Skip to main content

Showing 1–50 of 62 results for author: Raman, R

.
  1. arXiv:2405.10925  [pdf

    stat.ME cs.AI cs.LG

    High-dimensional multiple imputation (HDMI) for partially observed confounders including natural language processing-derived auxiliary covariates

    Authors: Janick Weberpals, Pamela A. Shaw, Kueiyu Joshua Lin, Richard Wyss, Joseph M Plasek, Li Zhou, Kerry Ngan, Thomas DeRamus, Sudha R. Raman, Bradley G. Hammill, Hana Lee, Sengwee Toh, John G. Connolly, Kimberly J. Dandreo, Fang Tian, Wei Liu, Jie Li, José J. Hernández-Muñoz, Sebastian Schneeweiss, Rishi J. Desai

    Abstract: Multiple imputation (MI) models can be improved by including auxiliary covariates (AC), but their performance in high-dimensional data is not well understood. We aimed to develop and compare high-dimensional MI (HDMI) approaches using structured and natural language processing (NLP)-derived AC in studies with partially observed confounders. We conducted a plasmode simulation study using data from… ▽ More

    Submitted 17 May, 2024; originally announced May 2024.

  2. arXiv:2404.10678  [pdf

    cs.SE cs.LG

    Automating REST API Postman Test Cases Using LLM

    Authors: S Deepika Sri, Mohammed Aadil S, Sanjjushri Varshini R, Raja CSP Raman, Gopinath Rajagopal, S Taranath Chan

    Abstract: In the contemporary landscape of technological advancements, the automation of manual processes is crucial, compelling the demand for huge datasets to effectively train and test machines. This research paper is dedicated to the exploration and implementation of an automated approach to generate test cases specifically using Large Language Models. The methodology integrates the use of Open AI to en… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

  3. arXiv:2404.06339  [pdf

    cs.CL cs.LG

    Finding fake reviews in e-commerce platforms by using hybrid algorithms

    Authors: Mathivanan Periasamy, Rohith Mahadevan, Bagiya Lakshmi S, Raja CSP Raman, Hasan Kumar S, Jasper Jessiman

    Abstract: Sentiment analysis, a vital component in natural language processing, plays a crucial role in understanding the underlying emotions and opinions expressed in textual data. In this paper, we propose an innovative ensemble approach for sentiment analysis for finding fake reviews that amalgamate the predictive capabilities of Support Vector Machine (SVM), K-Nearest Neighbors (KNN), and Decision Tree… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

  4. arXiv:2403.16474  [pdf, other

    cs.CG

    Swee** Arrangements of Non-Piercing Curves in Plane

    Authors: Suryendu Dalal, Rahul Gangopadhyay, Rajiv Raman, Saurabh Ray

    Abstract: Let $Γ$ be a finite set of Jordan curves in the plane. For any curve $γ\in Γ$, we denote the bounded region enclosed by $γ$ as $\tildeγ$. We say that $Γ$ is a non-piercing family if for any two curves $α, β\in Γ$, $\tildeα \setminus \tildeβ$ is a connected region. A non-piercing family of curves generalizes a family of $2$-intersecting curves in which each pair of curves intersect in at most two p… ▽ More

    Submitted 2 April, 2024; v1 submitted 25 March, 2024; originally announced March 2024.

  5. arXiv:2310.02759  [pdf

    cs.LG cs.CL

    Comparative Study and Framework for Automated Summariser Evaluation: LangChain and Hybrid Algorithms

    Authors: Bagiya Lakshmi S, Sanjjushri Varshini R, Rohith Mahadevan, Raja CSP Raman

    Abstract: Automated Essay Score (AES) is proven to be one of the cutting-edge technologies. Scoring techniques are used for various purposes. Reliable scores are calculated based on influential variables. Such variables can be computed by different methods based on the domain. The research is concentrated on the user's understanding of a given topic. The analysis is based on a scoring index by using Large L… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

  6. arXiv:2308.05574  [pdf, ps, other

    cs.CL cs.CV

    Exploring Linguistic Similarity and Zero-Shot Learning for Multilingual Translation of Dravidian Languages

    Authors: Danish Ebadulla, Rahul Raman, S. Natarajan, Hridhay Kiran Shetty, Ashish Harish Shenoy

    Abstract: Current research in zero-shot translation is plagued by several issues such as high compute requirements, increased training time and off target translations. Proposed remedies often come at the cost of additional data or compute requirements. Pivot based neural machine translation is preferred over a single-encoder model for most settings despite the increased training and evaluation time. In thi… ▽ More

    Submitted 10 August, 2023; originally announced August 2023.

  7. CERTainty: Detecting DNS Manipulation at Scale using TLS Certificates

    Authors: Elisa Tsai, Deepak Kumar, Ram Sundara Raman, Gavin Li, Yael Eiger, Roya Ensafi

    Abstract: DNS manipulation is an increasingly common technique used by censors and other network adversaries to prevent users from accessing restricted Internet resources and hijack their connections. Prior work in detecting DNS manipulation relies largely on comparing DNS resolutions with trusted control results to identify inconsistencies. However, the emergence of CDNs and other cloud providers practicin… ▽ More

    Submitted 14 May, 2023; originally announced May 2023.

    Comments: To Appear in: Privacy Enhancing Technologies Symposium (PETS), July 2023

  8. arXiv:2303.16515  [pdf, other

    math.CO cs.DM

    On Hypergraph Supports

    Authors: Rajiv Raman, Karamjeet Singh

    Abstract: Let $\mathcal{H}=(X,\mathcal{E})$ be a hypergraph. A support is a graph $Q$ on $X$ such that for each $E\in\mathcal{E}$, the subgraph of $Q$ induced on the elements in $E$ is connected. In this paper, we consider hypergraphs defined on a host graph. Given a graph $G=(V,E)$, with $c:V\to\{\mathbf{r},\mathbf{b}\}$, and a collection of connected subgraphs $\mathcal{H}$ of $G$, a primal support is a g… ▽ More

    Submitted 2 February, 2024; v1 submitted 29 March, 2023; originally announced March 2023.

  9. arXiv:2303.08660  [pdf

    cs.CV cs.LG

    Fashion-model pose recommendation and generation using Machine Learning

    Authors: Vijitha Kannumuru, Santhosh Kannan S P, Krithiga Shankar, Joy Larnyoh, Rohith Mahadevan, Raja CSP Raman

    Abstract: Fashion-model pose is an important attribute in the fashion industry. Creative directors, modeling production houses, and top photographers always look for professional models able to pose. without the skill to correctly pose, their chances of landing professional modeling employment are regrettably quite little. There are occasions when models and photographers are unsure of the best pose to stri… ▽ More

    Submitted 19 February, 2023; originally announced March 2023.

  10. Natural cubic splines for the analysis of Alzheimer's clinical trials

    Authors: M. C. Donohue, O. Langford, P. Insel, C. H. van Dyck, R. C. Petersen, S. Craft, G. Sethuraman, R. Raman, P. S. Aisen

    Abstract: Mixed model repeated measures (MMRM) is the most common analysis approach used in clinical trials for Alzheimer's disease and other progressive diseases measured with continuous outcomes measured over time. The model treats time as a categorical variable, which allows an unconstrained estimate of the mean for each study visit in each randomized group. Categorizing time in this way can be problemat… ▽ More

    Submitted 17 August, 2022; originally announced August 2022.

    Journal ref: Pharmaceutical statistics. Published online 2023

  11. arXiv:2205.15320  [pdf, other

    econ.GN cs.LG

    Payday loans -- blessing or growth suppressor? Machine Learning Analysis

    Authors: Rohith Mahadevan, Sam Richard, Kishore Harshan Kumar, Jeevitha Murugan, Santhosh Kannan, Saaisri, Tarun, Raja CSP Raman

    Abstract: The upsurge of real estate involves a variety of factors that have got influenced by many domains. Indeed, the unrecognized sector that would affect the economy for which regulatory proposals are being drafted to keep this in control is the payday loans. This research paper revolves around the impact of payday loans in the real estate market. The research paper draws a first-hand experience of obt… ▽ More

    Submitted 30 May, 2022; originally announced May 2022.

    Comments: 8 pages, 8 figures

  12. arXiv:2205.04876  [pdf, other

    stat.ML cs.LG

    Turtle Score -- Similarity Based Developer Analyzer

    Authors: Sanjjushri Varshini, Ponshriharini V, Santhosh Kannan, Snekha Suresh, Harshavardhan Ramesh, Rohith Mahadevan, Raja CSP Raman

    Abstract: In day-to-day life, a highly demanding task for IT companies is to find the right candidates who fit the companies' culture. This research aims to comprehend, analyze and automatically produce convincing outcomes to find a candidate who perfectly fits right in the company. Data is examined and collected for each employee who works in the IT domain focusing on their performance measure. This is don… ▽ More

    Submitted 10 May, 2022; originally announced May 2022.

    Comments: 10 pages, 3 figures

  13. Analysis of Ferroelectric Negative Capacitance-Hybrid MEMS Actuator Using Energy-Displacement Landscape

    Authors: Raghuram Tattamangalam Raman, Jeffin Shibu, Revathy Padmanabhan, Arvind Ajoy

    Abstract: We propose an energy-based framework to analyze the statics and dynamics of a ferroelectric negative capacitance-hybrid Microelectromechanical System (MEMS) actuator. A map** function that relates the charge on the ferroelectric to displacement of the movable electrode, is used to obtain the Hamiltonian of the hybrid actuator in terms of displacement. We then use graphical energy-displacement an… ▽ More

    Submitted 20 March, 2022; originally announced April 2022.

    Comments: 8 pages, 9 figures

    Journal ref: IEEE Trans. Electron Devices 69 (2022) 3359 - 3366

  14. arXiv:2203.16018  [pdf, other

    physics.plasm-ph physics.space-ph

    Plasmoids formation during simulations of coaxial helicity injection in the National Spherical Torus Experiment

    Authors: F. Ebrahimi, R. Raman

    Abstract: Formation of an elongated Sweet-Parker current sheet and a transition to plasmoid instability has for the first time been predicted by simulations in a large-scale toroidal fusion plasma in the absence of any pre-existing instability. Plasmoid instability is demonstrated through resistive MHD simulations of transient Coaxial Helicity Injection (CHI) experiments in the National Spherical Torus Expe… ▽ More

    Submitted 29 March, 2022; originally announced March 2022.

    Comments: 5 pages, 5 figures

    Journal ref: Published in Phys. Rev. Lett. May 2015

  15. arXiv:2203.11114  [pdf, ps, other

    cs.CG

    On the Parameterized Complexity of the Maximum Exposure Problem

    Authors: Remi Raman, Shahin John J S, R Subashini, Subhasree Methirumangalath

    Abstract: We investigate the parameterized complexity of Maximum Exposure Problem (MEP). Given a range space (R, P) where R is the set of ranges containing a set P of points, and an integer k, MEP asks for k ranges which on removal results in the maximum number of exposed points. A point p is said to be exposed when p is not contained in any of the ranges in R. The problem is known to be NP-hard. In this le… ▽ More

    Submitted 22 March, 2022; v1 submitted 21 March, 2022; originally announced March 2022.

  16. arXiv:2108.08120  [pdf, other

    cs.LG

    Stack Index Prediction Using Time-Series Analysis

    Authors: Raja CSP Raman, Rohith Mahadevan, Divya Perumal, Vedha Sankar, Talha Abdur Rahman

    Abstract: The Prevalence of Community support and engagement for different domains in the tech industry has changed and evolved throughout the years. In this study, we aim to understand, analyze and predict the trends of technology in a scientific manner, having collected data on numerous topics and their growth throughout the years in the past decade. We apply machine learning models on collected data, to… ▽ More

    Submitted 18 August, 2021; originally announced August 2021.

    Comments: 10 pages, 9 figures

  17. Modeling of carbon pellets disruption mitigation in an NSTX-U plasma

    Authors: C. F. Clauser, S. C. Jardin, R. Raman, B. C. Lyons, N. M. Ferraro

    Abstract: Single carbon pellet disruption mitigation simulations using M3D-C1 were conducted in an NSTX-U-like plasma to support the electromagnetic pellet injection concept (EPI). A carbon ablation model has been implemented in M3D-C1 and tested with available data. 2D simulations were conducted in order to estimate the amount of carbon needed to quench the plasma, finding that the content in a $1\,$mm rad… ▽ More

    Submitted 28 June, 2021; originally announced June 2021.

  18. arXiv:2105.07444  [pdf

    cs.SI

    Knowledge Value Stream Framework For Complex Product Design Decisions

    Authors: Ramakrishnan Raman, Meenakshi D'Souza

    Abstract: Product Development value stream includes all the activities, value added and non value added, for designing and develo** a product. It is characterized by flow of knowledge that drives the decisions, and deals with how the product is conceptualized, architected and designed by the design teams. The intangible flow of knowledge is determined by knowledge value stream, which shapes how the raw co… ▽ More

    Submitted 16 May, 2021; originally announced May 2021.

    Comments: 31 pages, 25 Figures. A preliminary version of this work was presented in 2017 IEEE Technology & Engineering Management Conference (TEMSCON), which took place on June 8-10, 2017 in Santa Clara County, CA, USA. Subsequently, the work has significantly evolved, expanded in scope and progressed to its present form in this submission

  19. arXiv:2103.00462  [pdf, other

    cs.DS

    Weighted Ancestors in Suffix Trees Revisited

    Authors: Djamal Belazzougui, Dmitry Kosolobov, Simon J. Puglisi, Rajeev Raman

    Abstract: The weighted ancestor problem is a well-known generalization of the predecessor problem to trees. It is known to require $Ω(\log\log n)$ time for queries provided $O(n\mathop{\mathrm{polylog}} n)$ space is available and weights are from $[0..n]$, where $n$ is the number of tree nodes. However, when applied to suffix trees, the problem, surprisingly, admits an $O(n)$-space solution with constant qu… ▽ More

    Submitted 11 April, 2021; v1 submitted 28 February, 2021; originally announced March 2021.

    Comments: 15 pages, 5 figures

  20. arXiv:2011.03395  [pdf, other

    cs.LG stat.ML

    Underspecification Presents Challenges for Credibility in Modern Machine Learning

    Authors: Alexander D'Amour, Katherine Heller, Dan Moldovan, Ben Adlam, Babak Alipanahi, Alex Beutel, Christina Chen, Jonathan Deaton, Jacob Eisenstein, Matthew D. Hoffman, Farhad Hormozdiari, Neil Houlsby, Shaobo Hou, Ghassen Jerfel, Alan Karthikesalingam, Mario Lucic, Yian Ma, Cory McLean, Diana Mincu, Akinori Mitani, Andrea Montanari, Zachary Nado, Vivek Natarajan, Christopher Nielson, Thomas F. Osborne , et al. (15 additional authors not shown)

    Abstract: ML models often exhibit unexpectedly poor behavior when they are deployed in real-world domains. We identify underspecification as a key reason for these failures. An ML pipeline is underspecified when it can return many predictors with equivalently strong held-out performance in the training domain. Underspecification is common in modern ML pipelines, such as those based on deep learning. Predict… ▽ More

    Submitted 24 November, 2020; v1 submitted 6 November, 2020; originally announced November 2020.

    Comments: Updates: Updated statistical analysis in Section 6; Additional citations

  21. arXiv:2009.12648  [pdf

    eess.IV cs.CV

    Quantitative and Qualitative Evaluation of Explainable Deep Learning Methods for Ophthalmic Diagnosis

    Authors: Amitojdeep Singh, J. Jothi Balaji, Mohammed Abdul Rasheed, Varadharajan Jayakumar, Rajiv Raman, Vasudevan Lakshminarayanan

    Abstract: Background: The lack of explanations for the decisions made by algorithms such as deep learning has hampered their acceptance by the clinical community despite highly accurate results on multiple problems. Recently, attribution methods have emerged for explaining deep learning models, and they have been tested on medical imaging problems. The performance of attribution methods is compared on stand… ▽ More

    Submitted 24 March, 2021; v1 submitted 26 September, 2020; originally announced September 2020.

  22. Generating a Gray code for prefix normal words in amortized polylogarithmic time per word

    Authors: Péter Burcsi, Gabriele Fici, Zsuzsanna Lipták, Rajeev Raman, Joe Sawada

    Abstract: A prefix normal word is a binary word with the property that no substring has more $1$s than the prefix of the same length. By proving that the set of prefix normal words is a bubble language, we can exhaustively list all prefix normal words of length $n$ as a combinatorial Gray code, where successive strings differ by at most two swaps or bit flips. This Gray code can be generated in… ▽ More

    Submitted 7 August, 2020; v1 submitted 5 March, 2020; originally announced March 2020.

    Comments: To appear in Theoretical Computer Science. arXiv admin note: text overlap with arXiv:1401.6346

    Journal ref: P. Burcsi, G. Fici, Zs. Lipták, R. Raman, J. Sawada: Generating a Gray code for prefix normal words in amortized polylogarithmic time per word. Theor. Comput. Sci. 842: 86-99 (2020)

  23. Analysis of Electrostatic MEMS Using Energy-Charge Landscape

    Authors: Raghuram Tattamangalam Raman, Arvind Ajoy, Revathy Padmanabhan

    Abstract: A common way to analyze electrostatic microelectromechanical systems (MEMS) actuators is to use their energy-displacement landscape. Here, we describe an alternative approach to analyze electrostatic MEMS actuators using their energy-charge landscape. This technique involves coordinate transformation from displacement to charge, thereby formulating the Hamiltonian of electrostatic MEMS actuators i… ▽ More

    Submitted 23 October, 2020; v1 submitted 27 February, 2020; originally announced February 2020.

    Comments: 8 Pages, 7 figures, 3 tables

    Journal ref: IEEE Trans. Electron Devices. 67 (2020) 4413-4420

  24. arXiv:2001.03869  [pdf, other

    cs.IT

    Finite-Sample Analysis of Image Registration

    Authors: Ravi Kiran Raman, Lav R. Varshney

    Abstract: We study the problem of image registration in the finite-resolution regime and characterize the error probability of algorithms as a function of properties of the transformation and the image capture noise. Specifically, we define a channel-aware Feinstein decoder to obtain upper bounds on the minimum achievable error probability under finite resolution. We specifically focus on the higher-order t… ▽ More

    Submitted 12 January, 2020; originally announced January 2020.

    Comments: 16 pages, 3 figures

  25. arXiv:1912.12284  [pdf, other

    cs.IT eess.SP

    Decision Making in Star Networks with Incorrect Beliefs

    Authors: Daewon Seo, Ravi Kiran Raman, Lav R. Varshney

    Abstract: Consider a Bayesian binary decision-making problem in star networks, where local agents make selfish decisions independently, and a fusion agent makes a final decision based on aggregated decisions and its own private signal. In particular, we assume all agents have private beliefs for the true prior probability, based on which they perform Bayesian decision making. We focus on the Bayes risk of t… ▽ More

    Submitted 26 October, 2021; v1 submitted 27 December, 2019; originally announced December 2019.

    Comments: final version, to appear in IEEE Transactions on Signal Processing

  26. arXiv:1902.03820   

    cs.CG

    Fixed-Parameter Tractable Algorithms for Corridor Guarding Problems

    Authors: Remi Raman, R Subashini, Subhasree Methirumangalath

    Abstract: Given an orthogonal connected arrangement of line-segments, Minimum Corridor Guarding(MCG) problem asks for an optimal tree/closed walk such that, if a guard moves through the tree/closed walk, all the line-segments are visited by the guard. This problem is referred to as Corridor-MST/Corridor-TSP (CMST/CTSP) for the cases when the guarding walk is a tree/closed walk, respectively. The correspondi… ▽ More

    Submitted 29 March, 2022; v1 submitted 11 February, 2019; originally announced February 2019.

    Comments: Errors in the preprocessing steps used for the k-CMST and k-CTSP

  27. Beliefs in Decision-Making Cascades

    Authors: Daewon Seo, Ravi Kiran Raman, Joong Bum Rhim, Vivek K Goyal, Lav R Varshney

    Abstract: This work explores a social learning problem with agents having nonidentical noise variances and mismatched beliefs. We consider an $N$-agent binary hypothesis test in which each agent sequentially makes a decision based not only on a private observation, but also on preceding agents' decisions. In addition, the agents have their own beliefs instead of the true prior, and have nonidentical noise v… ▽ More

    Submitted 5 August, 2019; v1 submitted 23 November, 2018; originally announced December 2018.

    Comments: final version, to appear in IEEE Transactions on Signal Processing

  28. arXiv:1810.11126  [pdf, other

    cs.DC

    Promoting Distributed Trust in Machine Learning and Computational Simulation via a Blockchain Network

    Authors: Nelson Kibichii Bore, Ravi Kiran Raman, Isaac M. Markus, Sekou L. Remy, Oliver Bent, Michael Hind, Eleftheria K. Pissadaki, Biplav Srivastava, Roman Vaculin, Kush R. Varshney, Komminist Weldemariam

    Abstract: Policy decisions are increasingly dependent on the outcomes of simulations and/or machine learning models. The ability to share and interact with these outcomes is relevant across multiple fields and is especially critical in the disease modeling community where models are often only accessible and workable to the researchers that generate them. This work presents a blockchain-enabled system that… ▽ More

    Submitted 25 October, 2018; originally announced October 2018.

  29. arXiv:1810.08290  [pdf

    cs.CV

    Deep Learning vs. Human Graders for Classifying Severity Levels of Diabetic Retinopathy in a Real-World Nationwide Screening Program

    Authors: Paisan Raumviboonsuk, Jonathan Krause, Peranut Chotcomwongse, Rory Sayres, Rajiv Raman, Kasumi Widner, Bilson J L Campana, Sonia Phene, Kornwipa Hemarat, Mongkol Tadarati, Sukhum Silpa-Acha, Jirawut Limwattanayingyong, Chetan Rao, Oscar Kuruvilla, Jesse Jung, Jeffrey Tan, Surapong Orprayoon, Chawawat Kangwanwongpaisan, Ramase Sukulmalpaiboon, Chainarong Luengchaichawang, Jitumporn Fuangkaew, Pipat Kongsap, Lamyong Chualinpha, Sarawuth Saree, Srirat Kawinpanitan , et al. (7 additional authors not shown)

    Abstract: Deep learning algorithms have been used to detect diabetic retinopathy (DR) with specialist-level accuracy. This study aims to validate one such algorithm on a large-scale clinical population, and compare the algorithm performance with that of human graders. 25,326 gradable retinal images of patients with diabetes from the community-based, nation-wide screening program of DR in Thailand were analy… ▽ More

    Submitted 18 October, 2018; originally announced October 2018.

  30. arXiv:1809.08438  [pdf, other

    cs.DC cs.IT eess.SY stat.ML

    Trusted Multi-Party Computation and Verifiable Simulations: A Scalable Blockchain Approach

    Authors: Ravi Kiran Raman, Roman Vaculin, Michael Hind, Sekou L. Remy, Eleftheria K. Pissadaki, Nelson Kibichii Bore, Roozbeh Daneshvar, Biplav Srivastava, Kush R. Varshney

    Abstract: Large-scale computational experiments, often running over weeks and over large datasets, are used extensively in fields such as epidemiology, meteorology, computational biology, and healthcare to understand phenomena, and design high-stakes policies affecting everyday health and economy. For instance, the OpenMalaria framework is a computationally-intensive simulation used by various non-governmen… ▽ More

    Submitted 22 September, 2018; originally announced September 2018.

    Comments: 16 pages, 8 figures

  31. arXiv:1711.07617  [pdf, other

    cs.IT cs.CR

    Dynamic Distributed Storage for Scaling Blockchains

    Authors: Ravi Kiran Raman, Lav R. Varshney

    Abstract: Blockchain uses the idea of storing transaction data in the form of a distributed ledger wherein each node in the network stores a current copy of the sequence of transactions in the form of a hash chain. This requirement of storing the entire ledger incurs a high storage cost that grows undesirably large for high transaction rates and large networks. In this work we use the ideas of secret key sh… ▽ More

    Submitted 7 January, 2018; v1 submitted 20 November, 2017; originally announced November 2017.

    Comments: 19 pages, 6 figures

  32. arXiv:1704.05682  [pdf, ps, other

    cs.DS

    m-Bonsai: a Practical Compact Dynamic Trie

    Authors: Andreas Poyias, Simon J. Puglisi, Rajeev Raman

    Abstract: We consider the problem of implementing a space-efficient dynamic trie, with an emphasis on good practical performance. For a trie with $n$ nodes with an alphabet of size $σ$, the information-theoretic lower bound is $n \log σ+ O(n)$ bits. The Bonsai data structure is a compact trie proposed by Darragh et al. (Softw., Pract. Exper. 23(3), 1993, p. 277-291). Its disadvantages include the user havin… ▽ More

    Submitted 19 April, 2017; originally announced April 2017.

    Comments: Journal version of SPIRE 2015 paper by Poyias and Raman

    ACM Class: E.1; E.2; E.4; F.2.2

  33. arXiv:1701.02776  [pdf, other

    cs.IT stat.ML

    Universal Joint Image Clustering and Registration using Partition Information

    Authors: Ravi Kiran Raman, Lav R. Varshney

    Abstract: We consider the problem of universal joint clustering and registration of images and define algorithms using multivariate information functionals. We first study registering two images using maximum mutual information and prove its asymptotic optimality. We then show the shortcomings of pairwise registration in multi-image registration, and design an asymptotically optimal algorithm based on multi… ▽ More

    Submitted 30 November, 2017; v1 submitted 10 January, 2017; originally announced January 2017.

    Comments: 22 pages, 4 figures

  34. arXiv:1610.02276  [pdf, other

    cs.HC cs.IT stat.ML

    Universal Clustering via Crowdsourcing

    Authors: Ravi Kiran Raman, Lav Varshney

    Abstract: Consider unsupervised clustering of objects drawn from a discrete set, through the use of human intelligence available in crowdsourcing platforms. This paper defines and studies the problem of universal clustering using responses of crowd workers, without knowledge of worker reliability or task difficulty. We model stochastic worker response distributions by incorporating traits of memory for simi… ▽ More

    Submitted 5 October, 2016; originally announced October 2016.

  35. arXiv:1607.02865  [pdf

    q-bio.NC

    Significance of Natural Scene Statistics in Understanding the Anisotropies of Perceptual Filling-in at the Blind Spot

    Authors: Rajani Raman, Sandip Sarkar

    Abstract: Psychophysical experiments reveal our horizontal preference in perceptual filling-in at the blind spot. On the other hand, vertical preference is exhibited in the case of tolerance in filling-in. What causes this anisotropy in our perception? Building upon the general notion, that the functional properties of the early visual system are shaped by the innate specification as well as the statistics… ▽ More

    Submitted 12 January, 2017; v1 submitted 11 July, 2016; originally announced July 2016.

    Comments: 20 page, 9 figures, Abstract changed, Discussions changed, Additional results with two additional figures, Major Revision

  36. Predictive coding: A Possible Explanation of Filling-in at the blind spot

    Authors: Rajani Raman, Sandip Sarkar

    Abstract: Filling-in at the blind-spot is a perceptual phenomenon in which the visual system fills the informational void, which arises due to the absence of retinal input corresponding to the optic disc, with surrounding visual attributes. Though there are enough evidence to conclude that some kind of neural computation is involved in filling-in at the blind spot especially in the early visual cortex, the… ▽ More

    Submitted 6 July, 2015; originally announced July 2015.

    Comments: 23 pages, 9 figures

  37. arXiv:1506.04499  [pdf, other

    cs.DS

    Tree Compression with Top Trees Revisited

    Authors: Lorenz Hübschle-Schneider, Rajeev Raman

    Abstract: We revisit tree compression with top trees (Bille et al, ICALP'13) and present several improvements to the compressor and its analysis. By significantly reducing the amount of information stored and guiding the compression step using a RePair-inspired heuristic, we obtain a fast compressor achieving good compression ratios, addressing an open problem posed by Bille et al. We show how, with relativ… ▽ More

    Submitted 15 June, 2015; originally announced June 2015.

    Comments: SEA 2015

    ACM Class: F.2.2; E.2; E.4

  38. arXiv:1505.07987  [pdf, other

    cs.LO

    SEPIA: Search for Proofs Using Inferred Automata

    Authors: Thomas Gransden, Neil Walkinshaw, Rajeev Raman

    Abstract: This paper describes SEPIA, a tool for automated proof generation in Coq. SEPIA combines model inference with interactive theorem proving. Existing proof corpora are modelled using state-based models inferred from tactic sequences. These can then be traversed automatically to identify proofs. The SEPIA system is described and its performance evaluated on three Coq datasets. Our results show that S… ▽ More

    Submitted 29 May, 2015; originally announced May 2015.

    Comments: To appear at 25th International Conference on Automated Deduction

  39. arXiv:1411.0126  [pdf, other

    cs.CV

    Detection of texts in natural images

    Authors: Gowtham Rangarajan Raman

    Abstract: A framework that makes use of Connected components and supervised Support machine to recognise texts is proposed. The image is preprocessed and and edge graph is calculated using a probabilistic framework to compensate for photometric noise. Connected components over the resultant image is calculated, which is bounded and then pruned using geometric constraints. Finally a Gabor Feature based SVM i… ▽ More

    Submitted 1 November, 2014; originally announced November 2014.

  40. arXiv:1410.4963  [pdf, other

    cs.DS

    On Succinct Representations of Binary Trees

    Authors: Pooya Davoodi, Rajeev Raman, Srinivasa Rao Satti

    Abstract: We observe that a standard transformation between \emph{ordinal} trees (arbitrary rooted trees with ordered children) and binary trees leads to interesting succinct binary tree representations. There are four symmetric versions of these transformations. Via these transformations we get four succinct representations of $n$-node binary trees that use $2n + n/(\log n)^{O(1)}$ bits and support (among… ▽ More

    Submitted 18 October, 2014; originally announced October 2014.

    Comments: Journal version of part of COCOON 2012 paper

    ACM Class: F.2.2; E.2; E.4

  41. arXiv:1405.3623  [pdf, other

    cs.LO

    Mining State-Based Models from Proof Corpora

    Authors: Thomas Gransden, Neil Walkinshaw, Rajeev Raman

    Abstract: Interactive theorem provers have been used extensively to reason about various software/hardware systems and mathematical theorems. The key challenge when using an interactive prover is finding a suitable sequence of proof steps that will lead to a successful proof requires a significant amount of human intervention. This paper presents an automated technique that takes as input examples of succes… ▽ More

    Submitted 14 May, 2014; originally announced May 2014.

    Comments: To Appear at Conferences on Intelligent Computer Mathematics 2014

  42. arXiv:1403.0835  [pdf, other

    cs.CG

    QPTAS for Geometric Set-Cover Problems via Optimal Separators

    Authors: Nabil H. Mustafa, Rajiv Raman, Saurabh Ray

    Abstract: Weighted geometric set-cover problems arise naturally in several geometric and non-geometric settings (e.g. the breakthrough of Bansal-Pruhs (FOCS 2010) reduces a wide class of machine scheduling problems to weighted geometric set-cover). More than two decades of research has succeeded in settling the $(1+ε)$-approximability status for most geometric set-cover problems, except for four basic scena… ▽ More

    Submitted 5 April, 2014; v1 submitted 4 March, 2014; originally announced March 2014.

    Comments: 26 pages. Revised to include an additional set-cover QPTAS for halfspaces

  43. arXiv:1311.4394  [pdf, other

    cs.DS

    Encoding Range Minimum Queries

    Authors: Pooya Davoodi, Gonzalo Navarro, Rajeev Raman, S. Srinivasa Rao

    Abstract: We consider the problem of encoding range minimum queries (RMQs): given an array A[1..n] of distinct totally ordered values, to pre-process A and create a data structure that can answer the query RMQ(i,j), which returns the index containing the smallest element in A[i..j], without access to the array A at query time. We give a data structure whose space usage is 2n + o(n) bits, which is asymptotic… ▽ More

    Submitted 18 November, 2013; originally announced November 2013.

    Comments: 20 pages, 2 figures

  44. Electronically Driven Fragmentation of Silver Nanocrystals Revealed by Ultrafast Electron Crystallography

    Authors: Ramani K. Raman, Ryan A. Murdick, Richard J. Worhatch, Yoshie Murooka, Subhendra D. Mahanti, Tzong-Ru T. Han, Chong-Yu Ruan

    Abstract: We report an ultrafast electron diffraction study of silver nanocrystals under surface plasmon resonance excitation, leading to a concerted fragmentation. By examining simultaneously transient structural, thermal, and Coulombic signatures of the prefragmented state, an electronically driven nonthermal fragmentation scenario is proposed.

    Submitted 12 September, 2013; originally announced September 2013.

    Comments: 5 figures

    Journal ref: Physical Review Letter 104, 123401 (2010)

  45. arXiv:1204.4835  [pdf, other

    cs.DS

    Succinct Indices for Range Queries with applications to Orthogonal Range Maxima

    Authors: Arash Farzan, J. Ian Munro, Rajeev Raman

    Abstract: We consider the problem of preprocessing $N$ points in 2D, each endowed with a priority, to answer the following queries: given a axis-parallel rectangle, determine the point with the largest priority in the rectangle. Using the ideas of the \emph{effective entropy} of range maxima queries and \emph{succinct indices} for range maxima queries, we obtain a structure that uses O(N) words and answers… ▽ More

    Submitted 21 April, 2012; originally announced April 2012.

    Comments: To appear in ICALP 2012

    Report number: Leicester CS-TR-12-001

  46. arXiv:1109.2885  [pdf, ps, other

    cs.DS

    Encoding 2-D Range Maximum Queries

    Authors: Mordecai J. Golin, John Iacono, Danny Krizanc, Rajeev Raman, S. Srinivasa Rao, Sunil Shende

    Abstract: We consider the \emph{two-dimensional range maximum query (2D-RMQ)} problem: given an array $A$ of ordered values, to pre-process it so that we can find the position of the smallest element in the sub-matrix defined by a (user-specified) range of rows and range of columns. We focus on determining the \emph{effective} entropy of 2D-RMQ, i.e., how many bits are needed to encode $A$ so that 2D-RMQ qu… ▽ More

    Submitted 25 April, 2012; v1 submitted 13 September, 2011; originally announced September 2011.

    Comments: Full version of ISAAC 2011 paper

  47. arXiv:1108.2157  [pdf, ps, other

    cs.DS

    Optimal Indexes for Sparse Bit Vectors

    Authors: Alexander Golynski, Alessio Orlandi, Rajeev Raman, S. Srinivasa Rao

    Abstract: We consider the problem of supporting Rank() and Select() operations on a bit vector of length m with n 1 bits. The problem is considered in the succinct index model, where the bit vector is stored in "read-only" memory and an additional data structure, called the index, is created during pre-processing to help answer the above queries. We give asymptotically optimal density-sensitive trade-offs,… ▽ More

    Submitted 10 August, 2011; originally announced August 2011.

    Comments: Some of these results were published in preliminary form in the proceedings of SWAT 2008. There are new upper bounds not in the SWAT version, however

  48. arXiv:1108.1983  [pdf, ps, other

    cs.DS

    Succinct Representations of Permutations and Functions

    Authors: J. Ian Munro, Rajeev Raman, Venkatesh Raman, S. Srinivasa Rao

    Abstract: We investigate the problem of succinctly representing an arbitrary permutation, π, on {0,...,n-1} so that π^k(i) can be computed quickly for any i and any (positive or negative) integer power k. A representation taking (1+ε) n lg n + O(1) bits suffices to compute arbitrary powers in constant time, for any positive constant ε<= 1. A representation taking the optimal \ceil{\lg n!} + o(n) bits can be… ▽ More

    Submitted 9 August, 2011; originally announced August 2011.

    Comments: Preliminary versions of these results have appeared in the Proceedings of ICALP 2003 and 2004. However, all results in this version are improved over the earlier conference version

  49. arXiv:1006.5354  [pdf, ps, other

    cs.DS cs.IT

    Optimal Trade-Off for Succinct String Indexes

    Authors: Roberto Grossi, Alessio Orlandi, Rajeev Raman

    Abstract: Let s be a string whose symbols are solely available through access(i), a read-only operation that probes s and returns the symbol at position i in s. Many compressed data structures for strings, trees, and graphs, require two kinds of queries on s: select(c, j), returning the position in s containing the jth occurrence of c, and rank(c, p), counting how many occurrences of c are found in the firs… ▽ More

    Submitted 28 June, 2010; originally announced June 2010.

    Comments: Accepted at ICALP 2010

  50. arXiv:1001.1565  [pdf, other

    cs.DS

    Random Access to Grammar Compressed Strings

    Authors: Philip Bille, Gad M. Landau, Rajeev Raman, Kunihiko Sadakane, Srinivasa Rao Satti, Oren Weimann

    Abstract: Grammar based compression, where one replaces a long string by a small context-free grammar that generates the string, is a simple and powerful paradigm that captures many popular compression schemes. In this paper, we present a novel grammar representation that allows efficient random access to any character or substring without decompressing the string. Let $S$ be a string of length $N$ compre… ▽ More

    Submitted 29 October, 2013; v1 submitted 11 January, 2010; originally announced January 2010.

    Comments: Preliminary version in SODA 2011