Auction-based Resource Management in Computer Architecture


Resource management systems rely on a centralized approach to manage applications running on each resource. The centralized resource management system is not efficient and scalable for large-scale servers as the number of applications running on shared resources is increasing dramatically and the centralized manager may not have enough information about applications’ need.

This work proposes a decentralized auction-based resource management approach to reach an optimal strategy in a resource competition game. The applications learn through repeated interactions to select their optimal action for shared resources. Specifically, we investigate two case studies of cache competition game and main processor and coprocessor congestion game. We enforce costs for each resource and derive bidding strategy. Accurate evaluation of the proposed approach show that our distributed allocation is scalable and outperforms the static and traditional approaches.

Full article > CARMA

Semantic Scholar Information is not Stable!

The website is spreading unstable info about many scholars, their papers and their citations. Just try my name:

It was better to supervise/verify the info before making public on the web, otherwise shut it down! I’m totally disappointed with SemanticScholar!

CAGE: Contention-Aware Game-theoretic modEl


Traditional resource management systems rely on a centralized approach to manage users running on each resource. The centralized resource management system is not scalable for large-scale servers as the number of users running on shared resources is increasing dramatically and the centralized manager may not have enough information about applications’ need. In this paper we propose a distributed game-theoretic resource management approach using market auction mechanism to find optimal strategy in a resource competition game. The applications learn through repeated interactions to choose their action on choosing the shared resources. Specifically, we look into two case studies of cache competition game and main processor and coprocessor congestion game. We enforce costs for each resource and derive bidding strategy. Accurate evaluation of the proposed approach show that our distributed allocation is scalable and outperforms the static and traditional approaches.

Draft > CAGE


Split AT&T Bill in a Shared Data Plan

Getting fair shares for a shared data plan is always disaster! Because it is not a simple +/- but also there are a lot of overheads included inside the charges such as tax and extras, and also AT&T doesn’t divide the data charge and overage among the lines but only one line!

The attached EXCEL file contains the details of the processing of the separate shares of a 13-line AT&T data shared plan. To start with it, you should fill out the yellow boxes at the bottom of the file. You can get help from “View my bill” page at AT&T website. The instructions can be as follows:

  1. Fill out total bill balance (Total), number of lines (T#), total amount of data (TData), AT&T base charge per line (ATT Base) by looking at “View my bill” page at AT&T website.
  2. Fill out insurances (Insurance column) and installments (Installment column) again by by looking at “View my bill” page at AT&T website.
  3. If any line has an extra charge (for international calls, etc.), calculate extra charge by subtracting ATT_BASE from the actual balance in front of the line. [Note: AT&T charges one line for the whole data. So don’t try to consider it as an extra charge.]
  4. If the plan had a data overage, you can fill out the used data by each line in Data column (shown as yellow) from “Check Usage” page at AT&T website. A user-defined function (UDF), UDF(x)=ROUNDUP(x*(1+SIGN(x))/2,0); x is the distance of the line data usage from the mean data usage, has been used to compute the data overage share among the lines.

Now, you can verify the results:

  1. Green balances shown in ATT Website column should be equal with the balances in “View my bill” page at AT&T website.
  2. Also you can verify the overpay balance, calculated balance, etc.

Finally the fair shares would be in “Separate” column.


Maryam Mirzakhani, the mother who won Fields Medal

Unbelievable and heartbreaking! Our role model since elementary school dies at 40! I still remember the days I was struggling to learn her book written for young math lovers to prepare for math Olympiad. She was ahead of us as a senior but she passed all the elevation steps very fast, and soon she became Stanford professor while she had a little girl.

Her milestone completed when she won Fields Medal in Math (the most prestigious award equivalent to Nobel prize). As a woman, her accomplishment is not only inspiring for all Iranians but also specially for all women in fundamental sciences. Definitely her work helps the other mathematicians in the field, but her humble character wasn’t self-explanatory.

Unfortunately her life was short but fruitful for all of us not only from scientific aspects but also other societal aspects as a public figure like Galois, Ramanujan, and Riemann.  May she rest in peace.


Deep-learned Models and Photography Idea Retrieval

Intelligent Portrait Composition Assistance (IPCA), Farshid Farhat, Mohammad Mahdi Kamani, Sahil Mishra, James Wang, ACM Multimedia 2017, Mountain View, CA, USA.

ABSTRACT: Retrieving photography ideas corresponding to a given location facilitates the usage of smart cameras, where there is a high interest among amateurs and enthusiasts to take astonishing photos at anytime and in any location. Existing research captures some aesthetic techniques such as the rule of thirds, triangle, and perspectiveness, and retrieves useful feedbacks based on one technique. However, they are restricted to a particular technique and the retrieved results have room to improve as they can be limited to the quality of the query. There is a lack of a holistic framework to capture important aspects of a given scene and give a novice photographer informative feedback to take a better shot in his/her photography adventure. This work proposes an intelligent framework of portrait composition using our deep-learned models and image retrieval methods. A highly-rated web-crawled portrait dataset is exploited for retrieval purposes. Our framework detects and extracts ingredients of a given scene representing as a correlated hierarchical model. It then matches extracted semantics with the dataset of aesthetically composed photos to investigate a ranked list of photography ideas, and gradually optimizes the human pose and other artistic aspects of the composed scene supposed to be captured. The conducted user study demonstrates that our approach is more helpful than the other constructed feedback retrieval systems.


(Acceptance rate = 64/495 = 12.93%)

IAAP Scholarship Award

Dear Mr. Farshid Farhat,

On behalf of Dr. Manouchehr Farkhondeh, President of the Iranian American Academics and Professionals (IAAP) and the entire organization, I would like to congratulate you on your outstanding academic success as well as the invaluable service to the Iranian-American community. We are also delighted to inform you that you have been selected as one of the recipients of IAAP’s Scholarship Awards for 2017.

We look forward to the opportunity to congratulate you in person and present you the Award Certificate and the accompanying check at our special gathering on June 24, 2017 (Information of the ceremony is posted at

We ask that you kindly acknowledge receipt of this email at your earliest convenience and be prepared to introduce yourself and provide a short background on the program you are in and any studies or project(s) you might be working on for a total of 3 to 4 minutes.

You will be among our honored guests, and as such exempt from making the customary fee, but to order enough food for everyone, we request that you register for the event at your earliest convenience, if not done so already. Your guests, if any, are also welcomed and expected to RSVP early but are required to pay the nominal dinner fees.

In case you are truly unable to participate in the ceremony, your certificate and the check can be given to a designated person provided the receipt of your notification by Tuesday, June 20th at the latest, or they can be mailed to you at a specified address. Also, in case you are unable to be with us in person, please make sure to send us a short video on the information we requested on the third paragraph with the notification by Sunday June 18th as well.

Yasaman Ardeshirpour, PhD
Scholarship Committee Chair

frash 🙂

Leveraging big visual data to predict severe weather


Every year, severe weather endangers millions of people and causes billions of dollars in damage worldwide. But new research from Penn State’s College of Information Sciences and Technology (IST) and AccuWeather has found a way to better predict some of these threats by harnessing the power of big data.

The research team, led by doctoral student Mohammad Mahdi Kamani and including IST professor James Wang, computer science doctoral student Farshid Farhat, and AccuWeather forensic meteorologist Stephen Wistar, has developed a new approach for identifying bow echoes in radar images, a phenomenon associated with fierce and violent winds.

“It was inevitable for meteorology to combine big data, computer vision, and data mining algorithms to seek faster, more robust and accurate results,” Kamani said. Their research paper, “Skeleton Matching with Applications in Severe Weather Detection,” was published in the journal of Applied Soft Computing and was funded by the National Science Foundation (NSF).

“I think computer-based methods can provide a third eye to the meteorologists, helping them look at things they don’t have the time or energy for,” Wang said. In the case of bow echoes, this automatic detection would be vital to earlier recognition of severe weather, saving lives and resources.

Wistar, the meteorological authority on the project, explained, “In a line of thunderstorms, a bow echo is one part that moves faster than the other.” As the name suggests, once the weather conditions have fully formed, it resembles the shape of a bow. “It can get really exaggerated,” he said. “It’s important because that’s where you are likely to get serious damage, where trees will come down and roofs get blown off.”

But currently, when the conditions are just beginning to form, it can be easy for forecasters to overlook. “Once it gets to the blatantly obvious point, (a bow echo) jumps out to a meteorologist,” he said. “But on an active weather day? They may not notice it’s just starting to bow.”

To combat this, the research focused on automating the detection of bow echoes. By drawing on the vast historical data collected by the National Oceanic and Atmosphere Administration (NOAA), bow echoes can be automatically identified the instant they begin to form. Wang said, “That’s our project’s fundamental goal—to provide assistance to the meteorologist so they can make decisions quicker and with better accuracy.”

By continually monitoring radar imagery from NOAA, the algorithm is able to scan the entire United States and provide alerts whenever and wherever a bow echo is beginning. During times of active severe weather, when resources are likely to be spread thin, it’s able to provide instant notifications of the development.

“But this is just the first step,” Kamani commented. With the detection algorithm in place, they hope to one day forecast bow echoes before they even form. “The end goal is to have more time to alert people to evacuate or be ready for the straight line winds.” With faster, more precise forecasts, the potential impacts can be significant.

“If you can get even a 10, 15 minute jump and get a warning out earlier pinned down to a certain location instead of entire counties, that’s a huge benefit,” Wistar said. “That could be a real jump for meteorologists if it’s possible. It’s really exciting to see this progress.”

Envisioning the future of meteorology, the researchers see endless potential for the application of big data. “There’s so much we can do,” Wang said. “If we can predict severe thunderstorms better, we can save lives every year.”

Discovering Triangles in Portraits and Landscapes


Incorporating the concept of triangles in photos is an effective composition method used by professional photographers for making pictures more interesting or dynamic. Information on the locations of the embedded triangles is valuable for comparing the composition of portrait photos, which can be further leveraged by a retrieval system or used by photographers. This paper presents a system to automatically detect embedded triangles in portrait photos. The problem is challenging because the triangles used in portraits are often not clearly defined

by straight lines. The system first extracts a set of filtered line segments as candidate triangle sides, and then utilizes a modified RANSAC algorithm to fit triangles onto the set of line segments. We propose two metrics, Continuity Ratio and Total Ratio, to evaluate the fitted triangles; those with high fitting scores are taken as detected triangles. Experimental results have demonstrated high accuracy in locating preeminent triangles in portraits without dependence on the camera or lens parameters. To demonstrate the benefits of our method to digital photography, we have developed two novel applications that aim to help users composing high-quality photos. In the first application, we develop a human position and pose recommendation system by retrieving and presenting compositionally similar photos taken by competent photographers. The second application is a novel sketch-based triangle retrieval system which searches for photos containing specific triangular configuration. User studies have been conducted to validate the effectiveness of these approaches.