Skip to main content

Showing 1–2 of 2 results for author: Hojjati, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2112.11986  [pdf, other

    cs.CR cs.MA eess.SY

    Compromised ACC vehicles can degrade current mixed-autonomy traffic performance while remaining stealthy against detection

    Authors: George Gunter, Huichen Li, Avesta Hojjati, Matthew Nice, Matthew Bunting, Carl A. Gunter, Bo Li, Jonathan Sprinkle, Daniel Work

    Abstract: We demonstrate that a supply-chain level compromise of the adaptive cruise control (ACC) capability on equipped vehicles can be used to significantly degrade system level performance of current day mixed-autonomy freeway networks. Via a simple threat model which causes random deceleration attacks (RDAs), compromised vehicles create congestion waves in the traffic that decrease average speed and ne… ▽ More

    Submitted 22 December, 2021; originally announced December 2021.

  2. GB-PANDAS: Throughput and heavy-traffic optimality analysis for affinity scheduling

    Authors: Ali Yekkehkhany, Avesta Hojjati, Mohammad H Hajiesmaili

    Abstract: Dynamic affinity scheduling has been an open problem for nearly three decades. The problem is to dynamically schedule multi-type tasks to multi-skilled servers such that the resulting queueing system is both stable in the capacity region (throughput optimality) and the mean delay of tasks is minimized at high loads near the boundary of the capacity region (heavy-traffic optimality). As for applica… ▽ More

    Submitted 23 September, 2017; originally announced September 2017.

    Comments: IFIP WG 7.3 Performance 2017 - The 35th International Symposium on Computer Performance, Modeling, Measurements and Evaluation 2017