Zum Hauptinhalt springen

Showing 1–32 of 32 results for author: Khamis, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.04135  [pdf, other

    cs.AI

    In-context Learning for Automated Driving Scenarios

    Authors: Ziqi Zhou, Jingyue Zhang, Jingyuan Zhang, Boyue Wang, Tianyu Shi, Alaa Khamis

    Abstract: One of the key challenges in current Reinforcement Learning (RL)-based Automated Driving (AD) agents is achieving flexible, precise, and human-like behavior cost-effectively. This paper introduces an innovative approach utilizing Large Language Models (LLMs) to intuitively and effectively optimize RL reward functions in a human-centric way. We developed a framework where instructions and dynamic e… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: 7 pages, 6 figures, 35 references

  2. arXiv:2402.02001  [pdf, ps, other

    cs.DB cs.IT

    PANDA: Query Evaluation in Submodular Width

    Authors: Mahmoud Abo Khamis, Hung Q. Ngo, Dan Suciu

    Abstract: In recent years, several information-theoretic upper bounds have been introduced on the output size and evaluation cost of database join queries. These bounds vary in their power depending on both the type of statistics on input relations and the query plans that they support. This motivated the search for algorithms that can compute the output of a join query in times that are bounded by the corr… ▽ More

    Submitted 3 June, 2024; v1 submitted 2 February, 2024; originally announced February 2024.

  3. arXiv:2312.09331  [pdf, ps, other

    cs.DB

    Insert-Only versus Insert-Delete in Dynamic Query Evaluation

    Authors: Mahmoud Abo Khamis, Ahmet Kara, Dan Olteanu, Dan Suciu

    Abstract: We study the dynamic query evaluation problem: Given a join query Q and a sequence of updates, we would like to construct a data structure that supports constant-delay enumeration of the query output after each update. We show that a sequence of N insert-only updates (to an initially empty database) can be executed in total time O(N^{w(Q)}), where w(Q) is the fractional hypertree width of Q. Thi… ▽ More

    Submitted 23 August, 2024; v1 submitted 14 December, 2023; originally announced December 2023.

  4. arXiv:2310.03333  [pdf, other

    cs.CV

    Real-time Multi-modal Object Detection and Tracking on Edge for Regulatory Compliance Monitoring

    Authors: Jia Syuen Lim, Ziwei Wang, Jiajun Liu, Abdelwahed Khamis, Reza Arablouei, Robert Barlow, Ryan McAllister

    Abstract: Regulatory compliance auditing across diverse industrial domains requires heightened quality assurance and traceability. Present manual and intermittent approaches to such auditing yield significant challenges, potentially leading to oversights in the monitoring process. To address these issues, we introduce a real-time, multi-modal sensing system employing 3D time-of-flight and RGB cameras, coupl… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

  5. ICML 2023 Topological Deep Learning Challenge : Design and Results

    Authors: Mathilde Papillon, Mustafa Hajij, Helen Jenne, Johan Mathe, Audun Myers, Theodore Papamarkou, Tolga Birdal, Tamal Dey, Tim Doster, Tegan Emerson, Gurusankar Gopalakrishnan, Devendra Govil, Aldo Guzmán-Sáenz, Henry Kvinge, Neal Livesay, Soham Mukherjee, Shreyas N. Samaga, Karthikeyan Natesan Ramamurthy, Maneel Reddy Karri, Paul Rosen, Sophia Sanborn, Robin Walters, Jens Agerberg, Sadrodin Barikbin, Claudio Battiloro , et al. (31 additional authors not shown)

    Abstract: This paper presents the computational challenge on topological deep learning that was hosted within the ICML 2023 Workshop on Topology and Geometry in Machine Learning. The competition asked participants to provide open-source implementations of topological neural networks from the literature by contributing to the python packages TopoNetX (data processing) and TopoModelX (deep learning). The chal… ▽ More

    Submitted 18 January, 2024; v1 submitted 26 September, 2023; originally announced September 2023.

  6. arXiv:2308.10146  [pdf, other

    cs.CV cs.LG

    OCHID-Fi: Occlusion-Robust Hand Pose Estimation in 3D via RF-Vision

    Authors: Shujie Zhang, Tianyue Zheng, Zhe Chen, Jingzhi Hu, Abdelwahed Khamis, Jiajun Liu, Jun Luo

    Abstract: Hand Pose Estimation (HPE) is crucial to many applications, but conventional cameras-based CM-HPE methods are completely subject to Line-of-Sight (LoS), as cameras cannot capture occluded objects. In this paper, we propose to exploit Radio-Frequency-Vision (RF-vision) capable of bypassing obstacles for achieving occluded HPE, and we introduce OCHID-Fi as the first RF-HPE method with 3D pose estima… ▽ More

    Submitted 19 August, 2023; originally announced August 2023.

    Comments: Accepted to ICCV 2023

  7. arXiv:2306.14075  [pdf, ps, other

    cs.DB cs.IT

    Join Size Bounds using Lp-Norms on Degree Sequences

    Authors: Mahmoud Abo Khamis, Vasileios Nakos, Dan Olteanu, Dan Suciu

    Abstract: Estimating the output size of a query is a fundamental yet longstanding problem in database query processing. Traditional cardinality estimators used by database systems can routinely underestimate the true output size by orders of magnitude, which leads to significant system performance penalty. Recently, upper bounds have been proposed that are based on information inequalities and incorporate s… ▽ More

    Submitted 5 June, 2024; v1 submitted 24 June, 2023; originally announced June 2023.

  8. Scalable Optimal Transport Methods in Machine Learning: A Contemporary Survey

    Authors: Abdelwahed Khamis, Russell Tsuchida, Mohamed Tarek, Vivien Rolland, Lars Petersson

    Abstract: Optimal Transport (OT) is a mathematical framework that first emerged in the eighteenth century and has led to a plethora of methods for answering many theoretical and applied questions. The last decade has been a witness to the remarkable contributions of this classical optimization problem to machine learning. This paper is about where and how optimal transport is used in machine learning with a… ▽ More

    Submitted 21 March, 2024; v1 submitted 8 May, 2023; originally announced May 2023.

    Comments: Accepted @ TPAMI 24

    Journal ref: IEEE Transactions on Pattern Analysis and Machine Intelligence 2024

  9. Topological Deep Learning: A Review of an Emerging Paradigm

    Authors: Ali Zia, Abdelwahed Khamis, James Nichols, Zeeshan Hayder, Vivien Rolland, Lars Petersson

    Abstract: Topological data analysis (TDA) provides insight into data shape. The summaries obtained by these methods are principled global descriptions of multi-dimensional data whilst exhibiting stable properties such as robustness to deformation and noise. Such properties are desirable in deep learning pipelines but they are typically obtained using non-TDA strategies. This is partly caused by the difficul… ▽ More

    Submitted 7 February, 2023; originally announced February 2023.

    Comments: 7 pages and 2 references

  10. arXiv:2202.10390  [pdf, other

    cs.DB

    Optimizing Recursive Queries with Program Synthesis

    Authors: Yisu Remy Wang, Mahmoud Abo Khamis, Hung Q. Ngo, Reinhard Pichler, Dan Suciu

    Abstract: Most work on query optimization has concentrated on loop-free queries. However, data science and machine learning workloads today typically involve recursive or iterative computation. In this work, we propose a novel framework for optimizing recursive queries using methods from program synthesis. In particular, we introduce a simple yet powerful optimization rule called the "FGH-rule" which aims t… ▽ More

    Submitted 21 February, 2022; originally announced February 2022.

  11. arXiv:2108.12801  [pdf, other

    cs.LG cs.AI

    Markov Switching Model for Driver Behavior Prediction: Use cases on Smartphones

    Authors: Ahmed B. Zaky, Mohamed A. Khamis, Walid Gomaa

    Abstract: Several intelligent transportation systems focus on studying the various driver behaviors for numerous objectives. This includes the ability to analyze driver actions, sensitivity, distraction, and response time. As the data collection is one of the major concerns for learning and validating different driving situations, we present a driver behavior switching model validated by a low-cost data col… ▽ More

    Submitted 29 August, 2021; originally announced August 2021.

  12. arXiv:2106.13342  [pdf, other

    cs.DB cs.DS

    The Complexity of Boolean Conjunctive Queries with Intersection Joins

    Authors: Mahmoud Abo Khamis, George Chichirim, Antonia Kormpa, Dan Olteanu

    Abstract: Intersection joins over interval data are relevant in spatial and temporal data settings. A set of intervals join if their intersection is non-empty. In case of point intervals, the intersection join becomes the standard equality join. We establish the complexity of Boolean conjunctive queries with intersection joins by a many-one equivalence to disjunctions of Boolean conjunctive queries with e… ▽ More

    Submitted 14 April, 2022; v1 submitted 24 June, 2021; originally announced June 2021.

  13. arXiv:2105.14435  [pdf, ps, other

    cs.DB

    Convergence of Datalog over (Pre-) Semirings

    Authors: Mahmoud Abo Khamis, Hung Q. Ngo, Reinhard Pichler, Dan Suciu, Yisu Remy Wang

    Abstract: Recursive queries have been traditionally studied in the framework of datalog, a language that restricts recursion to monotone queries over sets, which is guaranteed to converge in polynomial time in the size of the input. But modern big data systems require recursive computations beyond the Boolean space. In this paper we study the convergence of datalog when it is interpreted over an arbitrary s… ▽ More

    Submitted 24 January, 2024; v1 submitted 30 May, 2021; originally announced May 2021.

  14. Deep Learning for Radio-based Human Sensing: Recent Advances and Future Directions

    Authors: Isura Nirmal, Abdelwahed Khamis, Mahbub Hassan, Wen Hu, Xiaoqing Zhu

    Abstract: While decade-long research has clearly demonstrated the vast potential of radio frequency (RF) for many human sensing tasks, scaling this technology to large scenarios remained problematic with conventional approaches. Recently, researchers have successfully applied deep learning to take radio-based sensing to a new level. Many different types of deep learning models have been proposed to achieve… ▽ More

    Submitted 7 February, 2021; v1 submitted 23 October, 2020; originally announced October 2020.

    Journal ref: 23, 2021, 995-1019

  15. arXiv:2007.04472  [pdf, other

    cs.LG stat.ML

    Evaluation of Adversarial Training on Different Types of Neural Networks in Deep Learning-based IDSs

    Authors: Rana Abou Khamis, Ashraf Matrawy

    Abstract: Network security applications, including intrusion detection systems of deep neural networks, are increasing rapidly to make detection task of anomaly activities more accurate and robust. With the rapid increase of using DNN and the volume of data traveling through systems, different growing types of adversarial attacks to defeat them create a severe challenge. In this paper, we focus on investiga… ▽ More

    Submitted 8 July, 2020; originally announced July 2020.

  16. arXiv:2004.08783  [pdf, other

    cs.IT cs.CC

    Decision Problems in Information Theory

    Authors: Mahmoud Abo Khamis, Phokion G. Kolaitis, Hung Q. Ngo, Dan Suciu

    Abstract: Constraints on entropies are considered to be the laws of information theory. Even though the pursuit of their discovery has been a central theme of research in information theory, the algorithmic aspects of constraints on entropies remain largely unexplored. Here, we initiate an investigation of decision problems about constraints on entropies by placing several different such problems into level… ▽ More

    Submitted 27 April, 2020; v1 submitted 19 April, 2020; originally announced April 2020.

  17. arXiv:1910.14107  [pdf, other

    cs.LG stat.ML

    Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization

    Authors: Rana Abou Khamis, Omair Shafiq, Ashraf Matrawy

    Abstract: With the growth of adversarial attacks against machine learning models, several concerns have emerged about potential vulnerabilities in designing deep neural network-based intrusion detection systems (IDS). In this paper, we study the resilience of deep learning-based intrusion detection systems against adversarial attacks. We apply the min-max (or saddle-point) approach to train intrusion detect… ▽ More

    Submitted 30 October, 2019; originally announced October 2019.

  18. arXiv:1906.09727  [pdf, ps, other

    cs.DB cs.IT

    Bag Query Containment and Information Theory

    Authors: Mahmoud Abo Khamis, Phokion G. Kolaitis, Hung Q. Ngo, Dan Suciu

    Abstract: The query containment problem is a fundamental algorithmic problem in data management. While this problem is well understood under set semantics, it is by far less understood under bag semantics. In particular, it is a long-standing open question whether or not the conjunctive query containment problem under bag semantics is decidable. We unveil tight connections between information theory and the… ▽ More

    Submitted 5 July, 2021; v1 submitted 24 June, 2019; originally announced June 2019.

  19. arXiv:1906.08687  [pdf, other

    cs.DB

    A Layered Aggregate Engine for Analytics Workloads

    Authors: Maximilian Schleich, Dan Olteanu, Mahmoud Abo Khamis, Hung Q. Ngo, XuanLong Nguyen

    Abstract: This paper introduces LMFAO (Layered Multiple Functional Aggregate Optimization), an in-memory optimization and execution engine for batches of aggregates over the input database. The primary motivation for this work stems from the observation that for a variety of analytics over databases, their data-intensive tasks can be decomposed into group-by aggregates over the join of the input database re… ▽ More

    Submitted 20 June, 2019; originally announced June 2019.

    Comments: 18 pages, 7 figures, 4 tables

    ACM Class: H.2.4; I.2.6

  20. H2B: Heartbeat-based Secret Key Generation Using Piezo Vibration Sensors

    Authors: Qi Lin, Weitao Xu, Jun Liu, Abdelwahed Khamis, Wen Hu, Mahbub Hassan, Aruna Seneviratne

    Abstract: We present Heartbeats-2-Bits (H2B), which is a system for securely pairing wearable devices by generating a shared secret key from the skin vibrations caused by heartbeat. This work is motivated by potential power saving opportunity arising from the fact that heartbeat intervals can be detected energy-efficiently using inexpensive and power-efficient piezo sensors, which obviates the need to emplo… ▽ More

    Submitted 19 February, 2019; originally announced April 2019.

  21. arXiv:1812.09526  [pdf, ps, other

    cs.DB cs.DS cs.IT cs.LG

    Functional Aggregate Queries with Additive Inequalities

    Authors: Mahmoud Abo Khamis, Ryan R. Curtin, Benjamin Moseley, Hung Q. Ngo, XuanLong Nguyen, Dan Olteanu, Maximilian Schleich

    Abstract: Motivated by fundamental applications in databases and relational machine learning, we formulate and study the problem of answering functional aggregate queries (FAQ) in which some of the input factors are defined by a collection of additive inequalities between variables. We refer to these queries as FAQ-AI for short. To answer FAQ-AI in the Boolean semiring, we define relaxed tree decompositio… ▽ More

    Submitted 15 September, 2020; v1 submitted 22 December, 2018; originally announced December 2018.

  22. arXiv:1808.09806  [pdf, other

    eess.SY cs.AI

    MARL-FWC: Optimal Coordination of Freeway Traffic Control Measures

    Authors: Ahmed Fares, Walid Gomaa, Mohamed A. Khamis

    Abstract: The objective of this article is to optimize the overall traffic flow on freeways using multiple ramp metering controls plus its complementary Dynamic Speed Limits (DSLs). An optimal freeway operation can be reached when minimizing the difference between the freeway density and the critical ratio for maximum traffic flow. In this article, a Multi-Agent Reinforcement Learning for Freeways Control (… ▽ More

    Submitted 27 August, 2018; originally announced August 2018.

  23. arXiv:1803.07480  [pdf, other

    cs.DB

    AC/DC: In-Database Learning Thunderstruck

    Authors: Mahmoud Abo Khamis, Hung Q. Ngo, XuanLong Nguyen, Dan Olteanu, Maximilian Schleich

    Abstract: We report on the design and implementation of the AC/DC gradient descent solver for a class of optimization problems over normalized databases. AC/DC decomposes an optimization problem into a set of aggregates over the join of the database relations. It then uses the answers to these aggregates to iteratively improve the solution to the problem until it converges. The challenges faced by AC/DC a… ▽ More

    Submitted 15 June, 2018; v1 submitted 20 March, 2018; originally announced March 2018.

    Comments: 10 pages, 3 figures

    ACM Class: H.2.4; I.2.6

  24. arXiv:1712.07445  [pdf, ps, other

    cs.DB cs.DM math.CO

    Boolean Tensor Decomposition for Conjunctive Queries with Negation

    Authors: Mahmoud Abo Khamis, Hung Q. Ngo, Dan Olteanu, Dan Suciu

    Abstract: We propose an algorithm for answering conjunctive queries with negation, where the negated relations have bounded degree. Its data complexity matches that of the best known algorithms for the positive subquery of the input query and is expressed in terms of the fractional hypertree width and the submodular width. The query complexity depends on the structure of the negated subquery; in general it… ▽ More

    Submitted 27 January, 2019; v1 submitted 20 December, 2017; originally announced December 2017.

  25. arXiv:1703.04780  [pdf, other

    cs.DB

    Learning Models over Relational Data using Sparse Tensors and Functional Dependencies

    Authors: Mahmoud Abo Khamis, Hung Q. Ngo, XuanLong Nguyen, Dan Olteanu, Maximilian Schleich

    Abstract: Integrated solutions for analytics over relational databases are of great practical importance as they avoid the costly repeated loop data scientists have to deal with on a daily basis: select features from data residing in relational databases using feature extraction queries involving joins, projections, and aggregations; export the training dataset defined by such queries; convert this dataset… ▽ More

    Submitted 6 February, 2020; v1 submitted 14 March, 2017; originally announced March 2017.

    Comments: 61 pages, 9 figures, 2 tables

    ACM Class: H.2.4; I.2.6

  26. arXiv:1703.03147  [pdf, ps, other

    cs.DB cs.DS cs.LO

    Juggling Functions Inside a Database

    Authors: Mahmoud Abo Khamis, Hung Q. Ngo, Atri Rudra

    Abstract: We define and study the Functional Aggregate Query (FAQ) problem, which captures common computational tasks across a very wide range of domains including relational databases, logic, matrix and tensor computation, probabilistic graphical models, constraint satisfaction, and signal processing. Simply put, an FAQ is a declarative way of defining a new function from a database of input functions. W… ▽ More

    Submitted 9 March, 2017; originally announced March 2017.

    Comments: arXiv admin note: text overlap with arXiv:1504.04044

  27. arXiv:1612.02503  [pdf, ps, other

    cs.DB cs.DS cs.IT

    What do Shannon-type Inequalities, Submodular Width, and Disjunctive Datalog have to do with one another?

    Authors: Mahmoud Abo Khamis, Hung Q. Ngo, Dan Suciu

    Abstract: Recent works on bounding the output size of a conjunctive query with functional dependencies and degree constraints have shown a deep connection between fundamental questions in information theory and database theory. We prove analogous output bounds for disjunctive datalog rules, and answer several open questions regarding the tightness and looseness of these bounds along the way. Our bounds are… ▽ More

    Submitted 23 December, 2023; v1 submitted 7 December, 2016; originally announced December 2016.

  28. arXiv:1604.00111  [pdf, ps, other

    cs.DB cs.DS cs.IT

    Computing Join Queries with Functional Dependencies

    Authors: Mahmoud Abo Khamis, Hung Q. Ngo, Dan Suciu

    Abstract: Recently, Gottlob, Lee, Valiant, and Valiant (GLVV) presented an output size bound for join queries with functional dependencies (FD), based on a linear program on polymatroids. GLVV bound strictly generalizes the bound of Atserias, Grohe and Marx (AGM) for queries with no FD, in which case there are known algorithms running within AGM bound and thus are worst-case optimal. A main result of this… ▽ More

    Submitted 6 April, 2016; v1 submitted 31 March, 2016; originally announced April 2016.

  29. arXiv:1504.04044  [pdf, ps, other

    cs.DB cs.DS cs.LO

    FAQ: Questions Asked Frequently

    Authors: Mahmoud Abo Khamis, Hung Q. Ngo, Atri Rudra

    Abstract: We define and study the Functional Aggregate Query (FAQ) problem, which encompasses many frequently asked questions in constraint satisfaction, databases, matrix operations, probabilistic graphical models and logic. This is our main conceptual contribution. We then present a simple algorithm called "InsideOut" to solve this general problem. InsideOut is a variation of the traditional dynamic pro… ▽ More

    Submitted 23 December, 2023; v1 submitted 15 April, 2015; originally announced April 2015.

  30. arXiv:1409.1656  [pdf

    cs.SE

    An Aspect-Oriented Approach for SaaS Application Customization

    Authors: Ashraf A. Shahin, Areeg Samir, Abdelaziz Khamis

    Abstract: Multi-tenancy is one of the most important concepts for any Software as a Service (SaaS) application. Multi-tenant SaaS application serves a large number of tenants with one single application instance. Complex SaaS application that serves significant number of tenants could have a huge number of customizations with complicated relationships, which increases the customization complexity and reduce… ▽ More

    Submitted 12 September, 2014; v1 submitted 4 September, 2014; originally announced September 2014.

    Comments: 48th Conference on Statistics, Computer Science and Operations Research, Cairo University, Egypt, 2013

  31. arXiv:1404.5190  [pdf, other

    cs.IT

    Sparse Approximation, List Decoding, and Uncertainty Principles

    Authors: Mahmoud Abo Khamis, Anna C. Gilbert, Hung Q. Ngo, Atri Rudra

    Abstract: We consider list versions of sparse approximation problems, where unlike the existing results in sparse approximation that consider situations with unique solutions, we are interested in multiple solutions. We introduce these problems and present the first combinatorial results on the output list size. These generalize and enhance some of the existing results on threshold phenomenon and uncertaint… ▽ More

    Submitted 8 August, 2014; v1 submitted 18 April, 2014; originally announced April 2014.

  32. arXiv:1404.0703  [pdf, other

    cs.DB cs.DS

    Joins via Geometric Resolutions: Worst-case and Beyond

    Authors: Mahmoud Abo Khamis, Hung Q. Ngo, Christopher Ré, Atri Rudra

    Abstract: We present a simple geometric framework for the relational join. Using this framework, we design an algorithm that achieves the fractional hypertree-width bound, which generalizes classical and recent worst-case algorithmic results on computing joins. In addition, we use our framework and the same algorithm to show a series of what are colloquially known as beyond worst-case results. The framework… ▽ More

    Submitted 23 December, 2016; v1 submitted 2 April, 2014; originally announced April 2014.