no code implementations • 5 Dec 2023 • Yue Niu, Ramy E. Ali, Saurav Prakash, Salman Avestimehr
The main part flows into a small model while the residuals are offloaded to a large model.
no code implementations • 5 Oct 2021 • Jinhyun So, Ramy E. Ali, Başak Güler, A. Salman Avestimehr
A buffered asynchronous training protocol known as FedBuff has been proposed recently which bridges the gap between synchronous and asynchronous training to mitigate stragglers and to also ensure privacy simultaneously.
no code implementations • 29 Sep 2021 • Jinhyun So, Chaoyang He, Chien-Sheng Yang, Songze Li, Qian Yu, Ramy E. Ali, Basak Guler, Salman Avestimehr
We also demonstrate that, unlike existing schemes, LightSecAgg can be applied to secure aggregation in the asynchronous FL setting.
no code implementations • 20 Sep 2021 • Mahdi Soleymani, Ramy E. Ali, Hessam Mahdavifar, A. Salman Avestimehr
While this learning-based approach is more resource-efficient than replication, it is tailored to the specific model hosted by the cloud and is particularly suitable for a small number of queries (typically less than four) and tolerating very few (mostly one) number of stragglers.
no code implementations • 27 Jul 2021 • Tingting Tang, Ramy E. Ali, Hanieh Hashemi, Tynan Gangwani, Salman Avestimehr, Murali Annavaram
Much of the overhead in prior schemes comes from the fact that they tightly couple coding for all three problems into a single framework.
no code implementations • 7 Jun 2021 • Jinhyun So, Ramy E. Ali, Basak Guler, Jiantao Jiao, Salman Avestimehr
In fact, we show that the conventional random user selection strategies in FL lead to leaking users' individual models within number of rounds that is linear in the number of users.
no code implementations • 27 Jan 2021 • Mahdi Soleymani, Ramy E. Ali, Hessam Mahdavifar, A. Salman Avestimehr
We further propose folded Lagrange coded computing (FLCC) to incorporate the developed techniques into a specific coded computing setting.
no code implementations • 11 Nov 2020 • Ramy E. Ali, Jinhyun So, A. Salman Avestimehr
In this work, we empirically show that the square function is not the best degree-2 polynomial that can replace the ReLU function even when restricting the polynomials to have integer coefficients.
no code implementations • 14 Feb 2020 • Ramy E. Ali
Partial quorum systems are widely used in distributed key-value stores due to their latency benefits at the expense of providing weaker consistency guarantees.
no code implementations • 9 Oct 2019 • Ramy E. Ali, Bilgehan Erman, Ejder Baştuğ, Bruce Cilli
This paper explores a deep reinforcement learning approach applied to the packet routing problem with high-dimensional constraints instigated by dynamic and autonomous communication networks.