Skip to main content

Showing 1–4 of 4 results for author: Karakostas, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2301.12088  [pdf, ps, other

    cs.NI

    Wireless and Service Allocation for Mobile Computation Offloading with Task Deadlines

    Authors: Hong Chen, Terence D. Todd, Dongmei Zhao, George Karakostas

    Abstract: In mobile computation offloading (MCO), mobile devices (MDs) can choose to either execute tasks locally or to have them executed on a remote edge server (ES). This paper addresses the problem of assigning both the wireless communication bandwidth needed, along with the ES capacity that is used for the task execution, so that task completion time constraints are satisfied. The objective is to obtai… ▽ More

    Submitted 27 January, 2023; originally announced January 2023.

    Comments: Submitted to IEEE Transactions on Mobile Computing (Second Round)

  2. Search-and-Fetch with 2 Robots on a Disk: Wireless and Face-to-Face Communication Models

    Authors: Konstantinos Georgiou, George Karakostas, Evangelos Kranakis

    Abstract: We initiate the study of a new problem on searching and fetching in a distributed environment concerning treasure-evacuation from a unit disk. A treasure and an exit are located at unknown positions on the perimeter of a disk and at known arc distance. A team of two robots start from the center of the disk, and their goal is to fetch the treasure to the exit. At any time the robots can move anywhe… ▽ More

    Submitted 29 May, 2019; v1 submitted 30 November, 2016; originally announced November 2016.

    Comments: 26 Pages, 6 Figures. This is the full version of the paper with the same title which will appear in the proceedings of the 6th International Conference on Operations Research and Enterprise Systems (ICORES), February 23-25, 2017, Porto, Portugal

    Journal ref: Discrete Mathematics & Theoretical Computer Science, Vol. 21 no. 3 , Distributed Computing and Networking (June 13, 2019) dmtcs:4884

  3. arXiv:1605.03932  [pdf, other

    cs.CR cs.SE

    Secure and trusted white-box verification

    Authors: Yixian Cai, George Karakostas, Alan Wassyng

    Abstract: Verification is the process of checking whether a product has been implemented according to its prescribed specifications. We study the case of a designer (the developer) that needs to verify its design by a third party (the verifier), by making publicly available a limited amount of information about the design, namely a diagram of interconnections between the different design components, but not… ▽ More

    Submitted 12 May, 2016; originally announced May 2016.

  4. arXiv:1604.03009  [pdf, other

    cs.DS

    Know When to Persist: Deriving Value from a Stream Buffer

    Authors: Konstantinos Georgiou, George Karakostas, Evangelos Kranakis, Danny Krizanc

    Abstract: We consider \textsc{Persistence}, a new online problem concerning optimizing weighted observations in a stream of data when the observer has limited buffer capacity. A stream of weighted items arrive one at a time at the entrance of a buffer with two holding locations. A processor (or observer) can process (observe) an item at the buffer location it chooses, deriving this way the weight of the obs… ▽ More

    Submitted 11 April, 2016; originally announced April 2016.

    Comments: 17 pages, 1 figure