Ravi Sundaram

ORCID: 0000-0001-5657-4298
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Complex Network Analysis Techniques
  • Optimization and Search Problems
  • Complexity and Algorithms in Graphs
  • Peer-to-Peer Network Technologies
  • Caching and Content Delivery
  • Game Theory and Applications
  • Cryptography and Data Security
  • Advanced Graph Theory Research
  • Opportunistic and Delay-Tolerant Networks
  • Game Theory and Voting Systems
  • Opinion Dynamics and Social Influence
  • Distributed systems and fault tolerance
  • Network Security and Intrusion Detection
  • Auction Theory and Applications
  • Machine Learning and Algorithms
  • Wireless Communication Security Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Mobile Ad Hoc Networks
  • Recommender Systems and Techniques
  • Network Traffic and Congestion Control
  • Computational Geometry and Mesh Generation
  • Advanced Graph Neural Networks
  • Cloud Computing and Resource Management
  • Interconnection Networks and Systems
  • Economic theories and models

Northeastern University
2013-2022

Eastern University
2020

Universidad del Noreste
2004-2019

Ansys (United States)
2015

Massachusetts Institute of Technology
1995-2011

National Institute of Technology Tiruchirappalli
2009

North Shore University Hospital
2004-2006

Virginia Tech
2006

Akamai (United States)
2005

Delta Air Lines (United States)
1998

We address the problem of serving Deep Neural Networks (DNNs) efficiently from a cluster GPUs. In order to realize promise very low-cost processing made by accelerators such as GPUs, it is essential run them at sustained high utilization. Doing so requires cluster-scale resource management that performs detailed scheduling reasoning about groups DNN invocations need be co-scheduled, and moving conventional whole-DNN execution model executing fragments DNNs. Nexus fully implemented system...

10.1145/3341301.3359658 article EN 2019-10-21

Many emerging scientific and industrial applications require transferring multiple Tbytes of data on a daily basis. Examples include pushing from particle accelerators/colliders to laboratories around the world, synchronizing data-centers across continents, replicating collections high definition videos events taking place at different time-zones. A key property all above is their ability tolerate delivery delays ranging few hours days. Such Delay Tolerant Bulk (DTB) are currently being...

10.1145/1555349.1555376 article EN 2009-06-15

In this paper, we address the problem of cross-layer denial service attack in wireless data networks. We introduce SPREAD -a novel adaptive diversification approach to provide resiliency against such attacks. relies on a mechanism-hopping technique, which can be seen as multi-layer extension frequency-hopping technique. apply game-theoretic framework for modeling interaction communicating nodes and adversaries analyze proposed approach. reason about advantages various types jammers...

10.1109/infcom.2007.316 article EN 2007-01-01

Recently, cloud computing services such as Amazon EC2 have used virtualization to provide customers with virtual machines running on the provider's hardware, typically charging by wall clock time rather than resources consumed. Under this business model, manipulation of scheduler may allow theft-of-service at expense other customers. We discovered and implemented an attack scenario which when allowed consume more CPU regardless fair share. a novel analysis necessary conditions for attacks,...

10.1109/nca.2011.24 article EN 2011-08-01

Many emerging scientific and industrial applications require transferring multiple terabytes of data on a daily basis. Examples include pushing from particle accelerators/colliders to laboratories around the world, synchronizing datacenters across continents, replicating collections high-definition videos events taking place at different time-zones. A key property all above is their ability tolerate delivery delays ranging few hours days. Such delay-tolerant bulk (DTB) are currently being...

10.1109/tnet.2012.2237555 article EN IEEE/ACM Transactions on Networking 2013-01-30

There have been significant advances in our understanding of cancer as a disease at the molecular level. Combined with improved diagnostic systems, concept personalized medicine was introduced where therapy for every patient can be customized according to their profile. The nanotechnology approach formulation design and advent drug delivery systems small molecules biologics has contributed development medicine. Despite progress, effective management treatment remains clinical challenge....

10.1039/c4tb01083c article EN Journal of Materials Chemistry B 2014-01-01

Consider public health officials aiming to spread awareness about a new vaccine in community interconnected by social network. How can they distribute information with minimal resources, so as avoid polarization and ensure community-wide convergence of opinion? To tackle such challenges, we initiate the study sample complexity opinion formation networks. Our framework is built on recognized game, where regard each agent’s data-derived model, unlike previous works that treat opinions...

10.1609/aaai.v39i13.33531 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2025-04-11

We introduce a notion of universality in the context optimization problems with partial information. Universality is framework for dealing uncertainty by guaranteeing certain quality goodness all possible completions information set. Universal variants can be defined that are both natural and well-motivated. consider universal versions three classical problems: TSP, Steiner Tree Set Cover.We present polynomial-time algorithm to find tour on given metric space over n vertices such any subset...

10.1145/1060590.1060649 article EN 2005-05-22

A graph $G$ is said to be $d$-distinguishable if there a $d$-coloring of which no non-trivial automorphism preserves. That is, $\exists \chi: G \rightarrow \{1, \ldots, d\},$ $$ \forall \phi \in \mathrm{Aut}(G) \setminus \{\mathbf{id}\}, \exists v, \chi(v) \neq \chi(\phi(v)). It was conjectured that $|G| > |\mathrm{Aut}(G)|$ and the $\mathrm{Aut}(G)$ action on has singleton orbits, then 2-distinguishable. We give an example where this fails. partially repair conjecture by showing when...

10.37236/1361 article EN The Electronic Journal of Combinatorics 1998-03-24

10.1007/s000370050007 article EN Computational Complexity 1998-11-01

Motivated by applications in social networks, peer-to-peer and overlay we define study the Bounded Budget Connection (BBC) game - have a collection of n players or nodes each whom has budget for purchasing links; link cost as well length node set preference weights remaining nodes; objective is to use its buy outgoing links so minimize sum preference-weighted distances nodes. We structural complexity-theoretic properties pure Nash equilibria BBC games. show that determining existence...

10.1145/1400751.1400774 article EN 2008-08-18

Blind rendezvous is a fundamental problem in cognitive radio networks. The involves collection of agents (radios) that wish to discover each other (i.e., rendezvous) the blind setting where there no shared infrastructure and they initially have knowledge other. Time divided into discrete slots spectrum channels, [n] = 1, 2, ..., n. Each agent may access (or hop on) single channel time slot two when on same slot. goal design deterministic hopping schedules for so as guarantee between any pair...

10.1109/icdcs.2014.44 article EN 2014-06-01

We study the problem of finding small trees. Classical network design problems are considered with additional constraint that only a specified number $k$ nodes required to be connected in solution. A prototypical example is $k$MST which we require tree minimum weight spanning at least an edge-weighted graph. show NP-hard even for points Euclidean plane. provide approximation algorithms performance ratio $2\sqrt{k}$ general case and $O(k^{1/4})$ Polynomial-time exact solutions also presented...

10.48550/arxiv.math/9409222 preprint EN other-oa arXiv (Cornell University) 1994-01-01

In hardware virtualization a hypervisor provides multiple Virtual Machines (VMs) on single physical system, each executing separate operating system instance. The schedules execution of these VMs much as the scheduler in an does, balancing factors such fairness d I/O performance. As may be vulnerable to malicious behavior part users seeking deny service others or maximize their own resource usage. Recently, publically available cloud computing services Amazon EC2 have used provide customers...

10.3233/jcs-130474 article EN Journal of Computer Security 2013-09-20

We resolve the computational complexity of a number outstanding open problems with practical applications. Here is list we show to be ${\bf{PPAD}}$-complete, along domains significance: fractional stable paths problem (FSPP)---Internet routing; core balanced games---economics and game theory; Scarf's lemma---combinatorics; hypergraph matching---social choice preference systems; bounded budget connection games (FBBC)---social networks; strong kernel---graph theory. In fact, that no fully...

10.1137/120874655 article EN SIAM Journal on Computing 2013-01-01

Credit card fraud transaction detection system is a method used for determining the fraudulent transactions that take place every once in while. The project uses test data set of around 27,000 credit which have been taken from Caltech (Kaggle). comprises primarily 2 major algorithms and anomaly as to classify transactions. Local Outlier Factor (LoF) defines various parameters be criteria It then checks upon different present given LoF. This factor gives each score based on or will place....

10.1109/iciict1.2019.8741421 article EN 2019-04-01

A flow of a commodity is said to be confluent if at any node all the leaves along single edge. In this article, we study single-commodity problems, where need route given demands destination using flow. Single- and multi-commodity flows arise in variety application areas, most notably networking; fact, Internet are (multi-commodity) since routing based. We present near-tight approximation algorithms, hardness results, existence theorems for minimizing congestion flows. The maximum edge...

10.1145/1255443.1255444 article EN Journal of the ACM 2007-07-01

In a landmark paper, Papadimitriou introduced number of syntactic subclasses TFNP based on proof styles that (unlike TFNP) admit complete problems. A recent series results has shown finding Nash equilibria is for PPAD, particularly notable subclass TFNP. major goal this work to expand the universe known PPAD-complete We resolve computational complexity outstanding open problems with practical applications. Here list we show be PPAD-complete, along domains significance: Fractional Stable...

10.1109/focs.2009.57 article EN 2009-10-01

In hardware virtualization a hypervisor provides multiple Virtual Machines (VMs) on single physical system, each executing separate operating system instance. The schedules execution of these VMs much as the scheduler in an does, balancing factors such fairness and I/O performance. As may be vulnerable to malicious behavior part users seeking deny service others or maximize their own resource usage. Recently, publically available cloud computing services Amazon EC2 have used provide...

10.48550/arxiv.1103.0759 preprint EN other-oa arXiv (Cornell University) 2011-01-01

Real-world networks often consist of multiple layers, be they infrastructure such as airline or social collaboration networks. A common aspect to these is that there are sub-networks evolve in parallel on the same node set -- referred multiplex For example, case networks, cities (nodes) have been well-established for several decades if not centuries, but over time new airlines (sub-networks) emerge and each creates its own flight linkages between cities. Similarly modalities communications...

10.1145/2808797.2808900 article EN 2015-08-25
Coming Soon ...