Welcome
Kubishi means "brain" in Owens Valley Paiute, the (critically endangered) language of the Paiute people from Payahuunadü (Owens Valley, California). As a member of the Big Pine Paiute Tribe of the Owens Valley, I decided on this name for my research group because it reflects the autonomous, decentralized, and intelligent aspects of the systems we study. More importantly, though, the name pays homage to my tribe and to all indigenous peoples whose land we work, live, and play on.
Research Topics
Posts
People
Publications
Evaluating the Impact of Algorithmic Components on Task Graph Scheduling
To Appear at JSSPP 2025 - The 28th Workshop on Job Scheduling Strategies for Parallel Processing
Abstract
Scheduling distributed applications modeled as directed, acyclic task graphs to run on heterogeneous compute networks is a fundamental (NP-Hard) problem in distributed computing for which many heuristic algorithms have been proposed over the past decades. Many of these algorithms fall under the list-scheduling paradigm, whereby the algorithm first computes priorities for the tasks and then schedules them greedily to the compute node that minimizes some cost function. Thus, many algorithms differ from each other only in a few key components (e.g., the way they prioritize tasks, their cost functions, where the algorithms consider inserting tasks into a partially complete schedule, etc.). We propose a generalized list-scheduling algorithm that allows mixing and matching different task prioritization and greedy node selection schemes to produce 72 unique algorithms. We benchmark these algorithms on 20 datasets to study the individual and combined effects of different algorithmic components on performance and runtime. We show that while every algorithmic component we consider is well-established in the literature, many of their combinations which have never before been considered are pareto-optimal with respect to average performance and runtime. We also report interesting interactions between algorithmic components and dataset features, suggesting that performance is highly application-dependent.
Evaluating Scheduling Algorithms for Adaptive Orchestration in Federated Tactical Edge Cloud Environments
To Appear at ICMCIS 2025 - The International Conference on Military Communication and Information Systems
Abstract
The IST-193 Research Task Group (RTG) has focused on adapting the popular Kubernetes cloud native platform to operate in military tactical network environments consisting of transient, mobile nodes and intermittent and limited network connectivity. A key focus area for the group has been designing the Federated Adaptive Orchestrator, which is responsible for deciding where services should be run among the tactical cloud environments that are available. This paper focuses on the evaluation of a variety of scheduling algorithms in terms of their performance during the orchestration process and compares them to the performance of a brute-force algorithm that tries to find the most optimal solution. This paper was originally presented at the NATO Science and Technology Organization Symposium (ICMCIS) organized by the Information Systems Technology (IST) Scientific and Technical Committee, IST-209-RSY - the ICMCIS, held in Oeiras, Portugal, 13-14 May 2025.
Multimodal Search on a Line
To Appear at SIROCCO 2025 - 32nd International Colloquium on Structural Information and Communication Complexity
Abstract
Inspired by the diverse set of technologies used in underground object detection and imaging, we introduce a novel multimodal linear search problem whereby a single searcher starts at the origin and must find a target that can only be detected when the searcher moves through its location using the correct of
PISA: An Adversarial Approach To Comparing Task Graph Scheduling Algorithms
To Appear at IPDPS 2025 - The 39th International Parallel and Distributed Processing Symposium
Abstract
Scheduling a task graph representing an application over a heterogeneous network of computers is a fundamental problem in distributed computing. It is known to be not only NP-hard but also not polynomial-time approximable within a constant factor. As a result, many heuristic algorithms have been proposed over the past few decades. Yet it remains largely unclear how these algorithms compare to each other in terms of the quality of schedules they produce. We identify gaps in the traditional benchmarking approach to comparing task scheduling algorithms and propose a simulated annealing-based adversarial analysis approach called PISA to address them. We also introduce SAGA, a new open-source library for comparing task scheduling algorithms. We use SAGA to benchmark 15 algorithms on 16 datasets and PISA to compare the algorithms in a pairwise manner. Algorithms that appear to perform similarly on benchmarking datasets are shown to perform very differently on adversarially chosen problem instances. Interestingly, the results indicate that this is true even when the adversarial search is constrained to selecting among well-structured, application-specific problem instances. We present the first known lower bounds on the performance of many of the algorithms considered in this paper compared to other popular scheduling algorithms. This work represents an important step towards a more general understanding of the performance boundaries between task scheduling algorithms on different families of problem instances.
LLM-Assisted Rule Based Machine Translation for Low/No-Resource Languages
AmericasNLP @ NAACL 2024 - 4th Workshop on NLP for Indigenous Languages of the Americas
Abstract
We propose a new paradigm for machine translation that is particularly useful for no-resource languages (those without any publicly available bilingual or monolingual corpora): LLM-RBMT (LLM-Assisted Rule Based Machine Translation). Using the LLM-RBMT paradigm, we design the first language education/revitalization-oriented machine translator for Owens Valley Paiute (OVP), a critically endangered Indigenous American language for which there is virtually no publicly available data. We present a detailed evaluation of the translator's components: a rule-based sentence builder, an OVP to English translator, and an English to OVP translator. We also discuss the potential of the paradigm, its limitations, and the many avenues for future research that it opens up.
Linear Search for an Escaping Target with Unknown Speed
IWOCA 2024 - 35th International Workshop on Combinatorial Algorithms
Abstract
We consider linear search for an escaping target whose speed and initial position are unknown to the searcher. A searcher (an autonomous mobile agent) is initially placed at the origin of the real line and can move with maximum speed
Online Allocation of Sensing and Computation in Large Graphs
IEEE CIC 2023 - International Conference on Collaboration and Internet Computing
Abstract
We consider vehicle tracking over a large territory equipped with sensors and computational units, and propose online resource allocation algorithms that decide which sensor nodes to activate, and on which computational units to perform the corresponding tracking tasks. We show through numerical evaluation that our approach can notably outperform state of art algorithms in terms of delay, communication cost, and the number of required sensor measurements.
DARSAN: A Decentralized Review System Suitable for NFT Marketplaces
ICBC 2023 - International Conference on Blockchain
Abstract
We introduce DARSAN, a decentralized review system designed for Non-Fungible Token (NFT) marketplaces, to address the challenge of verifying the quality of highly resalable products with few verified buyers by incentivizing unbiased reviews. DARSAN works by iteratively selecting a group of reviewers (called "experts") who are likely to both accurately predict the objective popularity and assess some subjective quality of the assets uniquely associated with NFTs. The system consists of a two-phased review process: a "pre-listing" phase where only experts can review the product, and a "pre-sale" phase where any reviewer on the system can review the product. Upon completion of the sale, DARSAN distributes incentives to the participants and selects the next generation of experts based on the performance of both experts and non-expert reviewers. We evaluate DARSAN through simulation and show that, once bootstrapped with an initial set of appropriately chosen experts, DARSAN favors honest reviewers and improves the quality of the expert pool over time without any external intervention even in the presence of potentially malicious participants.
Search and Rescue on the Line
SIROCCO 2023 - 30th International Colloquium on Structural Information and Communication Complexity
Abstract
We propose and study a problem inspired by a common task in disaster, military, and other emergency scenarios: search and rescue. Suppose an object (victim, message, target, etc.) is at some unknown location on a path. Given one or more mobile agents, also at initially arbitrary locations on the path, the goal is to find and deliver the object to a predefined destination in as little time as possible. We study the problem for the one- and two-agent cases and consider scenarios where the object and agents are arbitrarily (adversarially, even) placed along a path of either known (and finite) or unknown (and potentially infinite) length. We also consider scenarios where the destination is either at the endpoint or in the middle of the path. We provide both deterministic and randomized online algorithms for each of these scenarios and prove bounds on their (expected) competitive ratios.
Graph Convolutional Network-based Scheduler for Distributing Computation in the Internet of Robotic Things
MILCOM 2023 WS-7 - Workshop On The Internet Of Things For Adversarial Environments
Abstract
Existing solutions for scheduling arbitrarily complex distributed applications on networks of computational nodes are insufficient for scenarios where the network topology is changing rapidly.New Internet of Things (IoT) domains like the Internet of Robotic Things (IoRT) and the Internet of Battlefield Things (IoBT) demand solutions that are robust and efficient in environments that experience constant and/or rapid change.In this paper, we demonstrate how recent advancements in machine learning (in particular, in graph convolutional neural networks) can be leveraged to solve the task scheduling problem with decent performance and in much less time than traditional algorithms.
Delivery to Safety with Two Cooperating Robots
SOFSEM 2023 - International Conference on Current Trends in Theory and Practice of Computer Science
Abstract
Two cooperating, autonomous mobile robots with arbitrary nonzero max speeds are placed at arbitrary initial positions in the plane. A remotely detonated bomb is discovered at some source location and must be moved to a safe distance away from its initial location as quickly as possible. In the Bomb Squad problem, the robots cooperate by communicating face-to-face in order to pick up the bomb from the source and carry it away to the boundary of a disk centered at the source in the shortest possible time. The goal is to specify trajectories which define the robots' paths from start to finish and their meeting points which enable face-to-face collaboration by exchanging information and passing the bomb from robot to robot.We design algorithms reflecting the robots' knowledge about orientation and each other's speed and location. In the offline case, we design an optimal algorithm. For the limited knowledge cases, we provide online algorithms which consider robots' level of agreement on orientation as per OneAxis and NoAxis models, and knowledge of the boundary as per Visible, Discoverable, and Invisible. In all cases, we provide upper and lower bounds for the competitive ratios of the online problems.
The Snow Plow Problem: Perpetual Maintenance by Mobile Agents on the Line
ICDCN 2023 - International Conference on Distributed Computing and Networking
Abstract
We propose and study a new perpetual maintenance problem: The Snow Plow Problem. Inspired by snow removal in urban environments, we consider the perpetual maintenance by n mobile agents of a fixed-length interval over which some resource accumulates continuously over time (i.e. snow). In order to maintain the interval, agents must traverse it, collecting accumulated resources by plowing over continuous segments, and then return to some predefined destination point on the interval to dump collected resources. In a sense, our problem can be described as a combination of the well-studied patrolling and delivery problems. The maintenance cost for an agent is some combination of the distance traveled and the volume of resources collected between visits to the destination. We first study the case where the maintenance cost is simply the maximum amount of snow each agent must carry at any point in time and provide an optimal
Line Search for an Oblivious Moving Target
OPODIS 2022 - International Conference on Principles of Distributed Systems
Abstract
Consider search on an infinite line involving an autonomous robot starting at the origin of the line and an oblivious moving target at initial distance
Multi-Objective Network Synthesis for Dispersed Computing in Tactical Environments
SPIE Defense + Commercial Sensing
Abstract
Tactical operations like search and rescue or surveillance necessitate the rapid synthesis of physically dispersed assets and mobile compute nodes into a network capable of efficient and reliable information gathering, dissemination, and processing. We formalize this network synthesis problem as selecting one among a set of potentially deployable networks which optimally supports the distributed execution of complex applications. We propose a general framework for studying this type of problem and provide solutions for some well-motivated variants. We discuss how the framework can be extended to support other objectives, parameters, and constraints as well as more scalable solution approaches.
Network Synthesis for Tactical Environments: Scenario, Challenges, and Opportunities
SPIE Defense + Commercial Sensing
Abstract
We develop a network synthesis scenario, which is built around a concrete perimeter surveillance application, yet we believe captures a number of the challenges and requirements that are common to other tactical communication and computational network applications. The proposed scenario addresses the problem of binary population identification within a perimeter: our goal is to synthesize a sensing and computing network that classifies people moving within a given perimeter to one of two categories (e.g., friend or foe). We discuss several open challenges that we organize across the following clusters: sensor placement, communication network provisioning and optimization, computational task placement, dynamic resynthesis and resilience under adverserial settings. We also briefly discuss approaches that attempt to address such challenges.
Authors
Tzanis AnevlavisJonathan Bunton
Jared Coleman
Mine Dogan
Eugenio Grippo
Abel Souza
Christina Fragouli
Bhaskar Krishnamachari
Matthew Maness
Karl Olson
Prashant Shenoy
Paulo Tabuada
Gunjan Verma
Robotic Sorting on the Grid
ICDCN 2022 - 23rd International Conference on Distributed Computing and Networking
Abstract
Inspired by robotic applications, we study the problem of sorting a set of items over a physical domain with mobile agents. Given m mobile robots and a grid where each cell contains a single element, the objective is to design algorithms that allow robots to cooperatively sort the elements over the grid in the minimum time. We assume a synchronous model where robots do not communicate, can carry up to c elements, and can move between adjacent cells in one unit of time (grab and release time is negligible). First, we show that any algorithm requires at least
Message Delivery in the Plane by Robots with Different Speeds
SSS 2021 - 23rd International Symposium on Stabilization, Safety, and Security of Distributed Systems
Abstract
We study a fundamental cooperative message-delivery problem on the plane. Assume n robots which can move in any direction, are placed arbitrarily on the plane. Robots each have their own maximum speed and can communicate with each other face-to-face (i.e., when they are at the same location at the same time). There are also two designated points on the plane,
The Pony Express Communication Problem
IWOCA 2021 - 32nd International Workshop on Combinatorial Algorithms
Abstract
We introduce a new problem which we call the Pony Express problem. n robots with differing speeds are situated over some domain. A message is placed at some commonly known point. Robots can acquire the message either by visiting its initial position, or by encountering another robot that has already acquired it. The robots must collaborate to deliver the message to a given destination. The objective is to deliver the message in minimum time. In this paper we study the Pony Express problem on the line where n robots are arbitrarily deployed along a finite segment. The robots have different speeds and can move in both directions. We are interested in both offline centralized and online distributed algorithms. In the online case, we assume the robots have limited knowledge of the initial configuration. In particular, the robots do not know the initial positions and speeds of the other robots nor even their own position and speed. They do, however, know the direction on the line in which to find the message and have the ability to compare speeds when they meet. First, we study the Pony Express problem where the message is initially placed at one endpoint of a segment and must be delivered to the other endpoint. We provide an
Minimizing The Maximum Distance Traveled To Form Patterns With Systems of Mobile Robots
CCCG 2020, 32nd Canadian Conference on Computational Geometry, August 5-7, 2020
Abstract
In the pattern formation problem, robots in a system must self-coordinate to form a given pattern, regardless of translation, rotation, uniform-scaling, and/or reflection. In other words, a valid final configuration of the system is a formation that is similar to the desired pattern. While there has been no shortage of research in the pattern formation problem under a variety of assumptions, models, and contexts, we consider the additional constraint that the maximum distance traveled among all robots in the system is minimum. Existing work in pattern formation and closely related problems are typically application-specific or not concerned with optimality (but rather feasibility). We show the necessary conditions any optimal solution must satisfy and present a solution for systems of three robots. Our work also led to an interesting result that has applications beyond pattern formation. Namely, a metric for comparing two triangles where a distance of 0 indicates the triangles are similar, and 1 indicates they are fully dissimilar.
Projects
-
Chatlang is a two-threaded LLM-powered chatbot-based role-playing system. Users interact with the system using two chat windows displayed side-by-side in a web interface. The first window is for role-playing, where the user and chatbot are expected to never break character and only use the target language. In the second window, the user can use their native language to ask questions about the conversation or target language and get context-relevant feedback on their mistakes. This design enables uninterrupted roleplaying alongside instant feedback and support.
-
Kubishi Sentences (sentences.kubishi.com) is an LLM-powered sentence builder and translator for the Owens Valley Paiute Language.
-
Kubishi Dictionary (dictionary.kubishi.com) is an online dictionary for Owens Valley Paiute language and culture. The Owens Valley Paiute language is critically endangered. Kubishi is one resource in the fight (led by Tribes of the Owens Valley) to reverse the damage inflicted by generations of forced assimilation and colonialism. The goal of this project is to help promote and preserve Owens Valley Paiute language and culture, but also to provide an open-source toolset that other indigenous communities can use.
In the News
-
Why some endangered language speakers have to get creative with AI preservation efforts - WHYY
Revitalizing endangered Indigenous languages that have little or no digital presence is challenging with artificial intelligence—but not impossible.
-
Revitalizing Critically Endangered Languages via Large Language Models - Loyola Marymount University Newsroom
Assistant Professor Jared Coleman from Loyola Marymount University has developed an AI-powered translation tool to help revitalize Owens Valley Paiute, an endangered Indigenous language. His work combines traditional rule-based translation methods with advanced language models, and he has also created digital tools to support language learning and preservation efforts.
-
Imagine Hearing A Distant Relative Telling Stories in a Nearly Forgotten Language. What Would You Do? - USC Viterbi | School of Engineering
For Jared Coleman, Ph.D. '24, it meant developing AI tools to help revitalize Owens Valley Paiute, a critically endangered Indigenous language.
Land Acknowledgement
We acknowledge that the land we work and live on is the traditional ancestral territory of the Tongva people. This land, which holds great historical, spiritual, and personal significance for its original stewards, continues to be inhabited and enriched by the Tongva people. We recognize their enduring presence and the contributions they make to our community, despite the challenges they have faced historically and continue to confront.