Skip to main content

Showing 1–3 of 3 results for author: Naik, N S

.
  1. arXiv:2402.15002  [pdf, other

    cs.CL cs.CV

    CommVQA: Situating Visual Question Answering in Communicative Contexts

    Authors: Nandita Shankar Naik, Christopher Potts, Elisa Kreiss

    Abstract: Current visual question answering (VQA) models tend to be trained and evaluated on image-question pairs in isolation. However, the questions people ask are dependent on their informational needs and prior knowledge about the image content. To evaluate how situating images within naturalistic contexts shapes visual questions, we introduce CommVQA, a VQA dataset consisting of images, image descripti… ▽ More

    Submitted 22 February, 2024; originally announced February 2024.

  2. arXiv:2308.07309  [pdf, other

    cs.CR cs.DC cs.ET

    Reinforcing Security and Usability of Crypto-Wallet with Post-Quantum Cryptography and Zero-Knowledge Proof

    Authors: Yathin Kethepalli, Rony Joseph, Sai Raja Vajrala, Jashwanth Vemula, Nenavath Srinivas Naik

    Abstract: Crypto-wallets or digital asset wallets are a crucial aspect of managing cryptocurrencies and other digital assets such as NFTs. However, these wallets are not immune to security threats, particularly from the growing risk of quantum computing. The use of traditional public-key cryptography systems in digital asset wallets makes them vulnerable to attacks from quantum computers, which may increase… ▽ More

    Submitted 29 August, 2023; v1 submitted 14 August, 2023; originally announced August 2023.

  3. arXiv:1704.08526  [pdf

    cs.AR

    An Efficient Reconfigurable FIR Digital Filter Using Modified Distribute Arithmetic Technique

    Authors: Naveen S Naik, Kiran A Gupta

    Abstract: This paper provides modified Distributed Arithmetic based technique to compute sum of products saving appreciable number of Multiply And accumulation blocks and this consecutively reduces circuit size. In this technique multiplexer based structure is used to reuse the blocks so as to reduce the required memory locations. In this technique a Carry Look Ahead based adder tree is used to have better… ▽ More

    Submitted 27 April, 2017; originally announced April 2017.

    Comments: 5 pages,4 figures, journal 2015