“I was fortunate to work closely with Farshid during my college studies at Sharif university and I certainly learned a great deal of tricks and quick hacks back then. His enthusiasm to figure things out and his analytical skills to approach any problem is what I can vividly remember looking back at our professional encounters. Obviously, we have developed and held a growing friendship over years which was not possible without the team working spirit. Big problems, or hard ones does not intimidate him or make him leave the systemic approach to tackle them. His logical approach to break any problem it being an engineering or programming problem is what I would look when picking a team to take on innovative and challenging tasks.”
About
My current research interests:
. Artificial Intelligence (Machine Learning, Computer…
Activity
-
So excited for this one!! Watch out for live coverage in a few weeks! 😁
So excited for this one!! Watch out for live coverage in a few weeks! 😁
Liked by Farshid F.
-
Join us for the AMD Signal Processing Working Group 📅 May 13–15 | 📍Longmont, CO This 3-day workshop is designed for engineers and architects…
Join us for the AMD Signal Processing Working Group 📅 May 13–15 | 📍Longmont, CO This 3-day workshop is designed for engineers and architects…
Liked by Farshid F.
Experience
Education
Licenses & Certifications
Publications
-
Evaluating the Combined Impact of Datacenter Architecture and Cloud Workload Characteristics on Performance, Network Traffic and Cost
IISWC 2015
The combined impact of node architecture and workload characteristics on off-chip network traffic with performance/cost analysis has not been investigated before in the context of emerging cloud applications. Motivated by this observation, this paper performs a thorough characterization of twelve cloud workloads using a full-system datacenter simulation infrastructure. We first study the inherent network characteristics of emerging cloud applications including message inter-arrival times…
The combined impact of node architecture and workload characteristics on off-chip network traffic with performance/cost analysis has not been investigated before in the context of emerging cloud applications. Motivated by this observation, this paper performs a thorough characterization of twelve cloud workloads using a full-system datacenter simulation infrastructure. We first study the inherent network characteristics of emerging cloud applications including message inter-arrival times, packet sizes, inter-node communication overhead, self-similarity, and traffic volume. Then, we study the effect of hardware architectural metrics on network traffic. Our experimental analysis reveals that (1) the message arrival times and packet-size distributions exhibit variances across different cloud applications; (2) the inter-arrival times imply a large amount of self-similarity as the number of nodes increase; (3) the node architecture can play a significant role in shaping the overall network traffic; and finally, (4) the applications we study can be broadly divided into those which perform better in a scale-out or scale-up configuration at node level and into two categories, namely, those that have long-duration, low-burst flows and those that have short-duration, high-burst flows. Using the results of (3) and (4), the paper discusses the performance/cost trade-offs for scale-out and scale-up approaches and proposes an analytical model that can be used to predict the communication and computation demand for different configurations. It is shown that the difference between two different node architecture's performance per dollar cost (under same number of cores system wide) can be as high as 154 percent which disclose the need for accurate characterization of cloud applications before wasting the precious cloud resources by allocating wrong architecture.
Other authors -
Evaluating the Combined Impact of Datacenter Architecture and Cloud Workload Characteristics on Performance, Network Traffic and Cost
IEEE International Symposium on Workload Characterization (IISWC)
The combined impact of node architecture and workload characteristics on off-chip network traffic with performance/cost analysis has not been investigated before in the context of emerging cloud applications. Motivated by this observation, this paper performs a thorough characterization of twelve cloud workloads using a full-system datacenter simulation infrastructure. We first study the inherent network characteristics of emerging cloud applications including message inter-arrival times…
The combined impact of node architecture and workload characteristics on off-chip network traffic with performance/cost analysis has not been investigated before in the context of emerging cloud applications. Motivated by this observation, this paper performs a thorough characterization of twelve cloud workloads using a full-system datacenter simulation infrastructure. We first study the inherent network characteristics of emerging cloud applications including message inter-arrival times, packet sizes, inter-node communication overhead, self-similarity, and traffic volume. Then, we study the effect of hardware architectural metrics on network traffic. Our experimental analysis reveals that (1) the message arrival times and packet-size distributions exhibit variances across different cloud applications; (2) the inter-arrival times imply a large amount of self-similarity as the number of nodes increase; (3) the node architecture can play a significant role in shaping the overall network traffic; and finally, (4) the applications we study can be broadly divided into those which perform better in a scale-out or scale-up configuration at node level and into two categories, namely, those that have long-duration, low-burst flows and those that have short-duration, high-burst flows.
Other authors -
Modeling and Optimization of Straggling Mappers
Technical Report CSE-14-006, Pennsylvania State University
MapReduce framework is widely used to parallelize batch jobs since it exploits a high degree of multi-tasking to process them. However, it has been observed that when the number of mappers increases, the map phase can take much longer than expected. This paper analytically shows that stochastic behavior of mapper nodes has a negative effect on the completion time of a MapReduce job, and continuously increasing the number of mappers without accurate
scheduling can degrade the overall…MapReduce framework is widely used to parallelize batch jobs since it exploits a high degree of multi-tasking to process them. However, it has been observed that when the number of mappers increases, the map phase can take much longer than expected. This paper analytically shows that stochastic behavior of mapper nodes has a negative effect on the completion time of a MapReduce job, and continuously increasing the number of mappers without accurate
scheduling can degrade the overall performance. We analytically
capture the effects of stragglers (delayed mappers) on the performance. Based on an observed delayed exponential distribution (DED) of the response time of mappers, we then model the map phase by means of hardware, system
, and application parameters. Mean sojourn time (MST), the time needed to sync the completed map tasks at one reducer, is mathematically formulated. Following that, we optimize MST by finding the task inter-arrival time to each mapper node. The optimal mapping problem leads to an equilibrium property
investigated for different types of inter-arrival and service time
distributions in a heterogeneous datacenter (i.e., a datacenter with different types of nodes). Our experimental results show the performance and important parameters of the different types of schedulers targeting MapReduce applications. We also show that, in the case of mixed deterministic and stochastic schedulers, there is an optimal scheduler that can always achieve the lowest MST.Other authorsSee publication -
Game-theoretic approach to mitigate packet dropping in wireless Ad-hoc networks
Consumer Communications and Networking Conference (CCNC), 2011 IEEE
Performance of routing is severely degraded when misbehaving nodes drop packets instead of properly forwarding them. In this paper, we propose a Game-Theoretic Adaptive Multipath Routing (GTAMR) protocol to detect and punish selfish or malicious nodes which try to drop information packets in routing phase and defend against collaborative attacks in which nodes try to disrupt communication or save their power. Our proposed algorithm outranks previous schemes because it is resilient against…
Performance of routing is severely degraded when misbehaving nodes drop packets instead of properly forwarding them. In this paper, we propose a Game-Theoretic Adaptive Multipath Routing (GTAMR) protocol to detect and punish selfish or malicious nodes which try to drop information packets in routing phase and defend against collaborative attacks in which nodes try to disrupt communication or save their power. Our proposed algorithm outranks previous schemes because it is resilient against attacks in which more than one node coordinate their misbehavior and can be used in networks which wireless nodes use directional antennas. We then propose a game theoretic strategy, ERTFT, for nodes to promote cooperation. In comparison with other proposed TFT-like strategies, ours is resilient to systematic errors in detection of selfish nodes and does not lead to unending death spirals.
Other authorsSee publication -
Risk of attack coefficient effect on availability of Ad-hoc networks
Consumer Communications and Networking Conference (CCNC), 2011 IEEE
Security techniques have been designed to obtain certain objectives. One of the most important objectives all security mechanisms try to achieve is the availability, which insures that network services are available to various entities in the network when required. But there has not been any certain parameter to measure this objective in network. In this paper we consider availability as a security parameter in ad-hoc networks. However this parameter can be used in other networks as well…
Security techniques have been designed to obtain certain objectives. One of the most important objectives all security mechanisms try to achieve is the availability, which insures that network services are available to various entities in the network when required. But there has not been any certain parameter to measure this objective in network. In this paper we consider availability as a security parameter in ad-hoc networks. However this parameter can be used in other networks as well. We also present the connectivity coefficient of nodes in a network which shows how important is a node in a network and how much damage is caused if a certain node is compromised.
Other authorsSee publication -
An Extended Authentication and Key Agreement Protocol of UMTS
Springer ISPEC
See publicationA new authentication method in UMTS
Courses
-
Advanced Compiler Construction
CSE521
-
Advanced Machine Learning
-
-
Advanced Networking
-
-
Advanced Operating Systems
CSE511
-
Advanced Programming (C++)
-
-
Algorithm Design and Analysis
CSE565
-
Big Data Analytics
CSE598G
-
Business Dynamics
-
-
Coding Theory
-
-
Computer Architecture
CSE431
-
Data Communications and Computer Networks
-
-
Distributed Systems
CSE513
-
Fault-Tolerant Systems
CSE536
-
Game Theory
-
-
Information Theory
-
-
Internet Programming
-
-
Network Security
-
-
Network Security
-
-
Numerical Optimization
-
-
Operating System Design
CSE473
-
Performance Evaluation
-
-
Stochastic Processes
-
-
Wireless Communications
-
Projects
-
Mobile Adhoc Network Simulator
-
GTNS is written in Visual C++ programming language and supports different network topologies. This simulator was first produced to implement locally multipath adaptive routing (LMAR) protocol, classified as a new reactive distance vector routing protocol for MANETs. LMAR can find an ad-hoc path without selfish nodes and wormholes using an exhaustive search algorithm in polynomial time. Also when the primary path fails, it discovers an alternative safe path if network graph remains connected…
GTNS is written in Visual C++ programming language and supports different network topologies. This simulator was first produced to implement locally multipath adaptive routing (LMAR) protocol, classified as a new reactive distance vector routing protocol for MANETs. LMAR can find an ad-hoc path without selfish nodes and wormholes using an exhaustive search algorithm in polynomial time. Also when the primary path fails, it discovers an alternative safe path if network graph remains connected after eliminating selfish/malicious nodes. The key feature of LMAR to seek safe route free of selfish and malicious nodes in polynomial time is its searching algorithm and flooding stage that its generated traffic is equi-loaded compared to single-path routing protocols but its security efficiency to bypass the attacks is much better than the other multi-path routing protocols. LMAR concept is introduced to provide the security feature known as availability and a simulator has been developed to analyze its behavior in complex network environments [1]. Then we have added detection mechanism to the simulator, which can detect selfish nodes in network. The proposed algorithm is resilient against collision and can be used in networks which wireless nodes use directional antennas and it also defend against an attack that malicious nodes try to break communications by relaying the packets in a specific direction. Some game theoretic strategies to enforce cooperation in network have been implemented in GTNS, for example Forwarding-Ratio Strategy, TFT-Strategy and ERTFT. This tutorial helps new users to get familiar with GTNS and run different network scenarios.
Other creatorsSee project -
Optical CDMA Network Simulator
-
Optical CDMA Wireless Multi-User Network System includes some transmitters and receivers. In this network, an Optical Orthogonal Code (OOC) is assigned to each user (Tx or Rx) to connect to its equivalent-OOC user and after synchronization between this two equivalent-OOC user, they can send and receive data to/from each other.
In this project, I worked to design and Implement a simulator for Optical CDMA Wireless Multi-User Network. This simulator has eliminated some of practical…Optical CDMA Wireless Multi-User Network System includes some transmitters and receivers. In this network, an Optical Orthogonal Code (OOC) is assigned to each user (Tx or Rx) to connect to its equivalent-OOC user and after synchronization between this two equivalent-OOC user, they can send and receive data to/from each other.
In this project, I worked to design and Implement a simulator for Optical CDMA Wireless Multi-User Network. This simulator has eliminated some of practical problems like number of users can be used by network practically.
OCNS is the name of the simulator for Optical CDMA Networks. I did this project as my BS Project. My supervisor, Prof. Pakravan, suggested me this project in April 2004. In July 2004, I finished the documentation of this project in persian language. I developed OCNS by using Visual C++ software. I've presented the defined classes in my project below.Other creatorsSee project
Languages
-
English
-
-
Farsi
-
Recommendations received
1 person has recommended Farshid
Join now to viewMore activity by Farshid
-
Club $500B! At $307 per share, AMD crossed the $500B market cap today.
Club $500B! At $307 per share, AMD crossed the $500B market cap today.
Liked by Farshid F.
-
Calling all devs! This is a lineup you won't want to miss. AMD AI DevDay 2026, we're bringing together leaders shaping the future of AI across…
Calling all devs! This is a lineup you won't want to miss. AMD AI DevDay 2026, we're bringing together leaders shaping the future of AI across…
Liked by Farshid F.
-
I’m proud to announce we got an Honorable Mention by AMD at Stark Hacks! This was one of the most intensive weekends I’ve ever worked through, and we…
I’m proud to announce we got an Honorable Mention by AMD at Stark Hacks! This was one of the most intensive weekends I’ve ever worked through, and we…
Liked by Farshid F.
-
I had the pleasure of participating in Carbon to Sea’s 2026 Hill Day, meeting with Republican and Democratic Members of Congress and their staff to…
I had the pleasure of participating in Carbon to Sea’s 2026 Hill Day, meeting with Republican and Democratic Members of Congress and their staff to…
Liked by Farshid F.
-
Looking forward to joining the Modular team at AMD Dev Day next week in San Francisco! Come hear Chris Lattner share how Modular is driving state…
Looking forward to joining the Modular team at AMD Dev Day next week in San Francisco! Come hear Chris Lattner share how Modular is driving state…
Liked by Farshid F.
-
Accelerating system-level verification is critical as designs grow more complex. AMD Versal adaptive SoCs integrate AI Engines, programmable logic…
Accelerating system-level verification is critical as designs grow more complex. AMD Versal adaptive SoCs integrate AI Engines, programmable logic…
Liked by Farshid F.
-
Today marks an important step forward in advancing Europe’s AI leadership. Our collaboration with the French government is focused on expanding…
Today marks an important step forward in advancing Europe’s AI leadership. Our collaboration with the French government is focused on expanding…
Liked by Farshid F.
-
Predicting the future is risky business. So I was thrilled to join a panel with 100+ experts, makes it slightly less dangerous 😄 Had a great time…
Predicting the future is risky business. So I was thrilled to join a panel with 100+ experts, makes it slightly less dangerous 😄 Had a great time…
Liked by Farshid F.
-
Excited to share I'll be joining AMD as a Financial Analyst II in San Jose, California! As I look ahead to this next chapter, I'm incredibly…
Excited to share I'll be joining AMD as a Financial Analyst II in San Jose, California! As I look ahead to this next chapter, I'm incredibly…
Liked by Farshid F.
-
Earth Day is a good reminder that in digital infrastructure, efficiency compounds. Scaling AI responsibly starts with delivering more useful compute…
Earth Day is a good reminder that in digital infrastructure, efficiency compounds. Scaling AI responsibly starts with delivering more useful compute…
Liked by Farshid F.
-
Heading to Google Cloud Next this year. As the AI leader in #ruegiltgroupe, I’m focused on how leading organizations are operationalizing AI and data…
Heading to Google Cloud Next this year. As the AI leader in #ruegiltgroupe, I’m focused on how leading organizations are operationalizing AI and data…
Liked by Farshid F.
-
StarkHacks at Purdue University is underway ⚡ Over 600 student engineers are building AI-powered hardware this weekend—many using AMD technology…
StarkHacks at Purdue University is underway ⚡ Over 600 student engineers are building AI-powered hardware this weekend—many using AMD technology…
Liked by Farshid F.
-
Feeling great to be working with such an awesome team at AMD !!! 9hr work meets x 3 days, with teammates from around the country at the Orlando…
Feeling great to be working with such an awesome team at AMD !!! 9hr work meets x 3 days, with teammates from around the country at the Orlando…
Liked by Farshid F.
-
Save the Date 📆 Advancing AI 2026 Developer Track July 22–23 · San Francisco Advancing AI is where the open, multi-engine future of AI computing…
Save the Date 📆 Advancing AI 2026 Developer Track July 22–23 · San Francisco Advancing AI is where the open, multi-engine future of AI computing…
Liked by Farshid F.
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content