; originally announced January 2020.

  13. arXiv:1911.01296  [pdf, other

    cs.NI

    Serverless Computing: A Survey of Opportunities, Challenges and Applications

    Authors: Hossein Shafiei, Ahmad Khonsari, Payam Mousavi

    Abstract: The topic of serverless computing has proved to be a controversial subject both within academic and industrial communities. Many have praised the approach to be a platform for a new era of computing and some have argued that it is in fact a step backward. Though, both sides agree that there exist challenges that must be addressed in order to better utilize its potentials. This paper surveys existi… ▽ More

    Submitted 4 June, 2021; v1 submitted 4 November, 2019; originally announced November 2019.

    Comments: 27 pages, 3 figures

  14. arXiv:1801.00840  [pdf

    cs.NI

    High Performance Architecture for Flow-Table Lookup in SDN on FPGA

    Authors: Rashid Hatamia, Hossein Bahramgiria, Ahmad Khonsari

    Abstract: We propose Range-based Ternary Search Tree (RTST), a tree-based approach for flow-table lookup in SDN network. RTST builds upon flow-tables in SDN switches to provide a fast lookup among flows. We present a parallel multi-pipeline architecture for implementing RTST that benefits from high throughput and low latency. The proposed RTST and architecture achieve a memory efficiency of 1 byte of memory… ▽ More

    Submitted 2 January, 2018; originally announced January 2018.

  15. arXiv:1606.00637  [pdf, other

    cs.DC

    Maximum-Quality Tree Construction for Deadline-Constrained Aggregation in WSNs

    Authors: Bahram Alinia, Mohammad H. Hajiesmaili, Ahmad Khonsari, Noel Crespi

    Abstract: In deadline-constrained wireless sensor networks (WSNs), quality of aggregation (QoA) is determined by the number of participating nodes in the data aggregation process. The previous studies have attempted to propose optimal scheduling algorithms to obtain the maximum QoA assuming a fixed underlying aggregation tree. However, there exists no prior work to address the issue of constructing optimal… ▽ More

    Submitted 2 June, 2016; originally announced June 2016.

    Comments: 31 pages. arXiv admin note: substantial text overlap with arXiv:1405.0597

  16. arXiv:1512.04106  [pdf, other

    cs.ET

    A Fair Admission Control Mechanism for Efficient Utilization of Resources in On-chip Nanophotonic Crossbars

    Authors: Seyed Hessam Mirsadeghi, Ahmad Khonsari, Mohammad Sadegh Talebi, Behnam Khodabandeloo

    Abstract: Advances in CMOS-compatible photonic elements have made it plausible to exploit nanophotonic communications to overcome the limitations of traditional NoCs. Amongst various proposed nanophotonic architectures, optical crossbars have been shown to provide high performance in terms of bandwidth and latency. In general, optical crossbars provide a vast volume of network resources that are shared amon… ▽ More

    Submitted 22 September, 2016; v1 submitted 13 December, 2015; originally announced December 2015.

    Comments: submitted

  17. arXiv:1509.03374  [pdf, other

    cs.NI

    Utility-Optimal Dynamic Rate Allocation under Average End-to-End Delay Requirements

    Authors: Mohammad H. Hajiesmaili, Mohammad Sadegh Talebi, Ahmad Khonsari

    Abstract: QoS-aware networking applications such as real-time streaming and video surveillance systems require nearly fixed average end-to-end delay over long periods to communicate efficiently, although may tolerate some delay variations in short periods. This variability exhibits complex dynamics that makes rate control of such applications a formidable task. This paper addresses rate allocation for heter… ▽ More

    Submitted 30 October, 2015; v1 submitted 10 September, 2015; originally announced September 2015.

  18. arXiv:1506.03551  [pdf, other

    cs.NI cs.PF

    On the Feasibility of Wireless Interconnects for High-throughput Data Centers

    Authors: Ahmad Khonsari, Seyed Pooya Shariatpanahi, Abolfazl Diyanat, Hossein Shafiei

    Abstract: Data Centers (DCs) are required to be scalable to large data sets so as to accommodate ever increasing demands of resource-limited embedded and mobile devices. Thanks to the availability of recent high data rate millimeter-wave frequency spectrum such as 60GHz and due to the favorable attributes of this technology, wireless DC (WDC) exhibits the potentials of being a promising solution especially… ▽ More

    Submitted 11 June, 2015; originally announced June 2015.

  19. arXiv:1405.0597   

    cs.NI

    On the Construction of Maximum-Quality Aggregation Trees in Deadline-Constrained WSNs

    Authors: Bahram Alinia, Mohammad H. Hajiesmaili, Ahmad Khonsari

    Abstract: In deadline-constrained data aggregation in wireless sensor networks (WSNs), the imposed sink deadline along with the interference constraint hinders participation of all sensor nodes in data aggregation. Thus, exploiting the wisdom of the crowd paradigm, the total number of participant nodes in data aggregation determines the quality of aggregation ($QoA$). Although the previous studies have prop… ▽ More

    Submitted 31 July, 2014; v1 submitted 3 May, 2014; originally announced May 2014.

    Comments: This paper has been withdrawn by the author due to a crucial sign error in equation 1

  20. arXiv:1302.1506  [pdf, other

    cs.NI

    Rate-Privacy in Wireless Sensor Networks

    Authors: H. Shafiei, A. Khonsari, H. Derakhshi, P. Mousavi

    Abstract: This paper introduces the concept of rate privacy in the context of wireless sensor networks. Our discussion reveals that the concept indeed is of a great importance for the privacy preservation of such networks. As a result, we propose a buffering scheme to protect the rate from adversaries. Simulation results verify the applicability of our approach.

    Submitted 6 February, 2013; originally announced February 2013.

  21. arXiv:1208.2374  [pdf

    cs.AR

    Dynamic Warp Resizing in High-Performance SIMT

    Authors: Ahmad Lashgar, Amirali Baniasadi, Ahmad Khonsari

    Abstract: Modern GPUs synchronize threads grouped in a warp at every instruction. These results in improving SIMD efficiency and makes sharing fetch and decode resources possible. The number of threads included in each warp (or warp size) affects divergence, synchronization overhead and the efficiency of memory access coalescing. Small warps reduce the performance penalty associated with branch and memory d… ▽ More

    Submitted 3 November, 2012; v1 submitted 11 August, 2012; originally announced August 2012.

    Comments: 9 pages, 5 Figures, 3 Lists, 1 Table, The extended version of ICCD 2012 poster paper

  22. arXiv:1205.4967  [pdf

    cs.AR

    Investigating Warp Size Impact in GPUs

    Authors: Ahmad Lashgar, Amirali Baniasadi, Ahmad Khonsari

    Abstract: There are a number of design decisions that impact a GPU's performance. Among such decisions deciding the right warp size can deeply influence the rest of the design. Small warps reduce the performance penalty associated with branch divergence at the expense of a reduction in memory coalescing. Large warps enhance memory coalescing significantly but also increase branch divergence. This leaves des… ▽ More

    Submitted 22 May, 2012; originally announced May 2012.

    Comments: 7 pages, 7 figures, 2 tables, Technical Report

  23. arXiv:1109.6851   

    cs.MM cs.NI

    Content-Aware Rate Control for Video Transmission with Buffer Constraints in Multipath Networks

    Authors: Mohammad Hassan Hajiesmaili, Ali Sehati, Ahmad Khonsari, Mohammad Sadegh Talebi

    Abstract: Being an integral part of the network traffic, nowadays it's vital to design robust mechanisms to provide QoS for multimedia applications. The main goal of this paper is to provide an efficient solution to support content-aware video transmission mechanism with buffer underflow avoidance at the receiver in multipath networks. Towards this, we introduce a content-aware time-varying utility function… ▽ More

    Submitted 17 August, 2012; v1 submitted 30 September, 2011; originally announced September 2011.

    Comments: This paper has been withdrawn by the last author since there is a minor change in the list of authors. In the new version, the last author is not included in the paper any longer

  24. arXiv:1109.6809  [pdf, ps, other

    cs.NI math.OC

    NUM-Based Rate Allocation for Streaming Traffic via Sequential Convex Programming

    Authors: Ali Sehati, Mohammad Sadegh Talebi, Ahmad Khonsari

    Abstract: In recent years, there has been an increasing demand for ubiquitous streaming like applications in data networks. In this paper, we concentrate on NUM-based rate allocation for streaming applications with the so-called S-curve utility functions. Due to non-concavity of such utility functions, the underlying NUM problem would be non-convex for which dual methods might become quite useless. To tackl… ▽ More

    Submitted 30 September, 2011; originally announced September 2011.

    Comments: 6 pages, conference submission

  25. arXiv:1102.2604  [pdf, other

    cs.MM cs.NI

    Quasi-Optimal Network Utility Maximization for Scalable Video Streaming

    Authors: Mohammad Sadegh Talebi, Ahmad Khonsari, Mohammad Hassan Hajiesmaili, Sina Jafarpour

    Abstract: This paper addresses rate control for transmission of scalable video streams via Network Utility Maximization (NUM) formulation. Due to stringent QoS requirements of video streams and specific characterization of utility experienced by end-users, one has to solve nonconvex and even nonsmooth NUM formulation for such streams, where dual methods often prove incompetent. Convexification plays an impo… ▽ More

    Submitted 17 August, 2012; v1 submitted 13 February, 2011; originally announced February 2011.

    Comments: This work has been submitted to the IEEE for possible publication