Skip to main content

Showing 1–37 of 37 results for author: Ramachandran, S

Searching in archive cs. Search in all archives.
.
  1. Scalable and Efficient Hierarchical Visual Topological Map**

    Authors: Saravanabalagi Ramachandran, Jonathan Horgan, Ganesh Sistu, John McDonald

    Abstract: Hierarchical topological representations can significantly reduce search times within map** and localization algorithms. Although recent research has shown the potential for such approaches, limited consideration has been given to the suitability and comparative performance of different global feature representations within this context. In this work, we evaluate state-of-the-art hand-crafted an… ▽ More

    Submitted 7 April, 2024; originally announced April 2024.

    Comments: Published in the 21st International Conference on Advanced Robotics (ICAR 2023)

  2. arXiv:2401.00910  [pdf, other

    cs.CV cs.LG

    WoodScape Motion Segmentation for Autonomous Driving -- CVPR 2023 OmniCV Workshop Challenge

    Authors: Saravanabalagi Ramachandran, Nathaniel Cibik, Ganesh Sistu, John McDonald

    Abstract: Motion segmentation is a complex yet indispensable task in autonomous driving. The challenges introduced by the ego-motion of the cameras, radial distortion in fisheye lenses, and the need for temporal consistency make the task more complicated, rendering traditional and standard Convolutional Neural Network (CNN) approaches less effective. The consequent laborious data labeling, representation of… ▽ More

    Submitted 16 January, 2024; v1 submitted 31 December, 2023; originally announced January 2024.

    Comments: CVPR 2023 OmniCV Workshop Challenge

  3. arXiv:2309.16359  [pdf, ps, other

    cs.DC

    Byzantine Resilient Computing with the Cloud

    Authors: John Augustine, Jeffin Biju, Shachar Meir, David Peleg, Srikkanth Ramachandran, Aishwarya Thiruvengadam

    Abstract: We study a framework for modeling distributed network systems assisted by a reliable and powerful cloud service. Our framework aims at capturing hybrid systems based on a point to point message passing network of machines, with the additional capability of being able to access the services of a trusted high-performance external entity (the cloud). We focus on one concrete aspect that was not studi… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

    Comments: 54 pages

  4. arXiv:2212.14542  [pdf, other

    cs.DC

    Recurrent Problems in the LOCAL model

    Authors: Akanksha Agrawal, John Augustine, David Peleg, Srikkanth Ramachandran

    Abstract: The paper considers the SUPPORTED model of distributed computing introduced by Schmid and Suomela [HotSDN'13], generalizing the LOCAL and CONGEST models. In this framework, multiple instances of the same problem, differing from each other by the subnetwork to which they apply, recur over time, and need to be solved efficiently online. To do that, one may rely on an initial preprocessing phase for… ▽ More

    Submitted 29 December, 2022; originally announced December 2022.

    Comments: 48 pages, 11 figures

    ACM Class: F.2.0

  5. Fast and Efficient Scene Categorization for Autonomous Driving using VAEs

    Authors: Saravanabalagi Ramachandran, Jonathan Horgan, Ganesh Sistu, John McDonald

    Abstract: Scene categorization is a useful precursor task that provides prior knowledge for many advanced computer vision tasks with a broad range of applications in content-based image indexing and retrieval systems. Despite the success of data driven approaches in the field of computer vision such as object detection, semantic segmentation, etc., their application in learning high-level features for scene… ▽ More

    Submitted 26 October, 2022; originally announced October 2022.

    Comments: Published in the 24th Irish Machine Vision and Image Processing Conference (IMVIP 2022)

    Journal ref: The 24th Irish Machine Vision and Image Processing Conference (IMVIP), 2022, 9-16

  6. arXiv:2208.08382  [pdf, other

    cs.CV cs.AI cs.LG

    Deep Generative Views to Mitigate Gender Classification Bias Across Gender-Race Groups

    Authors: Sreeraj Ramachandran, Ajita Rattani

    Abstract: Published studies have suggested the bias of automated face-based gender classification algorithms across gender-race groups. Specifically, unequal accuracy rates were obtained for women and dark-skinned people. To mitigate the bias of gender classifiers, the vision community has developed several strategies. However, the efficacy of these mitigation strategies is demonstrated for a limited number… ▽ More

    Submitted 17 August, 2022; originally announced August 2022.

    Comments: 20 pages, 4 figures, 9 tables, ICPR workshop

  7. arXiv:2206.12912  [pdf, other

    cs.CV

    Woodscape Fisheye Object Detection for Autonomous Driving -- CVPR 2022 OmniCV Workshop Challenge

    Authors: Saravanabalagi Ramachandran, Ganesh Sistu, Varun Ravi Kumar, John McDonald, Senthil Yogamani

    Abstract: Object detection is a comprehensively studied problem in autonomous driving. However, it has been relatively less explored in the case of fisheye cameras. The strong radial distortion breaks the translation invariance inductive bias of Convolutional Neural Networks. Thus, we present the WoodScape fisheye object detection challenge for autonomous driving which was held as part of the CVPR 2022 Work… ▽ More

    Submitted 26 June, 2022; originally announced June 2022.

    Comments: Workshop on Omnidirectional Computer Vision (OmniCV) at Conference on Computer Vision and Pattern Recognition (CVPR) 2021

  8. The Drift of #MyBodyMyChoice Discourse on Twitter

    Authors: Cristina Menghini, Justin Uhr, Shahrzad Haddadan, Ashley Champagne, Bjorn Sandstede, Sohini Ramachandran

    Abstract: #MyBodyMyChoice is a well-known hashtag originally created to advocate for women's rights, often used in discourse about abortion and bodily autonomy. The Covid-19 outbreak prompted governments to take containment measures such as vaccination campaigns and mask mandates. Population groups opposed to such measures started to use the slogan "My Body My Choice" to claim their bodily autonomy. In this… ▽ More

    Submitted 10 May, 2022; originally announced May 2022.

    Comments: Accepted at WebSci'22

  9. arXiv:2202.13719  [pdf, ps, other

    cs.DC cs.CG

    Guarding Polygons with Holes

    Authors: John Augustine, Srikkanth Ramachandran

    Abstract: We study the Cooperative Guarding problem for polygons with holes in a mobile multi-agents setting. Given a set of agents, initially deployed at a point in a polygon with $n$ vertices and $h$ holes, we require the agents to collaboratively explore and position themselves in such a way that every point in the polygon is visible to at least one agent and that the set of agents are visibly connected.… ▽ More

    Submitted 28 February, 2022; originally announced February 2022.

  10. arXiv:2112.13956  [pdf, other

    cs.CR

    A Blockchain-based Data Governance Framework with Privacy Protection and Provenance for e-Prescription

    Authors: Rodrigo Dutra Garcia, Gowri Sankar Ramachandran, Raja Jurdak, Jo Ueyama

    Abstract: Real-world applications in healthcare and supply chain domains produce, exchange, and share data in a multi-stakeholder environment. Data owners want to control their data and privacy in such settings. On the other hand, data consumers demand methods to understand when, how, and who produced the data. These requirements necessitate data governance frameworks that guarantee data provenance, privacy… ▽ More

    Submitted 27 December, 2021; originally announced December 2021.

  11. BBM92 quantum key distribution over a free space dusty channel of 200 meters

    Authors: Sarika Mishra, Ayan Biswas, Satyajeet Patil, Pooja Chandravanshi, Vardaan Mongia, Tanya Sharma, Anju Rani, Shashi Prabhakar, S. Ramachandran, Ravindra P. Singh

    Abstract: Free space quantum communication assumes importance as it is a precursor for satellite-based quantum communication needed for secure key distribution over longer distances. Prepare and measure protocols like BB84 consider the satellite as a trusted device, which is fraught with security threat looking at the current trend for satellite-based optical communication. Therefore, entanglement-based pro… ▽ More

    Submitted 9 January, 2022; v1 submitted 22 December, 2021; originally announced December 2021.

    Comments: 7 pages, 6 figures, 2 tables

    Journal ref: Journal of Optics 24, 074002 (2022)

  12. arXiv:2110.04427  [pdf, other

    cs.CV cs.AI cs.LG

    Harnessing Unlabeled Data to Improve Generalization of Biometric Gender and Age Classifiers

    Authors: Aakash Varma Nadimpalli, Narsi Reddy, Sreeraj Ramachandran, Ajita Rattani

    Abstract: With significant advances in deep learning, many computer vision applications have reached the inflection point. However, these deep learning models need large amount of labeled data for model training and optimum parameter estimation. Limited labeled data for model training results in over-fitting and impacts their generalization performance. However, the collection and annotation of large amount… ▽ More

    Submitted 8 October, 2021; originally announced October 2021.

    Comments: 7 pages, 5 figures, 5 tables

  13. arXiv:2110.01640  [pdf, other

    cs.CV cs.AI cs.LG

    An Experimental Evaluation on Deepfake Detection using Deep Face Recognition

    Authors: Sreeraj Ramachandran, Aakash Varma Nadimpalli, Ajita Rattani

    Abstract: Significant advances in deep learning have obtained hallmark accuracy rates for various computer vision applications. However, advances in deep generative models have also led to the generation of very realistic fake content, also known as deepfakes, causing a threat to privacy, democracy, and national security. Most of the current deepfake detection methods are deemed as a binary classification p… ▽ More

    Submitted 4 October, 2021; originally announced October 2021.

    Comments: 6 pages, 3 figures

  14. arXiv:2109.01071  [pdf, other

    eess.IV cs.CV

    Towards disease-aware image editing of chest X-rays

    Authors: Aakash Saboo, Sai Niranjan Ramachandran, Kai Dierkes, Hacer Yalim Keles

    Abstract: Disease-aware image editing by means of generative adversarial networks (GANs) constitutes a promising avenue for advancing the use of AI in the healthcare sector. Here, we present a proof of concept of this idea. While GAN-based techniques have been successful in generating and manipulating natural images, their application to the medical domain, however, is still in its infancy. Working with the… ▽ More

    Submitted 3 September, 2021; v1 submitted 2 September, 2021; originally announced September 2021.

  15. arXiv:2108.12032  [pdf, other

    cs.CR

    Blockchain in Supply Chain: Opportunities and Design Considerations

    Authors: Gowri Sankar Ramachandran, Sidra Malik, Shantanu Pal, Ali Dorri, Volkan Dedeoglu, Salil Kanhere, Raja Jurdak

    Abstract: Supply chain applications operate in a multi-stakeholder setting, demanding trust, provenance, and transparency. Blockchain technology provides mechanisms to establish a decentralized infrastructure involving multiple stakeholders. Such mechanisms make the blockchain technology ideal for multi-stakeholder supply chain applications. This chapter introduces the characteristics and requirements of th… ▽ More

    Submitted 26 August, 2021; originally announced August 2021.

  16. arXiv:2108.09817  [pdf, other

    eess.SP cs.AI cs.LG cs.NE

    Electroencephalogram Signal Processing with Independent Component Analysis and Cognitive Stress Classification using Convolutional Neural Networks

    Authors: Venkatakrishnan Sutharsan, Alagappan Swaminathan, Saisrinivasan Ramachandran, Madan Kumar Lakshmanan, Balaji Mahadevan

    Abstract: Electroencephalogram (EEG) is the recording which is the result due to the activity of bio-electrical signals that is acquired from electrodes placed on the scalp. In Electroencephalogram signal(EEG) recordings, the signals obtained are contaminated predominantly by the Electrooculogram(EOG) signal. Since this artifact has higher magnitude compared to EEG signals, these noise signals have to be re… ▽ More

    Submitted 22 August, 2021; originally announced August 2021.

    Comments: 16 pages, 10 figures, 2 tables, 8 equations, 16 references

    Journal ref: Lecture Notes in Networks and Systems, vol 341, 01 January 2022

  17. arXiv:2107.08246  [pdf, other

    cs.CV cs.RO

    Woodscape Fisheye Semantic Segmentation for Autonomous Driving -- CVPR 2021 OmniCV Workshop Challenge

    Authors: Saravanabalagi Ramachandran, Ganesh Sistu, John McDonald, Senthil Yogamani

    Abstract: We present the WoodScape fisheye semantic segmentation challenge for autonomous driving which was held as part of the CVPR 2021 Workshop on Omnidirectional Computer Vision (OmniCV). This challenge is one of the first opportunities for the research community to evaluate the semantic segmentation techniques targeted for fisheye camera perception. Due to strong radial distortion standard models don't… ▽ More

    Submitted 17 July, 2021; originally announced July 2021.

    Comments: Workshop on Omnidirectional Computer Vision (OmniCV) at Conference on Computer Vision and Pattern Recognition (CVPR) 2021. Presentation video is available at https://youtu.be/xa7Fl2mD4CA?t=12253

  18. arXiv:2107.07557  [pdf, other

    cs.CV cs.RO

    OdoViz: A 3D Odometry Visualization and Processing Tool

    Authors: Saravanabalagi Ramachandran, John McDonald

    Abstract: OdoViz is a reactive web-based tool for 3D visualization and processing of autonomous vehicle datasets designed to support common tasks in visual place recognition research. The system includes functionality for loading, inspecting, visualizing, and processing GPS/INS poses, point clouds and camera images. It supports a number of commonly used driving datasets and can be adapted to load custom dat… ▽ More

    Submitted 15 July, 2021; originally announced July 2021.

    Comments: Accepted, ITSC 2021

  19. Causal-aware Safe Policy Improvement for Task-oriented dialogue

    Authors: Govardana Sachithanandam Ramachandran, Kazuma Hashimoto, Caiming Xiong

    Abstract: The recent success of reinforcement learning's (RL) in solving complex tasks is most often attributed to its capacity to explore and exploit an environment where it has been trained. Sample efficiency is usually not an issue since cheap simulators are available to sample data on-policy. On the other hand, task oriented dialogues are usually learnt from offline data collected using human demonstrat… ▽ More

    Submitted 10 March, 2021; originally announced March 2021.

  20. arXiv:2012.03900  [pdf, other

    cs.LG cs.AI cs.CY cs.SI

    GAEA: Graph Augmentation for Equitable Access via Reinforcement Learning

    Authors: Govardana Sachithanandam Ramachandran, Ivan Brugere, Lav R. Varshney, Caiming Xiong

    Abstract: Disparate access to resources by different subpopulations is a prevalent issue in societal and sociotechnical networks. For example, urban infrastructure networks may enable certain racial groups to more easily access resources such as high-quality schools, grocery stores, and polling places. Similarly, social networks within universities and organizations may enable certain groups to more easily… ▽ More

    Submitted 9 April, 2021; v1 submitted 7 December, 2020; originally announced December 2020.

  21. arXiv:2007.14966  [pdf, other

    cs.CL cs.IT

    Mirostat: A Neural Text Decoding Algorithm that Directly Controls Perplexity

    Authors: Sourya Basu, Govardana Sachitanandam Ramachandran, Nitish Shirish Keskar, Lav R. Varshney

    Abstract: Neural text decoding is important for generating high-quality texts using language models. To generate high-quality text, popular decoding algorithms like top-k, top-p (nucleus), and temperature-based sampling truncate or distort the unreliable low probability tail of the language model. Though these methods generate high-quality text after parameter tuning, they are ad hoc. Not much is known abou… ▽ More

    Submitted 14 January, 2021; v1 submitted 29 July, 2020; originally announced July 2020.

    Comments: 25 pages, 12 figures

  22. arXiv:2007.10389  [pdf, other

    stat.ML cs.LG

    Generalizing Variational Autoencoders with Hierarchical Empirical Bayes

    Authors: Wei Cheng, Gregory Darnell, Sohini Ramachandran, Lorin Crawford

    Abstract: Variational Autoencoders (VAEs) have experienced recent success as data-generating models by using simple architectures that do not require significant fine-tuning of hyperparameters. However, VAEs are known to suffer from over-regularization which can lead to failure to escape local maxima. This phenomenon, known as posterior collapse, prevents learning a meaningful latent encoding of the data. R… ▽ More

    Submitted 20 July, 2020; originally announced July 2020.

    Comments: 13 pages

  23. arXiv:2005.05601  [pdf, other

    cs.DC cs.CG

    Guarding a Polygon Without Losing Touch

    Authors: Barath Ashok, John Augustine, Aditya Mehekare, Sridhar Ragupathi, Srikkanth Ramachandran, Suman Sourav

    Abstract: We study the classical Art Gallery Problem first proposed by Klee in 1973 from a mobile multi-agents perspective. Specifically, we require an optimally small number of agents (also called guards) to navigate and position themselves in the interior of an unknown simple polygon with $n$ vertices such that the collective view of all the agents covers the polygon. We consider the visibly connected s… ▽ More

    Submitted 12 May, 2020; originally announced May 2020.

  24. arXiv:1909.10888  [pdf, other

    cs.DC

    BlendSM-DDM: BLockchain-ENabled Secure Microservices for Decentralized Data Marketplaces

    Authors: Ronghua Xu, Gowri Sankar Ramachandran, Yu Chen, Bhaskar Krishnamachari

    Abstract: To promote the benefits of the Internet of Things (IoT) in smart communities and smart cities, a real-time data marketplace middleware platform, called the Intelligent IoT Integrator (I3), has been recently proposed. While facilitating the easy exchanges of real-time IoT data streams between device owners and third-party applications through the marketplace, I3 is presently a monolithic, centraliz… ▽ More

    Submitted 21 September, 2019; originally announced September 2019.

    Comments: Accepted and to be presented at the 2nd International Workshop on CLockchain Enabled Sustainable Smart Cities (BLESS 2019), held in conjunction with the 5th IEEE International Smart Cities Conference (ISC2 2019), Casablanca, Morocco, October 14 - 17, 2019. arXiv admin note: text overlap with arXiv:1902.10567

  25. arXiv:1907.00327  [pdf, other

    cs.MA cs.AI cs.CV

    Collaboration of AI Agents via Cooperative Multi-Agent Deep Reinforcement Learning

    Authors: Niranjan Balachandar, Justin Dieter, Govardana Sachithanandam Ramachandran

    Abstract: There are many AI tasks involving multiple interacting agents where agents should learn to cooperate and collaborate to effectively perform the task. Here we develop and evaluate various multi-agent protocols to train agents to collaborate with teammates in grid soccer. We train and evaluate our multi-agent methods against a team operating with a smart hand-coded policy. As a baseline, we train ag… ▽ More

    Submitted 30 June, 2019; originally announced July 2019.

    Comments: 9 pages, 7 figures, 2 tables

  26. arXiv:1905.10643  [pdf

    cs.SE

    A Reference Architecture for Blockchain-based Peer-to-Peer IoT Applications

    Authors: Gowri Sankar Ramachandran, Bhaskar Krishnamachari

    Abstract: The advent of Blockchain and Distributed Ledger Technologies enable IoT and smart city application developers to conceive new types of applications and solutions for identity management, trust, and data monetization. However, architecting blockchain-based IoT applications remain challenging due to the heterogeneous nature of blockchain platforms and lack of guidelines on how to interface existing… ▽ More

    Submitted 25 May, 2019; originally announced May 2019.

  27. arXiv:1904.01630  [pdf, other

    cs.DC cs.NI

    MOTIVE: Micropayments for trusted vehicular services

    Authors: Gowri Sankar Ramachandran, Xiang Ji, Pavas Navaney, Licheng Zheng, Martin Martinez, Bhaskar Krishnamachari

    Abstract: Increasingly, connected cars are becoming a decentralized data platform. With greater autonomy, they have growing needs for computation and perceiving the world around them through sensors. While todays generation of vehicles carry all the necessary sensor data and computation on board, we envision a future where vehicles can cooperate to increase their perception of the world beyond their immedia… ▽ More

    Submitted 28 February, 2019; originally announced April 2019.

  28. arXiv:1811.07367  [pdf, other

    cs.CR

    slimIoT: Scalable Lightweight Attestation Protocol For the Internet of Things

    Authors: Mahmoud Ammar, Mahdi Washha, Gowri Sankar Ramachandran, Bruno Crispo

    Abstract: The Internet of Things (IoT) is increasingly intertwined with critical industrial processes, yet contemporary IoT devices offer limited security features, creating a large new attack surface. Remote attestation is a well-known technique to detect cyber threats by remotely verifying the internal state of a networked embedded device through a trusted entity. Multi-device attestation has received lit… ▽ More

    Submitted 18 November, 2018; originally announced November 2018.

    Comments: This paper has been accepted at the 2018 IEEE Conference on Dependable and Secure Computing (DSC)

  29. arXiv:1807.03110  [pdf, other

    cs.DC

    Trinity: A Distributed Publish/Subscribe Broker with Blockchain-based Immutability

    Authors: Gowri Sankar Ramachandran, Kwame-Lante Wright, Bhaskar Krishnamachari

    Abstract: Internet-of-Things (IoT) and Supply Chain monitoring applications rely on messaging protocols for exchanging data. Contemporary IoT deployments widely use the publish-subscribe messaging model because of its resource-efficiency. However, the systems with publish-subscribe messaging model employ a centralized architecture, wherein the data from all the devices in the application network flows via a… ▽ More

    Submitted 12 June, 2018; originally announced July 2018.

  30. arXiv:1805.02818  [pdf, other

    cs.DC cs.CR cs.CY

    Blockchain for the IoT: Opportunities and Challenges

    Authors: Gowri Sankar Ramachandran, Bhaskar Krishnamachari

    Abstract: Blockchain technology has been transforming the financial industry and has created a new crypto-economy in the last decade. The foundational concepts such as decentralized trust and distributed ledger are promising for distributed, and large-scale Internet of Things (IoT) applications. However, the applications of Blockchain beyond cryptocurrencies in this domain are few and far between because of… ▽ More

    Submitted 7 May, 2018; originally announced May 2018.

  31. Selective Jamming of LoRaWAN using Commodity Hardware

    Authors: Emekcan Aras, Nicolas Small, Gowri Sankar Ramachandran, Stéphane Delbruel, Wouter Joosen, Danny Hughes

    Abstract: Long range, low power networks are rapidly gaining acceptance in the Internet of Things (IoT) due to their ability to economically support long-range sensing and control applications while providing multi-year battery life. LoRa is a key example of this new class of network and is being deployed at large scale in several countries worldwide. As these networks move out of the lab and into the real… ▽ More

    Submitted 6 December, 2017; originally announced December 2017.

    Comments: Mobiquitous 2017, November 7-10, 2017, Melbourne, VIC, Australia

  32. arXiv:1703.03939  [pdf

    cs.CL cs.LG cs.NE

    Ask Me Even More: Dynamic Memory Tensor Networks (Extended Model)

    Authors: Govardana Sachithanandam Ramachandran, Ajay Sohmshetty

    Abstract: We examine Memory Networks for the task of question answering (QA), under common real world scenario where training examples are scarce and under weakly supervised scenario, that is only extrinsic labels are available for training. We propose extensions for the Dynamic Memory Network (DMN), specifically within the attention mechanism, we call the resulting Neural Architecture as Dynamic Memory Ten… ▽ More

    Submitted 11 March, 2017; originally announced March 2017.

  33. arXiv:1108.3286   

    cs.SI physics.soc-ph

    A Lookahead algorithm to compute Betweenness Centrality

    Authors: B Vignesh, Siddharth S, Shridhar Ramachandran, Dr. Sudarshan Iyengar, Dr. C Pandu Rangan

    Abstract: The Betweenness Centrality index is a very important centrality measure in the analysis of a large number of networks. Despite its significance in a lot of interdisciplinary applications, its computation is very expensive. The fastest known algorithm presently is by Brandes which takes O(|V || E|) time for computation. In real life scenarios, it happens very frequently that a single vertex or a se… ▽ More

    Submitted 11 July, 2012; v1 submitted 16 August, 2011; originally announced August 2011.

    Comments: 12 pages, 5 figures The paper has been withdrawn due to the need for more extensive experimentation to provide further backing to the result

  34. arXiv:1107.4054  [pdf

    cs.CR

    Data Aggregation and Privacy for Police Patrols

    Authors: Sumalatha Ramachandran, Uttara Sridhar, Vidhya Srinivasan, J. Jaya Jothi

    Abstract: With a widespread growth in the potential applications of Wireless Sensor Networks, the need for reliable security mechanisms for them has increased manifold. This paper proposes a scheme, Privacy for Police Patrols (PPP), to provide secure data aggregation that relies on multilevel routing. Privacy factors have been identified and implemented. Aggregates are prepared and the summary of informatio… ▽ More

    Submitted 20 July, 2011; originally announced July 2011.

    Comments: 12 pages, 5 figures

    Journal ref: International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.2, No.2, June 2011, 51-62

  35. arXiv:1103.0133  [pdf, ps, other

    cs.NI

    Neighbor Oblivious and Finite-State Algorithms for Circumventing Local Minima in Geographic Forwarding

    Authors: Santosh Ramachandran, Chandramani Singh, S. V. R. Anand, Malati Hegde, Anurag Kumar, Rajesh Sundaresan

    Abstract: We propose distributed link reversal algorithms to circumvent communication voids in geographic routing. We also solve the attendant problem of integer overflow in these algorithms. These are achieved in two steps. First, we derive partial and full link reversal algorithms that do not require one-hop neighbor information, and convert a destination-disoriented directed acyclic graph (DAG) to a dest… ▽ More

    Submitted 4 May, 2012; v1 submitted 1 March, 2011; originally announced March 2011.

    Comments: 9 pages; "Neighbor oblivious link reversal over duty-cycled WSNs"

    Journal ref: National Conference on Communications (NCC) 2010, Chennai, India, Jan. 29-31, 2010, pages 1 - 5

  36. arXiv:1004.4460  [pdf

    cs.IR

    Handling Overload Conditions In High Performance Trustworthy Information Retrieval Systems

    Authors: Sumalatha Ramachandran, Sharon Joseph, Sujaya Paulraj, Vetriselvi Ramaraj

    Abstract: Web search engines retrieve a vast amount of information for a given search query. But the user needs only trustworthy and high-quality information from this vast retrieved data. The response time of the search engine must be a minimum value in order to satisfy the user. An optimum level of response time should be maintained even when the system is overloaded. This paper proposes an optimal Load S… ▽ More

    Submitted 26 April, 2010; originally announced April 2010.

    Comments: https://sites.google.com/site/journalofcomputing/

    Journal ref: Journal of Computing, Volume 2, Issue 4, April 2010, 70-75

  37. arXiv:0911.0914  [pdf

    cs.IR

    Enhanced Trustworthy and High-Quality Information Retrieval System for Web Search Engines

    Authors: Sumalatha Ramachandran, Sujaya Paulraj, Sharon Joseph, Vetriselvi Ramaraj

    Abstract: The WWW is the most important source of information. But, there is no guarantee for information correctness and lots of conflicting information is retrieved by the search engines and the quality of provided information also varies from low quality to high quality. We provide enhanced trustworthiness in both specific (entity) and broad (content) queries in web searching. The filtering of trustwor… ▽ More

    Submitted 17 November, 2009; v1 submitted 4 November, 2009; originally announced November 2009.

    Comments: International Journal of Computer Science Issues, IJCSI Volume 5, pp38-42, October 2009