Skip to main content

Showing 1–9 of 9 results for author: Yekkehkhany, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2007.09771  [pdf, other

    cs.GT

    Risk-Averse Equilibrium for Autonomous Vehicles in Stochastic Congestion Games

    Authors: Ali Yekkehkhany, Rakesh Nagi

    Abstract: The fast-growing market of autonomous vehicles, unmanned aerial vehicles, and fleets in general necessitates the design of smart and automatic navigation systems considering the stochastic latency along different paths in the traffic network. The longstanding shortest path problem in a deterministic network, whose counterpart in a congestion game setting is Wardrop equilibrium, has been studied ex… ▽ More

    Submitted 19 July, 2020; originally announced July 2020.

  2. arXiv:2003.10838  [pdf, other

    cs.CY cs.LG stat.ML

    Prob2Vec: Mathematical Semantic Embedding for Problem Retrieval in Adaptive Tutoring

    Authors: Du Su, Ali Yekkehkhany, Yi Lu, Wenmiao Lu

    Abstract: We propose a new application of embedding techniques for problem retrieval in adaptive tutoring. The objective is to retrieve problems whose mathematical concepts are similar. There are two challenges: First, like sentences, problems helpful to tutoring are never exactly the same in terms of the underlying concepts. Instead, good problems mix concepts in innovative ways, while still displaying con… ▽ More

    Submitted 20 March, 2020; originally announced March 2020.

  3. arXiv:2002.08414  [pdf, other

    cs.GT

    Risk-Averse Equilibrium for Games

    Authors: Ali Yekkehkhany, Timothy Murray, Rakesh Nagi

    Abstract: The term rational has become synonymous with maximizing expected payoff in the definition of the best response in Nash setting. In this work, we consider stochastic games in which players engage only once, or at most a limited number of times. In such games, it may not be rational for players to maximize their expected payoff as they cannot wait for the Law of Large Numbers to take effect. We inst… ▽ More

    Submitted 19 February, 2020; originally announced February 2020.

  4. Risk-Averse Explore-Then-Commit Algorithms for Finite-Time Bandits

    Authors: Ali Yekkehkhany, Ebrahim Arian, Mohammad Hajiesmaili, Rakesh Nagi

    Abstract: In this paper, we study multi-armed bandit problems in explore-then-commit setting. In our proposed explore-then-commit setting, the goal is to identify the best arm after a pure experimentation (exploration) phase and exploit it once or for a given finite number of times. We identify that although the arm with the highest expected reward is the most desirable objective for infinite exploitations,… ▽ More

    Submitted 11 September, 2019; v1 submitted 30 April, 2019; originally announced April 2019.

    Report number: https://ieeexplore.ieee.org/document/9142286

    Journal ref: 2019 IEEE 58th Conference on Decision and Control (CDC)

  5. arXiv:1901.04047  [pdf, other

    cs.PF

    Blind GB-PANDAS: A Blind Throughput-Optimal Load Balancing Algorithm for Affinity Scheduling

    Authors: Ali Yekkehkhany, Rakesh Nagi

    Abstract: Dynamic affinity load balancing of multi-type tasks on multi-skilled servers, when the service rate of each task type on each of the servers is known and can possibly be different from each other, is an open problem for over three decades. The goal is to do task assignment on servers in a real time manner so that the system becomes stable, which means that the queue lengths do not diverge to infin… ▽ More

    Submitted 3 March, 2020; v1 submitted 13 January, 2019; originally announced January 2019.

  6. GB-PANDAS: Throughput and heavy-traffic optimality analysis for affinity scheduling

    Authors: Ali Yekkehkhany, Avesta Hojjati, Mohammad H Hajiesmaili

    Abstract: Dynamic affinity scheduling has been an open problem for nearly three decades. The problem is to dynamically schedule multi-type tasks to multi-skilled servers such that the resulting queueing system is both stable in the capacity region (throughput optimality) and the mean delay of tasks is minimized at high loads near the boundary of the capacity region (heavy-traffic optimality). As for applica… ▽ More

    Submitted 23 September, 2017; originally announced September 2017.

    Comments: IFIP WG 7.3 Performance 2017 - The 35th International Symposium on Computer Performance, Modeling, Measurements and Evaluation 2017

  7. A Mobile Geo-Communication Dataset for Physiology-Aware DASH in Rural Ambulance Transport

    Authors: Mohammad Hosseini, Yu Jiang, Ali Yekkehkhany, Richard R. Berlin, Lui Sha

    Abstract: Use of telecommunication technologies for remote, continuous monitoring of patients can enhance effectiveness of emergency ambulance care during transport from rural areas to a regional center hospital. However, the communication along the various routes in rural areas may have wide bandwidth ranges from 2G to 4G; some regions may have only lower satellite bandwidth available. Bandwidth fluctuatio… ▽ More

    Submitted 16 June, 2017; originally announced June 2017.

    Comments: Proceedings of the 8th ACM on Multimedia Systems Conference (MMSys'17), Pages 158-163, Taipei, Taiwan, June 20 - 23, 2017

  8. arXiv:1702.07802  [pdf, other

    cs.DC

    Near-Data Scheduling for Data Centers with Multiple Levels of Data Locality

    Authors: Ali Yekkehkhany

    Abstract: Data locality is a fundamental issue for data-parallel applications. Considering MapReduce in Hadoop, the map task scheduling part requires an efficient algorithm which takes data locality into consideration; otherwise, the system may become unstable under loads inside the system's capacity region and jobs may experience longer completion times which are not of interest. The data chunk needed for… ▽ More

    Submitted 13 April, 2017; v1 submitted 24 February, 2017; originally announced February 2017.

  9. arXiv:1701.08883  [pdf, other

    cs.IT

    A Covert Queueing Channel in Round Robin Schedulers

    Authors: AmirEmad Ghassami, Ali Yekkehkhany, Negar Kiyavash

    Abstract: We study a covert queueing channel (CQC) between two users sharing a round robin scheduler. Such a covert channel can arise when users share a resource such as a computer processor or a router arbitrated by a round robin policy. We present an information-theoretic framework to model and derive the maximum reliable data transmission rate, i.e., the capacity of this channel, for both noiseless and n… ▽ More

    Submitted 12 July, 2018; v1 submitted 30 January, 2017; originally announced January 2017.