Skip to main content

Showing 1–45 of 45 results for author: Roychowdhury, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.04555  [pdf, other

    cs.CL cs.AI

    Creating an AI Observer: Generative Semantic Workspaces

    Authors: Pavan Holur, Shreyas Rajesh, David Chong, Vwani Roychowdhury

    Abstract: An experienced human Observer reading a document -- such as a crime report -- creates a succinct plot-like $\textit{``Working Memory''}$ comprising different actors, their prototypical roles and states at any point, their evolution over time based on their interactions, and even a map of missing Semantic parts anticipating them in the future.… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

    Comments: 37 pages with appendix, 28 figures

  2. arXiv:2309.11087  [pdf, other

    q-bio.GN cs.AI

    Embed-Search-Align: DNA Sequence Alignment using Transformer Models

    Authors: Pavan Holur, K. C. Enevoldsen, Shreyas Rajesh, Lajoyce Mboning, Thalia Georgiou, Louis-S. Bouchard, Matteo Pellegrini, Vwani Roychowdhury

    Abstract: DNA sequence alignment involves assigning short DNA reads to the most probable locations on an extensive reference genome. This process is crucial for various genomic analyses, including variant calling, transcriptomics, and epigenomics. Conventional methods, refined over decades, tackle this challenge in two steps: genome indexing followed by efficient search to locate likely positions for given… ▽ More

    Submitted 23 April, 2024; v1 submitted 20 September, 2023; originally announced September 2023.

    Comments: 13 pages, Tables 7, Figures 6

  3. arXiv:2303.11295  [pdf, other

    cond-mat.soft cs.RO

    Rapid design of fully soft deployable structures via kirigami cuts and active learning

    Authors: Leixin Ma, Mrunmayi Mungekar, Vwani Roychowdhury, M. Khalid Jawed

    Abstract: Soft deployable structures - unlike conventional piecewise rigid deployables based on hinges and springs - can assume intricate 3-D shapes, thereby enabling transformative technologies in soft robotics, shape-morphing architecture, and pop-up manufacturing. Their virtually infinite degrees of freedom allow precise control over the final shape. The same enabling high dimensionality, however, poses… ▽ More

    Submitted 4 March, 2023; originally announced March 2023.

  4. arXiv:2301.06727  [pdf

    cs.ET physics.app-ph

    Roadmap for Unconventional Computing with Nanotechnology

    Authors: Giovanni Finocchio, Jean Anne C. Incorvia, Joseph S. Friedman, Qu Yang, Anna Giordano, Julie Grollier, Hyunsoo Yang, Florin Ciubotaru, Andrii Chumak, Azad J. Naeemi, Sorin D. Cotofana, Riccardo Tomasello, Christos Panagopoulos, Mario Carpentieri, Peng Lin, Gang Pan, J. Joshua Yang, Aida Todri-Sanial, Gabriele Boschetto, Kremena Makasheva, Vinod K. Sangwan, Amit Ranjan Trivedi, Mark C. Hersam, Kerem Y. Camsari, Peter L. McMahon , et al. (26 additional authors not shown)

    Abstract: In the "Beyond Moore's Law" era, with increasing edge intelligence, domain-specific computing embracing unconventional approaches will become increasingly prevalent. At the same time, adopting a variety of nanotechnologies will offer benefits in energy cost, computational speed, reduced footprint, cyber resilience, and processing power. The time is ripe for a roadmap for unconventional computing w… ▽ More

    Submitted 27 February, 2024; v1 submitted 17 January, 2023; originally announced January 2023.

    Comments: 80 pages accepted in Nano Futures

    Journal ref: Nano Futures (2024)

  5. arXiv:2301.00957  [pdf, other

    cs.LG physics.comp-ph

    Metalearning generalizable dynamics from trajectories

    Authors: Qiaofeng Li, Tianyi Wang, Vwani Roychowdhury, M. Khalid Jawed

    Abstract: We present the interpretable meta neural ordinary differential equation (iMODE) method to rapidly learn generalizable (i.e., not parameter-specific) dynamics from trajectories of multiple dynamical systems that vary in their physical parameters. The iMODE method learns meta-knowledge, the functional variations of the force field of dynamical system instances without knowing the physical parameters… ▽ More

    Submitted 27 September, 2023; v1 submitted 3 January, 2023; originally announced January 2023.

  6. arXiv:2207.08164  [pdf, other

    cs.CV cs.MM

    Action-conditioned On-demand Motion Generation

    Authors: Qiu**g Lu, Yipeng Zhang, Mingjian Lu, Vwani Roychowdhury

    Abstract: We propose a novel framework, On-Demand MOtion Generation (ODMO), for generating realistic and diverse long-term 3D human motion sequences conditioned only on action types with an additional capability of customization. ODMO shows improvements over SOTA approaches on all traditional motion evaluation metrics when evaluated on three public datasets (HumanAct12, UESTC, and MoCap). Furthermore, we pr… ▽ More

    Submitted 17 July, 2022; originally announced July 2022.

    Comments: Accepted by ACMMM 2022, 13 pages, 5 figures

  7. arXiv:2207.03104  [pdf, other

    stat.ML cond-mat.stat-mech cs.LG quant-ph

    Quantum Advantage in Variational Bayes Inference

    Authors: Hideyuki Miyahara, Vwani Roychowdhury

    Abstract: Variational Bayes (VB) inference algorithm is used widely to estimate both the parameters and the unobserved hidden variables in generative statistical models. The algorithm -- inspired by variational methods used in computational physics -- is iterative and can get easily stuck in local minima, even when classical techniques, such as deterministic annealing (DA), are used. We study a variational… ▽ More

    Submitted 7 July, 2022; originally announced July 2022.

  8. Quantum Approximation of Normalized Schatten Norms and Applications to Learning

    Authors: Yiyou Chen, Hideyuki Miyahara, Louis-S. Bouchard, Vwani Roychowdhury

    Abstract: Efficient measures to determine similarity of quantum states, such as the fidelity metric, have been widely studied. In this paper, we address the problem of defining a similarity measure for quantum operations that can be \textit{efficiently estimated}. Given two quantum operations, $U_1$ and $U_2$, represented in their circuit forms, we first develop a quantum sampling circuit to estimate the no… ▽ More

    Submitted 23 June, 2022; originally announced June 2022.

    Comments: 25 pages, 4 figures, 6 tables, 1 algorithm

  9. arXiv:2205.03484  [pdf, other

    cs.LG

    Diverse Imitation Learning via Self-Organizing Generative Models

    Authors: Arash Vahabpour, Tianyi Wang, Qiu**g Lu, Omead Pooladzandi, Vwani Roychowdhury

    Abstract: Imitation learning is the task of replicating expert policy from demonstrations, without access to a reward function. This task becomes particularly challenging when the expert exhibits a mixture of behaviors. Prior work has introduced latent variables to model variations of the expert policy. However, our experiments show that the existing works do not exhibit appropriate imitation of individual… ▽ More

    Submitted 6 May, 2022; originally announced May 2022.

  10. arXiv:2203.04356  [pdf, other

    cs.CL

    Which side are you on? Insider-Outsider classification in conspiracy-theoretic social media

    Authors: Pavan Holur, Tianyi Wang, Shadi Shahsavari, Timothy Tangherlini, Vwani Roychowdhury

    Abstract: Social media is a breeding ground for threat narratives and related conspiracy theories. In these, an outside group threatens the integrity of an inside group, leading to the emergence of sharply defined group identities: Insiders -- agents with whom the authors identify and Outsiders -- agents who threaten the insiders. Inferring the members of these groups constitutes a challenging new NLP task:… ▽ More

    Submitted 30 March, 2022; v1 submitted 8 March, 2022; originally announced March 2022.

    Comments: ACL 2022: 60th Annual Meeting of the Association for Computational Linguistics 8+4 pages, 6 figures

  11. arXiv:2109.05959  [pdf

    cs.ET physics.optics

    Physics-AI Symbiosis

    Authors: Bahram Jalali, Achuta Kadambi, Vwani Roychowdhury

    Abstract: The phenomenal success of physics in explaining nature and designing hardware is predicated on efficient computational models. A universal codebook of physical laws defines the computational rules and a physical system is an interacting ensemble governed by these rules. Led by deep neural networks, artificial intelligence (AI) has introduced an alternate end-to-end data-driven computational framew… ▽ More

    Submitted 10 September, 2021; originally announced September 2021.

  12. arXiv:2105.01150  [pdf, other

    cs.CL stat.AP

    Modeling Social Readers: Novel Tools for Addressing Reception from Online Book Reviews

    Authors: Pavan Holur, Shadi Shahsavari, Ehsan Ebrahimzadeh, Timothy R. Tangherlini, Vwani Roychowdhury

    Abstract: Readers' responses to literature have received scant attention in computational literary studies. The rise of social media offers an opportunity to capture a segment of these responses while data-driven analysis of these responses can provide new critical insight into how people "read". Posts discussing an individual book on Goodreads, a social media platform that hosts user discussions of popular… ▽ More

    Submitted 7 May, 2021; v1 submitted 3 May, 2021; originally announced May 2021.

  13. An automated pipeline for the discovery of conspiracy and conspiracy theory narrative frameworks: Bridgegate, Pizzagate and storytelling on the web

    Authors: Timothy R. Tangherlini, Shadi Shahsavari, Behnam Shahbazi, Ehsan Ebrahimzadeh, Vwani Roychowdhury

    Abstract: Although a great deal of attention has been paid to how conspiracy theories circulate on social media and their factual counterpart conspiracies, there has been little computational work done on describing their narrative structures. We present an automated pipeline for the discovery and description of the generative narrative frameworks of conspiracy theories on social media, and actual conspirac… ▽ More

    Submitted 23 August, 2020; originally announced August 2020.

    Comments: conspiracy theory, narrative structure

  14. arXiv:2008.02400  [pdf

    eess.SP cs.ET

    Accuracy and Resiliency of Analog Compute-in-Memory Inference Engines

    Authors: Zhe Wan, Tianyi Wang, Yiming Zhou, Subramanian S. Iyer, Vwani P. Roychowdhury

    Abstract: Recently, analog compute-in-memory (CIM) architectures based on emerging analog non-volatile memory (NVM) technologies have been explored for deep neural networks (DNN) to improve energy efficiency. Such architectures, however, leverage charge conservation, an operation with infinite resolution, and thus are susceptible to errors. The computations in DNN realized by analog NVM thus have high uncer… ▽ More

    Submitted 5 August, 2020; originally announced August 2020.

  15. arXiv:2004.13783  [pdf, other

    cs.CL cs.SI

    Conspiracy in the Time of Corona: Automatic detection of Covid-19 Conspiracy Theories in Social Media and the News

    Authors: Shadi Shahsavari, Pavan Holur, Timothy R. Tangherlini, Vwani Roychowdhury

    Abstract: Rumors and conspiracy theories thrive in environments of low confidence and low trust. Consequently, it is not surprising that ones related to the Covid-19 pandemic are proliferating given the lack of any authoritative scientific consensus on the virus, its spread and containment, or on the long term social and economic ramifications of the pandemic. Among the stories currently circulating are one… ▽ More

    Submitted 28 April, 2020; originally announced April 2020.

    Comments: Covid-19, Corona virus, conspiracy theories, 5G, Bill Gates, China, bio-weapons, rumor, narrative, machinelearning, social media, 4Chan, Reddit, networks, data visualization

  16. An Automated Pipeline for Character and Relationship Extraction from Readers' Literary Book Reviews on Goodreads.com

    Authors: Shadi Shahsavari, Ehsan Ebrahimzadeh, Behnam Shahbazi, Misagh Falahi, Pavan Holur, Roja Bandari, Timothy R. Tangherlini, Vwani Roychowdhury

    Abstract: Reader reviews of literary fiction on social media, especially those in persistent, dedicated forums, create and are in turn driven by underlying narrative frameworks. In their comments about a novel, readers generally include only a subset of characters and their relationships, thus offering a limited perspective on that work. Yet in aggregate, these reviews capture an underlying narrative framew… ▽ More

    Submitted 20 April, 2020; originally announced April 2020.

  17. arXiv:1910.04864  [pdf, other

    cs.CV cs.LG stat.ML

    Brain-inspired automated visual object discovery and detection

    Authors: Lichao Chen, Sudhir Singh, Thomas Kailath, Vwani Roychowdhury

    Abstract: Despite significant recent progress, machine vision systems lag considerably behind their biological counterparts in performance, scalability, and robustness. A distinctive hallmark of the brain is its ability to automatically discover and model objects, at multiscale resolutions, from repeated exposures to unlabeled contextual data and then to be able to robustly detect the learned objects under… ▽ More

    Submitted 29 September, 2019; originally announced October 2019.

    Journal ref: PNAS January 2, 2019 116 (1) 96-105

  18. arXiv:1505.00055  [pdf

    physics.soc-ph cs.CY stat.AP

    Chess players' fame versus their merit

    Authors: M. V. Simkin, V. P. Roychowdhury

    Abstract: We investigate a pool of international chess title holders born between 1901 and 1943. Using Elo ratings we compute for every player his expected score in a game with a randomly selected player from the pool. We use this figure as player's merit. We measure players' fame as the number of Google hits. The correlation between fame and merit is 0.38. At the same time the correlation between the logar… ▽ More

    Submitted 30 April, 2015; originally announced May 2015.

    Comments: To appear in Applied Economics Letters

    Journal ref: Applied Economics Letters 22(18):1499-1504, 2015

  19. arXiv:1304.1567  [pdf, other

    cs.SI cs.IR physics.soc-ph

    Blind Men and the Elephant: Detecting Evolving Groups In Social News

    Authors: Roja Bandari, Hazhir Rahmandad, Vwani P. Roychowdhury

    Abstract: We propose an automated and unsupervised methodology for a novel summarization of group behavior based on content preference. We show that graph theoretical community evolution (based on similarity of user preference for content) is effective in indexing these dynamics. Combined with text analysis that targets automatically-identified representative content for each community, our method produces… ▽ More

    Submitted 2 November, 2013; v1 submitted 4 April, 2013; originally announced April 2013.

    Comments: 10 pages, icwsm2013

    MSC Class: 91C20; 91D30; 91D10; 68R10; 05C70 ACM Class: H.3.1; I.5.2; G.2.2; J.4

  20. arXiv:1202.3492  [pdf

    cs.IR physics.soc-ph

    Why does attention to web articles fall with time?

    Authors: M. V. Simkin, V. P. Roychowdhury

    Abstract: We analyze access statistics of a hundred and fifty blog entries and news articles, for periods of up to three years. Access rate falls as an inverse power of time passed since publication. The power law holds for periods of up to thousand days. The exponents are different for different blogs and are distributed between 0.6 and 3.2. We argue that the decay of attention to a web article is caused b… ▽ More

    Submitted 20 December, 2014; v1 submitted 10 February, 2012; originally announced February 2012.

    Comments: To appear in JASIST

    Journal ref: Journal of the Association for Information Science and Technology, 66(9):1847-1856, 2015

  21. arXiv:1103.2500   

    quant-ph cs.CC

    How much of quantum mechanics is really needed to defy Extended Church-Turing Thesis?

    Authors: Leonid Gurvits, Vwani Roychowdhury, Sudhir Kumar Singh, Farrokh Vatan

    Abstract: This paper has been withdrawn by the author as one of the coauthors needs institutional permission.

    Submitted 15 March, 2011; v1 submitted 13 March, 2011; originally announced March 2011.

    Comments: This paper has been withdrawn

  22. arXiv:0906.3558  [pdf

    physics.soc-ph cs.CY physics.hist-ph stat.AP

    Estimating achievement from fame

    Authors: M. V. Simkin, V. P. Roychowdhury

    Abstract: We report a method for estimating people's achievement based on their fame. Earlier we discovered (cond-mat/0310049) that fame of fighter pilot aces (measured as number of Google hits) grows exponentially with their achievement (number of victories). We hypothesize that the same functional relation between achievement and fame holds for other professions. This allows us to estimate achievement for… ▽ More

    Submitted 15 March, 2011; v1 submitted 18 June, 2009; originally announced June 2009.

    Journal ref: Significance 8 (2011) 22-26

  23. arXiv:0901.0296  [pdf, ps, other

    cs.CY cs.IR physics.soc-ph

    Experience versus Talent Shapes the Structure of the Web

    Authors: Joseph S. Kong, Nima Sarshar, Vwani P. Roychowdhury

    Abstract: We use sequential large-scale crawl data to empirically investigate and validate the dynamics that underlie the evolution of the structure of the web. We find that the overall structure of the web is defined by an intricate interplay between experience or entitlement of the pages (as measured by the number of inbound hyperlinks a page already has), inherent talent or fitness of the pages (as mea… ▽ More

    Submitted 2 January, 2009; originally announced January 2009.

    Journal ref: Proceedings of the National Academy of Sciences (PNAS), Vol. 105, Pages 13724-13729, 2008

  24. arXiv:0804.1840  [pdf, ps, other

    cs.GT cs.IT

    Selfish Distributed Compression over Networks: Correlation Induces Anarchy

    Authors: Aditya Ramamoorthy, Vwani Roychowdhury, Sudhir Kumar Singh

    Abstract: We consider the min-cost multicast problem (under network coding) with multiple correlated sources where each terminal wants to losslessly reconstruct all the sources. We study the inefficiency brought forth by the selfish behavior of the terminals in this scenario by modeling it as a noncooperative game among the terminals. The degradation in performance due to the lack of regulation is measure… ▽ More

    Submitted 1 March, 2009; v1 submitted 11 April, 2008; originally announced April 2008.

    Comments: replaced with revised version, 32 pages, 2 figures

  25. arXiv:0802.1957  [pdf, ps, other

    cs.GT cs.CC cs.DS

    To Broad-Match or Not to Broad-Match : An Auctioneer's Dilemma ?

    Authors: Sudhir Kumar Singh, Vwani P. Roychowdhury

    Abstract: We initiate the study of an interesting aspect of sponsored search advertising, namely the consequences of broad match-a feature where an ad of an advertiser can be mapped to a broader range of relevant queries, and not necessarily to the particular keyword(s) that ad is associated with. Starting with a very natural setting for strategies available to the advertisers, and via a careful look thro… ▽ More

    Submitted 21 July, 2008; v1 submitted 13 February, 2008; originally announced February 2008.

    Comments: 33 pages, 10 figures, new results added, substantially revised

  26. arXiv:0711.1569  [pdf, ps, other

    cs.GT

    Capacity as a Fundamental Metric for Mechanism Design in the Information Economy

    Authors: Sudhir Kumar Singh, Vwani P. Roychowdhury

    Abstract: The auction theory literature has so far focused mostly on the design of mechanisms that takes the revenue or the efficiency as a yardstick. However, scenarios where the {\it capacity}, which we define as \textit{``the number of bidders the auctioneer wants to have a positive probability of getting the item''}, is a fundamental concern are ubiquitous in the information economy. For instance, in… ▽ More

    Submitted 9 November, 2007; originally announced November 2007.

    Comments: 12 pages

  27. arXiv:0711.0259  [pdf, ps, other

    cs.GT

    Diversification in the Internet Economy:The Role of For-Profit Mediators

    Authors: Sudhir Kumar Singh, Vwani P. Roychowdhury, Himawan Gunadhi, Behnam A. Rezaei

    Abstract: We investigate market forces that would lead to the emergence of new classes of players in the sponsored search market. We report a 3-fold diversification triggered by two inherent features of the sponsored search market, namely, capacity constraints and collusion-vulnerability of current mechanisms. In the first scenario, we present a comparative study of two models motivated by capacity constr… ▽ More

    Submitted 2 November, 2007; originally announced November 2007.

    Comments: 20 pages, subsumes arXiv:0707.1057

  28. arXiv:0709.4048  [pdf, ps, other

    cs.DC cs.NI

    A Symphony Conducted by Brunet

    Authors: P. Oscar Boykin, Jesse S. A. Bridgewater, Joseph S. Kong, Kamen M. Lozev, Behnam A. Rezaei, Vwani P. Roychowdhury

    Abstract: We introduce BruNet, a general P2P software framework which we use to produce the first implementation of Symphony, a 1-D Kleinberg small-world architecture. Our framework is designed to easily implement and measure different P2P protocols over different transport layers such as TCP or UDP. This paper discusses our implementation of the Symphony network, which allows each node to keep… ▽ More

    Submitted 25 September, 2007; originally announced September 2007.

    Comments: 13 pages, 11 figures

  29. arXiv:0709.0204  [pdf, ps, other

    cs.GT

    Capacity constraints and the inevitability of mediators in adword auctions

    Authors: Sudhir Kumar Singh, Vwani P. Roychowdhury, Himawan Gunadhi, Behnam A. Rezaei

    Abstract: One natural constraint in the sponsored search advertising framework arises from the fact that there is a limit on the number of available slots, especially for the popular keywords, and as a result, a significant pool of advertisers are left out. We study the emergence of diversification in the adword market triggered by such capacity constraints in the sense that new market mechanisms, as well… ▽ More

    Submitted 3 September, 2007; originally announced September 2007.

    Comments: 6 pages

  30. arXiv:0707.1057  [pdf, ps, other

    cs.GT

    For-profit mediators in sponsored search advertising

    Authors: Sudhir Kumar Singh, Vwani P. Roychowdhury, Himawan Gunadhi, Behnam A. Rezaei

    Abstract: A mediator is a well-known construct in game theory, and is an entity that plays on behalf of some of the agents who choose to use its services, while the rest of the agents participate in the game directly. We initiate a game theoretic study of sponsored search auctions, such as those used by Google and Yahoo!, involving {\em incentive driven} mediators. We refer to such mediators as {\em for-p… ▽ More

    Submitted 3 September, 2007; v1 submitted 6 July, 2007; originally announced July 2007.

    Comments: 6 pages

  31. arXiv:0707.1053  [pdf, ps, other

    cs.GT

    Exploration via design and the cost of uncertainty in keyword auctions

    Authors: Sudhir Kumar Singh, Vwani P. Roychowdhury, Milan Bradonjić, Behnam A. Rezaei

    Abstract: We present a deterministic exploration mechanism for sponsored search auctions, which enables the auctioneer to learn the relevance scores of advertisers, and allows advertisers to estimate the true value of clicks generated at the auction site. This exploratory mechanism deviates only minimally from the mechanism being currently used by Google and Yahoo! in the sense that it retains the same pr… ▽ More

    Submitted 2 November, 2007; v1 submitted 6 July, 2007; originally announced July 2007.

    Comments: 19 pages, presentation improved, references added, title changed

  32. arXiv:cs/0606122  [pdf, ps, other

    cs.DC cs.NI

    Comparison of Image Similarity Queries in P2P Systems

    Authors: Wolfgang Mueller, P. Oscar Boykin, Nima Sarshar, Vwani P. Roychowdhury

    Abstract: Given some of the recent advances in Distributed Hash Table (DHT) based Peer-To-Peer (P2P) systems we ask the following questions: Are there applications where unstructured queries are still necessary (i.e., the underlying queries do not efficiently map onto any structured framework), and are there unstructured P2P systems that can deliver the high bandwidth and computing performance necessary t… ▽ More

    Submitted 29 June, 2006; originally announced June 2006.

    Comments: To appear in IEEE P2P2006

  33. arXiv:cs/0604021  [pdf, ps, other

    cs.IT

    Low Latency Wireless Ad-Hoc Networking: Power and Bandwidth Challenges and a Hierarchical Solution

    Authors: Nima Sarshar, Behnam A. Rezaei, Vwani P. Roychowdhury

    Abstract: This paper is concerned with the scaling of the number of hops in a large scale wireless ad-hoc network (WANET), a quantity we call network latency. A large network latency affects all aspects of data communication in a WANET, including an increase in delay, packet loss, required processing power and memory. We consider network management and data routing challenges in WANETs with scalable netwo… ▽ More

    Submitted 6 April, 2006; originally announced April 2006.

  34. A General Framework for Scalability and Performance Analysis of DHT Routing Systems

    Authors: Joseph S. Kong, Jesse S. A. Bridgewater, Vwani P. Roychowdhury

    Abstract: In recent years, many DHT-based P2P systems have been proposed, analyzed, and certain deployments have reached a global scale with nearly one million nodes. One is thus faced with the question of which particular DHT system to choose, and whether some are inherently more robust and scalable. Toward develo** such a comparative framework, we present the reachable component method (RCM) for anal… ▽ More

    Submitted 28 March, 2006; originally announced March 2006.

    Comments: 11 pages, 8 figures; to be published in IEEE DSN 2006

  35. arXiv:quant-ph/0511175  [pdf, ps, other

    quant-ph cs.CR cs.IT

    A Proof of the Security of Quantum Key Distribution

    Authors: Eli Biham, Michel Boyer, P. Oscar Boykin, Tal Mor, Vwani Roychowdhury

    Abstract: We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages such that their security is also unaffected in the future.

    Submitted 17 November, 2005; originally announced November 2005.

    Comments: 64 pages; Accepted for publication in J. of Cryptology; replaces quant-ph/9912053; short version appeared in STOC'2000 pages 715-724

    Journal ref: Journal of cryptology 19, 381-439 (2006)

  36. arXiv:physics/0504026  [pdf, ps, other

    physics.soc-ph cond-mat.dis-nn cs.CY cs.NI

    Let Your CyberAlter Ego Share Information and Manage Spam

    Authors: Joseph S. Kong, P. Oscar Boykin, Behnam A. Rezaei, Nima Sarshar, Vwani P. Roychowdhury

    Abstract: Almost all of us have multiple cyberspace identities, and these {\em cyber}alter egos are networked together to form a vast cyberspace social network. This network is distinct from the world-wide-web (WWW), which is being queried and mined to the tune of billions of dollars everyday, and until recently, has gone largely unexplored. Empirically, the cyberspace social networks have been found to p… ▽ More

    Submitted 7 May, 2005; v1 submitted 4 April, 2005; originally announced April 2005.

    Comments: 13 pages, 10 figures

    Journal ref: Collaborative Spam Filtering Using E-Mail Networks, IEEE Computer, Vol. 39, No. 8, pages 67-73, 2006

  37. arXiv:cs/0504010  [pdf, ps, other

    cs.IT quant-ph

    Reversible Fault-Tolerant Logic

    Authors: P. Oscar Boykin, Vwani P. Roychowdhury

    Abstract: It is now widely accepted that the CMOS technology implementing irreversible logic will hit a scaling limit beyond 2016, and that the increased power dissipation is a major limiting factor. Reversible computing can potentially require arbitrarily small amounts of energy. Recently several nano-scale devices which have the potential to scale, and which naturally perform reversible logic, have emer… ▽ More

    Submitted 4 April, 2005; originally announced April 2005.

    Comments: 10 pages, to appear in DSN 2005

  38. arXiv:cond-mat/0504185  [pdf, ps, other

    cond-mat.stat-mech cs.DS cs.NI physics.data-an physics.soc-ph

    Disaster Management in Scale-Free Networks: Recovery from and Protection Against Intentional Attacks

    Authors: Behnam A. Rezaei, Nima Sarshar, P. Oscar Boykin, Vwani P. Roychowdhury

    Abstract: Susceptibility of scale free Power Law (PL) networks to attacks has been traditionally studied in the context of what may be termed as {\em instantaneous attacks}, where a randomly selected set of nodes and edges are deleted while the network is kept {\em static}. In this paper, we shift the focus to the study of {\em progressive} and instantaneous attacks on {\em reactive} grown and random PL n… ▽ More

    Submitted 11 May, 2005; v1 submitted 7 April, 2005; originally announced April 2005.

    Comments: 12 pages, to be submitted to PRE

  39. arXiv:cs/0411046  [pdf, ps, other

    cs.DC

    Balanced Overlay Networks (BON): Decentralized Load Balancing via Self-Organized Random Networks

    Authors: Jesse S. A. Bridgewater, P. Oscar Boykin, Vwani P. Roychowdhury

    Abstract: We present a novel framework, called balanced overlay networks (BON), that provides scalable, decentralized load balancing for distributed computing using large-scale pools of heterogeneous computers. Fundamentally, BON encodes the information about each node's available computational resources in the structure of the links connecting the nodes in the network. This distributed encoding is self-o… ▽ More

    Submitted 16 January, 2006; v1 submitted 15 November, 2004; originally announced November 2004.

    Comments: 13 pages, 12 figures. Draft submitted to IEEE TPDS

    ACM Class: C.2.4

  40. arXiv:cond-mat/0406152  [pdf, ps, other

    cond-mat.dis-nn cs.NI

    Scalable Percolation Search in Power Law Networks

    Authors: Nima Sarshar, P. Oscar Boykin, Vwani P. Roychowdhury

    Abstract: We introduce a scalable searching algorithm for finding nodes and contents in random networks with Power-Law (PL) and heavy-tailed degree distributions. The network is searched using a probabilistic broadcast algorithm, where a query message is relayed on each edge with probability just above the bond percolation threshold of the network. We show that if each node caches its directory via a shor… ▽ More

    Submitted 7 June, 2004; originally announced June 2004.

    Journal ref: Best paper award Fourth International Conference on Peer-to-Peer Computing, pp. 2-9, 2004

  41. arXiv:cond-mat/0402143  [pdf, ps, other

    cond-mat.dis-nn cs.NI

    Personal Email Networks: An Effective Anti-Spam Tool

    Authors: P. Oscar Boykin, Vwani Roychowdhury

    Abstract: We provide an automated graph theoretic method for identifying individual users' trusted networks of friends in cyberspace. We routinely use our social networks to judge the trustworthiness of outsiders, i.e., to decide where to buy our next car, or to find a good mechanic for it. In this work, we show that an email user may similarly use his email network, constructed solely from sender and rec… ▽ More

    Submitted 4 February, 2004; originally announced February 2004.

    Comments: 8 pages, 7 figures

    Journal ref: IEEE Computer, Vol. 38, No. 4, pages 61-68, April 2005

  42. arXiv:cs/0210010  [pdf, ps, other

    cs.NI cs.DC

    A Random Structure for Optimum Cache Size Distributed hash table (DHT) Peer-to-Peer design

    Authors: Nima Sarshar, Vwani Roychowdhury

    Abstract: We propose a new and easily-realizable distributed hash table (DHT) peer-to-peer structure, incorporating a random caching strategy that allows for {\em polylogarithmic search time} while having only a {\em constant cache} size. We also show that a very large class of deterministic caching strategies, which covers almost all previously proposed DHT systems, can not achieve polylog search time wi… ▽ More

    Submitted 13 October, 2002; originally announced October 2002.

    Comments: 13 pages, 2 figures, preprint version

    ACM Class: H.3.3

  43. arXiv:quant-ph/0104053  [pdf, ps, other

    quant-ph cs.CC

    Quantum Formulas: a Lower Bound and Simulation

    Authors: Vwani P. Roychowdhury, Farrokh Vatan

    Abstract: We show that Nechiporuk's method for proving lower bounds for Boolean formulas can be extended to the quantum case. This leads to an $Ω(n^2 / \log^2 n)$ lower bound for quantum formulas computing an explicit function. The only known previous explicit lower bound for quantum formulas states that the majority function does not have a linear-size quantum formula. We also show that quantum formulas… ▽ More

    Submitted 10 April, 2001; originally announced April 2001.

    Comments: 22 pages, LaTeX, 6 figures. Final and extended version of quant-ph/9903042. To appear in SIAM Journal on Computing

  44. arXiv:math/0104016  [pdf, ps, other

    math.CO cs.IT quant-ph

    Bounds for weight distribution of weakly self-dual codes

    Authors: Vwani P. Roychowdhury, Farrokh Vatan

    Abstract: Upper bounds are given for the weight distribution of binary weakly self-dual codes. To get these new bounds, we introduce a novel method of utilizing unitary operations on Hilbert spaces. This method is motivated by recent progress on quantum computing. This new approach leads to much simpler proofs for such genre of bounds on the weight distributions of certain classes of codes. Moreover, in s… ▽ More

    Submitted 2 April, 2001; originally announced April 2001.

    Comments: 9 pages

    MSC Class: 94B65

    Journal ref: IEEE Transactions on Information Theory, vol. 47, no. 1, Jan. 2001, pp. 393-396

  45. arXiv:quant-ph/9903042  [pdf, ps, other

    quant-ph cs.CC

    An Almost-Quadratic Lower Bound for Quantum Formula Size

    Authors: Vwani P. Roychowdhury, Farrokh Vatan

    Abstract: We show that Nechiporuk's method for proving lower bound for Boolean formulas can be extended to the quantum case. This leads to an n^2 / log^2 n lower bound for quantum formulas computing an explicit function. The only known previous explicit lower bound for quantum formulas (by Yao) states that the majority function does not have a linear-size quantum formula.

    Submitted 11 March, 1999; originally announced March 1999.

    Comments: 14 pages, 6 figures