Skip to main content

Showing 1–17 of 17 results for author: Balaji, N

.
  1. arXiv:2310.19335  [pdf, ps, other

    cs.CC cs.CG cs.DS

    USSR is in P/poly

    Authors: Nikhil Balaji, Samir Datta

    Abstract: The Sum of Square Roots (SSR) problem is the following computational problem: Given positive integers $a_1, \dots, a_k$, and signs $δ_1, \dots, δ_k \in \{-1, 1\}$, check if $\sum_{i=1}^k δ_i \sqrt{a_i} > 0$. The problem is known to have a polynomial time algorithm on the real RAM model of computation, however no sub-exponential time algorithm is known in the bit or Turing model of computation. The… ▽ More

    Submitted 1 November, 2023; v1 submitted 30 October, 2023; originally announced October 2023.

    Comments: To appear at SOSA 2024

  2. arXiv:2304.14145  [pdf, ps, other

    cs.FL cs.CC

    Multiplicity Problems on Algebraic Series and Context-Free Grammars

    Authors: Nikhil Balaji, Lorenzo Clemente, Klara Nosan, Mahsa Shirmohammadi, James Worrell

    Abstract: In this paper we obtain complexity bounds for computational problems on algebraic power series over several commuting variables. The power series are specified by systems of polynomial equations: a formalism closely related to weighted context-free grammars. We focus on three problems -- decide whether a given algebraic series is identically zero, determine whether all but finitely many coefficien… ▽ More

    Submitted 28 April, 2023; v1 submitted 27 April, 2023; originally announced April 2023.

    Comments: full technical report of a LICS'23 paper

  3. arXiv:2203.12364  [pdf, ps, other

    math.NT cs.CC cs.DM

    Terms of Lucas sequences having a large smooth divisor

    Authors: Nikhil Balaji, Florian Luca

    Abstract: We show that the $Kn$--smooth part of $a^n-1$ for an integer $a>1$ is $a^{o(n)}$ for most positive integers $n$.

    Submitted 23 March, 2022; originally announced March 2022.

    Comments: to appear in Canadian Mathematical Bulletin

  4. arXiv:2202.07961  [pdf, other

    cs.CC cs.LO cs.SC

    Identity Testing for Radical Expressions

    Authors: Nikhil Balaji, Klara Nosan, Mahsa Shirmohammadi, James Worrell

    Abstract: We study the Radical Identity Testing problem (RIT): Given an algebraic circuit representing a polynomial $f\in \mathbb{Z}[x_1, \ldots, x_k]$ and nonnegative integers $a_1, \ldots, a_k$ and $d_1, \ldots,$ $d_k$, written in binary, test whether the polynomial vanishes at the real radicals $\sqrt[d_1]{a_1}, \ldots,\sqrt[d_k]{a_k}$, i.e., test whether $f(\sqrt[d_1]{a_1}, \ldots,\sqrt[d_k]{a_k}) = 0$.… ▽ More

    Submitted 1 June, 2022; v1 submitted 16 February, 2022; originally announced February 2022.

    Comments: 32 pages

  5. arXiv:2008.01671  [pdf, other

    physics.flu-dyn

    The Leading Edge Problem in Fluid Mechanics

    Authors: U S Naveen Balaji, Sujan Kumar S, T Vignesh, Kankanhally N Seetharamu, T R Seetharam, Babu Rao Ponangi, Rammohan B

    Abstract: The self-similar momentum ordinary differential equation (MODE) and the self-similar partial differential equation (MPDE) have been derived and the investigation of the integrability of the MODE and the MPDE has been done by performing Painlevé test. A detailed discussion of the leading order behavior of the MODE and the MPDE has been presented with the latter being analyzed for the cases in which… ▽ More

    Submitted 3 August, 2020; originally announced August 2020.

    Comments: 45 pages, 1 figure, 7 tables. arXiv admin note: text overlap with arXiv:1910.03502

  6. arXiv:2007.13179  [pdf, ps, other

    cs.CC cs.SC

    Cyclotomic Identity Testing and Applications

    Authors: Nikhil Balaji, Sylvain Perifel, Mahsa Shirmohammadi, James Worrell

    Abstract: We consider the cyclotomic identity testing (CIT) problem: given a polynomial $f(x_1,\ldots,x_k)$, decide whether $f(ζ_n^{e_1},\ldots,ζ_n^{e_k})$ is zero, where $ζ_n = e^{2πi/n}$ is a primitive complex $n$-th root of unity and $e_1,\ldots,e_k$ are integers, represented in binary. When $f$ is given by an algebraic circuit, we give a randomized polynomial-time algorithm for CIT assuming the generali… ▽ More

    Submitted 4 May, 2021; v1 submitted 26 July, 2020; originally announced July 2020.

  7. arXiv:2006.04989  [pdf, other

    cs.RO

    Synchronous Robotic Framework

    Authors: Nagarathna Hema Balaji, Jyothsna Kilaru, Oscar Morales-Ponce

    Abstract: We present a synchronous robotic testbed called SyROF that allows fast implementation of robotic swarms. Our main goal is to lower the entry barriers to cooperative-robot systems for undergraduate and graduate students. The testbed provides a high-level programming environment that allows the implementation of Timed Input/Output Automata (TIOA). SyROF offers the following unique characteristics: 1… ▽ More

    Submitted 8 June, 2020; originally announced June 2020.

    Comments: Wi-DroIT 2020

  8. arXiv:1910.03502  [pdf, ps, other

    physics.flu-dyn

    On Recent Developments in the Leading Edge Problem: Self-Similar Solutions to Momentum and Energy Equations of a Flat Plate

    Authors: U S Naveen Balaji, Sujan Kumar S, Kankanhally N Seetharamu, T R Seetharam, Babu Rao Ponangi, Rammohan B

    Abstract: We provide an overview of the leading edge problem in this paper. We have used a self-similar function having a dependence on both the self-similar variable $η$ and Reynold's number R to covert the momentum and energy equations into a fourth-order, non-linear partial differential equation (PDE) and a second-order, non-linear PDE respectively. Attempts have been made to solve the energy equation in… ▽ More

    Submitted 9 October, 2019; v1 submitted 30 September, 2019; originally announced October 2019.

    Comments: 14 pages, 1 figure. V2: minor changes and added co-author

  9. Cyclic Symmetry of Riemann Tensor in Fuzzy Graph Theory

    Authors: U S Naveen Balaji, S Sivasankar, Sujan Kumar S, Vignesh Tamilmani

    Abstract: In this paper, we define a graph-theoretic analog for the Riemann tensor and analyze properties of the cyclic symmetry. We have developed a fuzzy graph-theoretic analog of the Riemann tensor and have analyzed its properties. We have also shown how the fuzzy analog satisfies the properties of the 6X6 matrix of the Riemann tensor by expressing it as a union of the fuzzy complete graph formed by the… ▽ More

    Submitted 23 August, 2019; originally announced September 2019.

    Comments: 12 pages, 1 figure

    Report number: (Vol. 2277, No. 1, p. 100018)

    Journal ref: (2020) AIP Conference Proceedings. AIP Publishing LLC

  10. arXiv:1807.04920  [pdf, other

    cs.FL cs.AI cs.CC

    On the Complexity of Value Iteration

    Authors: Nikhil Balaji, Stefan Kiefer, Petr Novotný, Guillermo A. Pérez, Mahsa Shirmohammadi

    Abstract: Value iteration is a fundamental algorithm for solving Markov Decision Processes (MDPs). It computes the maximal $n$-step payoff by iterating $n$ times a recurrence equation which is naturally associated to the MDP. At the same time, value iteration provides a policy for the MDP that is optimal on a given finite horizon $n$. In this paper, we settle the computational complexity of value iteration.… ▽ More

    Submitted 27 April, 2019; v1 submitted 13 July, 2018; originally announced July 2018.

    Comments: Full version of an ICALP'19 paper

  11. arXiv:1802.05319  [pdf, other

    cs.SE cs.LG stat.ML

    500+ Times Faster Than Deep Learning (A Case Study Exploring Faster Methods for Text Mining StackOverflow)

    Authors: Suvodeep Majumder, Nikhila Balaji, Katie Brey, Wei Fu, Tim Menzies

    Abstract: Deep learning methods are useful for high-dimensional data and are becoming widely used in many areas of software engineering. Deep learners utilizes extensive computational power and can take a long time to train-- making it difficult to widely validate and repeat and improve their results. Further, they are not the best solution in all domains. For example, recent results show that for finding r… ▽ More

    Submitted 14 February, 2018; originally announced February 2018.

    Journal ref: MSR '18, Proceedings of the 15th International Conference on Mining Software Repositories, May 2018, Pages 554 to 563

  12. arXiv:1510.08267  [pdf, ps, other

    cs.CC cs.DM math.CO

    Graph properties in node-query setting: effect of breaking symmetry

    Authors: Nikhil Balaji, Samir Datta, Raghav Kulkarni, Supartha Podder

    Abstract: The query complexity of graph properties is well-studied when queries are on edges. We investigate the same when queries are on nodes. In this setting a graph $G = (V, E)$ on $n$ vertices and a property $\mathcal{P}$ are given. A black-box access to an unknown subset $S \subseteq V$ is provided via queries of the form `Does $i \in S$?'. We are interested in the minimum number of queries needed in… ▽ More

    Submitted 28 October, 2015; originally announced October 2015.

    Comments: 26 pages, 8 figures

  13. arXiv:1510.04035  [pdf, ps, other

    cs.CC

    Counting Euler Tours in Undirected Bounded Treewidth Graphs

    Authors: Nikhil Balaji, Samir Datta, Venkatesh Ganesan

    Abstract: We show that counting Euler tours in undirected bounded tree-width graphs is tractable even in parallel - by proving a $\#SAC^1$ upper bound. This is in stark contrast to #P-completeness of the same problem in general graphs. Our main technical contribution is to show how (an instance of) dynamic programming on bounded \emph{clique-width} graphs can be performed efficiently in parallel. Thus we… ▽ More

    Submitted 12 December, 2015; v1 submitted 14 October, 2015; originally announced October 2015.

    Comments: 17 pages; There was an error in the proof of the GapL upper bound claimed in the previous version which has been subsequently removed

    ACM Class: F.1.1; F.1.3; G.2.2

  14. arXiv:1412.2470  [pdf, other

    cs.CC

    Bounded Treewidth and Space-Efficient Linear Algebra

    Authors: Nikhil Balaji, Samir Datta

    Abstract: Motivated by a recent result of Elberfeld, Jakoby and Tantau showing that $\mathsf{MSO}$ properties are Logspace computable on graphs of bounded tree-width, we consider the complexity of computing the determinant of the adjacency matrix of a bounded tree-width graph and as our main result prove that it is in Logspace. It is important to notice that the determinant is neither an $\mathsf{MSO}$-prop… ▽ More

    Submitted 8 December, 2014; originally announced December 2014.

    Comments: Replaces http://arxiv.longhoe.net/abs/1312.7468

  15. arXiv:1412.0595  [pdf

    cs.DC cs.NE q-bio.NC

    Scalability and Optimization Strategies for GPU Enhanced Neural Networks (GeNN)

    Authors: Naresh Balaji, Esin Yavuz, Thomas Nowotny

    Abstract: Simulation of spiking neural networks has been traditionally done on high-performance supercomputers or large-scale clusters. Utilizing the parallel nature of neural network computation algorithms, GeNN (GPU Enhanced Neural Network) provides a simulation environment that performs on General Purpose NVIDIA GPUs with a code generation based approach. GeNN allows the users to design and simulate neur… ▽ More

    Submitted 1 December, 2014; originally announced December 2014.

  16. arXiv:1312.7468  [pdf, other

    cs.CC cs.DS math.CO

    Tree-width and Logspace: Determinants and Counting Euler Tours

    Authors: Nikhil Balaji, Samir Datta

    Abstract: Motivated by the recent result of [EJT10] showing that MSO properties are Logspace computable on graphs of bounded tree-width, we consider the complexity of computing the determinant of the adjacency matrix of a bounded tree-width graph and prove that it is L-complete. It is important to notice that the determinant is neither an MSO-property nor counts the number of solutions of an MSO-predicate.… ▽ More

    Submitted 30 December, 2013; v1 submitted 28 December, 2013; originally announced December 2013.

  17. arXiv:0801.0276  [pdf, ps, other

    nlin.CD

    Cryptanalysis of a Chaotic Image Encryption Algorithm

    Authors: Nikhil Balaji, Nithin Nagaraj

    Abstract: Line map, an invertible, two-dimensional chaotic encryption algorithm was introduced recently. In this paper, we propose several weaknesses of the method based on standard cryptanalytic attacks. We perform a side-channel attack by observing the execution time of the encryption algorithm and successfully reduce the key space by a factor of 10^4 for a key length of 16 digits. We find the existence… ▽ More

    Submitted 12 January, 2008; v1 submitted 1 January, 2008; originally announced January 2008.

    Comments: 11 pages, 4 figures, 1 table. Poster presented at National Conference on Nonlinear Systems and Dynamics, Physical Research Laboratory, Ahmedabad, Jan 3-5, 2008. Made changes to the paper based on Chengqing Li's useful comments