Zum Hauptinhalt springen

Showing 1–36 of 36 results for author: Sen, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.03342  [pdf, other

    q-bio.QM cs.LG

    Graph Residual based Method for Molecular Property Prediction

    Authors: Kanad Sen, Saksham Gupta, Abhishek Raj, Alankar Alankar

    Abstract: Property prediction of materials has recently been of high interest in the recent years in the field of material science. Various Physics-based and Machine Learning models have already been developed, that can give good results. However, they are not accurate enough and are inadequate for critical applications. The traditional machine learning models try to predict properties based on the features… ▽ More

    Submitted 27 July, 2024; originally announced August 2024.

    Comments: 30 pages, 12 figures, 6 tables

  2. arXiv:2403.07974  [pdf, other

    cs.SE cs.CL cs.LG

    LiveCodeBench: Holistic and Contamination Free Evaluation of Large Language Models for Code

    Authors: Naman Jain, King Han, Alex Gu, Wen-Ding Li, Fanjia Yan, Tianjun Zhang, Sida Wang, Armando Solar-Lezama, Koushik Sen, Ion Stoica

    Abstract: Large Language Models (LLMs) applied to code-related applications have emerged as a prominent field, attracting significant interest from both academia and industry. However, as new and improved LLMs are developed, existing evaluation benchmarks (e.g., HumanEval, MBPP) are no longer sufficient for assessing their capabilities. In this work, we propose LiveCodeBench, a comprehensive and contaminati… ▽ More

    Submitted 6 June, 2024; v1 submitted 12 March, 2024; originally announced March 2024.

    Comments: Website - https://livecodebench.github.io/

  3. arXiv:2402.19475  [pdf, other

    cs.SE cs.AI cs.LG

    The Counterfeit Conundrum: Can Code Language Models Grasp the Nuances of Their Incorrect Generations?

    Authors: Alex Gu, Wen-Ding Li, Naman Jain, Theo X. Olausson, Celine Lee, Koushik Sen, Armando Solar-Lezama

    Abstract: While language models are increasingly more proficient at code generation, they still frequently generate incorrect programs. Many of these programs are obviously wrong, but others are more subtle and pass weaker correctness checks such as being able to compile. In this work, we focus on these counterfeit samples: programs sampled from a language model that 1) have a high enough log-probability to… ▽ More

    Submitted 29 February, 2024; originally announced February 2024.

    Comments: 54 pages, 25 figures

  4. arXiv:2401.11108  [pdf, other

    cs.CR cs.SE

    LLM4Fuzz: Guided Fuzzing of Smart Contracts with Large Language Models

    Authors: Chaofan Shou, Jing Liu, Doudou Lu, Koushik Sen

    Abstract: As blockchain platforms grow exponentially, millions of lines of smart contract code are being deployed to manage extensive digital assets. However, vulnerabilities in this mission-critical code have led to significant exploitations and asset losses. Thorough automated security analysis of smart contracts is thus imperative. This paper introduces LLM4Fuzz to optimize automated smart contract secur… ▽ More

    Submitted 19 January, 2024; originally announced January 2024.

  5. arXiv:2312.15157  [pdf, other

    cs.SE cs.LG cs.PL

    CodeScholar: Growing Idiomatic Code Examples

    Authors: Manish Shetty, Koushik Sen, Ion Stoica

    Abstract: Programmers often search for usage examples for API methods. A tool that could generate realistic, idiomatic, and contextual usage examples for one or more APIs would be immensely beneficial to developers. Such a tool would relieve the need for a deep understanding of the API landscape, augment existing documentation, and help discover interactions among APIs. We present CodeScholar, a tool that g… ▽ More

    Submitted 22 December, 2023; originally announced December 2023.

  6. arXiv:2312.13382  [pdf, ps, other

    cs.CL cs.AI cs.PL

    DSPy Assertions: Computational Constraints for Self-Refining Language Model Pipelines

    Authors: Arnav Singhvi, Manish Shetty, Shangyin Tan, Christopher Potts, Koushik Sen, Matei Zaharia, Omar Khattab

    Abstract: Chaining language model (LM) calls as composable modules is fueling a new way of programming, but ensuring LMs adhere to important constraints requires heuristic "prompt engineering". We introduce LM Assertions, a programming construct for expressing computational constraints that LMs should satisfy. We integrate our constructs into the recent DSPy programming model for LMs, and present new strate… ▽ More

    Submitted 2 February, 2024; v1 submitted 20 December, 2023; originally announced December 2023.

    Comments: Arnav*, Manish*, Shangyin* contributed equally to this work

  7. arXiv:2311.14904  [pdf, other

    cs.LG cs.SE

    LLM-Assisted Code Cleaning For Training Accurate Code Generators

    Authors: Naman Jain, Tianjun Zhang, Wei-Lin Chiang, Joseph E. Gonzalez, Koushik Sen, Ion Stoica

    Abstract: Natural language to code generation is an important application area of LLMs and has received wide attention from the community. The majority of relevant studies have exclusively concentrated on increasing the quantity and functional correctness of training sets while disregarding other stylistic elements of programs. More recently, data quality has garnered a lot of interest and multiple works ha… ▽ More

    Submitted 24 November, 2023; originally announced November 2023.

  8. Quantum-walk search in motion

    Authors: Himanshu Sahu, Kallol Sen

    Abstract: In quantum computing, the quantum walk search algorithm is designed for locating fixed marked nodes within a graph. However, when multiple marked nodes exist, the conventional search algorithm lacks the capacity to simultaneously amplify the marked nodes as well as identify the correct chronological ordering between the marked nodes, if any. To address this limitation, we explore a potential exten… ▽ More

    Submitted 3 February, 2024; v1 submitted 22 October, 2023; originally announced October 2023.

    Comments: Finalized version : Accepted in Scientific Reports

    Journal ref: Scientific Reports 14, 2815 (2024)

  9. arXiv:2310.07898  [pdf, other

    cs.SE cs.DB

    FlorDB: Multiversion Hindsight Logging for Continuous Training

    Authors: Rolando Garcia, Anusha Dandamudi, Gabriel Matute, Lehan Wan, Joseph Gonzalez, Joseph M. Hellerstein, Koushik Sen

    Abstract: Production Machine Learning involves continuous training: hosting multiple versions of models over time, often with many model versions running at once. When model performance does not meet expectations, Machine Learning Engineers (MLEs) debug issues by exploring and analyzing numerous prior versions of code and training data to identify root causes and mitigate problems. Traditional debugging and… ▽ More

    Submitted 2 March, 2024; v1 submitted 11 October, 2023; originally announced October 2023.

  10. arXiv:2306.17135  [pdf, other

    cs.CR cs.SE

    ItyFuzz: Snapshot-Based Fuzzer for Smart Contract

    Authors: Chaofan Shou, Shangyin Tan, Koushik Sen

    Abstract: Smart contracts are critical financial instruments, and their security is of utmost importance. However, smart contract programs are difficult to fuzz due to the persistent blockchain state behind all transactions. Mutating sequences of transactions are complex and often lead to a suboptimal exploration for both input and program spaces. In this paper, we introduce a novel snapshot-based fuzzer It… ▽ More

    Submitted 29 June, 2023; originally announced June 2023.

    Comments: ISSTA 2023

  11. arXiv:2305.18513  [pdf, ps, other

    cs.CL

    SlimFit: Memory-Efficient Fine-Tuning of Transformer-based Models Using Training Dynamics

    Authors: Arash Ardakani, Altan Haan, Shangyin Tan, Doru Thom Popovici, Alvin Cheung, Costin Iancu, Koushik Sen

    Abstract: Transformer-based models, such as BERT and ViT, have achieved state-of-the-art results across different natural language processing (NLP) and computer vision (CV) tasks. However, these models are extremely memory intensive during their fine-tuning process, making them difficult to deploy on GPUs with limited memory resources. To address this issue, we introduce a new tool called SlimFit that reduc… ▽ More

    Submitted 29 May, 2023; originally announced May 2023.

  12. arXiv:2210.14473  [pdf, other

    cs.CL

    Benchmarking Language Models for Code Syntax Understanding

    Authors: Da Shen, Xinyun Chen, Chenguang Wang, Koushik Sen, Dawn Song

    Abstract: Pre-trained language models have demonstrated impressive performance in both natural language processing and program understanding, which represent the input as a token sequence without explicitly modeling its structure. Some prior works show that pre-trained language models can capture the syntactic rules of natural languages without finetuning on syntax understanding tasks. However, there is lim… ▽ More

    Submitted 26 October, 2022; originally announced October 2022.

    Comments: Findings of EMNLP 2022

  13. arXiv:2210.13715  [pdf, other

    cs.CL cs.AI

    PALT: Parameter-Lite Transfer of Language Models for Knowledge Graph Completion

    Authors: Jianhao Shen, Chenguang Wang, Ye Yuan, Jiawei Han, Heng Ji, Koushik Sen, Ming Zhang, Dawn Song

    Abstract: This paper presents a parameter-lite transfer learning approach of pretrained language models (LM) for knowledge graph (KG) completion. Instead of finetuning, which modifies all LM parameters, we only tune a few new parameters while keeping the original LM parameters fixed. We establish this via reformulating KG completion as a "fill-in-the-blank" task, and introducing a parameter-lite encoder on… ▽ More

    Submitted 24 October, 2022; originally announced October 2022.

    Comments: Findings of EMNLP 2022

  14. arXiv:2207.13129  [pdf, other

    cs.LG cs.CR cs.CV stat.ML

    LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity

    Authors: Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon, Koushik Sen

    Abstract: We propose transferability from Large Geometric Vicinity (LGV), a new technique to increase the transferability of black-box adversarial attacks. LGV starts from a pretrained surrogate model and collects multiple weight sets from a few additional training epochs with a constant and high learning rate. LGV exploits two geometric properties that we relate to transferability. First, models that belon… ▽ More

    Submitted 26 July, 2022; originally announced July 2022.

    Comments: Accepted at ECCV 2022

  15. arXiv:2205.07147  [pdf

    cs.DC

    The Sky Above The Clouds

    Authors: Sarah Chasins, Alvin Cheung, Natacha Crooks, Ali Ghodsi, Ken Goldberg, Joseph E. Gonzalez, Joseph M. Hellerstein, Michael I. Jordan, Anthony D. Joseph, Michael W. Mahoney, Aditya Parameswaran, David Patterson, Raluca Ada Popa, Koushik Sen, Scott Shenker, Dawn Song, Ion Stoica

    Abstract: Technology ecosystems often undergo significant transformations as they mature. For example, telephony, the Internet, and PCs all started with a single provider, but in the United States each is now served by a competitive market that uses comprehensive and universal technology standards to provide compatibility. This white paper presents our view on how the cloud ecosystem, barely over fifteen ye… ▽ More

    Submitted 14 May, 2022; originally announced May 2022.

    Comments: 35 pages

  16. arXiv:2108.13340  [pdf, other

    cs.SE cs.PL

    Learning Highly Recursive Input Grammars

    Authors: Neil Kulkarni, Caroline Lemieux, Koushik Sen

    Abstract: This paper presents Arvada, an algorithm for learning context-free grammars from a set of positive examples and a Boolean-valued oracle. Arvada learns a context-free grammar by building parse trees from the positive examples. Starting from initially flat trees, Arvada builds structure to these trees with a key operation: it bubbles sequences of sibling nodes in the trees into a new node, adding a… ▽ More

    Submitted 30 August, 2021; originally announced August 2021.

    Journal ref: In Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering (ASE 2021)

  17. arXiv:2103.14189  [pdf, other

    cs.DB cs.LG

    DBATES: DataBase of Audio features, Text, and visual Expressions in competitive debate Speeches

    Authors: Taylan K. Sen, Gazi Naven, Luke Gerstner, Daryl Bagley, Raiyan Abdul Baten, Wasifur Rahman, Kamrul Hasan, Kurtis G. Haut, Abdullah Mamun, Samiha Samrose, Anne Solbu, R. Eric Barnes, Mark G. Frank, Ehsan Hoque

    Abstract: In this work, we present a database of multimodal communication features extracted from debate speeches in the 2019 North American Universities Debate Championships (NAUDC). Feature sets were extracted from the visual (facial expression, gaze, and head pose), audio (PRAAT), and textual (word sentiment and linguistic category) modalities of raw video recordings of competitive collegiate debaters (N… ▽ More

    Submitted 25 March, 2021; originally announced March 2021.

    Comments: 12 pages, 5 figures, 4 tables, under-going major revision for TAC

  18. arXiv:2103.04388  [pdf, other

    cs.SE cs.PL

    Growing a Test Corpus with Bonsai Fuzzing

    Authors: Vasudev Vikram, Rohan Padhye, Koushik Sen

    Abstract: This paper presents a coverage-guided grammar-based fuzzing technique for automatically generating a corpus of concise test inputs for programs such as compilers. We walk-through a case study of a compiler designed for education and the corresponding problem of generating meaningful test cases to provide to students. The prior state-of-the-art solution is a combination of fuzzing and test-case red… ▽ More

    Submitted 7 March, 2021; originally announced March 2021.

    Comments: Accepted at the 43rd International Conference on Software Engineering (ICSE 2021)

  19. arXiv:2011.05074  [pdf, other

    cs.LG stat.ML

    Efficient and Transferable Adversarial Examples from Bayesian Neural Networks

    Authors: Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon, Koushik Sen

    Abstract: An established way to improve the transferability of black-box evasion attacks is to craft the adversarial examples on an ensemble-based surrogate to increase diversity. We argue that transferability is fundamentally related to uncertainty. Based on a state-of-the-art Bayesian Deep Learning technique, we propose a new method to efficiently build a surrogate by sampling approximately from the poste… ▽ More

    Submitted 18 June, 2022; v1 submitted 10 November, 2020; originally announced November 2020.

    Comments: Accepted at UAI 2022

  20. arXiv:2011.01407  [pdf, other

    cs.SE

    Exempla Gratis (E.G.): Code Examples for Free

    Authors: Celeste Barnaby, Koushik Sen, Tianyi Zhang, Elena Glassman, Satish Chandra

    Abstract: Modern software engineering often involves using many existing APIs, both open source and, in industrial coding environments, proprietary. Programmers reference documentation and code search tools to remind themselves of proper common usage patterns of APIs. However, high-quality API usage examples are computationally expensive to curate and maintain, and API usage examples retrieved from company-… ▽ More

    Submitted 2 November, 2020; originally announced November 2020.

  21. arXiv:2006.07357  [pdf, other

    cs.DC cs.DB cs.SE

    Hindsight Logging for Model Training

    Authors: Rolando Garcia, Eric Liu, Vikram Sreekanti, Bobby Yan, Anusha Dandamudi, Joseph E. Gonzalez, Joseph M. Hellerstein, Koushik Sen

    Abstract: In modern Machine Learning, model training is an iterative, experimental process that can consume enormous computation resources and developer time. To aid in that process, experienced model developers log and visualize program variables during training runs. Exhaustive logging of all variables is infeasible. Optimistic logging can be accompanied by program checkpoints; this allows developers to a… ▽ More

    Submitted 2 December, 2020; v1 submitted 12 June, 2020; originally announced June 2020.

  22. arXiv:2006.06762  [pdf, other

    cs.LG cs.NE cs.PF cs.PL stat.ML

    Ansor: Generating High-Performance Tensor Programs for Deep Learning

    Authors: Lianmin Zheng, Chengfan Jia, Minmin Sun, Zhao Wu, Cody Hao Yu, Ameer Haj-Ali, Yida Wang, Jun Yang, Danyang Zhuo, Koushik Sen, Joseph E. Gonzalez, Ion Stoica

    Abstract: High-performance tensor programs are crucial to guarantee efficient execution of deep neural networks. However, obtaining performant tensor programs for different operators on various hardware platforms is notoriously challenging. Currently, deep learning systems rely on vendor-provided kernel libraries or various search strategies to get performant tensor programs. These approaches either require… ▽ More

    Submitted 15 October, 2023; v1 submitted 11 June, 2020; originally announced June 2020.

    Comments: OSDI 2020

  23. arXiv:1912.02727  [pdf, other

    cs.ET quant-ph

    Heuristics for Quantum Compiling with a Continuous Gate Set

    Authors: Marc Grau Davis, Ethan Smith, Ana Tudor, Koushik Sen, Irfan Siddiqi, Costin Iancu

    Abstract: We present an algorithm for compiling arbitrary unitaries into a sequence of gates native to a quantum processor. As accurate CNOT gates are hard for the foreseeable Noisy- Intermediate-Scale Quantum devices era, our A* inspired algorithm attempts to minimize their count, while accounting for connectivity. We discuss the search strategy together with metrics to expand the solution frontier. For a… ▽ More

    Submitted 5 December, 2019; originally announced December 2019.

    Comments: Presented at the 3rd International Workshop on Quantum Compilation as part of the International Conference On Computer Aided Design 2019

  24. arXiv:1905.03813  [pdf, other

    cs.SE cs.CL cs.LG

    When Deep Learning Met Code Search

    Authors: Jose Cambronero, Hongyu Li, Seohyun Kim, Koushik Sen, Satish Chandra

    Abstract: There have been multiple recent proposals on using deep neural networks for code search using natural language. Common across these proposals is the idea of $\mathit{embedding}$ code and natural language queries, into real vectors and then using vector distance to approximate semantic correlation between code and the query. Multiple approaches exist for learning these embeddings, including… ▽ More

    Submitted 15 October, 2019; v1 submitted 9 May, 2019; originally announced May 2019.

  25. arXiv:1904.05651  [pdf

    cs.CV

    Software Based Higher Order Structural Foot Abnormality Detection Using Image Processing

    Authors: Arnesh Sen, Kaustav Sen, Jayoti Das

    Abstract: The entire movement of human body undergoes through a periodic process named Gait Cycle. The structure of human foot is the key element to complete the cycle successfully. Abnormality of this foot structure is an alarming form of congenital disorder which results a classification based on the geometry of the human foot print image. Image processing is one of the most efficient way to determine a n… ▽ More

    Submitted 11 April, 2019; originally announced April 2019.

  26. Ultrasonic Blind Stick for Completely Blind People to Avoid any Kind of Obstacles

    Authors: Arnesh Sen, Kaustav Sen, Jayoti Das

    Abstract: The ability to live without being controlled by any action, judgment and any outside factors including any opinions and regulations is defined by the term Independent. But in reality physical movement for travelling or simply walking through a crowded street pose great challenge for a visually impaired person. Also they must learn every detail about the home environment such as placement of tables… ▽ More

    Submitted 1 April, 2019; originally announced April 2019.

  27. Aroma: Code Recommendation via Structural Code Search

    Authors: Sifei Luan, Di Yang, Celeste Barnaby, Koushik Sen, Satish Chandra

    Abstract: Programmers often write code that has similarity to existing code written somewhere. A tool that could help programmers to search such similar code would be immensely useful. Such a tool could help programmers to extend partially written code snippets to completely implement necessary functionality, help to discover extensions to the partial code which are commonly included by other programmers, h… ▽ More

    Submitted 17 October, 2019; v1 submitted 3 December, 2018; originally announced December 2018.

    Journal ref: Proc. ACM Program. Lang. 3, OOPSLA, Article 152 (October 2019), 28 pages

  28. Semantic Fuzzing with Zest

    Authors: Rohan Padhye, Caroline Lemieux, Koushik Sen, Mike Papadakis, Yves Le Traon

    Abstract: Programs expecting structured inputs often consist of both a syntactic analysis stage, which parses raw input, and a semantic analysis stage, which conducts checks on the parsed input and executes the core logic of the program. Generator-based testing tools in the lineage of QuickCheck are a promising way to generate random syntactically valid test inputs for these programs. We present Zest, a tec… ▽ More

    Submitted 7 June, 2019; v1 submitted 30 November, 2018; originally announced December 2018.

    Comments: To appear in Proceedings of 28th ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA'19)

  29. arXiv:1809.05193  [pdf, other

    cs.SE cs.LG cs.PL stat.ML

    Context2Name: A Deep Learning-Based Approach to Infer Natural Variable Names from Usage Contexts

    Authors: Rohan Bavishi, Michael Pradel, Koushik Sen

    Abstract: Most of the JavaScript code deployed in the wild has been minified, a process in which identifier names are replaced with short, arbitrary and meaningless names. Minified code occupies less space, but also makes the code extremely difficult to manually inspect and understand. This paper presents Context2Name, a deep learningbased technique that partially reverses the effect of minification by pred… ▽ More

    Submitted 31 August, 2018; originally announced September 2018.

  30. arXiv:1805.11683  [pdf, other

    cs.SE cs.PL

    DeepBugs: A Learning Approach to Name-based Bug Detection

    Authors: Michael Pradel, Koushik Sen

    Abstract: Natural language elements in source code, e.g., the names of variables and functions, convey useful information. However, most existing bug detection tools ignore this information and therefore miss some classes of bugs. The few existing name-based bug detection approaches reason about names on a syntactic level and rely on manually designed and tuned algorithms to detect bugs. This paper presents… ▽ More

    Submitted 30 April, 2018; originally announced May 2018.

  31. arXiv:1803.07901  [pdf, other

    cs.SE

    Selecting Fault Revealing Mutants

    Authors: Thierry Titcheu Chekam, Mike Papadakis, Tegawendé Bissyandé, Yves Le Traon, Koushik Sen

    Abstract: Mutant selection refers to the problem of choosing, among a large number of mutants, the (few) ones that should be used by the testers. In view of this, we investigate the problem of selecting the fault revealing mutants, i.e., the mutants that are most likely to be killable and lead to test cases that uncover unknown program faults. We formulate two variants of this problem: the fault revealing m… ▽ More

    Submitted 4 November, 2018; v1 submitted 21 March, 2018; originally announced March 2018.

  32. FairFuzz: Targeting Rare Branches to Rapidly Increase Greybox Fuzz Testing Coverage

    Authors: Caroline Lemieux, Koushik Sen

    Abstract: In recent years, fuzz testing has proven itself to be one of the most effective techniques for finding correctness bugs and security vulnerabilities in practice. One particular fuzz testing tool, American Fuzzy Lop or AFL, has become popular thanks to its ease-of-use and bug-finding power. However, AFL remains limited in the depth of program coverage it achieves, in particular because it does not… ▽ More

    Submitted 20 September, 2017; originally announced September 2017.

  33. arXiv:1705.07478  [pdf, other

    cs.DC

    Report of the HPC Correctness Summit, Jan 25--26, 2017, Washington, DC

    Authors: Ganesh Gopalakrishnan, Paul D. Hovland, Costin Iancu, Sriram Krishnamoorthy, Ignacio Laguna, Richard A. Lethin, Koushik Sen, Stephen F. Siegel, Armando Solar-Lezama

    Abstract: Maintaining leadership in HPC requires the ability to support simulations at large scales and fidelity. In this study, we detail one of the most significant productivity challenges in achieving this goal, namely the increasing proclivity to bugs, especially in the face of growing hardware and software heterogeneity and sheer system scale. We identify key areas where timely new research must be pro… ▽ More

    Submitted 21 May, 2017; originally announced May 2017.

    Comments: 57 pages

  34. arXiv:1605.01362  [pdf, other

    cs.PL

    Trace Typing: An Approach for Evaluating Retrofitted Type Systems (Extended Version)

    Authors: Esben Andreasen, Colin S. Gordon, Satish Chandra, Manu Sridharan, Frank Tip, Koushik Sen

    Abstract: Recent years have seen growing interest in the retrofitting of type systems onto dynamically-typed programming languages, in order to improve type safety, programmer productivity, or performance. In such cases, type system developers must strike a delicate balance between disallowing certain coding patterns to keep the type system simple, or including them at the expense of additional complexity a… ▽ More

    Submitted 4 May, 2016; originally announced May 2016.

    Comments: Samsung Research America Technical Report

    Report number: SRA-CSIC-2016-001 ACM Class: F.3.3

  35. arXiv:1409.7264  [pdf, ps, other

    quant-ph cs.IT

    Quantum Information Entropies for the $\ell$-state Pöschl-Teller-type potential

    Authors: W. A. Yahya, K. J. Oyewumi, K. D. Sen

    Abstract: In this study, we obtained the position-momentum uncertainties and some uncertainty relations for the Pöschl-Teller-type potential for any $\ell$. The radial expectation values of $r^{-2}$, $r^{2}$ and $p^{2}$ are obtained from which the Heisenberg Uncertainty principle holds for the potential model under consideration. The Fisher information is then obtained and it is observed that the Fisher-inf… ▽ More

    Submitted 25 September, 2014; originally announced September 2014.

  36. arXiv:0811.2675  [pdf, ps, other

    cs.DM

    Characterizations of probe interval graphs

    Authors: Shamik Ghosh, Maitry Podder, Malay K. Sen

    Abstract: In this paper we obtain several characterizations of the adjacency matrix of a probe interval graph. In course of this study we describe an easy method of obtaining interval representation of an interval bipartite graph from its adjacency matrix. Finally, we note that if we add a loop at every probe vertex of a probe interval graph, then the Ferrers dimension of the corresponding symmetric bipar… ▽ More

    Submitted 17 November, 2008; originally announced November 2008.