Zum Hauptinhalt springen

Showing 1–8 of 8 results for author: Khoury, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.03374  [pdf, other

    cs.SE cs.AI

    LLM-Powered Code Vulnerability Repair with Reinforcement Learning and Semantic Reward

    Authors: Nafis Tanveer Islam, Joseph Khoury, Andrew Seong, Mohammad Bahrami Karkevandi, Gonzalo De La Torre Parra, Elias Bou-Harb, Peyman Najafirad

    Abstract: In software development, the predominant emphasis on functionality often supersedes security concerns, a trend gaining momentum with AI-driven automation tools like GitHub Copilot. These tools significantly improve developers' efficiency in functional code development. Nevertheless, it remains a notable concern that such tools are also responsible for creating insecure code, predominantly because… ▽ More

    Submitted 21 February, 2024; v1 submitted 6 January, 2024; originally announced January 2024.

  2. arXiv:2309.13541  [pdf, other

    cs.DC cs.NI

    Efficient All-to-All Collective Communication Schedules for Direct-Connect Topologies

    Authors: Prithwish Basu, Liangyu Zhao, Jason Fantl, Siddharth Pal, Arvind Krishnamurthy, Joud Khoury

    Abstract: The all-to-all collective communications primitive is widely used in machine learning (ML) and high performance computing (HPC) workloads, and optimizing its performance is of interest to both ML and HPC communities. All-to-all is a particularly challenging workload that can severely strain the underlying interconnect bandwidth at scale. This paper takes a holistic approach to optimize the perform… ▽ More

    Submitted 25 April, 2024; v1 submitted 23 September, 2023; originally announced September 2023.

    Comments: HPDC '24

  3. arXiv:2202.03356  [pdf, other

    cs.NI cs.DC cs.LG

    Efficient Direct-Connect Topologies for Collective Communications

    Authors: Liangyu Zhao, Siddharth Pal, Tapan Chugh, Weiyang Wang, Jason Fantl, Prithwish Basu, Joud Khoury, Arvind Krishnamurthy

    Abstract: We consider the problem of distilling efficient network topologies for collective communications. We provide an algorithmic framework for constructing direct-connect topologies optimized for the latency vs. bandwidth trade-off associated with the workload. Our approach synthesizes many different topologies and schedules for a given cluster size and degree and then identifies the appropriate topolo… ▽ More

    Submitted 12 May, 2024; v1 submitted 7 February, 2022; originally announced February 2022.

  4. arXiv:2106.16174  [pdf, other

    q-bio.QM cs.CV cs.LG eess.IV

    Hierarchical Phenotyping and Graph Modeling of Spatial Architecture in Lymphoid Neoplasms

    Authors: Pingjun Chen, Muhammad Aminu, Siba El Hussein, Joseph D. Khoury, Jia Wu

    Abstract: The cells and their spatial patterns in the tumor microenvironment (TME) play a key role in tumor evolution, and yet the latter remains an understudied topic in computational pathology. This study, to the best of our knowledge, is among the first to hybridize local and global graph methods to profile orchestration and interaction of cellular components. To address the challenge in hematolymphoid c… ▽ More

    Submitted 19 September, 2021; v1 submitted 30 June, 2021; originally announced June 2021.

    Comments: Accepted by MICCAI2021

    MSC Class: 68T01 (Primary) ACM Class: I.2.10

  5. arXiv:2005.12676  [pdf, other

    cs.CR cs.CY

    SNARKs to the rescue: proof-of-contact in zero knowledge

    Authors: Zachary Ratliff, Joud Khoury

    Abstract: This paper describes techniques to help with COVID-19 automated contact tracing, and with the restoration efforts. We describe a decentralized protocol for ``proof-of-contact'' in zero knowledge where a person can publish a short cryptographic proof attesting to the fact that they have been infected and that they have come in contact with a set of people without revealing any information about any… ▽ More

    Submitted 20 July, 2020; v1 submitted 26 May, 2020; originally announced May 2020.

    Comments: 10 pages, early draft

  6. arXiv:0909.3558  [pdf, ps, other

    cs.GT cs.NI

    Route Distribution Incentives

    Authors: Joud Khoury, Chaouki T. Abdallah, Kate Krause, Jorge Crichigno

    Abstract: We present an incentive model for route distribution in the context of path vector routing protocols and we focus on the Border Gateway Protocol (BGP). BGP is the de-facto protocol for interdomain routing on the Internet. We model BGP route distribution and computation using a game in which a BGP speaker advertises its prefix to its direct neighbors promising them a reward for further distributi… ▽ More

    Submitted 19 September, 2009; originally announced September 2009.

    Comments: 15 page, lncs format, 2 figures, workshop

    ACM Class: C.2.2; J.4

  7. arXiv:cs/0610100  [pdf

    cs.NI cs.IT

    A Mobile Transient Internet Architecture

    Authors: Henry N Jerez, Joud Khoury, Chaouki Abdallah

    Abstract: This paper describes a new architecture for transient mobile networks destined to merge existing and future network architectures, communication implementations and protocol operations by introducing a new paradigm to data delivery and identification. The main goal of our research is to enable seamless end-to-end communication between mobile and stationary devices across multiple networks and th… ▽ More

    Submitted 17 October, 2006; originally announced October 2006.

    ACM Class: C.2.1

  8. arXiv:cs/0610087  [pdf

    cs.NI

    An Application of the Mobile Transient Internet Architecture to IP Mobility and Inter-Operability

    Authors: Joud Khoury, Henry N Jerez, Nicolas Nehme-Antoun, Chaouki Abdallah

    Abstract: We introduce an application of a mobile transient network architecture on top of the current Internet. This paper is an application extension to a conceptual mobile network architecture. It attempts to specifically reinforce some of the powerful notions exposed by the architecture from an application perspective. Of these notions, we explore the network expansion layer, an overlay of components… ▽ More

    Submitted 13 October, 2006; originally announced October 2006.

    ACM Class: C.2.6