Loading...
Search for: izadi--m
0.007 seconds
Total 41 records

    Modeling real-time coordination systems using timed Bchi automata

    , Article 2011 CSI International Symposium on Computer Science and Software Engineering, CSSE 2011, 15 June 2011 through 16 June 2011 ; June , 2011 , Pages 17-24 ; 9781612842073 (ISBN) Ahmadi Danesh, Z ; Izadi, M ; Sharif University of Technology
    2011
    Abstract
    Reo is an exogenous coordination language for synthesizing components participating in a component-based system. The notion of Bchi automaton over streams of records (BAR for short) is a proposed operational semantics for Reo that covers several aspects of coordination strategies such as synchronization, context dependencies and fairness constraints. In this paper and for the purpose of modeling real-time coordination systems specified by Reo, we present a timed version of BARs as the acceptors of timed streams of records. We show that timed BAR and its streams of records based semantics are more standard and also more expressive than timed constraint automaton which is the first proposed... 

    Byzantine consensus for unknown dynamic networks

    , Article Journal of Supercomputing ; Volume 71, Issue 4 , April , 2015 , Pages 1587-1603 ; 09208542 (ISSN) Taheri, E ; Izadi, M ; Sharif University of Technology
    Kluwer Academic Publishers  2015
    Abstract
    In a distributed system, each solution for the problem of Byzantine agreement requires that some of the correct processes reach a common decision value from a set of proposed values while Byzantine processes may behave arbitrarily. While the problem has been widely studied in fully connected fixed networks, few studies have been carried out in the context of self-organizing mobile networks such as mobile ad hoc networks. We present a randomized consensus protocol with three additional modules for the case of dynamic networks: participant detectors, failure detectors and maintainer. We assume an asynchronous network with unknown participants where processes can be fixed or move continuously... 

    Automata based model checking for reo connectors

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 15 April 2009 through 17 April 2009 ; Volume 5961 LNCS , 2010 , Pages 260-275 ; 03029743 (ISSN) ; 3642116221 (ISBN) Bonsangue, M. M ; Izadi, M ; Sharif University of Technology
    Abstract
    Reo is a connector language for the exogenous composition and orchestration of components in a software system. An operational semantics of Reo connectors can be given in terms of Büchi automata over a suitable alphabet of records, capturing both synchronization and context dependency requirements. In this paper, we define an action based linear time temporal logic for expressing properties of Reo connectors. Formulas can be synthesized into Büchi automata representing Reo connectors, thus leading to an automata based model checking algorithm. By generalizing standard automata based model checking algorithms for linear time temporal logic, we give an efficient on-the-fly algorithm for the... 

    A Buchi automata based model checking framework for reo connectors

    , Article Proceedings of the ACM Symposium on Applied Computing, 26 March 2012 through 30 March 2012 ; March , 2012 , Pages 1536-1543 ; 9781450308571 (ISBN) Keshishzadeh, S ; Izadi, M ; Movaghar, A ; Sharif University of Technology
    Abstract
    Reo is an exogenous coordination language for synchronizing components participating in a component-based system. In this paper we provide a verification framework for model checking of Reo connectors. The proposed framework applies an extension of Büchi automata as the operational semantic model for Reo connectors and a record-based extension of linear time temporal logic (LTL) for expressing properties. Several aspects of Reo connectors, specially synchronization, context dependencies and fairness constraints, are addressed by this model checker due to its supported underlying model. The main ideas behind this implementation are to introduce a symbolic representation for the main elements... 

    Recommender systems for social networks analysis and mining: Precision versus diversity

    , Article Understanding Complex Systems ; Volume 73 , 2016 , Pages 423-438 ; 18600832 (ISSN) Javari, A ; Izadi, M ; Jalili, M ; Sharif University of Technology
    Springer Verlag  2016
    Abstract
    Recommender systems has become increasingly important in online community for providing personalized services and products to users. Traditionally, performance of recommender algorithms has been evaluated based on accuracy and the focus of the research was on providing accurate recommendation lists. However, recently diversity and novelty of recommendation lists have been introduced as key issues in designing recommender systems. In general, novelty/diversity and accuracy do not go hand in hand. Therefore, designing models answering novelty/diversityaccuracy dilemma is one of the challenging problems in the context of practical recommender systems. In this paper, we first introduce the... 

    An exact algorithm for the minimum dilation triangulation problem

    , Article Journal of Global Optimization ; Volume 69, Issue 2 , 2017 , Pages 343-367 ; 09255001 (ISSN) Sattari, S ; Izadi, M ; Sharif University of Technology
    Abstract
    Given a triangulation of a point set on the plane, dilation of any pair of the points is the ratio of their shortest path length to their Euclidean distance. The maximum dilation over all pairs of points is called the dilation of this triangulation. Minimum dilation triangulation problem seeks a triangulation with the least possible dilation of an input point set. For this problem no polynomial time algorithm is known. We present an exact algorithm based on a branch and bound method for finding minimum dilation triangulations. This deterministic algorithm after generating an initial solution, iteratively computes a lower bound for the answer and then applies a branch and bound method to find... 

    Upper bounds for minimum dilation triangulation in two special cases

    , Article Information Processing Letters ; Volume 133 , 2018 , Pages 33-38 ; 00200190 (ISSN) Sattari, S ; Izadi, M ; Sharif University of Technology
    Elsevier B.V  2018
    Abstract
    Give a triangulation of a set of points on the plane, dilation of any two points is defined as the ratio between the length of the shortest path of these points and their Euclidean distance. Minimum dilation triangulation is a triangulation in which the maximum dilation between any pair of the points is minimized. We give upper bounds on the dilation of the minimum dilation triangulation for two kinds of point sets: An upper bound of nsin⁡(π/n)/2 for a centrally symmetric convex point set containing n points, and an upper bound of 1.19098 for a set of points on the boundary of a semicircle. © 2018 Elsevier B.V  

    Optimal network configuration considering network losses and service reliability

    , Article IEEE Proceedings 2017 Smart Grid Conference, SGC 2017 ; Volume 2018-January , 2018 , Pages 1-6 ; 9781538642795 (ISBN) Gharebaghi, S ; Izadi, M ; Safdarian, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Distribution networks are designed in loop structure, while they are operated as radial networks. In this regard, the location of normally open (NO) switches is usually determined by either minimizing real power losses or maximizing the reliability level. However, considering both losses and reliability in the decision making procedure may lead to a better solution. To do so, this paper proposes a mathematical model to find the optimal configuration of NO switches such that losses and reliability are optimized. The multi-objective model is scrutinized via weighted sum approach to achieve a single-objective model. The model is formulated in mixed integer quadratically constrained programming... 

    A protocol for constraint automata execution in a synchronous network of processors

    , Article 12th International Conference on Verification and Evaluation of Computer and Communication Systems, VECoS 2018, 26 September 2018 through 28 September 2018 ; Volume 11181 LNCS , 2018 , Pages 80-94 ; 03029743 (ISSN); 9783030003586 (ISBN) Farhadi, A ; Izadi, M ; Habibi, J ; Sharif University of Technology
    Springer Verlag  2018
    Abstract
    In service oriented computing we encounter the problem of coordinating autonomous services (e.g., micro-services) communicate within the deployment environments (e.g., multi-cloud infrastructures) but participate for the functional requirements. While the environments have the deployment concerns like real-time, security, privacy or even energy consumption constraints, for the sake of brevity, the formal models of coordination in service oriented systems generally abstract away these concerns and focus on the functional ones such as synchronization, data and context dependency constraints. In this paper, we consider Constraint Automata (CA) as a formal model of the functional behaviours for... 

    A hybrid method for reduction of energy consumption in cloud networks

    , Article 18th CSI International Symposium on Computer Science and Software Engineering, CSSE 2017, 25 October 2017 through 27 October 2017 ; Volume 2018-January , 2018 , Pages 18-23 ; 9781538613023 (ISBN) Tarahomi, M ; Izadi, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2018
    Abstract
    Cloud computing consists of physical data centers each of which including hundreds or thousands of computers. A key enabler technology is virtualization. The Virtualization allows us to separate virtual machines in a way that each of these so-called virtualized machines can be configured with a number of hosts according to the type of application of the user. It is also possible to dynamically alter the allocated resources of a virtual machine. One of the most important challenges in terms of cloud computing is to maintain an optimized load balance in cloud environment on servers because this issue is critical for energy consumption. In this paper, we propose a hybrid method for reduction of... 

    An improved upper bound on dilation of regular polygons

    , Article Computational Geometry: Theory and Applications ; Volume 80 , 2019 , Pages 53-68 ; 09257721 (ISSN) Sattari, S ; Izadi, M ; Sharif University of Technology
    Elsevier B.V  2019
    Abstract
    Dilation of a set of points on the plane is the lowest possible dilation of a plane spanner on the point set. We show that dilation of vertices of any regular polygon is less than 1.4482. We introduce a method for constructing a triangulation of a regular polygon and prove this bound on its dilation. The upper bound on dilation is shown using mathematical proofs and experimental results. The new upper bound improves the previously known bound of 1.48454. © 2019 Elsevier B.V  

    A prediction-based and power-aware virtual machine allocation algorithm in three-tier cloud data centers

    , Article International Journal of Communication Systems ; Volume 32, Issue 3 , 2019 ; 10745351 (ISSN) Tarahomi, M ; Izadi, M ; Sharif University of Technology
    John Wiley and Sons Ltd  2019
    Abstract
    With the increasing popularity of cloud computing services, the more number of cloud data centers are constructed over the globe. This makes the power consumption of cloud data center elements as a big challenge. Hereby, several software and hardware approaches have been proposed to handle this issue. However, this problem has not been optimally solved yet. In this paper, we propose an online cloud resource management with live migration of virtual machines (VMs) to reduce power consumption. To do so, a prediction-based and power-aware virtual machine allocation algorithm is proposed. Also, we present a three-tier framework for energy-efficient resource management in cloud data centers.... 

    Energy efficiency in virtual machines allocation for cloud data centers with lottery algorithm

    , Article International Journal of Electrical and Computer Engineering ; Volume 9, Issue 1 , 2019 , Pages 546-553 ; 20888708 (ISSN) Tarahomi, M ; Izadi, M ; Sharif University of Technology
    Institute of Advanced Engineering and Science  2019
    Abstract
    Energy usage of data centers is a challenging and complex issue because computing applications and data are growing so quickly that increasingly larger servers and disks are needed to process them fast enough within the required time period. In the past few years, many approaches to virtual machine placement have been proposed. This study proposes a new approach for virtual machine allocation to physical hosts. Either minimizes the physical hosts and avoids the SLA violation. The proposed method in comparison to the other algorithms achieves better results. Copyright © 2019 Institute of Advanced Engineering and Science. All rights reserved  

    A hybrid algorithm to reduce energy consumption management in cloud data centers

    , Article International Journal of Electrical and Computer Engineering ; Volume 9, Issue 1 , 2019 , Pages 554-561 ; 20888708 (ISSN) Tarahomi, M ; Izadi, M ; Sharif University of Technology
    Institute of Advanced Engineering and Science  2019
    Abstract
    There are several physical data centers in cloud environment with hundreds or thousands of computers. Virtualization is the key technology to make cloud computing feasible. It separates virtual machines in a way that each of these so-called virtualized machines can be configured on a number of hosts according to the type of user application. It is also possible to dynamically alter the allocated resources of a virtual machine. Different methods of energy saving in data centers can be divided into three general categories: 1) methods based on load balancing of resources; 2) using hardware facilities for scheduling; 3) considering thermal characteristics of the environment. This paper focuses... 

    New approach for reducing energy consumption and load balancing in data centers of cloud computing

    , Article Journal of Intelligent and Fuzzy Systems ; Volume 37, Issue 5 , 2019 , Pages 6443-6455 ; 10641246 (ISSN) Tarahomi, M ; Izadi, M ; Sharif University of Technology
    IOS Press  2019
    Abstract
    Cloud computing is a new framework, which is facing a numerous type of challenges including resource management and energy consumption of data centers. One of the most important duties of cloud service providers is to manage resources and schedule tasks for reducing energy consumption in data centers. In this paper, fuzzy logic is used for finding most adequate DC, improved DVFS algorithm is used for selecting ideal host and developed version of EDF-VD algorithm is utilized for Task scheduling and load balance in cloud computing. Our approach improvement to the current methods including EEVS, DVFS, Homogeneous, MBFD and EEVS-N. © 2019-IOS Press and the authors. All rights reserved  

    New approach for reducing energy consumption and load balancing in data centers of cloud computing

    , Article Journal of Intelligent and Fuzzy Systems ; Volume 37, Issue 5 , 2019 , Pages 6443-6455 ; 10641246 (ISSN) Tarahomi, M ; Izadi, M ; Sharif University of Technology
    IOS Press  2019
    Abstract
    Cloud computing is a new framework, which is facing a numerous type of challenges including resource management and energy consumption of data centers. One of the most important duties of cloud service providers is to manage resources and schedule tasks for reducing energy consumption in data centers. In this paper, fuzzy logic is used for finding most adequate DC, improved DVFS algorithm is used for selecting ideal host and developed version of EDF-VD algorithm is utilized for Task scheduling and load balance in cloud computing. Our approach improvement to the current methods including EEVS, DVFS, Homogeneous, MBFD and EEVS-N. © 2019-IOS Press and the authors. All rights reserved  

    Generating summaries for methods of event-driven programs: An Android case study

    , Article Journal of Systems and Software ; Volume 170 , 2020 Aghamohammadi, A ; Izadi, M ; Heydarnoori, A ; Sharif University of Technology
    Elsevier Inc  2020
    Abstract
    The lack of proper documentation makes program comprehension a cumbersome process for developers. Source code summarization is one of the existing solutions to this problem. Many approaches have been proposed to summarize source code in recent years. A prevalent weakness of these solutions is that they do not pay much attention to interactions among elements of software. An element is simply a callable code snippet such as a method or even a clickable button. As a result, these approaches cannot be applied to event-driven programs, such as Android applications, because they have specific features such as numerous interactions between their elements. To tackle this problem, we propose a novel... 

    Decreasing the execution time of reducers by revising clustering based on the futuristic greedy approach

    , Article Journal of Big Data ; Volume 7, Issue 1 , 2020 Bakhthemmat, A ; Izadi, M ; Sharif University of Technology
    Springer  2020
    Abstract
    MapReduce is used within the Hadoop framework, which handles two important tasks: mapping and reducing. Data clustering in mappers and reducers can decrease the execution time, as similar data can be assigned to the same reducer with one key. Our proposed method decreases the overall execution time by clustering and lowering the number of reducers. Our proposed algorithm is composed of five phases. In the first phase, data are stored in the Hadoop structure. In the second phase, we cluster data using the MR-DBSCAN-KD method in order to determine all of the outliers and clusters. Then, the outliers are assigned to the existing clusters using the futuristic greedy method. At the end of the... 

    Improving quality of a post's set of answers in stack overflow

    , Article 46th Euromicro Conference on Software Engineering and Advanced Applications, SEAA 2020, 26 August 2020 through 28 August 2020 ; 2020 , Pages 504-512 Tavakoli, M ; Izadi, M ; Heydarnoori, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2020
    Abstract
    Community Question Answering platforms such as Stack Overflow help a wide range of users solve their challenges on-line. As the popularity of these communities has grown over the years, both the number of members and posts have escalated. Also, due to the diverse backgrounds, skills, expertise, and viewpoints of users, each question may obtain more than one answer. Therefore, the focus has changed toward producing posts that have a set of answers more valuable for the community as a whole, not just one accepted-answer aimed at satisfying only the question-asker. Same as every universal community, a large number of low-quality posts on Stack Overflow require improvement. We call these posts... 

    Linear temporal logic of constraint automata

    , Article 13th International Computer Society of Iran Computer Conference on Advances in Computer Science and Engineering, CSICC 2008, Kish Island, 9 March 2008 through 11 March 2008 ; Volume 6 CCIS , 2008 , Pages 972-975 ; 18650929 (ISSN); 3540899847 (ISBN); 9783540899846 (ISBN) Navidpour, S ; Izadi, M ; Sharif University of Technology
    2008
    Abstract
    Constraint automata are formalisms to describe the behavior and possible data flow in coordination models. In this paper we introduce a linear time temporal logic, called temporal logic of steps (TLS), for specifying the executions of constraint automata. TLS is the first attempt in presenting a linear temporal logic for constraint automata. Having TLS in hand, we are able to design model checking algorithms for verification of concurrent systems modeled by constraint automata. © 2008 Springer-Verlag