Skip to main content

Showing 1–3 of 3 results for author: V., C S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2208.10215  [pdf, ps, other

    math.CO cs.DM

    On the monophonic convexity in complementary prisms

    Authors: Neethu P. K., Ullas Chandran S. V., Julliano R. Nascimento

    Abstract: A set $S$ of vertices of a graph $G$ is \emph{monophonic convex} if $S$ contains all the vertices belonging to any induced path connecting two vertices of $S$. The cardinality of a maximum proper monophonic convex set of $G$ is called the \emph{monophonic convexity number} of $G$. The \emph{monophonic interval} of a set $S$ of vertices of $G$ is the set $S$ together with every vertex belonging to… ▽ More

    Submitted 12 June, 2023; v1 submitted 22 August, 2022; originally announced August 2022.

  2. arXiv:2205.03526  [pdf, ps, other

    math.CO cs.CC

    The general position avoidance game and hardness of general position games

    Authors: Ullas Chandran S. V., Sandi Klavzar, Neethu P. K., Rudini Sampaio

    Abstract: Given a graph $G$, a set $S$ of vertices in $G$ is a general position set if no triple of vertices from $S$ lie on a common shortest path in $G$. The general position achievement/avoidance game is played on a graph $G$ by players A and B who alternately select vertices of $G$. A selection of a vertex by a player is a legal move if it has not been selected before and the set of selected vertices so… ▽ More

    Submitted 13 September, 2023; v1 submitted 6 May, 2022; originally announced May 2022.

    Comments: 26 pages, 5 figures

  3. arXiv:1907.04061  [pdf

    cs.CV cs.LG

    A Light weight and Hybrid Deep Learning Model based Online Signature Verification

    Authors: Chandra Sekhar V., Anoushka Doctor, Prerana Mukherjee, Viswanath Pulabaigiri

    Abstract: The augmented usage of deep learning-based models for various AI related problems are as a result of modern architectures of deeper length and the availability of voluminous interpreted datasets. The models based on these architectures require huge training and storage cost, which makes them inefficient to use in critical applications like online signature verification (OSV) and to deploy in resou… ▽ More

    Submitted 9 July, 2019; originally announced July 2019.

    Comments: accepted in ICDAR-WML: The 2nd International Workshop on Machine Learning 2019