Skip to main content

Showing 1–5 of 5 results for author: Esmaili, K S

Searching in archive cs. Search in all archives.
.
  1. arXiv:1709.00348  [pdf, other

    cs.NI cs.AI

    Inferring Networked Device Categories from Low-Level Activity Indicators

    Authors: Kyumars Sheykh Esmaili, Jaideep Chandrashekar, Pascal Le Guyadec

    Abstract: We study the problem of inferring the type of a networked device in a home network by leveraging low level traffic activity indicators seen at commodity home gateways. We analyze a dataset of detailed device network activity obtained from 240 subscriber homes of a large European ISP and extract a number of traffic and spatial fingerprints for individual devices. We develop a two level taxonomy to… ▽ More

    Submitted 1 September, 2017; originally announced September 2017.

    Comments: 14 pages, 9 figures, 7 tables

  2. arXiv:1709.00333  [pdf, other

    cs.DC cs.PF

    Kafka versus RabbitMQ

    Authors: Philippe Dobbelaere, Kyumars Sheykh Esmaili

    Abstract: Publish/subscribe is a distributed interaction paradigm well adapted to the deployment of scalable and loosely coupled systems. Apache Kafka and RabbitMQ are two popular open-source and commercially-supported pub/sub systems that have been around for almost a decade and have seen wide adoption. Given the popularity of these two systems and the fact that both are branded as pub/sub systems, two f… ▽ More

    Submitted 1 September, 2017; originally announced September 2017.

    Comments: 25 single-column pages, 7 figures, 5 tables

  3. arXiv:1312.5155  [pdf, other

    cs.IT cs.PF

    On the Effectiveness of Polynomial Realization of Reed-Solomon Codes for Storage Systems

    Authors: Kyumars Sheykh Esmaili, Anwitaman Datta

    Abstract: There are different ways to realize Reed Solomon (RS) codes. While in the storage community, using the generator matrices to implement RS codes is more popular, in the coding theory community the generator polynomials are typically used to realize RS codes. Prominent exceptions include HDFS-RAID, which uses generator polynomial based erasure codes, and extends the Apache Hadoop's file system. In… ▽ More

    Submitted 16 December, 2013; originally announced December 2013.

    Comments: 8 pages, 4 figures

  4. arXiv:1302.5192  [pdf, other

    cs.DC

    The CORE Storage Primitive: Cross-Object Redundancy for Efficient Data Repair & Access in Erasure Coded Storage

    Authors: Kyumars Sheykh Esmaili, Lluis Pamies-Juarez, Anwitaman Datta

    Abstract: Erasure codes are an integral part of many distributed storage systems aimed at Big Data, since they provide high fault-tolerance for low overheads. However, traditional erasure codes are inefficient on reading stored data in degraded environments (when nodes might be unavailable), and on replenishing lost data (vital for long term resilience). Consequently, novel codes optimized to cope with dist… ▽ More

    Submitted 26 June, 2013; v1 submitted 21 February, 2013; originally announced February 2013.

  5. arXiv:1212.0074  [pdf, other

    cs.IR cs.CL

    Challenges in Kurdish Text Processing

    Authors: Kyumars Sheykh Esmaili

    Abstract: Despite having a large number of speakers, the Kurdish language is among the less-resourced languages. In this work we highlight the challenges and problems in providing the required tools and techniques for processing texts written in Kurdish. From a high-level perspective, the main challenges are: the inherent diversity of the language, standardization and segmentation issues, and the lack of la… ▽ More

    Submitted 1 December, 2012; originally announced December 2012.

    Comments: 5 pages, 1 figure