Skip to main content

Showing 1–40 of 40 results for author: DasGupta, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2210.04446  [pdf, other

    cs.RO

    Dimensional synthesis of spatial manipulators for velocity and force transmission for operation around a specified task point

    Authors: Akkarapakam Suneesh Jacob, Bhaskar Dasgupta

    Abstract: Dimensional synthesis refers to design of the dimensions of manipulators by optimising different kinds of performance indices. The motivation of this study is to perform dimensional synthesis for a wide set of spatial manipulators by optimising the manipulability of each manipulator around a pre-defined task point in the workspace and to finally give a prescription of manipulators along with their… ▽ More

    Submitted 10 October, 2022; originally announced October 2022.

  2. arXiv:2210.03327  [pdf, other

    cs.RO

    Enumeration of spatial manipulators by using the concept of Adjacency Matrix

    Authors: Akkarapakam Suneesh Jacob, Bhaskar Dasgupta, Rituparna Datta

    Abstract: This study is on the enumeration of spatial robotic manipulators, which is an essential basis for a companion study on dimensional synthesis, both of which together present a wider utility in manipulator synthesis. The enumeration of manipulators is done by using adjacency matrix concept. In this paper, a novel way of applying adjacency matrix to spatial manipulators with four types of joints, nam… ▽ More

    Submitted 5 May, 2024; v1 submitted 7 October, 2022; originally announced October 2022.

  3. arXiv:2208.09535  [pdf, other

    cs.DS cs.CC

    On computing Discretized Ricci curvatures of graphs: local algorithms and (localized) fine-grained reductions

    Authors: Bhaskar DasGupta, Elena Grigorescu, Tamalika Mukherjee

    Abstract: Characterizing shapes of high-dimensional objects via Ricci curvatures plays a critical role in many research areas in mathematics and physics. However, even though several discretizations of Ricci curvatures for discrete combinatorial objects such as networks have been proposed and studied by mathematicians, the computational complexity aspects of these discretizations have escaped the attention… ▽ More

    Submitted 10 August, 2023; v1 submitted 19 August, 2022; originally announced August 2022.

    Comments: To appear in the journal "Theoretical Computer Science"

    MSC Class: 68Q25; 68Q17; 68W25; 68W20; 68W40

  4. Comparative Analysis of Non-Blind Deblurring Methods for Noisy Blurred Images

    Authors: Poorna Banerjee Dasgupta

    Abstract: Image blurring refers to the degradation of an image wherein the image's overall sharpness decreases. Image blurring is caused by several factors. Additionally, during the image acquisition process, noise may get added to the image. Such a noisy and blurred image can be represented as the image resulting from the convolution of the original image with the associated point spread function, along wi… ▽ More

    Submitted 6 May, 2022; originally announced May 2022.

    Comments: 8 pages, Published with International Journal of Computer Trends and Technology (IJCTT), Volume-70 Issue-3, 2022

  5. Maximizing coverage while ensuring fairness: a tale of conflicting objective

    Authors: Abolfazl Asudeh, Tanya Berger-Wolf, Bhaskar DasGupta, Anastasios Sidiropoulos

    Abstract: Ensuring fairness in computational problems has emerged as a $key$ topic during recent years, buoyed by considerations for equitable resource distributions and social justice. It $is$ possible to incorporate fairness in computational problems from several perspectives, such as using optimization, game-theoretic or machine learning frameworks. In this paper we address the problem of incorporation o… ▽ More

    Submitted 19 July, 2022; v1 submitted 15 July, 2020; originally announced July 2020.

    Comments: Revised version, under submission to journal

    MSC Class: 68W25(Primary) 68W20; 68Q25; 68W40 (Secondary) ACM Class: F.2.2

    Journal ref: Algorithmica, 85, 1287-1331, 2023

  6. arXiv:1910.01565  [pdf, other

    cs.CC cs.CG cs.DM math.CO physics.soc-ph

    On partisan bias in redistricting: computational complexity meets the science of gerrymandering

    Authors: Tanima Chatterjee, Bhaskar DasGupta

    Abstract: The topic of this paper is "gerrymandering", namely the curse of deliberate creations of district maps with highly asymmetric electoral outcomes to disenfranchise voters, and it has a long legal history. Measuring and eliminating gerrymandering has enormous implications to sustain the backbone of democratic principles of a society. Although there is no dearth of legal briefs involving gerrymanderi… ▽ More

    Submitted 3 October, 2019; originally announced October 2019.

    Comments: Disclaimer: The authors were not supported, financially or otherwise, by any political party. The research results reported in this paper are purely scientific and reported as they are without any regard to which political party they may be of help (if at all)

    MSC Class: 68Q17; 68Q25; 68W20; 68W25; 68W40; 90C59 ACM Class: F.2.2; G.2.3; G.3; G.4; J.1; K.4

    Journal ref: Journal of Combinatorial Optimization, 40(2), 512-546, 2020

  7. arXiv:1908.03313  [pdf, other

    cs.IR cs.CL

    Using Semantic Role Knowledge for Relevance Ranking of Key Phrases in Documents: An Unsupervised Approach

    Authors: Prateeti Mohapatra, Neelamadhav Gantayat, Gargi B. Dasgupta

    Abstract: In this paper, we investigate the integration of sentence position and semantic role of words in a PageRank system to build a key phrase ranking method. We present the evaluation results of our approach on three scientific articles. We show that semantic role information, when integrated with a PageRank system, can become a new lexical feature. Our approach had an overall improvement on all the da… ▽ More

    Submitted 9 August, 2019; originally announced August 2019.

    Comments: 5 pages

  8. On analyzing and evaluating privacy measures for social networks under active attack

    Authors: Bhaskar DasGupta, Nasim Mobasheri, Ismael G. Yero

    Abstract: Widespread usage of complex interconnected social networks such as Facebook, Twitter and LinkedIn in modern internet era has also unfortunately opened the door for privacy violation of users of such networks by malicious entities. In this article we investigate, both theoretically and empirically, privacy violation measures of large networks under active attacks that was recently introduced in (In… ▽ More

    Submitted 16 September, 2018; originally announced September 2018.

    Comments: To appear in Information Sciences

    MSC Class: 68Q25; 68W25; 05C85

    Journal ref: Information Sciences, 473, 87-100, 2019

  9. arXiv:1808.05676  [pdf, other

    cs.DS cs.CC cs.DM

    Why did the shape of your network change? (On detecting network anomalies via non-local curvatures)

    Authors: Bhaskar DasGupta, Mano Vikash Janardhanan, Farzane Yahyanejad

    Abstract: $Anomaly$ $detection$ problems (also called $change$-$point$ $detection$ problems) have been studied in data mining, statistics and computer science over the last several decades in applications such as medical condition monitoring and weather change detection. In recent days, however, anomaly detection problems have become increasing more relevant in the context of $network$ $science… ▽ More

    Submitted 19 December, 2019; v1 submitted 16 August, 2018; originally announced August 2018.

    Comments: Final revised version; to appear in Algorithmica

    MSC Class: F.2.2; G.2.1; G.2.2 ACM Class: F.2.2; G.2.1; G.2.2

  10. arXiv:1804.10577  [pdf, other

    cs.CY cs.DM math.CO

    Alleviating partisan gerrymandering: can math and computers help to eliminate wasted votes?

    Authors: Tanima Chatterjee, Bhaskar DasGupta, Laura Palmieri, Zainab Al-Qurashi, Anastasios Sidiropoulos

    Abstract: Partisan gerrymandering is a major cause for voter disenfranchisement in United States. However, convincing US courts to adopt specific measures to quantify gerrymandering has been of limited success to date. Recently, Stephanopoulos and McGhee introduced a new and precise measure of partisan gerrymandering via the so-called "efficiency gap" that computes the absolutes difference of wasted votes b… ▽ More

    Submitted 27 April, 2018; originally announced April 2018.

    MSC Class: 68Q17; 68Q25; 68W20; 68W25; 68W40; 90C59 ACM Class: F.2.2; G.2.3; G.3; G.4; J.1; K.4

  11. Detection and Analysis of Human Emotions through Voice and Speech Pattern Processing

    Authors: Poorna Banerjee Dasgupta

    Abstract: The ability to modulate vocal sounds and generate speech is one of the features which set humans apart from other living beings. The human voice can be characterized by several attributes such as pitch, timbre, loudness, and vocal tone. It has often been observed that humans express their emotions by varying different vocal attributes during speech generation. Hence, deduction of human emotions th… ▽ More

    Submitted 27 October, 2017; originally announced October 2017.

    Comments: 3 pages, Published with International Journal of Computer Trends and Technology (IJCTT), Volume-52 Number-1, 2017

    Journal ref: International Journal of Computer Trends and Technology (IJCTT) V52(1):01-03, October 2017

  12. Algorithmic Analysis of Invisible Video Watermarking using LSB Encoding Over a Client-Server Framework

    Authors: Poorna Banerjee Dasgupta

    Abstract: Video watermarking is extensively used in many media-oriented applications for embedding watermarks, i.e. hidden digital data, in a video sequence to protect the video from illegal copying and to identify manipulations made in the video. In case of an invisible watermark, the human eye can not perceive any difference in the video, but a watermark extraction application can read the watermark and o… ▽ More

    Submitted 3 July, 2016; originally announced December 2016.

    Comments: 4 pages, Published with International Journal of Computer Trends and Technology (IJCTT), Volume-36 Number-3, June-2016

    Journal ref: International Journal of Computer Trends and Technology (IJCTT) V36(3):143-146, June 2016

  13. arXiv:1607.01438  [pdf, ps, other

    cs.CC cs.DM cs.SI

    On the Computational Complexities of Three Privacy Measures for Large Networks Under Active Attack

    Authors: Tanima Chatterjee, Bhaskar DasGupta, Nasim Mobasheri, Venkatkumar Srinivasan, Ismael G. Yero

    Abstract: With the arrival of modern internet era, large public networks of various types have come to existence to benefit the society as a whole and several research areas such as sociology, economics and geography in particular. However, the societal and research benefits of these networks have also given rise to potentially significant privacy issues in the sense that malicious entities may violate the… ▽ More

    Submitted 5 July, 2016; originally announced July 2016.

    Comments: 21 pages, 3 figures

    MSC Class: 68Q17; 68Q25; 68R10; 05C85; 68W25; 68W40 ACM Class: E.1; F.2.2; G.2.1; G.2.2; G.2.3; G.4; I.1.2

  14. arXiv:1603.08655  [pdf, other

    q-bio.PE cs.DS

    Locating a Phylogenetic Tree in a Reticulation-Visible Network in Quadratic Time

    Authors: Andreas DM Gunawan, Bhaskar DasGupta, Louxin Zhang

    Abstract: In phylogenetics, phylogenetic trees are rooted binary trees, whereas phylogenetic networks are rooted arbitrary acyclic digraphs. Edges are directed away from the root and leaves are uniquely labeled with taxa in phylogenetic networks. For the purpose of validating evolutionary models, biologists check whether or not a phylogenetic tree is contained in a phylogenetic network on the same taxa. Thi… ▽ More

    Submitted 29 March, 2016; originally announced March 2016.

    Comments: The journal version of arXiv:1507.02119v2

    ACM Class: F.2.2

  15. An Analytical Evaluation of Matricizing Least-Square-Errors Curve Fitting to Support High Performance Computation on Large Datasets

    Authors: Poorna Banerjee Dasgupta

    Abstract: The procedure of Least Square-Errors curve fitting is extensively used in many computer applications for fitting a polynomial curve of a given degree to approximate a set of data. Although various methodologies exist to carry out curve fitting on data, most of them have shortcomings with respect to efficiency especially where huge datasets are involved. This paper proposes and analyzes a matricize… ▽ More

    Submitted 25 December, 2015; originally announced December 2015.

    Comments: 3 pages, Published with International Journal of Computer Trends and Technology (IJCTT), Volume-30 Number-2, December-2015

    Journal ref: International Journal of Computer Trends and Technology (IJCTT) V30(2):113-115, December 2015

  16. arXiv:1510.08779  [pdf, ps, other

    cs.CC cs.DM math.CO

    Effect of Gromov-hyperbolicity Parameter on Cuts and Expansions in Graphs and Some Algorithmic Implications

    Authors: Bhaskar DasGupta, Marek Karpinski, Nasim Mobasheri, Farzaneh Yahyanejad

    Abstract: $δ$-hyperbolic graphs, originally conceived by Gromov in 1987, occur often in many network applications; for fixed $δ$, such graphs are simply called hyperbolic graphs and include non-trivial interesting classes of "non-expander" graphs. The main motivation of this paper is to investigate the effect of the hyperbolicity measure $δ$ on expansion and cut-size bounds on graphs (here $δ… ▽ More

    Submitted 7 February, 2017; v1 submitted 29 October, 2015; originally announced October 2015.

    Comments: Final corrected author version, to appear in the journal Algorithmica

    MSC Class: 68Q25; 68W25; 68W40; 05C85 ACM Class: F.2.2; G.2.2; I.1.2

    Journal ref: Algorithmica, 80(2), 772-800, 2018

  17. arXiv:1507.02119  [pdf, other

    q-bio.PE cs.DS

    Locating a Tree in a Reticulation-Visible Network in Cubic Time

    Authors: Andreas D. M. Gunawan, Bhaskar DasGupta, Louxin Zhang

    Abstract: In this work, we answer an open problem in the study of phylogenetic networks. Phylogenetic trees are rooted binary trees in which all edges are directed away from the root, whereas phylogenetic networks are rooted acyclic digraphs. For the purpose of evolutionary model validation, biologists often want to know whether or not a phylogenetic tree is contained in a phylogenetic network. The tree con… ▽ More

    Submitted 10 November, 2015; v1 submitted 8 July, 2015; originally announced July 2015.

    Comments: 25 pages, 3 figures

    ACM Class: F.2.2; G.2.2

  18. Algorithmic Analysis of Edge Ranking and Profiling for MTF Determination of an Imaging System

    Authors: Poorna Banerjee Dasgupta

    Abstract: Edge detection is one of the most principal techniques for detecting discontinuities in the gray levels of image pixels. The Modulation Transfer Function (MTF) is one of the main criteria for assessing imaging quality and is a parameter frequently used for measuring the sharpness of an imaging system. In order to determine the MTF, it is essential to determine the best edge from the target image s… ▽ More

    Submitted 20 May, 2015; originally announced May 2015.

    Comments: 3 pages, Published with International Journal of Computer Trends and Technology (IJCTT), Volume-23 Number-1, 2015

    Journal ref: International Journal of Computer Trends and Technology (IJCTT) V23(1):46-48, May 2015

  19. Analytical Comparison of Noise Reduction Filters for Image Restoration Using SNR Estimation

    Authors: Poorna Banerjee Dasgupta

    Abstract: Noise removal from images is a part of image restoration in which we try to reconstruct or recover an image that has been degraded by using apriori knowledge of the degradation phenomenon. Noises present in images can be of various types with their characteristic Probability Distribution Functions (PDF). Noise removal techniques depend on the kind of noise present in the image rather than on the i… ▽ More

    Submitted 2 December, 2014; originally announced December 2014.

    Comments: 4 pages,Published with International Journal of Computer Trends and Technology (IJCTT), volume 17 number 3, Nov 2014

    Journal ref: International Journal of Computer Trends and Technology (IJCTT) V17(3):121-124, Nov 2014. ISSN:2231-2803. www.ijcttjournal.org

  20. On optimal approximability results for computing the strong metric dimension

    Authors: Bhaskar DasGupta, Nasim Mobasheri

    Abstract: The strong metric dimension of a graph was first introduced by Sebö and Tannier (Mathematics of Operations Research, 29(2), 383-393, 2004) as an alternative to the (weak) metric dimension of graphs previously introduced independently by Slater (Proc. 6th Southeastern Conference on Combinatorics, Graph Theory, and Computing, 549-559, 1975) and by Harary and Melter (Ars Combinatoria, 2, 191-195, 197… ▽ More

    Submitted 20 October, 2016; v1 submitted 6 August, 2014; originally announced August 2014.

    Comments: revised version based on reviewer comments; to appear in Discrete Applied Mathematics

    MSC Class: 68Q17; 68Q25; 68R10 ACM Class: G.2.2; F.2.2

    Journal ref: Discrete Applied Mathematics, 221, 18-24, 2017

  21. arXiv:1403.1228  [pdf, ps, other

    q-bio.MN cs.DM cs.SI physics.soc-ph

    Topological implications of negative curvature for biological and social networks

    Authors: Reka Albert, Bhaskar DasGupta, Nasim Mobasheri

    Abstract: Network measures that reflect the most salient properties of complex large-scale networks are in high demand in the network research community. In this paper we adapt a combinatorial measure of negative curvature (also called hyperbolicity) to parameterized finite networks, and show that a variety of biological and social networks are hyperbolic. This hyperbolicity property has strong implications… ▽ More

    Submitted 5 March, 2014; originally announced March 2014.

    Comments: Physical Review E, 2014

    MSC Class: 92C42; 68R10; 05C40; 05C38; 05C82; 91D30 ACM Class: E.1; J.3; J.4

    Journal ref: Physical Review E, 89 (3), 032811, 2014

  22. Densely Entangled Financial Systems

    Authors: Bhaskar DasGupta, Lakshmi Kaligounder

    Abstract: In [1] Zawadoski introduces a banking network model in which the asset and counter-party risks are treated separately and the banks hedge their assets risks by appropriate OTC contracts. In his model, each bank has only two counter-party neighbors, a bank fails due to the counter-party risk only if at least one of its two neighbors default, and such a counter-party risk is a low probability event.… ▽ More

    Submitted 21 February, 2014; originally announced February 2014.

    Comments: to appear in Network Models in Economics and Finance, V. Kalyagin, P. M. Pardalos and T. M. Rassias (editors), Springer Optimization and Its Applications series, Springer, 2014

    MSC Class: 91G99; 91B30 ACM Class: J.1; J.4

    Journal ref: in Network Models in Economics and Finance, V. Kalyagin, P. M. Pardalos and Th. M. Rassias (eds.), Springer Optimization and Its Applications series, 100, 85-105, Springer, 2014

  23. arXiv:1312.7306  [pdf

    cs.CC cs.DS q-bio.MN

    Algorithmic Perspectives of Network Transitive Reduction Problems and their Applications to Synthesis and Analysis of Biological Networks

    Authors: Satabdi Aditya, Bhaskar DasGupta, Marek Karpinski

    Abstract: In this survey paper, we will present a number of core algorithmic questions concerning several transitive reduction problems on network that have applications in network synthesis and analysis involving cellular processes. Our starting point will be the so-called minimum equivalent digraph problem, a classic computational problem in combinatorial algorithms. We will subsequently consider a few no… ▽ More

    Submitted 27 December, 2013; originally announced December 2013.

    MSC Class: 68Q25; 68Q17; 68R10; 05C85; 68W25; 92C42; 92C40 ACM Class: E.1; F.2.2; G.2.1; J.3

    Journal ref: Biology, 3 (1), 1-21, 2014

  24. arXiv:1310.6894  [pdf

    cs.CG

    Domain Map** for Volumetric Parameterization using Harmonic Functions

    Authors: Vikash Gupta, Hari K. Voruganti, Bhaskar Dasgupta

    Abstract: Volumetric parameterization problem refers to parameterization of both the interior and boundary of a 3D model. It is a much harder problem compared to surface parameterization where a parametric representation is worked out only for the boundary of a 3D model (which is a surface). Volumetric parameterization is typically helpful in solving complicated geometric problems pertaining to shape matchi… ▽ More

    Submitted 25 October, 2013; originally announced October 2013.

    Comments: www.cadanda.com

    Journal ref: Computer-Aided Design & Applications, Vol. 10(a), 2013

  25. arXiv:1307.7385  [pdf

    q-bio.MN cs.CE cs.DM q-bio.QM

    Some Perspectives on Network Modeling in Therapeutic Target Prediction

    Authors: Reka Albert, Bhaskar DasGupta, Nasim Mobasheri

    Abstract: Drug target identification is of significant commercial interest to pharmaceutical companies, and there is a vast amount of research done related to the topic of therapeutic target identification. Interdisciplinary research in this area involves both the biological network community and the graph algorithms community. Key steps of a typical therapeutic target identification problem include synthes… ▽ More

    Submitted 28 July, 2013; originally announced July 2013.

    MSC Class: 92C42; 05C40; 05C85; 68R10 ACM Class: G.2.2; J.3

    Journal ref: Biomedical Engineering and Computational Biology, 5, 17-24, 2013

  26. arXiv:1211.6724   

    cs.CC cs.DM

    On Approximating Graph Bipartization via Node Deletion

    Authors: Bhaskar DasGupta, Lakshmi Kaligounder

    Abstract: Although the results are correct, it was pointed out that the results follow from some previously known results. Accordingly, this version of the paper is withdrawn by the authors.

    Submitted 29 November, 2012; v1 submitted 28 November, 2012; originally announced November 2012.

    Comments: Although the results are correct, it was pointed out that the results follow from some previously known results. Accordingly, this version of the paper is withdrawn by the authors

    MSC Class: 68Q25; 05C85 ACM Class: F.2.2; G.1.6; G.2.1; G.2.2

  27. arXiv:1208.3789  [pdf, ps, other

    q-fin.GN cs.CE

    On Global Stability of Financial Networks

    Authors: Bhaskar DasGupta, Lakshmi Kaligounder

    Abstract: The recent financial crisis have generated renewed interests in fragilities of global financial networks among economists and regulatory authorities. In particular, a potential vulnerability of the financial networks is the "financial contagion" process in which insolvencies of individual entities propagate through the "web of dependencies" to affect the entire system. In this paper, we formalize… ▽ More

    Submitted 25 August, 2014; v1 submitted 18 August, 2012; originally announced August 2012.

    Comments: arXiv admin note: text overlap with arXiv:1112.5687 by other authors. Prior title for this article was "Contagion in Financial Networks: Measure, Evaluation and Implications"

    MSC Class: 91B55; 91G99; 05C82 ACM Class: J.4

    Journal ref: Journal of Complex Networks, 2(3), 313-354, 2014

  28. arXiv:1111.3048  [pdf, ps, other

    cs.SI cs.CC physics.soc-ph

    On a Connection Between Small Set Expansions and Modularity Clustering in Social Networks

    Authors: Bhaskar DasGupta, Devendra Desai

    Abstract: In this paper we explore a connection between two seemingly different problems from two different domains: the small-set expansion problem studied in unique games conjecture, and a popular community finding approach for social networks known as the modularity clustering approach. We show that a sub-exponential time algorithm for the small-set expansion problem leads to a sub-exponential time const… ▽ More

    Submitted 11 February, 2014; v1 submitted 13 November, 2011; originally announced November 2011.

    Comments: Information Processing Letters, 2014

    MSC Class: 68Q25; 68W25 ACM Class: F.2.2; J.4

    Journal ref: Information Processing Letters, 114(7), 349-352, 2014

  29. arXiv:1110.3546  [pdf, ps, other

    q-fin.RM cs.CC cs.CE cs.DM

    On the Computational Complexity of Measuring Global Stability of Banking Networks

    Authors: Piotr Berman, Bhaskar DasGupta, Lakshmi Kaligounder, Marek Karpinski

    Abstract: Threats on the stability of a financial system may severely affect the functioning of the entire economy, and thus considerable emphasis is placed on the analyzing the cause and effect of such threats. The financial crisis in the current and past decade has shown that one important cause of instability in global markets is the so-called financial contagion, namely the spreading of instabilities or… ▽ More

    Submitted 9 March, 2013; v1 submitted 16 October, 2011; originally announced October 2011.

    Comments: to appear in Algorithmica

    MSC Class: 68Q17; 68Q25; 68W40; 68R10; 05C85; 91G50; 91B99; 62P05; 62P20 ACM Class: F.2.2; J.4; G.2.1; G.2.2; G.2.3

    Journal ref: Algorithmica, 70(4), 595-647, 2014

  30. arXiv:1108.6113  [pdf, ps, other

    physics.soc-ph cs.DM cs.SI math.DS q-bio.MN

    A New Computationally Efficient Measure of Topological Redundancy of Biological and Social Networks

    Authors: Reka Albert, Bhaskar DasGupta, Anthony Gitter, Gamze Gursoy, Rashmi Hegde, Pradyut Paul, Gowri Sangeetha Sivanathan, Eduardo Sontag

    Abstract: It is well-known that biological and social interaction networks have a varying degree of redundancy, though a consensus of the precise cause of this is so far lacking. In this paper, we introduce a topological redundancy measure for labeled directed networks that is formal, computationally efficient and applicable to a variety of directed networks such as cellular signaling, metabolic and social… ▽ More

    Submitted 5 November, 2011; v1 submitted 30 August, 2011; originally announced August 2011.

    Comments: 18 pages

    MSC Class: 68R10; 05C85; 05C82; 05C20; 05C40; 91D30; 92C42; 93C15; 37N25 ACM Class: J.3; J.4; F.2.2; G.2.1; G.2.2; G.2.3

    Journal ref: Physical Review E, 84 (3), 036117, 2011

  31. arXiv:1102.5471  [pdf, ps, other

    cs.CC cs.DS q-bio.PE

    An Implicit Cover Problem in Wild Population Study

    Authors: Mary V. Ashley, Tanya Y. Berger-Wolf, Wanpracha Chaovalitwongse, Bhaskar DasGupta, Ashfaq Khokhar, Saad Sheikh

    Abstract: In an implicit combinatorial optimization problem, the constraints are not enumerated explicitly but rather stated implicitly through equations, other constraints or auxiliary algorithms. An important subclass of such problems is the implicit set cover (or, equivalently, hitting set) problem in which the sets are not given explicitly but rather defined implicitly For example, the well-known minimu… ▽ More

    Submitted 26 February, 2011; originally announced February 2011.

    Comments: 11 pages

    MSC Class: 68Q17; 92D25 ACM Class: F.2.2; J.3

    Journal ref: Discrete Mathematics, Algorithms and Applications, 2 (2), 21-31, 2010

  32. arXiv:1102.4904  [pdf, ps, other

    q-bio.MN cs.CE q-bio.QM

    Reverse Engineering of Molecular Networks from a Common Combinatorial Approach

    Authors: Bhaskar DasGupta, Paola Vera-Licona, Eduardo Sontag

    Abstract: The understanding of molecular cell biology requires insight into the structure and dynamics of networks that are made up of thousands of interacting molecules of DNA, RNA, proteins, metabolites, and other components. One of the central goals of systems biology is the unraveling of the as yet poorly characterized complex web of interactions among these components. This work is made harder by the f… ▽ More

    Submitted 23 February, 2011; originally announced February 2011.

    Comments: 15 pages; in Algorithms in Computational Molecular Biology: Techniques, Approaches and Applications, M. Elloumi and A. Zomaya (editors), John Wiley & Sons, Inc., January 2011

    MSC Class: 92C42; 92C37; 92B05 ACM Class: J.3

  33. arXiv:1102.4005  [pdf, ps, other

    cs.DS cs.CC cs.DM

    Approximating the Online Set Multicover Problems Via Randomized Winnowing

    Authors: Piotr Berman, Bhaskar DasGupta

    Abstract: In this paper, we consider the weighted online set k-multicover problem. In this problem, we have a universe V of elements, a family S of subsets of V with a positive real cost for every set in S and a "coverage factor" (positive integer) k. A subset of elements are presented online in an arbitrary order. When each element, say i, is presented, we are also told the collection of all (at least k) s… ▽ More

    Submitted 19 February, 2011; originally announced February 2011.

    Comments: 22 pages

    MSC Class: 68Q25; 68R05 ACM Class: F.2.2; G.2.3

    Journal ref: Theoretical Computer Science, 393 (1-3), 54-71, 2008

  34. On Communication Protocols that Compute Almost Privately

    Authors: Marco Comi, Bhaskar DasGupta, Michael Schapira, Venkatakumar Srinivasan

    Abstract: A traditionally desired goal when designing auction mechanisms is incentive compatibility, i.e., ensuring that bidders fare best by truthfully reporting their preferences. A complementary goal, which has, thus far, received significantly less attention, is to preserve privacy, i.e., to ensure that bidders reveal no more information than necessary. We further investigate and generalize the approxim… ▽ More

    Submitted 9 July, 2012; v1 submitted 7 February, 2011; originally announced February 2011.

    Comments: to appear in Theoretical Computer Science (series A)

    MSC Class: 91B26; 91A99; 68Q99 ACM Class: F.0

    Journal ref: Theoretical Computer Science, 457, 45-58, 2012

  35. arXiv:1102.1006  [pdf, ps, other

    cs.CC cs.DM cs.DS q-bio.PE

    On Approximating Four Covering and Packing Problems

    Authors: Mary Ashley, Tanya Berger-Wolf, Piotr Berman, Wanpracha Chaovalitwongse, Bhaskar DasGupta, Ming-Yang Kao

    Abstract: In this paper, we consider approximability issues of the following four problems: triangle packing, full sibling reconstruction, maximum profit coverage and 2-coverage. All of them are generalized or specialized versions of set-cover and have applications in biology ranging from full-sibling reconstructions in wild populations to biomolecular clusterings; however, as this paper shows, their approx… ▽ More

    Submitted 4 February, 2011; originally announced February 2011.

    Comments: 25 pages

    MSC Class: 68Q17; 68Q25; 68W25; 68W40; 92D25 ACM Class: F.2.2; J.3

    Journal ref: Journal of Computer and System Sciences, 75, 287-302, 2009

  36. arXiv:1102.0969  [pdf, ps, other

    physics.soc-ph cs.CC cs.DM cs.SI

    On the Complexity of Newman's Community Finding Approach for Biological and Social Networks

    Authors: Bhaskar DasGupta, Devendra Desai

    Abstract: Given a graph of interactions, a module (also called a community or cluster) is a subset of nodes whose fitness is a function of the statistical significance of the pairwise interactions of nodes in the module. The topic of this paper is a model-based community finding approach, commonly referred to as modularity clustering, that was originally proposed by Newman and has subsequently been extremel… ▽ More

    Submitted 10 April, 2012; v1 submitted 4 February, 2011; originally announced February 2011.

    Comments: Journal of Computer and System Sciences, 2012

    MSC Class: 68Q25; 68R01; 05C85 ACM Class: F.2.2; G.2.2

    Journal ref: Journal of Computer & System Sciences, 79, 50-67, 2013

  37. arXiv:1001.2735  [pdf, ps, other

    cs.CC cs.GT cs.SI

    Stochastic Budget Optimization in Internet Advertising

    Authors: Bhaskar DasGupta, S. Muthukrishnan

    Abstract: Internet advertising is a sophisticated game in which the many advertisers "play" to optimize their return on investment. There are many "targets" for the advertisements, and each "target" has a collection of games with a potentially different set of players involved. In this paper, we study the problem of how advertisers allocate their budget across these "targets". In particular, we focus on for… ▽ More

    Submitted 3 February, 2013; v1 submitted 15 January, 2010; originally announced January 2010.

    Comments: FINAL version

    MSC Class: 68Q17; 68Q25; 91B26; 91B32 ACM Class: F.2.2; J.4

    Journal ref: Algorithmica, 65 (3), 634-661, 2013

  38. arXiv:0809.0188  [pdf, ps, other

    cs.CC cs.DM cs.DS

    Approximating Transitivity in Directed Networks

    Authors: Piotr Berman, Bhaskar DasGupta, Marek Karpinski

    Abstract: We study the problem of computing a minimum equivalent digraph (also known as the problem of computing a strong transitive reduction) and its maximum objective function variant, with two types of extensions. First, we allow to declare a set $D\subset E$ and require that a valid solution $A$ satisfies $D\subset A$ (it is sometimes called transitive reduction problem). In the second extension (cal… ▽ More

    Submitted 1 September, 2008; originally announced September 2008.

  39. arXiv:cs/0502065  [pdf, ps, other

    cs.DS

    Highly Scalable Algorithms for Robust String Barcoding

    Authors: Bhaskar DasGupta, Kishori M. Konwar, Ion I. Mandoiu, Alex A. Shvartsman

    Abstract: String barcoding is a recently introduced technique for genomic-based identification of microorganisms. In this paper we describe the engineering of highly scalable algorithms for robust string barcoding. Our methods enable distinguisher selection based on whole genomic sequences of hundreds of microorganisms of up to bacterial size on a well-equipped workstation, and can be easily parallelized… ▽ More

    Submitted 14 February, 2005; originally announced February 2005.

  40. arXiv:cs/0010031  [pdf, ps, other

    cs.CE cs.DS

    Opportunity Cost Algorithms for Combinatorial Auctions

    Authors: Karhan Akcoglu, James Aspnes, Bhaskar DasGupta, Ming-Yang Kao

    Abstract: Two general algorithms based on opportunity costs are given for approximating a revenue-maximizing set of bids an auctioneer should accept, in a combinatorial auction in which each bidder offers a price for some subset of the available goods and the auctioneer can only accept non-intersecting bids. Since this problem is difficult even to approximate in general, the algorithms are most useful whe… ▽ More

    Submitted 24 October, 2000; originally announced October 2000.

    Report number: DIMACS TR 2000-27 ACM Class: F.2.0; J.4