Zum Hauptinhalt springen

Showing 1–28 of 28 results for author: Sundaram, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.07499  [pdf, other

    quant-ph cs.ET

    Distributed Quantum Computation with Minimum Circuit Execution Time over Quantum Networks

    Authors: Ranjani G Sundaram, Himanshu Gupta, C. R. Ramakrishnan

    Abstract: Present quantum computers are constrained by limited qubit capacity and restricted physical connectivity, leading to challenges in large-scale quantum computations. Distributing quantum computations across a network of quantum computers is a promising way to circumvent these challenges and facilitate large quantum computations. However, distributed quantum computations require entanglements (to ex… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

  2. arXiv:2311.02349  [pdf, other

    cs.GT cs.LG cs.SI

    Sample Complexity of Opinion Formation on Networks

    Authors: Haolin Liu, Rajmohan Rajaraman, Ravi Sundaram, Anil Vullikanti, Omer Wasim, Haifeng Xu

    Abstract: Consider public health officials aiming to spread awareness about a new vaccine in a community interconnected by a social network. How can they distribute information with minimal resources, ensuring community-wide understanding that aligns with the actual facts? This concern mirrors numerous real-world situations. In this paper, we initialize the study of sample complexity in opinion formation to… ▽ More

    Submitted 4 November, 2023; originally announced November 2023.

  3. arXiv:2306.00195  [pdf, other

    quant-ph cs.ET

    Distributing Quantum Circuits Using Teleportations

    Authors: Ranjani G Sundaram, Himanshu Gupta

    Abstract: Scalability is currently one of the most sought-after objectives in the field of quantum computing. Distributing a quantum circuit across a quantum network is one way to facilitate large computations using current quantum computers. In this paper, we consider the problem of distributing a quantum circuit across a network of heterogeneous quantum computers, while minimizing the number of teleportat… ▽ More

    Submitted 31 May, 2023; originally announced June 2023.

  4. arXiv:2206.06437  [pdf, other

    cs.ET quant-ph

    Distribution of Quantum Circuits Over General Quantum Networks

    Authors: Ranjani G Sundaram, Himanshu Gupta, C. R. Ramakrishnan

    Abstract: Near-term quantum computers can hold only a small number of qubits. One way to facilitate large-scale quantum computations is through a distributed network of quantum computers. In this work, we consider the problem of distributing quantum programs represented as quantum circuits across a quantum network of heterogeneous quantum computers, in a way that minimizes the overall communication cost req… ▽ More

    Submitted 13 June, 2022; originally announced June 2022.

  5. arXiv:2206.05579  [pdf, other

    cs.DS

    Online Paging with Heterogeneous Cache Slots

    Authors: Marek Chrobak, Samuel Haney, Mehraneh Liaee, Debmalya Panigrahi, Rajmohan Rajaraman, Ravi Sundaram, Neal E. Young

    Abstract: It is natural to generalize the online $k$-Server problem by allowing each request to specify not only a point $p$, but also a subset $S$ of servers that may serve it. For uniform metrics, the problem is equivalent to a generalization of Paging in which each request specifies not only a page $p$, but also a subset $S$ of cache slots, and is satisfied by having a copy of $p$ in some slot in $S$. We… ▽ More

    Submitted 23 February, 2023; v1 submitted 11 June, 2022; originally announced June 2022.

    Comments: 33 pages, conference version appears in STACS 2023

    ACM Class: F.2.0; F.1.2; C.0

  6. arXiv:2012.03310  [pdf, other

    cs.LG stat.ML

    PAC-Learning for Strategic Classification

    Authors: Ravi Sundaram, Anil Vullikanti, Haifeng Xu, Fan Yao

    Abstract: The study of strategic or adversarial manipulation of testing data to fool a classifier has attracted much recent attention. Most previous works have focused on two extreme situations where any testing data point either is completely adversarial or always equally prefers the positive label. In this paper, we generalize both of these through a unified framework for strategic classification, and int… ▽ More

    Submitted 11 June, 2021; v1 submitted 6 December, 2020; originally announced December 2020.

  7. arXiv:2006.06834  [pdf, other

    cs.LG stat.ML

    Attention improves concentration when learning node embeddings

    Authors: Matthew Dippel, Adam Kiezun, Tanay Mehta, Ravi Sundaram, Srikanth Thirumalai, Akshar Varma

    Abstract: We consider the problem of predicting edges in a graph from node attributes in an e-commerce setting. Specifically, given nodes labelled with search query text, we want to predict links to related queries that share products. Experiments with a range of deep neural architectures show that simple feedforward networks with an attention mechanism perform best for learning embeddings. The simplicity o… ▽ More

    Submitted 11 June, 2020; originally announced June 2020.

    Comments: 18 pages, 3 figures

  8. arXiv:2005.07370  [pdf, ps, other

    cs.GT

    Tight Approximation Algorithms for p-Mean Welfare Under Subadditive Valuations

    Authors: Siddharth Barman, Umang Bhaskar, Anand Krishna, Ranjani G. Sundaram

    Abstract: We develop polynomial-time algorithms for the fair and efficient allocation of indivisible goods among $n$ agents that have subadditive valuations over the goods. We first consider the Nash social welfare as our objective and design a polynomial-time algorithm that, in the value oracle model, finds an $8n$-approximation to the Nash optimal allocation. Subadditive valuations include XOS (fractional… ▽ More

    Submitted 5 July, 2020; v1 submitted 15 May, 2020; originally announced May 2020.

    Comments: 19 pages

  9. arXiv:2005.00504  [pdf, other

    cs.GT

    Uniform Welfare Guarantees Under Identical Subadditive Valuations

    Authors: Siddharth Barman, Ranjani G. Sundaram

    Abstract: We study the problem of allocating indivisible goods among agents that have an identical subadditive valuation over the goods. The extent of fairness and efficiency of allocations is measured by the generalized means of the values that the allocations generate among the agents. Parameterized by an exponent term $p$, generalized-mean welfares encompass multiple well-studied objectives, such as soci… ▽ More

    Submitted 1 May, 2020; originally announced May 2020.

    Comments: 24 pages

  10. arXiv:1904.11946  [pdf, other

    cs.DS

    Retracting Graphs to Cycles

    Authors: Samuel Haney, Mehraneh Liaee, Bruce M. Maggs, Debmalya Panigrahi, Rajmohan Rajaraman, Ravi Sundaram

    Abstract: We initiate the algorithmic study of retracting a graph into a cycle in the graph, which seeks a mapping of the graph vertices to the cycle vertices, so as to minimize the maximum stretch of any edge, subject to the constraint that the restriction of the mapping to the cycle is the identity map. This problem has its roots in the rich theory of retraction of topological spaces, and has strong ties… ▽ More

    Submitted 26 April, 2019; originally announced April 2019.

  11. arXiv:1711.04213  [pdf, other

    cs.LG

    Skyline Identification in Multi-Armed Bandits

    Authors: Albert Cheu, Ravi Sundaram, Jonathan Ullman

    Abstract: We introduce a variant of the classical PAC multi-armed bandit problem. There is an ordered set of $n$ arms $A[1],\dots,A[n]$, each with some stochastic reward drawn from some unknown bounded distribution. The goal is to identify the $skyline$ of the set $A$, consisting of all arms $A[i]$ such that $A[i]$ has larger expected reward than all lower-numbered arms $A[1],\dots,A[i-1]$. We define a natu… ▽ More

    Submitted 9 January, 2018; v1 submitted 11 November, 2017; originally announced November 2017.

    Comments: 18 pages, 2 Figures; an ALT'18/ISIT'18 submission

  12. arXiv:1702.02289  [pdf, other

    cs.SD

    Neural Network Based Speaker Classification and Verification Systems with Enhanced Features

    Authors: Zhenhao Ge, Ananth N. Iyer, Srinath Cheluvaraja, Ram Sundaram, Aravind Ganapathiraju

    Abstract: This work presents a novel framework based on feed-forward neural network for text-independent speaker classification and verification, two related systems of speaker recognition. With optimized features and model training, it achieves 100% classification rate in classification and less than 6% Equal Error Rate (ERR), using merely about 1 second and 5 seconds of data respectively. Features with st… ▽ More

    Submitted 7 February, 2017; originally announced February 2017.

    Comments: Intelligent Systems Conference 2017, Sep. 7-8 2017, London, UK. arXiv admin note: text overlap with arXiv:1702.02285

  13. arXiv:1612.01492  [pdf, ps, other

    cs.DS

    Plane Gossip: Approximating rumor spread in planar graphs

    Authors: Jennifer Iglesias, Rajmohan Rajaraman, R Ravi, Ravi Sundaram

    Abstract: We study the design of schedules for multi-commodity multicast; we are given an undirected graph $G$ and a collection of source destination pairs, and the goal is to schedule a minimum-length sequence of matchings that connects every source with its respective destination. Multi-commodity multicast models a classic information dissemination problem in networks where the primary communication const… ▽ More

    Submitted 14 July, 2017; v1 submitted 5 December, 2016; originally announced December 2016.

    ACM Class: F.2.2; G.2.2

  14. arXiv:1605.07196  [pdf, other

    cs.NI

    Balls and Funnels: Energy Efficient Group-to-Group Anycasts

    Authors: Jennifer Iglesias, Rajmohan Rajaraman, R. Ravi, Ravi Sundaram

    Abstract: We introduce group-to-group anycast (g2g-anycast), a network design problem of substantial practical importance and considerable generality. Given a collection of groups and requirements for directed connectivity from source groups to destination groups, the solution network must contain, for each requirement, an omni-directional down-link broadcast, centered at any node of the source group, calle… ▽ More

    Submitted 23 May, 2016; originally announced May 2016.

  15. arXiv:1605.05572  [pdf, ps, other

    cs.IT

    A General Characterization of Sync Word for Asynchronous Communication

    Authors: R. M. Sundaram, Devendra Jalihal, Venkatesh Ramaiyan

    Abstract: We study a problem of sequential frame synchronization for a frame transmitted uniformly in $A$ slots. For a discrete memoryless channel (DMC), Venkat Chandar et al showed that the frame length $N$ must scale with $A$ as $e^{N α(Q)} > A$ for the frame synchronization error to go to zero (asymptotically with $A$). Here, $Q$ denotes the transition probabilities of the DMC and $α(Q)$, defined as the… ▽ More

    Submitted 19 May, 2016; v1 submitted 18 May, 2016; originally announced May 2016.

    Comments: Submitted to IEEE Wireless Communication Letters. arXiv admin note: substantial text overlap with arXiv:1506.04643

  16. arXiv:1604.03757  [pdf, other

    cs.IR cs.CR

    Chiron: A Robust Recommendation System with Graph Regularizer

    Authors: Saber Shokat Fadaee, Mohammad Sajjad Ghaemi, Ravi Sundaram, Hossein Azari Soufiani

    Abstract: Recommendation systems have been widely used by commercial service providers for giving suggestions to users. Collaborative filtering (CF) systems, one of the most popular recommendation systems, utilize the history of behaviors of the aggregate user-base to provide individual recommendations and are effective when almost all users faithfully express their opinions. However, they are vulnerable to… ▽ More

    Submitted 15 November, 2016; v1 submitted 13 April, 2016; originally announced April 2016.

  17. On The Network You Keep: Analyzing Persons of Interest using Cliqster

    Authors: Saber Shokat Fadaee, Mehrdad Farajtabar, Ravi Sundaram, Javed A. Aslam, Nikos Passas

    Abstract: Our goal is to determine the structural differences between different categories of networks and to use these differences to predict the network category. Existing work on this topic has looked at social networks such as Facebook, Twitter, co-author networks etc. We, instead, focus on a novel data set that we have assembled from a variety of sources, including law-enforcement agencies, financial i… ▽ More

    Submitted 5 October, 2015; originally announced October 2015.

    Comments: The final publication is available at Springer via http://dx.doi.org/10.1007/s13278-015-0302-0 A preliminary version of this paper appeared in Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)

  18. arXiv:1506.04643  [pdf, ps, other

    cs.IT

    Asynchronous Communication over a Fading Channel and Additive Noise

    Authors: R. M. Sundaram, Devendra Jalihal, Venkatesh Ramaiyan

    Abstract: In \cite{Chandar2008}, Chandar et al studied a problem of sequential frame synchronization for a frame transmitted randomly and uniformly among $A$ slots. For a discrete memory-less channel (DMC), they showed that the frame length $N$ must scale as $e^{α(Q)N}>A$ for the frame detection error to go to zero asymptotically with $A$. $α(Q)$ is the synchronization threshold and $Q$ is channel transitio… ▽ More

    Submitted 23 June, 2015; v1 submitted 15 June, 2015; originally announced June 2015.

  19. arXiv:1403.8137  [pdf, other

    cs.CR

    Secure and scalable match: overcoming the universal circuit bottleneck using group programs

    Authors: Rajesh Krishnan, Ravi Sundaram

    Abstract: Confidential Content-Based Publish/Subscribe (C-CBPS) is an interaction (pub/sub) model that allows parties to exchange data while still protecting their security and privacy interests. In this paper we advance the state of the art in C-CBPS by showing how all predicate circuits in NC1 (logarithmic-depth, bounded fan-in) can be securely computed by a broker while guaranteeing perfect information-t… ▽ More

    Submitted 31 March, 2014; originally announced March 2014.

  20. arXiv:1401.7313  [pdf, ps, other

    cs.NI

    Deterministic Blind Rendezvous in Cognitive Radio Networks

    Authors: Sixia Chen, Alexander Russell, Abhishek Samanta, Ravi Sundaram

    Abstract: Blind rendezvous is a fundamental problem in cognitive radio networks. The problem involves a collection of agents (radios) that wish to discover each other in the blind setting where there is no shared infrastructure and they initially have no knowledge of each other. Time is divided into discrete slots; spectrum is divided into discrete channels, $\{1,2,..., n\}$. Each agent may access a single… ▽ More

    Submitted 28 January, 2014; originally announced January 2014.

    ACM Class: F.2.2

  21. arXiv:1109.3791   

    cs.SI

    WebCloud: Recruiting web browsers for content distribution

    Authors: Fangfei Zhou, Liang Zhang, Eric Franco, Richard Revis, Alan Mislove, Ravi Sundaram

    Abstract: We are at the beginning of a shift in how content is created and exchanged over the web. While content was previously created primarily by a small set of entities, today, individual users -- empowered by devices like digital cameras and services like online social networks -- are creating content that represents a significant fraction of Internet traffic. As a result, content today is increasingly… ▽ More

    Submitted 21 September, 2011; v1 submitted 17 September, 2011; originally announced September 2011.

    Comments: This paper is withdraw by the author because we don't want to make it publicly available for now

  22. arXiv:1103.0759  [pdf, ps, other

    cs.DC

    Scheduler Vulnerabilities and Attacks in Cloud Computing

    Authors: Fangfei Zhou, Manish Goel, Peter Desnoyers, Ravi Sundaram

    Abstract: In hardware virtualization a hypervisor provides multiple Virtual Machines (VMs) on a single physical system, each executing a separate operating system instance. The hypervisor schedules execution of these VMs much as the scheduler in an operating system does, balancing factors such as fairness and I/O performance. As in an operating system, the scheduler may be vulnerable to malicious behavior o… ▽ More

    Submitted 3 March, 2011; originally announced March 2011.

  23. arXiv:1007.2694  [pdf, other

    cs.GT

    Cache Me If You Can: Capacitated Selfish Replication Games in Networks

    Authors: Ragavendran Gopalakrishnan, Dimitrios Kanoulas, Naga Naresh Karuturi, C. Pandu Rangan, Rajmohan Rajaraman, Ravi Sundaram

    Abstract: In Peer-to-Peer (P2P) network systems, content (object) delivery between nodes is often required. One way to study such a distributed system is by defining games, which involve selfish nodes that make strategic choices on replicating content in their local limited memory (cache) or accessing content from other nodes for a cost. These Selfish Replication games have been introduced in [8] for nodes… ▽ More

    Submitted 21 June, 2019; v1 submitted 16 July, 2010; originally announced July 2010.

    Comments: *Dimitrios Kanoulas: corresponding author

  24. arXiv:0904.1435  [pdf, other

    cs.CC cs.GT

    Reducibility Among Fractional Stability Problems

    Authors: Shiva Kintali, Laura J. Poplawski, Rajmohan Rajaraman, Ravi Sundaram, Shang-Hua Teng

    Abstract: In this paper, we resolve the computational complexity of a number of outstanding open problems with practical applications. Here is the list of problems we show to be PPAD-complete, along with the domains of practical significance: Fractional Stable Paths Problem (FSPP) [21] - Internet routing; Core of Balanced Games [41] - Economics and Game theory; Scarf's Lemma [41] - Combinatorics; Hypergra… ▽ More

    Submitted 8 April, 2009; originally announced April 2009.

  25. arXiv:0812.0598  [pdf, other

    cs.GT cs.DS

    Preference Games and Personalized Equilibria, with Applications to Fractional BGP

    Authors: Laura J. Poplawski, Rajmohan Rajaraman, Ravi Sundaram, Shang-Hua Teng

    Abstract: We study the complexity of computing equilibria in two classes of network games based on flows - fractional BGP (Border Gateway Protocol) games and fractional BBC (Bounded Budget Connection) games. BGP is the glue that holds the Internet together and hence its stability, i.e. the equilibria of fractional BGP games (Haxell, Wilfong), is a matter of practical importance. BBC games (Laoutaris et al… ▽ More

    Submitted 5 December, 2008; v1 submitted 2 December, 2008; originally announced December 2008.

    Comments: 25 pages, 3 figures, v2: minor editorial changes

    ACM Class: F.2.2; G.2.2

  26. arXiv:0806.1727  [pdf, ps, other

    cs.GT cs.NI

    Bounded Budget Connection (BBC) Games or How to make friends and influence people, on a budget

    Authors: Nikolaos Laoutaris, Laura J. Poplawski, Rajmohan Rajaraman, Ravi Sundaram, Shang-Hua Teng

    Abstract: Motivated by applications in social networks, peer-to-peer and overlay networks, we define and study the Bounded Budget Connection (BBC) game - we have a collection of n players or nodes each of whom has a budget for purchasing links; each link has a cost as well as a length and each node has a set of preference weights for each of the remaining nodes; the objective of each node is to use its bu… ▽ More

    Submitted 10 June, 2008; originally announced June 2008.

    Comments: 20 pages, 10 figures, shorter version in PODC 2008

    ACM Class: F.2.2; G.2.2

  27. arXiv:cs/0701071  [pdf, ps, other

    cs.GT

    A bounded-degree network formation game

    Authors: Nikolaos Laoutaris, Rajmohan Rajaraman, Ravi Sundaram, Shang-Hua Teng

    Abstract: Motivated by applications in peer-to-peer and overlay networks we define and study the \emph{Bounded Degree Network Formation} (BDNF) game. In an $(n,k)$-BDNF game, we are given $n$ nodes, a bound $k$ on the out-degree of each node, and a weight $w_{vu}$ for each ordered pair $(v,u)$ representing the traffic rate from node $v$ to node $u$. Each node $v$ uses up to $k$ directed links to connect t… ▽ More

    Submitted 23 August, 2007; v1 submitted 10 January, 2007; originally announced January 2007.

  28. arXiv:cs/9809103  [pdf, ps, other

    cs.CC cs.DS

    Bicriteria Network Design Problems

    Authors: Madhav V. Marathe, R. Ravi, Ravi Sundaram, S. S. Ravi, Daniel J. Rosenkrantz, Harry B. Hunt III

    Abstract: We study a general class of bicriteria network design problems. A generic problem in this class is as follows: Given an undirected graph and two minimization objectives (under different cost functions), with a budget specified on the first, find a <subgraph \from a given subgraph-class that minimizes the second objective subject to the budget on the first. We consider three different criteria -… ▽ More

    Submitted 24 September, 1998; originally announced September 1998.

    Comments: 24 pages 1 figure

    ACM Class: F,2.2

    Journal ref: J. Algorithms, 28, 142-171, (1998)