Zum Hauptinhalt springen

Showing 1–50 of 52 results for author: Bhowmick, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.06558  [pdf

    cs.SI

    Sampling-Based Attack for Centrality Disruption in Complex Networks

    Authors: Fariba Afrin Irany, Soumya Sarakar, Animesh Mukherjee, Sanjukta Bhowmick

    Abstract: Many mobile networks are represented as graphs to obtain insight to their connectivity and transmission properties. Among these properties centrality resilience, that is, how well centralities, such as closeness and betweennesss, are maintained under attacks is a critical factor for proper functioning of a network. In this paper, we study the centrality resilience of complex networks by developing… ▽ More

    Submitted 9 July, 2024; originally announced July 2024.

    Comments: 10 pages, 8 figures, 3 tables

  2. arXiv:2406.15794  [pdf, ps, other

    cs.IT

    Linear complementary pairs of codes over a finite non-commutative Frobenius ring

    Authors: Sanjit Bhowmick, Xiusheng Liu

    Abstract: In this paper, we study linear complementary pairs (LCP) of codes over finite non-commutative local rings. We further provide a necessary and sufficient condition for a pair of codes $(C,D)$ to be LCP of codes over finite non-commutative Frobenius rings. The minimum distances $d(C)$ and $d(D^\perp)$ are defined as the security parameter for an LCP of codes $(C, D).$ It was recently demonstrated th… ▽ More

    Submitted 22 June, 2024; originally announced June 2024.

    MSC Class: 51E22; 94B05

  3. arXiv:2404.18062  [pdf, other

    cs.CV

    Compressed Image Captioning using CNN-based Encoder-Decoder Framework

    Authors: Md Alif Rahman Ridoy, M Mahmud Hasan, Shovon Bhowmick

    Abstract: In today's world, image processing plays a crucial role across various fields, from scientific research to industrial applications. But one particularly exciting application is image captioning. The potential impact of effective image captioning is vast. It can significantly boost the accuracy of search engines, making it easier to find relevant information. Moreover, it can greatly enhance access… ▽ More

    Submitted 27 April, 2024; originally announced April 2024.

  4. arXiv:2404.13249  [pdf, ps, other

    cs.IT

    Additive Complementary Pairs of Codes

    Authors: Sanjit Bhowmick, Deepak Kumar Dalai

    Abstract: An additive code is an $\mathbb{F}_q$-linear subspace of $\mathbb{F}_{q^m}^n$ over $\mathbb{F}_{q^m}$, which is not a linear subspace over $\mathbb{F}_{q^m}$. Linear complementary pairs(LCP) of codes have important roles in cryptography, such as increasing the speed and capacity of digital communication and strengthening security by improving the encryption necessities to resist cryptanalytic atta… ▽ More

    Submitted 26 April, 2024; v1 submitted 19 April, 2024; originally announced April 2024.

    MSC Class: 94B05; 11T71

  5. arXiv:2311.01008  [pdf, ps, other

    cs.IT

    On Linear Complementary Pairs of Algebraic Geometry Codes over Finite Fields

    Authors: Sanjit Bhowmick, Deepak Kumar Dalai, Sihem Mesnager

    Abstract: Linear complementary dual (LCD) codes and linear complementary pairs (LCP) of codes have been proposed for new applications as countermeasures against side-channel attacks (SCA) and fault injection attacks (FIA) in the context of direct sum masking (DSM). The countermeasure against FIA may lead to a vulnerability for SCA when the whole algorithm needs to be masked (in environments like smart cards… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

  6. arXiv:2309.04668  [pdf, other

    cs.SI

    Influence Maximization in Social Networks: A Survey

    Authors: Hui Li, Susu Yang, Mengting Xu, Sourav S Bhowmick, Jiangtao Cui

    Abstract: Online social networks have become an important platform for people to communicate, share knowledge and disseminate information. Given the widespread usage of social media, individuals' ideas, preferences and behavior are often influenced by their peers or friends in the social networks that they participate in. Since the last decade, influence maximization (IM) problem has been extensively adopte… ▽ More

    Submitted 8 September, 2023; originally announced September 2023.

  7. arXiv:2309.01199  [pdf, other

    cs.DB

    DKWS: A Distributed System for Keyword Search on Massive Graphs (Complete Version)

    Authors: Jiaxin Jiang, Byron Choi, Xin Huang, Jianliang Xu, Sourav S Bhowmick

    Abstract: Due to the unstructuredness and the lack of schemas of graphs, such as knowledge graphs, social networks, and RDF graphs, keyword search for querying such graphs has been proposed. As graphs have become voluminous, large-scale distributed processing has attracted much interest from the database research community. While there have been several distributed systems, distributed querying techniques f… ▽ More

    Submitted 9 September, 2023; v1 submitted 3 September, 2023; originally announced September 2023.

  8. arXiv:2303.18194  [pdf, ps, other

    cs.IT math.RA

    On LCP and checkable group codes over finite non-commutative Frobenius rings

    Authors: Sanjit Bhowmick, Javier de la Cruz, Edgar Martínez-Moro, Anuradha Sharma

    Abstract: We provide a simple proof for a complementary pair of group codes over a finite non-commutative Frobenius ring of the fact that one of them is equivalent to the other one. We also explore this fact for checkeable codes over the same type of alphabet.

    Submitted 13 April, 2023; v1 submitted 31 March, 2023; originally announced March 2023.

    MSC Class: 94B05; 20C05

  9. arXiv:2210.13722  [pdf, other

    cs.DB

    Efficient Selection of Informative Alternative Relational Query Plans for Database Education

    Authors: Hu Wang, Hui Li, Sourav S Bhowmick, Zihao Ma, Jiangtao Cui

    Abstract: A key learning goal of learners taking database systems course is to understand how SQL queries are processed in an RDBMS in practice. To this end, comprehension of the cost-based comparison of different plan choices to select the query execution plan (QEP) of a query is paramount. Unfortunately, off-the-shelf RDBMS typically only expose the selected QEP to users without revealing information abou… ▽ More

    Submitted 16 November, 2023; v1 submitted 24 October, 2022; originally announced October 2022.

    Comments: Update the Example on page three; Clarify that non-human-centered characterization can be obtained by changing Algorithm 1 in Section 6.4; Add a link to access our ARENA system on page ten; Add the investigation of usage which can demonstrates educational value of ARENA system in Section 8.2:

    ACM Class: H.2.4

  10. arXiv:2208.04313  [pdf, other

    cs.LG cs.AI

    AUTOSHAPE: An Autoencoder-Shapelet Approach for Time Series Clustering

    Authors: Guozhong Li, Byron Choi, Jianliang Xu, Sourav S Bhowmick, Daphne Ngar-yin Mah, Grace Lai-Hung Wong

    Abstract: Time series shapelets are discriminative subsequences that have been recently found effective for time series clustering (TSC). The shapelets are convenient for interpreting the clusters. Thus, the main challenge for TSC is to discover high-quality variable-length shapelets to discriminate different clusters. In this paper, we propose a novel autoencoder-shapelet approach (AUTOSHAPE), which is the… ▽ More

    Submitted 18 August, 2022; v1 submitted 6 August, 2022; originally announced August 2022.

  11. arXiv:2204.00905  [pdf, ps, other

    cs.IT

    On the $\ell$-DLIPs of codes over finite commutative rings

    Authors: Sanjit Bhowmick, Alexandre Fotue Tabue, Joydeb Pal

    Abstract: Generalizing the linear complementary duals, the linear complementary pairs and the hull of codes, we introduce the concept of $\ell$-dimension linear intersection pairs ($\ell$-DLIPs) of codes over a finite commutative ring $(R)$, for some positive integer $\ell$. In this paper, we study $\ell$-DLIP of codes over $R$ in a very general setting by a uniform method. Besides, we provide a necessary a… ▽ More

    Submitted 21 June, 2023; v1 submitted 2 April, 2022; originally announced April 2022.

    MSC Class: 51E22; 94B05

  12. arXiv:2201.11885  [pdf, other

    cs.CL

    Boosting Entity Mention Detection for Targetted Twitter Streams with Global Contextual Embeddings

    Authors: Satadisha Saha Bhowmick, Eduard C. Dragut, Weiyi Meng

    Abstract: Microblogging sites, like Twitter, have emerged as ubiquitous sources of information. Two important tasks related to the automatic extraction and analysis of information in Microblogs are Entity Mention Detection (EMD) and Entity Detection (ED). The state-of-the-art EMD systems aim to model the non-literary nature of microblog text by training upon offline static datasets. They extract a combinati… ▽ More

    Submitted 27 January, 2022; originally announced January 2022.

  13. arXiv:2201.08548  [pdf, ps, other

    cs.IT math.GR math.RA

    Classification and count of binary linear complementary dual group codes

    Authors: Ankan Shaw, Sanjit Bhowmick, Satya Bagchi

    Abstract: We establish a complete classification of binary group codes with complementary duals for a finite group and explicitly determine the number of linear complementary dual (LCD) cyclic group codes by using cyclotomic cosets. The dimension and the minimum distance for LCD group codes are explored. Finally, we find a connection between LCD MDS group codes and maximal ideals.

    Submitted 21 January, 2022; originally announced January 2022.

    Comments: 11 pages

    MSC Class: 94B05; 94B15; 20C05

  14. arXiv:2112.05474  [pdf, ps, other

    cs.IT cs.DM

    A Class of $(n, k, r, t)_i$ LRCs Via Parity Check Matrix

    Authors: Deep Mukhopadhyay, Sanjit Bhowmick, Kalyan Hansda, Satya Bagchi

    Abstract: A code is called $(n, k, r, t)$ information symbol locally repairable code \big($(n, k, r, t)_i$ LRC\big) if each information coordinate can be achieved by at least $t$ disjoint repair sets, containing at most $r$ other coordinates. This paper considers a class of $(n, k, r, t)_i$ LRCs, where each repair set contains exactly one parity coordinate. We explore the systematic code in terms of the sta… ▽ More

    Submitted 24 August, 2022; v1 submitted 10 December, 2021; originally announced December 2021.

    Comments: 12 pages

  15. arXiv:2112.05469  [pdf, ps, other

    cs.CR math.RA

    Linear complementary dual code-based Multi-secret sharing scheme

    Authors: Haradhan Ghosh, Sanjit Bhowmick, Pramod Kumar Maurya, Satya Bagchi

    Abstract: Hiding a secret is needed in many situations. Secret sharing plays an important role in protecting information from getting lost, stolen, or destroyed and has been applicable in recent years. A secret sharing scheme is a cryptographic protocol in which a dealer divides the secret into several pieces of share and one share is given to each participant. To recover the secret, the dealer requires a s… ▽ More

    Submitted 10 December, 2021; originally announced December 2021.

    Comments: 12 pages

    MSC Class: 94A62; 94B05; 13H05

  16. arXiv:2109.07471  [pdf, ps, other

    cs.LG eess.SY nlin.CD

    Data-Driven Theory-guided Learning of Partial Differential Equations using SimultaNeous Basis Function Approximation and Parameter Estimation (SNAPE)

    Authors: Sutanu Bhowmick, Satish Nagarajaiah

    Abstract: The measured spatiotemporal response of various physical processes is utilized to infer the governing partial differential equations (PDEs). We propose SimultaNeous Basis Function Approximation and Parameter Estimation (SNAPE), a technique of parameter estimation of PDEs that is robust against high levels of noise nearly 100 %, by simultaneously fitting basis functions to the measured response and… ▽ More

    Submitted 14 September, 2021; originally announced September 2021.

    Comments: 24 pages, 14 figures, Submitted to Science Advances

    MSC Class: 65Zxx ACM Class: J.2

  17. Towards Plug-and-Play Visual Graph Query Interfaces: Data-driven Canned Pattern Selection for Large Networks

    Authors: Zifeng Yuan, Huey Eng Chua, Sourav S Bhowmick, Zekun Ye, Wook-Shin Han, Byron Choi

    Abstract: Canned patterns (i.e. small subgraph patterns) in visual graph query interfaces (a.k.a GUI) facilitate efficient query formulation by enabling pattern-at-a-time construction mode. However, existing GUIs for querying large networks either do not expose any canned patterns or if they do then they are typically selected manually based on domain knowledge. Unfortunately, manual generation of canned pa… ▽ More

    Submitted 21 July, 2021; originally announced July 2021.

    Comments: 19 pages, 26 figures, 3 tables, VLDB conference

  18. arXiv:2105.11410  [pdf, other

    cs.SI cs.DB cs.IR

    From Base Data To Knowledge Discovery -- A Life Cycle Approach -- Using Multilayer Networks

    Authors: Abhishek Santra, Kanthi Komar, Sanjukta Bhowmick, Sharma Chakravarthy

    Abstract: Any large complex data analysis to infer or discover meaningful information/knowledge involves the following steps (in addition to data collection, cleaning, preparing the data for analysis such as attribute elimination): i) Modeling the data -- an approach for modeling and deriving a data representation for analysis using that approach, ii) translating analysis objectives into computations on the… ▽ More

    Submitted 24 May, 2021; originally announced May 2021.

  19. arXiv:2103.00740  [pdf, other

    cs.DB

    Towards Enhancing Database Education: Natural Language Generation Meets Query Execution Plans

    Authors: Weiguo Wang, Sourav S Bhowmick, Hui Li, Shafiq R Joty, Siyuan Liu, Peng Chen

    Abstract: The database systems course is offered as part of an undergraduate computer science degree program in many major universities. A key learning goal of learners taking such a course is to understand how SQL queries are processed in a RDBMS in practice. Since a query execution plan (QEP) describes the execution steps of a query, learners can acquire the understanding by perusing the QEPs generated by… ▽ More

    Submitted 2 March, 2021; v1 submitted 28 February, 2021; originally announced March 2021.

    Comments: 16 pages, 10 figures, SIGMOD2021

  20. PANE: scalable and effective attributed network embedding

    Authors: Renchi Yang, Jieming Shi, Xiaokui Xiao, Yin Yang, Sourav S. Bhowmick, Juncheng Liu

    Abstract: Given a graph G where each node is associated with a set of attributes, attributed network embedding (ANE) maps each node v in G to a compact vector Xv, which can be used in downstream machine learning tasks. Ideally, Xv should capture node v's affinity to each attribute, which considers not only v's own attribute associations, but also those of its connected nodes along edges in G. It is challeng… ▽ More

    Submitted 30 March, 2023; v1 submitted 2 September, 2020; originally announced September 2020.

    Comments: Paper published in VLDBJ 2023. Extended version of PVLDB Vol. 14 (VLDB 2021) paper titled "Scaling Attributed Network Embedding to Massive Graphs"

  21. arXiv:2004.09625  [pdf, other

    cs.SI cs.DB physics.soc-ph

    A New Community Definition For MultiLayer Networks And A Novel Approach For Its Efficient Computation

    Authors: Abhishek Santra, Kanthi Sannappa Komar, Sanjukta Bhowmick, Sharma Chakravarthy

    Abstract: As the use of MultiLayer Networks (or MLNs) for modeling and analysis is gaining popularity, it is becoming increasingly important to propose a community definition that encompasses the multiple features represented by MLNs and develop algorithms for efficiently computing communities on MLNs. Currently, communities for MLNs, are based on aggregating the networks into single graphs using different… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

    Comments: arXiv admin note: substantial text overlap with arXiv:1910.01737, arXiv:1903.02641

  22. arXiv:2002.07511  [pdf, ps, other

    cs.DB

    An Efficient Secure Dynamic Skyline Query Model

    Authors: Weiguo Wang, Hui Li, Yanguo Peng, Sourav S Bhowmick, Peng Chen, Xiaofeng Chen, Jiangtao Cui

    Abstract: It is now cost-effective to outsource large dataset and perform query over the cloud. However, in this scenario, there exist serious security and privacy issues that sensitive information contained in the dataset can be leaked. The most effective way to address that is to encrypt the data before outsourcing. Nevertheless, it remains a grand challenge to process queries in ciphertext efficiently. I… ▽ More

    Submitted 22 February, 2020; v1 submitted 18 February, 2020; originally announced February 2020.

    Comments: 27 pages, 13 figures

  23. arXiv:1910.01737  [pdf, other

    cs.SI cs.DB

    An Efficient Framework for Computing Structure- And Semantics-Preserving Community in a Heterogeneous Multilayer Network

    Authors: Abhishek Santra, Kanthi Sannappa Komar, Sanjukta Bhowmick, Sharma Chakravarthy

    Abstract: Multilayer networks or MLNs (also called multiplexes or network of networks) are being used extensively for modeling and analysis of data sets with multiple entity and feature types and associated relationships. Although the concept of community is widely-used for aggregate analysis, a structure- and semantics preserving definition for it is lacking for MLNs. Retention of original MLN structure an… ▽ More

    Submitted 7 September, 2019; originally announced October 2019.

    Comments: arXiv admin note: substantial text overlap with arXiv:1903.02641

  24. arXiv:1910.01443  [pdf, other

    cs.SI cs.DB

    Efficient Community Detection in Boolean Composed Multiplex Networks

    Authors: Abhishek Santra, Sanjukta Bhowmick, Sharma Chakravarthy

    Abstract: Networks (or graphs) are used to model the dyadic relations between entities in a complex system. In cases where there exists multiple relations between the entities, the complex system can be represented as a multilayer network, where the network in each layer represents one particular relation (or feature). The analysis of multilayer networks involves combining edges from specific layers and the… ▽ More

    Submitted 7 September, 2019; originally announced October 2019.

  25. arXiv:1909.09908  [pdf, other

    cs.SI cs.DB

    Making a Case for MLNs for Data-Driven Analysis: Modeling, Efficiency, and Versatility

    Authors: Abhishek Santra, Kanthi Sannappa Komar, Sanjukta Bhowmick, Sharma Chakravarthy

    Abstract: Datasets of real-world applications are characterized by entities of different types, which are defined by multiple features and connected via varied types of relationships. A critical challenge for these datasets is developing models and computations to support flexible analysis, i.e., the ability to compute varied types of analysis objectives in an efficient manner. To address this problem, in… ▽ More

    Submitted 21 September, 2019; originally announced September 2019.

  26. arXiv:1906.07378  [pdf, other

    cs.SI cs.LG

    DISCO: Influence Maximization Meets Network Embedding and Deep Learning

    Authors: Hui Li, Mengting Xu, Sourav S Bhowmick, Changsheng Sun, Zhongyuan Jiang, Jiangtao Cui

    Abstract: Since its introduction in 2003, the influence maximization (IM) problem has drawn significant research attention in the literature. The aim of IM is to select a set of k users who can influence the most individuals in the social network. The problem is proven to be NP-hard. A large number of approximate algorithms have been proposed to address this problem. The state-of-the-art algorithms estimate… ▽ More

    Submitted 18 June, 2019; originally announced June 2019.

    Comments: 14 pages, 5 figures

    MSC Class: 91D30; 68T01

  27. arXiv:1906.06826  [pdf, other

    cs.SI cs.LG

    Homogeneous Network Embedding for Massive Graphs via Reweighted Personalized PageRank

    Authors: Renchi Yang, Jieming Shi, Xiaokui Xiao, Yin Yang, Sourav S. Bhowmick

    Abstract: Given an input graph G and a node v in G, homogeneous network embedding (HNE) maps the graph structure in the vicinity of v to a compact, fixed-dimensional feature vector. This paper focuses on HNE for massive graphs, e.g., with billions of edges. On this scale, most existing approaches fail, as they incur either prohibitively high costs, or severely compromised result utility. Our proposed soluti… ▽ More

    Submitted 23 June, 2020; v1 submitted 16 June, 2019; originally announced June 2019.

    Comments: full version of a paper published in PVLDB 2020, Volume 13, Number 5, pages 670-683, https://doi.org/10.14778/3377369.3377376, 17 pages

  28. arXiv:1906.03584  [pdf, other

    cs.RO cs.CV

    A Hierarchical Network for Diverse Trajectory Proposals

    Authors: Sriram N. N., Gourav Kumar, Abhay Singh, M. Siva Karthik, Saket Saurav Brojeshwar Bhowmick, K. Madhava Krishna

    Abstract: Autonomous explorative robots frequently encounter scenarios where multiple future trajectories can be pursued. Often these are cases with multiple paths around an obstacle or trajectory options towards various frontiers. Humans in such situations can inherently perceive and reason about the surrounding environment to identify several possibilities of either manoeuvring around the obstacles or mov… ▽ More

    Submitted 9 June, 2019; originally announced June 2019.

    Comments: Accepted in IV 2019

  29. Efficient Estimation of Heat Kernel PageRank for Local Clustering

    Authors: Renchi Yang, Xiaokui Xiao, Zhewei Wei, Sourav S Bhowmick, Jun Zhao, Rong-Hua Li

    Abstract: Given an undirected graph G and a seed node s, the local clustering problem aims to identify a high-quality cluster containing s in time roughly proportional to the size of the cluster, regardless of the size of G. This problem finds numerous applications on large-scale graphs. Recently, heat kernel PageRank (HKPR), which is a measure of the proximity of nodes in graphs, is applied to this problem… ▽ More

    Submitted 3 April, 2019; originally announced April 2019.

    Comments: The technical report for the full research paper accepted in the SIGMOD 2019

  30. arXiv:1903.02641  [pdf, other

    cs.SI cs.DB physics.soc-ph

    Structure-Preserving Community In A Multilayer Network: Definition, Detection, And Analysis

    Authors: Abhishek Santra, Kanthi Sannappa Komar, Sanjukta Bhowmick, Sharma Chakravarthy

    Abstract: Multilayer networks or MLNs (also called multiplexes or network of networks) are being used extensively for modeling and analysis of data sets with multiple entity and feature types as well as their relationships. As the concept of communities and hubs are used for these analysis, a structure-preserving definition for them on MLNs (that retains the original MLN structure and node/edge labels and t… ▽ More

    Submitted 6 March, 2019; originally announced March 2019.

    Comments: 27 pages, Submitted to VLDB 2019

  31. arXiv:1901.10836  [pdf, ps, other

    cs.IT

    Do non-free LCD codes over finite commutative Frobenius rings exist?

    Authors: Sanjit Bhowmick, Alexandre Fotue-Tabue, Edgar Martínez-Moro, Ramakrishna Bandi, Satya Bagchi

    Abstract: In this paper, we clarify some aspects on LCD codes in the literature. We first prove that a non-free LCD code does not exist over finite commutative Frobenius local rings. We then obtain a necessary and sufficient condition for the existence of LCD code over finite commutative Frobenius rings. We later show that a free constacyclic code over finite chain ring is LCD if and only if it is reversibl… ▽ More

    Submitted 30 January, 2019; originally announced January 2019.

  32. arXiv:1811.12748  [pdf, other

    cs.CV

    Improving Landmark Recognition using Saliency detection and Feature classification

    Authors: Akash Kumar, Sagnik Bhowmick, N. Jayanthi, S. Indu

    Abstract: Image Landmark Recognition has been one of the most sought-after classification challenges in the field of vision and perception. After so many years of generic classification of buildings and monuments from images, people are now focussing upon fine-grained problems - recognizing the category of each building or monument. We proposed an ensemble network for the purpose of classification of Indian… ▽ More

    Submitted 30 November, 2018; originally announced November 2018.

    Comments: Pre-print of the paper to be published in Springer, accepted in the proceedings of the in 2nd Workshop on Digital Heritage at the 11th Indian Conference on Computer Vision, Graphics and Image Processing

  33. arXiv:1808.02903  [pdf, other

    cs.SI physics.soc-ph

    On Rich Clubs of Path-Based Centralities in Networks

    Authors: Soumya Sarkar, Animesh Mukherjee, Sanjukta Bhowmick

    Abstract: Many scale-free networks exhibit a rich club structure, where high degree vertices form tightly interconnected subgraphs. In this paper, we explore the emergence of rich clubs in the context of shortest path based centrality metrics. We term these subgraphs of connected high closeness or high betweeness vertices as rich centrality clubs (RCC). Our experiments on real world and synthetic networks… ▽ More

    Submitted 8 August, 2018; originally announced August 2018.

    Comments: Accepted at ACM CIKM 2018, 10 Pages

  34. arXiv:1807.04913  [pdf, ps, other

    cs.IT

    Self-dual cyclic codes over $M_2(\mathbb{Z}_4)$

    Authors: Sanjit Bhowmick, Satya Bagchi, Ramakrishna Bandi

    Abstract: In this paper, we study the codes over the matrix ring over $\mathbb{Z}_4$, which is perhaps the first time the ring structure $M_2(\mathbb{Z}_4)$ is considered as a code alphabet. This ring is isomorphic to $\mathbb{Z}_4[w]+U\mathbb{Z}_4[w]$, where $w$ is a root of the irreducible polynomial $x^2+x+1 \in \mathbb{Z}_2[x]$ and $U\equiv$ ${11}\choose{11}$. We first discuss the structure of the ring… ▽ More

    Submitted 13 July, 2018; originally announced July 2018.

    Comments: 10 pages

    MSC Class: 94B05; 94B15

  35. arXiv:1806.07868  [pdf, other

    cs.SI physics.soc-ph

    Using Core-Periphery Structure to Predict High Centrality Nodes in Time-Varying Networks

    Authors: Soumya Sarkar, Sandipan Sikdar, Animesh Mukherjee, Sanjukta Bhowmick

    Abstract: Vertices with high betweenness and closeness centrality represent influential entities in a network. An important problem for time varying networks is to know a-priori, using minimal computation, whether the influential vertices of the current time step will retain their high centrality, in the future time steps, as the network evolves. In this paper, based on empirical evidences from several larg… ▽ More

    Submitted 20 June, 2018; originally announced June 2018.

    Comments: Accepted in Journal Track of ECML PKDD 2018

  36. arXiv:1805.05670  [pdf, other

    cs.DB

    NEURON: Query Optimization Meets Natural Language Processing For Augmenting Database Education

    Authors: Siyuan Liu, Sourav S Bhowmick, Wanlu Zhang, Shu Wang, Wanyi Huang, Shafiq Joty

    Abstract: Relational database management system (RDBMS) is a major undergraduate course taught in many universities worldwide as part of their computer science program. A core component of such course is the design and implementation of the query optimizer in a RDBMS. The goal of the query optimizer is to automatically identify the most efficient execution strategies for executing the declarative SQL querie… ▽ More

    Submitted 20 August, 2018; v1 submitted 15 May, 2018; originally announced May 2018.

  37. arXiv:1712.05482  [pdf, other

    cs.CV

    Visual Based Navigation of Mobile Robots

    Authors: Shailja, Soumabh Bhowmick, Jayanta Mukhopadhyay

    Abstract: We have developed an algorithm to generate a complete map of the traversable region for a personal assistant robot using monocular vision only. Using multiple taken by a simple webcam, obstacle detection and avoidance algorithms have been developed. Simple Linear Iterative Clustering (SLIC) has been used for segmentation to reduce the memory and computation cost. A simple mapping technique using i… ▽ More

    Submitted 14 December, 2017; originally announced December 2017.

    Comments: Bachelor Thesis, Electrical Engineering Department, IIT Kharagpur, 2016

  38. arXiv:1707.05170  [pdf, other

    cs.DS

    Capacitated Covering Problems in Geometric Spaces

    Authors: Sayan Bandyapadhyay, Santanu Bhowmick, Tanmay Inamdar, Kasturi Varadarajan

    Abstract: In this article, we consider the following capacitated covering problem. We are given a set $P$ of $n$ points and a set $\mathcal{B}$ of balls from some metric space, and a positive integer $U$ that represents the capacity of each of the balls in $\mathcal{B}$. We would like to compute a subset $\mathcal{B}' \subseteq \mathcal{B}$ of balls and assign each point in $P$ to some ball in… ▽ More

    Submitted 12 December, 2017; v1 submitted 17 July, 2017; originally announced July 2017.

  39. arXiv:1705.10977  [pdf, ps, other

    cs.DB cs.DM cs.SI

    Time is What Prevents Everything from Happening at Once: Propagation Time-conscious Influence Maximization

    Authors: Hui Li, Sourav S Bhowmick, Jiangtao Cui, Jianfeng Ma

    Abstract: The influence maximization (IM) problem as defined in the seminal paper by Kempe et al. has received widespread attention from various research communities, leading to the design of a wide variety of solutions. Unfortunately, this classical IM problem ignores the fact that time taken for influence propagation to reach the largest scope can be significant in realworld social networks, during which… ▽ More

    Submitted 27 September, 2017; v1 submitted 31 May, 2017; originally announced May 2017.

    Comments: 14 pages, 26 figures

    MSC Class: 05C80; 05C85; 68Pxx; 68Q17; 68W05; 68R10; 62-07; 62-09; 91C99 ACM Class: F.2.2; H.2.8

  40. arXiv:1611.01546  [pdf, other

    cs.DB cs.DM cs.IR cs.SI

    Scalable Holistic Analysis of Multi-Source, Data-Intensive Problems Using Multilayered Networks

    Authors: Abhishek Santra, Sanjukta Bhowmick, Sharma Chakravarthy

    Abstract: Holistic analysis of many real-world problems are based on data collected from multiple sources contributing to some aspect of that problem. The word fusion has also been used in the literature for such problems involving disparate data types. Holistically understanding traffic patterns, causes of accidents, bombings, terrorist planning and many natural phenomenon such as storms, earthquakes fall… ▽ More

    Submitted 4 November, 2016; originally announced November 2016.

  41. arXiv:1609.05402  [pdf, other

    cs.SI physics.soc-ph

    Understanding Stability of Noisy Networks through Centrality Measures and Local Connections

    Authors: Vladimir Ufimtsev, Soumya Sarkar, Animesh Mukherjee, Sanjukta Bhowmick

    Abstract: Networks created from real-world data contain some inaccuracies or noise, manifested as small changes in the network structure. An important question is whether these small changes can significantly affect the analysis results. In this paper, we study the effect of noise in changing ranks of the high centrality vertices. We compare, using the Jaccard Index (JI), how many of the top-k high centrali… ▽ More

    Submitted 17 September, 2016; originally announced September 2016.

    Comments: CIKM 2016

  42. arXiv:1608.05295  [pdf, ps, other

    cs.SI physics.soc-ph

    Sensitivity and Reliability in Incomplete Networks: Centrality Metrics to Community Scoring Functions

    Authors: Soumya Sarkar, Sanjukta Bhowmick, Suhansanu Kumar, Animesh Mukherjee

    Abstract: Network analysis is an important tool in understanding the behavior of complex systems of interacting entities. However, due to the limitations of data gathering technologies, some interactions might be missing from the network model. This is a ubiquitous problem in all domains that use network analysis, from social networks to hyper-linked web networks to biological networks. Consequently, an imp… ▽ More

    Submitted 24 August, 2016; v1 submitted 18 August, 2016; originally announced August 2016.

    Comments: Accepted in proceedings of ASONAM 2016

  43. arXiv:1606.01543  [pdf, ps, other

    cs.SI physics.soc-ph

    Permanence and Community Structure in Complex Networks

    Authors: Tanmoy Chakraborty, Sriram Srinivasan, Niloy Ganguly, Animesh Mukherjee, Sanjukta Bhowmick

    Abstract: The goal of community detection algorithms is to identify densely-connected units within large networks. An implicit assumption is that all the constituent nodes belong equally to their associated community. However, some nodes are more important in the community than others. To date, efforts have been primarily driven to identify communities as a whole, rather than understanding to what extent an… ▽ More

    Submitted 5 June, 2016; originally announced June 2016.

    Comments: 34 pages, 15 figures, 8 tables, ACM Transactions on Knowledge Discovery from Data (TKDD), 2016. arXiv admin note: text overlap with arXiv:1206.4987 by other authors

  44. arXiv:1604.03454  [pdf, other

    cs.SI physics.soc-ph

    GenPerm: A Unified Method for Detecting Non-overlapping and Overlapping Communities

    Authors: Tanmoy Chakraborty, Suhansanu Kumar, Niloy Ganguly, Animesh Mukherjee, Sanjukta Bhowmick

    Abstract: Detection of non-overlapping and overlapping communities are essentially the same problem. However, current algorithms focus either on finding overlapping or non-overlapping communities. We present a generalized framework that can identify both non-overlapping and overlapping communities, without any prior input about the network or its community distribution. To do so, we introduce a vertex-based… ▽ More

    Submitted 12 April, 2016; originally announced April 2016.

    Comments: This paper (final version) is accepted in IEEE Transactions on Knowledge and Data Engineering (TKDE). 13 Figures, 6 tables

  45. arXiv:1602.04152  [pdf, other

    cs.CG

    On Metric Multi-Covering Problems

    Authors: Santanu Bhowmick, Tanmay Inamdar, Kasturi Varadarajan

    Abstract: In the metric multi-cover problem (MMC), we are given two point sets $Y$ (servers) and $X$ (clients) in an arbitrary metric space $(X \cup Y, d)$, a positive integer $k$ that represents the coverage demand of each client, and a constant $α\geq 1$. Each server can have a single ball of arbitrary radius centered on it. Each client $x \in X$ needs to be covered by at least $k$ such balls centered on… ▽ More

    Submitted 15 February, 2017; v1 submitted 12 February, 2016; originally announced February 2016.

    Comments: 28 Pages, 1 Figure

  46. arXiv:1502.03847  [pdf, other

    cs.CG cs.CC cs.DM

    A Constant Factor Approximation for Orthogonal Order Preserving Layout Adjustment

    Authors: Sayan Bandyapadhyay, Santanu Bhowmick, Kasturi Varadarajan

    Abstract: Given an initial placement of a set of rectangles in the plane, we consider the problem of finding a disjoint placement of the rectangles that minimizes the area of the bounding box and preserves the orthogonal order i.e.\ maintains the sorted ordering of the rectangle centers along both $x$-axis and $y$-axis with respect to the initial placement. This problem is known as Layout Adjustment for Dis… ▽ More

    Submitted 23 February, 2015; v1 submitted 12 February, 2015; originally announced February 2015.

    Comments: Edited Section 5, re-arranged content

    ACM Class: I.3.5

  47. arXiv:1407.5674  [pdf, ps, other

    cs.CG

    A Constant-Factor Approximation for Multi-Covering with Disks

    Authors: Santanu Bhowmick, Kasturi Varadarajan, Shi-Ke Xue

    Abstract: We consider variants of the following multi-covering problem with disks. We are given two point sets $Y$ (servers) and $X$ (clients) in the plane, a coverage function $κ:X \rightarrow \mathcal{N}$, and a constant $α\geq 1$. Centered at each server is a single disk whose radius we are free to set. The requirement is that each client $x \in X$ be covered by at least $κ(x)$ of the server disks. The o… ▽ More

    Submitted 21 July, 2014; originally announced July 2014.

  48. arXiv:1406.2426  [pdf, other

    physics.soc-ph cs.SI

    On the Permanence of Vertices in Network Communities

    Authors: Tanmoy Chakraborty, Sriram Srinivasan, Niloy Ganguly, Animesh Mukherjee, Sanjukta Bhowmick

    Abstract: Despite the prevalence of community detection algorithms, relatively less work has been done on understanding whether a network is indeed modular and how resilient the community structure is under perturbations. To address this issue, we propose a new vertex-based metric called "permanence", that can quantitatively give an estimate of the community-like structure of the network. The central idea… ▽ More

    Submitted 10 June, 2014; originally announced June 2014.

    Comments: 10 pages, 5 figures, 8 tables, Accepted in 20th ACM SIGKDD Conference on Knowledge Discovery and Data Mining

    ACM Class: H.2.8; E.1

  49. arXiv:1404.3776  [pdf, other

    cs.CG

    Approximation Schemes for Partitioning: Convex Decomposition and Surface Approximation

    Authors: Sayan Bandyapadhyay, Santanu Bhowmick, Kasturi Varadarajan

    Abstract: We revisit two NP-hard geometric partitioning problems - convex decomposition and surface approximation. Building on recent developments in geometric separators, we present quasi-polynomial time algorithms for these problems with improved approximation guarantees.

    Submitted 14 April, 2014; originally announced April 2014.

    Comments: 21 pages, 6 figures

  50. arXiv:1401.1190  [pdf

    cs.CV

    Bangla Text Recognition from Video Sequence: A New Focus

    Authors: Souvik Bhowmick, Purnendu Banerjee

    Abstract: Extraction and recognition of Bangla text from video frame images is challenging due to complex color background, low-resolution etc. In this paper, we propose an algorithm for extraction and recognition of Bangla text form such video frames with complex background. Here, a two-step approach has been proposed. First, the text line is segmented into words using information based on line contours. F… ▽ More

    Submitted 6 January, 2014; originally announced January 2014.

    Journal ref: NATIONAL CONFERENCE ON COMPUTING AND SYSTEMS (NaCCS), pp. 62-67,2012