Skip to main content

Showing 1–3 of 3 results for author: Sathyavageeswaran, N

.
  1. arXiv:2501.13810  [pdf, other

    cs.LG cs.AI

    Learning to Help in Multi-Class Settings

    Authors: Yu Wu, Yansong Li, Zeyu Dong, Nitya Sathyavageeswaran, Anand D. Sarwate

    Abstract: Deploying complex machine learning models on resource-constrained devices is challenging due to limited computational power, memory, and model retrainability. To address these limitations, a hybrid system can be established by augmenting the local model with a server-side model, where samples are selectively deferred by a rejector and then sent to the server for processing. The hybrid system enabl… ▽ More

    Submitted 16 April, 2025; v1 submitted 23 January, 2025; originally announced January 2025.

    Comments: 30 pages, 7 figures, conference, ICLR 2025

  2. arXiv:2405.07274  [pdf, other

    eess.SY

    Timely Offloading in Mobile Edge Cloud Systems

    Authors: Nitya Sathyavageeswaran, Roy D. Yates, Anand D. Sarwate, Narayan Mandayam

    Abstract: Future real-time applications like smart cities will use complex Machine Learning (ML) models for a variety of tasks. Timely status information is required for these applications to be reliable. Offloading computation to a mobile edge cloud (MEC) can reduce the completion time of these tasks. However, using the MEC may come at a cost such as related to use of a cloud service or privacy. In this pa… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

  3. arXiv:2205.15630  [pdf, other

    eess.SY

    Privacy Leakage in Discrete Time Updating Systems

    Authors: Nitya Sathyavageeswaran, Roy D. Yates, Anand D. Sarwate, Narayan Mandayam

    Abstract: A source generates time-stamped update packets that are sent to a server and then forwarded to a monitor. This occurs in the presence of an adversary that can infer information about the source by observing the output process of the server. The server wishes to release updates in a timely way to the monitor but also wishes to minimize the information leaked to the adversary. We analyze the trade-o… ▽ More

    Submitted 31 May, 2022; originally announced May 2022.