Skip to main content

Showing 1–25 of 25 results for author: Tripathi, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.09362  [pdf, other

    cs.CL

    Komodo: A Linguistic Expedition into Indonesia's Regional Languages

    Authors: Louis Owen, Vishesh Tripathi, Abhay Kumar, Biddwan Ahmed

    Abstract: The recent breakthroughs in Large Language Models (LLMs) have mostly focused on languages with easily available and sufficient resources, such as English. However, there remains a significant gap for languages that lack sufficient linguistic resources in the public domain. Our work introduces Komodo-7B, 7-billion-parameter Large Language Models designed to address this gap by seamlessly operating… ▽ More

    Submitted 19 March, 2024; v1 submitted 14 March, 2024; originally announced March 2024.

    Comments: 30 Pages, 8 Figures, 4 Tables

  2. arXiv:2402.02719  [pdf, ps, other

    cs.DS cs.GT

    Budget-feasible Egalitarian Allocation of Conflicting Jobs

    Authors: Sushmita Gupta, Pallavi Jain, A. Mohanapriya, Vikash Tripathi

    Abstract: Allocating conflicting jobs among individuals while respecting a budget constraint for each individual is an optimization problem that arises in various real-world scenarios. In this paper, we consider the situation where each individual derives some satisfaction from each job. We focus on finding a feasible allocation of conflicting jobs that maximize egalitarian cost, i.e. the satisfaction of th… ▽ More

    Submitted 4 February, 2024; originally announced February 2024.

    Comments: Accepted in 23rd International Conference on Autonomous Agents and Multiagent Systems(AAMAS 2024)

  3. arXiv:2401.02333  [pdf, other

    cs.LG cs.CL

    Beyond Extraction: Contextualising Tabular Data for Efficient Summarisation by Language Models

    Authors: Uday Allu, Biddwan Ahmed, Vishesh Tripathi

    Abstract: The conventional use of the Retrieval-Augmented Generation (RAG) architecture has proven effective for retrieving information from diverse documents. However, challenges arise in handling complex table queries, especially within PDF documents containing intricate tabular structures.This research introduces an innovative approach to enhance the accuracy of complex table queries in RAG-based systems… ▽ More

    Submitted 10 February, 2024; v1 submitted 4 January, 2024; originally announced January 2024.

    Comments: Submitted to IEEE

  4. arXiv:2312.16813  [pdf, other

    cs.NI eess.SY

    Monitoring Correlated Sources: AoI-based Scheduling is Nearly Optimal

    Authors: R Vallabh Ramakanth, Vishrant Tripathi, Eytan Modiano

    Abstract: We study the design of scheduling policies to minimize monitoring error for a collection of correlated sources, where only one source can be observed at any given time. We model correlated sources as a discrete-time Wiener process, where the increments are multivariate normal random variables, with a general covariance matrix that captures the correlation structure between the sources. Under a Kal… ▽ More

    Submitted 29 December, 2023; v1 submitted 27 December, 2023; originally announced December 2023.

    Comments: Accepted at IEEE INFOCOM 2024

  5. arXiv:2212.03298  [pdf, other

    cs.NI cs.RO

    WiSwarm: Age-of-Information-based Wireless Networking for Collaborative Teams of UAVs

    Authors: Vishrant Tripathi, Igor Kadota, Ezra Tal, Muhammad Shahir Rahman, Alexander Warren, Sertac Karaman, Eytan Modiano

    Abstract: The Age-of-Information (AoI) metric has been widely studied in the theoretical communication networks and queuing systems literature. However, experimental evaluation of its applicability to complex real-world time-sensitive systems is largely lacking. In this work, we develop, implement, and evaluate an AoI-based application layer middleware that enables the customization of WiFi networks to the… ▽ More

    Submitted 6 December, 2022; originally announced December 2022.

    Comments: To be presented at IEEE INFOCOM 2023

  6. arXiv:2212.03087  [pdf, other

    cs.NI cs.IT

    Fresh-CSMA: A Distributed Protocol for Minimizing Age of Information

    Authors: Vishrant Tripathi, Nicholas Jones, Eytan Modiano

    Abstract: We consider the design of distributed scheduling algorithms that minimize age of information in single-hop wireless networks. The centralized max-weight policy is known to be nearly optimal in this setting; hence, our goal is to design a distributed CSMA scheme that can mimic its performance. To that end, we propose a distributed protocol called Fresh-CSMA and show that in an idealized setting, Fr… ▽ More

    Submitted 12 July, 2023; v1 submitted 6 December, 2022; originally announced December 2022.

    Comments: Accepted at IEEE INFOCOM 2023

  7. arXiv:2210.15593  [pdf

    cs.NE cs.AR eess.IV eess.SP

    An Investigation into Neuromorphic ICs using Memristor-CMOS Hybrid Circuits

    Authors: Udit Kumar Agarwal, Shikhar Makhija, Varun Tripathi, Kunwar Singh

    Abstract: The memristance of a memristor depends on the amount of charge flowing through it and when current stops flowing through it, it remembers the state. Thus, memristors are extremely suited for implementation of memory units. Memristors find great application in neuromorphic circuits as it is possible to couple memory and processing, compared to traditional Von-Neumann digital architectures where mem… ▽ More

    Submitted 19 August, 2022; originally announced October 2022.

    Comments: Bachelor's thesis

  8. arXiv:2208.01738  [pdf, other

    cs.NI cs.IT

    Optimizing Age of Information with Correlated Sources

    Authors: Vishrant Tripathi, Eytan Modiano

    Abstract: We develop a simple model for the timely monitoring of correlated sources over a wireless network. Using this model, we study how to optimize weighted-sum average Age of Information (AoI) in the presence of correlation. First, we discuss how to find optimal stationary randomized policies and show that they are at-most a factor of two away from optimal policies in general. Then, we develop a Lyapun… ▽ More

    Submitted 2 August, 2022; originally announced August 2022.

    Comments: To be presented at ACM MobiHoc 2022

  9. arXiv:2112.05486  [pdf, other

    cs.DM math.CO

    Complexity of Paired Domination in AT-free and Planar Graphs

    Authors: Vikash Tripathi, Ton Kloks, Arti Pandey, Kaustav Paul, Hung-Lung Wang

    Abstract: For a graph $G=(V,E)$, a subset $D$ of vertex set $V$, is a dominating set of $G$ if every vertex not in $D$ is adjacent to atleast one vertex of $D$. A dominating set $D$ of a graph $G$ with no isolated vertices is called a paired dominating set (PD-set), if $G[D]$, the subgraph induced by $D$ in $G$ has a perfect matching. The Min-PD problem requires to compute a PD-set of minimum cardinality. T… ▽ More

    Submitted 10 December, 2021; originally announced December 2021.

  10. arXiv:2111.09217  [pdf, other

    cs.NI

    Information Freshness in Multi-Hop Wireless Networks

    Authors: Vishrant Tripathi, Rajat Talak, Eytan Modiano

    Abstract: We consider the problem of minimizing age of information in multihop wireless networks and propose three classes of policies to solve the problem - stationary randomized, age difference, and age debt. For the unicast setting with fixed routes between each source-destination pair, we first develop a procedure to find age optimal Stationary Randomized policies. These policies are easy to implement a… ▽ More

    Submitted 17 November, 2021; originally announced November 2021.

    Comments: submitted to Transactions on Networking, conference versions published in Allerton 2017 and Infocom AoI workshop 2021. arXiv admin note: substantial text overlap with arXiv:2101.10225

  11. arXiv:2109.02142  [pdf, other

    math.CO cs.DM

    A linear-time algorithm for semitotal domination in strongly chordal graphs

    Authors: Vikash Tripathi, Arti Pandey, Anil Maheshwari

    Abstract: In a graph $G=(V,E)$ with no isolated vertex, a dominating set $D \subseteq V$, is called a semitotal dominating set if for every vertex $u \in D$ there is another vertex $v \in D$, such that distance between $u$ and $v$ is at most two in $G$. Given a graph $G=(V,E)$ without isolated vertices, the Minimum Semitotal Domination problem is to find a minimum cardinality semitotal dominating set of… ▽ More

    Submitted 5 September, 2021; originally announced September 2021.

  12. Computation and Communication Co-Design for Real-Time Monitoring and Control in Multi-Agent Systems

    Authors: Vishrant Tripathi, Luca Ballotta, Luca Carlone, Eytan Modiano

    Abstract: We investigate the problem of co-designing computation and communication in a multi-agent system (e.g. a sensor network or a multi-robot team). We consider the realistic setting where each agent acquires sensor data and is capable of local processing before sending updates to a base station, which is in charge of making decisions or monitoring phenomena of interest in real time. Longer processing… ▽ More

    Submitted 8 August, 2021; v1 submitted 6 August, 2021; originally announced August 2021.

    Comments: accepted at WiOpt 2021

  13. arXiv:2105.13383  [pdf, other

    cs.NI cs.IT cs.LG

    An Online Learning Approach to Optimizing Time-Varying Costs of AoI

    Authors: Vishrant Tripathi, Eytan Modiano

    Abstract: We consider systems that require timely monitoring of sources over a communication network, where the cost of delayed information is unknown, time-varying and possibly adversarial. For the single source monitoring problem, we design algorithms that achieve sublinear regret compared to the best fixed policy in hindsight. For the multiple source scheduling problem, we design a new online learning al… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

    Comments: Accepted to ACM Mobihoc '21

  14. arXiv:2101.10225  [pdf, other

    cs.IT cs.NI

    Age Debt: A General Framework For Minimizing Age of Information

    Authors: Vishrant Tripathi, Eytan Modiano

    Abstract: We consider the problem of minimizing age of information in general single-hop and multihop wireless networks. First, we formulate a way to convert AoI optimization problems into equivalent network stability problems. Then, we propose a heuristic low complexity approach for achieving stability that can handle general network topologies; unicast, multicast and broadcast flows; interference constrai… ▽ More

    Submitted 25 January, 2021; originally announced January 2021.

    Comments: To be presented at the 4th AoI Workshop, IEEE INFOCOM 2021

  15. Semipaired Domination in Some Subclasses of Chordal Graphs

    Authors: Michael A. Henning, Arti Pandey, Vikash Tripathi

    Abstract: A dominating set $D$ of a graph $G$ without isolated vertices is called semipaired dominating set if $D$ can be partitioned into $2$-element subsets such that the vertices in each set are at distance at most $2$. The semipaired domination number, denoted by $γ_{pr2}(G)$ is the minimum cardinality of a semipaired dominating set of $G$. Given a graph $G$ with no isolated vertices, the \textsc{Minimu… ▽ More

    Submitted 3 July, 2021; v1 submitted 31 August, 2020; originally announced August 2020.

    Journal ref: Discrete Mathematics & Theoretical Computer Science, vol. 23 no. 1, Discrete Algorithms (July 6, 2021) dmtcs:6782

  16. arXiv:1908.10438  [pdf, other

    cs.IT cs.NI

    A Whittle Index Approach to Minimizing Functions of Age of Information

    Authors: Vishrant Tripathi, Eytan Modiano

    Abstract: We consider a setting where multiple active sources send real-time updates over a single-hop wireless broadcast network to a monitoring station. Our goal is to design a scheduling policy that minimizes the time-average of general non-decreasing cost functions of Age of Information. We use a Whittle index based approach to find low complexity scheduling policies that have good performance. We prove… ▽ More

    Submitted 20 June, 2023; v1 submitted 27 August, 2019; originally announced August 2019.

    Comments: Accepted for Allerton'19

  17. arXiv:1904.00964  [pdf, other

    cs.DM

    Complexity and Algorithms for Semipaired Domination in Graphs

    Authors: Michael A. Henning, Arti Pandey, Vikash Tripathi

    Abstract: For a graph $G=(V,E)$ with no isolated vertices, a set $D\subseteq V$ is called a semipaired dominating set of G if $(i)$ $D$ is a dominating set of $G$, and $(ii)$ $D$ can be partitioned into two element subsets such that the vertices in each two element set are at distance at most two. The minimum cardinality of a semipaired dominating set of $G$ is called the semipaired domination number of… ▽ More

    Submitted 1 April, 2019; originally announced April 2019.

    Comments: arXiv admin note: text overlap with arXiv:1711.10891

  18. arXiv:1901.10463  [pdf, other

    cs.IT

    Age of Information for Discrete Time Queues

    Authors: Vishrant Tripathi, Rajat Talak, Eytan Modiano

    Abstract: Age of information (AoI) is a time-evolving measure of information freshness, that tracks the time since the last received fresh update was generated. Analyzing peak and average AoI, two time average metrics of AoI, for various continuous time queueing systems has received considerable attention. We analyze peak and average age for various discrete time queueing systems. We first consider first co… ▽ More

    Submitted 28 January, 2019; originally announced January 2019.

    Comments: arXiv admin note: text overlap with arXiv:1810.04371

  19. arXiv:1901.02178  [pdf, other

    cs.IT cs.NI

    Age Optimal Information Gathering and Dissemination on Graphs

    Authors: Vishrant Tripathi, Rajat Talak, Eytan Modiano

    Abstract: We consider the problem of timely exchange of updates between a central station and a set of ground terminals $V$, via a mobile agent that traverses across the ground terminals along a mobility graph $G = (V, E)$. We design the trajectory of the mobile agent to minimize peak and average age of information (AoI), two newly proposed metrics for measuring timeliness of information. We consider random… ▽ More

    Submitted 8 January, 2019; originally announced January 2019.

  20. arXiv:1810.01446  [pdf

    cs.OH

    An Automated System for Checking Lithography Friendliness of Standard Cells

    Authors: I-Lun Tseng, Yongfu Li, Valerio Perez, Vikas Tripathi, Zhao Chuan Lee, Jonathan Yoong Seang Ong

    Abstract: At advanced process nodes, lithography weakpoints can exist in physical layouts of integrated circuit designs even if the layouts pass design rule checking (DRC). Existence of lithography weakpoints in a physical layout can cause manufacturability issues, which in turn can result in yield losses. In our experiments, we have found that specific standard cells have tendencies to create lithography w… ▽ More

    Submitted 2 October, 2018; originally announced October 2018.

  21. arXiv:1808.05999  [pdf

    cs.OH

    Context-Aware DFM Rule Analysis and Scoring Using Machine Learning

    Authors: Vikas Tripathi, Valerio Perez, Yongfu Li, Zhao Chuan Lee, I-Lun Tseng, Jonathan Ong

    Abstract: To evaluate the quality of physical layout designs in terms of manufacturability, DFM rule scoring techniques have been widely used in physical design and physical verification phases. However, one major drawback of conventional DFM rule scoring methodologies is that resultant DFM rule scores may not accurate since the scores may not highly correspond to lithography simulation results. For instanc… ▽ More

    Submitted 16 August, 2018; originally announced August 2018.

  22. arXiv:1808.05998  [pdf

    cs.OH

    Creation and Fixing of Lithography Hotspots with Synopsys Tools

    Authors: I-Lun Tseng, Valerio Perez, Yongfu Li, Zhao Chuan Lee, Vikas Tripathi, Jonathan Yoong Seang Ong

    Abstract: At advanced process nodes, pattern matching techniques have been used in the detection of lithography hotspots, which can affect yields of manufactured integrated circuits. Although commercial pattern matching and in-design hotspot fixing tools have been developed, engineers still need to verify that specific hotspot patterns in routed designs can indeed be detected or even repaired by software to… ▽ More

    Submitted 16 August, 2018; originally announced August 2018.

  23. arXiv:1805.10283  [pdf

    cs.OH

    Advanced In-Design Auto-Fixing Flow for Cell Abutment Pattern Matching Weakpoints

    Authors: Yongfu Li, Valerio Perez, I-Lun Tseng, Zhao Chuan Lee, Vikas Tripathi, Jason Khaw, Yoong Seang Jonathan Ong

    Abstract: Pattern matching design verification has gained noticeable attention in semiconductor technologies as it can precisely identify more localized problematic areas (weakpoints) in the layout. To address these weakpoints, engineers adopt 'Rip-up and Reroute' methodology to reroute the nets and avoid these weakpoints. However, the technique is unable to address weakpoints due to the cell placement. The… ▽ More

    Submitted 25 May, 2018; originally announced May 2018.

    Journal ref: Synopsys User Group Singapore (SNUG) 2017

  24. arXiv:1805.10016  [pdf

    cs.OH

    In Design DFM Rule Scoring and Fixing Method using ICV

    Authors: Vikas Tripathi, Yongfu Li, Zhao Chuan Lee, I-Lun Tseng, Jason Khaw, Jonathan Ong

    Abstract: As compared to DRC rules, DFM rules are a list of selected recommended rules which aim to improve the design margins for better manufacturability. In GLOBALFOUNDRIES, we use DFM scoring methodology as an effective technique to analyze design quality in terms of manufacturability. Physical design engineers can perform our Manufacturability Check Deck (MCD) to asset their design quality during the s… ▽ More

    Submitted 25 May, 2018; originally announced May 2018.

    Journal ref: Synopsys User Group Penang (SNUG) 2017

  25. arXiv:1610.00883  [pdf, ps, other

    cs.CL

    Are Word Embedding-based Features Useful for Sarcasm Detection?

    Authors: Aditya Joshi, Vaibhav Tripathi, Kevin Patel, Pushpak Bhattacharyya, Mark Carman

    Abstract: This paper makes a simple increment to state-of-the-art in sarcasm detection research. Existing approaches are unable to capture subtle forms of context incongruity which lies at the heart of sarcasm. We explore if prior work can be enhanced using semantic similarity/discordance between word embeddings. We augment word embedding-based features to four feature sets reported in the past. We also exp… ▽ More

    Submitted 4 October, 2016; originally announced October 2016.

    Comments: The paper will be presented at Conference on Empirical Methods in Natural Language Processing (EMNLP) 2016 in November 2016. http://www.emnlp2016.net/