Dheeraj Narasimha, Srinivas Nomula, Srinivas Shakkottai, and Parimal Parag IEEE International Conference on Computer Communications (INFOCOM), (May 2025)
2024
[J32]
A SUFFICIENT CONDITION FOR THE QUASIPOTENTIAL TO BE THE RATE FUNCTION OF THE INVARIANT MEASURE OF COUNTABLE-STATE MEAN-FIELD INTERACTING PARTICLE SYSTEMS
Sarath Yasodharan and Rajesh Sundaresan Advances in Applied Probability vol 56(3), pp 960 – 1003 (2024) DOIPDF
Caching Contents with Varying Popularity Using Restless Bandits
K.J. Pavamana and Chandramani Singh Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST vol 539, pp 133 – 150 (2024) DOIPDF
Energy-minimizing workload splitting and frequency selection for guaranteed performance over heterogeneous cores
Aditya Priya, Rajiv Choudhury, Sujay Patni, Himkant Sharma, Moonmoon Mohanty, Krishnasuri Narayanam, Umamaheswari Devi, Pratibha Moogi, Preetam Patil, and Parimal Parag Proceedings of the 15th ACM International Conference on Future and Sustainable Energy Systems, pp 308–322 (2024) DOIPDF
Heterogeneous computing involves CPU architectures that support more than one core type, and it aims to achieve energy efficiency while meeting the performance guarantees. This aim can be achieved by the operating system or the on-chip driver by exploiting the differential power-performance trade-off that heterogeneous cores offer. We characterize the power-performance trade-off for an Intel CPU with heterogeneous cores and provide a mathematical framework to study heterogeneous computing. In particular, we provide probabilistic workload split and operating frequency for all active cores that allow workload execution with minimal carbon emissions. We support the analytical findings with experimental evaluations for a few representative workloads. As compared to the default Linux frequency governors, our scheme can reduce the energy-delay product by up to 80%.
[C33]
Enabling Smartness in a Legacy Lathe Machine
Laxmikant D. Pai Angle, Deeksha P. Rao, Shrutkirthi S. Godkhindi, and T.V. Prabhakar 2024 16th International Conference on COMmunication Systems and NETworkS, COMSNETS 2024, pp 309 – 311 (2024) DOIPDF
Fresh Caching of Dynamic Contents using Restless Multi-armed Bandits
Ankita Koley and Chandramani Singh Proceedings - 2024 IEEE 21st International Conference on Mobile Ad-Hoc and Smart Systems, MASS 2024, pp 238 – 246 (2024) DOIPDF
EdgeP4: In-Network Edge Intelligence for a Tactile Cyber-Physical System Testbed Across Cities
Nithish Krishnabharathi Gnani, Joydeep Pal, Deepak Choudhary, Himanshu Verma, Soumya Kanta Rana, Kaushal S Mhapsekar, T V Prabhakar, and Chandramani Singh IEEE INFOCOM 2024 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp 1-6 (May 2024) DOIPDF
Tactile Internet based operations, e.g., telesurgery, rely on the human operator for end-to-end closed loop control to achieve accuracy. While feedback and control are subject to network latency and packet loss, critical operations such as pose correction, fiducial marking, tremor reduction, etc. are tasks that should be carried out automatically and thus dispensing with these feedback signals from traversing the network to the other end. We design two edge intelligence algorithms hosted at P4 programmable end switches placed 400 km apart. These algorithms locally compute and command corrective signals. We implement these algorithms entirely on data plane on Netronome Agilio SmartNICs. “pose correction” is placed at the edge switch connected to an industrial robot gripping a tool. The round trip between transmitting force sensor array readings to the edge switch and receiving correct tip coordinates at the robot is shown to be less than 100µs. “tremor suppression” is placed at the edge switch connected to the operator. It suppresses physiological tremors, which improves the application's performance and also reduces the network load up to 99.9%. Our EdgeP4 framework allows edge intelligence modules to seamlessly switch between the algorithms based on the tasks being executed by devices connected to their ports.
[C30]
Saturation Throughput Analysis of Hybrid Access MAC Protocol in IEEE 802.11ax WLANs
S. Arthi and Neelesh B. Mehta IEEE Global Communications Conf. (Globecom), (December 2024)
[J26]
Optimal resource management for multi-access edge computing without using cross-layer communication
Lessons Learnt From the Implementation of the IEEE 802.15.4e-TSCH MAC
Ipsita Sanyal, Deeksha P. Rao, Rakshana Gunasekaran, S.M. Sachin, and T.V. Prabhakar 2023 15th International Conference on COMmunication Systems and NETworkS, COMSNETS 2023, pp 658 – 666 (2023) DOIPDF
Enhancing Reliability of Scheduled Traffic in Time-Sensitive Networks using Frame Replication and Elimination
Soumya Kanta Rana, Himanshu Verma, Joydeep Pal, Deepak Choudhary, T.V. Prabhakar, and Chandramani Singh IEEE Workshop on Local and Metropolitan Area Networks, (2023) DOIPDF
$\mu$TAS: Design and implementation of Time Aware Shaper on SmartNICs to achieve bounded latency
Joydeep Pal, Deepak Choudhary, Nithish Krishnabharathi Gnani, Chandramani Singh, and T. V. Prabhakar arXiv, (2023) DOIPDF
Time-Aware Shaper (TAS) is a time-triggered scheduling mechanism that ensures bounded latency for time-critical Scheduled Traffic (ST) flows. The Linux kernel implementation (a.k.a TAPRIO) has limited capabilities due to varying CPU workloads and thus does not offer tight latency bound for the ST flows. Also, currently only higher cycle times are possible. Other software implementations are limited to simulation studies without physical implementation. In this paper, we present μTAS, a MicroC-based hardware implementation of TAS onto a programmable SmartNIC. μTAS takes advantage of the parallel-processing architecture of the SmartNIC to configure the scheduling behaviour of its queues at runtime. To demonstrate the effectiveness of μTAS, we built a Time-Sensitive Networking (TSN) testbed from scratch. This consists of multiple end-hosts capable of generating ST and Best Effort (BE) flows and TSN switches equipped with SmartNICs running μTAS. Time synchronization is maintained between the switches and hosts. Our experiments demonstrate that the ST flows experience a bounded latency of the order of tens of microseconds.
[J21]
Learning in Constrained Markov Decision Processes
Rahul Singh, Abhishek Gupta, and Ness B. Shroff IEEE Transactions on Control of Network Systems vol 10(1), pp 441-453 (March 2023) DOIPDF
We consider reinforcement learning (RL) in Markov decision processes in which an agent repeatedly interacts with an environment that is modeled by a controlled Markov process. At each time step $t$, it earns a reward and also incurs a cost vector consisting of $M$ costs. We design model-based RL algorithms that maximize the cumulative reward earned over a time horizon of $T$ time steps while simultaneously ensuring that the average values of the $M$ cost expenditures are bounded by agent-specified thresholds $c^\textub_i,i=1,2,\ldots,M$. The consideration of the cumulative cost expenditures departs from the existing literature, in that the agent now additionally needs to balance the cost expenses in an online manner while simultaneously performing the exploration–exploitation tradeoff that is typically encountered in RL tasks. This is challenging since the dual objectives of exploration and exploitation necessarily require the agent to expend resources. In order to measure the performance of an RL algorithm that satisfies the average cost constraints, we define an $M+1$ dimensional regret vector that is composed of its reward regret, and $M$ cost regrets. The reward regret measures the suboptimality in the cumulative reward while the $i$th component of the cost regret vector is the difference between its $i$th cumulative cost expense and the expected cost expenditures $Tc^\textub_i$. We prove that the expected value of the regret vector is upper-bounded as $\tildeO(T^2\slash 3)$, where $T$ is the time horizon, and $\tildeO(\cdot)$ hides factors that are logarithmic in $T$. We further show how to reduce the regret of a desired subset of the $M$ costs, at the expense of increasing the regrets of rewards and the remaining costs. To the best of our knowledge, ours is the only work that considers nonepisodic RL under average cost constraints and derives algorithms that can tune the regret vector according to the agent's requirements on its cost regrets.
[J20]
Optimal Pricing in a Single Server System
Ashok Krishnan K. S, Chandramani Singh, Siva Theja Maguluri, and Parimal Parag ACM Transactions on Modeling and Performance Evaluation of Computing Systems vol 8(4), (2023) DOIPDF
Karnataka imposed weeknight and weekend curfews to mitigate the spread of the Omicron variant of SARS-CoV-2. We attempt to assess the impact of curfew using community mobility reports published by Google. Then, we quantify the impact of such restrictions via a simulation study. The pattern of weeknight and weekend curfew, followed by relaxations during the weekdays, seems, at best, to slow and delay the Omicron spread. The simulation outcomes suggest that Omicron eventually spreads and affects nearly as much of the population as it would have without the restrictions. Further, if Karnataka cases trajectory follows the South African Omicron wave trend and the hospitalisation is similar to that observed in well-vaccinated countries (2% of the confirmed cases), then the healthcare requirement is likely within the capacity of Bengaluru Urban when the caseload peaks, with or without the mobility restrictions. On the other hand, if Karnataka cases trajectory follows both the South African Omicron wave trend and the hospitalisation requirement observed there (6.9%), then the healthcare capacity may be exceeded at peak, with or without the mobility restrictions.Competing Interest StatementThe authors have declared no competing interest.Funding StatementThis work was partially supported by the Centre for Networked Intelligence, the Indian Statistical Institute\textquoterights CPDA, the NSF Expedition in Computing Grant CCF-1918656, the NSF RAPID CCF-2142997 and the IISc Institution of Eminence grants.Author DeclarationsI confirm all relevant ethical guidelines have been followed, and any necessary IRB and/or ethics committee approvals have been obtained.YesI confirm that all necessary patient/participant consent has been obtained and the appropriate institutional forms have been archived, and that any patient/participant/sample identifiers included were not known to anyone (e.g., hospital staff, patients or participants themselves) outside the research group so cannot be used to identify individuals.YesI understand that all clinical trials and any other prospective interventional studies must be registered with an ICMJE-approved registry, such as ClinicalTrials.gov. I confirm that any such study reported in the manuscript has been registered and the trial registration ID is provided (note: if posting a prospective study registered retrospectively, please provide a statement in the trial ID field explaining why the study was not registered in advance).YesI have followed all appropriate research reporting guidelines and uploaded the relevant EQUATOR Network research reporting checklist(s) and other pertinent material as supplementary files, if applicable.YesAll data produced in the present work are contained in the manuscript https://www.incovid19.org/ https://apps.bbmpgov.in/Covid19/en/media_pdf/Covid_Bengaluru_19_January_2022%20Bulletin-667.pdf https://www.nicd.ac.za/wp-content/uploads/2022/01/NICD-COVID-19-Daily-Sentinel-Hospital-Surveillance-report-National-20220102.pdf https://www.google.com/covid19/mobility/ https://www.gstatic.com/covid19/mobility/2022-01-15_IN_Karnataka_Mobility_Report_en-GB.pdf
[C24]
Latency-Redundancy Tradeoff in Distributed Read-Write Systems
Saraswathy Ramanathan, Gaurav Gautam, Vikram Srinivasan, and Parimal Parag 2022 14th International Conference on COMmunication Systems and NETworkS, COMSNETS 2022, pp 172 – 180 (2022) DOIPDF
A Scalable Container-based Virtualized Data Center Emulation Framework
Gaurav Gautam, Sandhya Rathee, Preetam Patil, and Parimal Parag 2022 14th International Conference on COMmunication Systems and NETworkS, COMSNETS 2022, pp 452 – 454 (2022) DOIPDF
We study optimal service pricing in server farms where customers arrive according to a renewal process and have independent and identical (i.i.d.) exponential service times and i.i.d. valuations of the service. The service provider charges a time varying service fee aiming at maximizing its revenue rate. The customers that find free servers and service fees lesser than their valuation join for the service else they leave without waiting. We consider both finite server and infinite server farms. We solve the optimal pricing problems using the framework of Markov decision problems. We show that the optimal prices depend on the number of free servers. We propose algorithms to compute the optimal prices. We also establish several properties of the optimal prices and the corresponding revenue rates in the case of Poisson customer arrivals. We illustrate all our findings via numerical evaluation.
[J12]
Latency Optimal Storage and Scheduling of Replicated Fragments for Memory Constrained Servers
Rooji Jinan, Ajay Badita, Pradeep Kiran Sarvepalli, and Parimal Parag IEEE Transactions on Information Theory vol 68(6), pp 4135 – 4155 (2022) DOIPDF
Performance Analysis of Channel-Dependent Rate Adaptation for OFDMA transmission in IEEE 802.11ax WLANs
C. Sheela, Joy Kuri, and Nadeem Akhtar 2022 14th International Conference on COMmunication Systems and NETworkS, COMSNETS 2022, pp 877 – 882 (2022) DOIPDF
Time-slicing high throughput wifi networks using centralized queueing and scheduling
Vishal Sevani, Purushothaman Saravanan, S.V.R. Anand, Joy Kuri, and Anurag Kumar WiNTECH 2022 - Proceedings of the 2022 16th ACM Workshop on Wireless Network Testbeds, Experimental evaluation and CHaracterization, Part of MobiCom 2022, pp 53 – 60 (2022) DOIPDF
Index-aware reinforcement learning for adaptive video streaming at the wireless edge
Guojun Xiong, Xudong Qin, Bin Li, Rahul Singh, and Jian Li Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc), pp 81 – 90 (2022) DOIPDF
Bayesian Learning-based Link adaptation in IEEE 802.11ax WLANs
Sheela C S and Joy Kuri Wireless World Research and Trends Magazine, pp 79 - 86 (2022) DOIPDF
The optimal modulation and coding scheme (MCS) selection in wireless transmission depends on the dynamically evolving channel state. Hence, Rate adaptation in a wireless channel relies on periodically reported channel quality indicator (CQI) values to select the optimal MCS. The latest 802.11ax, with a HE-sounding protocol, supports an explicit feedback mechanism where the client sends back a transformed estimate of the channel state information (CSI) in the HE CQI Report field. When generated more frequently, these reports can be expensive as they introduce unnecessary computational and protocol overhead. Also, the CSI feedback information is quantized, delayed, and noisy. To reduce the frequent CSI feedback (receiver to the transmitter) overhead, in our work, we obtain CSI statistically at the transmitter through Bayesian Learning (BL). Further, we propose a Bayesian Learning based Rate Adaptation (BLbRA) scheme at the transmitter. BLbRA throughput performance is consistent even with reduced feedback overhead. BLbRA can be implemented without any change in the standard frame format, and therefore, it is suitable for practical deployment.
2021
[C14]
Phase Transitions for Support Recovery from Gaussian Linear Measurements
Lekshmi Ramesh, Chandra R. Murthy, and Himanshu Tyagi IEEE International Symposium on Information Theory - Proceedings, pp 1606 – 1611 (2021) DOIPDF
Low latency replication coded storage over memory -constrained servers
Rooji Jinan, Ajay Badita, Pradeep Sarvepalli, and Parimal Parag IEEE International Symposium on Information Theory - Proceedings, pp 2340 – 2345 (2021) DOIPDF
GenSys: A scalable fixed-point engine for maximal controller synthesis over infinite state spaces
Stanly Samuel, Deepak D'Souza, and Raghavan Komondoor ESEC/FSE 2021 - Proceedings of the 29th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp 1585 – 1589 (2021) DOIPDF
Attention Actor-Critic Algorithm for Multi-Agent Constrained Co-operative Reinforcement Learning
P. Parnika, Raghuram Bharadwaj Diddigi, Sai Koti Reddy Danda, and Shalabh Bhatnagar Proceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems, pp 1616–1618 (2021) DOIPDF
In this work, we consider the problem of computing optimal actions for Reinforcement Learning (RL) agents in a co-operative setting, where the objective is to optimize a common goal. However, in many real-life applications, the agents are also required to satisfy certain constraints specified on their actions. Under this setting, the objective of the agents is to not only learn the actions that optimize the common objective but also meet the specified constraints. In recent times, the Actor-Critic algorithm with an attention mechanism has been successfully applied to obtain optimal actions for RL agents in multi-agent environments. In this work, we extend this algorithm to the constrained multi-agent RL setting.
[M2]
Strategies to Mitigate COVID-19 Resurgence Assuming Immunity Waning: A Study for Karnataka, India
COVID-19 vaccination is being rolled out among the general population in India. Spatial heterogeneities exist in seroprevalence and active infections across India. Using a spatially explicit age-stratified model of Karnataka at the district level, we study three spatial vaccination allocation strategies under different vaccination capacities and a variety of non-pharmaceutical intervention (NPI) scenarios. The models are initialised using on-the-ground datasets that capture reported cases, seroprevalence estimates, seroreversion and vaccine rollout plans. The three vaccination strategies we consider are allocation in proportion to the district populations, allocation in inverse proportion to the seroprevalence estimates, and allocation in proportion to the case-incidence rates during a reference period.The results suggest that the effectiveness of these strategies (in terms of cumulative cases at the end of a four-month horizon) are within 2% of each other, with allocation in proportion to population doing marginally better at the state level. The results suggest that the allocation schemes are robust and thus the focus should be on the easy to implement scheme based on population. Our immunity waning model predicts the possibility of a subsequent resurgence even under relatively strong NPIs. Finally, given a per-day vaccination capacity, our results suggest the level of NPIs needed for the healthcare infrastructure to handle a surge.Competing Interest StatementThe authors have declared no competing interest.Funding StatementThis work was partially supported by Google Grants, the Centre for Networked Intelligence, the SERB-MATRICS grant, National Institutes of Health (NIH) Grant R01GM109718, NSF BIG DATA Grant IIS-1633028, NSF Grant No.: OAC-1916805, NSF Expeditions in Computing Grant CCF-1918656, NSF RAPID CNS-2028004, NSF RAPID OAC-2027541.Author DeclarationsI confirm all relevant ethical guidelines have been followed, and any necessary IRB and/or ethics committee approvals have been obtained.YesThe details of the IRB/oversight body that provided approval or exemption for the research described are given below:Not requiredAll necessary patient/participant consent has been obtained and the appropriate institutional forms have been archived.YesI understand that all clinical trials and any other prospective interventional studies must be registered with an ICMJE-approved registry, such as ClinicalTrials.gov. I confirm that any such study reported in the manuscript has been registered and the trial registration ID is provided (note: if posting a prospective study registered retrospectively, please provide a statement in the trial ID field explaining why the study was not registered in advance).YesI have followed all appropriate research reporting guidelines and uploaded the relevant EQUATOR Network research reporting checklist(s) and other pertinent material as supplementary files, if applicable.YesData used is from publicly available data sources. https://des.kar.nic.in/docs/ProjectedPopulation2012-2021.pdf
[J7]
Second round statewide sentinel-based population survey for estimation of the burden of active infection and anti-SARS-CoV-2 IgG antibodies in the general population of Karnataka, India, during January-February 2021
M Rajagopal Padma, Prameela Dinesh, Rajesh Sundaresan, Siva Athreya, Shilpa Shiju, Parimala S Maroor, R Lalitha Hande, Jawaid Akhtar, Trilok Chandra, Deepa Ravi, Eunice Lobo, Yamuna Ana, Prafulla Shriyan, Anita Desai, Ambica Rangaiah, Ashok Munivenkatappa, S. Krishna, Shantala Gowdara Basawarajappa, H.G. Sreedhara, K.C. Siddesh, B. Amrutha Kumari, Nawaz Umar, B.A. Mythri, K.M. Mythri, Mysore Kalappa Sudarshan, Ravi Vasanthapuram, and Giridhara R Babu IJID Regions vol 1, pp 107 – 116 (2021) DOIPDF
We consider energy minimization for data-intensive applications run on large number of servers, for given performance guarantees. We consider a system, where each incoming application is sent to a set of servers, and is considered to be completed if a subset of them finish serving it. We consider a simple case when each server core has two speed levels, where the higher speed can be achieved by higher power for each core independently. The core selects one of the two speeds probabilistically for each incoming application request. We model arrival of application requests by a Poisson process, and random service time at the server with independent exponential random variables. Our model and analysis generalizes to today's state-of-the-art in CPU energy management where each core can independently select a speed level from a set of supported speeds and corresponding voltages. The performance metrics under consideration are the mean number of applications in the system and the average energy expenditure. We first provide a tight approximation to study this previously intractable problem and derive closed form approximate expressions for the performance metrics when service times are exponentially distributed. Next, we study the trade-off between the approximate mean number of applications and energy expenditure in terms of the switching probability.
[J6]
Observability of Discrete-Time LTI Systems under Unknown Piece-Wise Constant Inputs
Vipul Kumar Sharma and Pavankumar Tallapragada IEEE Control Systems Letters vol 5(6), pp 1886 – 1891 (2021) DOIPDF
MPCLEAGUE: ROBUST 4-PARTY COMPUTATION FOR PRIVACY-PRESERVING MACHINE LEARNING
Nishat Koti, Arpita Patra, and Ajith Suresh International Conference on Learning Representations (ICLR) 2021, (2021) DOIPDF
Secure computation has demonstrated its potential in several practical use-cases, particularly in privacy-preserving machine learning (PPML). Robustness, the property that guarantees output delivery irrespective of adversarial behaviour, and efficiency, are the two first-order asks of a successfully deployable PPML framework. Towards this, we propose the first robust, highly-efficient mixed-protocol framework, MPCLeague that works with four parties, offers malicious security, and supports ring. MPCLeague has a multifold improvement over ABY3 (Mohassel et al. CCS'18), a 3-party framework achieving security with abort, and improves upon Trident (Chaudhari et al. NDSS’20), a 4-party framework achieving security with fairness. MPCLeague's competence is tested with extensive benchmarking for deep neural networks such as LeNet and VGG16, and support vector machines.
2020
[J4]
Coverage Estimation in Outdoor Heterogeneous Propagation Environments
Event-triggered Stabilization for Nonlinear Systems with Center Manifolds
Akshit Saradagi, Arun D. Mahindrakar, and Pavankumar Tallapragada Proceedings of the IEEE Conference on Decision and Control, pp 751 – 756 (2020) DOIPDF