Skip to main content

Showing 1–7 of 7 results for author: Ramyaa, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2112.12340  [pdf, ps, other

    cs.LG cs.CC

    Learning with distributional inverters

    Authors: Eric Binnendyk, Marco Carmosino, Antonina Kolokolova, Ramyaa Ramyaa, Manuel Sabin

    Abstract: We generalize the "indirect learning" technique of Furst et. al., 1991 to reduce from learning a concept class over a samplable distribution $μ$ to learning the same concept class over the uniform distribution. The reduction succeeds when the sampler for $μ$ is both contained in the target concept class and efficiently invertible in the sense of Impagliazzo & Luby, 1989. We give two applications.… ▽ More

    Submitted 22 December, 2021; originally announced December 2021.

  2. arXiv:2005.01800  [pdf, other

    cs.CR cs.LG stat.ML

    Mind the Gap: On Bridging the Semantic Gap between Machine Learning and Information Security

    Authors: Michael R. Smith, Nicholas T. Johnson, Joe B. Ingram, Armida J. Carbajal, Ramyaa Ramyaa, Evelyn Domschot, Christopher C. Lamb, Stephen J. Verzi, W. Philip Kegelmeyer

    Abstract: Despite the potential of Machine learning (ML) to learn the behavior of malware, detect novel malware samples, and significantly improve information security (InfoSec) we see few, if any, high-impact ML techniques in deployed systems, notwithstanding multiple reported successes in open literature. We hypothesize that the failure of ML in making high-impacts in InfoSec are rooted in a disconnect be… ▽ More

    Submitted 4 May, 2020; originally announced May 2020.

    Comments: 14 pages, 2 Figures, 6 tables

  3. arXiv:1908.02240  [pdf, other

    cs.NE

    Biologically inspired sleep algorithm for artificial neural networks

    Authors: Giri P Krishnan, Timothy Tadros, Ramyaa Ramyaa, Maxim Bazhenov

    Abstract: Sleep plays an important role in incremental learning and consolidation of memories in biological systems. Motivated by the processes that are known to be involved in sleep generation in biological networks, we developed an algorithm that implements a sleep-like phase in artificial neural networks (ANNs). After initial training phase, we convert the ANN to a spiking neural network (SNN) and simula… ▽ More

    Submitted 1 August, 2019; originally announced August 2019.

  4. arXiv:1506.01949  [pdf, ps, other

    cs.PL

    Denotational cost semantics for functional languages with inductive types

    Authors: Norman Danner, Daniel R. Licata, Ramyaa Ramyaa

    Abstract: A central method for analyzing the asymptotic complexity of a functional program is to extract and then solve a recurrence that expresses evaluation cost in terms of input size. The relevant notion of input size is often specific to a datatype, with measures including the length of a list, the maximum element in a list, and the height of a tree. In this work, we give a formal account of the extrac… ▽ More

    Submitted 5 June, 2015; originally announced June 2015.

    Comments: To appear in ICFP 2015

    ACM Class: F.3.1; F.3.2

  5. arXiv:1310.8317  [pdf, ps, other

    cs.CC

    Power of Nondetreministic JAGs on Cayley graphs

    Authors: Martin Hofmann, Ramyaa Ramyaa

    Abstract: The Immerman-Szelepcsenyi Theorem uses an algorithm for co-st- connectivity based on inductive counting to prove that NLOGSPACE is closed un- der complementation. We want to investigate whether counting is necessary for this theorem to hold. Concretely, we show that Nondeterministic Jum** Graph Autmata (ND-JAGs) (pebble automata on graphs), on several families of Cayley graphs, are equal in powe… ▽ More

    Submitted 30 October, 2013; originally announced October 2013.

  6. Implicit complexity for coinductive data: a characterization of corecurrence

    Authors: Daniel Leivant, Ramyaa Ramyaa

    Abstract: We propose a framework for reasoning about programs that manipulate coinductive data as well as inductive data. Our approach is based on using equational programs, which support a seamless combination of computation and reasoning, and using productivity (fairness) as the fundamental assertion, rather than bi-simulation. The latter is expressible in terms of the former. As an application to this… ▽ More

    Submitted 5 January, 2012; originally announced January 2012.

    Comments: In Proceedings DICE 2011, arXiv:1201.0345

    Journal ref: EPTCS 75, 2012, pp. 1-14

  7. Outage Probability of Multiple-Input Single-Output (MISO) Systems with Delayed Feedback

    Authors: Venkata Sreekanta Annpureddy, Devdutt V. Marathe, T. R. Ramya, Srikrishna Bhashyam

    Abstract: We investigate the effect of feedback delay on the outage probability of multiple-input single-output (MISO) fading channels. Channel state information at the transmitter (CSIT) is a delayed version of the channel state information available at the receiver (CSIR). We consider two cases of CSIR: (a) perfect CSIR and (b) CSI estimated at the receiver using training symbols. With perfect CSIR, und… ▽ More

    Submitted 5 November, 2007; v1 submitted 3 March, 2007; originally announced March 2007.

    Comments: Submitted to IEEE Transactions on Communications Jan 2007, Revised Jun 2007, Revised Nov 2007

    ACM Class: E.4