Zum Hauptinhalt springen

Showing 1–29 of 29 results for author: Manjunath, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.07898  [pdf, ps, other

    cs.NI

    Content Provider Contributions to Capacity Expansion of a Neutral ISP: Effect of Private Option

    Authors: Pranay Agarwal, D. Manjunath

    Abstract: Increasing content consumption by users and the expectation of a better Internet experience requires Internet service providers (ISPs) to expand the capacity of the access network continually. The ISPs have been demanding the participation of the content providers (CPs) in sharing the cost of upgrading the infrastructure. From CPs' perspective, investing in the ISP infrastructure, termed as \emph{… ▽ More

    Submitted 29 August, 2024; v1 submitted 12 June, 2024; originally announced June 2024.

    ACM Class: C.2

  2. arXiv:2403.00036  [pdf, other

    cs.LG cs.AI cs.IR eess.SY

    Influencing Bandits: Arm Selection for Preference Shaping

    Authors: Viraj Nadkarni, D. Manjunath, Sharayu Moharir

    Abstract: We consider a non stationary multi-armed bandit in which the population preferences are positively and negatively reinforced by the observed rewards. The objective of the algorithm is to shape the population preferences to maximize the fraction of the population favouring a predetermined arm. For the case of binary opinions, two types of opinion dynamics are considered -- decreasing elasticity (mo… ▽ More

    Submitted 29 February, 2024; originally announced March 2024.

    Comments: 14 pages, 8 figures, 24 references, proofs in appendix

    ACM Class: I.2.6

  3. arXiv:2309.10150  [pdf, other

    cs.RO cs.AI cs.LG

    Q-Transformer: Scalable Offline Reinforcement Learning via Autoregressive Q-Functions

    Authors: Yevgen Chebotar, Quan Vuong, Alex Irpan, Karol Hausman, Fei Xia, Yao Lu, Aviral Kumar, Tianhe Yu, Alexander Herzog, Karl Pertsch, Keerthana Gopalakrishnan, Julian Ibarz, Ofir Nachum, Sumedh Sontakke, Grecia Salazar, Huong T Tran, Jodilyn Peralta, Clayton Tan, Deeksha Manjunath, Jaspiar Singht, Brianna Zitkovich, Tomas Jackson, Kanishka Rao, Chelsea Finn, Sergey Levine

    Abstract: In this work, we present a scalable reinforcement learning method for training multi-task policies from large offline datasets that can leverage both human demonstrations and autonomously collected data. Our method uses a Transformer to provide a scalable representation for Q-functions trained via offline temporal difference backups. We therefore refer to the method as Q-Transformer. By discretizi… ▽ More

    Submitted 17 October, 2023; v1 submitted 18 September, 2023; originally announced September 2023.

    Comments: See website at https://qtransformer.github.io

  4. arXiv:2212.06817  [pdf, other

    cs.RO cs.AI cs.CL cs.CV cs.LG

    RT-1: Robotics Transformer for Real-World Control at Scale

    Authors: Anthony Brohan, Noah Brown, Justice Carbajal, Yevgen Chebotar, Joseph Dabis, Chelsea Finn, Keerthana Gopalakrishnan, Karol Hausman, Alex Herzog, Jasmine Hsu, Julian Ibarz, Brian Ichter, Alex Irpan, Tomas Jackson, Sally Jesmonth, Nikhil J Joshi, Ryan Julian, Dmitry Kalashnikov, Yuheng Kuang, Isabel Leal, Kuang-Huei Lee, Sergey Levine, Yao Lu, Utsav Malla, Deeksha Manjunath , et al. (26 additional authors not shown)

    Abstract: By transferring knowledge from large, diverse, task-agnostic datasets, modern machine learning models can solve specific downstream tasks either zero-shot or with small task-specific datasets to a high level of performance. While this capability has been demonstrated in other fields such as computer vision, natural language processing or speech recognition, it remains to be shown in robotics, wher… ▽ More

    Submitted 11 August, 2023; v1 submitted 13 December, 2022; originally announced December 2022.

    Comments: See website at robotics-transformer1.github.io

  5. arXiv:2203.09325  [pdf, ps, other

    cs.CR cs.NI

    Application of Data Collected by Endpoint Detection and Response Systems for Implementation of a Network Security System based on Zero Trust Principles and the EigenTrust Algorithm

    Authors: Nitesh Kumar, Gaurav S. Kasbekar, D. Manjunath

    Abstract: Traditionally, security systems for enterprises have implicit access based on strong cryptography, authentication and key sharing, wherein access control is based on Role Based Access Control (RBAC), in which roles such as manager, accountant and so on provide a way of deciding a subject's authority. However, years of post-attack analysis on enterprise networks has shown that a majority of times,… ▽ More

    Submitted 17 March, 2022; originally announced March 2022.

    Comments: 3 pages

  6. arXiv:2007.13797  [pdf, ps, other

    cs.NI

    Index Coding at the WiFi Edge: An Implementation Study for Video Delivery

    Authors: Lalhruaizela Chhangte, Emanuele Viterbo, D Manjunath, Nikhil Karamchandani

    Abstract: HTTP based video streaming has become the de facto standard for video content delivery across different video streaming services. However, video content delivery continues to be challenged at the wireless edge by inadequate and highly variable bandwidth. In this paper, we describe WiCode, a platform that improves HTTP based video content delivery at the WiFi edge. WiCode uses coded delivery at the… ▽ More

    Submitted 27 July, 2020; originally announced July 2020.

    Comments: International Conference on Signal Processing and Communications (SPCOM 2020)

  7. arXiv:2001.07334  [pdf, ps, other

    cs.NI

    Online Caching and Coding at the WiFi Edge: Gains and Tradeoffs

    Authors: Lalhruaizela Chhangte, Emanuele Viterbo, D Manjunath, Nikhil Karamchandani

    Abstract: Video content delivery at the wireless edge continues to be challenged by insufficient bandwidth and highly dynamic user behavior which affects both effective throughput and latency. Caching at the network edge and coded transmissions have been found to improve user performance of video content delivery. The cache at the wireless edge stations (BSs, APs) and at the users' end devices can be popula… ▽ More

    Submitted 20 January, 2020; originally announced January 2020.

  8. arXiv:1912.06343  [pdf, other

    cs.SI eess.SY

    Maintaining Ferment: On Opinion Control Over Social Networks

    Authors: Mohak Goyal, Nikhil Karamchandani, Debasish Chatterjee, D. Manjunath

    Abstract: We consider the design of external inputs to achieve a control objective on the opinions, represented by scalars, in a social network. The opinion dynamics follow a variant of the discrete-time Friedkin-Johnsen model. We first consider two minimum cost optimal control problems over a finite interval $(T_0,T),$ $T_0 >0$ -- (1) TF where opinions at all nodes should exceed a given $τ,$ and (2) GF whe… ▽ More

    Submitted 28 January, 2021; v1 submitted 13 December, 2019; originally announced December 2019.

    Comments: Part of this work is included in the proceedings of CDC 2019

  9. arXiv:1906.03587  [pdf, other

    cs.NI

    Partial Server Pooling in Redundancy Systems

    Authors: Akshay Mete, D. Manjunath, Jayakrishnan Nair, Balakrishna Prabhu

    Abstract: Partial sharing allows providers to possibly pool a fraction of their resources when full pooling is not beneficial to them. Recent work in systems without sharing has shown that redundancy can improve performance considerably. In this paper, we combine partial sharing and redundancy by developing partial sharing models for providers operating multi-server systems with redundancy. Two M/M/N queues… ▽ More

    Submitted 9 June, 2019; originally announced June 2019.

  10. arXiv:1906.00581  [pdf, ps, other

    cs.NI

    Sponsored data with ISP competition

    Authors: Pooja Vyavahare, D. Manjunath, Jayakrishnan Nair

    Abstract: We analyze the effect of sponsored data platforms when Internet service providers (ISPs) compete for subscribers and content providers (CPs) compete for a share of the bandwidth usage by the customers. Our analytical model is of a full information, leader-follower game. ISPs lead and set prices for sponsorship. CPs then make the binary decision of sponsoring or not sponsoring their content on the… ▽ More

    Submitted 3 June, 2019; originally announced June 2019.

  11. Sharing within limits: Partial resource pooling in loss systems

    Authors: Anvitha Nandigam, Suraj Jog, D. Manjunath, Jayakrishnan Nair, B. J. Prabhu

    Abstract: Fragmentation of expensive resources, e.g., spectrum for wireless services, between providers can introduce inefficiencies in resource utilisation and worsen overall system performance. In such cases, resource pooling between independent service providers can be used to improve performance. However, for providers to agree to pool their resources, the arrangement has to be mutually beneficial. The… ▽ More

    Submitted 19 August, 2018; originally announced August 2018.

  12. arXiv:1803.08651  [pdf, ps, other

    cs.IR cs.LG stat.ML

    Learning Recommendations While Influencing Interests

    Authors: Rahul Meshram, D. Manjunath, Nikhil Karamchandani

    Abstract: Personalized recommendation systems (RS) are extensively used in many services. Many of these are based on learning algorithms where the RS uses the recommendation history and the user response to learn an optimal strategy. Further, these algorithms are based on the assumption that the user interests are rigid. Specifically, they do not account for the effect of learning strategy on the evolution… ▽ More

    Submitted 23 March, 2018; originally announced March 2018.

    Comments: 13 pages, submitted to conference

  13. arXiv:1704.05986  [pdf, ps, other

    cs.GT

    Strategic Arrivals to Queues Offering Priority Service

    Authors: Rajat Talak, D. Manjunath, Alexandre Proutiere

    Abstract: We consider strategic arrivals to a FCFS service system that starts service at a fixed time and has to serve a fixed number of customers, e.g., an airplane boarding system. Arriving early induces a higher waiting cost (waiting before service begins) while arriving late induces a cost because earlier arrivals take the better seats. We first consider arrivals of heterogeneous customers that choose a… ▽ More

    Submitted 11 August, 2018; v1 submitted 19 April, 2017; originally announced April 2017.

  14. arXiv:1611.05014  [pdf, ps, other

    cs.GT

    On Threshold Routing in a Service System with Highest-Bidder-First and FIFO Services

    Authors: Tejas Bodas, D. Manjunath

    Abstract: In this paper, we consider a two server system serving heterogeneous customers. One of the server has a FIFO scheduling policy and charges a fixed admission price to each customer. The second queue follows the highest-bidder-first (HBF) policy where an arriving customer bids for its position in the queue. Customers make an individually optimal choice of the server and for such system, we character… ▽ More

    Submitted 15 November, 2016; originally announced November 2016.

  15. arXiv:1605.07107  [pdf, ps, other

    cs.GT

    Revenue Maximization in Service Systems with Heterogeneous Customers

    Authors: Tejas Bodas, D. Manjunath

    Abstract: In this paper, we consider revenue maximization problem for a two server system in the presence of heterogeneous customers. We assume that the customers differ in their cost for unit delay and this is modeled as a continuous random variable with a distribution $F.$ We also assume that each server charges an admission price to each customer that decide to join its queue. We first consider the monop… ▽ More

    Submitted 23 May, 2016; originally announced May 2016.

  16. arXiv:1603.09233  [pdf, ps, other

    cs.LG

    Optimal Recommendation to Users that React: Online Learning for a Class of POMDPs

    Authors: Rahul Meshram, Aditya Gopalan, D. Manjunath

    Abstract: We describe and study a model for an Automated Online Recommendation System (AORS) in which a user's preferences can be time-dependent and can also depend on the history of past recommendations and play-outs. The three key features of the model that makes it more realistic compared to existing models for recommendation systems are (1) user preference is inherently latent, (2) current recommendatio… ▽ More

    Submitted 30 March, 2016; originally announced March 2016.

    Comments: 8 pages, submitted to conference

  17. arXiv:1507.04234  [pdf, ps, other

    cs.DC

    On the Maximum Rate of Networked Computation in a Capacitated Network

    Authors: Pooja Vyavahare, Nutan Limaye Ajit A. Diwan, D. Manjunath

    Abstract: Given a capacitated communication network $\mathcal{N}$ and a function f that needs to be computed on $\mathcal{N},$ we study the problem of generating a computation and communication schedule in $\mathcal{N}$ to maximize the rate of computation of f. Shah et. al.[IEEE Journal of Selected Areas in Communication, 2013] studied this problem when the computation schema $\mathcal{G}$ for f is a tree.… ▽ More

    Submitted 21 January, 2016; v1 submitted 15 July, 2015; originally announced July 2015.

  18. arXiv:1502.02290  [pdf, ps, other

    cs.DC cs.CC

    How Hard is Computing Parity with Noisy Communications?

    Authors: Chinmoy Dutta, Yashodhan Kanoria, D. Manjunath, Jaikumar Radhakrishnan

    Abstract: We show a tight lower bound of $Ω(N \log\log N)$ on the number of transmissions required to compute the parity of $N$ input bits with constant error in a noisy communication network of $N$ randomly placed sensors, each having one input bit and communicating with others using local transmissions with power near the connectivity threshold. This result settles the lower bound question left open by Yi… ▽ More

    Submitted 8 February, 2015; originally announced February 2015.

    Comments: 17 pages

    ACM Class: C.2.1; C.2.2; C.2.4; D.4.4; F.1.1; F.2.2; G.2.2

  19. arXiv:1409.7195  [pdf, ps, other

    cs.GT cs.PF

    Pigouvian Tolls and Welfare Optimality with Parallel Servers and Heterogeneous Customers

    Authors: Tejas Bodas, A. Ganesh, D. Manjunath

    Abstract: Congestion externalities are a well-known phenomenon in transportation and communication networks, healthcare etc. Optimization by self-interested agents in such settings typically results in equilibria which are sub-optimal for social welfare. Pigouvian taxes or tolls, which impose a user charge equal to the negative externality caused by the marginal user to other users, are a mechanism for comb… ▽ More

    Submitted 7 July, 2021; v1 submitted 25 September, 2014; originally announced September 2014.

  20. arXiv:1401.2518  [pdf, other

    cs.DC cs.DS

    Optimal Embedding of Functions for In-Network Computation: Complexity Analysis and Algorithms

    Authors: Pooja Vyavahare, Nutan Limaye, D. Manjunath

    Abstract: We consider optimal distributed computation of a given function of distributed data. The input (data) nodes and the sink node that receives the function form a connected network that is described by an undirected weighted network graph. The algorithm to compute the given function is described by a weighted directed acyclic graph and is called the computation graph. An embedding defines the computa… ▽ More

    Submitted 14 July, 2015; v1 submitted 11 January, 2014; originally announced January 2014.

  21. arXiv:1301.6422  [pdf, ps, other

    cs.IT math.CO math.PR

    On Connectivity Thresholds in the Intersection of Random Key Graphs on Random Geometric Graphs

    Authors: B. Santhana Krishnan, Ayalvadi Ganesh, D. Manjunath

    Abstract: In a random key graph (RKG) of $n$ nodes each node is randomly assigned a key ring of $K_n$ cryptographic keys from a pool of $P_n$ keys. Two nodes can communicate directly if they have at least one common key in their key rings. We assume that the $n$ nodes are distributed uniformly in $[0,1]^2.$ In addition to the common key requirement, we require two nodes to also be within $r_n$ of each other… ▽ More

    Submitted 1 May, 2013; v1 submitted 27 January, 2013; originally announced January 2013.

    Comments: Accepted for Publication at ISIT 2013. 5 Pages (main text) + 6 pages (appendix)

    ACM Class: G.2.2; G.2.3; F.2.2

  22. arXiv:1211.4441  [pdf, other

    cs.IT

    On the Separability of Targets Using Binary Proximity Sensors

    Authors: B. Santhana Krishnan, Animesh Kumar, D. Manjunath, Bikash K. Dey

    Abstract: We consider the problem where a network of sensors has to detect the presence of targets at any of $n$ possible locations in a finite region. All such locations may not be occupied by a target. The data from sensors is fused to determine the set of locations that have targets. We term this the separability problem. In this paper, we address the separability of an asymptotically large number of sta… ▽ More

    Submitted 19 November, 2012; originally announced November 2012.

    Comments: 17 pages, 3 figures, Submitted to IEEE TMC

  23. arXiv:1210.6134  [pdf, ps, other

    cs.NI cs.DC

    In-Network Estimation of Frequency Moments

    Authors: Pooja Vyavahare, Nutan Limaye, D. Manjunath

    Abstract: We consider the problem of estimating functions of distributed data using a distributed algorithm over a network. The extant literature on computing functions in distributed networks such as wired and wireless sensor networks and peer-to-peer networks deals with computing linear functions of the distributed data when the alphabet size of the data values is small, O(1). We describe a distributed ra… ▽ More

    Submitted 23 October, 2012; originally announced October 2012.

  24. arXiv:1009.6057  [pdf, ps, other

    cs.NI cs.DC cs.IT

    Network Flows for Functions

    Authors: Virag Shah, Bikash Kumar Dey, D. Manjunath

    Abstract: We consider in-network computation of an arbitrary function over an arbitrary communication network. A network with capacity constraints on the links is given. Some nodes in the network generate data, e.g., like sensor nodes in a sensor network. An arbitrary function of this distributed data is to be obtained at a terminal node. The structure of the function is described by a given computation sch… ▽ More

    Submitted 30 September, 2010; originally announced September 2010.

    Comments: 16 pages, 4 figures

  25. arXiv:1002.4314  [pdf, ps, other

    cs.NI

    Load Balancing via Random Local Search in Closed and Open systems

    Authors: A. Ganesh, S. Lilienthal, D. Manjunath, A. Proutiere, F. Simatos

    Abstract: In this paper, we analyze the performance of random load resampling and migration strategies in parallel server systems. Clients initially attach to an arbitrary server, but may switch server independently at random instants of time in an attempt to improve their service rate. This approach to load balancing contrasts with traditional approaches where clients make smart server selections upon arri… ▽ More

    Submitted 9 April, 2010; v1 submitted 23 February, 2010; originally announced February 2010.

    Comments: Accepted to Sigmetrics 2010

  26. arXiv:0911.3528  [pdf, ps, other

    cs.NI

    Estimating Network Link Characteristics using Packet-Pair Dispersion: A Discrete Time Queueing Theoretic View

    Authors: Bikash Kumar Dey, D. Manjunath, Supriyo Chakraborty

    Abstract: Packet-dispersion based measurement tools insert pairs of probe packets with a known separation into the network for transmission over a unicast path or a multicast tree. Samples of the separation between the probe pairs at the destination(s) are observed. Heuristic techniques are then used by these tools to estimate the path characteristics from the observations. In this paper we present a queu… ▽ More

    Submitted 18 November, 2009; originally announced November 2009.

    Comments: 32 pages, 12 figures, 1 table

  27. arXiv:0805.0337  [pdf, other

    cs.IT

    On Distributed Function Computation in Structure-Free Random Networks

    Authors: Sudeep Kamath, D. Manjunath

    Abstract: We consider in-network computation of MAX in a structure-free random multihop wireless network. Nodes do not know their relative or absolute locations and use the Aloha MAC protocol. For one-shot computation, we describe a protocol in which the MAX value becomes available at the origin in $O(\sqrt{n/\log n})$ slots with high probability. This is within a constant factor of that required by the b… ▽ More

    Submitted 5 May, 2008; originally announced May 2008.

    Comments: 13 pages, 1 figure. Accepted at IEEE International Symposium on Information Theory 2008

  28. On Distributed Computation in Noisy Random Planar Networks

    Authors: Y. Kanoria, D. Manjunath

    Abstract: We consider distributed computation of functions of distributed data in random planar networks with noisy wireless links. We present a new algorithm for computation of the maximum value which is order optimal in the number of transmissions and computation time.We also adapt the histogram computation algorithm of Ying et al to make the histogram computation time optimal.

    Submitted 25 December, 2007; originally announced December 2007.

    Comments: 5 pages, 2 figures

    Journal ref: Proceedings of IEEE International Symposium on Information Theory, 2007

  29. arXiv:cs/0611087  [pdf, ps, other

    cs.PF

    A Combined LIFO-Priority Scheme for Overload Control of E-commerce Web Servers

    Authors: Naresh Singhmar, Vipul Mathur, Varsha Apte, D. Manjunath

    Abstract: E-commerce Web-servers often face overload conditions during which revenue-generating requests may be dropped or abandoned due to an increase in the browsing requests. In this paper we present a simple, yet effective, mechanism for overload control of E-commerce Web-servers. We develop an E-commerce workload model that separates the browsing requests from revenue-generating transaction requests.… ▽ More

    Submitted 17 November, 2006; originally announced November 2006.

    Comments: 10 pages, 8 figures, presented at the International Infrastructure Survivability Workshop (affiliated with the 25th IEEE International Real-Time Systems Symposium), Lisbon, Portugal, December 2004