Zum Hauptinhalt springen

Showing 1–22 of 22 results for author: Govindan, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.00555  [pdf

    eess.IV cs.CV

    Length-scale study in deep learning prediction for non-small cell lung cancer brain metastasis

    Authors: Haowen Zhou, Steven, Lin, Mark Watson, Cory T. Bernadt, Oumeng Zhang, Ramaswamy Govindan, Richard J. Cote, Changhuei Yang

    Abstract: Deep learning assisted digital pathology has the potential to impact clinical practice in significant ways. In recent studies, deep neural network (DNN) enabled analysis outperforms human pathologists. Increasing sizes and complexity of the DNN architecture generally improves performance at the cost of DNN's explainability. For pathology, this lack of DNN explainability is particularly problematic… ▽ More

    Submitted 1 June, 2024; originally announced June 2024.

  2. arXiv:2311.12779  [pdf, other

    cs.NI cs.GT

    Finding Adversarial Inputs for Heuristics using Multi-level Optimization

    Authors: Pooria Namyar, Behnaz Arzani, Ryan Beckett, Santiago Segarra, Himanshu Raj, Umesh Krishnaswamy, Ramesh Govindan, Srikanth Kandula

    Abstract: Production systems use heuristics because they are faster or scale better than their optimal counterparts. Yet, practitioners are often unaware of the performance gap between a heuristic and the optimum or between two heuristics in realistic scenarios. We present MetaOpt, a system that helps analyze heuristics. Users specify the heuristic and the optimal (or another heuristic) as input, and MetaOp… ▽ More

    Submitted 21 November, 2023; originally announced November 2023.

  3. arXiv:2310.09699  [pdf, other

    cs.NI cs.DC

    Solving Max-Min Fair Resource Allocations Quickly on Large Graphs

    Authors: Pooria Namyar, Behnaz Arzani, Srikanth Kandula, Santiago Segarra, Daniel Crankshaw, Umesh Krishnaswamy, Ramesh Govindan, Himanshu Raj

    Abstract: We consider the max-min fair resource allocation problem. The best-known solutions use either a sequence of optimizations or waterfilling, which only applies to a narrow set of cases. These solutions have become a practical bottleneck in WAN traffic engineering and cluster scheduling, especially at larger problem sizes. We improve both approaches: (1) we show how to convert the optimization sequen… ▽ More

    Submitted 14 October, 2023; originally announced October 2023.

    Comments: Accepted to USENIX NSDI 2024

  4. arXiv:2309.12665  [pdf, other

    cs.DC

    Lovelock: Towards Smart NIC-hosted Clusters

    Authors: Seo Jin Park, Ramesh Govindan, Kai Shen, David Culler, Fatma Özcan, Geon-Woo Kim, Hank Levy

    Abstract: Traditional cluster designs were originally server-centric, and have evolved recently to support hardware acceleration and storage disaggregation. In applications that leverage acceleration, the server CPU performs the role of orchestrating computation and data movement and data-intensive applications stress the memory bandwidth. Applications that leverage disaggregation can be adversely affected… ▽ More

    Submitted 22 September, 2023; originally announced September 2023.

  5. arXiv:2305.13792  [pdf, other

    cs.NI

    Mitigating the Performance Impact of Network Failures in Public Clouds

    Authors: Pooria Namyar, Behnaz Arzani, Daniel Crankshaw, Daniel S. Berger, Kevin Hsieh, Srikanth Kandula, Ramesh Govindan

    Abstract: Some faults in data center networks require hours to days to repair because they may need reboots, re-imaging, or manual work by technicians. To reduce traffic impact, cloud providers \textit{mitigate} the effect of faults, for example, by steering traffic to alternate paths. The state-of-art in automatic network mitigations uses simple safety checks and proxy metrics to determine mitigations. SWA… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

  6. arXiv:2305.01890  [pdf, other

    cs.NI cs.DC

    Scheduling Network Function Chains Under Sub-Millisecond Latency SLOs

    Authors: Jianfeng Wang, Siddhant Gupta, Marcos A. M. Vieira, Barath Raghavan, Ramesh Govindan

    Abstract: Network Function Virtualization (NFV) seeks to replace hardware middleboxes with software-based Network Functions (NFs). NFV systems are seeing greater deployment in the cloud and at the edge. However, especially at the edge, there is a mismatch between the traditional focus on NFV throughput and the need to meet very low latency SLOs, as edge services inherently require low latency. Moreover, clo… ▽ More

    Submitted 3 May, 2023; originally announced May 2023.

    Comments: 12 pages + 3 pages (reference)

    ACM Class: C.0; C.2.1

  7. arXiv:2207.08930  [pdf, other

    cs.RO

    Cooperative Infrastructure Perception

    Authors: Fawad Ahmad, Christina Suyong Shin, Weiwu Pang, Branden Leong, Pradipta Ghosh, Ramesh Govindan

    Abstract: Recent works have considered two qualitatively different approaches to overcome line-of-sight limitations of 3D sensors used for perception: cooperative perception and infrastructure-augmented perception. In this paper, motivated by increasing deployments of infrastructure LiDARs, we explore a third approach, cooperative infrastructure perception. This approach generates perception outputs by fusi… ▽ More

    Submitted 26 June, 2024; v1 submitted 18 July, 2022; originally announced July 2022.

  8. arXiv:2112.14947  [pdf, other

    cs.NI cs.MA eess.SY

    AutoCast: Scalable Infrastructure-less Cooperative Perception for Distributed Collaborative Driving

    Authors: Hang Qiu, Pohan Huang, Namo Asavisanu, Xiaochen Liu, Konstantinos Psounis, Ramesh Govindan

    Abstract: Autonomous vehicles use 3D sensors for perception. Cooperative perception enables vehicles to share sensor readings with each other to improve safety. Prior work in cooperative perception scales poorly even with infrastructure support. AutoCast enables scalable infrastructure-less cooperative perception using direct vehicle-to-vehicle communication. It carefully determines which objects to share b… ▽ More

    Submitted 30 December, 2021; originally announced December 2021.

    Journal ref: ACM Mobisys 2022

  9. arXiv:2110.08374  [pdf, other

    cs.NI

    Gemini: Practical Reconfigurable Datacenter Networks with Topology and Traffic Engineering

    Authors: Mingyang Zhang, Jianan Zhang, Rui Wang, Ramesh Govindan, Jeffrey C. Mogul, Amin Vahdat

    Abstract: To reduce cost, datacenter network operators are exploring blocking network designs. An example of such a design is a "spine-free" form of a Fat-Tree, in which pods directly connect to each other, rather than via spine blocks. To maintain application-perceived performance in the face of dynamic workloads, these new designs must be able to reconfigure routing and the inter-pod topology. Gemini is a… ▽ More

    Submitted 15 October, 2021; originally announced October 2021.

  10. arXiv:2104.08634  [pdf, other

    cs.RO eess.SY

    AeroTraj: Trajectory Planning for Fast, and Accurate 3D Reconstruction Using a Drone-based LiDAR

    Authors: Fawad Ahmad, Christina Shin, Rajrup Ghosh, John D'Ambrosio, Eugene Chai, Karthik Sundaresan, Ramesh Govindan

    Abstract: This paper presents AeroTraj, a system that enables fast, accurate, and automated reconstruction of 3D models of large buildings using a drone-mounted LiDAR. LiDAR point clouds can be used directly to assemble 3D models if their positions are accurately determined. AeroTraj uses SLAM for this, but must ensure complete and accurate reconstruction while minimizing drone battery usage. Doing this req… ▽ More

    Submitted 26 June, 2024; v1 submitted 17 April, 2021; originally announced April 2021.

  11. arXiv:2101.06466  [pdf, other

    cs.DC cs.NI

    Galleon: Reshaping the Square Peg of NFV

    Authors: Jianfeng Wang, Tamás Lévai, Zhuojin Li, Marcos A. M. Vieira, Ramesh Govindan, Barath Raghavan

    Abstract: Software is often used for Network Functions (NFs) -- such as firewalls, NAT, deep packet inspection, and encryption -- that are applied to traffic in the network. The community has hoped that NFV would enable rapid development of new NFs and leverage commodity computing infrastructure. However, the challenge for researchers and operators has been to align the square peg of high-speed packet proce… ▽ More

    Submitted 16 January, 2021; originally announced January 2021.

    Comments: 14 pages

  12. arXiv:2010.04801  [pdf, other

    cs.NI

    Semi-Automated Protocol Disambiguation and Code Generation

    Authors: Jane Yen, Tamás Lévai, Qinyuan Ye, Xiang Ren, Ramesh Govindan, Barath Raghavan

    Abstract: For decades, Internet protocols have been specified using natural language. Given the ambiguity inherent in such text, it is not surprising that protocol implementations have long exhibited bugs. In this paper, we apply natural language processing (NLP) to effect semi-automated generation of protocol implementations from specification text. Our system, SAGE, can uncover ambiguous or under-specifie… ▽ More

    Submitted 1 February, 2021; v1 submitted 9 October, 2020; originally announced October 2020.

  13. arXiv:2006.13999  [pdf, other

    cs.LG cs.CV stat.ML

    MCAL: Minimum Cost Human-Machine Active Labeling

    Authors: Hang Qiu, Krishna Chintalapudi, Ramesh Govindan

    Abstract: Today, ground-truth generation uses data sets annotated by cloud-based annotation services. These services rely on human annotation, which can be prohibitively expensive. In this paper, we consider the problem of hybrid human-machine labeling, which trains a classifier to accurately auto-label part of the data set. However, training the classifier can be expensive too. We propose an iterative appr… ▽ More

    Submitted 26 February, 2023; v1 submitted 24 June, 2020; originally announced June 2020.

    Comments: ICLR 2023

  14. arXiv:2005.07338  [pdf, other

    cs.DC cs.CR cs.NI

    New Frontiers in IoT: Networking, Systems, Reliability, and Security Challenges

    Authors: Saurabh Bagchi, Tarek F. Abdelzaher, Ramesh Govindan, Prashant Shenoy, Akanksha Atrey, Pradipta Ghosh, Ran Xu

    Abstract: The field of IoT has blossomed and is positively influencing many application domains. In this paper, we bring out the unique challenges this field poses to research in computer systems and networking. The unique challenges arise from the unique characteristics of IoT systems such as the diversity of application domains where they are used and the increasingly demanding protocols they are being ca… ▽ More

    Submitted 14 May, 2020; originally announced May 2020.

    Comments: Invited paper to the IEEE IoT Journal

    ACM Class: B.8.1; C.2.1; D.4.5; K.6.5

  15. arXiv:2003.10664  [pdf, other

    cs.CV cs.LG eess.IV

    On Localizing a Camera from a Single Image

    Authors: Pradipta Ghosh, Xiaochen Liu, Hang Qiu, Marcos A. M. Vieira, Gaurav S. Sukhatme, Ramesh Govindan

    Abstract: Public cameras often have limited metadata describing their attributes. A key missing attribute is the precise location of the camera, using which it is possible to precisely pinpoint the location of events seen in the camera. In this paper, we explore the following question: under what conditions is it possible to estimate the location of a camera from a single image taken by the camera? We show… ▽ More

    Submitted 24 March, 2020; originally announced March 2020.

  16. arXiv:2002.04244  [pdf, other

    cs.NI cs.CC

    Rapid Top-Down Synthesis of Large-Scale IoT Networks

    Authors: Pradipta Ghosh, Jonathan Bunton, Dimitrios Pylorof, Marcos Vieira, Kevin Chan, Ramesh Govindan, Gaurav Sukhatme, Paulo Tabuada, Gunjan Verma

    Abstract: Advances in optimization and constraint satisfaction techniques, together with the availability of elastic computing resources, have spurred interest in large-scale network verification and synthesis. Motivated by this, we consider the top-down synthesis of ad-hoc IoT networks for disaster response and search and rescue operations. This synthesis problem must satisfy complex and competing constrai… ▽ More

    Submitted 27 March, 2020; v1 submitted 11 February, 2020; originally announced February 2020.

  17. arXiv:2001.01033  [pdf, other

    cs.CV cs.IR

    Grab: Fast and Accurate Sensor Processing for Cashier-Free Shopping

    Authors: Xiaochen Liu, Yurong Jiang, Kyu-Han Kim, Ramesh Govindan

    Abstract: Cashier-free shopping systems like Amazon Go improve shopping experience, but can require significant store redesign. In this paper, we propose Grab, a practical system that leverages existing infrastructure and devices to enable cashier-free shopping. Grab needs to accurately identify and track customers, and associate each shopper with items he or she retrieves from shelves. To do this, it uses… ▽ More

    Submitted 3 January, 2020; originally announced January 2020.

  18. arXiv:1912.11145  [pdf, other

    eess.IV cs.MM

    Reducing Storage in Large-Scale Photo Sharing Services using Recompression

    Authors: Xing Xu, Zahaib Akhtar, Wyatt Lloyd, Antonio Ortega, Ramesh Govindan

    Abstract: The popularity of photo sharing services has increased dramatically in recent years. Increases in users, quantity of photos, and quality/resolution of photos combined with the user expectation that photos are reliably stored indefinitely creates a growing burden on the storage backend of these services. We identify a new opportunity for storage savings with application-specific compression for pho… ▽ More

    Submitted 23 December, 2019; originally announced December 2019.

  19. arXiv:1811.03621  [pdf, other

    cs.HC cs.CV cs.LG eess.SY stat.ML

    Satyam: Democratizing Groundtruth for Machine Vision

    Authors: Hang Qiu, Krishna Chintalapudi, Ramesh Govindan

    Abstract: The democratization of machine learning (ML) has led to ML-based machine vision systems for autonomous driving, traffic monitoring, and video surveillance. However, true democratization cannot be achieved without greatly simplifying the process of collecting groundtruth for training and testing these systems. This groundtruth collection is necessary to ensure good performance under varying conditi… ▽ More

    Submitted 7 November, 2018; originally announced November 2018.

  20. arXiv:1512.00500  [pdf, other

    cs.SI

    Joint Source Selection and Data Extrapolation in Social Sensing for Disaster Response

    Authors: Mohammad Hosseini, Nooreddin Nagibolhosseini, Amotz Barnoy, Peter Terlecky, Hengchang Liu, Shaohan Hu, Shiguang Wang, Tanvir Amin, Lu Su, Dong Wang, Ramesh Govindan, Raghu Ganti, Mudhakar Srivatsa, Charu Aggrawal, Tarek Abdelzaher, Siyu Gu, Chenji Pan

    Abstract: This paper complements the large body of social sensing literature by developing means for augmenting sensing data with inference results that "fill-in" missing pieces. It specifically explores the synergy between (i) inference techniques used for filling-in missing pieces and (ii) source selection techniques used to determine which pieces to retrieve in order to improve inference results. We focu… ▽ More

    Submitted 1 December, 2015; originally announced December 2015.

    Comments: 24 pages, Technical Report, University of Illinois at Urbana-Champaign

    ACM Class: C.2.2; H.3.4

  21. arXiv:1302.5062  [pdf, other

    cs.CR cs.MM

    P3: Toward Privacy-Preserving Photo Sharing

    Authors: Moo-Ryong Ra, Ramesh Govindan, Antonio Ortega

    Abstract: With increasing use of mobile devices, photo sharing services are experiencing greater popularity. Aside from providing storage, photo sharing services enable bandwidth-efficient downloads to mobile devices by performing server-side image transformations (resizing, cropping). On the flip side, photo sharing services have raised privacy concerns such as leakage of photos to unauthorized viewers and… ▽ More

    Submitted 20 February, 2013; originally announced February 2013.

    Comments: 15 pages. Technical Report

  22. arXiv:1007.0515  [pdf, other

    q-fin.TR cs.DS cs.GT

    Liquidity in Credit Networks: A Little Trust Goes a Long Way

    Authors: Pranav Dandekar, Ashish Goel, Ramesh Govindan, Ian Post

    Abstract: Credit networks represent a way of modeling trust between entities in a network. Nodes in the network print their own currency and trust each other for a certain amount of each other's currency. This allows the network to serve as a decentralized payment infrastructure---arbitrary payments can be routed through the network by passing IOUs between trusting nodes in their respective currencies---and… ▽ More

    Submitted 20 February, 2012; v1 submitted 3 July, 2010; originally announced July 2010.

    Comments: Version that appeared in ACM EC '11