Zum Hauptinhalt springen

Showing 1–20 of 20 results for author: K., H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.16387  [pdf, other

    cs.CR

    Enhancing MOTION2NX for Efficient, Scalable and Secure Image Inference using Convolutional Neural Networks

    Authors: Haritha K, Ramya Burra, Srishti Mittal, Sarthak Sharma, Abhilash Venkatesh, Anshoo Tandon

    Abstract: This work contributes towards the development of an efficient and scalable open-source Secure Multi-Party Computation (SMPC) protocol on machines with moderate computational resources. We use the ABY2.0 SMPC protocol implemented on the C++ based MOTION2NX framework for secure convolutional neural network (CNN) inference application with semi-honest security. Our list of contributions are as follow… ▽ More

    Submitted 29 August, 2024; originally announced August 2024.

    Comments: 20 pages, 1 figure. arXiv admin note: text overlap with arXiv:2310.10133

  2. arXiv:2407.03941  [pdf, other

    cs.SE cs.AI cs.CL

    Narrow Transformer: Starcoder-Based Java-LM For Desktop

    Authors: Kamalkumar Rathinasamy, Balaji A J, Ankush Kumar, Gagan Gayari, Harshini K, Rajab Ali Mondal, Sreenivasa Raghavan K S, Swayam Singh

    Abstract: This paper presents NT-Java-1.1B, an open-source specialized code language model built on StarCoderBase-1.1B, designed for coding tasks in Java programming. NT-Java-1.1B achieves state-of-the-art performance, surpassing its base model and majority of other models of similar size on MultiPL-E Java code benchmark. While there have been studies on extending large, generic pre-trained models to improv… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

    ACM Class: I.2.7

  3. arXiv:2406.00010  [pdf, other

    cs.IR cs.CL

    EnterpriseEM: Fine-tuned Embeddings for Enterprise Semantic Search

    Authors: Kamalkumar Rathinasamy, Jayarama Nettar, Amit Kumar, Vishal Manchanda, Arun Vijayakumar, Ayush Kataria, Venkateshprasanna Manjunath, Chidambaram GS, Jaskirat Singh Sodhi, Shoeb Shaikh, Wasim Akhtar Khan, Prashant Singh, Tanishq Dattatray Ige, Vipin Tiwari, Rajab Ali Mondal, Harshini K, S Reka, Chetana Amancharla, Faiz ur Rahman, Harikrishnan P A, Indraneel Saha, Bhavya Tiwary, Navin Shankar Patel, Pradeep T S, Balaji A J , et al. (2 additional authors not shown)

    Abstract: Enterprises grapple with the significant challenge of managing proprietary unstructured data, hindering efficient information retrieval. This has led to the emergence of AI-driven information retrieval solutions, designed to adeptly extract relevant insights to address employee inquiries. These solutions often leverage pre-trained embedding models and generative models as foundational components.… ▽ More

    Submitted 18 May, 2024; originally announced June 2024.

    ACM Class: I.2.7

  4. CHC-COMP 2023: Competition Report

    Authors: Emanuele De Angelis, Hari Govind V K

    Abstract: CHC-COMP 2023 is the sixth edition of the Competition of Solvers for Constrained Horn Clauses. The competition was run in April 2023 and the results were presented at the 10th Workshop on Horn Clauses for Verification and Synthesis held in Paris, France, on April 23, 2023. This edition featured seven solvers (six competing and one hors concours) and six tracks, each of which dealing with a class o… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

    Comments: In Proceedings LSFA/HCVS 2023, arXiv:2404.13672

    Journal ref: EPTCS 402, 2024, pp. 83-104

  5. arXiv:2402.05620  [pdf, ps, other

    cs.IT

    Optimized Denial-of-Service Threats on the Scalability of LT Coded Blockchains

    Authors: Harikrishnan K., J. Harshan, Anwitaman Datta

    Abstract: Coded blockchains have acquired prominence in the recent past as a promising approach to slash the storage costs as well as to facilitate scalability. Within this class, Luby Transform (LT) coded blockchains are an appealing choice for scalability in heterogeneous networks owing to the availability of a wide range of low-complexity LT decoders. While these architectures have been studied from the… ▽ More

    Submitted 8 February, 2024; originally announced February 2024.

    Comments: To be presented in IEEE International Conference on Communications 2024

  6. arXiv:2306.17765  [pdf, ps, other

    cs.LO cs.FL

    Speculative SAT Modulo SAT

    Authors: Hari Govind V K, Isabel Garcia-Contreras, Sharon Shoham, Arie Gurfinkel

    Abstract: State-of-the-art model-checking algorithms like IC3/PDR are based on uni-directional modular SAT solving for finding and/or blocking counterexamples. Modular SAT solvers divide a SAT-query into multiple sub-queries, each solved by a separate SAT solver (called a module), and propagate information (lemmas, proof obligations, blocked clauses, etc.) between modules. While modular solving is key to IC… ▽ More

    Submitted 30 June, 2023; originally announced June 2023.

  7. arXiv:2306.10009  [pdf, ps, other

    cs.LO

    Fast Approximations of Quantifier Elimination

    Authors: Isabel Garcia-Contreras, Hari Govind V K, Sharon Shoham, Arie Gurfinkel

    Abstract: Quantifier elimination (qelim) is used in many automated reasoning tasks including program synthesis, exist-forall solving, quantified SMT, Model Checking, and solving Constrained Horn Clauses (CHCs). Exact qelim is computationally expensive. Hence, it is often approximated. For example, Z3 uses "light" pre-processing to reduce the number of quantified variables. CHC-solver Spacer uses model-based… ▽ More

    Submitted 16 June, 2023; originally announced June 2023.

    Comments: Published at CAV 2023

  8. CHC-COMP 2022: Competition Report

    Authors: Emanuele De Angelis, Hari Govind V K

    Abstract: CHC-COMP 2022 is the fifth edition of the competition of solvers for Constrained Horn Clauses. The competition was run in March 2022; the results were presented at the 9th Workshop on Horn Clauses for Verification and Synthesis held in Munich, Germany, on April 3, 2022. This edition featured six solvers, and eight tracks consisting of sets of linear and nonlinear clauses with constraints over line… ▽ More

    Submitted 22 November, 2022; originally announced November 2022.

    Comments: In Proceedings HCVS/VPT 2022, arXiv:2211.10675. arXiv admin note: text overlap with arXiv:2109.04635, arXiv:2008.02939 by other authors

    ACM Class: F.3.1

    Journal ref: EPTCS 373, 2022, pp. 44-62

  9. arXiv:2204.03350  [pdf

    cs.CV

    Implementing a Real-Time, YOLOv5 based Social Distancing Measuring System for Covid-19

    Authors: Narayana Darapaneni, Shrawan Kumar, Selvarangan Krishnan, Hemalatha K, Arunkumar Rajagopal, Nagendra, Anwesh Reddy Paduri

    Abstract: The purpose of this work is, to provide a YOLOv5 deep learning-based social distance monitoring framework using an overhead view perspective. In addition, we have developed a custom defined model YOLOv5 modified CSP (Cross Stage Partial Network) and assessed the performance on COCO and Visdrone dataset with and without transfer learning. Our findings show that the developed model successfully iden… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

  10. arXiv:2201.09050  [pdf, other

    cs.DC

    Scheduling Policies for Stability and Optimal Server Running Cost in Cloud Computing Platforms

    Authors: Haritha K, Chandramani Singh

    Abstract: We propose throughput and cost optimal job scheduling algorithms in cloud computing platforms offering Infrastructure as a Service. We first consider online migration and propose job scheduling algorithms to minimize job migration and server running costs. We consider algorithms that assume knowledge of job-size on arrival of jobs. We characterize the optimal cost subject to system stability. We d… ▽ More

    Submitted 5 June, 2022; v1 submitted 22 January, 2022; originally announced January 2022.

  11. arXiv:2107.12902  [pdf, ps, other

    cs.LO cs.FL

    Logical Characterization of Coherent Uninterpreted Programs

    Authors: Hari Govind V K, Sharon Shoham, Arie Gurfinkel

    Abstract: An uninterpreted program (UP) is a program whose semantics is defined over the theory of uninterpreted functions. This is a common abstraction used in equivalence checking, compiler optimization, and program verification. While simple, the model is sufficiently powerful to encode counter automata, and, hence, undecidable. Recently, a class of UP programs, called coherent, has been proposed and sho… ▽ More

    Submitted 25 July, 2021; originally announced July 2021.

    Comments: Accepted at FMCAD 2021

  12. arXiv:2005.13301  [pdf, other

    cs.LO cs.FL

    Global Guidance for Local Generalization in Model Checking

    Authors: Hari Govind V K, YuTing Chen, Sharon Shoham, Arie Gurfinkel

    Abstract: SMT-based model checkers, especially IC3-style ones, are currently the most effective techniques for verification of infinite state systems. They infer global inductive invariants via local reasoning about a single step of the transition relation of a system, while employing SMT-based procedures, such as interpolation, to mitigate the limitations of local reasoning and allow for better generalizat… ▽ More

    Submitted 27 May, 2020; originally announced May 2020.

    Comments: Published in CAV 2020

  13. arXiv:2004.04425  [pdf, other

    cs.SE

    Formal Modelling and Verification of Software Defined Network

    Authors: Jnanamurthy H K, Vijay Varadharajan

    Abstract: In cloud computing, software-defined network (SDN) gaining more attention due to its advantages in network configuration to improve network performance and network monitoring. SDN addresses an issue of static architecture in traditional networks by allowing centralised control of a network system. SDN contains centralised network intelligence module which separates a process of forwarding packets… ▽ More

    Submitted 9 April, 2020; originally announced April 2020.

  14. arXiv:1908.03830  [pdf, ps, other

    cs.LG cs.DB stat.ML

    Supervised Negative Binomial Classifier for Probabilistic Record Linkage

    Authors: Harish Kashyap K, Kiran Byadarhaly, Saumya Shah

    Abstract: Motivated by the need of the linking records across various databases, we propose a novel graphical model based classifier that uses a mixture of Poisson distributions with latent variables. The idea is to derive insight into each pair of hypothesis records that match by inferring its underlying latent rate of error using Bayesian Modeling techniques. The novel approach of using gamma priors for l… ▽ More

    Submitted 10 August, 2019; originally announced August 2019.

    Report number: 03a

  15. arXiv:1906.01583  [pdf, other

    cs.LO

    Interpolating Strong Induction

    Authors: Hari Govind V K, Yakir Vizel, Vijay Ganesh, Arie Gurfinkel

    Abstract: The principle of strong induction, also known as k-induction is one of the first techniques for unbounded SAT-based Model Checking (SMC). While elegant and simple to apply, properties as such are rarely k-inductive and when they can be strengthened, there is no effective strategy to guess the depth of induction. It has been mostly displaced by techniques that compute inductive strengthenings based… ▽ More

    Submitted 4 June, 2019; originally announced June 2019.

    Comments: Accepted to CAV 19

  16. arXiv:1806.09025  [pdf, other

    cs.CV

    Considerations for a PAP Smear Image Analysis System with CNN Features

    Authors: Srishti Gautam, Harinarayan K. K., Nirmal Jith, Anil K. Sao, Arnav Bhavsar, Adarsh Natarajan

    Abstract: It has been shown that for automated PAP-smear image classification, nucleus features can be very informative. Therefore, the primary step for automated screening can be cell-nuclei detection followed by segmentation of nuclei in the resulting single cell PAP-smear images. We propose a patch based approach using CNN for segmentation of nuclei in single cell images. We then pose the question of ion… ▽ More

    Submitted 23 June, 2018; originally announced June 2018.

  17. arXiv:1406.4803  [pdf

    cs.HC cs.IR

    Reorganization of Links to Improve User Navigation

    Authors: Deepshree A. Vadeyar, Yogish H. K

    Abstract: Website can be easily design but to efficient user navigation is not a easy task since user behavior is keep changing and developer view is quite different from what user wants, so to improve navigation one way is reorganization of website structure. For reorganization here proposed strategy is farthest first traversal clustering algorithm perform clustering on two numeric parameters and for findi… ▽ More

    Submitted 18 June, 2014; originally announced June 2014.

  18. arXiv:1302.1638  [pdf

    cs.DB

    Discovery of Maximal Frequent Item Sets using Subset Creation

    Authors: Jnanamurthy H. K.

    Abstract: Data mining is the practice to search large amount of data to discover data patterns. Data mining uses mathematical algorithms to group the data and evaluate the future events. Association rule is a research area in the field of knowledge discovery. Many data mining researchers had improved upon the quality of association rule for business development by incorporating influential factors like util… ▽ More

    Submitted 6 February, 2013; originally announced February 2013.

  19. arXiv:1210.8229  [pdf

    cs.DB

    Top Down Approach to find Maximal Frequent Item Sets using Subset Creation

    Authors: Jnanamurthy H. K., Vishesh H. V., Vishruth Jain, Preetham Kumar, Radhika M. Pai

    Abstract: Association rule has been an area of active research in the field of knowledge discovery. Data mining researchers had improved upon the quality of association rule mining for business development by incorporating influential factors like value (utility), quantity of items sold (weight) and more for the mining of association patterns. In this paper, we propose an efficient approach to find maximal… ▽ More

    Submitted 31 October, 2012; originally announced October 2012.

  20. Peer-to-Peer Live Streaming and Video On Demand Design Issues and its Challenges

    Authors: Hareesh. K, Manjaiah D. H

    Abstract: Peer-to-Peer Live streaming and Video on Demand is the most popular media applications over the Internet in recent years. These systems reduce the load on the server and provide a scalable content distribution. A new paradigm of P2P network collaborates to build large distributed video applications on existing networks .But, the problem of designing the system are at par with the P2P media streami… ▽ More

    Submitted 29 November, 2011; originally announced November 2011.

    Comments: International Journal of Peer to Peer Networks (IJP2P), Vol.2, No.4, October 2011