Skip to main content

Showing 1–13 of 13 results for author: Bitar, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.06783  [pdf, other

    math.OC cs.LG eess.SY

    A Distributionally Robust Approach to Regret Optimal Control using the Wasserstein Distance

    Authors: Feras Al Taha, Shuhao Yan, Eilyan Bitar

    Abstract: This paper proposes a distributionally robust approach to regret optimal control of discrete-time linear dynamical systems with quadratic costs subject to a stochastic additive disturbance on the state process. The underlying probability distribution of the disturbance process is unknown, but assumed to lie in a given ball of distributions defined in terms of the type-2 Wasserstein distance. In th… ▽ More

    Submitted 16 August, 2023; v1 submitted 13 April, 2023; originally announced April 2023.

    Comments: 8 pages, 3 figures, to appear in the proceedings of the 2023 IEEE Conference on Decision and Control (CDC)

  2. Data-Driven Approximations of Chance Constrained Programs in Nonstationary Environments

    Authors: Shuhao Yan, Francesca Parise, Eilyan Bitar

    Abstract: We study sample average approximations (SAA) of chance constrained programs. SAA methods typically approximate the actual distribution in the chance constraint using an empirical distribution constructed from random samples assumed to be independent and identically distributed according to the actual distribution. In this paper, we consider a nonstationary variant of this problem, where the random… ▽ More

    Submitted 7 May, 2022; originally announced May 2022.

    Comments: 6 pages, 1 figure

  3. arXiv:2101.06784  [pdf, other

    cs.CV cs.LG

    Exploring Adversarial Robustness of Multi-Sensor Perception Systems in Self Driving

    Authors: James Tu, Huichen Li, Xinchen Yan, Mengye Ren, Yun Chen, Ming Liang, Eilyan Bitar, Ersin Yumer, Raquel Urtasun

    Abstract: Modern self-driving perception systems have been shown to improve upon processing complementary inputs such as LiDAR with images. In isolation, 2D images have been found to be extremely vulnerable to adversarial attacks. Yet, there have been limited studies on the adversarial robustness of multi-modal models that fuse LiDAR features with image features. Furthermore, existing works do not consider… ▽ More

    Submitted 7 January, 2022; v1 submitted 17 January, 2021; originally announced January 2021.

  4. arXiv:2004.03069  [pdf, other

    math.OC cs.LG

    Nonparametric Estimation of Uncertainty Sets for Robust Optimization

    Authors: Polina Alexeenko, Eilyan Bitar

    Abstract: We investigate a data-driven approach to constructing uncertainty sets for robust optimization problems, where the uncertain problem parameters are modeled as random variables whose joint probability distribution is not known. Relying only on independent samples drawn from this distribution, we provide a nonparametric method to estimate uncertainty sets whose probability mass is guaranteed to appr… ▽ More

    Submitted 20 September, 2020; v1 submitted 6 April, 2020; originally announced April 2020.

    Comments: 8 pages, 2 figures

  5. arXiv:1911.09501  [pdf, other

    stat.ML cs.LG

    Safe Linear Stochastic Bandits

    Authors: Kia Khezeli, Eilyan Bitar

    Abstract: We introduce the safe linear stochastic bandit framework---a generalization of linear stochastic bandits---where, in each stage, the learner is required to select an arm with an expected reward that is no less than a predetermined (safe) threshold with high probability. We assume that the learner initially has knowledge of an arm that is known to be safe, but not necessarily optimal. Leveraging on… ▽ More

    Submitted 21 November, 2019; originally announced November 2019.

  6. arXiv:1903.04574  [pdf, other

    cs.GT

    Transparency and Control in Platforms for Networked Markets

    Authors: John Pang, Weixuan Lin, Hu Fu, Jack Kleeman, Eilyan Bitar, Adam Wierman

    Abstract: In this paper, we analyze the worst case efficiency loss of online platform designs under a networked Cournot competition model. Inspired by some of the largest platforms in operation today, the platform designs that we consider examine the trade-off between transparency and control. Our results show that open access designs incentivize increased production towards perfectly competitive levels and… ▽ More

    Submitted 29 September, 2020; v1 submitted 11 March, 2019; originally announced March 2019.

    Comments: 55 pages, 1 figures

  7. arXiv:1709.09302  [pdf, other

    cs.GT math.OC

    A Structural Characterization of Market Power in Electric Power Networks

    Authors: Weixuan Lin, Eilyan Bitar

    Abstract: We consider a market in which capacity-constrained generators compete in scalar-parameterized supply functions to serve an inelastic demand spread throughout a transmission constrained power network. The market clears according to a locational marginal pricing mechanism, in which the independent system operator (ISO) determines the generators' production quantities to minimize the revealed cost of… ▽ More

    Submitted 27 January, 2019; v1 submitted 26 September, 2017; originally announced September 2017.

    Comments: 20 pages, 2 figures

  8. arXiv:1707.07342  [pdf, ps, other

    eess.SY cs.LG

    An Online Learning Approach to Buying and Selling Demand Response

    Authors: Kia Khezeli, Eilyan Bitar

    Abstract: We adopt the perspective of an aggregator, which seeks to coordinate its purchase of demand reductions from a fixed group of residential electricity customers, with its sale of the aggregate demand reduction in a two-settlement wholesale energy market. The aggregator procures reductions in demand by offering its customers a uniform price for reductions in consumption relative to their predetermine… ▽ More

    Submitted 27 December, 2017; v1 submitted 23 July, 2017; originally announced July 2017.

  9. arXiv:1611.07098  [pdf, ps, other

    cs.LG math.OC

    Risk-Sensitive Learning and Pricing for Demand Response

    Authors: Kia Khezeli, Eilyan Bitar

    Abstract: We consider the setting in which an electric power utility seeks to curtail its peak electricity demand by offering a fixed group of customers a uniform price for reductions in consumption relative to their predetermined baselines. The underlying demand curve, which describes the aggregate reduction in consumption in response to the offered price, is assumed to be affine and subject to unobservabl… ▽ More

    Submitted 18 June, 2018; v1 submitted 21 November, 2016; originally announced November 2016.

  10. arXiv:1409.3021  [pdf

    cs.IR cs.DB

    Semantic web service discovery approaches: overview and limitations

    Authors: Ibrahim El Bitar, Fatima-Zahra Belouadha, Ounsa Roudies

    Abstract: The semantic Web service discovery has been given massive attention within the last few years. With the increasing number of Web services available on the web, looking for a particular service has become very difficult, especially with the evolution of the clients needs. In this context, various approaches to discover semantic Web services have been proposed. In this paper, we compare these approa… ▽ More

    Submitted 10 September, 2014; originally announced September 2014.

    Comments: 16 pages, 1 figure, 2 tables, http://airccse.org/journal/ijcses/papers/5414ijcses02.pdf volume 5, Number 4, 2014

  11. arXiv:1407.1601  [pdf, other

    math.OC cs.GT

    Deadline Differentiated Pricing of Deferrable Electric Loads

    Authors: Eilyan Bitar, Yunjian Xu

    Abstract: A large fraction of the total electric load is comprised of end-use devices whose demand for energy is inherently deferrable in time. Of interest is the potential to leverage on such latent flexibility in demand to absorb variability in power supplied from intermittent renewable generation. The challenge, however, lies in designing incentives to reliably induce the desired response in demand. With… ▽ More

    Submitted 20 August, 2016; v1 submitted 7 July, 2014; originally announced July 2014.

    Comments: IEEE transactions on smart grid, 2016

  12. A Logic and Adaptive Approach for Efficient Diagnosis Systems using CBR

    Authors: Ibrahim El Bitar, Fatima-Zahra Belouadha, Ounsa Roudies

    Abstract: Case Based Reasoning (CBR) is an intelligent way of thinking based on experience and capitalization of already solved cases (source cases) to find a solution to a new problem (target case). Retrieval phase consists on identifying source cases that are similar to the target case. This phase may lead to erroneous results if the existing knowledge imperfections are not taken into account. This work p… ▽ More

    Submitted 17 November, 2012; originally announced November 2012.

    Comments: 5 pages,3 figures, 1 table

    Journal ref: http://www.ijcaonline.org/archives/volume39/number15/4893-7393 year: 2012

  13. arXiv:1204.5648  [pdf

    cs.DB

    Taxonomy and synthesis of Web services querying languages

    Authors: Ibrahim El Bitar, Fatima Zahra Belouadha, Ounsa Roudies

    Abstract: Most works on Web services has focused on discovery, composition and selection processes of these kinds of services. Other few works were interested in how to represent Web services search queries. However, these queries cannot be processed by ensuring a high level of performance without being adequately represented first. To this end, different query languages were designed. Even so, in the absen… ▽ More

    Submitted 25 April, 2012; originally announced April 2012.

    Comments: 7 pages, 7 figures