no code implementations • 14 Nov 2022 • SM Zobaed, Ali Mokhtari, Jaya Prakash Champati, Mathieu Kourouma, Mohsen Amini Salehi
We propose an efficient NN model management framework, called Edge-MultiAI, that ushers the NN models of the DL applications into the edge memory such that the degree of multi-tenancy and the number of warm-starts are maximized.
1 code implementation • 31 May 2022 • Ali Mokhtari, Md Abir Hossen, Pooyan Jamshidi, Mohsen Amini Salehi
The challenge is to allocate user requests for different ML applications on the Heterogeneous Edge Computing Systems (HEC) with respect to both the energy and latency constraints of these systems.
no code implementations • 17 Dec 2021 • Davood G. Samani, Mohsen Amini Salehi
Deep Learning-based (DL) applications are becoming increasingly popular and advancing at an unprecedented pace.
1 code implementation • 26 Feb 2021 • Sakib M Zobaed, Mohsen Amini Salehi, Rajkumar Buyya
We propose Smartness At Edge (SAED mechanism that offers intelligence in the form of semantic and personalized search at the edge tier while maintaining privacy of the search on the cloud tier.
no code implementations • 10 Feb 2021 • SM Zobaed, Md Enamul Haque, Md Fazle Rabby, Mohsen Amini Salehi
Word sense disambiguation (WSD) methods identify the most suitable meaning of a word with respect to the usage of that word in a specific context.
no code implementations • 11 Dec 2020 • Razin Farhan Hussain, Alireza Pakravan, Mohsen Amini Salehi
To make Industry 4. 0 robust, solution architects and researchers need to understand the behavior of DNN-based applications and capture the stochasticity exists in their inference times.
no code implementations • 22 May 2020 • SM Zobaed, Mohsen Amini Salehi
To overcome the hindrance in clustering encrypted big data, we propose privacy-preserving clustering schemes for three forms of unstructured encrypted big datasets, namely static, semi-dynamic, and dynamic datasets.
no code implementations • 14 Aug 2019 • SM Zobaed, Sahan Ahmad, Raju Gottumukkala, Mohsen Amini Salehi
One common approach to address the concerns is client-side encryption where data is encrypted on the client machine before being stored in the cloud.
Cryptography and Security Distributed, Parallel, and Cluster Computing