Skip to main content

Showing 1–12 of 12 results for author: Dixit, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.05261  [pdf, other

    math.OC cs.LG cs.MS stat.ML

    Disciplined Geodesically Convex Programming

    Authors: Andrew Cheng, Vaibhav Dixit, Melanie Weber

    Abstract: Convex programming plays a fundamental role in machine learning, data science, and engineering. Testing convexity structure in nonlinear programs relies on verifying the convexity of objectives and constraints. \citet{grant2006disciplined} introduced a framework, Disciplined Convex Programming (DCP), for automating this verification task for a wide range of convex functions that can be decomposed… ▽ More

    Submitted 7 July, 2024; originally announced July 2024.

  2. arXiv:2301.00836  [pdf

    cs.HC cs.CL

    Kannudi -- A Reference Editor for Kannada

    Authors: Vishweshwar V. Dixit

    Abstract: Kannudi is a reference editor for Kannada based on OPOK! and OHOK! principles, and domain knowledge. It introduces a method of input for Kannada, called OHOK!, that is, Ottu Haku Ottu Kodu! (apply pressure and give ottu). This is especially suited for pressure sensitive input devices, though the current online implementation uses the regular mechanical keyboard. OHOK! has three possible modes, nam… ▽ More

    Submitted 23 December, 2022; originally announced January 2023.

    Comments: 7 pages, 2 figures, 4 tables

  3. MiSeRTrace: Kernel-level Request Tracing for Microservice Visibility

    Authors: Thrivikraman V, Vishnu R. Dixit, Nikhil Ram S, Vikas K. Gowda, Santhosh Kumar Vasudevan, Subramaniam Kalambur

    Abstract: With the evolution of microservice applications, the underlying architectures have become increasingly complex compared to their monolith counterparts. This mainly brings in the challenge of observability. By providing a deeper understanding into the functioning of distributed applications, observability enables improving the performance of the system by obtaining a view of the bottlenecks in the… ▽ More

    Submitted 3 December, 2022; v1 submitted 26 March, 2022; originally announced March 2022.

  4. arXiv:2107.10196  [pdf, other

    quant-ph cs.DS

    Prime Factorization Using Quantum Variational Imaginary Time Evolution

    Authors: Raja Selvarajan, Vivek Dixit, Xingshan Cui, Travis S. Humble, Sabre Kais

    Abstract: The road to computing on quantum devices has been accelerated by the promises that come from using Shor's algorithm to reduce the complexity of prime factorization. However, this promise hast not yet been realized due to noisy qubits and lack of robust error correction schemes. Here we explore a promising, alternative method for prime factorization that uses well-established techniques from variat… ▽ More

    Submitted 19 July, 2021; originally announced July 2021.

    Comments: 9 pages, 5 graphs, 1 circuit image, 1 supplementary page

  5. arXiv:2012.07244  [pdf, other

    cs.LG

    Bayesian Neural Ordinary Differential Equations

    Authors: Raj Dandekar, Karen Chung, Vaibhav Dixit, Mohamed Tarek, Aslan Garcia-Valadez, Krishna Vishal Vemula, Chris Rackauckas

    Abstract: Recently, Neural Ordinary Differential Equations has emerged as a powerful framework for modeling physical simulations without explicitly defining the ODEs governing the system, but instead learning them via machine learning. However, the question: "Can Bayesian learning frameworks be integrated with Neural ODE's to robustly quantify the uncertainty in the weights of a Neural ODE?" remains unanswe… ▽ More

    Submitted 6 February, 2022; v1 submitted 13 December, 2020; originally announced December 2020.

    Comments: 16 pages, 10 figures, 3 tables; added new inference methods, substantially improved MNIST accuracy, revised author affiliations

  6. Training a quantum annealing based restricted Boltzmann machine on cybersecurity data

    Authors: Vivek Dixit, Raja Selvarajan, Tamer Aldwairi, Yaroslav Koshka, Mark A. Novotny, Travis S. Humble, Muhammad A. Alam, Sabre Kais

    Abstract: We present a real-world application that uses a quantum computer. Specifically, we train a RBM using QA for cybersecurity applications. The D-Wave 2000Q has been used to implement QA. RBMs are trained on the ISCX data, which is a benchmark dataset for cybersecurity. For comparison, RBMs are also trained using CD. CD is a commonly used method for RBM training. Our analysis of the ISCX data shows th… ▽ More

    Submitted 16 April, 2021; v1 submitted 24 November, 2020; originally announced November 2020.

    Comments: in IEEE Transactions on Emerging Topics in Computational Intelligence

    Journal ref: V. Dixit et al., "Training a Quantum Annealing Based Restricted Boltzmann Machine on Cybersecurity Data," in IEEE Transactions on Emerging Topics in Computational Intelligence, doi: 10.1109/TETCI.2021.3074916

  7. arXiv:2006.01382  [pdf, other

    cs.GT math.OC

    Online Incentive-Compatible Mechanisms for Traffic Intersection Auctions

    Authors: David Rey, Michael W Levin, Vinayak V Dixit

    Abstract: We present novel online mechanisms for traffic intersection auctions in which users bid for priority service. We assume that users at the front of their lane are requested to declare their delay cost, i.e. value of time, and that users are serviced in decreasing order of declared delay cost. Since users are expected to arrive dynamically at traffic intersections, static pricing approaches may fail… ▽ More

    Submitted 13 October, 2020; v1 submitted 2 June, 2020; originally announced June 2020.

  8. Training and Classification using a Restricted Boltzmann Machine on the D-Wave 2000Q

    Authors: Vivek Dixit, Raja Selvarajan, Muhammad A. Alam, Travis S. Humble, Sabre Kais

    Abstract: Restricted Boltzmann Machine (RBM) is an energy based, undirected graphical model. It is commonly used for unsupervised and supervised machine learning. Typically, RBM is trained using contrastive divergence (CD). However, training with CD is slow and does not estimate exact gradient of log-likelihood cost function. In this work, the model expectation of gradient learning for RBM has been calculat… ▽ More

    Submitted 7 May, 2020; originally announced May 2020.

    Comments: Front. Phys., 29 June 2021

  9. arXiv:1902.02376  [pdf, other

    cs.LG stat.ML

    DiffEqFlux.jl - A Julia Library for Neural Differential Equations

    Authors: Chris Rackauckas, Mike Innes, Yingbo Ma, Jesse Bettencourt, Lyndon White, Vaibhav Dixit

    Abstract: DiffEqFlux.jl is a library for fusing neural networks and differential equations. In this work we describe differential equations from the viewpoint of data science and discuss the complementary nature between machine learning models and differential equations. We demonstrate the ability to incorporate DifferentialEquations.jl-defined differential equation problems into a Flux-defined neural netwo… ▽ More

    Submitted 6 February, 2019; originally announced February 2019.

    Comments: Julialang Blog post, DiffEqFlux.jl

  10. arXiv:1409.2697  [pdf

    cs.NE

    Particle Swarm Optimized Fuzzy Controller for Indirect Vector Control of Multilevel Inverter Fed Induction Motor

    Authors: Sanjaya Kumar Sahu, T. V. Dixit, D. D. Neema

    Abstract: The Particle Swarm Optimized (PSO) fuzzy controller has been proposed for indirect vector control of induction motor. In this proposed scheme a Neutral Point Clamped (NPC) multilevel inverter is used and hysteresis current control technique has been adopted for switching the IGBTs. A Mamdani type fuzzy controller is used in place of conventional PI controller. To ensure better performance of fuzzy… ▽ More

    Submitted 5 September, 2014; originally announced September 2014.

    Comments: 9 pages, published in Volume 11, issue 4, july 2014, IJCSI

    Journal ref: Volume 11, issue 4, july 2014, IJCSI

  11. arXiv:1307.6814  [pdf

    cs.LG

    A Propound Method for the Improvement of Cluster Quality

    Authors: Shveta Kundra Bhatia, V. S. Dixit

    Abstract: In this paper Knockout Refinement Algorithm (KRA) is proposed to refine original clusters obtained by applying SOM and K-Means clustering algorithms. KRA Algorithm is based on Contingency Table concepts. Metrics are computed for the Original and Refined Clusters. Quality of Original and Refined Clusters are compared in terms of metrics. The proposed algorithm (KRA) is tested in the educational dom… ▽ More

    Submitted 25 July, 2013; originally announced July 2013.

    Journal ref: IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 2, July 2012 ISSN (Online): 1694-0814

  12. arXiv:1201.4210  [pdf

    cs.IR cs.AI

    Collaborative Personalized Web Recommender System using Entropy based Similarity Measure

    Authors: Harita Mehta, Shveta Kundra Bhatia, Punam Bedi, V. S. Dixit

    Abstract: On the internet, web surfers, in the search of information, always strive for recommendations. The solutions for generating recommendations become more difficult because of exponential increase in information domain day by day. In this paper, we have calculated entropy based similarity between users to achieve solution for scalability problem. Using this concept, we have implemented an online user… ▽ More

    Submitted 20 January, 2012; originally announced January 2012.

    Comments: 10 pages

    Journal ref: IJCSI, Vol 8, Issue 6, No 3, Nov 2011