Skip to main content

Showing 1–11 of 11 results for author: Yazdani, N

Searching in archive cs. Search in all archives.
.
  1. Two-Fold Byzantine Fault Tolerance Algorithm: Byzantine Consensus in Blockchain

    Authors: Mohammad R. Shakournia, Pooya Jamshidi, Hamid Reza Faragardi, Nasser Yazdani

    Abstract: Blockchain technology offers a decentralized and secure method for storing and authenticating data, rendering it well-suited for various applications such as digital currencies, supply chain management, and voting systems. However, the decentralized nature of blockchain also exposes it to vulnerabilities, particularly Byzantine faults, which arise when nodes in the network behave maliciously or en… ▽ More

    Submitted 22 April, 2025; originally announced April 2025.

  2. arXiv:2412.12938  [pdf, other

    cs.DB cs.ET cs.MM

    A Conceptual Model of Intelligent Multimedia Data Rendered using Flying Light Specks

    Authors: Nima Yazdani, Hamed Alimohammadzadeh, Shahram Ghandeharizadeh

    Abstract: A Flying Light Speck, FLS, is a miniature sized drone configured with light sources to illuminate 3D multimedia objects in a fixed volume, an FLS display. A swarm of FLSs may provide haptic interactions by exerting force back at a user's touch. This paper presents a conceptual model for the multimedia data to enable content-based queries. The model empowers users of an FLS display to annotate the… ▽ More

    Submitted 17 December, 2024; originally announced December 2024.

    Comments: Appeared in the First International Conference on Holodecks

  3. arXiv:2107.08868  [pdf, other

    cs.IT cs.IR

    Energy Efficient Data Recovery from Corrupted LoRa Frames

    Authors: Niloofar Yazdani, Nikolaos Kouvelas, R Venkatesha Prasad, Daniel E. Lucani

    Abstract: High frame-corruption is widely observed in Long Range Wide Area Networks (LoRaWAN) due to the coexistence with other networks in ISM bands and an Aloha-like MAC layer. LoRa's Forward Error Correction (FEC) mechanism is often insufficient to retrieve corrupted data. In fact, real-life measurements show that at least one-fourth of received transmissions are corrupted. When more frames are dropped,… ▽ More

    Submitted 19 July, 2021; originally announced July 2021.

    Comments: 6 pages

  4. ZipLine: In-Network Compression at Line Speed

    Authors: Sébastien Vaucher, Niloofar Yazdani, Pascal Felber, Daniel E. Lucani, Valerio Schiavoni

    Abstract: Network appliances continue to offer novel opportunities to offload processing from computing nodes directly into the data plane. One popular concern of network operators and their customers is to move data increasingly faster. A common technique to increase data throughput is to compress it before its transmission. However, this requires compression of the data -- a time and energy demanding pre-… ▽ More

    Submitted 13 January, 2021; originally announced January 2021.

    Journal ref: 2020. Proceedings of the 16th International Conference on emerging Networking EXperiments and Technologies. Association for Computing Machinery, New York, NY, USA, 399-405

  5. Bet and Attack: Incentive Compatible Collaborative Attacks Using Smart Contracts

    Authors: Z. Motaqy, G. Almashaqbeh, B. Bahrak, N. Yazdani

    Abstract: Smart contract-enabled blockchains allow building decentralized applications in which mutually-distrusted parties can work together. Recently, oracle services emerged to provide these applications with real-world data feeds. Unfortunately, these capabilities have been used for malicious purposes under what is called criminal smart contracts. A few works explored this dark side and showed a variety… ▽ More

    Submitted 23 September, 2021; v1 submitted 23 October, 2020; originally announced October 2020.

    Comments: Final Version

  6. Proof Repair across Type Equivalences

    Authors: Talia Ringer, RanDair Porter, Nathaniel Yazdani, John Leo, Dan Grossman

    Abstract: We describe a new approach to automatically repairing broken proofs in the Coq proof assistant in response to changes in types. Our approach combines a configurable proof term transformation with a decompiler from proof terms to tactic scripts. The proof term transformation implements transport across equivalences in a way that removes references to the old version of the changed type and does not… ▽ More

    Submitted 11 May, 2021; v1 submitted 2 October, 2020; originally announced October 2020.

    Comments: Tool repository with code guide: https://github.com/uwplse/pumpkin-pi/blob/v2.0.0/GUIDE.md

  7. arXiv:2007.10064  [pdf, other

    cs.NI

    Memory-aware Online Compression of CAN Bus Data for Future Vehicular Systems

    Authors: Niloofar Yazdani, Lars Nielsen, Daniel E. Lucani

    Abstract: Vehicles generate a large amount of data from their internal sensors. This data is not only useful for a vehicle's proper operation, but it provides car manufacturers with the ability to optimize performance of individual vehicles and companies with fleets of vehicles (e.g., trucks, taxis, tractors) to optimize their operations to reduce fuel costs and plan repairs. This paper proposes algorithms… ▽ More

    Submitted 20 July, 2020; originally announced July 2020.

    Comments: 6 pages, 7 figures

  8. Hermes: Enabling Energy-efficient IoT Networks with Generalized Deduplication

    Authors: Christian Göttel, Lars Nielsen, Niloofar Yazdani, Pascal Felber, Daniel E. Lucani, Valerio Schiavoni

    Abstract: With the advent of the Internet of Things (IoT), the ever growing number of connected devices observed in recent years and foreseen for the next decade suggests that more and more data will have to be transmitted over a network, before being processed and stored in data centers. Generalized deduplication (GD) is a novel technique to effectively reduce the data storage cost by identifying similar d… ▽ More

    Submitted 20 July, 2020; v1 submitted 22 May, 2020; originally announced May 2020.

    Comments: This work was partially financed by the SCALE-IoT Project (Grant No. 7026-00042B) granted by the Independent Research Fund Denmark, by the Aarhus Universitets Forskningsfond (AUFF) Starting Grant Project AUFF- 2017-FLS-7-1, and Aarhus University's DIGIT Centre. European Commission Project: LEGaTO - Low Energy Toolset for Heterogeneous Computing (EC-H2020-780681)

    Journal ref: DEBS'20: Proceedings of the 14th ACM International Conference on Distributed and Event-Based Systems (2020) 133-136

  9. arXiv:1912.03496  [pdf

    physics.soc-ph cs.SI

    Overlapping Communities and the Prediction of Missing Links in Multiplex Networks

    Authors: Amir Mahdi Abdolhosseini-Qomi, Naser Yazdani, Masoud Asadpour

    Abstract: Multiplex networks are a representation of real-world complex systems as a set of entities (i.e. nodes) connected via different types of connections (i.e. layers). The observed connections in these networks may not be complete and the link prediction task is about locating the missing links across layers. Here, the main challenge is about collecting relevant evidence from different layers to assis… ▽ More

    Submitted 15 May, 2020; v1 submitted 7 December, 2019; originally announced December 2019.

  10. arXiv:1908.10053  [pdf

    physics.soc-ph cs.SI physics.data-an

    SimBins: An information-theoretic approach to link prediction in real multiplex networks

    Authors: Seyed Hossein Jafari, Amir Mahdi Abdolhosseini-Qomi, Maseud Rahgozar, Masoud Asadpour, Naser Yazdani

    Abstract: The entities of real-world networks are connected via different types of connections (i.e. layers). The task of link prediction in multiplex networks is about finding missing connections based on both intra-layer and inter-layer correlations. Our observations confirm that that in a wide range of real-world multiplex networks, from social to biological and technological, a positive correlation exis… ▽ More

    Submitted 4 December, 2020; v1 submitted 27 August, 2019; originally announced August 2019.

    Comments: 22 pages, 3 figures, 2 tables

  11. arXiv:1906.09422  [pdf

    physics.soc-ph cs.SI physics.data-an

    Link Prediction in Real-World Multiplex Networks via Layer Reconstruction Method

    Authors: Amir Mahdi Abdolhosseini-Qomi, Seyed Hossein Jafari, Amirheckmat Taghizadeh, Naser Yazdani, Masoud Asadpour, Masoud Rahgozar

    Abstract: A large body of research on link prediction problem is devoted to finding missing links in single-layer (simplex) networks. The proposed link prediction methods compute a similarity measure between unconnected node pairs based on the observed structure of the network. However, extension of notion of similarity to multiplex networks is a two-fold challenge. The layers of real-world multiplex networ… ▽ More

    Submitted 22 June, 2019; originally announced June 2019.