这是indexloc提供的服务,不要输入任何密码
Skip to main content

Showing 1–44 of 44 results for author: Haas, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2504.05173  [pdf, other

    cs.PL cs.DC

    PRDTs: Composable Knowledge-Based Consensus Protocols with Replicated Data Types

    Authors: Julian Haas, Ragnar Mogk, Annette Bieniusa, Mira Mezini

    Abstract: Consensus protocols are fundamental in distributed systems as they enable software with strong consistency properties. However, designing optimized protocols for specific use-cases under certain system assumptions is typically a laborious and error-prone process requiring expert knowledge. While most recent optimized protocols are variations of well-known algorithms like Paxos or Raft, they often… ▽ More

    Submitted 8 April, 2025; v1 submitted 7 April, 2025; originally announced April 2025.

    Comments: 23 pages, 9 figures

  2. arXiv:2502.01789  [pdf

    cs.AI cs.MA

    An Agentic AI Workflow for Detecting Cognitive Concerns in Real-world Data

    Authors: Jiazi Tian, Liqin Wang, Pedram Fard, Valdery Moura Junior, Deborah Blacker, Jennifer S. Haas, Chirag Patel, Shawn N. Murphy, Lidia M. V. R. Moura, Hossein Estiri

    Abstract: Early identification of cognitive concerns is critical but often hindered by subtle symptom presentation. This study developed and validated a fully automated, multi-agent AI workflow using LLaMA 3 8B to identify cognitive concerns in 3,338 clinical notes from Mass General Brigham. The agentic workflow, leveraging task-specific agents that dynamically collaborate to extract meaningful insights fro… ▽ More

    Submitted 3 February, 2025; originally announced February 2025.

  3. arXiv:2412.19010  [pdf, other

    cs.AI

    A theory of appropriateness with applications to generative artificial intelligence

    Authors: Joel Z. Leibo, Alexander Sasha Vezhnevets, Manfred Diaz, John P. Agapiou, William A. Cunningham, Peter Sunehag, Julia Haas, Raphael Koster, Edgar A. Duéñez-Guzmán, William S. Isaac, Georgios Piliouras, Stanley M. Bileschi, Iyad Rahwan, Simon Osindero

    Abstract: What is appropriateness? Humans navigate a multi-scale mosaic of interlocking notions of what is appropriate for different situations. We act one way with our friends, another with our family, and yet another in the office. Likewise for AI, appropriate behavior for a comedy-writing assistant is not the same as appropriate behavior for a customer-service representative. What determines which action… ▽ More

    Submitted 25 December, 2024; originally announced December 2024.

    Comments: 115 pages, 2 figures

  4. arXiv:2411.17915  [pdf, other

    cs.DB

    Stochastic SketchRefine: Scaling In-Database Decision-Making under Uncertainty to Millions of Tuples

    Authors: Riddho R. Haque, Anh L. Mai, Matteo Brucato, Azza Abouzied, Peter J. Haas, Alexandra Meliou

    Abstract: Decision making under uncertainty often requires choosing packages, or bags of tuples, that collectively optimize expected outcomes while limiting risks. Processing Stochastic Package Queries (SPQs) involves solving very large optimization problems on uncertain data. Monte Carlo methods create numerous scenarios, or sample realizations of the stochastic attributes of all the tuples, and generate p… ▽ More

    Submitted 1 April, 2025; v1 submitted 26 November, 2024; originally announced November 2024.

  5. arXiv:2408.00600  [pdf, other

    cs.IT eess.SP

    Ground-to-UAV and RIS-assisted UAV-to-Ground Communication Under Channel Aging: Statistical Characterization and Outage Performance

    Authors: Thanh Luan Nguyen, Georges Kaddoum, Tri Nhu Do, Zygmunt J. Haas

    Abstract: This paper studies the statistical characterization of ground-to-air (G2A) and reconfigurable intelligent surface (RIS)-assisted air-to-ground (A2G) communications in RIS-assisted UAV networks under the impact of channel aging. A comprehensive channel model is presented, which incorporates the time-varying fading, three-dimensional (3D) mobility, Doppler shifts, and the effects of channel aging on… ▽ More

    Submitted 1 August, 2024; originally announced August 2024.

  6. arXiv:2405.15578  [pdf, other

    cs.PL cs.DC

    Distributed Locking as a Data Type

    Authors: Julian Haas, Ragnar Mogk, Annette Bieniusa, Mira Mezini

    Abstract: Mixed-consistency programming models assist programmers in designing applications that provide high availability while still ensuring application-specific safety invariants. However, existing models often make specific system assumptions, such as building on a particular database system or having baked-in coordination strategies. This makes it difficult to apply these strategies in diverse setting… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

  7. Secure Link State Routing for Mobile Ad Hoc Networks

    Authors: Panagiotis Papadimitratos, Zygmunt J. Haas

    Abstract: The secure operation of the routing protocol is one of the major challenges to be met for the proliferation of the Mobile Ad hoc Networking (MANET) paradigm. Nevertheless, security enhancements have been proposed mostly for reactive MANET protocols. The proposed here Secure Link State Routing Protocol (SLSP) provides secure proactive topology discovery, which can be multiply beneficial to the netw… ▽ More

    Submitted 28 March, 2024; originally announced March 2024.

    Journal ref: IEEE International Symposium on Applications and the Internet - Workshop on Security and Assurance in Ad Hoc Networks, Orlando, FL, USA, January 2003

  8. arXiv:2403.00404  [pdf

    cs.CR

    Secure Routing for Mobile Ad hoc Networks

    Authors: Panagiotis Papadimitratos, Zygmunt J. Haas

    Abstract: The emergence of the Mobile Ad Hoc Networking (MANET) technology advocates self-organized wireless interconnection of communication devices that would either extend or operate in concert with the wired networking infrastructure or, possibly, evolve to autonomous networks. In either case, the proliferation of MANET-based applications depends on a multitude of factors, with trustworthiness being one… ▽ More

    Submitted 1 March, 2024; originally announced March 2024.

    Comments: arXiv admin note: text overlap with arXiv:1208.3486, arXiv:1303.7300 by other authors

    Journal ref: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), San Antonio, TX, January 27-31, 2002

  9. arXiv:2401.14203  [pdf, other

    eess.SP cs.IT

    Statistical Characterization of RIS-assisted UAV Communications in Terrestrial and Non-Terrestrial Networks Under Channel Aging

    Authors: Thanh Luan Nguyen, Georges Kaddoum, Tri Nhu Do, Zygmunt J. Haas

    Abstract: This paper studies the statistical characterization of ground-to-air (G2A) and reconfigurable intelligent surface (RIS)-assisted air-to-ground (A2G) communications with unmanned aerial vehicles (UAVs) in terrestrial and non-terrestrial networks under the impact of channel aging. We first model the G2A and A2G signal-to-noise ratios (SNRs) as non-central complex Gaussian quadratic random variable… ▽ More

    Submitted 30 January, 2024; v1 submitted 25 January, 2024; originally announced January 2024.

    Comments: 6 pages, 3 figures and 7 subfigures, IEEE ICC'24 (Revision)

  10. arXiv:2308.14068  [pdf, other

    cs.RO

    Uncertainty-aware Risk Assessment of Robotic Systems via Importance Sampling

    Authors: Woo-Jeong Baek, Tom P. Huck, Joschka Haas, Jonas Lewandrowski, Tamim Asfour, Torsten Kröger

    Abstract: In this paper, we introduce a probabilistic approach to risk assessment of robot systems by focusing on the impact of uncertainties. While various approaches to identifying systematic hazards (e.g., bugs, design flaws, etc.) can be found in current literature, little attention has been devoted to evaluating risks in robot systems in a probabilistic manner. Existing methods rely on discrete notions… ▽ More

    Submitted 27 August, 2023; originally announced August 2023.

    Comments: This work has been submitted to the IEEE for possible publication

  11. arXiv:2308.10973  [pdf, ps, other

    cs.CV cs.LG

    SupEuclid: Extremely Simple, High Quality OoD Detection with Supervised Contrastive Learning and Euclidean Distance

    Authors: Jarrod Haas

    Abstract: Out-of-Distribution (OoD) detection has developed substantially in the past few years, with available methods approaching, and in a few cases achieving, perfect data separation on standard benchmarks. These results generally involve large or complex models, pretraining, exposure to OoD examples or extra hyperparameter tuning. Remarkably, it is possible to achieve results that can exceed many of th… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

  12. arXiv:2307.02860  [pdf, other

    cs.DB

    Scaling Package Queries to a Billion Tuples via Hierarchical Partitioning and Customized Optimization

    Authors: Anh L. Mai, Pengyu Wang, Azza Abouzied, Matteo Brucato, Peter J. Haas, Alexandra Meliou

    Abstract: A package query returns a package - a multiset of tuples - that maximizes or minimizes a linear objective function subject to linear constraints, thereby enabling in-database decision support. Prior work has established the equivalence of package queries to Integer Linear Programs (ILPs) and developed the SketchRefine algorithm for package query processing. While this algorithm was an important fi… ▽ More

    Submitted 14 November, 2023; v1 submitted 6 July, 2023; originally announced July 2023.

  13. arXiv:2306.04072  [pdf, other

    cs.LG

    Exploring Simple, High Quality Out-of-Distribution Detection with L2 Normalization

    Authors: Jarrod Haas, William Yolland, Bernhard Rabus

    Abstract: We demonstrate that L2 normalization over feature space can produce capable performance for Out-of-Distribution (OoD) detection for some models and datasets. Although it does not demonstrate outright state-of-the-art performance, this method is notable for its extreme simplicity: it requires only two addition lines of code, and does not need specialized loss functions, image augmentations, outlier… ▽ More

    Submitted 31 January, 2024; v1 submitted 6 June, 2023; originally announced June 2023.

  14. arXiv:2305.18269  [pdf, other

    cs.AI cs.CY

    Doing the right thing for the right reason: Evaluating artificial moral cognition by probing cost insensitivity

    Authors: Yiran Mao, Madeline G. Reinecke, Markus Kunesch, Edgar A. Duéñez-Guzmán, Ramona Comanescu, Julia Haas, Joel Z. Leibo

    Abstract: Is it possible to evaluate the moral cognition of complex artificial agents? In this work, we take a look at one aspect of morality: `doing the right thing for the right reasons.' We propose a behavior-based analysis of artificial moral cognition which could also be applied to humans to facilitate like-for-like comparison. Morally-motivated behavior should persist despite mounting cost; by measuri… ▽ More

    Submitted 29 May, 2023; originally announced May 2023.

    Comments: 11 pages, 3 figures

  15. LoRe: A Programming Model for Verifiably Safe Local-First Software

    Authors: Julian Haas, Ragnar Mogk, Elena Yanakieva, Annette Bieniusa, Mira Mezini

    Abstract: Local-first software manages and processes private data locally while still enabling collaboration between multiple parties connected via partially unreliable networks. Such software typically involves interactions with users and the execution environment (the outside world). The unpredictability of such interactions paired with their decentralized nature make reasoning about the correctness of lo… ▽ More

    Submitted 19 October, 2023; v1 submitted 14 April, 2023; originally announced April 2023.

    Comments: This is the extended version of the work accepted at ECOOP 2023

    Journal ref: ACM Trans. Program. Lang. Syst. 46, 1, Article 2 (March 2024), 26 pages

  16. arXiv:2212.13643  [pdf

    cs.HC cs.DB

    What-if Analysis for Business Professionals: Current Practices and Future Opportunities

    Authors: Sneha Gathani, Zhicheng Liu, Peter J. Haas, Çağatay Demiralp

    Abstract: What-if analysis (WIA) is essential for data-driven decision-making, allowing users to assess how changes in variables impact outcomes and explore alternative scenarios. Existing WIA research primarily supports the workflows of data scientists and analysts, and largely overlooks business professionals who engage in WIA through non-technical means. To bridge this gap, we conduct a two-part user stu… ▽ More

    Submitted 1 March, 2025; v1 submitted 27 December, 2022; originally announced December 2022.

    Comments: CHI'2025

  17. arXiv:2211.13746  [pdf, other

    cs.MA cs.AI cs.GT cs.NE

    Melting Pot 2.0

    Authors: John P. Agapiou, Alexander Sasha Vezhnevets, Edgar A. Duéñez-Guzmán, Jayd Matyas, Yiran Mao, Peter Sunehag, Raphael Köster, Udari Madhushani, Kavya Kopparapu, Ramona Comanescu, DJ Strouse, Michael B. Johanson, Sukhdeep Singh, Julia Haas, Igor Mordatch, Dean Mobbs, Joel Z. Leibo

    Abstract: Multi-agent artificial intelligence research promises a path to develop intelligent technologies that are more human-like and more human-compatible than those produced by "solipsistic" approaches, which do not consider interactions between agents. Melting Pot is a research tool developed to facilitate work on multi-agent artificial intelligence, and provides an evaluation protocol that measures ge… ▽ More

    Submitted 30 October, 2023; v1 submitted 24 November, 2022; originally announced November 2022.

    Comments: 69 pages, 54 figures. arXiv admin note: text overlap with arXiv:2107.06857

  18. arXiv:2209.08378  [pdf, other

    cs.LG

    Linking Neural Collapse and L2 Normalization with Improved Out-of-Distribution Detection in Deep Neural Networks

    Authors: Jarrod Haas, William Yolland, Bernhard Rabus

    Abstract: We propose a simple modification to standard ResNet architectures--L2 normalization over feature space--that substantially improves out-of-distribution (OoD) performance on the previously proposed Deep Deterministic Uncertainty (DDU) benchmark. We show that this change also induces early Neural Collapse (NC), an effect linked to better OoD performance. Our method achieves comparable or superior Oo… ▽ More

    Submitted 11 January, 2023; v1 submitted 17 September, 2022; originally announced September 2022.

    Comments: 19 pages, accepted by Transactions of Machine Learning Research, 2022

  19. arXiv:2206.13370  [pdf, other

    cs.IT eess.SP

    Adaptive Decoding Mechanisms for UAV-enabled Double-Uplink Coordinated NOMA

    Authors: Thanh Luan Nguyen, Georges Kaddoum, Tri Nhu Do, Daniel Benevides da Costa, Zygmunt J. Haas

    Abstract: In this paper, we propose a novel adaptive decoding mechanism (ADM) for the unmanned aerial vehicle (UAV)-enabled uplink (UL) non-orthogonal multiple access (NOMA) communications. Specifically, considering a harsh UAV environment, where ground-to-ground links are regularly unavailable, the proposed ADM overcomes the challenging problem of conventional UL-NOMA systems whose performance is sensitive… ▽ More

    Submitted 8 March, 2023; v1 submitted 27 June, 2022; originally announced June 2022.

  20. arXiv:2112.04359  [pdf, other

    cs.CL cs.AI cs.CY

    Ethical and social risks of harm from Language Models

    Authors: Laura Weidinger, John Mellor, Maribeth Rauh, Conor Griffin, Jonathan Uesato, Po-Sen Huang, Myra Cheng, Mia Glaese, Borja Balle, Atoosa Kasirzadeh, Zac Kenton, Sasha Brown, Will Hawkins, Tom Stepleton, Courtney Biles, Abeba Birhane, Julia Haas, Laura Rimell, Lisa Anne Hendricks, William Isaac, Sean Legassick, Geoffrey Irving, Iason Gabriel

    Abstract: This paper aims to help structure the risk landscape associated with large-scale Language Models (LMs). In order to foster advances in responsible innovation, an in-depth understanding of the potential risks posed by these models is needed. A wide range of established and anticipated risks are analysed in detail, drawing on multidisciplinary expertise and literature from computer science, linguist… ▽ More

    Submitted 8 December, 2021; originally announced December 2021.

  21. arXiv:2109.06160  [pdf, other

    cs.DB cs.HC cs.LG

    Augmenting Decision Making via Interactive What-If Analysis

    Authors: Sneha Gathani, Madelon Hulsebos, James Gale, Peter J. Haas, Çağatay Demiralp

    Abstract: The fundamental goal of business data analysis is to improve business decisions using data. Business users often make decisions to achieve key performance indicators (KPIs) such as increasing customer retention or sales, or decreasing costs. To discover the relationship between data attributes hypothesized to be drivers and those corresponding to KPIs of interest, business users currently need to… ▽ More

    Submitted 8 February, 2022; v1 submitted 13 September, 2021; originally announced September 2021.

    Comments: CIDR'22

  22. arXiv:2106.05380  [pdf, other

    cs.IT eess.SP

    Aerial Reconfigurable Intelligent Surface-Aided Wireless Communication Systems

    Authors: Tri Nhu Do, Georges Kaddoum, Thanh Luan Nguyen, Daniel Benevides da Costa, Zygmunt J. Haas

    Abstract: In this paper, we propose and investigate an aerial reconfigurable intelligent surface (aerial-RIS)-aided wireless communication system. Specifically, considering practical composite fading channels, we characterize the air-to-ground (A2G) links by Namkagami-m small-scale fading and inverse-Gamma large-scale shadowing. To investigate the delay-limited performance of the proposed system, we derive… ▽ More

    Submitted 9 June, 2021; originally announced June 2021.

  23. arXiv:2104.02363  [pdf, other

    math.AG cs.CC

    Young Flattenings in the Schur module basis

    Authors: Lennart J. Haas, Christian Ikenmeyer

    Abstract: There are several isomorphic constructions for the irreducible polynomial representations of the general linear group in characteristic zero. The two most well-known versions are called Schur modules and Weyl modules. Steven Sam used a Weyl module implementation in 2009 for his Macaulay2 package PieriMaps. This implementation can be used to compute so-called Young flattenings of polynomials. Over… ▽ More

    Submitted 6 April, 2021; originally announced April 2021.

    MSC Class: 05E10; 68Q17 ACM Class: I.1.2

  24. arXiv:2104.01912  [pdf, ps, other

    cs.IT

    Multi-RIS-aided Wireless Systems: Statistical Characterization and Performance Analysis

    Authors: Tri Nhu Do, Georges Kaddoum, Thanh Luan Nguyen, Daniel Benevides da Costa, Zygmunt J. Haas

    Abstract: In this paper, we study the statistical characterization and modeling of distributed multi-reconfigurable intelligent surface (RIS)-aided wireless systems. Specifically, we consider a practical system model where the RISs with different geometric sizes are distributively deployed, and wireless channels associated to different RISs are assumed to be independent but not identically distributed (i.n.… ▽ More

    Submitted 29 September, 2021; v1 submitted 5 April, 2021; originally announced April 2021.

  25. Stochastic Package Queries in Probabilistic Databases

    Authors: Matteo Brucato, Nishant Yadav, Azza Abouzied, Peter J. Haas, Alexandra Meliou

    Abstract: We provide methods for in-database support of decision making under uncertainty. Many important decision problems correspond to selecting a package (bag of tuples in a relational database) that jointly satisfy a set of constraints while minimizing some overall cost function; in most real-world problems, the data is uncertain. We provide methods for specifying -- via a SQL extension -- and processi… ▽ More

    Submitted 11 March, 2021; originally announced March 2021.

    Journal ref: SIGMOD 2020

  26. arXiv:1906.05677  [pdf, other

    cs.DB cs.DC cs.LG

    Temporally-Biased Sampling Schemes for Online Model Management

    Authors: Brian Hentschel, Peter J. Haas, Yuanyuan Tian

    Abstract: To maintain the accuracy of supervised learning models in the presence of evolving data streams, we provide temporally-biased sampling schemes that weight recent data most heavily, with inclusion probabilities for a given data item decaying over time according to a specified "decay function". We then periodically retrain the models on the current sample. This approach speeds up the training proces… ▽ More

    Submitted 11 June, 2019; originally announced June 2019.

    Comments: 49 pages, 18 figures. arXiv admin note: substantial text overlap with arXiv:1801.09709

  27. Interference Mitigation Using Dynamic Frequency Re-use for Dense Femtocell Network Architectures

    Authors: Mostafa Zaman Chowdhury, Yeong Min Jang, Zygmunt J. Haas

    Abstract: The next generation network aims to efficiently deploy low cost and low power cellular base station in the subscriber's home environment. For the femtocell deployment, frequency allocation among femtocells and macrocell is big concern to mitigate the interference, and to ensure the best use of the expensive spectrum. There are many sources of interference in integrated femtocell/macrocell networks… ▽ More

    Submitted 4 October, 2018; originally announced October 2018.

    Comments: International Conference on Ubiquitous and Future Networks (ICUFN), June 2010, Jeju, Korea, pp. 256-261

  28. arXiv:1808.08294  [pdf, other

    cs.LG stat.ML

    Unknown Examples & Machine Learning Model Generalization

    Authors: Yeounoh Chung, Peter J. Haas, Eli Upfal, Tim Kraska

    Abstract: Over the past decades, researchers and ML practitioners have come up with better and better ways to build, understand and improve the quality of ML models, but mostly under the key assumption that the training data is distributed identically to the testing data. In many real-world applications, however, some potential training examples are unknown to the modeler, due to sample selection bias or, m… ▽ More

    Submitted 11 October, 2019; v1 submitted 24 August, 2018; originally announced August 2018.

  29. A Privacy Scheme for Monitoring Devices in the Internet of Things

    Authors: Zygmunt J. Haas, Ashkan Yousefpour

    Abstract: Sufficiently strong security and privacy mechanisms are prerequisite to amass the promising benefits of the IoT technology and to incorporate this technology into our daily lives. This paper introduces a novel approach to privacy in networks, an approach which is especially well matched with the IoT characteristics. Our general approach is based on continually changing the identifying attributes o… ▽ More

    Submitted 12 March, 2018; originally announced March 2018.

    Comments: Appeared in the proceedings of FABULOUS 2016 (2nd EAI International Conference on Future Access Enablers of Ubiquitous and Intelligent Infrastructures)

    Journal ref: In Pervasive Computing Paradigms for Mental Health, pp. 153-165. Springer, Cham, 2016

  30. arXiv:1801.09709  [pdf, other

    cs.DB

    Temporally-Biased Sampling for Online Model Management

    Authors: Brian Hentschel, Peter J. Haas, Yuanyuan Tian

    Abstract: To maintain the accuracy of supervised learning models in the presence of evolving data streams, we provide temporally-biased sampling schemes that weight recent data most heavily, with inclusion probabilities for a given data item decaying exponentially over time. We then periodically retrain the models on the current sample. This approach speeds up the training process relative to training on al… ▽ More

    Submitted 29 January, 2018; originally announced January 2018.

    Comments: 17 pages, 14 figures, extended version of an EDBT'18 paper

  31. arXiv:1709.10513  [pdf, other

    cs.HC

    Foresight: Rapid Data Exploration Through Guideposts

    Authors: Çağatay Demiralp, Peter J. Haas, Srinivasan Parthasarathy, Tejaswini Pedapati

    Abstract: Current tools for exploratory data analysis (EDA) require users to manually select data attributes, statistical computations and visual encodings. This can be daunting for large-scale, complex data. We introduce Foresight, a visualization recommender system that helps the user rapidly explore large high-dimensional datasets through "guideposts." A guidepost is a visualization corresponding to a pr… ▽ More

    Submitted 29 September, 2017; originally announced September 2017.

    Comments: IEEE VIS'17 Data Systems and Interactive Analysis (DSIA) Workshop

  32. arXiv:1707.03877  [pdf, other

    cs.DB

    Foresight: Recommending Visual Insights

    Authors: Çağatay Demiralp, Peter J. Haas, Srinivasan Parthasarathy, Tejaswini Pedapati

    Abstract: Current tools for exploratory data analysis (EDA) require users to manually select data attributes, statistical computations and visual encodings. This can be daunting for large-scale, complex data. We introduce Foresight, a system that helps the user rapidly discover visual insights from large high-dimensional datasets. Formally, an "insight" is a strong manifestation of a statistical property of… ▽ More

    Submitted 12 July, 2017; originally announced July 2017.

  33. arXiv:1605.00303  [pdf, other

    cs.CE cs.AI

    A Self-Taught Artificial Agent for Multi-Physics Computational Model Personalization

    Authors: Dominik Neumann, Tommaso Mansi, Lucian Itu, Bogdan Georgescu, Elham Kayvanpour, Farbod Sedaghat-Hamedani, Ali Amr, Jan Haas, Hugo Katus, Benjamin Meder, Stefan Steidl, Joachim Hornegger, Dorin Comaniciu

    Abstract: Personalization is the process of fitting a model to patient data, a critical step towards application of multi-physics computational models in clinical practice. Designing robust personalization algorithms is often a tedious, time-consuming, model- and data-specific process. We propose to use artificial intelligence concepts to learn this task, inspired by how human experts manually perform it. T… ▽ More

    Submitted 1 May, 2016; originally announced May 2016.

    Comments: Submitted to Medical Image Analysis, Elsevier

  34. arXiv:1507.03648  [pdf

    cs.DS cs.DC cs.PF

    Deadline-aware Power Management in Data Centers

    Authors: Cengis Hasan, Zygmunt J. Haas

    Abstract: We study the dynamic power optimization problem in data centers. We formulate and solve the following offline problem: in which slot which server has to be assigned to which job; and in which slot which server has to be switched ON or OFF so that the total power is optimal for some time horizon. We show that the offline problem is a new version of generalized assignment problem including new const… ▽ More

    Submitted 13 July, 2015; originally announced July 2015.

  35. arXiv:1502.06388  [pdf

    cs.NI

    Call Admission Control based on Adaptive Bandwidth Allocation for Multi-Class Services in Wireless Networks

    Authors: Mostafa Zaman Chowdhury, Yeong Min Jang, andZygmunt J. Haas

    Abstract: Due to the fact that Quality of Service (QoS) requirements are not as stringent for non-real-time traffic types, as opposed to real-time traffic, more calls can be accommodated by releasing some bandwidth from the existing non-real-time traffic calls. If the released bandwidth to accept a handover call is larger than to accept a new call, then the probability of dropping a call is smaller than the… ▽ More

    Submitted 23 February, 2015; originally announced February 2015.

    Comments: International Conference on ICT Convergence (ICTC), Nov. 2010, Jeju, Korea,pp. 358-361

  36. arXiv:1412.4322  [pdf

    cs.NI

    Priority based Bandwidth Adaptation for Multi-class Traffic in Wireless Networks

    Authors: Mostafa Zaman Chowdhury, Yeong Min Jang, Zygmunt J. Haas

    Abstract: The bandwidth adaptation is the technique that allows the flexibility in bandwidth allocation for a call. Using the bandwidth adaptation technique, the number of call admission in the system can be increased significantly. In this paper we propose a priority based bandwidth adaptation scheme that can release multi-level of bandwidth from the existing calls to accept call requests. The amount of re… ▽ More

    Submitted 14 December, 2014; originally announced December 2014.

    Journal ref: International Journal of Multimedia and Ubiquitous Engineering, vol. 7, no. 2, pp. 445-450, April, 2012

  37. Cost-Effective Frequency Planning for Capacity Enhancement of Femtocellular Networks

    Authors: Mostafa Zaman Chowdhury, Yeong Min Jang, Zygmunt J. Haas

    Abstract: Femtocellular networks will co-exist with macrocellular networks, mitigation of the interference between these two network types is a key challenge for successful integration of these two technologies. In particular, there are several interference mechanisms between the femtocellular and the macrocellular networks, and the effects of the resulting interference depend on the density of femtocells a… ▽ More

    Submitted 11 December, 2014; originally announced December 2014.

    Journal ref: Wireless Personal Communications, vol. 60, no. 1, pp. 83-104, Sept. 2011

  38. Call Admission Control based on Adaptive Bandwidth Allocation for Wireless Networks

    Authors: Mostafa Zaman Chowdhury, Yeong Min Jang, Zygmunt J. Haas

    Abstract: Provisioning of Quality of Service (QoS) is a key issue in any multi-media system. However, in wireless systems, supporting QoS requirements of different traffic types is more challenging due to the need to minimize two performance metrics - the probability of dropping a handover call and the probability of blocking a new call. Since QoS requirements are not as stringent for non-real-time traffic… ▽ More

    Submitted 11 December, 2014; originally announced December 2014.

    Journal ref: IEEE/KICS Journal of Communications and Networks (JCN). vol. 15, no. 1, pp. 15-24, Feb. 2013

  39. arXiv:1410.1389  [pdf, other

    cs.CR

    A Practical, Secure, and Verifiable Cloud Computing for Mobile Systems

    Authors: Sriram N. Premnath, Zygmunt J. Haas

    Abstract: Cloud computing systems, in which clients rent and share computing resources of third party platforms, have gained widespread use in recent years. Furthermore, cloud computing for mobile systems (i.e., systems in which the clients are mobile devices) have too been receiving considerable attention in technical literature. We propose a new method of delegating computations of resource-constrained mo… ▽ More

    Submitted 6 October, 2014; originally announced October 2014.

  40. arXiv:1301.7101  [pdf

    cs.NI

    Towards Optimal Broadcast in Wireless Networks

    Authors: Zygmunt J. Haas, Milen Nikolov

    Abstract: Broadcast is a fundamental operation in networks, especially in wireless Mobile Ad Hoc NETworks (MANET). For example, some form of broadcasting is used by all on-demand MANET routing protocols, when there is uncertainty as to the location of the destination node, or for service discovery. Being such a basic operation of the networking protocols, the importance of efficient broadcasting has long be… ▽ More

    Submitted 29 January, 2013; originally announced January 2013.

    Comments: 15 pages, 21 figures

    ACM Class: C.2.1; C.2.2

  41. arXiv:1009.2368  [pdf

    cs.NI cs.MM

    Network evolution and QOS provisioning for integrated femtocell/macrocell networks

    Authors: Mostafa Zaman Chowdhury, Yeong Min Jang, Zygmunt J. Haas

    Abstract: Integrated femtocell/macrocell networks, comprising a conventional cellular network overlaid with femtocells, offer an economically appealing way to improve coverage, quality of service, and access network capacity. The key element to successful femtocells/macrocell integration lies in its self-organizing capability. Provisioning of quality of service is the main technical challenge of the femtoce… ▽ More

    Submitted 13 September, 2010; originally announced September 2010.

    Comments: 16 pages, 10 figures, Published in International Journal of Wireless & Mobile Networks (IJWMN)

    Journal ref: International Journal of Wireless & Mobile Networks (IJWMN), Vol.2, No.3, August 2010

  42. How to Specify and How to Prove Correctness of Secure Routing Protocols for MANET

    Authors: P. Papadimitratos, Z. J. Haas, J. -P. Hubaux

    Abstract: Secure routing protocols for mobile ad hoc networks have been developed recently, yet, it has been unclear what are the properties they achieve, as a formal analysis of these protocols is mostly lacking. In this paper, we are concerned with this problem, how to specify and how to prove the correctness of a secure routing protocol. We provide a definition of what a protocol is expected to achieve… ▽ More

    Submitted 30 December, 2009; originally announced December 2009.

    Journal ref: IEEE-CS BroadNets 2006, San Jose, CA, USA, October 2006

  43. arXiv:cs/0609069  [pdf

    cs.NI

    Coverage and Connectivity in Three-Dimensional Networks

    Authors: S. M. Nazrul Alam, Zygmunt J. Haas

    Abstract: Most wireless terrestrial networks are designed based on the assumption that the nodes are deployed on a two-dimensional (2D) plane. However, this 2D assumption is not valid in underwater, atmospheric, or space communications. In fact, recent interest in underwater acoustic ad hoc and sensor networks hints at the need to understand how to design networks in 3D. Unfortunately, the design of 3D ne… ▽ More

    Submitted 12 September, 2006; originally announced September 2006.

    Comments: To appear in ACM Mobicom 2006

    ACM Class: C.2.1

  44. arXiv:cs/0609047  [pdf

    cs.NI cs.CG

    Topology Control and Network Lifetime in Three-Dimensional Wireless Sensor Networks

    Authors: S. M. Nazrul Alam, Zygmunt J. Haas

    Abstract: Coverage and connectivity issues of three-dimensional (3D) networks are addressed in [2], but that work assumes that a node can be placed at any arbitrary location. In this work, we drop that assumption and rather assume that nodes are uniformly and densely deployed in a 3D space. We want to devise a mechanism that keeps some nodes active and puts other nodes into sleep so that the number of act… ▽ More

    Submitted 10 September, 2006; originally announced September 2006.

    Comments: Submitted for publication

    ACM Class: C.2.1