Skip to main content

Showing 1–50 of 50 results for author: Georgiou, K

  1. arXiv:2406.19495  [pdf, other

    cs.DM

    Multi-Agent Search-Type Problems on Polygons

    Authors: Konstantinos Georgiou, Caleb Jones, Jesse Lucier

    Abstract: We present several advancements in search-type problems for fleets of mobile agents operating in two dimensions under the wireless model. Potential hidden target locations are equidistant from a central point, forming either a disk (infinite possible locations) or regular polygons (finite possible locations). Building on the foundational disk evacuation problem, the disk priority evacuation proble… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

  2. arXiv:2406.19490  [pdf, other

    cs.DM

    Weighted Group Search on the Disk & Improved Lower Bounds for Priority Evacuation

    Authors: Konstantinos Georgiou, Xin Wang

    Abstract: We consider \emph{weighted group search on a disk}, which is a search-type problem involving 2 mobile agents with unit-speed. The two agents start collocated and their goal is to reach a (hidden) target at an unknown location and a known distance of exactly 1 (i.e., the search domain is the unit disk). The agents operate in the so-called \emph{wireless} model that allows them instantaneous knowled… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

  3. arXiv:2402.00689  [pdf, other

    cs.CR cs.AI

    Ocassionally Secure: A Comparative Analysis of Code Generation Assistants

    Authors: Ran Elgedawy, John Sadik, Senjuti Dutta, Anuj Gautam, Konstantinos Georgiou, Farzin Gholamrezae, Fujiao Ji, Kyungchan Lim, Qian Liu, Scott Ruoti

    Abstract: $ $Large Language Models (LLMs) are being increasingly utilized in various applications, with code generations being a notable example. While previous research has shown that LLMs have the capability to generate both secure and insecure code, the literature does not take into account what factors help generate secure and effective code. Therefore in this paper we focus on identifying and understan… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

    Comments: 12 pages, 2 figures

  4. arXiv:2401.15855  [pdf, other

    cs.CV

    Cross-Scale MAE: A Tale of Multi-Scale Exploitation in Remote Sensing

    Authors: Maofeng Tang, Andrei Cozma, Konstantinos Georgiou, Hairong Qi

    Abstract: Remote sensing images present unique challenges to image analysis due to the extensive geographic coverage, hardware limitations, and misaligned multi-scale images. This paper revisits the classical multi-scale representation learning problem but under the general framework of self-supervised learning for remote sensing image understanding. We present Cross-Scale MAE, a self-supervised model built… ▽ More

    Submitted 28 January, 2024; originally announced January 2024.

  5. arXiv:2307.13153  [pdf, other

    cs.DM

    The Fagnano Triangle Patrolling Problem

    Authors: Konstantinos Georgiou, Somnath Kundu, Pawel Pralat

    Abstract: We investigate a combinatorial optimization problem that involves patrolling the edges of an acute triangle using a unit-speed agent. The goal is to minimize the maximum (1-gap) idle time of any edge, which is defined as the time gap between consecutive visits to that edge. This problem has roots in a centuries-old optimization problem posed by Fagnano in 1775, who sought to determine the inscribe… ▽ More

    Submitted 14 April, 2024; v1 submitted 24 July, 2023; originally announced July 2023.

  6. arXiv:2303.15608  [pdf, other

    cs.DS cs.DM

    Overcoming Probabilistic Faults in Disoriented Linear Search

    Authors: Konstantinos Georgiou, Nikos Giachoudis, Evangelos Kranakis

    Abstract: We consider search by mobile agents for a hidden, idle target, placed on the infinite line. Feasible solutions are agent trajectories in which all agents reach the target sooner or later. A special feature of our problem is that the agents are $p$-faulty, meaning that every attempt to change direction is an independent Bernoulli trial with known probability $p$, where $p$ is the probability that a… ▽ More

    Submitted 27 March, 2023; originally announced March 2023.

  7. Accurate Energy Modelling on the Cortex-M0 Processor for Profiling and Static Analysis

    Authors: Kris Nikov, Kyriakos Georgiou, Zbigniew Chamski, Kerstin Eder, Jose Nunez-Yanez

    Abstract: Energy modelling can enable energy-aware software development and assist the developer in meeting an application's energy budget. Although many energy models for embedded processors exist, most do not account for processor-specific configurations, neither are they suitable for static energy consumption estimation. This paper introduces a set of comprehensive energy models for Arm's Cortex-M0 proce… ▽ More

    Submitted 30 January, 2023; originally announced January 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2104.01055

    Journal ref: 2022 29th IEEE International Conference on Electronics, Circuits and Systems (ICECS) (pp. 1-4). IEEE

  8. arXiv:2209.12134  [pdf, other

    cs.AR

    Evaluating the effects of reducing voltage margins for energy-efficient operation of MPSoCs

    Authors: Diego V. Cirilo do Nascimento, Kyriakos Georgiou, Kerstin I. Eder, Samuel Xavier-de-Souza

    Abstract: Voltage margins, or guardbands, are imposed on DVFS systems to account for process, voltage, and temperature variability effects. While necessary to assure correctness, guardbands reduce energy efficiency, a crucial requirement for embedded systems. The literature shows that error detection techniques can be used to maintain the system's reliability while reducing or eliminating the guardbands. Th… ▽ More

    Submitted 24 September, 2022; originally announced September 2022.

    Comments: 4 pages, 2 figures

  9. arXiv:2209.08544  [pdf, other

    cs.DM

    Triangle Evacuation of 2 Agents in the Wireless Model

    Authors: Konstantinos Georgiou, Woojin Jang

    Abstract: The input to the \emph{Triangle Evacuation} problem is a triangle $ABC$. Given a starting point $S$ on the perimeter of the triangle, a feasible solution to the problem consists of two unit-speed trajectories of mobile agents that eventually visit every point on the perimeter of $ABC$. The cost of a feasible solution (evacuation cost) is defined as the supremum over all points $T$ of the time it t… ▽ More

    Submitted 18 September, 2022; originally announced September 2022.

  10. arXiv:2109.10347  [pdf, other

    cs.CR

    Security-Hardening Software Libraries with Ada and SPARK -- A TCP Stack Use Case

    Authors: Kyriakos Georgiou, Guillaume Cluzel, Paul Butcher, Yannick Moy

    Abstract: This white paper demonstrates how the assurance, reliability, and security of an existing professional-grade, open-source embedded TCP/IP stack implementation written in the C programming language is significantly enhanced by adopting the SPARK technology. A multifaceted approach achieves this. Firstly, the TCP layer's C code is being replaced with formally verified SPARK, a subset of the Ada prog… ▽ More

    Submitted 2 September, 2021; originally announced September 2021.

    Comments: 37 pages, 4 figures, 2 tables, white paper, Software/Program Verification

    ACM Class: D.2.4

  11. arXiv:2108.02367  [pdf, other

    cs.DM cs.DS

    Evacuating from ell_p Unit Disks in the Wireless Model

    Authors: Konstantinos Georgiou, Sean Leizerovich, Jesse Lucier, Somnath Kundu

    Abstract: The search-type problem of evacuating 2 robots in the wireless model from the (Euclidean) unit disk was first introduced and studied by Czyzowicz et al. [DISC'2014]. Since then, the problem has seen a long list of follow-up results pertaining to variations as well as to upper and lower bound improvements. All established results in the area study this 2-dimensional search-type problem in the Eucli… ▽ More

    Submitted 5 August, 2021; originally announced August 2021.

    Comments: 21 pages, 9 figures

  12. Robust and accurate fine-grain power models for embedded systems with no on-chip PMU

    Authors: Kris Nikov, Marcos Martinez, Simon Wegener, Jose Nunez-Yanez, Zbigniew Chamski, Kyriakos Georgiou, Kerstin Eder

    Abstract: This paper presents a novel approach to event-based power modelling for embedded platforms that do not have a Performance Monitoring Unit (PMU). The method involves complementing the target hardware platform, where the physical power data is measured, with another platform on which the CPU performance data, that is needed for model generation, can be collected. The methodology is used to generate… ▽ More

    Submitted 9 November, 2021; v1 submitted 26 May, 2021; originally announced June 2021.

  13. arXiv:2105.01191  [pdf, other

    cs.DM

    Makespan Trade-offs for Visiting Triangle Edges

    Authors: Konstantinos Georgiou, Somnath Kundu, Pawel Pralat

    Abstract: We study a primitive vehicle routing-type problem in which a fleet of $n$unit speed robots start from a point within a non-obtuse triangle $Δ$, where $n \in \{1,2,3\}$. The goal is to design robots' trajectories so as to visit all edges of the triangle with the smallest visitation time makespan. We begin our study by introducing a framework for subdividing $Δ$into regions with respect to the type… ▽ More

    Submitted 3 May, 2021; originally announced May 2021.

    Comments: 47 pages, 27 figures

  14. arXiv:2104.01055  [pdf, other

    cs.SE

    A Comprehensive and Accurate Energy Model for Arm's Cortex-M0 Processor

    Authors: Kyriakos Georgiou, Zbigniew Chamski, Kris Nikov, Kerstin Eder

    Abstract: Energy modeling can enable energy-aware software development and assist the developer in meeting an application's energy budget. Although many energy models for embedded processors exist, most do not account for processor-specific configurations, neither are they suitable for static energy consumption estimation. This paper introduces a comprehensive energy model for Arm's Cortex-M0 processor, rea… ▽ More

    Submitted 24 May, 2021; v1 submitted 2 April, 2021; originally announced April 2021.

    Comments: 10 pages, 1 figure, 2 tables

  15. arXiv:2006.13241  [pdf, other

    cs.DS

    The Bike Sharing Problem

    Authors: Jurek Czyzowicz, Konstantinos Georgiou, Ryan Killick, Evangelos Kranakis, Danny Krizanc, Lata Narayanan, Jaroslav Opatrny, Denis Pankratov

    Abstract: Assume that $m \geq 1$ autonomous mobile agents and $0 \leq b \leq m$ single-agent transportation devices (called {\em bikes}) are initially placed at the left endpoint $0$ of the unit interval $[0,1]$. The agents are identical in capability and can move at speed one. The bikes cannot move on their own, but any agent riding bike $i$ can move at speed $v_i > 1$. An agent may ride at most one bike a… ▽ More

    Submitted 23 June, 2020; originally announced June 2020.

    ACM Class: F.1.1; F.2.2

  16. arXiv:2004.09495  [pdf

    cs.SE cs.CY

    A Study of Knowledge Sharing related to Covid-19 Pandemic in Stack Overflow

    Authors: Konstantinos Georgiou, Nikolaos Mittas, Lefteris Angelis, Alexander Chatzigeorgiou

    Abstract: The Covid-19 outbreak, beyond its tragic effects, has changed to an unprecedented extent almost every aspect of human activity throughout the world. At the same time, the pandemic has stimulated enormous amount of research by scientists across various disciplines, seeking to study the phenomenon itself, its epidemiological characteristics and ways to confront its consequences. Information Technolo… ▽ More

    Submitted 18 April, 2020; originally announced April 2020.

    Comments: 8 pages, 6 figures, Submitted to the Software Analytics: Mining Software Open Datasets and Repositories (STREAM) special session of the 46th EuroMicro Conference on Software Engineering and Advanced Applications (SEAA), 2020

  17. arXiv:2002.07797  [pdf, other

    cs.DS

    Probabilistically Faulty Searching on a Half-Line

    Authors: Anthony Bonato, Konstantinos Georgiou, Calum MacRury, Pawel Pralat

    Abstract: We study $p$-Faulty Search, a variant of the classic cow-path optimization problem, where a unit speed robot searches the half-line (or $1$-ray) for a hidden item. The searcher is probabilistically faulty, and detection of the item with each visitation is an independent Bernoulli trial whose probability of success $p$ is known. The objective is to minimize the worst case expected detection time, r… ▽ More

    Submitted 18 February, 2020; originally announced February 2020.

    Comments: This is full version of the paper with the same title which will appear in the proceedings of the 14th Latin American Theoretical Informatics Symposium (LATIN20), Sao Paulo, Brazil, May 25-29, 2020

  18. arXiv:2001.04311  [pdf, other

    cs.DM math.OC

    Lower Bounds for Shoreline Searching with 2 or More Robots

    Authors: Sumi Acharjee, Konstantinos Georgiou, Somnath Kundu, Akshaya Srinivasan

    Abstract: Searching for a line on the plane with $n$ unit speed robots is a classic online problem that dates back to the 50's, and for which competitive ratio upper bounds are known for every $n\geq 1$. In this work we improve the best lower bound known for $n=2$ robots from 1.5993 to 3. Moreover we prove that the competitive ratio is at least $\sqrt{3}$ for $n=3$ robots, and at least $1/\cos(π/n)$ for… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

    Comments: This is an updated version of the paper with the same title which will appear in the proceedings of the 23rd International Conference on Principles of Distributed Systems (OPODIS 2019) Neuchatel, Switzerland, July 17-19, 2019

  19. arXiv:1905.06783  [pdf, other

    cs.DS

    Time-Energy Tradeoffs for Evacuation by Two Robots in the Wireless Model

    Authors: Jurek Czyzowicz, Konstantinos Georgiou, Ryan Killick, Evangelos Kranakis, Danny Krizanc, Manuel Lafond, Lata Narayanan, Jaroslav Opatrny, Sunil Shende

    Abstract: Two robots stand at the origin of the infinite line and are tasked with searching collaboratively for an exit at an unknown location on the line. They can travel at maximum speed $b$ and can change speed or direction at any time. The two robots can communicate with each other at any distance and at any time. The task is completed when the last robot arrives at the exit and evacuates. We study time… ▽ More

    Submitted 16 May, 2019; originally announced May 2019.

    Comments: This is the full version of the paper with the same title which will appear in the proceedings of the 26th International Colloquium on Structural Information and Communication Complexity (SIROCCO'19) L'Aquila, Italy during July 1-4, 2019

  20. When parallel speedups hit the memory wall

    Authors: Alex F. A. Furtunato, Kyriakos Georgiou, Kerstin Eder, Samuel Xavier-de-Souza

    Abstract: After Amdahl's trailblazing work, many other authors proposed analytical speedup models but none have considered the limiting effect of the memory wall. These models exploited aspects such as problem-size variation, memory size, communication overhead, and synchronization overhead, but data-access delays are assumed to be constant. Nevertheless, such delays can vary, for example, according to the… ▽ More

    Submitted 23 April, 2020; v1 submitted 3 May, 2019; originally announced May 2019.

    Comments: 24 pages

  21. arXiv:1904.09714  [pdf, other

    cs.DM

    Energy Consumption of Group Search on a Line

    Authors: Jurek Czyzowicz, Konstantinos Georgiou, Ryan Killick, Evangelos Kranakis, Danny Krizanc, Manuel Lafond, Lata Narayanan, Jaroslav Opatrny, Sunil Shende

    Abstract: Consider two robots that start at the origin of the infinite line in search of an exit at an unknown location on the line. The robots can only communicate if they arrive at the same location at exactly the same time, i.e. they use the so-called face-to-face communication model. The group search time is defined as the worst-case time as a function of $d$, the distance of the exit from the origin, w… ▽ More

    Submitted 21 April, 2019; originally announced April 2019.

    Comments: This is the full version of the paper with the same title which will appear in the proceedings of the 46th International Colloquium on Automata, Languages and Programming 8-12 July 2019, Patras, Greece

  22. Lost in translation: Exposing hidden compiler optimization opportunities

    Authors: Kyriakos Georgiou, Zbigniew Chamski, Andres Amaya Garcia, David May, Kerstin Eder

    Abstract: Existing iterative compilation and machine-learning-based optimization techniques have been proven very successful in achieving better optimizations than the standard optimization levels of a compiler. However, they were not engineered to support the tuning of a compiler's optimizer as part of the compiler's daily development cycle. In this paper, we first establish the required properties which a… ▽ More

    Submitted 7 July, 2020; v1 submitted 25 March, 2019; originally announced March 2019.

    Comments: 31 pages, 7 figures, 2 table. arXiv admin note: text overlap with arXiv:1802.09845

    Journal ref: The Computer Journal (2020)

  23. arXiv:1807.08640  [pdf, other

    cs.DM

    Average Case - Worst Case Tradeoffs for Evacuating 2 Robots from the Disk in the Face-to-Face Model

    Authors: Huda Chuangpishit, Konstantinos Georgiou, Preeti Sharma

    Abstract: The problem of evacuating two robots from the disk in the face-to-face model was first introduced in [Czyzowicz et al., DISC'14], and extensively studied (along with many variations) ever since with respect to worst case analysis. We initiate the study of the same problem with respect to average case analysis, which is also equivalent to designing randomized algorithms for the problem. First we ob… ▽ More

    Submitted 23 July, 2018; originally announced July 2018.

    Comments: 17 pages, 6 figures. This is the full version of the paper, with the same title and authors, that was accepted in the 14th International Symposium on Algorithms and Experiments for Wireless Sensor Networks (ALGOSENSORS 2018), 23-24 August 2018, Helsinki, Finland

  24. arXiv:1805.03568  [pdf, other

    cs.DM cs.RO

    Priority Evacuation from a Disk Using Mobile Robots

    Authors: J. Czyzowicz, K. Georgiou, R. Killick, E. Kranakis, D. Krizanc, L. Narayanan, J. Opatrny, S. Shende

    Abstract: We introduce and study a new search-type problem with ($n+1$)-robots on a disk. The searchers (robots) all start from the center of the disk, have unit speed, and can communicate wirelessly. The goal is for a distinguished robot (the queen) to reach and evacuate from an exit that is hidden on the perimeter of the disk in as little time as possible. The remaining $n$ robots (servants) are there to… ▽ More

    Submitted 9 May, 2018; originally announced May 2018.

    Comments: 20 pages, 5 figures. This is the full version of the paper with the same title accepted in the 25th International Colloquium on Structural Information and Communication Complexity (SIROCCO'18)

  25. arXiv:1805.03351  [pdf, other

    cs.DM

    Symmetric Rendezvous With Advice: How to Rendezvous in a Disk

    Authors: Konstantinos Georgiou, Jay Griffiths, Yuval Yakubov

    Abstract: In the classic Symmetric Rendezvous problem on a Line (SRL), two robots at known distance 2 but unknown direction execute the same randomized algorithm trying to minimize the expected rendezvous time. A long standing conjecture is that the best possible rendezvous time is 4.25 with known upper and lower bounds being very close to that value. We introduce and study a geometric variation of SRL that… ▽ More

    Submitted 8 May, 2018; originally announced May 2018.

    Comments: 29 pages, 6 figures

  26. arXiv:1805.00998  [pdf, other

    cs.DC

    Energy-Optimal Configurations for Single-Node HPC Applications

    Authors: Vitor R. G. Silva, Alex Furtunato, Kyriakos Georgiou, Kerstin Eder, Samuel Xavier-de-Souza

    Abstract: Energy efficiency is a growing concern for modern computing, especially for HPC due to operational costs and the environmental impact. We propose a methodology to find energy-optimal frequency and number of active cores to run single-node HPC applications using an application-agnostic power model of the architecture and an architecture-aware performance model of the application. We characterize th… ▽ More

    Submitted 2 May, 2018; originally announced May 2018.

    Comments: 21 pages, 10 figures, 5 tables

    Report number: LAPPS2018_003

  27. arXiv:1804.06011  [pdf, other

    cs.MA

    God Save the Queen

    Authors: Jurek Czyzowicz, Konstantinos Georgiou, Ryan Killick, Evangelos Kranakis, Danny Krizanc, Lata Narayanan, Jaroslav Opatrny, Sunil Shende

    Abstract: Queen Daniela of Sardinia is asleep at the center of a round room at the top of the tower in her castle. She is accompanied by her faithful servant, Eva. Suddenly, they are awakened by cries of "Fire". The room is pitch black and they are disoriented. There is exactly one exit from the room somewhere along its boundary. They must find it as quickly as possible in order to save the life of the quee… ▽ More

    Submitted 16 April, 2018; originally announced April 2018.

    Comments: 33 pages, 8 Figures. This is the full version of the paper with the same title which will appear in the proceedings of the 9th International Conference on Fun with Algorithms, (FUN'18), June 13--15, 2018, La Maddalena, Maddalena Islands, Italy

  28. Less is More: Exploiting the Standard Compiler Optimization Levels for Better Performance and Energy Consumption

    Authors: Kyriakos Georgiou, Craig Blackmore, Samuel Xavier-de-Souza, Kerstin Eder

    Abstract: This paper presents the interesting observation that by performing fewer of the optimizations available in a standard compiler optimization level such as -O2, while preserving their original ordering, significant savings can be achieved in both execution time and energy consumption. This observation has been validated on two embedded processors, namely the ARM Cortex-M0 and the ARM Cortex-M3, usin… ▽ More

    Submitted 27 February, 2018; originally announced February 2018.

    Comments: 15 pages, 3 figures, 71 benchmarks used for evaluation

  29. arXiv:1710.00466  [pdf, other

    cs.DC cs.DS

    Patrolling a Path Connecting a Set of Points with Unbalanced Frequencies of Visits

    Authors: Huda Chuangpishit, Jurek Czyzowicz, Leszek Gasieniec, Konstantinos Georgiou, Tomasz Jurdzinski, Evangelos Kranakis

    Abstract: Patrolling consists of scheduling perpetual movements of a collection of mobile robots, so that each point of the environment is regularly revisited by any robot in the collection. In previous research, it was assumed that all points of the environment needed to be revisited with the same minimal frequency. In this paper we study efficient patrolling protocols for points located on a path, where e… ▽ More

    Submitted 1 October, 2017; originally announced October 2017.

  30. The Benefits of Low Operating Voltage Devices to the Energy Efficiency of Parallel Systems

    Authors: Samuel Xavier-de-Souza, Eduardo A. Neves, Alex F. A. Furtunato, Luiz F. Q. Silveira, Kyriakos Georgiou, Kerstin I. Eder

    Abstract: Programmable circuits such as general-purpose processors or FPGAs have their end-user energy efficiency strongly dependent on the program that they execute. Ultimately, it is the programmer's ability to code and, in the case of general purpose processors, the compiler's ability to translate source code into a sequence of native instructions that make the circuit deliver the expected performance to… ▽ More

    Submitted 13 August, 2017; originally announced September 2017.

    Report number: LAPPS2017_001

  31. The IoT energy challenge: A software perspective

    Authors: Kyriakos Georgiou, Samuel Xavier-de-Souza, Kerstin Eder

    Abstract: The Internet of Things (IoT) sparks a whole new world of embedded applications. Most of these applications are based on deeply embedded systems that have to operate on limited or unreliable sources of energy, such as batteries or energy harvesters. Meeting the energy requirements for such applications is a hard challenge, which threatens the future growth of the IoT. Software has the ultimate cont… ▽ More

    Submitted 27 June, 2017; originally announced June 2017.

    Comments: 9 pages, 1 figure

    Journal ref: IEEE Embedded Systems Letters, 2017, vol. PP, no. 99, pp. 1-1

  32. Search-and-Fetch with 2 Robots on a Disk: Wireless and Face-to-Face Communication Models

    Authors: Konstantinos Georgiou, George Karakostas, Evangelos Kranakis

    Abstract: We initiate the study of a new problem on searching and fetching in a distributed environment concerning treasure-evacuation from a unit disk. A treasure and an exit are located at unknown positions on the perimeter of a disk and at known arc distance. A team of two robots start from the center of the disk, and their goal is to fetch the treasure to the exit. At any time the robots can move anywhe… ▽ More

    Submitted 29 May, 2019; v1 submitted 30 November, 2016; originally announced November 2016.

    Comments: 26 Pages, 6 Figures. This is the full version of the paper with the same title which will appear in the proceedings of the 6th International Conference on Operations Research and Enterprise Systems (ICORES), February 23-25, 2017, Porto, Portugal

    Journal ref: Discrete Mathematics & Theoretical Computer Science, Vol. 21 no. 3 , Distributed Computing and Networking (June 13, 2019) dmtcs:4884

  33. arXiv:1611.08209  [pdf, ps, other

    cs.DS cs.DC

    Search on a Line by Byzantine Robots

    Authors: Jurek Czyzowicz, Konstantinos Georgiou, Evangelos Kranakis, Danny Krizanc, Lata Narayanan, Jaroslav Opatrny, Sunil Shende

    Abstract: We consider the problem of fault-tolerant parallel search on an infinite line by $n$ robots. Starting from the origin, the robots are required to find a target at an unknown location. The robots can move with maximum speed $1$ and can communicate in wireless mode among themselves. However, among the $n$ robots, there are $f$ robots that exhibit {\em byzantine faults}. A faulty robot can fail to re… ▽ More

    Submitted 24 November, 2016; originally announced November 2016.

    Comments: 14 pages

  34. Energy Transparency for Deeply Embedded Programs

    Authors: Kyriakos Georgiou, Steve Kerrison, Zbigniew Chamski, Kerstin Eder

    Abstract: Energy transparency is a concept that makes a program's energy consumption visible, from hardware up to software, through the different system layers. Such transparency can enable energy optimizations at each layer and between layers, and help both programmers and operating systems make energy-aware decisions. In this paper, we focus on deeply embedded devices, typically used for Internet of Thing… ▽ More

    Submitted 25 May, 2017; v1 submitted 25 August, 2016; originally announced September 2016.

    Comments: 33 pages, 7 figures. arXiv admin note: substantial text overlap with arXiv:1510.07095

    ACM Class: D.2.8

    Journal ref: ACM Trans. Archit. Code Optim. 14, 1, Article 8 (March 2017), 26 pages

  35. arXiv:1606.08023  [pdf, other

    cs.CG

    Searching with Advice: Robot Fence-Jumping

    Authors: Konstantinos Georgiou, Evangelos Kranakis, Alexandra Steau

    Abstract: We study a new search problem on the plane involving a robot and an immobile treasure, initially placed at distance $1$ from each other. The length $β$ of an arc (a fence) within the perimeter of the corresponding circle, as well as the promise that the treasure is outside the fence, is given as part of the input. The goal is to device movement trajectories so that the robot locates the treasure i… ▽ More

    Submitted 26 June, 2016; originally announced June 2016.

    Comments: 17 pages, 13 figures

  36. ENTRA: Whole-Systems Energy Transparency

    Authors: Kerstin Eder, John P. Gallagher, Pedro Lopez-Garcia, Henk Muller, Zorana Bankovic, Kyriakos Georgiou, Remy Haemmerle, Manuel V. Hermenegildo, Bishoksan Kafle, Steve Kerrison, Maja Kirkeby, Maximiliano Klemen, Xueliang Li, Umer Liqat, Jeremy Morse, Morten Rhiger, Mads Rosendahl

    Abstract: Promoting energy efficiency to a first class system design goal is an important research challenge. Although more energy-efficient hardware can be designed, it is software that controls the hardware; for a given system the potential for energy savings is likely to be much greater at the higher levels of abstraction in the system stack. Thus the greatest savings are expected from energy-aware softw… ▽ More

    Submitted 18 June, 2016; v1 submitted 13 June, 2016; originally announced June 2016.

    Comments: Revised preprint submitted to MICPRO on 27 May 2016, 23 pages, 3 figures

  37. arXiv:1604.03009  [pdf, other

    cs.DS

    Know When to Persist: Deriving Value from a Stream Buffer

    Authors: Konstantinos Georgiou, George Karakostas, Evangelos Kranakis, Danny Krizanc

    Abstract: We consider \textsc{Persistence}, a new online problem concerning optimizing weighted observations in a stream of data when the observer has limited buffer capacity. A stream of weighted items arrive one at a time at the entrance of a buffer with two holding locations. A processor (or observer) can process (observe) an item at the buffer location it chooses, deriving this way the weight of the obs… ▽ More

    Submitted 11 April, 2016; originally announced April 2016.

    Comments: 17 pages, 1 figure

  38. Inferring Parametric Energy Consumption Functions at Different Software Levels: ISA vs. LLVM IR

    Authors: Umer Liqat, Kyriakos Georgiou, Steve Kerrison, Pedro Lopez-Garcia, John P. Gallagher, Manuel V. Hermenegildo, Kerstin Eder

    Abstract: The static estimation of the energy consumed by program executions is an important challenge, which has applications in program optimization and verification, and is instrumental in energy-aware software development. Our objective is to estimate such energy consumption in the form of functions on the input data sizes of programs. We have developed a tool for experimentation with static analysis wh… ▽ More

    Submitted 4 November, 2015; originally announced November 2015.

    Comments: 22 pages, 4 figures, 2 tables

    ACM Class: F.3.2; D.3.4; D.2.8

  39. arXiv:1510.07095  [pdf, other

    cs.PL

    On the Value and Limits of Multi-level Energy Consumption Static Analysis for Deeply Embedded Single and Multi-threaded Programs

    Authors: Kyriakos Georgiou, Steve Kerrison, Kerstin Eder

    Abstract: There is growing interest in lowering the energy consumption of computation. Energy transparency is a concept that makes a program's energy consumption visible from software to hardware through the different system layers. Such transparency can enable energy optimizations at each layer and between layers, and help both programmers and operating systems make energy aware decisions. The common metho… ▽ More

    Submitted 23 October, 2015; originally announced October 2015.

    Comments: 29 pages, 5 figures

  40. Evacuating Robots from a Disk Using Face-to-Face Communication

    Authors: Jurek Czyzowicz, Konstantinos Georgiou, Evangelos Kranakis, Lata Narayanan, Jarda Opatrny, Birgit Vogtenhuber

    Abstract: Assume that two robots are located at the centre of a unit disk. Their goal is to evacuate from the disk through an exit at an unknown location on the boundary of the disk. At any time the robots can move anywhere they choose on the disk, independently of each other, with maximum speed $1$. The robots can cooperate by exchanging information whenever they meet. We study algorithms for the two robot… ▽ More

    Submitted 24 August, 2020; v1 submitted 20 January, 2015; originally announced January 2015.

    Comments: 22 pages, 8 figures. An extended abstract of this work was accepted for publication in the LNCS proceedings of the 9th International Conference on Algorithms and Complexity (CIAC15)

    Journal ref: Discrete Mathematics & Theoretical Computer Science, vol. 22 no. 4, Distributed Computing and Networking (August 27, 2020) dmtcs:6198

  41. Lift & Project Systems Performing on the Partial-Vertex-Cover Polytope

    Authors: Konstantinos Georgiou, Andy Jiang, Edward Lee, Astrid A. Olave, Ian Seong, Twesh Upadhyaya

    Abstract: We study integrality gap (IG) lower bounds on strong LP and SDP relaxations derived by the Sherali-Adams (SA), Lovasz-Schrijver-SDP (LS+), and Sherali-Adams-SDP (SA+) lift-and-project (L&P) systems for the t-Partial-Vertex-Cover (t-PVC) problem, a variation of the classic Vertex-Cover problem in which only t edges need to be covered. t-PVC admits a 2-approximation using various algorithmic techniq… ▽ More

    Submitted 16 March, 2020; v1 submitted 22 September, 2014; originally announced September 2014.

    Comments: 26 pages

  42. arXiv:1407.1853  [pdf, ps, other

    cs.GT

    Stable marriage with general preferences

    Authors: Linda Farczadi, Konstantinos Georgiou, Jochen Könemann

    Abstract: We propose a generalization of the classical stable marriage problem. In our model, the preferences on one side of the partition are given in terms of arbitrary binary relations, which need not be transitive nor acyclic. This generalization is practically well-motivated, and as we show, encompasses the well studied hard variant of stable marriage where preferences are allowed to have ties and to b… ▽ More

    Submitted 25 July, 2014; v1 submitted 7 July, 2014; originally announced July 2014.

    Comments: This is an extended version of a paper to appear at the The 7th International Symposium on Algorithmic Game Theory (SAGT 2014)

  43. Static analysis of energy consumption for LLVM IR programs

    Authors: Neville Grech, Kyriakos Georgiou, James Pallister, Steve Kerrison, Jeremy Morse, Kerstin Eder

    Abstract: Energy models can be constructed by characterizing the energy consumed by executing each instruction in a processor's instruction set. This can be used to determine how much energy is required to execute a sequence of assembly instructions, without the need to instrument or measure hardware. However, statically analyzing low-level program structures is hard, and the gap between the high-level pr… ▽ More

    Submitted 16 July, 2015; v1 submitted 18 May, 2014; originally announced May 2014.

  44. arXiv:1405.0945  [pdf, ps, other

    cs.DS

    On Integrality Ratios for Asymmetric TSP in the Sherali-Adams Hierarchy

    Authors: Joseph Cheriyan, Zhihan Gao, Konstantinos Georgiou, Sahil Singla

    Abstract: We study the ATSP (Asymmetric Traveling Salesman Problem), and our focus is on negative results in the framework of the Sherali-Adams (SA) Lift and Project method. Our main result pertains to the standard LP (linear programming) relaxation of ATSP, due to Dantzig, Fulkerson, and Johnson. For any fixed integer $t\geq 0$ and small $ε$, $0<ε\ll{1}$, there exists a digraph $G$ on $ν=ν(t,ε)=O(t/ε)$ v… ▽ More

    Submitted 5 May, 2014; originally announced May 2014.

    Comments: 26 pages, 7 figures. An extended abstract of this work appeared in the proceedings of the 40th International Colloquium on Automata, Languages, and Programming ({ICALP} 2013)

  45. arXiv:1403.1988  [pdf, other

    cs.DM

    Excuse Me! or The Courteous Theatregoers' Problem

    Authors: Konstantinos Georgiou, Evangelos Kranakis, Danny Krizanc

    Abstract: Consider a theatre consisting of $m$ rows each containing $n$ seats. Theatregoers enter the theatre along aisles and pick a row which they enter along one of its two entrances so as to occupy a seat. Assume they select their seats uniformly and independently at random among the empty ones. A row of seats is narrow and an occupant who is already occupying a seat is blocking passage to new incoming… ▽ More

    Submitted 8 March, 2014; originally announced March 2014.

    Comments: 21 pages, 5 figures. An extended abstract of this paper appears in the Proceedings of Seventh International Conference on Fun with Algorithms, July 1--3, 2014, Lipari Island, Sicily, Italy, Springer LNCS

  46. arXiv:1306.4302  [pdf, other

    cs.GT

    Network bargaining with general capacities

    Authors: Linda Farczadi, Konstantinos Georgiou, Jochen Koenemann

    Abstract: We study balanced solutions for network bargaining games with general capacities, where agents can participate in a fixed but arbitrary number of contracts. We provide the first polynomial time algorithm for computing balanced solutions for these games. In addition, we prove that an instance has a balanced solution if and only if it has a stable one. Our methods use a new idea of reducing an insta… ▽ More

    Submitted 18 June, 2013; originally announced June 2013.

    Comments: This is an extended version of a paper to appear at the 21st European Symposium on Algorithms (ESA 2013)

  47. arXiv:1304.7693  [pdf, other

    cs.DS

    The Beachcombers' Problem: Walking and Searching with Mobile Robots

    Authors: Jurek Czyzowicz, Leszek Gasieniec, Konstantinos Georgiou, Evangelos Kranakis, Fraser MacQuarrie

    Abstract: We introduce and study a new problem concerning the exploration of a geometric domain by mobile robots. Consider a line segment $[0,I]$ and a set of $n$ mobile robots $r_1,r_2,..., r_n$ placed at one of its endpoints. Each robot has a {\em searching speed} $s_i$ and a {\em walking speed} $w_i$, where $s_i <w_i$. We assume that each robot is aware of the number of robots of the collection and their… ▽ More

    Submitted 29 April, 2013; originally announced April 2013.

    Comments: 19 pages, 1 figure

  48. arXiv:1205.0458  [pdf, other

    cs.DS

    Better Balance by Being Biased: A 0.8776-Approximation for Max Bisection

    Authors: Per Austrin, Siavosh Benabbas, Konstantinos Georgiou

    Abstract: Recently Raghavendra and Tan (SODA 2012) gave a 0.85-approximation algorithm for the Max Bisection problem. We improve their algorithm to a 0.8776-approximation. As Max Bisection is hard to approximate within $α_{GW} + ε\approx 0.8786$ under the Unique Games Conjecture (UGC), our algorithm is nearly optimal. We conjecture that Max Bisection is approximable within $α_{GW}-ε$, i.e., the bisection co… ▽ More

    Submitted 5 July, 2012; v1 submitted 2 May, 2012; originally announced May 2012.

  49. arXiv:1204.5489  [pdf, ps, other

    math.CO cs.DS

    Understanding Set Cover: Sub-exponential Time Approximations and Lift-and-Project Methods

    Authors: Eden Chlamtac, Zac Friggstad, Konstantinos Georgiou

    Abstract: Recently, Cygan, Kowalik, and Wykurz [IPL 2009] gave sub-exponential-time approximation algorithms for the Set-Cover problem with approximation ratios better than ln(n). In light of this result, it is natural to ask whether such improvements can be achieved using lift-and-project methods. We present a simpler combinatorial algorithm which has nearly the same time-approximation tradeoff as the algo… ▽ More

    Submitted 25 October, 2012; v1 submitted 24 April, 2012; originally announced April 2012.

  50. arXiv:1202.5049  [pdf, other

    cs.DM cs.DS

    Efficient Algorithms for Solving Hypergraphic Steiner Tree Relaxations in Quasi-Bipartite Instances

    Authors: Isaac Fung, Konstantinos Georgiou, Jochen Koenemann, Malcolm Sharpe

    Abstract: We consider the Steiner tree problem in quasi-bipartite graphs, where no two Steiner vertices are connected by an edge. For this class of instances, we present an efficient algorithm to exactly solve the so called directed component relaxation (DCR), a specific form of hypergraphic LP relaxation that was instrumental in the recent break-through result by Byrka et al. [BGRS10] (STOC 2010). Our algo… ▽ More

    Submitted 22 February, 2012; originally announced February 2012.

    Comments: 15 pages, 2 figures