Skip to main content

Showing 1–12 of 12 results for author: Chakravarty, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2203.03717  [pdf, other

    cs.CY

    An Analysis of Energy Consumption and Carbon Footprints of Cryptocurrencies and Possible Solutions

    Authors: Varun Kohli, Sombuddha Chakravarty, Vinay Chamola, Kuldip Singh Sangwan, Sherali Zeadally

    Abstract: There is an urgent need to control global warming caused by humans to achieve a sustainable future. $CO_2$ levels are rising steadily and while countries worldwide are actively moving toward the sustainability goals proposed during the Paris Agreement in 2015, we are still a long way to go from achieving a sustainable mode of global operation. The increased popularity of cryptocurrencies since the… ▽ More

    Submitted 20 February, 2022; originally announced March 2022.

  2. arXiv:2106.09966  [pdf, other

    cs.CR cs.PF

    Introducing Fast and Secure Deterministic Stash Free Write Only Oblivious RAMs for Demand Paging in Keystone

    Authors: Mriganka Shekhar Chakravarty, Biswabandan Panda

    Abstract: Keystone is a trusted execution environment, based on RISC-V architecture. It divides the memory into a secure Keystone private memory and an unsecure non-Keystone memory, and allows code that lies inside the Keystone private memory to execute securely. Simple demand paging in Keystone ends up leaking sensitive access patterns of Keystone application to the Operating System(OS), that is assumed to… ▽ More

    Submitted 18 June, 2021; originally announced June 2021.

  3. arXiv:2009.04485  [pdf, other

    cs.CL cs.IR cs.LG

    Aspect Classification for Legal Depositions

    Authors: Saurabh Chakravarty, Satvik Chekuri, Maanav Mehrotra, Edward A. Fox

    Abstract: Attorneys and others have a strong interest in having a digital library with suitable services (e.g., summarizing, searching, and browsing) to help them work with large corpora of legal depositions. Their needs often involve understanding the semantics of such documents. That depends in part on the role of the deponent, e.g., plaintiff, defendant, law enforcement personnel, expert, etc. In the cas… ▽ More

    Submitted 9 September, 2020; originally announced September 2020.

    Comments: 19 pages, 3 figures, 11 tables, detailed version of shorter paper being submitted to a conference

  4. arXiv:2007.04673  [pdf, other

    cs.CR

    The Road Not Taken: Re-thinking the Feasibility of Voice Calling Over Tor

    Authors: Piyush Kumar Sharma, Shashwat Chaudhary, Nikhil Hassija, Mukulika Maity, Sambuddho Chakravarty

    Abstract: Anonymous VoIP calls over the Internet holds great significance for privacy-conscious users, whistle-blowers and political activists alike. Prior research deems popular anonymization systems like Tor unsuitable for providing requisite performance guarantees that real-time applications like VoIP need. Their claims are backed by studies that may no longer be valid due to constant advancements in Tor… ▽ More

    Submitted 9 July, 2020; originally announced July 2020.

  5. A Mosquito Pick-and-Place System for PfSPZ-based Malaria Vaccine Production

    Authors: Henry Phalen, Prasad Vagdargi, Mariah L. Schrum, Sumana Chakravarty, Amanda Canezin, Michael Pozin, Suat Coemert, Iulian Iordachita, Stephen L. Hoffman, Gregory S. Chirikjian, Russell H. Taylor

    Abstract: The treatment of malaria is a global health challenge that stands to benefit from the widespread introduction of a vaccine for the disease. A method has been developed to create a live organism vaccine using the sporozoites (SPZ) of the parasite Plasmodium falciparum (Pf), which are concentrated in the salivary glands of infected mosquitoes. Current manual dissection methods to obtain these PfSPZ… ▽ More

    Submitted 12 April, 2020; originally announced April 2020.

    Comments: 12 pages, 11 figures, Manuscript submitted for Special Issue of IEEE CASE 2019 for IEEE T-ASE

  6. arXiv:1903.02532  [pdf

    q-bio.QM cs.RO

    An Efficient Production Process for Extracting Salivary Glands from Mosquitoes

    Authors: Mariah Schrum, Amanda Canezin, Sumana Chakravarty, Michelle Laskowski, Suat Comert, Yunuscan Sevimli, Gregory S. Chirikjian, Stephen L. Hoffman, Russell H. Taylor

    Abstract: Malaria is the one of the leading causes of morbidity and mortality in many develo** countries. The development of a highly effective and readily deployable vaccine represents a major goal for world health. There has been recent progress in develo** a clinically effective vaccine manufactured using Plasmodium falciparum sporozoites (PfSPZ) extracted from the salivary glands of Anopheles sp. Mo… ▽ More

    Submitted 5 March, 2019; originally announced March 2019.

    Comments: 5 pages, 5 figures

  7. arXiv:1811.06103  [pdf

    cs.LG eess.SP stat.ML

    Deep Neural Networks based Modrec: Some Results with Inter-Symbol Interference and Adversarial Examples

    Authors: S. Asim Ahmed, Subhashish Chakravarty, Michael Newhouse

    Abstract: Recent successes and advances in Deep Neural Networks (DNN) in machine vision and Natural Language Processing (NLP) have motivated their use in traditional signal processing and communications systems. In this paper, we present results of such applications to the problem of automatic modulation recognition. Variations in wireless communication channels are represented by statistical channel models… ▽ More

    Submitted 14 November, 2018; originally announced November 2018.

    Comments: 4 pages, 13 figures

  8. arXiv:1808.01708  [pdf, other

    cs.CY

    Where The Light Gets In: Analyzing Web Censorship Mechanisms in India

    Authors: Tarun Kumar Yadav, Akshat Sinha, Devashish Gosain, Piyush Sharma, Sambuddho Chakravarty

    Abstract: This paper presents a detailed study of the Internet censorship in India. We consolidated a list of potentially blocked websites from various public sources to assess censorship mechanisms used by nine major ISPs. To begin with, we demonstrate that existing censorship detection tools like OONI are grossly inaccurate. We thus developed various techniques and heuristics to correctly assess censorshi… ▽ More

    Submitted 5 August, 2018; originally announced August 2018.

  9. arXiv:1806.07038  [pdf, other

    cs.NI

    Few Throats to Choke: On the Current Structure of the Internet

    Authors: H. B. Acharya, Sambuddho Chakravarty, Devashish Gosain

    Abstract: The original design of the Internet was a resilient, distributed system, that maybe able to route around (and therefore recover from) massive disruption --- up to and including nuclear war. However, network routing effects and business decisions cause traffic to often be routed through a relatively small set of Autonomous Systems (ASes). This is not merely an academic issue; it has practical impli… ▽ More

    Submitted 19 June, 2018; originally announced June 2018.

  10. arXiv:1806.06518  [pdf, other

    cs.CR cs.CY

    Mending Wall: On the Implementation of Censorship in India

    Authors: Devashish Gosain, Anshika Agarwal, Sahil Shekhawat, H. B. Acharya, S. Chakravarty

    Abstract: This paper presents a study of the Internet infrastructure in India from the point of view of censorship. First, we show that the current state of affairs---where each ISP implements its own content filters (nominally as per a governmental blacklist)---results in dramatic differences in the censorship experienced by customers. In practice, a well-informed Indian citizen can escape censorship throu… ▽ More

    Submitted 18 June, 2018; originally announced June 2018.

  11. arXiv:1712.06358  [pdf, ps, other

    cs.GT physics.soc-ph q-fin.GN

    The Saga of KPR: Theoretical and Experimental developments

    Authors: Kiran Sharma, Anamika, Anindya S. Chakrabarti, Anirban Chakraborti, Sujoy Chakravarty

    Abstract: In this article, we present a brief narration of the origin and the overview of the recent developments done on the Kolkata Paise Restaurant (KPR) problem, which can serve as a prototype for a broader class of resource allocation problems in the presence of a large number of competing agents, typically studied using coordination and anti-coordination games. We discuss the KPR and its several exten… ▽ More

    Submitted 18 December, 2017; originally announced December 2017.

    Comments: 14 pages, Submitted for publication in a special issue in Science and Culture (Kolkata, India)

  12. arXiv:1710.05527  [pdf, other

    cs.CR

    The Devils in The Details: Placing Decoy Routers in the Internet

    Authors: Devashish Gosain, Anshika Agarwal, Sambuddho Chakravarty, H. B. Acharya

    Abstract: Decoy Routing, the use of routers (rather than end hosts) as proxies, is a new direction in anti-censorship research. Decoy Routers (DRs), placed in Autonomous Systems, proxy traffic from users; so the adversary, e.g., a censorious government, attempts to avoid them. It is quite difficult to place DRs so the adversary cannot route around them for example, we need the cooperation of 850 ASes to con… ▽ More

    Submitted 16 October, 2017; originally announced October 2017.