Skip to main content

Showing 1–36 of 36 results for author: Rahman, M R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.09626  [pdf, ps, other

    cs.CV

    ECAM: A Contrastive Learning Approach to Avoid Environmental Collision in Trajectory Forecasting

    Authors: Giacomo Rosin, Muhammad Rameez Ur Rahman, Sebastiano Vascon

    Abstract: Human trajectory forecasting is crucial in applications such as autonomous driving, robotics and surveillance. Accurate forecasting requires models to consider various factors, including social interactions, multi-modal predictions, pedestrian intention and environmental context. While existing methods account for these factors, they often overlook the impact of the environment, which leads to col… ▽ More

    Submitted 11 June, 2025; originally announced June 2025.

    Comments: IJCNN 2025

  2. arXiv:2504.14386  [pdf, other

    cs.CV cs.AI

    LOOPE: Learnable Optimal Patch Order in Positional Embeddings for Vision Transformers

    Authors: Md Abtahi Majeed Chowdhury, Md Rifat Ur Rahman, Akil Ahmad Taki

    Abstract: Positional embeddings (PE) play a crucial role in Vision Transformers (ViTs) by providing spatial information otherwise lost due to the permutation invariant nature of self attention. While absolute positional embeddings (APE) have shown theoretical advantages over relative positional embeddings (RPE), particularly due to the ability of sinusoidal functions to preserve spatial inductive biases lik… ▽ More

    Submitted 19 April, 2025; originally announced April 2025.

  3. arXiv:2412.13988  [pdf

    cs.LG

    RAG for Effective Supply Chain Security Questionnaire Automation

    Authors: Zaynab Batool Reza, Abdul Rafay Syed, Omer Iqbal, Ethel Mensah, Qian Liu, Maxx Richard Rahman, Wolfgang Maass

    Abstract: In an era where digital security is crucial, efficient processing of security-related inquiries through supply chain security questionnaires is imperative. This paper introduces a novel approach using Natural Language Processing (NLP) and Retrieval-Augmented Generation (RAG) to automate these responses. We developed QuestSecure, a system that interprets diverse document formats and generates preci… ▽ More

    Submitted 18 December, 2024; originally announced December 2024.

  4. arXiv:2410.12830  [pdf, other

    q-bio.QM cs.AI cs.LG

    Incorporating Metabolic Information into LLMs for Anomaly Detection in Clinical Time-Series

    Authors: Maxx Richard Rahman, Ruoxuan Liu, Wolfgang Maass

    Abstract: Anomaly detection in clinical time-series holds significant potential in identifying suspicious patterns in different biological parameters. In this paper, we propose a targeted method that incorporates the clinical domain knowledge into LLMs to improve their ability to detect anomalies. We introduce the Metabolism Pathway-driven Prompting (MPP) method, which integrates the information about metab… ▽ More

    Submitted 24 November, 2024; v1 submitted 2 October, 2024; originally announced October 2024.

    Journal ref: NeurIPS 2024 Workshop on Time Series in the Age of Large Models

  5. arXiv:2410.00225  [pdf, other

    cs.LG stat.AP

    Probabilistic Classification of Near-Surface Shallow-Water Sediments using A Portable Free-Fall Penetrometer

    Authors: Md Rejwanur Rahman, Adrian Rodriguez-Marek, Nina Stark, Grace Massey, Carl Friedrichs, Kelly M. Dorgan

    Abstract: The geotechnical evaluation of seabed sediments is important for engineering projects and naval applications, offering valuable insights into sediment properties, behavior, and strength. Obtaining high-quality seabed samples can be a challenging task, making in-situ testing an essential part of site characterization. Free Fall Penetrometers (FFP) have emerged as robust tools for rapidly profiling… ▽ More

    Submitted 30 September, 2024; originally announced October 2024.

  6. arXiv:2409.00801  [pdf, other

    cs.DC

    Container Data Item: An Abstract Datatype for Efficient Container-based Edge Computing

    Authors: Md Rezwanur Rahman, Tarun Annapareddy, Shirin Ebadi, Varsha Natarajan, Adarsh Srinivasan, Eric Keller, Shivakant Mishra

    Abstract: We present Container Data Item (CDI), an abstract datatype that allows multiple containers to efficiently operate on a common data item while preserving their strong security and isolation semantics. Application developers can use CDIs to enable multiple containers to operate on the same data, synchronize execution among themselves, and control the ownership of the shared data item during runtime.… ▽ More

    Submitted 1 September, 2024; originally announced September 2024.

  7. arXiv:2408.17324  [pdf, other

    cs.LG cs.AI cs.CL

    Modularity in Transformers: Investigating Neuron Separability & Specialization

    Authors: Nicholas Pochinkov, Thomas Jones, Mohammed Rashidur Rahman

    Abstract: Transformer models are increasingly prevalent in various applications, yet our understanding of their internal workings remains limited. This paper investigates the modularity and task specialization of neurons within transformer architectures, focusing on both vision (ViT) and language (Mistral 7B) models. Using a combination of selective pruning and MoEfication clustering techniques, we analyze… ▽ More

    Submitted 30 August, 2024; originally announced August 2024.

    Comments: 11 pages, 6 figures

    MSC Class: 68T07 (Primary) 68Q32; 68T05 (Secondary) ACM Class: I.2.4; I.2.6; I.2.7

  8. arXiv:2408.13936  [pdf, other

    cs.CV

    OpenNav: Efficient Open Vocabulary 3D Object Detection for Smart Wheelchair Navigation

    Authors: Muhammad Rameez ur Rahman, Piero Simonetto, Anna Polato, Francesco Pasti, Luca Tonin, Sebastiano Vascon

    Abstract: Open vocabulary 3D object detection (OV3D) allows precise and extensible object recognition crucial for adapting to diverse environments encountered in assistive robotics. This paper presents OpenNav, a zero-shot 3D object detection pipeline based on RGB-D images for smart wheelchairs. Our pipeline integrates an open-vocabulary 2D object detector with a mask generator for semantic segmentation, fo… ▽ More

    Submitted 25 August, 2024; originally announced August 2024.

    Comments: ECCVW

  9. arXiv:2408.09424  [pdf, other

    cs.CV

    OVOSE: Open-Vocabulary Semantic Segmentation in Event-Based Cameras

    Authors: Muhammad Rameez Ur Rahman, Jhony H. Giraldo, Indro Spinelli, Stéphane Lathuilière, Fabio Galasso

    Abstract: Event cameras, known for low-latency operation and superior performance in challenging lighting conditions, are suitable for sensitive computer vision tasks such as semantic segmentation in autonomous driving. However, challenges arise due to limited event-based data and the absence of large-scale segmentation benchmarks. Current works are confined to closed-set semantic segmentation, limiting the… ▽ More

    Submitted 18 August, 2024; originally announced August 2024.

    Comments: conference

  10. arXiv:2403.18597  [pdf, other

    cond-mat.mtrl-sci cs.LG

    Heterogeneous Peridynamic Neural Operators: Discover Biotissue Constitutive Law and Microstructure From Digital Image Correlation Measurements

    Authors: Siavash Jafarzadeh, Stewart Silling, Lu Zhang, Colton Ross, Chung-Hao Lee, S. M. Rakibur Rahman, Shuodao Wang, Yue Yu

    Abstract: Human tissues are highly organized structures with collagen fiber arrangements varying from point to point. Anisotropy of the tissue arises from the natural orientation of the fibers, resulting in location-dependent anisotropy. Heterogeneity also plays an important role in tissue function. It is therefore critical to discover and understand the distribution of fiber orientations from experimental… ▽ More

    Submitted 19 July, 2024; v1 submitted 27 March, 2024; originally announced March 2024.

  11. arXiv:2403.14038  [pdf, other

    cs.SI cs.HC

    PureConnect: A Localized Social Media System to Increase Awareness and Connectedness in Environmental Justice Communities

    Authors: Omar Hammad, Md Rezwanur Rahman, Gopala Krishna Vasanth Kanugo, Nicholas Clements, Shelly Miller, Shivakant Mishra, Esther Sullivan

    Abstract: Frequent disruptions like highway constructions are common now-a-days, often impacting environmental justice communities (communities with low socio-economic status with disproportionately high and adverse human health and environmental effects) that live nearby. Based on our interactions via focus groups with the members of four environmental justice communities impacted by a major highway constr… ▽ More

    Submitted 20 March, 2024; originally announced March 2024.

    Comments: Submitted in COMPSAC 2024

  12. arXiv:2402.11180  [pdf, other

    cs.SI cs.HC

    PureNav: A Personalized Navigation Service for Environmental Justice Communities Impacted by Planned Disruptions

    Authors: Omar Hammad, Md Rezwanur Rahman, Nicholas Clements, Shivakant Mishra, Shelly Miller, Esther Sullivan

    Abstract: Planned disruptions such as highway constructions are commonplace nowadays and the communities living near these disruptions generally tend to be environmental justice communities -- low socioeconomic status with disproportionately high and adverse human health and environmental effects. A major concern is that such activities negatively impact people's well-being by disrupting their daily commute… ▽ More

    Submitted 16 February, 2024; originally announced February 2024.

    Comments: Accepted for publication in the proceedings of the 2023 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)

  13. arXiv:2401.06676  [pdf

    cs.IR cs.AI

    LLMRS: Unlocking Potentials of LLM-Based Recommender Systems for Software Purchase

    Authors: Angela John, Theophilus Aidoo, Hamayoon Behmanush, Irem B. Gunduz, Hewan Shrestha, Maxx Richard Rahman, Wolfgang Maaß

    Abstract: Recommendation systems are ubiquitous, from Spotify playlist suggestions to Amazon product suggestions. Nevertheless, depending on the methodology or the dataset, these systems typically fail to capture user preferences and generate general recommendations. Recent advancements in Large Language Models (LLM) offer promising results for analyzing user queries. However, employing these models to capt… ▽ More

    Submitted 12 January, 2024; originally announced January 2024.

  14. arXiv:2401.01883  [pdf, other

    cs.CR cs.IR cs.LG cs.SE

    Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports

    Authors: Md Rayhanur Rahman, Brandon Wroblewski, Quinn Matthews, Brantley Morgan, Tim Menzies, Laurie Williams

    Abstract: Defending from cyberattacks requires practitioners to operate on high-level adversary behavior. Cyberthreat intelligence (CTI) reports on past cyberattack incidents describe the chain of malicious actions with respect to time. To avoid repeating cyberattack incidents, practitioners must proactively identify and defend against recurring chain of actions - which we refer to as temporal attack patter… ▽ More

    Submitted 3 January, 2024; originally announced January 2024.

    Comments: A modified version of this pre-print is submitted to IEEE Transactions on Software Engineering, and is under review

  15. arXiv:2401.01865  [pdf, other

    cs.CR

    Attackers reveal their arsenal: An investigation of adversarial techniques in CTI reports

    Authors: Md Rayhanur Rahman, Setu Kumar Basak, Rezvan Mahdavi Hezaveh, Laurie Williams

    Abstract: Context: Cybersecurity vendors often publish cyber threat intelligence (CTI) reports, referring to the written artifacts on technical and forensic analysis of the techniques used by the malware in APT attacks. Objective: The goal of this research is to inform cybersecurity practitioners about how adversaries form cyberattacks through an analysis of adversarial techniques documented in cyberthreat… ▽ More

    Submitted 3 January, 2024; originally announced January 2024.

    Comments: This version is submitted to ACM Transactions on Privacy and Security. This version is under review

  16. arXiv:2304.05758  [pdf, other

    cs.CV

    Best Practices for 2-Body Pose Forecasting

    Authors: Muhammad Rameez Ur Rahman, Luca Scofano, Edoardo De Matteis, Alessandro Flaborea, Alessio Sampieri, Fabio Galasso

    Abstract: The task of collaborative human pose forecasting stands for predicting the future poses of multiple interacting people, given those in previous frames. Predicting two people in interaction, instead of each separately, promises better performance, due to their body-body motion correlations. But the task has remained so far primarily unexplored. In this paper, we review the progress in human pose… ▽ More

    Submitted 12 April, 2023; originally announced April 2023.

    Comments: The 5th IEEE/CVF CVPR Precognition Workshop '23

  17. arXiv:2302.08563  [pdf

    cs.CR cs.NI

    PACMAN Attack: A Mobility-Powered Attack in Private 5G-Enabled Industrial Automation System

    Authors: Md Rashedur Rahman, Moinul Hossain, Jiang Xie

    Abstract: 3GPP has introduced Private 5G to support the next-generation industrial automation system (IAS) due to the versatility and flexibility of 5G architecture. Besides the 3.5GHz CBRS band, unlicensed spectrum bands, like 5GHz, are considered as an additional medium because of their free and abundant nature. However, while utilizing the unlicensed band, industrial equipment must coexist with incumbent… ▽ More

    Submitted 16 February, 2023; originally announced February 2023.

    Comments: 6 pages, 7 Figures, Accepted in IEEE International Conference on Communications 2023

  18. arXiv:2211.06500  [pdf, other

    cs.CR

    An investigation of security controls and MITRE ATT\&CK techniques

    Authors: Md Rayhanur Rahman, Laurie Williams

    Abstract: Attackers utilize a plethora of adversarial techniques in cyberattacks to compromise the confidentiality, integrity, and availability of the target organizations and systems. Information security standards such as NIST, ISO/IEC specify hundreds of security controls that organizations can enforce to protect and defend the information systems from adversarial techniques. However, implementing all th… ▽ More

    Submitted 11 November, 2022; originally announced November 2022.

  19. arXiv:2211.06495  [pdf, other

    cs.CR

    Investigating co-occurrences of MITRE ATT\&CK Techniques

    Authors: Md Rayhanur Rahman, Laurie Williams

    Abstract: Cyberattacks use adversarial techniques to bypass system defenses, persist, and eventually breach systems. The MITRE ATT\&CK framework catalogs a set of adversarial techniques and maps between adversaries and their used techniques and tactics. Understanding how adversaries deploy techniques in conjunction is pivotal for learning adversary behavior, hunting potential threats, and formulating a proa… ▽ More

    Submitted 11 November, 2022; originally announced November 2022.

  20. arXiv:2210.02601  [pdf, other

    cs.CR cs.LG

    From Threat Reports to Continuous Threat Intelligence: A Comparison of Attack Technique Extraction Methods from Textual Artifacts

    Authors: Md Rayhanur Rahman, Laurie Williams

    Abstract: The cyberthreat landscape is continuously evolving. Hence, continuous monitoring and sharing of threat intelligence have become a priority for organizations. Threat reports, published by cybersecurity vendors, contain detailed descriptions of attack Tactics, Techniques, and Procedures (TTP) written in an unstructured text format. Extracting TTP from these reports aids cybersecurity practitioners a… ▽ More

    Submitted 5 October, 2022; originally announced October 2022.

  21. arXiv:2203.00001  [pdf, other

    cs.LG

    AI-based approach for improving the detection of blood doping in sports

    Authors: Maxx Richard Rahman, Jacob Bejder, Thomas Christian Bonne, Andreas Breenfeldt Andersen, Jesús Rodríguez Huertas, Reid Aikin, Nikolai Baastrup Nordsborg, Wolfgang Maaß

    Abstract: Sports officials around the world are facing incredible challenges due to the unfair means of practices performed by the athletes to improve their performance in the game. It includes the intake of hormonal based drugs or transfusion of blood to increase their strength and the result of their training. However, the current direct test of detection of these cases includes the laboratory-based metho… ▽ More

    Submitted 9 February, 2022; originally announced March 2022.

  22. arXiv:2202.06995  [pdf

    cs.CY cs.HC

    Intent-Aware Permission Architecture: A Model for Rethinking Informed Consent for Android Apps

    Authors: Md Rashedur Rahman, Elizabeth Miller, Moinul Hossain, Aisha Ali-Gombe

    Abstract: As data privacy continues to be a crucial human-right concern as recognized by the UN, regulatory agencies have demanded developers obtain user permission before accessing user-sensitive data. Mainly through the use of privacy policies statements, developers fulfill their legal requirements to keep users abreast of the requests for their data. In addition, platforms such as Android enforces explic… ▽ More

    Submitted 14 February, 2022; originally announced February 2022.

    Comments: 11 pages, 5 Figures,The International Conference on Information Systems Security and Privacy-ICISSP 2022

  23. arXiv:2109.06808  [pdf, other

    cs.CR cs.CL cs.LG

    What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey

    Authors: Md Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie Williams

    Abstract: Cybersecurity researchers have contributed to the automated extraction of CTI from textual sources, such as threat reports and online articles, where cyberattack strategies, procedures, and tools are described. The goal of this article is to aid cybersecurity researchers understand the current techniques used for cyberthreat intelligence extraction from text through a survey of relevant studies in… ▽ More

    Submitted 14 September, 2021; originally announced September 2021.

    Journal ref: ACM Comput. Surv. 55, 12, Article 241 (December 2023), 36 pages

  24. arXiv:2108.08471  [pdf

    cs.CR

    Decentralized Policy Information Points for Multi-Domain Environments

    Authors: M Ridwanur Rahman, Ahmad Salehi Shahraki, Carsten Rudolph

    Abstract: Access control models have been developed to control authorized access to sensitive resources. This control of access is important as there is now a need for collaborative resource sharing between multiple organizations over open environments like the internet. Although there are multiple access control models that are being widely used, these models are providing access control within a closed en… ▽ More

    Submitted 18 August, 2021; originally announced August 2021.

  25. arXiv:2102.06679  [pdf, other

    cs.CV cs.LG

    Adversarial Branch Architecture Search for Unsupervised Domain Adaptation

    Authors: Luca Robbiano, Muhammad Rameez Ur Rahman, Fabio Galasso, Barbara Caputo, Fabio Maria Carlucci

    Abstract: Unsupervised Domain Adaptation (UDA) is a key issue in visual recognition, as it allows to bridge different visual domains enabling robust performances in the real world. To date, all proposed approaches rely on human expertise to manually adapt a given UDA method (e.g. DANN) to a specific backbone architecture (e.g. ResNet). This dependency on handcrafted designs limits the applicability of a giv… ▽ More

    Submitted 22 October, 2021; v1 submitted 12 February, 2021; originally announced February 2021.

    Comments: Accepted at WACV 2022

  26. arXiv:2012.07183  [pdf, other

    cs.LG cs.DC

    Privacy-preserving Decentralized Aggregation for Federated Learning

    Authors: Beomyeol Jeon, S. M. Ferdous, Muntasir Raihan Rahman, Anwar Walid

    Abstract: Federated learning is a promising framework for learning over decentralized data spanning multiple regions. This approach avoids expensive central training data aggregation cost and can improve privacy because distributed sites do not have to reveal privacy-sensitive data. In this paper, we develop a privacy-preserving decentralized aggregation protocol for federated learning. We formulate the dis… ▽ More

    Submitted 28 December, 2020; v1 submitted 13 December, 2020; originally announced December 2020.

    Comments: 10 pages, 6 figures

  27. arXiv:2011.05805  [pdf

    cs.CY cs.AI cs.LO

    Crime Prediction Using Multiple-ANFIS Architecture and Spatiotemporal Data

    Authors: Mashnoon Islam, Redwanul Karim, Kalyan Roy, Saif Mahmood, Sadat Hossain, M. Rashedur Rahman

    Abstract: Statistical values alone cannot bring the whole scenario of crime occurrences in the city of Dhaka. We need a better way to use these statistical values to predict crime occurrences and make the city a safer place to live. Proper decision-making for the future is key in reducing the rate of criminal offenses in an area or a city. If the law enforcement bodies can allocate their resources efficient… ▽ More

    Submitted 7 November, 2020; originally announced November 2020.

    Comments: Accepted Version, 2018 IEEE International Conference on Intelligent Systems (IS) September 25-27, Funchal - Madeira, Portugal

    MSC Class: 03B52; 68T07 ACM Class: I.2.3; I.2.6

  28. arXiv:2006.02434  [pdf, other

    cs.CV cs.MM

    Visual Summarization of Lecture Video Segments for Enhanced Navigation

    Authors: Mohammad Rajiur Rahman, Jaspal Subhlok, Shishir Shah

    Abstract: Lecture videos are an increasingly important learning resource for higher education. However, the challenge of quickly finding the content of interest in a lecture video is an important limitation of this format. This paper introduces visual summarization of lecture video segments to enhance navigation. A lecture video is divided into segments based on the frame-to-frame similarity of content. The… ▽ More

    Submitted 3 June, 2020; originally announced June 2020.

  29. arXiv:1908.03242  [pdf, other

    cs.NI

    Deep Reinforcement Learning for Network Slicing with Heterogeneous Resource Requirements and Time Varying Traffic Dynamics

    Authors: Jaehoon Koo, Veena B. Mendiratta, Muntasir Raihan Rahman, Anwar Walid

    Abstract: Efficient network slicing is vital to deal with the highly variable and dynamic characteristics of network traffic generated by a varied range of applications. The problem is made more challenging with the advent of new technologies such as 5G and new architectures such as SDN and NFV. Network slicing addresses a challenging dynamic network resource allocation problem where a single network infras… ▽ More

    Submitted 8 August, 2019; originally announced August 2019.

    Comments: A shorter version will appear in the 15th International Conference on Network and Service Management (CNSM 2019)

  30. arXiv:1907.07159  [pdf, other

    cs.CR cs.SE

    Security Smells in Ansible and Chef Scripts: A Replication Study

    Authors: Akond Rahman, Md. Rayhanur Rahman, Chris Parnin, Laurie Williams

    Abstract: Context: Security smells are recurring coding patterns that are indicative of security weakness, and require further inspection. As infrastructure as code (IaC) scripts, such as Ansible and Chef scripts, are used to provision cloud-based servers and systems at scale, security smells in IaC scripts could be used to enable malicious users to exploit vulnerabilities in the provisioned systems. Goal:… ▽ More

    Submitted 20 June, 2020; v1 submitted 16 July, 2019; originally announced July 2019.

    Comments: 31 pages: This paper has been accepted at the journal of ACM Transaction on Software Engineering and Methodology (TOSEM)

  31. MobiCoMonkey - Context Testing of Android Apps

    Authors: Amit Seal Ami, Md. Mehedi Hasan, Md. Rayhanur Rahman, Kazi Sakib

    Abstract: The functionality of many mobile applications is dependent on various contextual, external factors. Depending on unforeseen scenarios, mobile apps can even malfunction or crash. In this paper, we have introduced MobiCoMonkey - automated tool that allows a developer to test app against custom or auto generated contextual scenarios and help detect possible bugs through the emulator. Moreover, it rep… ▽ More

    Submitted 7 April, 2018; originally announced April 2018.

    Comments: 4 pages

    MSC Class: 68N01

  32. arXiv:1712.10056  [pdf, other

    cs.DC cs.LO

    Inferring Formal Properties of Production Key-Value Stores

    Authors: Edgar Pek, Pranav Garg, Muntasir Raihan Rahman, Karl Palmskog, Indranil Gupta, P. Madhusudan

    Abstract: Production distributed systems are challenging to formally verify, in particular when they are based on distributed protocols that are not rigorously described or fully understood. In this paper, we derive models and properties for two core distributed protocols used in eventually consistent production key-value stores such as Riak and Cassandra. We propose a novel modeling called certified progra… ▽ More

    Submitted 28 December, 2017; originally announced December 2017.

    Comments: 15 pages, 2 figures

  33. arXiv:1509.02464  [pdf, other

    cs.DC

    Characterizing and Adapting the Consistency-Latency Tradeoff in Distributed Key-value Stores

    Authors: Muntasir Raihan Rahman, Lewis Tseng, Son Nguyen, Indranil Gupta, Nitin Vaidya

    Abstract: The CAP theorem is a fundamental result that applies to distributed storage systems. In this paper, we first present and prove two CAP-like impossibility theorems. To state these theorems, we present probabilistic models to characterize the three important elements of the CAP theorem: consistency (C), availability or latency (A), and partition tolerance (P). The theorems show the un-achievable env… ▽ More

    Submitted 23 January, 2016; v1 submitted 8 September, 2015; originally announced September 2015.

  34. arXiv:1412.4957  [pdf, other

    cs.NI cond-mat.dis-nn cs.IT

    Network connectivity in non-convex domains with reflections

    Authors: Orestis Georgiou, Mohammud Z. Bocus, Mohammed R. Rahman, Carl P. Dettmann, Justin P. Coon

    Abstract: Recent research has demonstrated the importance of boundary effects on the overall connection probability of wireless networks but has largely focused on convex deployment regions. We consider here a scenario of practical importance to wireless communications, in which one or more nodes are located outside the convex space where the remaining nodes reside. We call these `external nodes', and assum… ▽ More

    Submitted 16 December, 2014; originally announced December 2014.

    Comments: 4 pages, 4 figures, letter

    Journal ref: IEEE Commun. Lett. 19, 427-430 (2015)

  35. arXiv:1211.6255  [pdf, ps, other

    cs.IT cs.NI

    Keyhole and Reflection Effects in Network Connectivity Analysis

    Authors: Mohammud Z. Bocus, Carl P. Dettmann, Justin P. Coon, Mohammed R. Rahman

    Abstract: Recent research has demonstrated the importance of boundary effects on the overall connection probability of wireless networks, but has largely focused on convex domains. We consider two generic scenarios of practical importance to wireless communications, in which one or more nodes are located outside the convex space where the remaining nodes reside. Consequently, conventional approaches with th… ▽ More

    Submitted 5 March, 2014; v1 submitted 27 November, 2012; originally announced November 2012.

    Comments: 21 pages, 19 figures

  36. arXiv:1211.4290  [pdf, other

    cs.DC

    Toward a Principled Framework for Benchmarking Consistency

    Authors: Muntasir Raihan Rahman, Wojciech Golab, Alvin AuYoung, Kimberly Keeton, Jay J. Wylie

    Abstract: Large-scale key-value storage systems sacrifice consistency in the interest of dependability (i.e., partition tolerance and availability), as well as performance (i.e., latency). Such systems provide eventual consistency,which---to this point---has been difficult to quantify in real systems. Given the many implementations and deployments of eventually-consistent systems (e.g., NoSQL systems), atte… ▽ More

    Submitted 19 November, 2012; v1 submitted 18 November, 2012; originally announced November 2012.