Skip to main content

Showing 1–16 of 16 results for author: Srivatsa, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.19124  [pdf, other

    cs.CL

    Accelerating Production LLMs with Combined Token/Embedding Speculators

    Authors: Davis Wertheimer, Joshua Rosenkranz, Thomas Parnell, Sahil Suneja, Pavithra Ranganathan, Raghu Ganti, Mudhakar Srivatsa

    Abstract: This technical report describes the design and training of novel speculative decoding draft models, for accelerating the inference speeds of large language models in a production environment. By conditioning draft predictions on both context vectors and sampled tokens, we can train our speculators to efficiently predict high-quality n-grams, which the base model then accepts or rejects. This allow… ▽ More

    Submitted 6 June, 2024; v1 submitted 29 April, 2024; originally announced April 2024.

    Comments: Original upload 4/29/24, updated 6/6/24 with additional references to concurrent work

  2. arXiv:2402.04925  [pdf, other

    cs.DC cs.LG

    TP-Aware Dequantization

    Authors: Adnan Hoque, Mudhakar Srivatsa, Chih-Chieh Yang, Raghu Ganti

    Abstract: In this paper, we present a novel method that reduces model inference latency during distributed deployment of Large Language Models (LLMs). Our contribution is an optimized inference deployment scheme that address the current limitations of state-of-the-art quantization kernels when used in conjunction with Tensor Parallel (TP). Our method preserves data locality in GPU memory access patterns and… ▽ More

    Submitted 15 January, 2024; originally announced February 2024.

  3. SudokuSens: Enhancing Deep Learning Robustness for IoT Sensing Applications using a Generative Approach

    Authors: Tianshi Wang, **yang Li, Ruijie Wang, Denizhan Kara, Shengzhong Liu, Davis Wertheimer, Antoni Viros-i-Martin, Raghu Ganti, Mudhakar Srivatsa, Tarek Abdelzaher

    Abstract: This paper introduces SudokuSens, a generative framework for automated generation of training data in machine-learning-based Internet-of-Things (IoT) applications, such that the generated synthetic data mimic experimental configurations not encountered during actual sensor data collection. The framework improves the robustness of resulting deep learning models, and is intended for IoT applications… ▽ More

    Submitted 8 February, 2024; v1 submitted 3 February, 2024; originally announced February 2024.

    Comments: Published in ACM Conference on Embedded Networked Sensor Systems (SenSys 23), November, 2023, Istanbul, Turkiye. This is the author's version of the work. It is posted here for your personal use. Not for redistribution. Publication rights licensed to the Association for Computing Machinery

  4. arXiv:2402.00025  [pdf, other

    cs.DC cs.AI

    Accelerating a Triton Fused Kernel for W4A16 Quantized Inference with SplitK work decomposition

    Authors: Adnan Hoque, Less Wright, Chih-Chieh Yang, Mudhakar Srivatsa, Raghu Ganti

    Abstract: We propose an implementation of an efficient fused matrix multiplication kernel for W4A16 quantized inference, where we perform dequantization and GEMM in a fused kernel using a SplitK work decomposition. Our implementation shows improvement for the type of skinny matrix-matrix multiplications found in foundation model inference workloads. In particular, this paper surveys the type of matrix multi… ▽ More

    Submitted 22 February, 2024; v1 submitted 5 January, 2024; originally announced February 2024.

  5. arXiv:2211.06494  [pdf, ps, other

    cs.NI

    Rethinking Data-driven Networking with Foundation Models: Challenges and Opportunities

    Authors: Franck Le, Mudhakar Srivatsa, Raghu Ganti, Vyas Sekar

    Abstract: Foundational models have caused a paradigm shift in the way artificial intelligence (AI) systems are built. They have had a major impact in natural language processing (NLP), and several other domains, not only reducing the amount of required labeled data or even eliminating the need for it, but also significantly improving performance on a wide range of tasks. We argue foundation models can have… ▽ More

    Submitted 11 November, 2022; originally announced November 2022.

  6. arXiv:2006.03713  [pdf, other

    cs.LG cs.AI stat.ML

    State Action Separable Reinforcement Learning

    Authors: Ziyao Zhang, Liang Ma, Kin K. Leung, Konstantinos Poularakis, Mudhakar Srivatsa

    Abstract: Reinforcement Learning (RL) based methods have seen their paramount successes in solving serial decision-making and control problems in recent years. For conventional RL formulations, Markov Decision Process (MDP) and state-action-value function are the basis for the problem modeling and policy evaluation. However, several challenging issues still remain. Among most cited issues, the enormity of s… ▽ More

    Submitted 5 June, 2020; originally announced June 2020.

    Comments: 16 pages

  7. arXiv:2001.02942  [pdf, other

    cs.NI cs.LG

    Neural Network Tomography

    Authors: Liang Ma, Ziyao Zhang, Mudhakar Srivatsa

    Abstract: Network tomography, a classic research problem in the realm of network monitoring, refers to the methodology of inferring unmeasured network attributes using selected end-to-end path measurements. In the research community, network tomography is generally investigated under the assumptions of known network topology, correlated path measurements, bounded number of faulty nodes/links, or even specia… ▽ More

    Submitted 9 January, 2020; originally announced January 2020.

  8. arXiv:1911.02970  [pdf, other

    cs.LG cs.CL stat.ML

    SENSE: Semantically Enhanced Node Sequence Embedding

    Authors: Swati Rallapalli, Liang Ma, Mudhakar Srivatsa, Ananthram Swami, Heesung Kwon, Graham Bent, Christopher Simpkin

    Abstract: Effectively capturing graph node sequences in the form of vector embeddings is critical to many applications. We achieve this by (i) first learning vector embeddings of single graph nodes and (ii) then composing them to compactly represent node sequences. Specifically, we propose SENSE-S (Semantically Enhanced Node Sequence Embedding - for Single nodes), a skip-gram based novel embedding mechanism… ▽ More

    Submitted 7 November, 2019; originally announced November 2019.

  9. arXiv:1903.00711  [pdf, other

    cs.LG stat.ML

    neuralRank: Searching and ranking ANN-based model repositories

    Authors: Nirmit Desai, Linsong Chu, Raghu K. Ganti, Sebastian Stein, Mudhakar Srivatsa

    Abstract: Widespread applications of deep learning have led to a plethora of pre-trained neural network models for common tasks. Such models are often adapted from other models via transfer learning. The models may have varying training sets, training algorithms, network architectures, and hyper-parameters. For a given application, what isthe most suitable model in a model repository? This is a critical que… ▽ More

    Submitted 2 March, 2019; originally announced March 2019.

  10. arXiv:1812.11631  [pdf, other

    cs.CV

    Actor Conditioned Attention Maps for Video Action Detection

    Authors: Oytun Ulutan, Swati Rallapalli, Mudhakar Srivatsa, Carlos Torres, B. S. Manjunath

    Abstract: While observing complex events with multiple actors, humans do not assess each actor separately, but infer from the context. The surrounding context provides essential information for understanding actions. To this end, we propose to replace region of interest(RoI) pooling with an attention module, which ranks each spatio-temporal region's relevance to a detected actor instead of crop**. We refe… ▽ More

    Submitted 10 May, 2020; v1 submitted 30 December, 2018; originally announced December 2018.

    Comments: WACV2020 Paper

    Journal ref: In The IEEE Winter Conference on Applications of Computer Vision (pp. 527-536) 2020

  11. arXiv:1808.00641  [pdf, other

    cs.CV eess.IV

    Object Localization and Size Estimation from RGB-D Images

    Authors: ShreeRanjani SrirangamSridharan, Oytun Ulutan, Shehzad Noor Taus Priyo, Swati Rallapalli, Mudhakar Srivatsa

    Abstract: Depth sensing cameras (e.g., Kinect sensor, Tango phone) can acquire color and depth images that are registered to a common viewpoint. This opens the possibility of develo** algorithms that exploit the advantages of both sensing modalities. Traditionally, cues from color images have been used for object localization (e.g., YOLO). However, the addition of a depth image can be further used to segm… ▽ More

    Submitted 1 August, 2018; originally announced August 2018.

  12. arXiv:1610.04805  [pdf, other

    cs.CV

    Beyond Spatial Auto-Regressive Models: Predicting Housing Prices with Satellite Imagery

    Authors: Archith J. Bency, Swati Rallapalli, Raghu K. Ganti, Mudhakar Srivatsa, B. S. Manjunath

    Abstract: When modeling geo-spatial data, it is critical to capture spatial correlations for achieving high accuracy. Spatial Auto-Regression (SAR) is a common tool used to model such data, where the spatial contiguity matrix (W) encodes the spatial correlations. However, the efficacy of SAR is limited by two factors. First, it depends on the choice of contiguity matrix, which is typically not learnt from d… ▽ More

    Submitted 15 October, 2016; originally announced October 2016.

    Comments: 10 pages, 5 figures

  13. arXiv:1601.06316  [pdf, other

    cs.DB

    Prediction-based Online Trajectory Compression

    Authors: Arlei Silva, Ramya Raghavendra, Mudhakar Srivatsa, Ambuj K. Singh

    Abstract: Recent spatio-temporal data applications, such as car-shar\-ing and smart cities, impose new challenges regarding the scalability and timeliness of data processing systems. Trajectory compression is a promising approach for scaling up spatio-temporal databases. However, existing techniques fail to address the online setting, in which a compressed version of a trajectory stream has to be maintained… ▽ More

    Submitted 15 February, 2016; v1 submitted 23 January, 2016; originally announced January 2016.

  14. arXiv:1512.00500  [pdf, other

    cs.SI

    Joint Source Selection and Data Extrapolation in Social Sensing for Disaster Response

    Authors: Mohammad Hosseini, Nooreddin Nagibolhosseini, Amotz Barnoy, Peter Terlecky, Hengchang Liu, Shaohan Hu, Shiguang Wang, Tanvir Amin, Lu Su, Dong Wang, Ramesh Govindan, Raghu Ganti, Mudhakar Srivatsa, Charu Aggrawal, Tarek Abdelzaher, Siyu Gu, Chenji Pan

    Abstract: This paper complements the large body of social sensing literature by develo** means for augmenting sensing data with inference results that "fill-in" missing pieces. It specifically explores the synergy between (i) inference techniques used for filling-in missing pieces and (ii) source selection techniques used to determine which pieces to retrieve in order to improve inference results. We focu… ▽ More

    Submitted 1 December, 2015; originally announced December 2015.

    Comments: 24 pages, Technical Report, University of Illinois at Urbana-Champaign

    ACM Class: C.2.2; H.3.4

  15. arXiv:1505.02325  [pdf, other

    cs.GT cs.CR math.OC

    Picking vs. Guessing Secrets: A Game-Theoretic Analysis (Technical Report)

    Authors: MHR Khouzani, Piotr Mardziel, Carlos Cid, Mudhakar Srivatsa

    Abstract: Choosing a hard-to-guess secret is a prerequisite in many security applications. Whether it is a password for user authentication or a secret key for a cryptographic primitive, picking it requires the user to trade-off usability costs with resistance against an adversary: a simple password is easier to remember but is also easier to guess; likewise, a shorter cryptographic key may require fewer co… ▽ More

    Submitted 9 May, 2015; originally announced May 2015.

    Comments: This manuscript is the extended version of our conference paper: "Picking vs. Guessing Secrets: A Game-Theoretic Analysis", in 28th IEEE Computer Security Foundations Symposium (CSF 2015), Verona, Italy, July 2015

    MSC Class: 91A05; 91A80 ACM Class: K.6.5

  16. arXiv:1009.3951  [pdf, other

    cs.CR cs.IT

    Quantifying Information Leakage in Finite Order Deterministic Programs

    Authors: Ji Zhu, Mudhakar Srivatsa

    Abstract: Information flow analysis is a powerful technique for reasoning about the sensitive information exposed by a program during its execution. While past work has proposed information theoretic metrics (e.g., Shannon entropy, min-entropy, guessing entropy, etc.) to quantify such information leakage, we argue that some of these measures not only result in counter-intuitive measures of leakage, but also… ▽ More

    Submitted 20 September, 2010; originally announced September 2010.

    Comments: 14 pages, 1 figure. A shorter version of this paper is submitted to ICC 2011