Skip to main content

Showing 1–17 of 17 results for author: Benson, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2305.10708  [pdf

    cs.AI

    Machine Learning Recommendation System For Health Insurance Decision Making In Nigeria

    Authors: Ayomide Owoyemi, Emmanuel Nnaemeka, Temitope O. Benson, Ronald Ikpe, Blessing Nwachukwu, Temitope Isedowo

    Abstract: The uptake of health insurance has been poor in Nigeria, a significant step to improving this includes improved awareness, access to information and tools to support decision making. Artificial intelligence (AI) based recommender systems have gained popularity in helping individuals find movies, books, music, and different types of products on the internet including diverse applications in healthc… ▽ More

    Submitted 18 May, 2023; originally announced May 2023.

  2. arXiv:2304.04987  [pdf, ps, other

    cs.CR cs.LG cs.NI

    Detecting Anomalous Microflows in IoT Volumetric Attacks via Dynamic Monitoring of MUD Activity

    Authors: Ayyoob Hamza, Hassan Habibi Gharakheili, Theophilus A. Benson, Gustavo Batista, Vijay Sivaraman

    Abstract: IoT networks are increasingly becoming target of sophisticated new cyber-attacks. Anomaly-based detection methods are promising in finding new attacks, but there are certain practical challenges like false-positive alarms, hard to explain, and difficult to scale cost-effectively. The IETF recent standard called Manufacturer Usage Description (MUD) seems promising to limit the attack surface on IoT… ▽ More

    Submitted 11 April, 2023; originally announced April 2023.

    Comments: 18 pages, 13 figures

    ACM Class: C.2

  3. arXiv:2007.02624  [pdf, other

    cs.NI

    Providing In-network Support to Coflow Scheduling

    Authors: Cristian Hernandez Benet, Andreas J. Kassler, Gianni Antichi, Theophilus A. Benson, Gergely Pongracz

    Abstract: Many emerging distributed applications, including big data analytics, generate a number of flows that concurrently transport data across data center networks. To improve their performance, it is required to account for the behavior of a collection of flows, i.e., coflows, rather than individual. State-of-the-art solutions allow for a near-optimal completion time by continuously reordering the unfi… ▽ More

    Submitted 6 July, 2020; originally announced July 2020.

    Comments: 8 pages

  4. arXiv:1910.02270  [pdf, other

    cs.DC cs.LG hep-ex physics.comp-ph

    Parallelizing Training of Deep Generative Models on Massive Scientific Datasets

    Authors: Sam Ade Jacobs, Brian Van Essen, David Hysom, Jae-Seung Yeom, Tim Moon, Rushil Anirudh, Jayaraman J. Thiagaranjan, Shusen Liu, Peer-Timo Bremer, Jim Gaffney, Tom Benson, Peter Robinson, Luc Peterson, Brian Spears

    Abstract: Training deep neural networks on large scientific data is a challenging task that requires enormous compute power, especially if no pre-trained models exist to initialize the process. We present a novel tournament method to train traditional as well as generative adversarial networks built on LBANN, a scalable deep learning framework optimized for HPC systems. LBANN combines multiple levels of par… ▽ More

    Submitted 5 October, 2019; originally announced October 2019.

  5. arXiv:1908.04518  [pdf, other

    cs.NI cs.LG

    ConfigTron: Tackling network diversity with heterogeneous configurations

    Authors: Usama Naseer, Theophilus Benson

    Abstract: The web serving protocol stack is constantly changing and evolving to tackle technological shifts in networking infrastructure and website complexity. As a result of this evolution, the web serving stack includes a plethora of protocols and configuration parameters that enable the web serving stack to address a variety of realistic network conditions. Yet, today, most content providers have adopte… ▽ More

    Submitted 13 August, 2019; originally announced August 2019.

    Comments: 13 pages

  6. arXiv:1903.06681  [pdf, other

    cs.DC cs.LG

    Improving Strong-Scaling of CNN Training by Exploiting Finer-Grained Parallelism

    Authors: Nikoli Dryden, Naoya Maruyama, Tom Benson, Tim Moon, Marc Snir, Brian Van Essen

    Abstract: Scaling CNN training is necessary to keep up with growing datasets and reduce training time. We also see an emerging need to handle datasets with very large samples, where memory requirements for training are large. Existing training frameworks use a data-parallel approach that partitions samples within a mini-batch, but limits to scaling the mini-batch size and memory consumption makes this unten… ▽ More

    Submitted 15 March, 2019; originally announced March 2019.

    Comments: To appear at IPDPS 2019

  7. Verifying and Monitoring IoTs Network Behavior using MUD Profiles

    Authors: Ayyoob Hamza, Dinesha Ranathunga, Hassan Habibi Gharakheili, Theophilus A. Benson, Matthew Roughan, Vijay Sivaraman

    Abstract: IoT devices are increasingly being implicated in cyber-attacks, raising community concern about the risks they pose to critical infrastructure, corporations, and citizens. In order to reduce this risk, the IETF is pushing IoT vendors to develop formal specifications of the intended purpose of their IoT devices, in the form of a Manufacturer Usage Description (MUD), so that their network behavior i… ▽ More

    Submitted 7 February, 2019; originally announced February 2019.

    Comments: 17 pages, 17 figures. arXiv admin note: text overlap with arXiv:1804.04358

  8. arXiv:1901.01632  [pdf, other

    cs.NI

    Exploiting Network Loss for Distributed Approximate Computing with NetApprox

    Authors: Ke Liu, Jinmou Li, Shin-Yeh Tsai, Theophilus Benson, Yiying Zhang

    Abstract: Many data center applications such as machine learning and big data analytics can complete their analysis without processing the complete set of data. While extensive approximate-aware optimizations have been proposed at hardware, programming language, and application levels. However, to date, the approximate computing optimizations have ignored the network layer. We propose NetApprox, which to… ▽ More

    Submitted 29 June, 2022; v1 submitted 6 January, 2019; originally announced January 2019.

  9. arXiv:1712.03890  [pdf, other

    cs.NI cs.AI cs.LG

    DeepConfig: Automating Data Center Network Topologies Management with Machine Learning

    Authors: Christopher Streiffer, Huan Chen, Theophilus Benson, Asim Kadav

    Abstract: In recent years, many techniques have been developed to improve the performance and efficiency of data center networks. While these techniques provide high accuracy, they are often designed using heuristics that leverage domain-specific properties of the workload or hardware. In this vision paper, we argue that many data center networking techniques, e.g., routing, topology augmentation, energy… ▽ More

    Submitted 11 December, 2017; originally announced December 2017.

  10. arXiv:1611.01529  [pdf, other

    cs.NI

    Dapper: Data Plane Performance Diagnosis of TCP

    Authors: Mojgan Ghasemi, Theophilus Benson, Jennifer Rexford

    Abstract: With more applications moving to the cloud, cloud providers need to diagnose performance problems in a timely manner. Offline processing of logs is slow and inefficient, and instrumenting the end-host network stack would violate the tenants' rights to manage their own virtual machines (VMs). Instead, our Dapper system analyzes TCP performance in real time near the end-hosts (e.g., at the hyperviso… ▽ More

    Submitted 4 November, 2016; originally announced November 2016.

  11. arXiv:1605.06150  [pdf, other

    cs.NI

    Finding Needles in the Haystack: Harnessing Syslogs for Data Center Management

    Authors: Chen Liang, Theophilus Benson, Partha Kanuparthy, Yihua He

    Abstract: Network device syslogs are ubiquitous and abundant in modern data centers with most large data centers producing millions of messages per day. Yet, the operational information reflected in syslogs and their implications on diagnosis or management tasks are poorly understood. Prevalent approaches to understanding syslogs focus on simple correlation and abnormality detection and are often limited to… ▽ More

    Submitted 19 May, 2016; originally announced May 2016.

  12. arXiv:1605.04966  [pdf, other

    cs.NI

    Performance Characterization of a Commercial Video Streaming Service

    Authors: Mojgan Ghasemi, Partha Kanuparthy, Ahmed Mansy, Theophilus Benson, Jennifer Rexford

    Abstract: Despite the growing popularity of video streaming over the Internet, problems such as re-buffering and high startup latency continue to plague users. In this paper, we present an end-to-end characterization of Yahoo's video streaming service, analyzing over 500 million video chunks downloaded over a two-week period. We gain unique visibility into the causes of performance degradation by instrument… ▽ More

    Submitted 16 May, 2016; originally announced May 2016.

  13. arXiv:1602.03273  [pdf, ps, other

    cs.DC

    YTrace: End-to-end Performance Diagnosis in Large Cloud and Content Providers

    Authors: Partha Kanuparthy, Yuchen Dai, Sudhir Pathak, Sambit Samal, Theophilus Benson, Mojgan Ghasemi, P. P. S. Narayan

    Abstract: Content providers build serving stacks to deliver content to users. An important goal of a content provider is to ensure good user experience, since user experience has an impact on revenue. In this paper, we describe a system at Yahoo called YTrace that diagnoses bad user experience in near real time. We present the different components of YTrace for end-to-end multi-layer diagnosis (instrumentat… ▽ More

    Submitted 25 May, 2016; v1 submitted 10 February, 2016; originally announced February 2016.

    ACM Class: B.8.2; C.2.4; C.4

  14. arXiv:1601.02241  [pdf

    cs.CE

    Extended Capability Models for Carbon Fiber Composite (CFC) Panels in the Unstructured Transmission Line Modelling (UTLM) Method

    Authors: Xuesong Meng, Ana Vukovic, Trevor M. Benson, Phillip Sewell

    Abstract: An effective model of single and multilayered thin panels, including those formed using carbon fiber composite (CFC) materials, is incorporated into the Transmission Line Modeling (TLM) method. The thin panel model is a one-dimensional (1D) one based on analytical expansions of cotangent and cosecant functions that are used to describe the admittance matrix in the frequency domain; these are then… ▽ More

    Submitted 10 January, 2016; originally announced January 2016.

    Comments: 8 pages; submitted to IEEE Transactions on Electromagnetic Compatibility

  15. arXiv:1512.00102  [pdf, other

    cs.CR

    Secure Distributed Membership Tests via Secret Sharing: How to Hide Your Hostile Hosts Harnessing Shamir Secret Sharing

    Authors: David Zage, Helen Xu, Thomas Kroeger, Bridger Hahn, Nolan Donoghue, Thomas Benson

    Abstract: Data security and availability for operational use are frequently seen as conflicting goals. Research on searchable encryption and homomorphic encryption are a start, but they typically build from encryption methods that, at best, provide protections based on problems assumed to be computationally hard. By contrast, data encoding methods such as secret sharing provide information-theoretic data pr… ▽ More

    Submitted 30 November, 2015; originally announced December 2015.

    Comments: 6 pages and 3 figures. Submitted and accepted at CNC at ICNC 2016

  16. Modeling Curved Carbon Fiber Composite (CFC) Structures in the Transmission-Line Modeling (TLM) Method

    Authors: Xuesong Meng, Phillip Sewell, Sendy Phang, Ana Vukovic, Trevor M. Benson

    Abstract: A new embedded model for curved thin panels is developed in the Transmission Line Modeling (TLM) method. In this model, curved panels are first linearized and then embedded between adjacent 2D TLM nodes allowing for arbitrary positioning between adjacent node centers. The embedded model eliminates the necessity for fine discretization thus reducing the run time and memory requirements for the calc… ▽ More

    Submitted 4 February, 2015; originally announced February 2015.

    Comments: 8 pages, 12 figures, accepted for publication in IEEE Transactions on EMC

    Journal ref: Electromagnetic Compatibility, IEEE Transactions on (Volume:PP , Issue: 99 ), 2015

  17. arXiv:1305.0209  [pdf, ps, other

    cs.NI

    Stratos: A Network-Aware Orchestration Layer for Virtual Middleboxes in Clouds

    Authors: Aaron Gember, Anand Krishnamurthy, Saul St. John, Robert Grandl, Xiaoyang Gao, Ashok Anand, Theophilus Benson, Vyas Sekar, Aditya Akella

    Abstract: Enterprises want their in-cloud services to leverage the performance and security benefits that middleboxes offer in traditional deployments. Such virtualized deployments create new opportunities (e.g., flexible scaling) as well as new challenges (e.g., dynamics, multiplexing) for middlebox management tasks such as service composition and provisioning. Unfortunately, enterprises lack systematic to… ▽ More

    Submitted 11 March, 2014; v1 submitted 1 May, 2013; originally announced May 2013.