Zum Hauptinhalt springen

Showing 1–15 of 15 results for author: Dán, G

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.13196  [pdf, other

    cs.NI eess.SP

    Predictability of Performance in Communication Networks Under Markovian Dynamics

    Authors: Samie Mostafavi, Simon Egger, György Dán, James Gross

    Abstract: With the emergence of time-critical applications in modern communication networks, there is a growing demand for proactive network adaptation and quality of service (QoS) prediction. However, a fundamental question remains largely unexplored: how can we quantify and achieve more predictable communication systems in terms of performance? To address this gap, this paper introduces a theoretical fram… ▽ More

    Submitted 26 August, 2024; v1 submitted 23 August, 2024; originally announced August 2024.

  2. arXiv:2401.11419  [pdf, other

    cs.NI eess.SP

    Joint UAV Deployment and Resource Allocation in THz-Assisted MEC-Enabled Integrated Space-Air-Ground Networks

    Authors: Yan Kyaw Tun, György Dán, Yu Min Park, Choong Seon Hong

    Abstract: Multi-access edge computing (MEC)-enabled integrated space-air-ground (SAG) networks have drawn much attention recently, as they can provide communication and computing services to wireless devices in areas that lack terrestrial base stations (TBSs). Leveraging the ample bandwidth in the terahertz (THz) spectrum, in this paper, we propose MEC-enabled integrated SAG networks with collaboration amon… ▽ More

    Submitted 21 January, 2024; originally announced January 2024.

    Comments: 36 pages, 8 figures

  3. arXiv:2311.14982  [pdf, other

    cs.NI

    Active Queue Management with Data-Driven Delay Violation Probability Predictors

    Authors: Samie Mostafavi, Neelabhro Roy, György Dán, James Gross

    Abstract: The increasing demand for latency-sensitive applications has necessitated the development of sophisticated algorithms that efficiently manage packets with end-to-end delay targets traversing the networked infrastructure. Network components must consider minimizing the packets' end-to-end delay violation probabilities (DVP) as a guiding principle throughout the transmission path to ensure timely de… ▽ More

    Submitted 25 November, 2023; originally announced November 2023.

  4. arXiv:2211.04157  [pdf, other

    cs.LG cs.AI cs.CR

    Inferring Class Label Distribution of Training Data from Classifiers: An Accuracy-Augmented Meta-Classifier Attack

    Authors: Raksha Ramakrishna, György Dán

    Abstract: Property inference attacks against machine learning (ML) models aim to infer properties of the training data that are unrelated to the primary task of the model, and have so far been formulated as binary decision problems, i.e., whether or not the training data have a certain property. However, in industrial and healthcare applications, the proportion of labels in the training data is quite often… ▽ More

    Submitted 8 November, 2022; originally announced November 2022.

    Comments: 12 pages, 2022 Trustworthy and Socially Responsible Machine Learning (TSRML 2022) co-located with NeurIPS 2022

  5. arXiv:2204.00209  [pdf, other

    eess.SY cs.GT

    Green Routing Game: Strategic Logistical Planning using Mixed Fleets of ICEVs and EVs

    Authors: Hampei Sasahara, György Dán, Saurabh Amin, Henrik Sandberg

    Abstract: This paper introduces a "green" routing game between multiple logistic operators (players), each owning a mixed fleet of internal combustion engine vehicle (ICEV) and electric vehicle (EV) trucks. Each player faces the cost of delayed delivery (due to charging requirements of EVs) and a pollution cost levied on the ICEVs. This cost structure models: 1) limited battery capacity of EVs and their cha… ▽ More

    Submitted 1 April, 2022; originally announced April 2022.

    Comments: 8 pages

  6. Industrial Edge-based Cyber-Physical Systems -- Application Needs and Concerns for Realization

    Authors: Martin Törngren, Haydn Thompson, Erik Herzog, Rafia Inam, James Gross, György Dán

    Abstract: Industry is moving towards advanced Cyber-Physical Systems (CPS), with trends in smartness, automation, connectivity and collaboration. We examine the drivers and requirements for the use of edge computing in critical industrial applications. Our purpose is to provide a better understanding of industrial needs and to initiate a discussion on what role edge computing could take, complementing curre… ▽ More

    Submitted 1 January, 2022; originally announced January 2022.

    Comments: 7 pages, 1 figure

  7. arXiv:2105.02045  [pdf, other

    cs.CV cs.AI

    Bayesian Logistic Shape Model Inference: application to cochlea image segmentation

    Authors: Wang Zihao, Demarcy Thomas, Vandersteen Clair, Gnansia Dan, Raffaelli Charles, Guevara Nicolas, Delingette Hervé

    Abstract: Incorporating shape information is essential for the delineation of many organs and anatomical structures in medical images. While previous work has mainly focused on parametric spatial transformations applied on reference template shapes, in this paper, we address the Bayesian inference of parametric shape models for segmenting medical images with the objective to provide interpretable results. T… ▽ More

    Submitted 5 May, 2021; originally announced May 2021.

  8. arXiv:2104.12510  [pdf, other

    cs.CV

    Inner-ear Augmented Metal Artifact Reduction with Simulation-based 3D Generative Adversarial Networks

    Authors: Wang Zihao, Vandersteen Clair, Demarcy Thomas, Gnansia Dan, Raffaelli Charles, Guevara Nicolas, Delingette Herve

    Abstract: Metal Artifacts creates often difficulties for a high quality visual assessment of post-operative imaging in {c}omputed {t}omography (CT). A vast body of methods have been proposed to tackle this issue, but {these} methods were designed for regular CT scans and their performance is usually insufficient when imaging tiny implants. In the context of post-operative high-resolution {CT} imaging, we pr… ▽ More

    Submitted 26 April, 2021; originally announced April 2021.

  9. arXiv:2104.08111  [pdf, other

    cs.NI eess.SP

    NeuroRAN: Rethinking Virtualization for AI-native Radio Access Networks in 6G

    Authors: Paris Carbone, Gyoergy Dan, James Gross, Bo Goeransson, Marina Petrova

    Abstract: Network softwarization has revolutionized the architecture of cellular wireless networks. State-of-the-art container based virtual radio access networks (vRAN) provide enormous flexibility and reduced life cycle management costs, but they also come with prohibitive energy consumption. We argue that for future AI-native wireless networks to be flexible and energy efficient, there is a need for a ne… ▽ More

    Submitted 16 April, 2021; originally announced April 2021.

  10. arXiv:2001.07964  [pdf, other

    cs.NI eess.SP

    Joint Wireless and Edge Computing Resource Management with Dynamic Network Slice Selection

    Authors: Slađana Jošilo, György Dán

    Abstract: Network slicing is a promising approach for enabling low latency computation offloading in edge computing systems. In this paper, we consider an edge computing system under network slicing in which the wireless devices generate latency sensitive computational tasks. We address the problem of joint dynamic assignment of computational tasks to slices, management of radio resources across slices and… ▽ More

    Submitted 22 January, 2020; originally announced January 2020.

    Comments: 12 pages, 7 figures

  11. arXiv:1705.08252  [pdf, ps, other

    cs.CV

    Distributed Algorithms for Feature Extraction Off-loading in Multi-Camera Visual Sensor Networks

    Authors: Emil Eriksson, György Dán, Viktoria Fodor

    Abstract: Real-time visual analysis tasks, like tracking and recognition, require swift execution of computationally intensive algorithms. Visual sensor networks can be enabled to perform such tasks by augmenting the sensor network with processing nodes and distributing the computational burden in a way that the cameras contend for the processing nodes while trying to minimize their task completion times. I… ▽ More

    Submitted 15 May, 2017; originally announced May 2017.

    Comments: 12 pages, 7 figures, submitted to Transactions on Circuits and Systems for Video Technology

  12. arXiv:1704.02790  [pdf, other

    cs.MM cs.NI cs.PF

    Performance Analysis of Reliable Video Streaming with Strict Playout Deadline in Multi-Hop Wireless Networks

    Authors: Hussein Al-Zubaidy, Viktoria Fodor, György Dán, Markus Flierl

    Abstract: Motivated by emerging vision-based intelligent services, we consider the problem of rate adaptation for high quality and low delay visual information delivery over wireless networks using scalable video coding. Rate adaptation in this setting is inherently challenging due to the interplay between the variability of the wireless channels, the queuing at the network nodes and the frame-based decodin… ▽ More

    Submitted 10 April, 2017; originally announced April 2017.

    Comments: 33 single column pages, 10 figures

  13. arXiv:1604.05460  [pdf, other

    cs.NI

    Selfish Computation Offloading for Mobile Cloud Computing in Dense Wireless Networks

    Authors: Slađana Jošilo, György Dán

    Abstract: Offloading computation to a mobile cloud is a promising solution to augment the computation capabilities of mobile devices. In this paper we consider selfish mobile devices in a dense wireless network, in which individual mobile devices can offload computations via multiple access points (APs) to a mobile cloud so as to minimize their computation costs, and we provide a game theoretical analysis o… ▽ More

    Submitted 19 April, 2016; originally announced April 2016.

    Comments: 10 pages, 6 figures

  14. arXiv:1603.09490  [pdf, ps, other

    cs.NI

    Stochastic Dynamic Cache Partitioning for Encrypted Content Delivery

    Authors: Andrea Araldo, Gyorgy Dan, Dario Rossi

    Abstract: In-network caching is an appealing solution to cope with the increasing bandwidth demand of video, audio and data transfer over the Internet. Nonetheless, an increasing share of content delivery services adopt encryption through HTTPS, which is not compatible with traditional ISP-managed approaches like transparent and proxy caching. This raises the need for solutions involving both Internet Servi… ▽ More

    Submitted 27 June, 2016; v1 submitted 31 March, 2016; originally announced March 2016.

    ACM Class: C.2.1; C.2.3

  15. arXiv:1011.1828  [pdf, other

    math.OC cs.NI physics.soc-ph

    A Cyber Security Study of a SCADA Energy Management System: Stealthy Deception Attacks on the State Estimator

    Authors: André Teixeira, György Dán, Henrik Sandberg, Karl H. Johansson

    Abstract: The electrical power network is a critical infrastructure in today's society, so its safe and reliable operation is of major concern. State estimators are commonly used in power networks, for example, to detect faulty equipment and to optimally route power flows. The estimators are often located in control centers, to which large numbers of measurements are sent over unencrypted communication chan… ▽ More

    Submitted 8 November, 2010; originally announced November 2010.

    Comments: Modified version submitted to the 18th IFAC World Congress, 2011. The paper has 11 pages and 4 figures