Skip to main content

Showing 1–9 of 9 results for author: La, R J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2210.02614  [pdf, other

    cs.LG cs.DC math.OC

    Federated Learning with Server Learning: Enhancing Performance for Non-IID Data

    Authors: Van Sy Mai, Richard J. La, Tao Zhang

    Abstract: Federated Learning (FL) has emerged as a means of distributed learning using local data stored at clients with a coordinating server. Recent studies showed that FL can suffer from poor performance and slower convergence when training data at clients are not independent and identically distributed. Here we consider a new complementary approach to mitigating this performance degradation by allowing… ▽ More

    Submitted 15 August, 2023; v1 submitted 5 October, 2022; originally announced October 2022.

    Comments: 22 pages, 11 figures, 3 tables

  2. arXiv:2003.12134  [pdf, other

    cs.DS math.OC

    Miniature Robot Path Planning for Bridge Inspection: Min-Max Cycle Cover-Based Approach

    Authors: Michael Lin, Richard J. La

    Abstract: We study the problem of planning the deployments of a group of mobile robots. While the problem and formulation can be used for many different problems, here we use a bridge inspection as the motivating application for the purpose of exposition. The robots are initially stationed at a set of depots placed throughout the bridge. Each robot is then assigned a set of sites on the bridge to inspect an… ▽ More

    Submitted 6 March, 2020; originally announced March 2020.

  3. arXiv:1905.04362  [pdf, ps, other

    math.OC cs.IT eess.SP stat.AP

    Channels, Remote Estimation and Queueing Systems With A Utilization-Dependent Component: A Unifying Survey Of Recent Results

    Authors: Varun Jog, Richard J. La, Michael Lin, Nuno C. Martins

    Abstract: In this article, we survey the main models, techniques, concepts, and results centered on the design and performance evaluation of engineered systems that rely on a utilization-dependent component (UDC) whose operation may depend on its usage history or assigned workload. Specifically, we report on research themes concentrating on the characterization of the capacity of channels and the design wit… ▽ More

    Submitted 11 January, 2021; v1 submitted 10 May, 2019; originally announced May 2019.

  4. arXiv:1704.00571  [pdf, other

    cs.SI physics.soc-ph

    Effects of Degree Correlations in Interdependent Security: Good or Bad?

    Authors: Richard J. La

    Abstract: We study the influence of degree correlations or network mixing in interdependent security. We model the interdependence in security among agents using a dependence graph and employ a population game model to capture the interaction among many agents when they are strategic and have various security measures they can choose to defend themselves. The overall network security is measured by what we… ▽ More

    Submitted 3 April, 2017; originally announced April 2017.

    Comments: 14 pages, 3 figures

  5. arXiv:1703.01380  [pdf, other

    cs.SI cs.GT

    Internalization of Externalities in Interdependent Security: Large Network Cases

    Authors: Richard J. La

    Abstract: With increasing connectivity among comprising agents or (sub-)systems in large, complex systems, there is a growing interest in understanding interdependent security and dealing with inefficiency in security investments. Making use of a population game model and the well-known Chung-Lu random graph model, we study how one could encourage selfish agents to invest more in security by internalizing t… ▽ More

    Submitted 3 March, 2017; originally announced March 2017.

    Comments: 2 figures

  6. arXiv:1702.00298  [pdf, other

    stat.AP cs.SI physics.soc-ph

    Cascading Failures in Interdependent Systems: Impact of Degree Variability and Dependence

    Authors: Richard J. La

    Abstract: We study cascading failures in a system comprising interdependent networks/systems, in which nodes rely on other nodes both in the same system and in other systems to perform their function. The (inter-)dependence among nodes is modeled using a dependence graph, where the degree vector of a node determines the number of other nodes it can potentially cause to fail in each system through aforementi… ▽ More

    Submitted 10 February, 2018; v1 submitted 1 February, 2017; originally announced February 2017.

    Comments: 1 figure

  7. arXiv:1502.07414  [pdf, other

    cs.SI cs.GT physics.soc-ph

    Interdependent Security with Strategic Agents and Cascades of Infection

    Authors: Richard J. La

    Abstract: We investigate cascades in networks consisting of strategic agents with interdependent security. We assume that the strategic agents have choices between i) investing in protecting themselves, ii) purchasing insurance to transfer (some) risks, and iii) taking no actions. Using a population game model, we study how various system parameters, such as node degrees, infection propagation rate, and the… ▽ More

    Submitted 25 February, 2015; originally announced February 2015.

    Comments: 16 pages, 6 figures

  8. arXiv:1208.3029  [pdf, ps, other

    cs.IT

    Fast Adaptive S-ALOHA Scheme for Event-driven M2M Communications (Journal version)

    Authors: Huasen Wu, Chenxi Zhu, Richard J. La, Xin Liu, Youguang Zhang

    Abstract: Supporting massive device transmission is challenging in Machine-to-Machine (M2M) communications. Particularly, in event-driven M2M communications, a large number of devices activate within a short period of time, which in turn causes high radio congestions and severe access delay. To address this issue, we propose a Fast Adaptive S-ALOHA (FASA) scheme for random access control of M2M communicatio… ▽ More

    Submitted 15 August, 2012; originally announced August 2012.

    Comments: 15 pages, 6 figures, submitted to IEEE/ACM Trans. on Networking

  9. Fast Adaptive S-ALOHA Scheme for Event-driven Machine-to-Machine Communications

    Authors: Huasen Wu, Chenxi Zhu, Richard J. La, Xin Liu, Youguang Zhang

    Abstract: Machine-to-Machine (M2M) communication is now playing a market-changing role in a wide range of business world. However, in event-driven M2M communications, a large number of devices activate within a short period of time, which in turn causes high radio congestions and severe access delay. To address this issue, we propose a Fast Adaptive S-ALOHA (FASA) scheme for M2M communication systems with b… ▽ More

    Submitted 29 April, 2012; v1 submitted 14 February, 2012; originally announced February 2012.

    Comments: 5 pages, 3 figures, accepted to IEEE VTC2012-Fall