Skip to main content

Showing 1–40 of 40 results for author: Banerjee, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.12193  [pdf, other

    cs.CY

    The Narrow Depth and Breadth of Corporate Responsible AI Research

    Authors: Nur Ahmed, Amit Das, Kirsten Martin, Kawshik Banerjee

    Abstract: The transformative potential of AI presents remarkable opportunities, but also significant risks, underscoring the importance of responsible AI development and deployment. Despite a growing emphasis on this area, there is limited understanding of industry's engagement in responsible AI research, i.e., the critical examination of AI's ethical, social, and legal dimensions. To address this gap, we a… ▽ More

    Submitted 20 May, 2024; originally announced May 2024.

  2. Static and Dynamic Synthesis of Bengali and Devanagari Signatures

    Authors: Miguel A. Ferrer, Sukalpa Chanda, Moises Diaz, Chayan Kr. Banerjee, Anirban Majumdar, Cristina Carmona-Duarte, Parikshit Acharya, Umapada Pal

    Abstract: Develo** an automatic signature verification system is challenging and demands a large number of training samples. This is why synthetic handwriting generation is an emerging topic in document image analysis. Some handwriting synthesizers use the motor equivalence model, the well-established hypothesis from neuroscience, which analyses how a human being accomplishes movement. Specifically, a mot… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

    Comments: Accepted version. Published on IEEE Transactions on Cybernetics [ISSN 2168-2267], v. 48(10), p. 2896-2907

    Journal ref: IEEE Transactions on Cybernetics, v. 48(10), p. 2896-2907, 2018

  3. arXiv:2401.16649  [pdf, other

    cs.LG cs.CR

    Using Motion Forecasting for Behavior-Based Virtual Reality (VR) Authentication

    Authors: Mingjun Li, Natasha Kholgade Banerjee, Sean Banerjee

    Abstract: Task-based behavioral biometric authentication of users interacting in virtual reality (VR) environments enables seamless continuous authentication by using only the motion trajectories of the person's body as a unique signature. Deep learning-based approaches for behavioral biometrics show high accuracy when using complete or near complete portions of the user trajectory, but show lower performan… ▽ More

    Submitted 29 January, 2024; originally announced January 2024.

    Comments: AIxVR 2024 Best Paper Award

  4. arXiv:2401.16443  [pdf, other

    cs.HC cs.AI cs.LG

    Evaluating Deep Networks for Detecting User Familiarity with VR from Hand Interactions

    Authors: Mingjun Li, Numan Zafar, Natasha Kholgade Banerjee, Sean Banerjee

    Abstract: As VR devices become more prevalent in the consumer space, VR applications are likely to be increasingly used by users unfamiliar with VR. Detecting the familiarity level of a user with VR as an interaction medium provides the potential of providing on-demand training for acclimatization and prevents the user from being burdened by the VR environment in accomplishing their tasks. In this work, we… ▽ More

    Submitted 27 January, 2024; originally announced January 2024.

    Comments: AIxVR 2024 poster paper

  5. arXiv:2310.00723  [pdf, other

    cs.CV cs.RO

    HOH: Markerless Multimodal Human-Object-Human Handover Dataset with Large Object Count

    Authors: Noah Wiederhold, Ava Megyeri, DiMaggio Paris, Sean Banerjee, Natasha Kholgade Banerjee

    Abstract: We present the HOH (Human-Object-Human) Handover Dataset, a large object count dataset with 136 objects, to accelerate data-driven research on handover studies, human-robot handover implementation, and artificial intelligence (AI) on handover parameter estimation from 2D and 3D data of person interactions. HOH contains multi-view RGB and depth data, skeletons, fused point clouds, grasp type and ha… ▽ More

    Submitted 3 May, 2024; v1 submitted 1 October, 2023; originally announced October 2023.

    Comments: NeurIPS 2023 Datasets and Benchmarks

  6. arXiv:2305.18273  [pdf, other

    cs.CV

    Pix2Repair: Implicit Shape Restoration from Images

    Authors: Xinchao Song, Nikolas Lamb, Sean Banerjee, Natasha Kholgade Banerjee

    Abstract: We present Pix2Repair, an automated shape repair approach that generates restoration shapes from images to repair fractured objects. Prior repair approaches require a high-resolution watertight 3D mesh of the fractured object as input. Input 3D meshes must be obtained using expensive 3D scanners, and scanned meshes require manual cleanup, limiting accessibility and scalability. Pix2Repair takes an… ▽ More

    Submitted 20 December, 2023; v1 submitted 29 May, 2023; originally announced May 2023.

  7. arXiv:2303.14152  [pdf, other

    cs.CV

    Fantastic Breaks: A Dataset of Paired 3D Scans of Real-World Broken Objects and Their Complete Counterparts

    Authors: Nikolas Lamb, Cameron Palmer, Benjamin Molloy, Sean Banerjee, Natasha Kholgade Banerjee

    Abstract: Automated shape repair approaches currently lack access to datasets that describe real-world damaged geometry. We present Fantastic Breaks (and Where to Find Them: https://terascale-all-sensing-research-studio.github.io/FantasticBreaks), a dataset containing scanned, waterproofed, and cleaned 3D meshes for 150 broken objects, paired and geometrically aligned with complete counterparts. Fantastic B… ▽ More

    Submitted 1 May, 2023; v1 submitted 24 March, 2023; originally announced March 2023.

    Comments: To be published at CVPR 2023

  8. arXiv:2303.01547  [pdf, other

    cs.CV cs.AI

    Simultaneous prediction of hand gestures, handedness, and hand keypoints using thermal images

    Authors: Sichao Li, Sean Banerjee, Natasha Kholgade Banerjee, Soumyabrata Dey

    Abstract: Hand gesture detection is a well-explored area in computer vision with applications in various forms of Human-Computer Interactions. In this work, we propose a technique for simultaneous hand gesture classification, handedness detection, and hand keypoints localization using thermal data captured by an infrared camera. Our method uses a novel deep multi-task learning architecture that includes sha… ▽ More

    Submitted 2 March, 2023; originally announced March 2023.

    Comments: ICDEC 2022

  9. DeepJoin: Learning a Joint Occupancy, Signed Distance, and Normal Field Function for Shape Repair

    Authors: Nikolas Lamb, Sean Banerjee, Natasha Kholgade Banerjee

    Abstract: We introduce DeepJoin, an automated approach to generate high-resolution repairs for fractured shapes using deep neural networks. Existing approaches to perform automated shape repair operate exclusively on symmetric objects, require a complete proxy shape, or predict restoration shapes using low-resolution voxels which are too coarse for physical repair. We generate a high-resolution restoration… ▽ More

    Submitted 22 November, 2022; originally announced November 2022.

    Comments: To be published at SIGGRAPH Asia 2022 (Journal)

  10. arXiv:2210.11790  [pdf, other

    cs.LG stat.ML

    FoSR: First-order spectral rewiring for addressing oversquashing in GNNs

    Authors: Kedar Karhadkar, Pradeep Kr. Banerjee, Guido Montúfar

    Abstract: Graph neural networks (GNNs) are able to leverage the structure of graph data by passing messages along the edges of the graph. While this allows GNNs to learn features depending on the graph structure, for certain graph topologies it leads to inefficient information propagation and a problem known as oversquashing. This has recently been linked with the curvature and spectral gap of the graph. On… ▽ More

    Submitted 15 February, 2023; v1 submitted 21 October, 2022; originally announced October 2022.

    Comments: 21 pages, accepted to ICLR 2023

  11. arXiv:2210.05728  [pdf, other

    cs.CV

    DeepMend: Learning Occupancy Functions to Represent Shape for Repair

    Authors: Nikolas Lamb, Sean Banerjee, Natasha Kholgade Banerjee

    Abstract: We present DeepMend, a novel approach to reconstruct restorations to fractured shapes using learned occupancy functions. Existing shape repair approaches predict low-resolution voxelized restorations, or require symmetries or access to a pre-existing complete oracle. We represent the occupancy of a fractured shape as the conjunction of the occupancy of an underlying complete shape and the fracture… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

    Comments: To be published at ECCV 2020 (poster)

  12. arXiv:2208.03471  [pdf, other

    cs.LG cs.IT

    Oversquashing in GNNs through the lens of information contraction and graph expansion

    Authors: Pradeep Kr. Banerjee, Kedar Karhadkar, Yu Guang Wang, Uri Alon, Guido Montúfar

    Abstract: The quality of signal propagation in message-passing graph neural networks (GNNs) strongly influences their expressivity as has been observed in recent works. In particular, for prediction tasks relying on long-range interactions, recursive aggregation of node features can lead to an undesired phenomenon called "oversquashing". We present a framework for analyzing oversquashing based on informatio… ▽ More

    Submitted 6 August, 2022; originally announced August 2022.

    Comments: 8 pages, 5 figures; Accepted at the 58th Annual Allerton Conference on Communication, Control, and Computing

  13. arXiv:2207.13287  [pdf, other

    cs.LG

    Detecting Concept Drift in the Presence of Sparsity -- A Case Study of Automated Change Risk Assessment System

    Authors: Vishwas Choudhary, Binay Gupta, Anirban Chatterjee, Subhadip Paul, Kunal Banerjee, Vijay Agneeswaran

    Abstract: Missing values, widely called as \textit{sparsity} in literature, is a common characteristic of many real-world datasets. Many imputation methods have been proposed to address this problem of data incompleteness or sparsity. However, the accuracy of a data imputation method for a given feature or a set of features in a dataset is highly dependent on the distribution of the feature values and its c… ▽ More

    Submitted 27 July, 2022; originally announced July 2022.

  14. arXiv:2204.12552  [pdf, other

    cs.SI cs.CY

    These Deals Won't Last! Longevity, Uniformity and Bias in Product Badge Assignment in E-Commerce Platforms

    Authors: Archit Bansal, Kunal Banerjee, Abhijnan Chakraborty

    Abstract: Product badges are ubiquitous in e-commerce platforms, acting as effective psychological triggers to nudge customers to buy specific products, boosting revenues. However, to the best of our knowledge, there has been no attempt to systematically study these badges and their several idiosyncrasies - we intend to close this gap in our current work. Specifically, we try to answer questions such as: Ho… ▽ More

    Submitted 26 April, 2022; originally announced April 2022.

  15. arXiv:2204.10982  [pdf, ps, other

    cs.IT

    Continuity and Additivity Properties of Information Decompositions

    Authors: Johannes Rauh, Pradeep Kr. Banerjee, Eckehard Olbrich, Guido Montúfar, Jürgen Jost

    Abstract: Information decompositions quantify how the Shannon information about a given random variable is distributed among several other random variables. Various requirements have been proposed that such a decomposition should satisfy, leading to different candidate solutions. Curiously, however, only two of the original requirements that determined the Shannon information have been considered, namely mo… ▽ More

    Submitted 9 July, 2023; v1 submitted 22 April, 2022; originally announced April 2022.

    Comments: 17 pages

    MSC Class: 94A15; 94A17

    Journal ref: International Journal of Approximate Reasoning, 2023

  16. arXiv:2110.12231  [pdf, other

    cs.LG

    Learning curves for Gaussian process regression with power-law priors and targets

    Authors: Hui **, Pradeep Kr. Banerjee, Guido Montúfar

    Abstract: We characterize the power-law asymptotics of learning curves for Gaussian process regression (GPR) under the assumption that the eigenspectrum of the prior and the eigenexpansion coefficients of the target function follow a power law. Under similar assumptions, we leverage the equivalence between GPR and kernel ridge regression (KRR) to show the generalization error of KRR. Infinitely wide neural… ▽ More

    Submitted 27 November, 2021; v1 submitted 23 October, 2021; originally announced October 2021.

    Comments: 76 pages, 7 table, 6 figure

  17. arXiv:2108.07951  [pdf, other

    cs.LG cs.AI

    Look Before You Leap! Designing a Human-Centered AI System for Change Risk Assessment

    Authors: Binay Gupta, Anirban Chatterjee, Harika Matha, Kunal Banerjee, Lalitdutt Parsai, Vijay Agneeswaran

    Abstract: Reducing the number of failures in a production system is one of the most challenging problems in technology driven industries, such as, the online retail industry. To address this challenge, change management has emerged as a promising sub-field in operations that manages and reviews the changes to be deployed in production in a systematic manner. However, it is practically impossible to manually… ▽ More

    Submitted 17 August, 2021; originally announced August 2021.

  18. Information Complexity and Generalization Bounds

    Authors: Pradeep Kr. Banerjee, Guido Montúfar

    Abstract: We present a unifying picture of PAC-Bayesian and mutual information-based upper bounds on the generalization error of randomized learning algorithms. As we show, Tong Zhang's information exponential inequality (IEI) gives a general recipe for constructing bounds of both flavors. We show that several important results in the literature can be obtained as simple corollaries of the IEI under differe… ▽ More

    Submitted 23 October, 2021; v1 submitted 4 May, 2021; originally announced May 2021.

    Comments: To appear in 2021 IEEE International Symposium on Information Theory (ISIT); 23 pages

    MSC Class: 68Q32; 68T05; 94A15 ACM Class: I.2.6; G.3

  19. arXiv:2103.05970  [pdf, other

    cs.SE

    Designing a Bot for Efficient Distribution of Service Requests

    Authors: Arkadip Basu, Kunal Banerjee

    Abstract: The tracking and timely resolution of service requests is one of the major challenges in agile project management. Having an efficient solution to this problem is a key requirement for Walmart to facilitate seamless collaboration across its different business units. The Jira software is one of the popular choices in industries for monitoring such service requests. A service request once logged int… ▽ More

    Submitted 10 March, 2021; originally announced March 2021.

  20. arXiv:2011.11538  [pdf, other

    cs.LG

    Exploring Alternatives to Softmax Function

    Authors: Kunal Banerjee, Vishak Prasad C, Rishi Raj Gupta, Karthik Vyas, Anushree H, Biswajit Mishra

    Abstract: Softmax function is widely used in artificial neural networks for multiclass classification, multilabel classification, attention mechanisms, etc. However, its efficacy is often questioned in literature. The log-softmax loss has been shown to belong to a more generic class of loss functions, called spherical family, and its member log-Taylor softmax loss is arguably the best alternative in this cl… ▽ More

    Submitted 23 November, 2020; originally announced November 2020.

  21. arXiv:1909.07729  [pdf, other

    cs.LG cs.NE stat.ML

    K-TanH: Efficient TanH For Deep Learning

    Authors: Abhisek Kundu, Alex Heinecke, Dhiraj Kalamkar, Sudarshan Srinivasan, Eric C. Qin, Naveen K. Mellempudi, Dipankar Das, Kunal Banerjee, Bharat Kaul, Pradeep Dubey

    Abstract: We propose K-TanH, a novel, highly accurate, hardware efficient approximation of popular activation function TanH for Deep Learning. K-TanH consists of parameterized low-precision integer operations, such as, shift and add/subtract (no floating point operation needed) where parameters are stored in very small look-up tables that can fit in CPU registers. K-TanH can work on various numerical format… ▽ More

    Submitted 7 June, 2020; v1 submitted 17 September, 2019; originally announced September 2019.

    Comments: 6 pages, 1 figures

  22. arXiv:1906.06440  [pdf, other

    cs.LG cs.DC stat.ML

    High-Performance Deep Learning via a Single Building Block

    Authors: Evangelos Georganas, Kunal Banerjee, Dhiraj Kalamkar, Sasikanth Avancha, Anand Venkat, Michael Anderson, Greg Henry, Hans Pabst, Alexander Heinecke

    Abstract: Deep learning (DL) is one of the most prominent branches of machine learning. Due to the immense computational cost of DL workloads, industry and academia have developed DL libraries with highly-specialized kernels for each workload/architecture, leading to numerous, complex code-bases that strive for performance, yet they are hard to maintain and do not generalize. In this work, we introduce the… ▽ More

    Submitted 17 June, 2019; v1 submitted 14 June, 2019; originally announced June 2019.

  23. arXiv:1905.12322  [pdf, other

    cs.LG stat.ML

    A Study of BFLOAT16 for Deep Learning Training

    Authors: Dhiraj Kalamkar, Dheevatsa Mudigere, Naveen Mellempudi, Dipankar Das, Kunal Banerjee, Sasikanth Avancha, Dharma Teja Vooturi, Nataraj Jammalamadaka, Jianyu Huang, Hector Yuen, Jiyan Yang, Jongsoo Park, Alexander Heinecke, Evangelos Georganas, Sudarshan Srinivasan, Abhisek Kundu, Misha Smelyanskiy, Bharat Kaul, Pradeep Dubey

    Abstract: This paper presents the first comprehensive empirical study demonstrating the efficacy of the Brain Floating Point (BFLOAT16) half-precision format for Deep Learning training across image classification, speech recognition, language modeling, generative networks and industrial recommendation systems. BFLOAT16 is attractive for Deep Learning training for two reasons: the range of values it can repr… ▽ More

    Submitted 13 June, 2019; v1 submitted 29 May, 2019; originally announced May 2019.

  24. arXiv:1905.09137  [pdf, ps, other

    cs.PL cs.SE

    A Quick Introduction to Functional Verification of Array-Intensive Programs

    Authors: Kunal Banerjee, Chandan Karfa

    Abstract: Array-intensive programs are often amenable to parallelization across many cores on a single machine as well as scaling across multiple machines and hence are well explored, especially in the domain of high-performance computing. These programs typically undergo loop transformations and arithmetic transformations in addition to parallelizing transformations. Although a lot of effort has been inves… ▽ More

    Submitted 22 May, 2019; originally announced May 2019.

  25. Unique Information and Secret Key Decompositions

    Authors: Johannes Rauh, Pradeep Kr. Banerjee, Eckehard Olbrich, Jürgen Jost

    Abstract: The unique information ($UI$) is an information measure that quantifies a deviation from the Blackwell order. We have recently shown that this quantity is an upper bound on the one-way secret key rate. In this paper, we prove a triangle inequality for the $UI$, which implies that the $UI$ is never greater than one of the best known upper bounds on the two-way secret key rate. We conjecture that th… ▽ More

    Submitted 23 January, 2019; originally announced January 2019.

    Comments: 7 pages

    Journal ref: IEEE International Symposium on Information Theory (ISIT) 2019

  26. The Variational Deficiency Bottleneck

    Authors: Pradeep Kr. Banerjee, Guido Montúfar

    Abstract: We introduce a bottleneck method for learning data representations based on information deficiency, rather than the more traditional information sufficiency. A variational upper bound allows us to implement this method efficiently. The bound itself is bounded above by the variational information bottleneck objective, and the two methods coincide in the regime of single-shot Monte Carlo approximati… ▽ More

    Submitted 4 November, 2020; v1 submitted 27 October, 2018; originally announced October 2018.

    Comments: 8 pages, 4 figures, International Joint Conference on Neural Networks (IJCNN) 2020

  27. arXiv:1808.05567  [pdf, other

    cs.DC

    Anatomy Of High-Performance Deep Learning Convolutions On SIMD Architectures

    Authors: Evangelos Georganas, Sasikanth Avancha, Kunal Banerjee, Dhiraj Kalamkar, Greg Henry, Hans Pabst, Alexander Heinecke

    Abstract: Convolution layers are prevalent in many classes of deep neural networks, including Convolutional Neural Networks (CNNs) which provide state-of-the-art results for tasks like image recognition, neural machine translation and speech recognition. The computationally expensive nature of a convolution operation has led to the proliferation of implementations including matrix-matrix multiplication form… ▽ More

    Submitted 20 August, 2018; v1 submitted 16 August, 2018; originally announced August 2018.

    Comments: Accepted to SC18

  28. Unique Informations and Deficiencies

    Authors: Pradeep Kr. Banerjee, Eckehard Olbrich, Jürgen Jost, Johannes Rauh

    Abstract: Given two channels that convey information about the same random variable, we introduce two measures of the unique information of one channel with respect to the other. The two quantities are based on the notion of generalized weighted Le Cam deficiencies and differ on whether one channel can approximate the other by a randomization at either its input or output. We relate the proposed quantities… ▽ More

    Submitted 9 December, 2019; v1 submitted 13 July, 2018; originally announced July 2018.

    Comments: 13 pages, 2 figures. The material in this manuscript was presented at the 56th Annual Allerton Conference on Communication, Control, and Computing, 2018. This manuscript contains some corrections: most notably, Lemma 18 was removed and Proposition 28 was corrected. The numbering of equations and results in this version agrees with the numbering of the published version

  29. arXiv:1802.00930  [pdf, other

    cs.NE cs.LG math.NA

    Mixed Precision Training of Convolutional Neural Networks using Integer Operations

    Authors: Dipankar Das, Naveen Mellempudi, Dheevatsa Mudigere, Dhiraj Kalamkar, Sasikanth Avancha, Kunal Banerjee, Srinivas Sridharan, Karthik Vaidyanathan, Bharat Kaul, Evangelos Georganas, Alexander Heinecke, Pradeep Dubey, Jesus Corbal, Nikita Shustrov, Roma Dubtsov, Evarist Fomenko, Vadim Pirogov

    Abstract: The state-of-the-art (SOTA) for mixed precision training is dominated by variants of low precision floating point operations, and in particular, FP16 accumulating into FP32 Micikevicius et al. (2017). On the other hand, while a lot of research has also happened in the domain of low and mixed-precision Integer training, these works either present results for non-SOTA networks (for instance only Ale… ▽ More

    Submitted 23 February, 2018; v1 submitted 3 February, 2018; originally announced February 2018.

    Comments: Published as a conference paper at ICLR 2018

  30. Computing the Unique Information

    Authors: Pradeep Kr. Banerjee, Johannes Rauh, Guido Montúfar

    Abstract: Given a pair of predictor variables and a response variable, how much information do the predictors have about the response, and how is this information distributed between unique, redundant, and synergistic components? Recent work has proposed to quantify the unique component of the decomposition as the minimum value of the conditional mutual information over a constrained set of information chan… ▽ More

    Submitted 29 May, 2018; v1 submitted 21 September, 2017; originally announced September 2017.

    Comments: To appear in 2018 IEEE International Symposium on Information Theory (ISIT); 18 pages; 4 figures, 1 Table; Github link to source code: https://github.com/infodeco/computeUI

    MSC Class: 94A15; 94A17

  31. arXiv:1707.04679  [pdf, other

    cs.IT cs.AI

    Ternary Residual Networks

    Authors: Abhisek Kundu, Kunal Banerjee, Naveen Mellempudi, Dheevatsa Mudigere, Dipankar Das, Bharat Kaul, Pradeep Dubey

    Abstract: Sub-8-bit representation of DNNs incur some discernible loss of accuracy despite rigorous (re)training at low-precision. Such loss of accuracy essentially makes them equivalent to a much shallower counterpart, diminishing the power of being deep networks. To address this problem of accuracy drop we introduce the notion of \textit{residual networks} where we add more low-precision edges to sensitiv… ▽ More

    Submitted 31 October, 2017; v1 submitted 14 July, 2017; originally announced July 2017.

  32. On extractable shared information

    Authors: Johannes Rauh, Pradeep Kr. Banerjee, Eckehard Olbrich, Jürgen Jost, Nils Bertschinger

    Abstract: We consider the problem of quantifying the information shared by a pair of random variables $X_{1},X_{2}$ about another variable $S$. We propose a new measure of shared information, called extractable shared information, that is left monotonic; that is, the information shared about $S$ is bounded from below by the information shared about $f(S)$ for any function $f$. We show that our measure leads… ▽ More

    Submitted 10 November, 2017; v1 submitted 26 January, 2017; originally announced January 2017.

    Comments: 12 pages, journal version

    MSC Class: 94A15; 94A17

    Journal ref: Entropy 2017, 19(7), 328

  33. Coarse-graining and the Blackwell order

    Authors: Johannes Rauh, Pradeep Kr. Banerjee, Eckehard Olbrich, Jürgen Jost, Nils Bertschinger, David Wolpert

    Abstract: Suppose we have a pair of information channels, $κ_{1},κ_{2}$, with a common input. The Blackwell order is a partial order over channels that compares $κ_{1}$ and $κ_{2}$ by the maximal expected utility an agent can obtain when decisions are based on the channel outputs. Equivalently, $κ_{1}$ is said to be Blackwell-inferior to $κ_{2}$ if and only if $κ_{1}$ can be constructed by garbling the outp… ▽ More

    Submitted 10 November, 2017; v1 submitted 26 January, 2017; originally announced January 2017.

    Comments: 12 pages, 1 figure, journal version

    MSC Class: 62B15; 94A15; 94A17

    Journal ref: Entropy 2017, 19(10), 527

  34. arXiv:1601.02489  [pdf

    cs.SD

    Categorization of Tablas by Wavelet Analysis

    Authors: Anirban Patranabis, Kaushik Banerjee, Vishal Midya, Shankha Sanyal, Archi Banerjee, Ranjan Sengupta, Dipak Ghosh

    Abstract: Tabla, a percussion instrument, mainly used to accompany vocalists, instrumentalists and dancers in every style of music from classical to light in India, mainly used for kee** rhythm. This percussion instrument consists of two drums played by two hands, structurally different and produces different harmonic sounds. Earlier work has done labeling tabla strokes from real time performances by test… ▽ More

    Submitted 3 January, 2016; originally announced January 2016.

    Comments: 12 pages

  35. arXiv:1510.04880  [pdf

    cs.SD physics.class-ph

    Harmonic and Timbre Analysis of Tabla Strokes

    Authors: Anirban Patranabis, Kaushik Banerjee, Vishal Midya, Sneha Chakraborty, Shankha Sanyal, Archi Banerjee, Ranjan Sengupta, Dipak Ghosh

    Abstract: Indian twin drums mainly bayan and dayan (tabla) are the most important percussion instruments in India popularly used for kee** rhythm. It is a twin percussion/drum instrument of which the right hand drum is called dayan and the left hand drum is called bayan. Tabla strokes are commonly called as `bol', constitutes a series of syllables. In this study we have studied the timbre characteristics… ▽ More

    Submitted 15 October, 2015; originally announced October 2015.

    Comments: 14 pages

  36. arXiv:1509.03706  [pdf, ps, other

    cs.IT

    Synergy, Redundancy and Common Information

    Authors: Pradeep Kr. Banerjee, Virgil Griffith

    Abstract: We consider the problem of decomposing the total mutual information conveyed by a pair of predictor random variables about a target random variable into redundant, unique and synergistic contributions. We focus on the relationship between "redundant information" and the more familiar information-theoretic notions of "common information". Our main contribution is an impossibility result. We show th… ▽ More

    Submitted 12 September, 2015; originally announced September 2015.

    Comments: 16 pages, 3 figures

    MSC Class: 94A15; 94A17

  37. arXiv:1504.08177  [pdf, ps, other

    cs.SD math.ST physics.data-an

    Noise Sensitivity of Teager-Kaiser Energy Operators and Their Ratios

    Authors: Pradeep Kr. Banerjee, Nirmal B. Chakrabarti

    Abstract: The Teager-Kaiser energy operator (TKO) belongs to a class of autocorrelators and their linear combination that can track the instantaneous energy of a nonstationary sinusoidal signal source. TKO-based monocomponent AM-FM demodulation algorithms work under the basic assumption that the operator outputs are always positive. In the absence of noise, this is assured for pure sinusoidal inputs and the… ▽ More

    Submitted 29 May, 2015; v1 submitted 30 April, 2015; originally announced April 2015.

    Comments: 7 pages, 4 figures

  38. Some new insights into information decomposition in complex systems based on common information

    Authors: Pradeep Kr. Banerjee

    Abstract: We take a closer look at the structure of bivariate dependency induced by a pair of predictor random variables $(X_1, X_2)$ trying to synergistically, redundantly or uniquely encode a target random variable $Y$. We evaluate a recently proposed measure of redundancy based on the Gács-Körner common information (Griffith et al., Entropy 2014) and show that the measure, in spite of its elegance is deg… ▽ More

    Submitted 2 March, 2015; originally announced March 2015.

    Comments: 17 pages, 5 figures, Conference Proceedings Paper, Entropy, Nov. 2014

    MSC Class: 94A15; 94A17

  39. arXiv:1502.05775  [pdf, ps, other

    cs.IT

    A Secret Common Information Duality for Tripartite Noisy Correlations

    Authors: Pradeep Kr. Banerjee

    Abstract: We explore the duality between the simulation and extraction of secret correlations in light of a similar well-known operational duality between the two notions of common information due to Wyner, and Gács and Körner. For the inverse problem of simulating a tripartite noisy correlation from noiseless secret key and unlimited public communication, we show that Winter's (2005) result for the key cos… ▽ More

    Submitted 30 May, 2015; v1 submitted 20 February, 2015; originally announced February 2015.

    Comments: 12 pages, 1 figure, v3: Improved readability

  40. arXiv:1502.05773  [pdf, ps, other

    cs.IT

    Multipartite Monotones for Secure Sampling by Public Discussion From Noisy Correlations

    Authors: Pradeep Kr. Banerjee

    Abstract: We address the problem of quantifying the cryptographic content of probability distributions, in relation to an application to secure multi-party sampling against a passive t-adversary. We generalize a recently introduced notion of assisted common information of a pair of correlated sources to that of K sources and define a family of monotone rate regions indexed by K. This allows for a simple cha… ▽ More

    Submitted 20 April, 2015; v1 submitted 19 February, 2015; originally announced February 2015.

    Comments: 6 pages, 2 figures, v2: Improved readability