Zum Hauptinhalt springen

Showing 1–12 of 12 results for author: Shetty, K

.
  1. arXiv:2308.05574  [pdf, ps, other

    cs.CL cs.CV

    Exploring Linguistic Similarity and Zero-Shot Learning for Multilingual Translation of Dravidian Languages

    Authors: Danish Ebadulla, Rahul Raman, S. Natarajan, Hridhay Kiran Shetty, Ashish Harish Shenoy

    Abstract: Current research in zero-shot translation is plagued by several issues such as high compute requirements, increased training time and off target translations. Proposed remedies often come at the cost of additional data or compute requirements. Pivot based neural machine translation is preferred over a single-encoder model for most settings despite the increased training and evaluation time. In thi… ▽ More

    Submitted 10 August, 2023; originally announced August 2023.

  2. arXiv:2303.04923  [pdf, other

    cs.CV

    BOSS: Bones, Organs and Skin Shape Model

    Authors: Karthik Shetty, Annette Birkhold, Srikrishna Jaganathan, Norbert Strobel, Bernhard Egger, Markus Kowarschik, Andreas Maier

    Abstract: Objective: A digital twin of a patient can be a valuable tool for enhancing clinical tasks such as workflow automation, patient-specific X-ray dose optimization, markerless tracking, positioning, and navigation assistance in image-guided interventions. However, it is crucial that the patient's surface and internal organs are of high quality for any pose and shape estimates. At present, the majorit… ▽ More

    Submitted 8 March, 2023; originally announced March 2023.

  3. arXiv:2211.11734  [pdf, other

    cs.CV

    PLIKS: A Pseudo-Linear Inverse Kinematic Solver for 3D Human Body Estimation

    Authors: Karthik Shetty, Annette Birkhold, Srikrishna Jaganathan, Norbert Strobel, Markus Kowarschik, Andreas Maier, Bernhard Egger

    Abstract: We introduce PLIKS (Pseudo-Linear Inverse Kinematic Solver) for reconstruction of a 3D mesh of the human body from a single 2D image. Current techniques directly regress the shape, pose, and translation of a parametric model from an input image through a non-linear mapping with minimal flexibility to any external influences. We approach the task as a model-in-the-loop optimization problem. PLIKS i… ▽ More

    Submitted 27 March, 2023; v1 submitted 21 November, 2022; originally announced November 2022.

    Comments: CVPR2023

  4. arXiv:2210.07611  [pdf, other

    eess.IV cs.CV cs.LG

    Self-Supervised 2D/3D Registration for X-Ray to CT Image Fusion

    Authors: Srikrishna Jaganathan, Maximilian Kukla, Jian Wang, Karthik Shetty, Andreas Maier

    Abstract: Deep Learning-based 2D/3D registration enables fast, robust, and accurate X-ray to CT image fusion when large annotated paired datasets are available for training. However, the need for paired CT volume and X-ray images with ground truth registration limits the applicability in interventional scenarios. An alternative is to use simulated X-ray projections from CT volumes, thus removing the need fo… ▽ More

    Submitted 14 October, 2022; originally announced October 2022.

    Comments: Accepted at WACV 2023

  5. Toward Fairness in Speech Recognition: Discovery and mitigation of performance disparities

    Authors: Pranav Dheram, Murugesan Ramakrishnan, Anirudh Raju, I-Fan Chen, Brian King, Katherine Powell, Melissa Saboowala, Karan Shetty, Andreas Stolcke

    Abstract: As for other forms of AI, speech recognition has recently been examined with respect to performance disparities across different user cohorts. One approach to achieve fairness in speech recognition is to (1) identify speaker cohorts that suffer from subpar performance and (2) apply fairness mitigation measures targeting the cohorts discovered. In this paper, we report on initial findings with both… ▽ More

    Submitted 22 July, 2022; originally announced July 2022.

    Comments: Proc. Interspeech 2022

    Journal ref: Proc. Interspeech, Sept. 2022, pp. 1268-1272

  6. arXiv:2108.05891  [pdf, other

    cs.IR cs.LG

    Page-level Optimization of e-Commerce Item Recommendations

    Authors: Chieh Lo, Hongliang Yu, Xin Yin, Krutika Shetty, Changchen He, Kathy Hu, Justin Platz, Adam Ilardi, Sriganesh Madhvanath

    Abstract: The item details page (IDP) is a web page on an e-commerce website that provides information on a specific product or item listing. Just below the details of the item on this page, the buyer can usually find recommendations for other relevant items. These are typically in the form of a series of modules or carousels, with each module containing a set of recommended items. The selection and orderin… ▽ More

    Submitted 12 August, 2021; originally announced August 2021.

    Comments: Accepted by RecSys 2021

  7. arXiv:2108.00963  [pdf, other

    cs.FL

    Scope-Bounded Reachability in Valence Systems

    Authors: Aneesh K. Shetty, S. Krishna, Georg Zetzsche

    Abstract: Multi-pushdown systems are a standard model for concurrent recursive programs, but they have an undecidable reachability problem. Therefore, there have been several proposals to underapproximate their sets of runs so that reachability in this underapproximation becomes decidable. One such underapproximation that covers a relatively high portion of runs is scope boundedness. In such a run, after ea… ▽ More

    Submitted 2 August, 2021; originally announced August 2021.

    Comments: To appear in proceedings of CONCUR 2021

  8. Deep Iterative 2D/3D Registration

    Authors: Srikrishna Jaganathan, Jian Wang, Anja Borsdorf, Karthik Shetty, Andreas Maier

    Abstract: Deep Learning-based 2D/3D registration methods are highly robust but often lack the necessary registration accuracy for clinical application. A refinement step using the classical optimization-based 2D/3D registration method applied in combination with Deep Learning-based techniques can provide the required accuracy. However, it also increases the runtime. In this work, we propose a novel Deep Lea… ▽ More

    Submitted 21 July, 2021; originally announced July 2021.

    Comments: 10 pages,2 figures, Accepted at MICCAI 2021

  9. Isolating Functions at the Hardware Limit with Virtines

    Authors: Nicholas C. Wanninger, Joshua J. Bowden, Kirtankumar Shetty, Ayush Garg, Kyle C. Hale

    Abstract: An important class of applications, including programs that leverage third-party libraries, programs that use user-defined functions in databases, and serverless applications, benefit from isolating the execution of untrusted code at the granularity of individual functions or function invocations. However, existing isolation mechanisms were not designed for this use case; rather, they have been ad… ▽ More

    Submitted 16 March, 2022; v1 submitted 14 April, 2021; originally announced April 2021.

    Comments: In Proceedings of the 17th European Conference on Computer Systems (EuroSys '22), April 5-8, 2022, Rennes, France

    ACM Class: D.4.6

  10. arXiv:2102.02912  [pdf, other

    eess.IV cs.CV

    Deep Learning compatible Differentiable X-ray Projections for Inverse Rendering

    Authors: Karthik Shetty, Annette Birkhold, Norbert Strobel, Bernhard Egger, Srikrishna Jaganathan, Markus Kowarschik, Andreas Maier

    Abstract: Many minimally invasive interventional procedures still rely on 2D fluoroscopic imaging. Generating a patient-specific 3D model from these X-ray projection data would allow to improve the procedural workflow, e.g. by providing assistance functions such as automatic positioning. To accomplish this, two things are required. First, a statistical human shape model of the human anatomy and second, a di… ▽ More

    Submitted 4 February, 2021; originally announced February 2021.

    Comments: 7 pages, 3 figures, Accepted for Bildverarbeitung für die Medizin 2021

  11. arXiv:1208.4321  [pdf, other

    cs.LO

    Formal Verification of Safety Properties for Ownership Authentication Transfer Protocol

    Authors: Swaraj Bhat, Pradeep B. H, Keerthi S. Shetty, Sanjay Singh

    Abstract: In ubiquitous computing devices, users tend to store some valuable information in their device. Even though the device can be borrowed by the other user temporarily, it is not safe for any user to borrow or lend the device as it may cause private data of the user to be public. To safeguard the user data and also to preserve user privacy we propose and model the technique of ownership authenticatio… ▽ More

    Submitted 21 August, 2012; originally announced August 2012.

    Comments: 16 pages, 7 figures,Submitted to ADCOM 2012

  12. Cloud Based Application Development for Accessing Restaurant Information on Mobile Device using LBS

    Authors: Keerthi S. Shetty, Sanjay Singh

    Abstract: Over the past couple of years, the extent of the services provided on the mobile devices has increased rapidly. A special class of service among them is the Location Based Service(LBS) which depends on the geographical position of the user to provide services to the end users. However, a mobile device is still resource constrained, and some applications usually demand more resources than a mobile… ▽ More

    Submitted 8 November, 2011; originally announced November 2011.

    Comments: 11 pages, 10 figures

    Journal ref: International Journal of UbiComp (IJU), vol.2, no.4, 2011, pp.37-49