Skip to main content

Showing 1–50 of 62 results for author: Viswanathan, M

.
  1. arXiv:2405.12104  [pdf, ps, other

    cs.CR cs.LO

    Deciding branching hyperproperties for real time systems

    Authors: Nabarun Deka, Minjian Zhang, Rohit Chadha, Mahesh Viswanathan

    Abstract: Security properties of real-time systems often involve reasoning about hyper-properties, as opposed to properties of single executions or trees of executions. These hyper-properties need to additionally be expressive enough to reason about real-time constraints. Examples of such properties include information flow, side channel attacks and service-level agreements. In this paper we study computati… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

  2. arXiv:2311.01683  [pdf

    physics.med-ph cs.LG

    Amide Proton Transfer (APT) imaging in tumor with a machine learning approach using partially synthetic data

    Authors: Malvika Viswanathan, Leqi Yin, Yashwant Kurmi, Zhongliang Zu

    Abstract: Machine learning (ML) has been increasingly used to quantify chemical exchange saturation transfer (CEST) effect. ML models are typically trained using either measured data or fully simulated data. However, training with measured data often lacks sufficient training data, while training with fully simulated data may introduce bias due to limited simulations pools. This study introduces a new platf… ▽ More

    Submitted 13 December, 2023; v1 submitted 2 November, 2023; originally announced November 2023.

    Comments: Updated Supporting Information typos

  3. arXiv:2310.04288  [pdf, other

    eess.SY cs.AI cs.FL

    Searching for Optimal Runtime Assurance via Reachability and Reinforcement Learning

    Authors: Kristina Miller, Christopher K. Zeitler, William Shen, Kerianne Hobbs, Sayan Mitra, John Schierman, Mahesh Viswanathan

    Abstract: A runtime assurance system (RTA) for a given plant enables the exercise of an untrusted or experimental controller while assuring safety with a backup (or safety) controller. The relevant computational design problem is to create a logic that assures safety by switching to the safety controller as needed, while maximizing some performance criteria, such as the utilization of the untrusted controll… ▽ More

    Submitted 6 October, 2023; originally announced October 2023.

  4. arXiv:2309.06615  [pdf, other

    cs.CR cs.FL cs.LO cs.PL

    Deciding Differential Privacy of Online Algorithms with Multiple Variables

    Authors: Rohit Chadha, A. Prasad Sistla, Mahesh Viswanathan, Bishnu Bhusal

    Abstract: We consider the problem of checking the differential privacy of online randomized algorithms that process a stream of inputs and produce outputs corresponding to each input. This paper generalizes an automaton model called DiP automata (See arXiv:2104.14519) to describe such algorithms by allowing multiple real-valued storage variables. A DiP automaton is a parametric automaton whose behavior depe… ▽ More

    Submitted 12 September, 2023; originally announced September 2023.

    ACM Class: D.2.4; F.3.1

  5. arXiv:2306.04585  [pdf, other

    cs.LO

    RTAEval: A framework for evaluating runtime assurance logic

    Authors: Kristina Miller, Christopher K. Zeitler, William Shen, Mahesh Viswanathan, Sayan Mitra

    Abstract: Runtime assurance (RTA) addresses the problem of kee** an autonomous system safe while using an untrusted (or experimental) controller. This can be done via logic that explicitly switches between the untrusted controller and a safety controller, or logic that filters the input provided by the untrusted controller. While several tools implement specific instances of RTAs, there is currently no fr… ▽ More

    Submitted 5 June, 2023; originally announced June 2023.

  6. A fermionic path integral for exact enumeration of polygons on the simple cubic lattice

    Authors: G. M. Viswanathan

    Abstract: Enumerating polygons on regular lattices is a classic problem in rigorous statistical mechanics. The goal of enumerating polygons on the square lattice via fermionic path integration was achieved using a free-fermion quadratic action in the late 1970s. Given that polygon edges only link 2 vertices, it is considered plausible, if not natural, that an action of degree 2 in the Grassmann variables mi… ▽ More

    Submitted 7 June, 2023; v1 submitted 26 May, 2023; originally announced May 2023.

    Comments: Submitted to Physical Review B

  7. arXiv:2304.03692  [pdf, other

    cs.PL cs.LO

    Sound Dynamic Deadlock Prediction in Linear Time

    Authors: Hünkar Can Tunç, Umang Mathur, Andreas Pavlogiannis, Mahesh Viswanathan

    Abstract: Deadlocks are one of the most notorious concurrency bugs, and significant research has focused on detecting them efficiently. Dynamic predictive analyses work by observing concurrent executions, and reason about alternative interleavings that can witness concurrency bugs. Such techniques offer scalability and sound bug reports, and have emerged as an effective approach for concurrency bug detectio… ▽ More

    Submitted 25 June, 2023; v1 submitted 7 April, 2023; originally announced April 2023.

  8. arXiv:2301.11521  [pdf, ps, other

    cs.LO cs.CR cs.FL

    Stack-Aware Hyperproperties

    Authors: Ali Bajwa, Minjian Zhang, Rohit Chadha, Mahesh Viswanathan

    Abstract: A hyperproperty relates executions of a program and is used to formalize security objectives such as confidentiality, non-interference, privacy, and anonymity. Formally, a hyperproperty is a collection of allowable sets of executions. A program violates a hyperproperty if the set of its executions is not in the collection specified by the hyperproperty. The logic HyperCTL^* has been proposed in th… ▽ More

    Submitted 26 January, 2023; originally announced January 2023.

    ACM Class: D.2.4; F.4.1

  9. arXiv:2207.14209  [pdf, other

    stat.AP

    Information parity on cortical functional brain networks increases under psychedelic influences

    Authors: Aline Viol, Gandhi M. Viswanathan, Oleksandra Soldatkina, Fernanda Palhano-Fontes, Heloisa Onias, Draulio de Araujo, Philipp Hoevel

    Abstract: The physical basis of consciousness is one of the most intriguing open questions that contemporary science aims to solve. By approaching the brain as an interactive information system, complex network theory has greatly contributed to understand brain process in different states of mind. We study an non-ordinary state of mind by comparing resting-state functional brain networks of individuals in t… ▽ More

    Submitted 28 July, 2022; originally announced July 2022.

    Comments: 9 pages 3 figures

  10. arXiv:2205.12357  [pdf, ps, other

    cond-mat.stat-mech

    What does it take to solve the 3D Ising model? Minimal necessary conditions for a valid solution

    Authors: G. M. Viswanathan, M. A. G. Portillo, E. P. Raposo, M. G. E. da Luz

    Abstract: Exact solution of the Ising model on the simple cubic lattice is one of the long-standing open problems in rigorous statistical mechanics. Indeed, it is generally believed that settling it would constitute a methodological breakthrough, fomenting great prospects for further application, similarly to what happened when Lars Onsager solved the two dimensional model eighty years ago. Hence, there hav… ▽ More

    Submitted 9 October, 2022; v1 submitted 24 May, 2022; originally announced May 2022.

    Comments: 8 pages, minor corrections

  11. arXiv:2201.06325  [pdf, other

    cs.LO cs.DC cs.SE

    A Tree Clock Data Structure for Causal Orderings in Concurrent Executions

    Authors: Umang Mathur, Andreas Pavlogiannis, Hünkar Can Tunç, Mahesh Viswanathan

    Abstract: Dynamic techniques are a scalable and effective way to analyze concurrent programs. Instead of analyzing all behaviors of a program, these techniques detect errors by focusing on a single program execution. Often a crucial step in these techniques is to define a causal ordering between events in the execution, which is then computed using vector clocks, a simple data structure that stores logical… ▽ More

    Submitted 17 January, 2022; originally announced January 2022.

  12. arXiv:2201.02271  [pdf, other

    cond-mat.stat-mech

    Numerical studies for an ab initio investigation into the Boltzmann prescription in statistical mechanics of large systems

    Authors: V. Dossetti, G. M. Viswanathan, V. M. Kenkre

    Abstract: We present numerical investigations into the question of the validity of the Boltzmann prescription in Statistical Mechanics for large systems, addressing the issue of whether extensivity of energy implies the extensivity of the Boltzmann entropy. The importance of the question stems from the fact that it is currently considered open by some investigators but quite settled by others. We report ab… ▽ More

    Submitted 6 January, 2022; originally announced January 2022.

    Comments: 13 pages, 4 figures

  13. Proof Blocks: Autogradable Scaffolding Activities for Learning to Write Proofs

    Authors: Seth Poulsen, Mahesh Viswanathan, Geoffrey L. Herman, Matthew West

    Abstract: Proof Blocks is a software tool which enables students to write proofs by dragging and drop** prewritten proof lines into the correct order. These proofs can be graded completely automatically, enabling students to receive rapid feedback on how they are doing with their proofs. When constructing a problem, the instructor specifies the dependency graph of the lines of the proof, so that any corre… ▽ More

    Submitted 4 May, 2022; v1 submitted 7 June, 2021; originally announced June 2021.

    Journal ref: Proceedings of the 27th ACM Conference on Innovation and Technology in Computer Science Education Vol 1 (ITiCSE 2022)

  14. arXiv:2106.06879  [pdf, other

    cond-mat.stat-mech cond-mat.dis-nn

    Spectrum of the tight-binding model on Cayley Trees and comparison with Bethe Lattices

    Authors: M. Ostilli, Claudionor G. Bezerra, G. M. Viswanathan

    Abstract: There are few exactly solvable lattice models and even fewer solvable quantum lattice models. Here we address the problem of finding the spectrum of the tight-binding model (equivalently, the spectrum of the adjacency matrix) on Cayley trees. Recent approaches to the problem have relied on the similarity between Cayley tree and the Bethe lattice. Here, we avoid to make any ansatz related to the Be… ▽ More

    Submitted 18 March, 2022; v1 submitted 12 June, 2021; originally announced June 2021.

    Comments: 17 pages, 5 figures

    MSC Class: G.2.2; F.2.1

    Journal ref: Phys. Rev. E 105, 034123 (2022)

  15. arXiv:2106.05379  [pdf, other

    physics.data-an cond-mat.stat-mech

    Threshold-free estimation of entropy from a Pearson matrix

    Authors: H. Felippe, A. Viol, D. B. de Araujo, M. G. E. da Luz, F. Palhano-Fontes, H. Onias, E. P. Raposo, G. M. Viswanathan

    Abstract: There is demand in diverse fields for a reliable method of estimating the entropy associated with correlations. The estimation of a unique entropy directly from the Pearson correlation matrix has remained an open problem for more than half a century. All existing approaches lack generality insofar as they require thresholding choices that arbitrarily remove possibly important information. Here we… ▽ More

    Submitted 6 February, 2023; v1 submitted 9 June, 2021; originally announced June 2021.

    Comments: 12 pages, 6 figures

    Journal ref: EPL 141 31003 (2023)

  16. arXiv:2104.14519  [pdf, ps, other

    cs.CR cs.FL cs.LO cs.PL

    On Linear Time Decidability of Differential Privacy for Programs with Unbounded Inputs

    Authors: Rohit Chadha, A. Prasad Sistla, Mahesh Viswanathan

    Abstract: We introduce an automata model for describing interesting classes of differential privacy mechanisms/algorithms that include known mechanisms from the literature. These automata can model algorithms whose inputs can be an unbounded sequence of real-valued query answers. We consider the problem of checking whether there exists a constant $d$ such that the algorithm described by these automata are… ▽ More

    Submitted 29 April, 2021; originally announced April 2021.

    Comments: An extended abstract to be published in 36th Annual IEEE Symposium on Logic in Computer Science (LICS 2021)

  17. arXiv:2104.03430  [pdf, ps, other

    cond-mat.stat-mech

    The double hypergeometric series for the partition function of the 2D anisotropic Ising model

    Authors: Gandhimohan M. Viswanathan

    Abstract: In 1944 Lars Onsager published the exact partition function of the ferromagnetic Ising model on the infinite square lattice in terms of a definite integral. Only in the literature of the last decade, however, has it been recast in terms of special functions. Until now all known formulas for the partition function in terms of special functions have been restricted to the important special case of t… ▽ More

    Submitted 26 June, 2021; v1 submitted 7 April, 2021; originally announced April 2021.

    Comments: 13 pages, submitted for publication

    Journal ref: J. Stat. Mech. (2021) 073104

  18. arXiv:2103.10865  [pdf, other

    cond-mat.stat-mech physics.bio-ph

    Comment on "Inverse Square Lévy Walks are not Optimal Search Strategies for d $\geq$ 2" [Phys. Rev. Lett. 124, 080601 (2020)]

    Authors: S. V. Buldyrev, E. P. Raposo, F. Bartumeus, S. Havlin, F. R. Rusch, M. G. E. da Luz, G. M. Viswanathan

    Abstract: It is widely accepted that inverse square Lévy walks are optimal search strategies because they maximize the encounter rate with sparse, randomly distributed, replenishable targets when the search restarts in the vicinity of the previously visited target, which becomes revisitable again with high probability, i.e., non-destructive foraging [Nature 401, 911 (1999)]. The precise conditions for the v… ▽ More

    Submitted 22 March, 2021; v1 submitted 19 March, 2021; originally announced March 2021.

    Journal ref: Physical Review Letters 126, 048901 (2021)

  19. arXiv:2011.06404  [pdf, ps, other

    cs.CR cs.PL

    Deciding Accuracy of Differential Privacy Schemes

    Authors: Gilles Barthe, Rohit Chadha, Paul Krogmeier, A. Prasad Sistla, Mahesh Viswanathan

    Abstract: Differential privacy is a mathematical framework for develo** statistical computations with provable guarantees of privacy and accuracy. In contrast to the privacy component of differential privacy, which has a clear mathematical and intuitive meaning, the accuracy component of differential privacy does not have a generally accepted definition; accuracy claims of differential privacy algorithms… ▽ More

    Submitted 12 November, 2020; originally announced November 2020.

    ACM Class: F.3.1

  20. arXiv:2010.16385  [pdf, other

    cs.PL

    Optimal Prediction of Synchronization-Preserving Races

    Authors: Umang Mathur, Andreas Pavlogiannis, Mahesh Viswanathan

    Abstract: Concurrent programs are notoriously hard to write correctly, as scheduling nondeterminism introduces subtle errors that are both hard to detect and to reproduce. The most common concurrency errors are (data) races, which occur when memory-conflicting actions are executed concurrently. Consequently, considerable effort has been made towards develo** efficient techniques for race detection. The mo… ▽ More

    Submitted 30 October, 2020; originally announced October 2020.

  21. arXiv:2009.07649  [pdf, other

    math.OC eess.SY

    Verifying Stochastic Hybrid Systems with Temporal Logic Specifications via Model Reduction

    Authors: Yu Wang, Nima Roohi, Matthew West, Mahesh Viswanathan, Geir E. Dullerud

    Abstract: We present a scalable methodology to verify stochastic hybrid systems. Using the Mori-Zwanzig reduction method, we construct a finite state Markov chain reduction of a given stochastic hybrid system and prove that this reduced Markov chain is approximately equivalent to the original system in a distributional sense. Approximate equivalence of the stochastic hybrid system and its Markov chain reduc… ▽ More

    Submitted 16 September, 2020; originally announced September 2020.

  22. arXiv:2009.03978  [pdf, other

    astro-ph.SR astro-ph.EP

    Eclipse timing variation of GK Vir: evidence of a possible Jupiter-like planet in a circumbinary orbit

    Authors: Leonardo A. Almeida, Elielson S. Pereira, Gislene M. Borges, Augusto Damineli, Tatiana A. Michtchenko, Gandhi M. Viswanathan

    Abstract: Eclipse timing variation analysis has become a powerful method to discover planets around binary systems. We applied this technique to investigate the eclipse times of GK Vir. This system is a post-common envelope binary with an orbital period of 8.26 h. Here, we present 10 new eclipse times obtained between 2013 and 2020. We calculated the O-C diagram using a linear ephemeris and verified a clear… ▽ More

    Submitted 8 September, 2020; originally announced September 2020.

    Comments: 9 pages, 5 Figures, 3 tables. Published online by MNRAS on August 05, 2020

    Journal ref: MNRAS 497 4022-4029 (2020)

  23. arXiv:2006.00378  [pdf, ps, other

    cond-mat.stat-mech hep-th

    The connection between Jackson and Hausdorff derivatives in the context of generalized statistical mechanics

    Authors: Andre A. Marinho, G. M. Viswanathan, Francisco A. Brito, C. G. Bezerra

    Abstract: In literature one can find many generalizations of the usual Leibniz derivative, such as Jackson derivative, Tsallis derivative and Hausdorff derivative. In this article we present a connection between Jackson derivative and recently proposed Hausdorff derivative. On one hand, the Hausdorff derivative has been previously associated with non-extensivity in systems presenting fractal aspects. On the… ▽ More

    Submitted 30 May, 2020; originally announced June 2020.

    Comments: 12 pages

  24. arXiv:2004.14931  [pdf, other

    cs.LO cs.CC

    The Complexity of Dynamic Data Race Prediction

    Authors: Umang Mathur, Andreas Pavlogiannis, Mahesh Viswanathan

    Abstract: Writing concurrent programs is notoriously hard due to scheduling non-determinism. The most common concurrency bugs are data races, which are accesses to a shared resource that can be executed concurrently. Dynamic data-race prediction is the most standard technique for detecting data races: given an observed, data-race-free trace $t$, the task is to determine whether $t$ can be reordered to a tra… ▽ More

    Submitted 2 May, 2020; v1 submitted 30 April, 2020; originally announced April 2020.

  25. arXiv:2004.00273  [pdf, ps, other

    cs.LG stat.ML

    Statistically Model Checking PCTL Specifications on Markov Decision Processes via Reinforcement Learning

    Authors: Yu Wang, Nima Roohi, Matthew West, Mahesh Viswanathan, Geir E. Dullerud

    Abstract: Probabilistic Computation Tree Logic (PCTL) is frequently used to formally specify control objectives such as probabilistic reachability and safety. In this work, we focus on model checking PCTL specifications statistically on Markov Decision Processes (MDPs) by sampling, e.g., checking whether there exists a feasible policy such that the probability of reaching certain goal states is greater than… ▽ More

    Submitted 21 April, 2020; v1 submitted 1 April, 2020; originally announced April 2020.

  26. Atomicity Checking in Linear Time using Vector Clocks

    Authors: Umang Mathur, Mahesh Viswanathan

    Abstract: Multi-threaded programs are challenging to write. Developers often need to reason about a prohibitively large number of thread interleavings to reason about the behavior of software. A non-interference property like atomicity can reduce this interleaving space by ensuring that any execution is equivalent to an execution where all atomic blocks are executed serially. We consider the well studied no… ▽ More

    Submitted 17 October, 2020; v1 submitted 14 January, 2020; originally announced January 2020.

  27. arXiv:1910.10889  [pdf, ps, other

    cs.PL cs.LO

    What's Decidable About Program Verification Modulo Axioms?

    Authors: Umang Mathur, P. Madhusudan, Mahesh Viswanathan

    Abstract: We consider the decidability of the verification problem of programs \emph{modulo axioms} --- that is, verifying whether programs satisfy their assertions, when the functions and relations it uses are assumed to interpreted by arbitrary functions and relations that satisfy a set of first-order axioms. Unfortunately, verification of entirely uninterpreted programs (with the empty set of axioms) is… ▽ More

    Submitted 28 October, 2019; v1 submitted 23 October, 2019; originally announced October 2019.

  28. Decidable Synthesis of Programs with Uninterpreted Functions

    Authors: Paul Krogmeier, Umang Mathur, Adithya Murali, P. Madhusudan, Mahesh Viswanathan

    Abstract: We identify a decidable synthesis problem for a class of programs of unbounded size with conditionals and iteration that work over infinite data domains. The programs in our class use uninterpreted functions and relations, and abide by a restriction called coherence that was recently identified to yield decidable verification. We formulate a powerful grammar-restricted (syntax-guided) synthesis pr… ▽ More

    Submitted 22 July, 2020; v1 submitted 21 October, 2019; originally announced October 2019.

  29. arXiv:1910.04216  [pdf, other

    cs.LO

    Revisiting MITL to Fix Decision Procedures

    Authors: Nima Roohi, Mahesh Viswanathan

    Abstract: Metric Interval Temporal Logic (MITL) is a well studied real-time, temporal logic that has decidable satisfiability and model checking problems. The decision procedures for MITL rely on the automata theoretic approach, where logic formulas are translated into equivalent timed automata. Since timed automata are not closed under complementation, decision procedures for MITL first convert a formula i… ▽ More

    Submitted 9 October, 2019; originally announced October 2019.

    Comments: Presented at the 19th International Conference on Verification, Model Checking, and Abstract Interpretation (VMCAI'18)

  30. arXiv:1910.04137  [pdf, ps, other

    cs.CR cs.LO cs.PL

    Deciding Differential Privacy for Programs with Finite Inputs and Outputs

    Authors: Gilles Barthe, Rohit Chadha, Vishal Jagannath, A. Prasad Sistla, Mahesh Viswanathan

    Abstract: Differential privacy is a de facto standard for statistical computations over databases that contain private data. The strength of differential privacy lies in a rigorous mathematical definition that guarantees individual privacy and yet allows for accurate statistical results. Thanks to its mathematical definition, differential privacy is also a natural target for formal analysis. A broad line of… ▽ More

    Submitted 1 May, 2020; v1 submitted 9 October, 2019; originally announced October 2019.

  31. arXiv:1907.00298  [pdf, ps, other

    cs.PL cs.FL cs.LO cs.SE

    Deciding Memory Safety for Single-Pass Heap-Manipulating Programs

    Authors: Umang Mathur, Adithya Murali, Paul Krogmeier, P. Madhusudan, Mahesh Viswanathan

    Abstract: We investigate the decidability of automatic program verification for programs that manipulate heaps, and in particular, decision procedures for proving memory safety for them. We extend recent work that identified a decidable subclass of uninterpreted programs to a class of alias-aware programs that can update maps. We apply this theory to develop verification algorithms for memory safety--- dete… ▽ More

    Submitted 31 December, 2019; v1 submitted 29 June, 2019; originally announced July 2019.

    Comments: StreamVerif tool for automata-based verification of uninterpreted programs can be found at https://github.com/umangm/streamverif

    Journal ref: Proceedings of the ACM on Programming Languages Vol. 4, Issue POPL, Article 35 (December 2019)

  32. arXiv:1811.00192  [pdf, ps, other

    cs.PL cs.FL cs.LO

    Decidable Verification of Uninterpreted Programs

    Authors: Umang Mathur, P. Madhusudan, Mahesh Viswanathan

    Abstract: We study the problem of completely automatically verifying uninterpreted programs---programs that work over arbitrary data models that provide an interpretation for the constants, functions and relations the program uses. The verification problem asks whether a given program satisfies a postcondition written using quantifier-free formulas with equality on the final state, with no loop invariants,… ▽ More

    Submitted 26 August, 2020; v1 submitted 31 October, 2018; originally announced November 2018.

  33. arXiv:1809.10301  [pdf, other

    q-bio.NC physics.soc-ph

    Characterizing complex networks using Entropy-degree diagrams: unveiling changes in functional brain connectivity induced by Ayahuasca

    Authors: A. Viol, Fernanda Palhano-Fontes, Heloisa Onias, Draulio B. de Araujo, Philipp Hövel, G. M. Viswanathan

    Abstract: Open problems abound in the theory of complex networks, which has found successful application to diverse fields of science. With the aim of further advancing the understanding of the brain's functional connectivity, we propose to evaluate a network metric which we term the geodesic entropy. This entropy, in a way that can be made precise, quantifies the Shannon entropy of the distance distributio… ▽ More

    Submitted 26 September, 2018; originally announced September 2018.

  34. arXiv:1808.00185  [pdf, ps, other

    cs.PL cs.SE

    What Happens - After the First Race? Enhancing the Predictive Power of Happens - Before Based Dynamic Race Detection

    Authors: Umang Mathur, Dileep Kini, Mahesh Viswanathan

    Abstract: Dynamic race detection is the problem of determining if an observed program execution reveals the presence of a data race in a program. The classical approach to solving this problem is to detect if there is a pair of conflicting memory accesses that are unordered by Lamport's happens-before (HB) relation. HB based race detection is known to not report false positives, i.e., it is sound. However,… ▽ More

    Submitted 1 August, 2018; originally announced August 2018.

  35. arXiv:1807.08427  [pdf, ps, other

    cs.PL cs.SE

    Data Race Detection on Compressed Traces

    Authors: Dileep Kini, Umang Mathur, Mahesh Viswanathan

    Abstract: We consider the problem of detecting data races in program traces that have been compressed using straight line programs (SLP), which are special context-free grammars that generate exactly one string, namely the trace that they represent. We consider two classical approaches to race detection --- using the happens-before relation and the lockset discipline. We present algorithms for both these me… ▽ More

    Submitted 23 July, 2018; originally announced July 2018.

  36. A Decidable Fragment of Second Order Logic With Applications to Synthesis

    Authors: P. Madhusudan, Umang Mathur, Shambwaditya Saha, Mahesh Viswanathan

    Abstract: We propose a fragment of many-sorted second order logic called EQSMT and show that checking satisfiability of sentences in this fragment is decidable. EQSMT formulae have an $\exists^*\forall^*$ quantifier prefix (over variables, functions and relations) making EQSMT conducive for modeling synthesis problems. Moreover, EQSMT allows reasoning using a combination of background theories provided that… ▽ More

    Submitted 27 September, 2018; v1 submitted 14 December, 2017; originally announced December 2017.

    Journal ref: 27th EACSL Annual Conference on Computer Science Logic (CSL 2018), http://drops.dagstuhl.de/opus/volltexte/2018/9698

  37. arXiv:1706.00799  [pdf, ps, other

    cond-mat.stat-mech

    Correspondence between spanning trees and the Ising model on a square lattice

    Authors: G. M. Viswanathan

    Abstract: An important problem in statistical physics concerns the fascinating connections between partition functions of lattice models studied in equilibrium statistical mechanics on the one hand and graph theoretical enumeration problems on the other hand. We investigate the nature of the relationship between the number of spanning trees and the partition function of the Ising model on the square lattice… ▽ More

    Submitted 6 May, 2020; v1 submitted 2 June, 2017; originally announced June 2017.

    Comments: Subm. to Phys. Rev. E

  38. arXiv:1705.05449  [pdf, other

    physics.soc-ph cs.SI

    The complex social network of surnames: A comparison between Brazil and Portugal

    Authors: G. D. Ferreira, G. M. Viswanathan, L. R. da Silva, H. J. Herrmann

    Abstract: We present a study of social networks based on the analysis of Brazilian and Portuguese family names (surnames). We construct networks whose nodes are names of families and whose edges represent parental relations between two families. From these networks we extract the connectivity distribution, clustering coefficient, shortest path and centrality. We find that the connectivity distribution follo… ▽ More

    Submitted 12 May, 2017; originally announced May 2017.

    Comments: 13 pages, 5 figures

  39. Dynamic Race Prediction in Linear Time

    Authors: Dileep Kini, Umang Mathur, Mahesh Viswanathan

    Abstract: Writing reliable concurrent software remains a huge challenge for today's programmers. Programmers rarely reason about their code by explicitly considering different possible inter-leavings of its execution. We consider the problem of detecting data races from individual executions in a sound manner. The classical approach to solving this problem has been to use Lamport's happens-before (HB) relat… ▽ More

    Submitted 16 April, 2017; v1 submitted 7 April, 2017; originally announced April 2017.

    Comments: 22 pages, 8 figures, 1 algorithm, 1 table

    ACM Class: D.2.5; D.2.4

  40. arXiv:1702.06902  [pdf, other

    eess.SY

    DRYVR:Data-driven verification and compositional reasoning for automotive systems

    Authors: Chuchu Fan, Bolun Qi, Sayan Mitra, Mahesh Viswanathan

    Abstract: We present the DRYVR framework for verifying hybrid control systems that are described by a combination of a black-box simulator for trajectories and a white-box transition graph specifying mode switches. The framework includes (a) a probabilistic algorithm for learning sensitivity of the continuous trajectories from simulation data, (b) a bounded reachability analysis algorithm that uses the lear… ▽ More

    Submitted 22 February, 2017; originally announced February 2017.

    Comments: 25 pages, 3 figures

  41. Shannon entropy of brain functional complex networks under the influence of the psychedelic Ayahuasca

    Authors: A. Viol, Fernanda Palhano-Fontes, Heloisa Onias, Draulio B. de Araujo, G. M. Viswanathan

    Abstract: The entropic brain hypothesis holds that the key facts concerning psychedelics are partially explained in terms of increased entropy of the brain's functional connectivity. Ayahuasca is a psychedelic beverage of Amazonian indigenous origin with legal status in Brazil in religious and scientific settings. In this context, we use tools and concepts from the theory of complex networks to analyze rest… ▽ More

    Submitted 1 November, 2016; originally announced November 2016.

    Comments: 27 pages, 6 figures

    Journal ref: Scientific Reports 7: 7388,2017

  42. arXiv:1411.6055  [pdf, ps, other

    cond-mat.dis-nn cond-mat.stat-mech

    Information entropy of classical versus explosive percolation

    Authors: T. M. Vieira, G. M. Viswanathan, L. R. da Silva

    Abstract: We study the Shannon entropy of the cluster size distribution in classical as well as explosive percolation, in order to estimate the uncertainty in the sizes of randomly chosen clusters. At the critical point the cluster size distribution is a power-law, i.e. there are clusters of all sizes, so one expects the information entropy to attain a maximum. As expected, our results show that the entropy… ▽ More

    Submitted 14 August, 2015; v1 submitted 21 November, 2014; originally announced November 2014.

    Comments: 6 pages, 6 figures

  43. The hypergeometric series for the partition function of the 2-D Ising model

    Authors: G. M. Viswanathan

    Abstract: In 1944 Onsager published the formula for the partition function of the Ising model for the infinite square lattice. He was able to express the internal energy in terms of a special function, but he left the free energy as a definite integral. Seven decades later, the partition function and free energy have yet to be written in closed form, even with the aid of special functions. Here we evaluate… ▽ More

    Submitted 24 July, 2015; v1 submitted 10 November, 2014; originally announced November 2014.

    Comments: Final version as published in JSTAT

    Journal ref: J. Stat. Mech. (2015) P07004

  44. arXiv:1411.2427  [pdf, ps, other

    physics.soc-ph cs.SI

    How to efficiently destroy a network with limited information

    Authors: T. M. Vieira, G. M. Viswanathan, L. R. da Silva

    Abstract: We address the general problem of how best to attack and destroy a network by node removal, given limited or no prior information about the edges. We consider a family of strategies in which nodes are randomly chosen, but not removed. Instead, a random acquaintance (i.e., a first neighbour) of the chosen node is removed from the network. By assigning an informal cost to the information about the n… ▽ More

    Submitted 10 November, 2014; originally announced November 2014.

    Comments: 10 pages, 3 figures

  45. Activity, diffusion, and correlations in a two-dimensional conserved stochastic sandpile

    Authors: Sharon Dantas da Cunha, Luciano Rodrigues da Silva, Gandhimohan M. Viswanathan, Ronald Dickman

    Abstract: We perform large-scale simulations of a two-dimensional restricted-height conserved stochastic sandpile, focusing on particle diffusion and mobility, and spatial correlations. Quasistationary (QS) simulations yield the critical particle density to high precision [$p_c = 0.7112687(2)$], and show that the diffusion constant scales in the same manner as the activity density, as found previously in th… ▽ More

    Submitted 5 May, 2014; originally announced May 2014.

    Comments: 14 pages; 18 figures

  46. Reachability under Contextual Locking

    Authors: Remi Bonnet, Rohit Chadha, Mahesh Viswanathan, P. Madhusudan

    Abstract: The pairwise reachability problem for a multi-threaded program asks, given control locations in two threads, whether they can be simultaneously reached in an execution of the program. The problem is important for static analysis and is used to detect statements that are concurrently enabled. This problem is in general undecidable even when data is abstracted and when the threads (with recursion)… ▽ More

    Submitted 20 September, 2013; v1 submitted 10 August, 2013; originally announced August 2013.

    Comments: A preliminary version appears in TACAS 2012

    Journal ref: Logical Methods in Computer Science, Volume 9, Issue 3 (September 17, 2013) lmcs:762

  47. Power of Randomization in Automata on Infinite Strings

    Authors: Rohit Chadha, A. Prasad Sistla, Mahesh Viswanathan

    Abstract: Probabilistic Büchi Automata (PBA) are randomized, finite state automata that process input strings of infinite length. Based on the threshold chosen for the acceptance probability, different classes of languages can be defined. In this paper, we present a number of results that clarify the power of such machines and properties of the languages they define. The broad themes we focus on are as fol… ▽ More

    Submitted 28 September, 2011; v1 submitted 12 September, 2011; originally announced September 2011.

    ACM Class: F.4.3,D.2.4,F.1.1,F.1.2

    Journal ref: Logical Methods in Computer Science, Volume 7, Issue 3 (September 29, 2011) lmcs:948

  48. Influence of lattice distortion on the Curie temperature and spin-phonon coupling in LaMn$_{0.5}$Co$_{0.5}$O$_{3}$

    Authors: M. Viswanathan, P. S. Anil Kumar, Venkata Srinu Bhadram, Chandrabhas Narayana, A. K. Bera, S. M. Yusuf

    Abstract: Two distinct ferromagnetic phases of LaMn$_{0.5}$Co$_{0.5}$O$_{3}$ having monoclinic structure with distinct physical properties have been studied. The ferromagnetic ordering temperature $\textit{T}_{c}$ is found to be different for both the phases. The origin of such contrasting characteristics is assigned to the changes in the distance(s) and angle(s) between Mn - O - Co resulting from distortio… ▽ More

    Submitted 7 September, 2010; originally announced September 2010.

    Comments: 9 figures

    Journal ref: J. Phys.: Condens. Matter 22, 346006 (2010)

  49. arXiv:0907.4357  [pdf, ps, other

    math.AP math.FA

    A Solvability criterion for Navier-Stokes equations in high dimensions

    Authors: T. M. Viswanathan, G. M. Viswanathan

    Abstract: We define the Ladyzhenskaya-Lions exponent $α_{\rm {\tiny \sc l}} (n)=({2+n})/4$ for Navier-Stokes equations with dissipation $-(-Δ)^α$ in ${\Bbb R}^n$, for all $n\geq 2$. We review the proof of strong global solvability when $α\geq α_{\rm {\tiny \sc l}} (n)$, given smooth initial data. If the corresponding Euler equations for $n>2$ were to allow uncontrolled growth of the enstrophy… ▽ More

    Submitted 16 October, 2009; v1 submitted 24 July, 2009; originally announced July 2009.

    Comments: Fixed references, priority etc

  50. Spontaneous symmetry breaking and finite time singularities in $d$-dimensional incompressible flow with fractional dissipation

    Authors: G. M. Viswanathan, T. M. Viswanathan

    Abstract: We investigate the formation of singularities in the incompressible Navier-Stokes equations in $d\geq 2$ dimensions with a fractional Laplacian $|\nabla |^α$. We derive analytically a sufficient but not necessary condition for solutions to remain always smooth and show that finite time singularities cannot form for $α\geq α_c= 1+d/2$. Moreover, initial singularities become unstable for $α>α_c$.

    Submitted 9 July, 2008; originally announced July 2008.

    Comments: 5 pages