-
On the null space of the backprojection operator and Rubin's conjecture for the spherical mean transform
Authors:
Divyansh Agrawal,
Gaik Ambartsoumian,
Venkateswaran P. Krishnan,
Nisha Singhal
Abstract:
The spherical mean transform associates to a function $f$ its integral averages over all spheres. We consider the spherical mean transform for functions supported in the unit ball $\mathbb{B}$ in $\mathbb{R}^n$ for odd $n$, with the centers of integration spheres restricted to the unit sphere $\mathbb{S}^{n-1}$. In this setup, Rubin employed properties of Erdélyi-Kober fractional integrals and ana…
▽ More
The spherical mean transform associates to a function $f$ its integral averages over all spheres. We consider the spherical mean transform for functions supported in the unit ball $\mathbb{B}$ in $\mathbb{R}^n$ for odd $n$, with the centers of integration spheres restricted to the unit sphere $\mathbb{S}^{n-1}$. In this setup, Rubin employed properties of Erdélyi-Kober fractional integrals and analytic continuation to re-derive the explicit inversion formulas proved earlier by Finch, Patch, and Rakesh using wave equation techniques. As part of his work, Rubin stated a conjecture relating spherical mean transform, its associated backprojection operator and the Riesz potential. Furthermore, he pointed to the necessity of a detailed analysis of injectivity of the backprojection operator as a crucial step toward the resolution of his conjecture. This article addresses both questions posed by Rubin by providing a characterization of the null space of the backprojection operator, and disproving the conjecture through the construction of an explicit counterexample. Crucial to the proofs is the range characterization for the spherical mean transform in odd dimensions derived recently by the authors.
△ Less
Submitted 22 June, 2024;
originally announced June 2024.
-
A simple range characterization for spherical mean transform in odd dimensions and its applications
Authors:
Divyansh Agrawal,
Gaik Ambartsoumian,
Venkateswaran P. Krishnan,
Nisha Singhal
Abstract:
This article provides a novel and simple range description for the spherical mean transform of functions supported in the unit ball of an odd dimensional Euclidean space. The new description comprises a set of symmetry relations between the values of certain differential operators acting on the coefficients of the spherical harmonics expansion of the function in the range of the transform. As one…
▽ More
This article provides a novel and simple range description for the spherical mean transform of functions supported in the unit ball of an odd dimensional Euclidean space. The new description comprises a set of symmetry relations between the values of certain differential operators acting on the coefficients of the spherical harmonics expansion of the function in the range of the transform. As one application of this range characterization, we construct an explicit counterexample proving that unique continuation type results cannot hold for the spherical mean transform in odd dimensional spaces. Finally, as an auxiliary result of one of our proofs, we derive a remarkable cross product identity for the spherical Bessel functions of the first and second kind, which may be of independent interest in the theory of special functions.
△ Less
Submitted 22 November, 2023; v1 submitted 31 October, 2023;
originally announced October 2023.
-
Massively Multilingual ASR on 70 Languages: Tokenization, Architecture, and Generalization Capabilities
Authors:
Andros Tjandra,
Nayan Singhal,
David Zhang,
Ozlem Kalinli,
Abdelrahman Mohamed,
Duc Le,
Michael L. Seltzer
Abstract:
End-to-end multilingual ASR has become more appealing because of several reasons such as simplifying the training and deployment process and positive performance transfer from high-resource to low-resource languages. However, scaling up the number of languages, total hours, and number of unique tokens is not a trivial task. This paper explores large-scale multilingual ASR models on 70 languages. W…
▽ More
End-to-end multilingual ASR has become more appealing because of several reasons such as simplifying the training and deployment process and positive performance transfer from high-resource to low-resource languages. However, scaling up the number of languages, total hours, and number of unique tokens is not a trivial task. This paper explores large-scale multilingual ASR models on 70 languages. We inspect two architectures: (1) Shared embedding and output and (2) Multiple embedding and output model. In the shared model experiments, we show the importance of tokenization strategy across different languages. Later, we use our optimal tokenization strategy to train multiple embedding and output model to further improve our result. Our multilingual ASR achieves 13.9%-15.6% average WER relative improvement compared to monolingual models. We show that our multilingual ASR generalizes well on an unseen dataset and domain, achieving 9.5% and 7.5% WER on Multilingual Librispeech (MLS) with zero-shot and finetuning, respectively.
△ Less
Submitted 10 November, 2022;
originally announced November 2022.
-
FUSION: Fully Unsupervised Test-Time Stain Adaptation via Fused Normalization Statistics
Authors:
Nilanjan Chattopadhyay,
Shiv Gehlot,
Nitin Singhal
Abstract:
Staining reveals the micro structure of the aspirate while creating histopathology slides. Stain variation, defined as a chromatic difference between the source and the target, is caused by varying characteristics during staining, resulting in a distribution shift and poor performance on the target. The goal of stain normalization is to match the target's chromatic distribution to that of the sour…
▽ More
Staining reveals the micro structure of the aspirate while creating histopathology slides. Stain variation, defined as a chromatic difference between the source and the target, is caused by varying characteristics during staining, resulting in a distribution shift and poor performance on the target. The goal of stain normalization is to match the target's chromatic distribution to that of the source. However, stain normalisation causes the underlying morphology to distort, resulting in an incorrect diagnosis. We propose FUSION, a new method for promoting stain-adaption by adjusting the model to the target in an unsupervised test-time scenario, eliminating the necessity for significant labelling at the target end. FUSION works by altering the target's batch normalization statistics and fusing them with source statistics using a weighting factor. The algorithm reduces to one of two extremes based on the weighting factor. Despite the lack of training or supervision, FUSION surpasses existing equivalent algorithms for classification and dense predictions (segmentation), as demonstrated by comprehensive experiments on two public datasets.
△ Less
Submitted 30 August, 2022;
originally announced August 2022.
-
ADAM Challenge: Detecting Age-related Macular Degeneration from Fundus Images
Authors:
Huihui Fang,
Fei Li,
Huazhu Fu,
Xu Sun,
Xingxing Cao,
Fengbin Lin,
Jaemin Son,
Sunho Kim,
Gwenole Quellec,
Sarah Matta,
Sharath M Shankaranarayana,
Yi-Ting Chen,
Chuen-heng Wang,
Nisarg A. Shah,
Chia-Yen Lee,
Chih-Chung Hsu,
Hai Xie,
Baiying Lei,
Ujjwal Baid,
Shubham Innani,
Kang Dang,
Wenxiu Shi,
Ravi Kamble,
Nitin Singhal,
Ching-Wei Wang
, et al. (6 additional authors not shown)
Abstract:
Age-related macular degeneration (AMD) is the leading cause of visual impairment among elderly in the world. Early detection of AMD is of great importance, as the vision loss caused by this disease is irreversible and permanent. Color fundus photography is the most cost-effective imaging modality to screen for retinal disorders. Cutting edge deep learning based algorithms have been recently develo…
▽ More
Age-related macular degeneration (AMD) is the leading cause of visual impairment among elderly in the world. Early detection of AMD is of great importance, as the vision loss caused by this disease is irreversible and permanent. Color fundus photography is the most cost-effective imaging modality to screen for retinal disorders. Cutting edge deep learning based algorithms have been recently developed for automatically detecting AMD from fundus images. However, there are still lack of a comprehensive annotated dataset and standard evaluation benchmarks. To deal with this issue, we set up the Automatic Detection challenge on Age-related Macular degeneration (ADAM), which was held as a satellite event of the ISBI 2020 conference. The ADAM challenge consisted of four tasks which cover the main aspects of detecting and characterizing AMD from fundus images, including detection of AMD, detection and segmentation of optic disc, localization of fovea, and detection and segmentation of lesions. As part of the challenge, we have released a comprehensive dataset of 1200 fundus images with AMD diagnostic labels, pixel-wise segmentation masks for both optic disc and AMD-related lesions (drusen, exudates, hemorrhages and scars, among others), as well as the coordinates corresponding to the location of the macular fovea. A uniform evaluation framework has been built to make a fair comparison of different models using this dataset. During the challenge, 610 results were submitted for online evaluation, with 11 teams finally participating in the onsite challenge. This paper introduces the challenge, the dataset and the evaluation methods, as well as summarizes the participating methods and analyzes their results for each task. In particular, we observed that the ensembling strategy and the incorporation of clinical domain knowledge were the key to improve the performance of the deep learning models.
△ Less
Submitted 6 May, 2022; v1 submitted 16 February, 2022;
originally announced February 2022.
-
Transferring Voice Knowledge for Acoustic Event Detection: An Empirical Study
Authors:
Dawei Liang,
Yangyang Shi,
Yun Wang,
Nayan Singhal,
Alex Xiao,
Jonathan Shaw,
Edison Thomaz,
Ozlem Kalinli,
Mike Seltzer
Abstract:
Detection of common events and scenes from audio is useful for extracting and understanding human contexts in daily life. Prior studies have shown that leveraging knowledge from a relevant domain is beneficial for a target acoustic event detection (AED) process. Inspired by the observation that many human-centered acoustic events in daily life involve voice elements, this paper investigates the po…
▽ More
Detection of common events and scenes from audio is useful for extracting and understanding human contexts in daily life. Prior studies have shown that leveraging knowledge from a relevant domain is beneficial for a target acoustic event detection (AED) process. Inspired by the observation that many human-centered acoustic events in daily life involve voice elements, this paper investigates the potential of transferring high-level voice representations extracted from a public speaker dataset to enrich an AED pipeline. Towards this end, we develop a dual-branch neural network architecture for the joint learning of voice and acoustic features during an AED process and conduct thorough empirical studies to examine the performance on the public AudioSet [1] with different types of inputs. Our main observations are that: 1) Joint learning of audio and voice inputs improves the AED performance (mean average precision) for both a CNN baseline (0.292 vs 0.134 mAP) and a TALNet [2] baseline (0.361 vs 0.351 mAP); 2) Augmenting the extra voice features is critical to maximize the model performance with dual inputs.
△ Less
Submitted 7 October, 2021;
originally announced October 2021.
-
On lattice-free boosted MMI training of HMM and CTC-based full-context ASR models
Authors:
Xiaohui Zhang,
Vimal Manohar,
David Zhang,
Frank Zhang,
Yangyang Shi,
Nayan Singhal,
Julian Chan,
Fuchun Peng,
Yatharth Saraf,
Mike Seltzer
Abstract:
Hybrid automatic speech recognition (ASR) models are typically sequentially trained with CTC or LF-MMI criteria. However, they have vastly different legacies and are usually implemented in different frameworks. In this paper, by decoupling the concepts of modeling units and label topologies and building proper numerator/denominator graphs accordingly, we establish a generalized framework for hybri…
▽ More
Hybrid automatic speech recognition (ASR) models are typically sequentially trained with CTC or LF-MMI criteria. However, they have vastly different legacies and are usually implemented in different frameworks. In this paper, by decoupling the concepts of modeling units and label topologies and building proper numerator/denominator graphs accordingly, we establish a generalized framework for hybrid acoustic modeling (AM). In this framework, we show that LF-MMI is a powerful training criterion applicable to both limited-context and full-context models, for wordpiece/mono-char/bi-char/chenone units, with both HMM/CTC topologies. From this framework, we propose three novel training schemes: chenone(ch)/wordpiece(wp)-CTC-bMMI, and wordpiece(wp)-HMM-bMMI with different advantages in training performance, decoding efficiency and decoding time-stamp accuracy. The advantages of different training schemes are evaluated comprehensively on Librispeech, and wp-CTC-bMMI and ch-CTC-bMMI are evaluated on two real world ASR tasks to show their effectiveness. Besides, we also show bi-char(bc) HMM-MMI models can serve as better alignment models than traditional non-neural GMM-HMMs.
△ Less
Submitted 26 September, 2021; v1 submitted 8 July, 2021;
originally announced July 2021.
-
A Multi-View Approach To Audio-Visual Speaker Verification
Authors:
Leda Sarı,
Kritika Singh,
Jiatong Zhou,
Lorenzo Torresani,
Nayan Singhal,
Yatharth Saraf
Abstract:
Although speaker verification has conventionally been an audio-only task, some practical applications provide both audio and visual streams of input. In these cases, the visual stream provides complementary information and can often be leveraged in conjunction with the acoustics of speech to improve verification performance. In this study, we explore audio-visual approaches to speaker verification…
▽ More
Although speaker verification has conventionally been an audio-only task, some practical applications provide both audio and visual streams of input. In these cases, the visual stream provides complementary information and can often be leveraged in conjunction with the acoustics of speech to improve verification performance. In this study, we explore audio-visual approaches to speaker verification, starting with standard fusion techniques to learn joint audio-visual (AV) embeddings, and then propose a novel approach to handle cross-modal verification at test time. Specifically, we investigate unimodal and concatenation based AV fusion and report the lowest AV equal error rate (EER) of 0.7% on the VoxCeleb1 dataset using our best system. As these methods lack the ability to do cross-modal verification, we introduce a multi-view model which uses a shared classifier to map audio and video into the same space. This new approach achieves 28% EER on VoxCeleb1 in the challenging testing condition of cross-modal verification.
△ Less
Submitted 11 February, 2021;
originally announced February 2021.
-
Histopathological Stain Transfer using Style Transfer Network with Adversarial Loss
Authors:
Harshal Nishar,
Nikhil Chavanke,
Nitin Singhal
Abstract:
Deep learning models that are trained on histopathological images obtained from a single lab and/or scanner give poor inference performance on images obtained from another scanner/lab with a different staining protocol. In recent years, there has been a good amount of research done for image stain normalization to address this issue. In this work, we present a novel approach for the stain normaliz…
▽ More
Deep learning models that are trained on histopathological images obtained from a single lab and/or scanner give poor inference performance on images obtained from another scanner/lab with a different staining protocol. In recent years, there has been a good amount of research done for image stain normalization to address this issue. In this work, we present a novel approach for the stain normalization problem using fast neural style transfer coupled with adversarial loss. We also propose a novel stain transfer generator network based on High-Resolution Network (HRNet) which requires less training time and gives good generalization with few paired training images of reference stain and test stain. This approach has been tested on Whole Slide Images (WSIs) obtained from 8 different labs, where images from one lab were treated as a reference stain. A deep learning model was trained on this stain and the rest of the images were transferred to it using the corresponding stain transfer generator network. Experimentation suggests that this approach is able to successfully perform stain normalization with good visual quality and provides better inference performance compared to not applying stain normalization.
△ Less
Submitted 6 October, 2020;
originally announced October 2020.
-
Generator Contingency Modeling in Electric Energy Markets: Derivation of Prices via Duality Theory
Authors:
N. G. Singhal,
J. Kwon,
K. W. Hedman
Abstract:
Traditional electric energy markets do not explicitly model generator contingencies. To improve the representation of resources and to enhance the modeling of uncertainty, existing markets are moving in the direction of including generator contingencies and remedial action schemes within market auction models explicitly. This research contributes to the market design realm by providing detailed an…
▽ More
Traditional electric energy markets do not explicitly model generator contingencies. To improve the representation of resources and to enhance the modeling of uncertainty, existing markets are moving in the direction of including generator contingencies and remedial action schemes within market auction models explicitly. This research contributes to the market design realm by providing detailed analysis of impending changes, it provides insightful guidance in understanding the market implications, and it provides recommendations on necessary changes to ensure a fair and transparent market structure. A primal (and the corresponding dual) formulation that accounts for the proposed changes to the auction model is provided to enable a theoretical analysis of the anticipated changes including the effect on market prices, settlements, and revenues. The derivation of the prices and the dual formulation are based on leveraging duality theory from linear optimization theory. A comparison to existing market structures is also included. The primary impact of the proposed changes includes the addition of a new congestion component within the traditional locational marginal price, which reflects the influence of congestion during the post-contingency states for the modeled critical generator contingencies.
△ Less
Submitted 5 October, 2019;
originally announced October 2019.
-
An Exploration of User and Bystander Attitudes About Mobile Live-Streaming Video
Authors:
Cori Faklaris,
Asa Blevins,
Matthew O'Haver,
Neha Singhal,
Francesco Cafaro
Abstract:
Thanks to mobile apps such as Periscope and Facebook Live, live-streaming video is having a moment again. It has not been clear, however, to what extent the current ubiquity of smartphones is impacting this technology's acceptance in everyday social situations and how mobile contexts or affordances will affect and be affected by shifts in social norms and policy debates regarding privacy, surveill…
▽ More
Thanks to mobile apps such as Periscope and Facebook Live, live-streaming video is having a moment again. It has not been clear, however, to what extent the current ubiquity of smartphones is impacting this technology's acceptance in everyday social situations and how mobile contexts or affordances will affect and be affected by shifts in social norms and policy debates regarding privacy, surveillance and intellectual property. This ethnographic-style research explores familiarity with and attitudes about mobile live-streaming video and related legal and ethical issues among a sample of "Middle America" participants at two typical outdoor social events: sports tailgating and a rooftop party. In situ observations of n=110 bystanders to the use of a smartphone, including interviews with n=20, revealed that many are not fully aware of when their image or speech is being live-streamed in a casual context and want stronger notifications of and ability to consent to such broadcasting.
△ Less
Submitted 18 February, 2019;
originally announced February 2019.
-
A Simple and Practical Concurrent Non-blocking Unbounded Graph with Reachability Queries
Authors:
Bapi Chatterjee,
Sathya Peri,
Muktikanta Sa,
Nandini Singhal
Abstract:
Graph algorithms applied in many applications, including social networks, communication networks, VLSI design, graphics, and several others, require dynamic modifications -- addition and removal of vertices and/or edges -- in the graph. This paper presents a novel concurrent non-blocking algorithm to implement a dynamic unbounded directed graph in a shared-memory machine. The addition and removal…
▽ More
Graph algorithms applied in many applications, including social networks, communication networks, VLSI design, graphics, and several others, require dynamic modifications -- addition and removal of vertices and/or edges -- in the graph. This paper presents a novel concurrent non-blocking algorithm to implement a dynamic unbounded directed graph in a shared-memory machine. The addition and removal operations of vertices and edges are lock-free. For a finite sized graph, the lookup operations are wait-free. Most significant component of the presented algorithm is the reachability query in a concurrent graph. The reachability queries in our algorithm are obstruction-free and thus impose minimal additional synchronization cost over other operations. We prove that each of the data structure operations are linearizable. We extensively evaluate a sample C/C++ implementation of the algorithm through a number of micro-benchmarks. The experimental results show that the proposed algorithm scales well with the number of threads and on an average provides 5 to 7x performance improvement over a concurrent graph implementation using coarse-grained locking.
△ Less
Submitted 14 January, 2019; v1 submitted 4 September, 2018;
originally announced September 2018.
-
Video Compression through Image Interpolation
Authors:
Chao-Yuan Wu,
Nayan Singhal,
Philipp Krähenbühl
Abstract:
An ever increasing amount of our digital communication, media consumption, and content creation revolves around videos. We share, watch, and archive many aspects of our lives through them, all of which are powered by strong video compression. Traditional video compression is laboriously hand designed and hand optimized. This paper presents an alternative in an end-to-end deep learning codec. Our c…
▽ More
An ever increasing amount of our digital communication, media consumption, and content creation revolves around videos. We share, watch, and archive many aspects of our lives through them, all of which are powered by strong video compression. Traditional video compression is laboriously hand designed and hand optimized. This paper presents an alternative in an end-to-end deep learning codec. Our codec builds on one simple idea: Video compression is repeated image interpolation. It thus benefits from recent advances in deep image interpolation and generation. Our deep video codec outperforms today's prevailing codecs, such as H.261, MPEG-4 Part 2, and performs on par with H.264.
△ Less
Submitted 18 April, 2018;
originally announced April 2018.
-
A Two-Parameter Model for Ultrasonic Tissue Characterization with Harmonic Imaging
Authors:
Kajoli Banerjee Krishnan,
Nithin Nagaraj,
Nitin Singhal,
Shalini Thapar,
Komal Yadav
Abstract:
Over the past few decades, researchers have developed several approaches such as the Reference Phantom Method (RPM) to estimate ultrasound attenuation coefficient (AC) and backscatter coefficient (BSC). AC and BSC can help to discriminate pathology from normal tissue during in-vivo imaging. In this paper, we propose a new RPM model to simultaneously compute AC and BSC for harmonic imaging and a no…
▽ More
Over the past few decades, researchers have developed several approaches such as the Reference Phantom Method (RPM) to estimate ultrasound attenuation coefficient (AC) and backscatter coefficient (BSC). AC and BSC can help to discriminate pathology from normal tissue during in-vivo imaging. In this paper, we propose a new RPM model to simultaneously compute AC and BSC for harmonic imaging and a normalized score that combines the two parameters as a measure of disease progression. The model utilizes the spectral difference between two regions of interest, the first, a proximal, close to the probe and second, a distal, away from the probe. We have implemented an algorithm based on the model and shown that it provides accurate and stable estimates to within 5% of AC and BSC for simulated received echo from post-focal depths of a homogeneous liver-like medium. For practical applications with time gain and time frequency compensated in-phase and quadrature (IQ) data from ultrasound scanner, the method has been approximated and generalized to estimate AC and BSC for tissue layer underlying a more attenuative subcutaneous layer. The angular spectrum approach for ultrasound propagation in biological tissue is employed as a virtual Reference Phantom (VRP). The VRP is calibrated with a fixed probe and scanning protocol for application to liver tissue. In a feasibility study with 16 subjects, the method is able to separate 9/11 cases of progressive non-alcoholic fatty liver disease from 5 normal. In particular, it is able to separate 4/5 cases of non-alcoholic steato-hepatitis and early fibrosis (F<=2) from normal tissue. More extensive clinical studies are needed to assess the full capability of this model for screening and monitoring disease progression in liver and other tissues.
△ Less
Submitted 10 December, 2017;
originally announced December 2017.
-
Building Efficient Concurrent Graph Object through Composition of List-based Set
Authors:
Sathya Peri,
Muktikanta Sa,
Nandini Singhal
Abstract:
In this paper, we propose a generic concurrent directed graph (for shared memory architecture) that is concurrently being updated by threads adding/deleting vertices and edges. The graph is constructed by the composition of the well known concurrent list-based set data-structure from the literature. Our construction is generic, in the sense that it can be used to obtain various progress guarantees…
▽ More
In this paper, we propose a generic concurrent directed graph (for shared memory architecture) that is concurrently being updated by threads adding/deleting vertices and edges. The graph is constructed by the composition of the well known concurrent list-based set data-structure from the literature. Our construction is generic, in the sense that it can be used to obtain various progress guarantees, depending on the granularity of the underlying concurrent set implementation - either blocking or non-blocking. We prove that the proposed construction is linearizable by identifying its linearization points. Finally, we compare the performance of all the variants of the concurrent graph data-structure along with its sequential implementation. We observe that our concurrent graph data-structure mimics the performance of the concurrent list based set.
△ Less
Submitted 31 October, 2017; v1 submitted 20 October, 2017;
originally announced October 2017.
-
Proving Correctness of Concurrent Objects by Validating Linearization Points
Authors:
Sathya Peri,
Muktikanta Sa,
Ajay Singh,
Nandini Singhal,
Archit Somani
Abstract:
Concurrent data structures or CDS such as concurrent stacks, queues, sets etc. have become very popular in the past few years partly due to the rise of multi-core systems. But one of the greatest challenges with CDSs has been develo** correct structures and then proving the correctness of these structures. We believe that techniques that help prove the correctness of these CDSs can also guide in…
▽ More
Concurrent data structures or CDS such as concurrent stacks, queues, sets etc. have become very popular in the past few years partly due to the rise of multi-core systems. But one of the greatest challenges with CDSs has been develo** correct structures and then proving the correctness of these structures. We believe that techniques that help prove the correctness of these CDSs can also guide in develo** new CDSs. An intuitive technique to prove the correctness of CDSs is using Linearization Points or LPs. An LP is an atomic event in the execution interval of each method such that the execution of the entire method seems to have taken place in the instant of that event. One of the main challenges with the LP based approach is to identify the correct LPs of a CDS. Identifying the correct LPs can be deceptively wrong in many cases. In fact, in many cases, the LP identified or even worse the CDS itself could be wrong. To address these issues, several automatic tools for verifying linearizability have been developed. But we believe that these tools don't provide insight to a programmer to develop the correct concurrent programs or identify the LPs. Considering the complexity of develo** a CDS and verifying its correctness, we address the most basic problem of this domain in this paper: given the set of LPs of a CDS, how to show its correctness? We assume that we are given a CDS and its LPs. We have developed a hand-crafted technique of proving the correctness of the CDS by validating its LPs. As observed earlier, identifying the correct LPs is very tricky and erroneous. But since our technique is hand-crafted, we believe that the process of proving correctness might provide insight to identify the correct LPs, if the currently chosen LP is incorrect. We also believe that this technique might also offer the programmer some insight to develop more efficient variants of the CDS.
△ Less
Submitted 7 June, 2018; v1 submitted 8 May, 2017;
originally announced May 2017.
-
A Pragmatic Non-Blocking Concurrent Directed Acyclic Graph
Authors:
Sathya Peri,
Muktikanta Sa,
Nandini Singhal
Abstract:
In this paper, we have developed two algorithms for maintaining acyclicity in a concurrent directed graph. The first algorithm is based on a wait-free reachability query and the second one is based on partial snapshot-based obstruction-free reachability query. Interestingly, we are able to achieve the acyclic property in the dynamic setting without the need of hel** using descriptors by other th…
▽ More
In this paper, we have developed two algorithms for maintaining acyclicity in a concurrent directed graph. The first algorithm is based on a wait-free reachability query and the second one is based on partial snapshot-based obstruction-free reachability query. Interestingly, we are able to achieve the acyclic property in the dynamic setting without the need of hel** using descriptors by other threads or clean double collect mechanism. We present a proof to show that the graph remains acyclic at all times in the concurrent setting. We also prove that the acyclic graph data-structure operations are linearizable. We implement both the algorithms in C++ and test through a number of micro-benchmarks. Our experimental results show an average of 7x improvement over the sequential and global lock implementation.
△ Less
Submitted 11 May, 2019; v1 submitted 11 November, 2016;
originally announced November 2016.
-
Multi-threaded Graph Coloring Algorithm for Shared Memory Architecture
Authors:
Nandini Singhal,
Sathya Peri,
Subrahmanyam Kalyanasundaram
Abstract:
In this paper, we present multi-threaded algorithms for graph coloring suitable to the shared memory programming model. We modify an existing algorithm widely used in the literature and prove the correctness of the modified algorithm. We also propose a new approach to solve the problem of coloring using locks. Using datasets from real world graphs, we evaluate the performance of the algorithms on…
▽ More
In this paper, we present multi-threaded algorithms for graph coloring suitable to the shared memory programming model. We modify an existing algorithm widely used in the literature and prove the correctness of the modified algorithm. We also propose a new approach to solve the problem of coloring using locks. Using datasets from real world graphs, we evaluate the performance of the algorithms on the Intel platform. We compare the performance of the sequential approach v/s our proposed approach and analyze the speedup obtained against the existing algorithm from the literature. The results show that the speedup obtained is consequential. We also provide a direction for future work towards improving the performance further in terms of different metrics.
△ Less
Submitted 4 October, 2015; v1 submitted 28 September, 2015;
originally announced September 2015.
-
Managing Congestion Control in Mobile AD-HOC Network Using Mobile Agents
Authors:
Ashish Kumar Mourya,
Niraj Singhal
Abstract:
In mobile adhoc networks, congestion occurs with limited resources. The standard TCP congestion control mechanism is not able to handle the special properties of a shared wireless channel. TCP congestion control works very well on the Internet. But mobile adhoc networks exhibit some unique properties that greatly affect the design of appropriate protocols and protocol stacks in general, and of con…
▽ More
In mobile adhoc networks, congestion occurs with limited resources. The standard TCP congestion control mechanism is not able to handle the special properties of a shared wireless channel. TCP congestion control works very well on the Internet. But mobile adhoc networks exhibit some unique properties that greatly affect the design of appropriate protocols and protocol stacks in general, and of congestion control mechanism in particular. As it turned out, the vastly differing environment in a mobile adhoc network is highly problematic for standard TCP. Many approaches have been proposed to overcome these difficulties. Mobile agent based congestion control Technique is proposed to avoid congestion in adhoc network. When mobile agent travels through the network, it can select a less-loaded neighbor node as its next hop and update the routing table according to the node congestion status. With the aid of mobile agents, the nodes can get the dynamic network topology in time. In this paper, a mobile agent based congestion control mechanism is presented.
△ Less
Submitted 20 January, 2014;
originally announced January 2014.
-
Case Tool: Fast Interconnections with New 3-Disjoint Paths MIN Simulation Module
Authors:
Ravi Rastogi,
Amit Singh,
Nikhil Singhal,
Nitin,
Durg Singh Chauhan
Abstract:
Multi-stage interconnection networks (MIN) can be designed to achieve fault tolerance and collision solving by providing a set of disjoint paths. In this paper, we are discussing the new simulator added to the tool designed for develo** fault tolerant MINs. The designed tool is one of its own kind and will help the user in develo** 2 and 3-disjoint path networks. The java technology has been u…
▽ More
Multi-stage interconnection networks (MIN) can be designed to achieve fault tolerance and collision solving by providing a set of disjoint paths. In this paper, we are discussing the new simulator added to the tool designed for develo** fault tolerant MINs. The designed tool is one of its own kind and will help the user in develo** 2 and 3-disjoint path networks. The java technology has been used to design the tool and have been tested on different software platform.
△ Less
Submitted 3 February, 2012;
originally announced February 2012.