Skip to main content

Showing 1–13 of 13 results for author: Sundaresan, K

.
  1. arXiv:2403.03376  [pdf, other

    cs.NI

    Scalable Network Tomography for Dynamic Spectrum Access

    Authors: Aadesh Madnaik, N. Cameron Matson, Karthikeyan Sundaresan

    Abstract: Mobile networks have increased spectral efficiency through advanced multiplexing strategies that are coordinated by base stations (BS) in licensed spectrum. However, external interference on clients leads to significant performance degradation during dynamic (unlicensed) spectrum access (DSA). We introduce the notion of network tomography for DSA, whereby clients are transformed into spectrum sens… ▽ More

    Submitted 5 March, 2024; originally announced March 2024.

    Comments: Accepted to IEEE INFOCOM 2024. 11 pages, 11 figures

    ACM Class: C.2.1; C.2.2; G.3

  2. arXiv:2310.05507  [pdf, other

    cs.AR eess.SP

    MEDUSA: Scalable Biometric Sensing in the Wild through Distributed MIMO Radars

    Authors: Yilong Li, Ramanujan K Sheshadri, Karthik Sundaresan, Eugene Chai, Suman Banerjee

    Abstract: Radar-based techniques for detecting vital signs have shown promise for continuous contactless vital sign sensing and healthcare applications. However, real-world indoor environments face significant challenges for existing vital sign monitoring systems. These include signal blockage in non-line-of-sight (NLOS) situations, movement of human subjects, and alterations in location and orientation. Ad… ▽ More

    Submitted 9 October, 2023; v1 submitted 9 October, 2023; originally announced October 2023.

    Comments: Preprint. Under Review

  3. arXiv:2310.02211  [pdf, other

    cs.NI cs.RO eess.SY

    Fast Localization and Tracking in City-Scale UWB Networks

    Authors: Nakul Garg, Irtaza Shahid, Ramanujan K Sheshadri, Karthikeyan Sundaresan, Nirupam Roy

    Abstract: Localization of networked nodes is an essential problem in emerging applications, including first-responder navigation, automated manufacturing lines, vehicular and drone navigation, asset navigation and tracking, Internet of Things and 5G communication networks. In this paper, we present Locate3D, a novel system for peer-to-peer node localization and orientation estimation in large networks. Unli… ▽ More

    Submitted 3 October, 2023; originally announced October 2023.

  4. arXiv:2207.02792  [pdf, other

    cs.RO cs.MA

    RoVaR: Robust Multi-agent Tracking through Dual-layer Diversity in Visual and RF Sensor Fusion

    Authors: Mallesham Dasari, Ramanujan K Sheshadri, Karthikeyan Sundaresan, Samir R. Das

    Abstract: The plethora of sensors in our commodity devices provides a rich substrate for sensor-fused tracking. Yet, today's solutions are unable to deliver robust and high tracking accuracies across multiple agents in practical, everyday environments - a feature central to the future of immersive and collaborative applications. This can be attributed to the limited scope of diversity leveraged by these fus… ▽ More

    Submitted 6 July, 2022; originally announced July 2022.

    Comments: 14 pages

  5. arXiv:2104.11593  [pdf

    cs.SE cs.LG

    Assessing Validity of Static Analysis Warnings using Ensemble Learning

    Authors: Anshul Tanwar, Hariharan Manikandan, Krishna Sundaresan, Prasanna Ganesan, Sathish Kumar Chandrasekaran, Sriram Ravi

    Abstract: Static Analysis (SA) tools are used to identify potential weaknesses in code and fix them in advance, while the code is being developed. In legacy codebases with high complexity, these rules-based static analysis tools generally report a lot of false warnings along with the actual ones. Though the SA tools uncover many hidden bugs, they are lost in the volume of fake warnings reported. The develop… ▽ More

    Submitted 21 April, 2021; originally announced April 2021.

  6. arXiv:2104.09225  [pdf

    cs.AI cs.SE

    Multi-context Attention Fusion Neural Network for Software Vulnerability Identification

    Authors: Anshul Tanwar, Hariharan Manikandan, Krishna Sundaresan, Prasanna Ganesan, Sathish Kumar Chandrasekaran, Sriram Ravi

    Abstract: Security issues in shipped code can lead to unforeseen device malfunction, system crashes or malicious exploitation by crackers, post-deployment. These vulnerabilities incur a cost of repair and foremost risk the credibility of the company. It is rewarding when these issues are detected and fixed well ahead of time, before release. Common Weakness Estimation (CWE) is a nomenclature describing gene… ▽ More

    Submitted 19 April, 2021; originally announced April 2021.

  7. arXiv:2104.08634  [pdf, other

    cs.RO eess.SY

    AeroTraj: Trajectory Planning for Fast, and Accurate 3D Reconstruction Using a Drone-based LiDAR

    Authors: Fawad Ahmad, Christina Shin, Rajrup Ghosh, John D'Ambrosio, Eugene Chai, Karthik Sundaresan, Ramesh Govindan

    Abstract: This paper presents AeroTraj, a system that enables fast, accurate, and automated reconstruction of 3D models of large buildings using a drone-mounted LiDAR. LiDAR point clouds can be used directly to assemble 3D models if their positions are accurately determined. AeroTraj uses SLAM for this, but must ensure complete and accurate reconstruction while minimizing drone battery usage. Doing this req… ▽ More

    Submitted 26 June, 2024; v1 submitted 17 April, 2021; originally announced April 2021.

  8. arXiv:2007.08752  [pdf, other

    cs.CV cs.LG eess.SP

    Proactive Network Maintenance using Fast, Accurate Anomaly Localization and Classification on 1-D Data Series

    Authors: **gjie Zhu, Karthik Sundaresan, Jason Rupe

    Abstract: Proactive network maintenance (PNM) is the concept of using data from a network to identify and locate network faults, many or all of which could worsen to become service failures. The separation between the network fault and the service failure affords early detection of problems in the network to allow PNM to take place. Consequently, PNM is a form of prognostics and health management (PHM). T… ▽ More

    Submitted 17 July, 2020; originally announced July 2020.

    Comments: This paper has been accepted by ICPHM 2020

  9. arXiv:2007.03600  [pdf, other

    eess.SP cs.CV cs.HC cs.LG

    Monitoring Browsing Behavior of Customers in Retail Stores via RFID Imaging

    Authors: Kamran Ali, Alex X. Liu, Eugene Chai, Karthik Sundaresan

    Abstract: In this paper, we propose to use commercial off-the-shelf (COTS) monostatic RFID devices (i.e. which use a single antenna at a time for both transmitting and receiving RFID signals to and from the tags) to monitor browsing activity of customers in front of display items in places such as retail stores. To this end, we propose TagSee, a multi-person imaging system based on monostatic RFID imaging.… ▽ More

    Submitted 7 July, 2020; originally announced July 2020.

  10. arXiv:2006.11307  [pdf, other

    cs.NI eess.SP

    SkyHaul: An Autonomous Gigabit Network Fabric in the Sky

    Authors: Ramanujan K Sheshadri, Eugene Chai, Karthikeyan Sundaresan, Sampath Rangarajan

    Abstract: We design and build SKYHAUL, the first large-scale, autonomous, self-organizing network of Unmanned Aerial Vehicles (UAVs) that are connected using a mmWave wireless mesh backhaul. While the use of a mmWave backhaul paves the way for a new class of bandwidth-intensive, latency-sensitive cooperative applications (e.g., LTE coverage during disasters, surveillance during rescue in challenging terrain… ▽ More

    Submitted 19 June, 2020; originally announced June 2020.

    Comments: 15 pages report (with 32 figures including experiment results) on a novel solution for a 5g mmWave enabled drone-network. This hasn't been published in conferences/journals yet

  11. arXiv:2004.12783  [pdf

    cs.SE cs.LG

    Predicting Vulnerability In Large Codebases With Deep Code Representation

    Authors: Anshul Tanwar, Krishna Sundaresan, Parmesh Ashwath, Prasanna Ganesan, Sathish Kumar Chandrasekaran, Sriram Ravi

    Abstract: Currently, while software engineers write code for various modules, quite often, various types of errors - coding, logic, semantic, and others (most of which are not caught by compilation and other tools) get introduced. Some of these bugs might be found in the later stage of testing, and many times it is reported by customers on production code. Companies have to spend many resources, both money… ▽ More

    Submitted 24 April, 2020; originally announced April 2020.

    Comments: 8 Pages

  12. arXiv:1802.06042  [pdf, other

    cs.NI eess.SP

    SkyLiTE: End-to-End Design of Low-Altitude UAV Networks for Providing LTE Connectivity

    Authors: Karthikeyan Sundaresan, Eugene Chai, Ayon Chakraborty, Sampath Rangarajan

    Abstract: Un-manned aerial vehicle (UAVs) have the potential to change the landscape of wide-area wireless connectivity by bringing them to areas where connectivity was sparing or non-existent (e.g. rural areas) or has been compromised due to disasters. While Google's Project Loon and Facebook's Project Aquila are examples of high-altitude, long-endurance UAV-based connectivity efforts in this direction, th… ▽ More

    Submitted 20 February, 2018; v1 submitted 16 February, 2018; originally announced February 2018.

    Report number: NEC Labs America Technical Report 2018-TR001

  13. arXiv:1501.02785  [pdf, other

    cs.NI cs.GT

    The Economics of Quality Sponsored Data in Non-Neutral Networks

    Authors: Mohammad Hassan Lotfi, Saswati Sarkar, Karthikeyan Sundaresan, Mohammad Ali Khojastepour

    Abstract: The growing demand for data has driven the Service Providers (SPs) to provide differential treatment of traffic to generate additional revenue streams from Content Providers (CPs). While SPs currently only provide best-effort services to their CPs, it is plausible to envision a model in near future, where CPs are willing to sponsor quality of service for their content in exchange of sharing a port… ▽ More

    Submitted 17 October, 2016; v1 submitted 12 January, 2015; originally announced January 2015.

    Comments: Submitted to IEEE/ACM Transaction on Networking