Skip to main content

Showing 1–41 of 41 results for author: Thiruvathukal, G K

  1. arXiv:2406.08205  [pdf, other

    cs.SE cs.LG

    What do we know about Hugging Face? A systematic literature review and quantitative validation of qualitative claims

    Authors: Jason Jones, Wenxin Jiang, Nicholas Synovic, George K. Thiruvathukal, James C. Davis

    Abstract: Background: Collaborative Software Package Registries (SPRs) are an integral part of the software supply chain. Much engineering work synthesizes SPR package into applications. Prior research has examined SPRs for traditional software, such as NPM (JavaScript) and PyPI (Python). Pre-Trained Model (PTM) Registries are an emerging class of SPR of increasing importance, because they support the deep… ▽ More

    Submitted 12 June, 2024; originally announced June 2024.

  2. arXiv:2405.01963  [pdf, other

    cs.CR cs.AI cs.CV cs.LG

    From Attack to Defense: Insights into Deep Learning Security Measures in Black-Box Settings

    Authors: Firuz Juraev, Mohammed Abuhamad, Eric Chan-Tin, George K. Thiruvathukal, Tamer Abuhmed

    Abstract: Deep Learning (DL) is rapidly maturing to the point that it can be used in safety- and security-crucial applications. However, adversarial samples, which are undetectable to the human eye, pose a serious threat that can cause the model to misbehave and compromise the performance of such applications. Addressing the robustness of DL models has become crucial to understanding and defending against a… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

  3. arXiv:2405.01934  [pdf, other

    cs.CV cs.AI cs.CR cs.LG

    Impact of Architectural Modifications on Deep Learning Adversarial Robustness

    Authors: Firuz Juraev, Mohammed Abuhamad, Simon S. Woo, George K Thiruvathukal, Tamer Abuhmed

    Abstract: Rapid advancements of deep learning are accelerating adoption in a wide variety of applications, including safety-critical applications such as self-driving vehicles, drones, robots, and surveillance systems. These advancements include applying variations of sophisticated techniques that improve the performance of models. However, such models are not immune to adversarial manipulations, which can… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

  4. arXiv:2404.16688  [pdf, other

    cs.SE

    Reusing Deep Learning Models: Challenges and Directions in Software Engineering

    Authors: James C. Davis, Purvish Jajal, Wenxin Jiang, Taylor R. Schorlemmer, Nicholas Synovic, George K. Thiruvathukal

    Abstract: Deep neural networks (DNNs) achieve state-of-the-art performance in many areas, including computer vision, system configuration, and question-answering. However, DNNs are expensive to develop, both in intellectual effort (e.g., devising new architectures) and computational costs (e.g., training). Reusing DNNs is a promising direction to amortize costs within a company and across the computing indu… ▽ More

    Submitted 25 April, 2024; originally announced April 2024.

    Comments: Proceedings of the IEEE John Vincent Atanasoff Symposium on Modern Computing (JVA'23) 2023

  5. arXiv:2403.07153  [pdf, other

    cs.CV

    2023 Low-Power Computer Vision Challenge (LPCVC) Summary

    Authors: Leo Chen, Benjamin Boardley, Ping Hu, Yiru Wang, Yifan Pu, Xin Jin, Yongqiang Yao, Ruihao Gong, Bo Li, Gao Huang, Xianglong Liu, Zifu Wan, Xinwang Chen, Ning Liu, Ziyi Zhang, Dongping Liu, Ruijie Shan, Zhengping Che, Fachao Zhang, Xiaofeng Mou, Jian Tang, Maxim Chuprov, Ivan Malofeev, Alexander Goncharenko, Andrey Shcherbin , et al. (5 additional authors not shown)

    Abstract: This article describes the 2023 IEEE Low-Power Computer Vision Challenge (LPCVC). Since 2015, LPCVC has been an international competition devoted to tackling the challenge of computer vision (CV) on edge devices. Most CV researchers focus on improving accuracy, at the expense of ever-growing sizes of machine models. LPCVC balances accuracy with resource requirements. Winners must achieve high accu… ▽ More

    Submitted 11 March, 2024; originally announced March 2024.

    Comments: LPCVC 2023, website: https://lpcv.ai/

  6. arXiv:2402.00699  [pdf, other

    cs.SE cs.AI cs.DB cs.LG

    PeaTMOSS: A Dataset and Initial Analysis of Pre-Trained Models in Open-Source Software

    Authors: Wenxin Jiang, Jerin Yasmin, Jason Jones, Nicholas Synovic, Jiashen Kuo, Nathaniel Bielanski, Yuan Tian, George K. Thiruvathukal, James C. Davis

    Abstract: The development and training of deep learning models have become increasingly costly and complex. Consequently, software engineers are adopting pre-trained models (PTMs) for their downstream applications. The dynamics of the PTM supply chain remain largely unexplored, signaling a clear need for structured datasets that document not only the metadata but also the subsequent applications of these mo… ▽ More

    Submitted 1 February, 2024; originally announced February 2024.

    Comments: Accepted at MSR'24

  7. arXiv:2311.04433  [pdf, other

    cs.CR

    SyncBleed: A Realistic Threat Model and Mitigation Strategy for Zero-Involvement Pairing and Authentication (ZIPA)

    Authors: Isaac Ahlgren, Jack West, Kyuin Lee, George K. Thiruvathukal, Neil Klingensmith

    Abstract: Zero Involvement Pairing and Authentication (ZIPA) is a promising technique for auto-provisioning large networks of Internet-of-Things (IoT) devices. Presently, these networks use password-based authentication, which is difficult to scale to more than a handful of devices. To deal with this challenge, ZIPA enabled devices autonomously extract identical authentication or encryption keys from ambien… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

  8. arXiv:2310.07782  [pdf, other

    cs.CV

    An automated approach for improving the inference latency and energy efficiency of pretrained CNNs by removing irrelevant pixels with focused convolutions

    Authors: Caleb Tung, Nicholas Eliopoulos, Purvish Jajal, Gowri Ramshankar, Chen-Yun Yang, Nicholas Synovic, Xuecen Zhang, Vipin Chaudhary, George K. Thiruvathukal, Yung-Hsiang Lu

    Abstract: Computer vision often uses highly accurate Convolutional Neural Networks (CNNs), but these deep learning models are associated with ever-increasing energy and computation requirements. Producing more energy-efficient CNNs often requires model training which can be cost-prohibitive. We propose a novel, automated method to make a pretrained CNN more energy-efficient without re-training. Given a pret… ▽ More

    Submitted 11 October, 2023; originally announced October 2023.

  9. arXiv:2310.03620  [pdf, other

    cs.SE cs.AI

    PeaTMOSS: Mining Pre-Trained Models in Open-Source Software

    Authors: Wenxin Jiang, Jason Jones, Jerin Yasmin, Nicholas Synovic, Rajeev Sashti, Sophie Chen, George K. Thiruvathukal, Yuan Tian, James C. Davis

    Abstract: Developing and training deep learning models is expensive, so software engineers have begun to reuse pre-trained deep learning models (PTMs) and fine-tune them for downstream tasks. Despite the wide-spread use of PTMs, we know little about the corresponding software engineering behaviors and challenges. To enable the study of software engineering with PTMs, we present the PeaTMOSS dataset: Pre-T… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

  10. arXiv:2310.01642  [pdf, other

    cs.SE cs.AI

    Naming Practices of Pre-Trained Models in Hugging Face

    Authors: Wenxin Jiang, Chingwo Cheung, Mingyu Kim, Heesoo Kim, George K. Thiruvathukal, James C. Davis

    Abstract: As innovation in deep learning continues, many engineers seek to adopt Pre-Trained Models (PTMs) as components in computer systems. Researchers publish PTMs, which engineers adapt for quality or performance prior to deployment. PTM authors should choose appropriate names for their PTMs, which would facilitate model discovery and reuse. However, prior research has reported that model names are not… ▽ More

    Submitted 28 March, 2024; v1 submitted 2 October, 2023; originally announced October 2023.

    Comments: 21 pages

  11. arXiv:2307.06484  [pdf, other

    cs.CV

    Single-Class Target-Specific Attack against Interpretable Deep Learning Systems

    Authors: Eldor Abdukhamidov, Mohammed Abuhamad, George K. Thiruvathukal, Hyoungshick Kim, Tamer Abuhmed

    Abstract: In this paper, we present a novel Single-class target-specific Adversarial attack called SingleADV. The goal of SingleADV is to generate a universal perturbation that deceives the target model into confusing a specific category of objects with a target category while ensuring highly relevant and accurate interpretations. The universal perturbation is stochastically and iteratively optimized by min… ▽ More

    Submitted 12 July, 2023; originally announced July 2023.

    Comments: 13 pages

  12. arXiv:2303.17708  [pdf, other

    cs.SE cs.LG

    Analysis of Failures and Risks in Deep Learning Model Converters: A Case Study in the ONNX Ecosystem

    Authors: Purvish Jajal, Wenxin Jiang, Arav Tewari, Erik Kocinare, Joseph Woo, Anusha Sarraf, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis

    Abstract: Software engineers develop, fine-tune, and deploy deep learning (DL) models using a variety of development frameworks and runtime environments. DL model converters move models between frameworks and to runtime environments. Conversion errors compromise model quality and disrupt deployment. However, the failure characteristics of DL model converters are unknown, adding risk when using DL interopera… ▽ More

    Submitted 24 April, 2024; v1 submitted 30 March, 2023; originally announced March 2023.

  13. arXiv:2303.08934  [pdf, other

    cs.SE

    PTMTorrent: A Dataset for Mining Open-source Pre-trained Model Packages

    Authors: Wenxin Jiang, Nicholas Synovic, Purvish Jajal, Taylor R. Schorlemmer, Arav Tewari, Bhavesh Pareek, George K. Thiruvathukal, James C. Davis

    Abstract: Due to the cost of developing and training deep learning models from scratch, machine learning engineers have begun to reuse pre-trained models (PTMs) and fine-tune them for downstream tasks. PTM registries known as "model hubs" support engineers in distributing and reusing deep learning models. PTM packages include pre-trained weights, documentation, model architectures, datasets, and metadata. M… ▽ More

    Submitted 15 March, 2023; originally announced March 2023.

    Comments: 5 pages, 2 figures, Accepted to MSR'23

  14. arXiv:2303.07476  [pdf, other

    cs.SE cs.AI

    Challenges and Practices of Deep Learning Model Reengineering: A Case Study on Computer Vision

    Authors: Wenxin Jiang, Vishnu Banna, Naveen Vivek, Abhinav Goel, Nicholas Synovic, George K. Thiruvathukal, James C. Davis

    Abstract: Many engineering organizations are reimplementing and extending deep neural networks from the research community. We describe this process as deep learning model reengineering. Deep learning model reengineering - reusing, reproducing, adapting, and enhancing state-of-the-art deep learning approaches - is challenging for reasons including under-documented reference models, changing requirements, an… ▽ More

    Submitted 25 August, 2023; v1 submitted 13 March, 2023; originally announced March 2023.

    Comments: Under submission to EMSE

  15. arXiv:2303.02552  [pdf, other

    cs.SE cs.AI cs.LG

    An Empirical Study of Pre-Trained Model Reuse in the Hugging Face Deep Learning Model Registry

    Authors: Wenxin Jiang, Nicholas Synovic, Matt Hyatt, Taylor R. Schorlemmer, Rohan Sethi, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis

    Abstract: Deep Neural Networks (DNNs) are being adopted as components in software systems. Creating and specializing DNNs from scratch has grown increasingly difficult as state-of-the-art architectures grow more complex. Following the path of traditional software engineering, machine learning engineers have begun to reuse large-scale pre-trained models (PTMs) and fine-tune these models for downstream tasks.… ▽ More

    Submitted 4 March, 2023; originally announced March 2023.

    Comments: Proceedings of the ACM/IEEE 45th International Conference on Software Engineering (ICSE) 2023

  16. Why Accuracy Is Not Enough: The Need for Consistency in Object Detection

    Authors: Caleb Tung, Abhinav Goel, Fischer Bordwell, Nick Eliopoulos, Xiao Hu, George K. Thiruvathukal, Yung-Hsiang Lu

    Abstract: Object detectors are vital to many modern computer vision applications. However, even state-of-the-art object detectors are not perfect. On two images that look similar to human eyes, the same detector can make different predictions because of small image distortions like camera sensor noise and lighting changes. This problem is called inconsistency. Existing accuracy metrics do not properly accou… ▽ More

    Submitted 28 July, 2022; originally announced July 2022.

  17. arXiv:2207.11767  [pdf, other

    cs.SE

    Snapshot Metrics Are Not Enough: Analyzing Software Repositories with Longitudinal Metrics

    Authors: Nicholas Synovic, Matt Hyatt, Rohan Sethi, Sohini Thota, Shilpika, Allan J. Miller, Wenxin Jiang, Emmanuel S. Amobi, Austin Pinderski, Konstantin Läufer, Nicholas J. Hayward, Neil Klingensmith, James C. Davis, George K. Thiruvathukal

    Abstract: Software metrics capture information about software development processes and products. These metrics support decision-making, e.g., in team management or dependency selection. However, existing metrics tools measure only a snapshot of a software project. Little attention has been given to enabling engineers to reason about metric trends over time -- longitudinal metrics that give insight about pr… ▽ More

    Submitted 24 July, 2022; originally announced July 2022.

    Comments: Accepted at ASE 2022 Tool Demonstrations

  18. arXiv:2207.10741  [pdf, other

    cs.CV

    Irrelevant Pixels are Everywhere: Find and Exclude Them for More Efficient Computer Vision

    Authors: Caleb Tung, Abhinav Goel, Xiao Hu, Nicholas Eliopoulos, Emmanuel Amobi, George K. Thiruvathukal, Vipin Chaudhary, Yung-Hsiang Lu

    Abstract: Computer vision is often performed using Convolutional Neural Networks (CNNs). CNNs are compute-intensive and challenging to deploy on power-contrained systems such as mobile and Internet-of-Things (IoT) devices. CNNs are compute-intensive because they indiscriminately compute many features on all pixels of the input image. We observe that, given a computer vision task, images often contain pixels… ▽ More

    Submitted 21 July, 2022; originally announced July 2022.

  19. arXiv:2204.06128  [pdf, other

    cs.CR

    Are You Really Muted?: A Privacy Analysis of Mute Buttons in Video Conferencing Apps

    Authors: Yucheng Yang, Jack West, George K. Thiruvathukal, Neil Klingensmith, Kassem Fawaz

    Abstract: Video conferencing apps (VCAs) make it possible for previously private spaces -- bedrooms, living rooms, and kitchens -- into semi-public extensions of the office. For the most part, users have accepted these apps in their personal space without much thought about the permission models that govern the use of their private data during meetings. While access to a device's video camera is carefully c… ▽ More

    Submitted 12 April, 2022; originally announced April 2022.

    Comments: to be published in the 22nd Privacy Enhancing Technologies Symposium (PETS 2022)

  20. arXiv:2109.13356  [pdf, other

    cs.CV cs.DC

    Efficient Computer Vision on Edge Devices with Pipeline-Parallel Hierarchical Neural Networks

    Authors: Abhinav Goel, Caleb Tung, Xiao Hu, George K. Thiruvathukal, James C. Davis, Yung-Hsiang Lu

    Abstract: Computer vision on low-power edge devices enables applications including search-and-rescue and security. State-of-the-art computer vision algorithms, such as Deep Neural Networks (DNNs), are too large for inference on low-power edge devices. To improve efficiency, some existing approaches parallelize DNN inference across multiple edge devices. However, these techniques introduce significant commun… ▽ More

    Submitted 4 November, 2021; v1 submitted 27 September, 2021; originally announced September 2021.

    Comments: Accepted for publication in ASPDAC 2022

  21. arXiv:2107.00821  [pdf, other

    cs.SE cs.AI cs.LG

    An Experience Report on Machine Learning Reproducibility: Guidance for Practitioners and TensorFlow Model Garden Contributors

    Authors: Vishnu Banna, Akhil Chinnakotla, Zhengxin Yan, Anirudh Vegesana, Naveen Vivek, Kruthi Krishnappa, Wenxin Jiang, Yung-Hsiang Lu, George K. Thiruvathukal, James C. Davis

    Abstract: Machine learning techniques are becoming a fundamental tool for scientific and engineering progress. These techniques are applied in contexts as diverse as astronomy and spam filtering. However, correctly applying these techniques requires careful engineering. Much attention has been paid to the technical potential; relatively little attention has been paid to the software engineering process requ… ▽ More

    Submitted 29 July, 2021; v1 submitted 2 July, 2021; originally announced July 2021.

    Comments: Technical Report

  22. arXiv:2106.10588  [pdf, other

    cs.CV eess.IV

    Low-Power Multi-Camera Object Re-Identification using Hierarchical Neural Networks

    Authors: Abhinav Goel, Caleb Tung, Xiao Hu, Haobo Wang, James C. Davis, George K. Thiruvathukal, Yung-Hsiang Lu

    Abstract: Low-power computer vision on embedded devices has many applications. This paper describes a low-power technique for the object re-identification (reID) problem: matching a query image against a gallery of previously seen images. State-of-the-art techniques rely on large, computationally-intensive Deep Neural Networks (DNNs). We propose a novel hierarchical DNN architecture that uses attribute labe… ▽ More

    Submitted 19 June, 2021; originally announced June 2021.

    Comments: Accepted to ISLPED 2021

  23. arXiv:2104.14618  [pdf, other

    cs.CR

    Moonshine: An Online Randomness Distiller for Zero-Involvement Authentication

    Authors: Jack West, Kyuin Lee, Suman Banerjee, Younghyun Kim, George K. Thiruvathukal, Neil Klingensmith

    Abstract: Context-based authentication is a method for transparently validating another device's legitimacy to join a network based on location. Devices can pair with one another by continuously harvesting environmental noise to generate a random key with no user involvement. However, there are gaps in our understanding of the theoretical limitations of environmental noise harvesting, making it difficult fo… ▽ More

    Submitted 29 April, 2021; originally announced April 2021.

    Comments: 16 pages, 5 figures, IPSN 2021

  24. arXiv:2103.12286  [pdf, other

    cs.IR

    Automated Discovery of Real-Time Network Camera Data From Heterogeneous Web Pages

    Authors: Ryan Dailey, Aniesh Chawla, Andrew Liu, Sripath Mishra, Ling Zhang, Josh Majors, Yung-Hsiang Lu, George K. Thiruvathukal

    Abstract: Reduction in the cost of Network Cameras along with a rise in connectivity enables entities all around the world to deploy vast arrays of camera networks. Network cameras offer real-time visual data that can be used for studying traffic patterns, emergency response, security, and other applications. Although many sources of Network Camera data are available, collecting the data remains difficult d… ▽ More

    Submitted 22 March, 2021; originally announced March 2021.

    Comments: This paper has been accepted by ACM Transactions on Internet Technology

  25. arXiv:2008.12363  [pdf, other

    cs.CV

    Analyzing Worldwide Social Distancing through Large-Scale Computer Vision

    Authors: Isha Ghodgaonkar, Subhankar Chakraborty, Vishnu Banna, Shane Allcroft, Mohammed Metwaly, Fischer Bordwell, Kohsuke Kimura, Xinxin Zhao, Abhinav Goel, Caleb Tung, Akhil Chinnakotla, Minghao Xue, Yung-Hsiang Lu, Mark Daniel Ward, Wei Zakharov, David S. Ebert, David M. Barbarash, George K. Thiruvathukal

    Abstract: In order to contain the COVID-19 pandemic, countries around the world have introduced social distancing guidelines as public health interventions to reduce the spread of the disease. However, monitoring the efficacy of these guidelines at a large scale (nationwide or worldwide) is difficult. To make matters worse, traditional observational methods such as in-person reporting is dangerous because o… ▽ More

    Submitted 27 August, 2020; originally announced August 2020.

    Comments: 10 pages, 15 figures

  26. Low-Power Object Counting with Hierarchical Neural Networks

    Authors: Abhinav Goel, Caleb Tung, Sara Aghajanzadeh, Isha Ghodgaonkar, Shreya Ghosh, George K. Thiruvathukal, Yung-Hsiang Lu

    Abstract: Deep Neural Networks (DNNs) can achieve state-of-the-art accuracy in many computer vision tasks, such as object counting. Object counting takes two inputs: an image and an object query and reports the number of occurrences of the queried object. To achieve high accuracy on such tasks, DNNs require billions of operations, making them difficult to deploy on resource-constrained, low-power devices. P… ▽ More

    Submitted 2 July, 2020; originally announced July 2020.

    Comments: Paper accepted to ISLPED 2020: ACM/IEEE International Symposium on Low Power Electronics and Design

  27. arXiv:2005.09091  [pdf, other

    cs.CY

    Observing Responses to the COVID-19 Pandemic using Worldwide Network Cameras

    Authors: Isha Ghodgaonkar, Abhinav Goel, Fischer Bordwell, Caleb Tung, Sara Aghajanzadeh, Noah Curran, Ryan Chen, Kaiwen Yu, Sneha Mahapatra, Vishnu Banna, Gore Kao, Kate Lee, Xiao Hu, Nick Eliopolous, Akhil Chinnakotla, Damini Rijhwani, Ashley Kim, Aditya Chakraborty, Mark Daniel Ward, Yung-Hsiang Lu, George K. Thiruvathukal

    Abstract: COVID-19 has resulted in a worldwide pandemic, leading to "lockdown" policies and social distancing. The pandemic has profoundly changed the world. Traditional methods for observing these historical events are difficult because sending reporters to areas with many infected people can put the reporters' lives in danger. New technologies are needed for safely observing responses to these policies. T… ▽ More

    Submitted 18 May, 2020; originally announced May 2020.

    Comments: 7 pages, 20 figures

  28. arXiv:2004.00092  [pdf, other

    eess.SP cs.CR

    VoltKey: Using Power Line Noise for Zero-Involvement Pairing and Authentication (Demo Abstract)

    Authors: Jack West, Tien VoNguyen, Isaac Ahlgren, Iryna Motyashok, George K. Thiruvathukal, Neil Klingensmith

    Abstract: We present VoltKey, a method that transparently generates secret keys for colocated devices, leveraging spatiotemporally unique noise contexts observed in commercial power line infrastructure. VoltKey extracts randomness from power line noise and securely converts it into an authentication token. Nearby devices which observe the same noise patterns on the powerline generate identical keys. The uni… ▽ More

    Submitted 31 March, 2020; originally announced April 2020.

    Comments: Tools Demo: Accepted at Information Processing in Sensor Networks 2020

  29. arXiv:2003.12452  [pdf, other

    cs.DC cs.OS

    FLIC: A Distributed Fog Cache for City-Scale Applications

    Authors: Jack West, Neil Kingensmith, George K. Thiruvathukal

    Abstract: We present FLIC, a distributed software data caching framework for fogs that reduces network traffic and latency. FLICis targeted toward city-scale deployments of cooperative IoT devices in which each node gathers and shares data with surrounding devices. As machine learning and other data processing techniques that require large volumes of training data are ported to low-cost and low-power IoT sy… ▽ More

    Submitted 24 March, 2020; originally announced March 2020.

    Comments: Accepted at 2020 IEEE International Conference on Fog Computing

  30. arXiv:2003.11066  [pdf, ps, other

    cs.CV

    A Survey of Methods for Low-Power Deep Learning and Computer Vision

    Authors: Abhinav Goel, Caleb Tung, Yung-Hsiang Lu, George K. Thiruvathukal

    Abstract: Deep neural networks (DNNs) are successful in many computer vision tasks. However, the most accurate DNNs require millions of parameters and operations, making them energy, computation and memory intensive. This impedes the deployment of large DNNs in low-power devices with limited compute resources. Recent research improves DNN models by reducing the memory requirement, energy consumption, and nu… ▽ More

    Submitted 24 March, 2020; originally announced March 2020.

    Comments: Accepted for publication at 2020 IEEE 6th World Forum on Internet of Things (WF-IoT), New Orleans, LA, USA 2020

  31. arXiv:1904.11812  [pdf, other

    cs.DC cs.SE

    A Benchmarking Study to Evaluate Apache Spark on Large-Scale Supercomputers

    Authors: George K. Thiruvathukal, Cameron Christensen, Xiaoyong Jin, François Tessier, Venkatram Vishwanath

    Abstract: As dataset sizes increase, data analysis tasks in high performance computing (HPC) are increasingly dependent on sophisticated dataflows and out-of-core methods for efficient system utilization. In addition, as HPC systems grow, memory access and data sharing are becoming performance bottlenecks. Cloud computing employs a data processing paradigm typically built on a loosely connected group of low… ▽ More

    Submitted 27 September, 2019; v1 submitted 26 April, 2019; originally announced April 2019.

    Comments: Submitted to IEEE Cloud 2019

  32. arXiv:1904.07714  [pdf, other

    cs.CV cs.AI cs.PF

    Low-Power Computer Vision: Status, Challenges, Opportunities

    Authors: Sergei Alyamkin, Matthew Ardi, Alexander C. Berg, Achille Brighton, Bo Chen, Yiran Chen, Hsin-Pai Cheng, Zichen Fan, Chen Feng, Bo Fu, Kent Gauen, Abhinav Goel, Alexander Goncharenko, Xuyang Guo, Soonhoi Ha, Andrew Howard, Xiao Hu, Yuanjun Huang, Donghyun Kang, Jaeyoun Kim, Jong Gook Ko, Alexander Kondratyev, Junhyeok Lee, Seungjae Lee, Suwoong Lee , et al. (19 additional authors not shown)

    Abstract: Computer vision has achieved impressive progress in recent years. Meanwhile, mobile phones have become the primary computing platforms for millions of people. In addition to mobile phones, many autonomous systems rely on visual data for making decisions and some of these systems have limited energy (such as unmanned aerial vehicles also called drones and mobile robots). These systems rely on batte… ▽ More

    Submitted 15 April, 2019; originally announced April 2019.

    Comments: Preprint, Accepted by IEEE Journal on Emerging and Selected Topics in Circuits and Systems. arXiv admin note: substantial text overlap with arXiv:1810.01732

  33. arXiv:1904.06775  [pdf, other

    cs.CV cs.DC

    See the World through Network Cameras

    Authors: Yung-Hsiang Lu, George K. Thiruvathukal, Ahmed S. Kaseb, Kent Gauen, Damini Rijhwani, Ryan Dailey, Deeptanshu Malik, Yutong Huang, Sarah Aghajanzadeh, Minghao Guo

    Abstract: Millions of network cameras have been deployed worldwide. Real-time data from many network cameras can offer instant views of multiple locations with applications in public safety, transportation management, urban planning, agriculture, forestry, social sciences, atmospheric information, and more. This paper describes the real-time data available from worldwide network cameras and potential applic… ▽ More

    Submitted 14 April, 2019; originally announced April 2019.

    Comments: This paper is accepted by IEEE Computer for publication

  34. arXiv:1901.06459  [pdf

    cs.SI cs.CV

    Cross-referencing Social Media and Public Surveillance Camera Data for Disaster Response

    Authors: Chittayong Surakitbanharn, Calvin Yau, Guizhen Wang, Aniesh Chawla, Yinuo Pan, Zhaoya Sun, Sam Yellin, David Ebert, Yung-Hsiang Lu, George K. Thiruvathukal

    Abstract: Physical media (like surveillance cameras) and social media (like Instagram and Twitter) may both be useful in attaining on-the-ground information during an emergency or disaster situation. However, the intersection and reliability of both surveillance cameras and social media during a natural disaster are not fully understood. To address this gap, we tested whether social media is of utility when… ▽ More

    Submitted 18 January, 2019; originally announced January 2019.

    Comments: Best Paper award in IEEE HST Conference 2018

  35. Cloud Resource Optimization for Processing Multiple Streams of Visual Data

    Authors: Zohar Kapach, Andrew Ulmer, Daniel Merrick, Arshad Alikhan, Yung-Hsiang Lu, Anup Mohan, Ahmed S. Kaseb, George K. Thiruvathukal

    Abstract: Hundreds of millions of network cameras have been installed throughout the world. Each is capable of providing a vast amount of real-time data. Analyzing the massive data generated by these cameras requires significant computational resources and the demands may vary over time. Cloud computing shows the most promise to provide the needed resources on demand. In this article, we investigate how to… ▽ More

    Submitted 18 January, 2019; originally announced January 2019.

    Comments: IEEE MultiMedia Magazine

  36. arXiv:1812.11901  [pdf, other

    cs.CV

    Large-Scale Object Detection of Images from Network Cameras in Variable Ambient Lighting Conditions

    Authors: Caleb Tung, Matthew R. Kelleher, Ryan J. Schlueter, Binhan Xu, Yung-Hsiang Lu, George K. Thiruvathukal, Yen-Kuang Chen, Yang Lu

    Abstract: Computer vision relies on labeled datasets for training and evaluation in detecting and recognizing objects. The popular computer vision program, YOLO ("You Only Look Once"), has been shown to accurately detect objects in many major image datasets. However, the images found in those datasets, are independent of one another and cannot be used to test YOLO's consistency at detecting the same object… ▽ More

    Submitted 31 December, 2018; originally announced December 2018.

    Comments: Submitted to MIPR 2019 (Accepted)

  37. arXiv:1810.01732  [pdf

    cs.CV

    2018 Low-Power Image Recognition Challenge

    Authors: Sergei Alyamkin, Matthew Ardi, Achille Brighton, Alexander C. Berg, Yiran Chen, Hsin-Pai Cheng, Bo Chen, Zichen Fan, Chen Feng, Bo Fu, Kent Gauen, Jongkook Go, Alexander Goncharenko, Xuyang Guo, Hong Hanh Nguyen, Andrew Howard, Yuanjun Huang, Donghyun Kang, Jaeyoun Kim, Alexander Kondratyev, Seungjae Lee, Suwoong Lee, Junhyeok Lee, Zhiyu Liang, Xin Liu , et al. (16 additional authors not shown)

    Abstract: The Low-Power Image Recognition Challenge (LPIRC, https://rebootingcomputing.ieee.org/lpirc) is an annual competition started in 2015. The competition identifies the best technologies that can classify and detect objects in images efficiently (short execution time and low energy consumption) and accurately (high precision). Over the four years, the winners' scores have improved more than 24 times.… ▽ More

    Submitted 3 October, 2018; originally announced October 2018.

    Comments: 13 pages, workshop in 2018 CVPR, competition, low-power, image recognition

  38. Tests as Maintainable Assets Via Auto-generated Spies: A case study involving the Scala collections library's Iterator trait

    Authors: Konstantin Läufer, John O'Sullivan, George K. Thiruvathukal

    Abstract: In testing stateful abstractions, it is often necessary to record interactions, such as method invocations, and express assertions over these interactions. Following the Test Spy design pattern, we can reify such interactions programmatically through additional mutable state. Alternatively, a mocking framework, such as Mockito, can automatically generate test spies that allow us to record the inte… ▽ More

    Submitted 22 August, 2019; v1 submitted 29 August, 2018; originally announced August 2018.

    Journal ref: Proc. 10th ACM SIGPLAN Symposium on Scala (Scala '19), pp17-21, London, UK, July 17, 2019

  39. arXiv:1804.02053  [pdf, other

    cs.SE

    Metrics Dashboard: A Hosted Platform for Software Quality Metrics

    Authors: George K. Thiruvathukal, Shilpika, Nicholas J. Hayward, Konstantin Läufer

    Abstract: There is an emerging consensus in the scientific software community that progress in scientific research is dependent on the "quality and accessibility of software at all levels" (wssspe.researchcomputing.org.uk/). This progress depends on embracing the best traditional---and emergent---practices in software engineering, especially agile practices that intersect with the more formal tradition of s… ▽ More

    Submitted 8 April, 2018; v1 submitted 5 April, 2018; originally announced April 2018.

    Comments: 9 pages

  40. arXiv:1802.08176  [pdf, other

    cs.DC

    Analyzing Real-Time Multimedia Content From Network Cameras Using CPUs and GPUs in the Cloud

    Authors: Ahmed S. Kaseb, Bo Fu, Anup Mohan, Yung-Hsiang Lu, Amy Reibman, George K. Thiruvathukal

    Abstract: Millions of network cameras are streaming real-time multimedia content (images or videos) for various environments (e.g., highways and malls) and can be used for a variety of applications. Analyzing the content from many network cameras requires significant amounts of computing resources. Cloud vendors offer resources in the form of cloud instances with different capabilities and hourly costs. Som… ▽ More

    Submitted 21 March, 2018; v1 submitted 21 February, 2018; originally announced February 2018.

    Comments: Accepted at MIPR 2018

  41. arXiv:1705.02899  [pdf, other

    cs.SE cs.DC

    Teaching Concurrent Software Design: A Case Study Using Android

    Authors: Konstantin Läufer, George K. Thiruvathukal

    Abstract: In this article, we explore various parallel and distributed computing topics from a user-centric software engineering perspective. Specifically, in the context of mobile application development, we study the basic building blocks of interactive applications in the form of events, timers, and asynchronous activities, along with related software modeling, architecture, and design topics.

    Submitted 8 May, 2017; originally announced May 2017.

    Comments: Submitted to CDER NSF/IEEE-TCPP Curriculum Initiative on Parallel and Distributed Computing - Core Topics for Undergraduates

    ACM Class: D.2.1; D.2.5; D.2.6; D.3.3; D.1.3; D.1.5; D.2.2; D.2.5; D.2.11