Zum Hauptinhalt springen

Showing 1–38 of 38 results for author: Chatterjee, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.04183  [pdf, other

    cs.SE

    Incivility in Open Source Projects: A Comprehensive Annotated Dataset of Locked GitHub Issue Threads

    Authors: Ramtin Ehsani, Mia Mohammad Imran, Robert Zita, Kostadin Damevski, Preetha Chatterjee

    Abstract: In the dynamic landscape of open source software (OSS) development, understanding and addressing incivility within issue discussions is crucial for fostering healthy and productive collaborations. This paper presents a curated dataset of 404 locked GitHub issue discussion threads and 5961 individual comments, collected from 213 OSS projects. We annotated the comments with various categories of inc… ▽ More

    Submitted 6 February, 2024; originally announced February 2024.

  2. arXiv:2312.15874  [pdf, ps, other

    cs.CC

    Lower Bounds for Set-Multilinear Branching Programs

    Authors: Prerona Chatterjee, Deepanshu Kush, Shubhangi Saraf, Amir Shpilka

    Abstract: In this paper, we prove super-polynomial lower bounds for the model of \emph{sum of ordered set-multilinear algebraic branching programs}, each with a possibly different ordering ($\sum \mathsf{smABP}$). Specifically, we give an explicit $nd$-variate polynomial of degree $d$ such that any $\sum \mathsf{smABP}$ computing it must have size $n^{ω(1)}$ for $d$ as low as $ω(\log n)$. Notably, this cons… ▽ More

    Submitted 19 February, 2024; v1 submitted 25 December, 2023; originally announced December 2023.

  3. arXiv:2312.13105  [pdf, other

    cs.SE

    Exploring ChatGPT for Toxicity Detection in GitHub

    Authors: Shyamal Mishra, Preetha Chatterjee

    Abstract: Fostering a collaborative and inclusive environment is crucial for the sustained progress of open source development. However, the prevalence of negative discourse, often manifested as toxic comments, poses significant challenges to developer well-being and productivity. To identify such negativity in project communications, especially within large projects, automated toxicity detection models are… ▽ More

    Submitted 20 December, 2023; originally announced December 2023.

  4. arXiv:2312.10297  [pdf, other

    cs.SE

    Shedding Light on Software Engineering-specific Metaphors and Idioms

    Authors: Mia Mohammad Imran, Preetha Chatterjee, Kostadin Damevski

    Abstract: Use of figurative language, such as metaphors and idioms, is common in our daily-life communications, and it can also be found in Software Engineering (SE) channels, such as comments on GitHub. Automatically interpreting figurative language is a challenging task, even with modern Large Language Models (LLMs), as it often involves subtle nuances. This is particularly true in the SE domain, where fi… ▽ More

    Submitted 23 December, 2023; v1 submitted 15 December, 2023; originally announced December 2023.

  5. arXiv:2312.09731  [pdf, other

    cs.SE

    Uncovering the Causes of Emotions in Software Developer Communication Using Zero-shot LLMs

    Authors: Mia Mohammad Imran, Preetha Chatterjee, Kostadin Damevski

    Abstract: Understanding and identifying the causes behind developers' emotions (e.g., Frustration caused by `delays in merging pull requests') can be crucial towards finding solutions to problems and fostering collaboration in open-source communities. Effectively identifying such information in the high volume of communications across the different project channels, such as chats, emails, and issue comments… ▽ More

    Submitted 15 December, 2023; originally announced December 2023.

  6. arXiv:2312.03715  [pdf, other

    cs.CL cs.LG cs.SI

    Sentiment Analysis of Twitter Posts on Global Conflicts

    Authors: Ujwal Sasikumar, Ank Zaman, Abdul-Rahman Mawlood-Yunis, Prosenjit Chatterjee

    Abstract: Sentiment analysis of social media data is an emerging field with vast applications in various domains. In this study, we developed a sentiment analysis model to analyze social media sentiment, especially tweets, during global conflicting scenarios. To establish our research experiment, we identified a recent global dispute incident on Twitter and collected around 31,000 filtered Tweets for severa… ▽ More

    Submitted 20 November, 2023; originally announced December 2023.

    Comments: 6 pages

  7. arXiv:2312.00802  [pdf

    eess.SP cs.AI cs.CR cs.LG

    Continuous Authentication Using Mouse Clickstream Data Analysis

    Authors: Sultan Almalki, Prosenjit Chatterjee, Kaushik Roy

    Abstract: Biometrics is used to authenticate an individual based on physiological or behavioral traits. Mouse dynamics is an example of a behavioral biometric that can be used to perform continuous authentication as protection against security breaches. Recent research on mouse dynamics has shown promising results in identifying users; however, it has not yet reached an acceptable level of accuracy. In this… ▽ More

    Submitted 23 November, 2023; originally announced December 2023.

  8. arXiv:2312.00041  [pdf

    cs.CR cs.CV cs.LG

    Presentation Attack Detection using Convolutional Neural Networks and Local Binary Patterns

    Authors: Justin Spencer, Deborah Lawrence, Prosenjit Chatterjee, Kaushik Roy, Albert Esterline, Jung-Hee Kim

    Abstract: The use of biometrics to authenticate users and control access to secure areas has become extremely popular in recent years, and biometric access control systems are frequently used by both governments and private corporations. However, these systems may represent risks to security when deployed without considering the possibility of biometric presentation attacks (also known as spoofing). Present… ▽ More

    Submitted 23 November, 2023; originally announced December 2023.

  9. arXiv:2312.00040  [pdf

    cs.CR cs.CV cs.LG

    Presentation Attack detection using Wavelet Transform and Deep Residual Neural Net

    Authors: Prosenjit Chatterjee, Alex Yalchin, Joseph Shelton, Kaushik Roy, Xiaohong Yuan, Kossi D. Edoh

    Abstract: Biometric authentication is becoming more prevalent for secured authentication systems. However, the biometric substances can be deceived by the imposters in several ways. Among other imposter attacks, print attacks, mask attacks, and replay attacks fall under the presentation attack category. The bio-metric images, especially the iris and face, are vulnerable to different presentation attacks. Th… ▽ More

    Submitted 23 November, 2023; originally announced December 2023.

  10. arXiv:2311.14195  [pdf

    cs.LG cs.NE

    Touch Analysis: An Empirical Evaluation of Machine Learning Classification Algorithms on Touch Data

    Authors: Melodee Montgomery, Prosenjit Chatterjee, John Jenkins, Kaushik Roy

    Abstract: Our research aims at classifying individuals based on their unique interactions on touchscreen-based smartphones. In this research, we use Touch-Analytics datasets, which include 41 subjects and 30 different behavioral features. Furthermore, we derived new features from the raw data to improve the overall authentication performance. Previous research has already been done on the Touch-Analytics da… ▽ More

    Submitted 23 November, 2023; originally announced November 2023.

  11. Interpersonal Trust in OSS: Exploring Dimensions of Trust in GitHub Pull Requests

    Authors: Amirali Sajadi, Kostadin Damevski, Preetha Chatterjee

    Abstract: Interpersonal trust plays a crucial role in facilitating collaborative tasks, such as software development. While previous research recognizes the significance of trust in an organizational setting, there is a lack of understanding in how trust is exhibited in OSS distributed teams, where there is an absence of direct, in-person communications. To foster trust and collaboration in OSS teams, we ne… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

    Journal ref: 2023 IEEE/ACM 45th International Conference on Software Engineering: New Ideas and Emerging Results (ICSE-NIER)

  12. arXiv:2311.04755  [pdf, other

    cs.SE

    Towards Understanding Emotions in Informal Developer Interactions: A Gitter Chat Study

    Authors: Amirali Sajadi, Kostadin Damevski, Preetha Chatterjee

    Abstract: Emotions play a significant role in teamwork and collaborative activities like software development. While researchers have analyzed developer emotions in various software artifacts (e.g., issues, pull requests), few studies have focused on understanding the broad spectrum of emotions expressed in chats. As one of the most widely used means of communication, chats contain valuable information in t… ▽ More

    Submitted 8 November, 2023; originally announced November 2023.

  13. arXiv:2311.02314  [pdf, other

    cs.CV cs.AI cs.LG cs.NE

    Thermal Face Image Classification using Deep Learning Techniques

    Authors: Prosenjit Chatterjee, ANK Zaman

    Abstract: Thermal images have various applications in security, medical and industrial domains. This paper proposes a practical deep-learning approach for thermal image classification. Accurate and efficient classification of thermal images poses a significant challenge across various fields due to the complex image content and the scarcity of annotated datasets. This work uses a convolutional neural networ… ▽ More

    Submitted 3 November, 2023; originally announced November 2023.

    Comments: 6 pages. Link of the Conference: https://american-cse.org/index.html/

  14. arXiv:2309.07612  [pdf, ps, other

    cs.CC

    On Annihilators of Explicit Polynomial Maps

    Authors: Prerona Chatterjee, Anamay Tengse

    Abstract: We study the algebraic complexity of annihilators of polynomials maps. In particular, when a polynomial map is `encoded by' a small algebraic circuit, we show that the coefficients of an annihilator of the map can be computed in PSPACE. Even when the underlying field is that of reals or complex numbers, an analogous statement is true. We achieve this by using the class VPSPACE that coincides with… ▽ More

    Submitted 14 September, 2023; originally announced September 2023.

  15. arXiv:2307.15631  [pdf, other

    cs.SE

    Exploring Moral Principles Exhibited in OSS: A Case Study on GitHub Heated Issues

    Authors: Ramtin Ehsani, Rezvaneh Rezapour, Preetha Chatterjee

    Abstract: To foster collaboration and inclusivity in Open Source Software (OSS) projects, it is crucial to understand and detect patterns of toxic language that may drive contributors away, especially those from underrepresented communities. Although machine learning-based toxicity detection tools trained on domain-specific data have shown promise, their design lacks an understanding of the unique nature an… ▽ More

    Submitted 28 July, 2023; originally announced July 2023.

  16. arXiv:2307.01299  [pdf, other

    cs.CL

    The Evolution of Substance Use Coverage in the Philadelphia Inquirer

    Authors: Layla Bouzoubaa, Ramtin Ehsani, Preetha Chatterjee, Rezvaneh Rezapour

    Abstract: The media's representation of illicit substance use can lead to harmful stereotypes and stigmatization for individuals struggling with addiction, ultimately influencing public perception, policy, and public health outcomes. To explore how the discourse and coverage of illicit drug use changed over time, this study analyzes 157,476 articles published in the Philadelphia Inquirer over a decade. Spec… ▽ More

    Submitted 3 July, 2023; originally announced July 2023.

  17. arXiv:2303.12944  [pdf, other

    cs.CR cs.AI

    Use of Federated Learning and Blockchain towards Securing Financial Services

    Authors: Pushpita Chatterjee, Debashis Das, Danda B Rawat

    Abstract: In recent days, the proliferation of several existing and new cyber-attacks pose an axiomatic threat to the stability of financial services. It is hard to predict the nature of attacks that can trigger a serious financial crisis. The unprecedented digital transformation to financial services has been accelerated during the COVID-19 pandemic and it is still ongoing. Attackers are taking advantage o… ▽ More

    Submitted 4 February, 2023; originally announced March 2023.

  18. arXiv:2302.01491  [pdf, other

    cs.RO cs.AI

    DiSProD: Differentiable Symbolic Propagation of Distributions for Planning

    Authors: Palash Chatterjee, Ashutosh Chapagain, Weizhe Chen, Roni Khardon

    Abstract: The paper introduces DiSProD, an online planner developed for environments with probabilistic transitions in continuous state and action spaces. DiSProD builds a symbolic graph that captures the distribution of future trajectories, conditioned on a given policy, using independence assumptions and approximate propagation of distributions. The symbolic graph provides a differentiable representation… ▽ More

    Submitted 4 August, 2023; v1 submitted 2 February, 2023; originally announced February 2023.

    Comments: International Joint Conference on Artificial Intelligence (IJCAI) 2023. For project website, see https://pecey.github.io/DiSProD/

  19. arXiv:2301.05835  [pdf, other

    cs.RO

    A Novel Multi-Layer Framework for BVLoS Drone Operation: A Preliminary Study

    Authors: Francesco Betti Sorbelli, Punyasha Chatterjee, Federico Corò, Lorenzo Palazzetti, Cristina M. Pinotti

    Abstract: Drones have become increasingly popular in a variety of fields, including agriculture, emergency response, and package delivery. However, most drone operations are currently limited to within Visual Line of Sight (vlos) due to safety concerns. Flying drones Beyond Visual Line of Sight (bvlos) presents new challenges and opportunities, but also requires new technologies and regulatory frameworks, n… ▽ More

    Submitted 14 January, 2023; originally announced January 2023.

  20. arXiv:2301.01676  [pdf, other

    cs.CC

    New Lower Bounds against Homogeneous Non-Commutative Circuits

    Authors: Prerona Chatterjee, Pavel Hrubeš

    Abstract: We give several new lower bounds on size of homogeneous non-commutative circuits. We present an explicit homogeneous bivariate polynomial of degree $d$ which requires homogeneous non-commutative circuit of size $Ω(d/\log d)$. For an $n$-variate polynomial with $n>1$, the result can be improved to $Ω(nd)$, if $d\leq n$, or $Ω(nd \frac{\log n}{\log d})$, if $d\geq n$. Under the same assumptions, w… ▽ More

    Submitted 4 January, 2023; originally announced January 2023.

  21. arXiv:2208.05573  [pdf, other

    cs.SE

    Data Augmentation for Improving Emotion Recognition in Software Engineering Communication

    Authors: Mia Mohammad Imran, Yashasvi Jain, Preetha Chatterjee, Kostadin Damevski

    Abstract: Emotions (e.g., Joy, Anger) are prevalent in daily software engineering (SE) activities, and are known to be significant indicators of work productivity (e.g., bug fixing efficiency). Recent studies have shown that directly applying general purpose emotion classification tools to SE corpora is not effective. Even within the SE domain, tool performance degrades significantly when trained on one com… ▽ More

    Submitted 10 August, 2022; originally announced August 2022.

  22. A Deep Learning Approach to Create DNS Amplification Attacks

    Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik, Cory Nance

    Abstract: In recent years, deep learning has shown itself to be an incredibly valuable tool in cybersecurity as it helps network intrusion detection systems to classify attacks and detect new ones. Adversarial learning is the process of utilizing machine learning to generate a perturbed set of inputs to then feed to the neural network to misclassify it. Much of the current work in the field of adversarial l… ▽ More

    Submitted 28 June, 2022; originally announced June 2022.

    Comments: 12 pages, 6 figures, Conference: to 2022 4th International Conference on Management Science and Industrial Engineering (MSIE) (MSIE 2022), DOI: https://doi.org/10.1145/3535782.3535838, accepted to conference above, not yet published

  23. CoAP-DoS: An IoT Network Intrusion Dataset

    Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik

    Abstract: The need for secure Internet of Things (IoT) devices is growing as IoT devices are becoming more integrated into vital networks. Many systems rely on these devices to remain available and provide reliable service. Denial of service attacks against IoT devices are a real threat due to the fact these low power devices are very susceptible to denial-of-service attacks. Machine learning enabled networ… ▽ More

    Submitted 28 June, 2022; originally announced June 2022.

    Comments: 6 pages, 8 figures, Publication Title: 2022 6th International Conference on Cryptography, Security and Privacy (CSP), eCF Paper Id: 1641864704381, accepted for publishing, not yet published

  24. Empirical Standards for Repository Mining

    Authors: Preetha Chatterjee, Tushar Sharma, Paul Ralph

    Abstract: The purpose of scholarly peer review is to evaluate the quality of scientific manuscripts. However, study after study demonstrates that peer review neither effectively nor reliably assesses research quality. Empirical standards attempt to address this problem by modelling a scientific community's expectations for each kind of empirical study conducted in that community. This should enhance not onl… ▽ More

    Submitted 29 March, 2022; originally announced March 2022.

  25. arXiv:2202.13103  [pdf, ps, other

    cs.CC

    Monotone Classes Beyond VNP

    Authors: Prerona Chatterjee, Kshitij Gajjar, Anamay Tengse

    Abstract: In this work, we study the natural monotone analogues of various equivalent definitions of VPSPACE: a well studied class (Poizat 2008, Koiran and Perifel 2009, Malod 2011, Mahajan and Rao 2013) that is believed to be larger than VNP. We observe that these monotone analogues are not equivalent unlike their non-monotone counterparts, and propose monotone VPSPACE (mVPSPACE) to be defined as the monot… ▽ More

    Submitted 5 October, 2023; v1 submitted 26 February, 2022; originally announced February 2022.

    Comments: 30 pages; made changes suggested by reviewers

    MSC Class: 68Q15; 68Q17

  26. arXiv:2103.00864  [pdf, ps, other

    cs.CC

    Separating ABPs and Some Structured Formulas in the Non-Commutative Setting

    Authors: Prerona Chatterjee

    Abstract: The motivating question for this work is a long standing open problem, posed by Nisan (1991), regarding the relative powers of algebraic branching programs (ABPs) and formulas in the non-commutative setting. Even though the general question continues to remain open, we make some progress towards its resolution. To that effect, we generalise the notion of ordered polynomials in the non-commutative… ▽ More

    Submitted 1 March, 2021; originally announced March 2021.

  27. arXiv:2102.12886  [pdf, other

    cs.DS

    Generalized Parametric Path Problems

    Authors: Prerona Chatterjee, Kshitij Gajjar, Jaikumar Radhakrishnan, Girish Varma

    Abstract: Parametric path problems arise independently in diverse domains, ranging from transportation to finance, where they are studied under various assumptions. We formulate a general path problem with relaxed assumptions, and describe how this formulation is applicable in these domains. We study the complexity of the general problem, and a variant of it where preprocessing is allowed. We show that wh… ▽ More

    Submitted 7 June, 2021; v1 submitted 25 February, 2021; originally announced February 2021.

  28. arXiv:2012.07113  [pdf, other

    cs.RO cs.DC

    Uniform Circle Formation By Oblivious Swarm Robots

    Authors: Moumita Mondal, Sruti Gan Chaudhuri, Ayan Dutta, Krishnendu Mukhopadhyaya, Punyasha Chatterjee

    Abstract: In this paper, we study the circle formation problem by multiple autonomous and homogeneous disc-shaped robots (also known as fat robots). The goal of the robots is to place themselves on the periphery of a circle. Circle formation has many real-world applications, such as boundary surveillance. This paper addresses one variant of such problem { uniform circle formation, where the robots have to b… ▽ More

    Submitted 13 December, 2020; originally announced December 2020.

  29. arXiv:2012.07112  [pdf, other

    cs.RO cs.DC

    Uniform Scattering of Robots on Alternate Nodes of a Grid

    Authors: Moumita Mondal, Sruti Gan Chaudhuri, Punyasha Chatterjee

    Abstract: In this paper, we propose a distributed algorithm to uniformly scatter the robots along a grid, with robots on alternate nodes of this grid distribution. These homogeneous, autonomous mobile robots place themselves equidistant apart on the grid, which can be required for guarding or covering a geographical area by the robots. The robots operate by executing cycles of the states "look-compute-move"… ▽ More

    Submitted 13 December, 2020; originally announced December 2020.

  30. arXiv:2007.11536  [pdf, other

    cs.NI

    An SDN-IoT-based Framework for Future Smart Cities: Addressing Perspective

    Authors: Uttam Ghosh, Pushpita Chatterjee, Sachin Shetty, Raja Datta

    Abstract: In this Chapter, a software-defined network (SDN)-based framework for future smart cities has been proposed and discussed. It also comprises a distributed addressing scheme to facilitate the allocation of addresses to devices in the smart city dynamically. The framework is dynamic and modules can be added and omitted by a centralized controlling unit without disturbing the other components of the… ▽ More

    Submitted 22 July, 2020; originally announced July 2020.

  31. arXiv:2005.08063  [pdf, other

    cs.PL cs.SE

    Distributed Bounded Model Checking

    Authors: Prantik Chatterjee, Subhajit Roy, Bui Phi Diep, Akash Lal

    Abstract: Program verification is a resource-hungry task. This paper looks at the problem of parallelizing SMT-based automated program verification, specifically bounded model-checking, so that it can be distributed and executed on a cluster of machines. We present an algorithm that dynamically unfolds the call graph of the program and frequently splits it to create sub-tasks that can be solved in parallel.… ▽ More

    Submitted 16 May, 2020; originally announced May 2020.

  32. arXiv:2005.04108  [pdf

    q-bio.MN cs.AI

    Computational modeling of Human-nCoV protein-protein interaction network

    Authors: Sovan Saha, Anup Kumar Halder, Soumyendu Sekhar Bandyopadhyay, Piyali Chatterjee, Mita Nasipuri, Subhadip Basu

    Abstract: COVID-19 has created a global pandemic with high morbidity and mortality in 2020. Novel coronavirus (nCoV), also known as Severe Acute Respiratory Syndrome Coronavirus 2 (SARS-CoV2), is responsible for this deadly disease. International Committee on Taxonomy of Viruses (ICTV) has declared that nCoV is highly genetically similar to SARS-CoV epidemic in 2003 (89% similarity). Limited number of clini… ▽ More

    Submitted 5 May, 2020; originally announced May 2020.

    Comments: Total number of pages is 12. Total number of figures is 7. Total number of tables is 1

  33. arXiv:2004.14147  [pdf, ps, other

    cs.CC

    On the Existence of Algebraic Natural Proofs

    Authors: Prerona Chatterjee, Mrinal Kumar, C Ramya, Ramprasad Saptharishi, Anamay Tengse

    Abstract: The framework of algebraically natural proofs was independently introduced in the works of Forbes, Shpilka and Volk (2018), and Grochow, Kumar, Saks and Saraf (2017), to study the efficacy of commonly used techniques for proving lower bounds in algebraic complexity. We use the known connections between algebraic hardness and pseudorandomness to shed some more light on the question relating to this… ▽ More

    Submitted 28 February, 2024; v1 submitted 29 April, 2020; originally announced April 2020.

    Comments: The work arXiv:2012.07056 "If VNP is hard, then so are equations for it" has been combined with the previous version of this work (CKRST 2020). Further, this version generalizes the main results in the earlier version (CKRST 2020), and also includes more detailed definitions of algebraic natural proofs and other related concepts

  34. arXiv:1911.11793  [pdf, ps, other

    cs.CC

    A Quadratic Lower Bound for Algebraic Branching Programs and Formulas

    Authors: Prerona Chatterjee, Mrinal Kumar, Adrian She, Ben Lee Volk

    Abstract: We show that any Algebraic Branching Program (ABP) computing the polynomial $\sum_{i = 1}^n x_i^n$ has at least $Ω(n^2)$ vertices. This improves upon the lower bound of $Ω(n\log n)$, which follows from the classical result of Baur and Strassen [Str73, BS83], and extends the results in [K19], which showed a quadratic lower bound for \emph{homogeneous} ABPs computing the same polynomial. Our proof… ▽ More

    Submitted 18 March, 2020; v1 submitted 26 November, 2019; originally announced November 2019.

  35. arXiv:1907.07156  [pdf, other

    cs.CV cs.LG

    Efficient Segmentation: Learning Downsampling Near Semantic Boundaries

    Authors: Dmitrii Marin, Zijian He, Peter Vajda, Priyam Chatterjee, Sam Tsai, Fei Yang, Yuri Boykov

    Abstract: Many automated processes such as auto-piloting rely on a good semantic segmentation as a critical component. To speed up performance, it is common to downsample the input frame. However, this comes at the cost of missed small objects and reduced accuracy at semantic boundaries. To address this problem, we propose a new content-adaptive downsampling technique that learns to favor sampling locations… ▽ More

    Submitted 16 July, 2019; originally announced July 2019.

  36. arXiv:1904.00478  [pdf, other

    cs.SE

    Exploring the Generality of a Java-based Loop Action Model for the Quorum Programming Language

    Authors: Preetha Chatterjee

    Abstract: Many algorithmic steps require more than one statement to implement, but not big enough to be a method (e.g., add element, find the maximum, determine a value, etc.). These steps are generally implemented by loops. Internal comments for the loops often describe these intermediary steps, however, unfortunately a very small percentage of code is well documented to help new users/coders. As a result,… ▽ More

    Submitted 31 March, 2019; originally announced April 2019.

    Comments: This is a report of a preliminary research I conducted in 2015, where I extended upon the research of Wang et al. ("Developing a Model of Loop Actions by Mining Loop Characteristics from a Large Code Corpus" In Proceedings of 31st International Conference on Software Maintenance and Evolution, Bremen, Germany, September 2015. )

  37. arXiv:1812.10249  [pdf, ps, other

    cs.CC

    Constructing Faithful Homomorphisms over Fields of Finite Characteristic

    Authors: Prerona Chatterjee, Ramprasad Saptharishi

    Abstract: We study the question of algebraic rank or transcendence degree preserving homomorphisms over finite fields. This concept was first introduced by Beecken, Mittmann and Saxena (2013), and exploited by them, and Agrawal, Saha, Saptharishi and Saxena (2016) to design algebraic independence based identity tests using the Jacobian criterion over characteristic zero fields. An analogue of such construct… ▽ More

    Submitted 13 December, 2022; v1 submitted 26 December, 2018; originally announced December 2018.

    ACM Class: I.1

  38. arXiv:1209.4751  [pdf

    cs.DC cs.DS cs.NI

    Energy Aware, Scalable, K-Hop Based Cluster Formation In MANET

    Authors: Priyanka Chatterjee, Nikhil Agarwal

    Abstract: The study of Mobile Ad-hoc Network remains attractive due to the desire to achieve better performance and scalability. MANETs are distributed systems consisting of mobile hosts that are connected by multi-hop wireless links. Such systems are self organized and facilitate communication in the network without any centralized administration. MANETs exhibit battery power constraint and suffer scalabil… ▽ More

    Submitted 21 September, 2012; originally announced September 2012.