Skip to main content

Showing 1–36 of 36 results for author: Balaji, B

  1. arXiv:2405.07407  [pdf, other

    cs.CV cs.AI

    PitcherNet: Powering the Moneyball Evolution in Baseball Video Analytics

    Authors: Jerrin Bright, Bavesh Balaji, Yuhao Chen, David A Clausi, John S Zelek

    Abstract: In the high-stakes world of baseball, every nuance of a pitcher's mechanics holds the key to maximizing performance and minimizing runs. Traditional analysis methods often rely on pre-recorded offline numerical data, hindering their application in the dynamic environment of live games. Broadcast video analysis, while seemingly ideal, faces significant challenges due to factors like motion blur and… ▽ More

    Submitted 12 May, 2024; originally announced May 2024.

    Comments: IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW'24)

  2. arXiv:2403.15462  [pdf, other

    eess.IV cs.CV cs.LG

    FUELVISION: A Multimodal Data Fusion and Multimodel Ensemble Algorithm for Wildfire Fuels Mapping

    Authors: Riyaaz Uddien Shaik, Mohamad Alipour, Eric Rowell, Bharathan Balaji, Adam Watts, Ertugrul Taciroglu

    Abstract: Accurate assessment of fuel conditions is a prerequisite for fire ignition and behavior prediction, and risk management. The method proposed herein leverages diverse data sources including Landsat-8 optical imagery, Sentinel-1 (C-band) Synthetic Aperture Radar (SAR) imagery, PALSAR (L-band) SAR imagery, and terrain features to capture comprehensive information about fuel types and distributions. A… ▽ More

    Submitted 19 March, 2024; originally announced March 2024.

    Comments: 40 pages

    ACM Class: I.4.9

  3. arXiv:2403.11328  [pdf, other

    cs.CV cs.AI

    Domain-Guided Masked Autoencoders for Unique Player Identification

    Authors: Bavesh Balaji, Jerrin Bright, Sirisha Rambhatla, Yuhao Chen, Alexander Wong, John Zelek, David A Clausi

    Abstract: Unique player identification is a fundamental module in vision-driven sports analytics. Identifying players from broadcast videos can aid with various downstream tasks such as player assessment, in-game analysis, and broadcast production. However, automatic detection of jersey numbers using deep features is challenging primarily due to: a) motion blur, b) low resolution video feed, and c) occlusio… ▽ More

    Submitted 17 March, 2024; originally announced March 2024.

    Comments: Submitted to 21st International Conference on Robots and Vision (CRV'24), Guelph, Ontario, Canada

  4. arXiv:2403.09063  [pdf, other

    cs.CV cs.AI

    Distribution and Depth-Aware Transformers for 3D Human Mesh Recovery

    Authors: Jerrin Bright, Bavesh Balaji, Harish Prakash, Yuhao Chen, David A Clausi, John Zelek

    Abstract: Precise Human Mesh Recovery (HMR) with in-the-wild data is a formidable challenge and is often hindered by depth ambiguities and reduced precision. Existing works resort to either pose priors or multi-modal data such as multi-view or point cloud information, though their methods often overlook the valuable scene-depth information inherently present in a single image. Moreover, achieving robust HMR… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

    Comments: Submitted to 21st International Conference on Robots and Vision (CRV'24), Guelph, Ontario, Canada

  5. arXiv:2401.16719  [pdf, other

    cs.RO cs.LG eess.SY

    OptiState: State Estimation of Legged Robots using Gated Networks with Transformer-based Vision and Kalman Filtering

    Authors: Alexander Schperberg, Yusuke Tanaka, Saviz Mowlavi, Feng Xu, Bharathan Balaji, Dennis Hong

    Abstract: State estimation for legged robots is challenging due to their highly dynamic motion and limitations imposed by sensor accuracy. By integrating Kalman filtering, optimization, and learning-based modalities, we propose a hybrid solution that combines proprioception and exteroceptive information for estimating the state of the robot's trunk. Leveraging joint encoder and IMU measurements, our Kalman… ▽ More

    Submitted 28 April, 2024; v1 submitted 29 January, 2024; originally announced January 2024.

    Comments: Accepted to the 2024 IEEE International Conference on Robotics and Automation (ICRA), May 13-17, in Yokohama, Japan. 7 pages, 5 figures, 1 table

  6. arXiv:2309.06285  [pdf, other

    cs.CV cs.AI

    Jersey Number Recognition using Keyframe Identification from Low-Resolution Broadcast Videos

    Authors: Bavesh Balaji, Jerrin Bright, Harish Prakash, Yuhao Chen, David A Clausi, John Zelek

    Abstract: Player identification is a crucial component in vision-driven soccer analytics, enabling various downstream tasks such as player assessment, in-game analysis, and broadcast production. However, automatically detecting jersey numbers from player tracklets in videos presents challenges due to motion blur, low resolution, distortions, and occlusions. Existing methods, utilizing Spatial Transformer Ne… ▽ More

    Submitted 12 September, 2023; originally announced September 2023.

    Comments: Accepted in the 6th International Workshop on Multimedia Content Analysis in Sports (MMSports'23) @ ACM Multimedia

  7. arXiv:2304.04356  [pdf

    cs.CV cs.LG eess.SY

    Eagle: End-to-end Deep Reinforcement Learning based Autonomous Control of PTZ Cameras

    Authors: Sandeep Singh Sandha, Bharathan Balaji, Luis Garcia, Mani Srivastava

    Abstract: Existing approaches for autonomous control of pan-tilt-zoom (PTZ) cameras use multiple stages where object detection and localization are performed separately from the control of the PTZ mechanisms. These approaches require manual labels and suffer from performance bottlenecks due to error propagation across the multi-stage flow of information. The large size of object detection neural networks al… ▽ More

    Submitted 9 April, 2023; originally announced April 2023.

    Comments: 20 pages, IoTDI

  8. arXiv:2209.15626  [pdf, other

    cs.LG

    B2RL: An open-source Dataset for Building Batch Reinforcement Learning

    Authors: Hsin-Yu Liu, Xiaohan Fu, Bharathan Balaji, Rajesh Gupta, Dezhi Hong

    Abstract: Batch reinforcement learning (BRL) is an emerging research area in the RL community. It learns exclusively from static datasets (i.e. replay buffers) without interaction with the environment. In the offline settings, existing replay experiences are used as prior knowledge for BRL models to find the optimal policy. Thus, generating replay buffers is crucial for BRL model benchmark. In our B2RL (Bui… ▽ More

    Submitted 30 September, 2022; originally announced September 2022.

  9. arXiv:2208.07479  [pdf, other

    cs.CV

    Context-Aware Streaming Perception in Dynamic Environments

    Authors: Gur-Eyal Sela, Ionel Gog, Justin Wong, Kumar Krishna Agrawal, Xiangxi Mo, Sukrit Kalra, Peter Schafhalter, Eric Leong, Xin Wang, Bharathan Balaji, Joseph Gonzalez, Ion Stoica

    Abstract: Efficient vision works maximize accuracy under a latency budget. These works evaluate accuracy offline, one image at a time. However, real-time vision applications like autonomous driving operate in streaming settings, where ground truth changes between inference start and finish. This results in a significant accuracy drop. Therefore, a recent work proposed to maximize accuracy in streaming setti… ▽ More

    Submitted 15 August, 2022; originally announced August 2022.

    Comments: 26 pages, 10 figures, to be published in ECCV 2022

  10. arXiv:2011.03206  [pdf, other

    cs.LG cs.DC cs.NI

    Resource-Constrained Federated Learning with Heterogeneous Labels and Models

    Authors: Gautham Krishna Gudur, Bala Shyamala Balaji, Satheesh K. Perepu

    Abstract: Various IoT applications demand resource-constrained machine learning mechanisms for different applications such as pervasive healthcare, activity monitoring, speech recognition, real-time computer vision, etc. This necessitates us to leverage information from multiple devices with few communication overheads. Federated Learning proves to be an extremely viable option for distributed and collabora… ▽ More

    Submitted 6 November, 2020; originally announced November 2020.

    Comments: 6 pages, 5 figures, ACM KDD 2020 (The 3rd International Workshop on Artificial Intelligence of Things - AIoT'20)

  11. arXiv:2010.01344  [pdf, other

    cs.IT

    Codes for Distributed Storage

    Authors: Vinayak Ramkumar, Myna Vajha, S. B. Balaji, M. Nikhil Krishnan, Birenjith Sasidharan, P. Vijay Kumar

    Abstract: This chapter deals with the topic of designing reliable and efficient codes for the storage and retrieval of large quantities of data over storage devices that are prone to failure. For long, the traditional objective has been one of ensuring reliability against data loss while minimizing storage overhead. More recently, a third concern has surfaced, namely of the need to efficiently recover from… ▽ More

    Submitted 3 October, 2020; originally announced October 2020.

    Comments: This survey article will appear as a chapter in the upcoming "A Concise Encyclopedia of Coding Theory", W. C. Huffman, J.-L. Kim, and P. Solé, CRC Press

  12. arXiv:2008.08878  [pdf, other

    cs.LG stat.ML

    Reinforcement Learning based dynamic weighing of Ensemble Models for Time Series Forecasting

    Authors: Satheesh K. Perepu, Bala Shyamala Balaji, Hemanth Kumar Tanneru, Sudhakar Kathari, Vivek Shankar Pinnamaraju

    Abstract: Ensemble models are powerful model building tools that are developed with a focus to improve the accuracy of model predictions. They find applications in time series forecasting in varied scenarios including but not limited to process industries, health care, and economics where a single model might not provide optimal performance. It is known that if models selected for data modelling are distinc… ▽ More

    Submitted 20 August, 2020; originally announced August 2020.

    Comments: 6 pages, 4 figures, In review for conference

  13. arXiv:2007.09515  [pdf, other

    cs.HC cs.AI cs.LG

    Quick Question: Interrupting Users for Microtasks with Reinforcement Learning

    Authors: Bo-Jhang Ho, Bharathan Balaji, Mehmet Koseoglu, Sandeep Sandha, Siyou Pei, Mani Srivastava

    Abstract: Human attention is a scarce resource in modern computing. A multitude of microtasks vie for user attention to crowdsource information, perform momentary assessments, personalize services, and execute actions with a single touch. A lot gets done when these tasks take up the invisible free moments of the day. However, an interruption at an inappropriate time degrades productivity and causes annoyanc… ▽ More

    Submitted 18 July, 2020; originally announced July 2020.

    Comments: Presented at the 2nd Workshop on Human in the Loop Learning in ICML 2020

  14. arXiv:1911.10641  [pdf, other

    cs.LG cs.AI math.OC

    ORL: Reinforcement Learning Benchmarks for Online Stochastic Optimization Problems

    Authors: Bharathan Balaji, Jordan Bell-Masterson, Enes Bilgin, Andreas Damianou, Pablo Moreno Garcia, Arpit Jain, Runfei Luo, Alvaro Maggiar, Balakrishnan Narayanaswamy, Chun Ye

    Abstract: Reinforcement Learning (RL) has achieved state-of-the-art results in domains such as robotics and games. We build on this previous work by applying RL algorithms to a selection of canonical online stochastic optimization problems with a range of practical applications: Bin Packing, Newsvendor, and Vehicle Routing. While there is a nascent literature that applies RL to these problems, there are no… ▽ More

    Submitted 1 December, 2019; v1 submitted 24 November, 2019; originally announced November 2019.

  15. arXiv:1911.01562  [pdf, other

    cs.LG cs.AI cs.RO

    DeepRacer: Educational Autonomous Racing Platform for Experimentation with Sim2Real Reinforcement Learning

    Authors: Bharathan Balaji, Sunil Mallya, Sahika Genc, Saurabh Gupta, Leo Dirac, Vineet Khare, Gourav Roy, Tao Sun, Yunzhe Tao, Brian Townsend, Eddie Calleja, Sunil Muralidhara, Dhanasekar Karuppasamy

    Abstract: DeepRacer is a platform for end-to-end experimentation with RL and can be used to systematically investigate the key challenges in developing intelligent control systems. Using the platform, we demonstrate how a 1/18th scale car can learn to drive autonomously using RL with a monocular camera. It is trained in simulation with no additional tuning in physical world and demonstrates: 1) formulation… ▽ More

    Submitted 4 November, 2019; originally announced November 2019.

  16. arXiv:1909.01968  [pdf, other

    eess.SY cs.LG

    ACES -- Automatic Configuration of Energy Harvesting Sensors with Reinforcement Learning

    Authors: Francesco Fraternali, Bharathan Balaji, Yuvraj Agarwal, Rajesh K. Gupta

    Abstract: Internet of Things forms the backbone of modern building applications. Wireless sensors are being increasingly adopted for their flexibility and reduced cost of deployment. However, most wireless sensors are powered by batteries today and large deployments are inhibited by manual battery replacement. Energy harvesting sensors provide an attractive alternative, but they need to provide adequate qua… ▽ More

    Submitted 3 August, 2020; v1 submitted 4 September, 2019; originally announced September 2019.

    Journal ref: ACM Transactions on Sensor Networks, July 2020, Article No.: 36

  17. Demo Abstract: Pible: Battery-Free Mote for Perpetual Indoor BLE Applications

    Authors: Francesco Fraternali, Bharathan Balaji, Yuvraj Agarwal, Luca Benini, Rajesh Gupta

    Abstract: As of today, large-scale wireless sensor networks are adopted for smart building applications as they are easy and flexible to deploy. Low-power wireless nodes can achieve multi-year lifetimes with an AA battery using Bluetooth Low Energy (BLE) and Zig-Bee. However, replacing these batteries at scale is a non-trivial, labor-intensive task. Energy harvesting has emerged as a potential solution to a… ▽ More

    Submitted 1 May, 2019; originally announced May 2019.

    Comments: arXiv admin note: text overlap with arXiv:1812.04717

    Journal ref: BuildSys 2018 Proceedings of the 5th Conference on Systems for Built Environments

  18. Pible: Battery-Free Mote for Perpetual Indoor BLE Applications

    Authors: Francesco Fraternali, Bharathan Balaji, Yuvraj Agarwal, Luca Benini, Rajesh Gupta

    Abstract: Smart building applications require a large-scale deployment of sensors distributed across the environment. Recent innovations in smart environments are driven by wireless networked sensors as they are easy to deploy. However, replacing these batteries at scale is a non-trivial, labor-intensive task. Energy harvesting has emerged as a potential solution to avoid battery replacement but requires co… ▽ More

    Submitted 27 November, 2018; originally announced December 2018.

    Comments: 4 pages, 4 figures, BuildSys '18: Conference on Systems for Built Environments, November 7--8, 2018, Shenzen, China

  19. arXiv:1812.02502  [pdf, other

    cs.IT

    A Tight Rate Bound and Matching Construction for Locally Recoverable Codes with Sequential Recovery From Any Number of Multiple Erasures

    Authors: S. B. Balaji, Ganesh R. Kini, P. Vijay Kumar

    Abstract: By a locally recoverable code (LRC), we will in this paper, mean a linear code in which a given code symbol can be recovered by taking a linear combination of at most $r$ other code symbols with $r << k$. A natural extension is to the local recovery of a set of $t$ erased symbols. There have been several approaches proposed for the handling of multiple erasures. The approach considered here, is on… ▽ More

    Submitted 6 December, 2018; originally announced December 2018.

    Comments: To admin: Has overlaps with 1806.04474,1611.08561,1801.06794 . This is for submitting to the Journal

  20. arXiv:1811.11259  [pdf, other

    cs.LG cs.AI cs.DS eess.SY stat.ML

    Scaling Configuration of Energy Harvesting Sensors with Reinforcement Learning

    Authors: Francesco Fraternali, Bharathan Balaji, Rajesh Gupta

    Abstract: With the advent of the Internet of Things (IoT), an increasing number of energy harvesting methods are being used to supplement or supplant battery based sensors. Energy harvesting sensors need to be configured according to the application, hardware, and environmental conditions to maximize their usefulness. As of today, the configuration of sensors is either manual or heuristics based, requiring… ▽ More

    Submitted 27 November, 2018; originally announced November 2018.

    Comments: 7 pages, 5 figures

    Journal ref: ENSsys '18: International Workshop on Energy Harvesting & Energy-Neutral Sensing Systems}{November 4, 2018}{Shenzhen, China

  21. arXiv:1806.04474  [pdf, other

    cs.IT

    Erasure Codes for Distributed Storage: Tight Bounds and Matching Constructions

    Authors: S. B. Balaji, P. Vijay Kumar

    Abstract: This thesis makes several significant contributions to the theory of both Regenerating (RG) and Locally Recoverable (LR) codes. The two principal contributions are characterizing the optimal rate of an LR code designed to recover from $t$ erased symbols sequentially, for any $t$ and the development of a tight bound on the sub-packetization level (length of a vector code symbol) of a sub-class of R… ▽ More

    Submitted 12 June, 2018; originally announced June 2018.

    Comments: My PhD Thesis

  22. arXiv:1806.04437  [pdf, other

    cs.IT

    Erasure Coding for Distributed Storage: An Overview

    Authors: S. B. Balaji, M. Nikhil Krishnan, Myna Vajha, Vinayak Ramkumar, Birenjith Sasidharan, P. Vijay Kumar

    Abstract: In a distributed storage system, code symbols are dispersed across space in nodes or storage units as opposed to time. In settings such as that of a large data center, an important consideration is the efficient repair of a failed node. Efficient repair calls for erasure codes that in the face of node failure, are efficient in terms of minimizing the amount of repair data transferred over the netw… ▽ More

    Submitted 12 June, 2018; originally announced June 2018.

    Comments: This survey article will appear in Science China Information Sciences (SCIS) journal

  23. arXiv:1804.00598  [pdf, other

    cs.IT

    Small-d MSR Codes with Optimal Access, Optimal Sub-Packetization and Linear Field Size

    Authors: Myna Vajha, S. B. Balaji, P. Vijay Kumar

    Abstract: This paper presents an explicit construction of a class of optimal-access, minimum storage regenerating (MSR) codes, for small values of the number $d$ of helper nodes. The construction is valid for any parameter set $(n,k,d)$ with $d \in \{k+1, k+2, k+3\}$ and employs a finite field $\mathbb{F}_q$ of size $q=O(n)$. We will refer to the constructed codes as Small-d MSR codes. The sub-packetization… ▽ More

    Submitted 22 September, 2021; v1 submitted 2 April, 2018; originally announced April 2018.

  24. arXiv:1801.06794  [pdf, other

    cs.IT

    A Rate-Optimal Construction of Codes with Sequential Recovery with Low Block Length

    Authors: Balaji Srinivasan Babu, Ganesh R. Kini, P. Vijay Kumar

    Abstract: An erasure code is said to be a code with sequential recovery with parameters $r$ and $t$, if for any $s \leq t$ erased code symbols, there is an $s$-step recovery process in which at each step we recover exactly one erased code symbol by contacting at most $r$ other code symbols. In earlier work by the same authors, presented at ISIT 2017, we had given a construction for binary codes with sequent… ▽ More

    Submitted 21 January, 2018; originally announced January 2018.

    Comments: Accepted for publication in NCC 2018

  25. arXiv:1801.00554  [pdf, other

    cs.CL cs.CR

    Did you hear that? Adversarial Examples Against Automatic Speech Recognition

    Authors: Moustafa Alzantot, Bharathan Balaji, Mani Srivastava

    Abstract: Speech is a common and effective way of communication between humans, and modern consumer devices such as smartphones and home hubs are equipped with deep learning based accurate automatic speech recognition to enable natural interaction between humans and machines. Recently, researchers have demonstrated powerful attacks against machine learning models that can fool them to produceincorrect resul… ▽ More

    Submitted 2 January, 2018; originally announced January 2018.

    Comments: Published in NIPS 2017 Machine Deception workshop

  26. arXiv:1710.05876  [pdf, other

    cs.IT

    On Lower Bounds on Sub-Packetization Level of MSR codes and On The Structure of Optimal-Access MSR Codes Achieving The Bound

    Authors: S. B. Balaji, Myna Vajha, P. Vijay Kumar

    Abstract: We present two lower bounds on sub-packetization level $α$ of MSR codes with parameters $(n, k, d=n-1, α)$ where $n$ is the block length, $k$ dimension, $d$ number of helper nodes contacted during single node repair and $α$ the sub-packetization level. The first bound we present is for any MSR code and is given by $α\ge e^{\frac{(k-1)(r-1)}{2r^2}}$. The second bound we present is for the case of… ▽ More

    Submitted 18 September, 2021; v1 submitted 16 October, 2017; originally announced October 2017.

    Comments: Revised for journal submission

  27. arXiv:1703.04514  [pdf, other

    cs.CY

    EmbedInsight: Automated Grading of Embedded Systems Assignments

    Authors: Hao Li, Bo-Jhang Ho, Bharathan Balaji, Yue Xin, Paul Martin, Mani Srivastava

    Abstract: Grading in embedded systems courses typically requires a face-to-face appointment between the student and the instructor because of experimental setups that are only available in laboratory facilities. Such a manual grading process is an impediment to both students and instructors. Students have to wait for several days to get feedback, and instructors may spend valuable time evaluating trivial as… ▽ More

    Submitted 27 February, 2017; originally announced March 2017.

  28. arXiv:1612.06025  [pdf, other

    cs.CY cs.HC

    Managing Commercial HVAC Systems: What do Building Operators Really Need?

    Authors: Bharathan Balaji, Nadir Weibel, Yuvraj Agarwal

    Abstract: Buildings form an essential part of modern life; people spend a significant amount of their time in them, and they consume large amounts of energy. A variety of systems provide services such as lighting, air conditioning and security which are managed using Building Management Systems (BMS) by building operators. To better understand the capability of current BMS and characterize common practices… ▽ More

    Submitted 18 December, 2016; originally announced December 2016.

    Comments: 5 pages, Paper rejected from CHI 2015

    ACM Class: H.5.m

  29. arXiv:1611.08561  [pdf, other

    cs.IT

    A Tight Rate Bound and a Matching Construction for Locally Recoverable Codes with Sequential Recovery From Any Number of Multiple Erasures

    Authors: S. B. Balaji, Ganesh R. Kini, P. Vijay Kumar

    Abstract: An $[n,k]$ code $\mathcal{C}$ is said to be locally recoverable in the presence of a single erasure, and with locality parameter $r$, if each of the $n$ code symbols of $\mathcal{C}$ can be recovered by accessing at most $r$ other code symbols. An $[n,k]$ code is said to be a locally recoverable code with sequential recovery from $t$ erasures, if for any set of $s \leq t$ erasures, there is an… ▽ More

    Submitted 17 February, 2017; v1 submitted 25 November, 2016; originally announced November 2016.

    Comments: Revised version of the paper with revised title and abstract (longer version of ISIT 2017 submission)

  30. arXiv:1611.00159  [pdf, other

    cs.IT

    Bounds on Codes with Locality and Availability

    Authors: S. B. Balaji, P. Vijay Kumar

    Abstract: In this paper we investigate bounds on rate and minimum distance of codes with $t$ availability. We present bounds on minimum distance of a code with $t$ availability that are tighter than existing bounds. For bounds on rate of a code with $t$ availability, we restrict ourselves to a sub-class of codes with $t$ availability called codes with strict $t$ availability and derive a tighter rate bound.… ▽ More

    Submitted 28 February, 2017; v1 submitted 1 November, 2016; originally announced November 2016.

    Comments: submitted to ISIT 2017

  31. arXiv:1607.02817  [pdf, other

    cs.IT

    Binary Codes with Locality for Four Erasures

    Authors: S. B. Balaji, K. P. Prasanth, P. Vijay Kumar

    Abstract: In this paper, codes with locality for four erasures are considered. An upper bound on the rate of codes with locality with sequential recovery from four erasures is derived. The rate bound derived here is field independent. An optimal construction for binary codes meeting this rate bound is also provided. The construction is based on regular graphs of girth $6$ and employs the sequential approach… ▽ More

    Submitted 3 November, 2016; v1 submitted 11 July, 2016; originally announced July 2016.

    Comments: 5 pages, 2 figures

  32. arXiv:1607.01355  [pdf, other

    stat.AP cs.CV

    Object Recognition and Identification Using ESM Data

    Authors: E. Taghavi, D. Song, R. Tharmarasa, T. Kirubarajan, Anne-Claire Boury-Brisset, Bhashyam Balaji

    Abstract: Recognition and identification of unknown targets is a crucial task in surveillance and security systems. Electronic Support Measures (ESM) are one of the most effective sensors for identification, especially for maritime and air--to--ground applications. In typical surveillance systems multiple ESM sensors are usually deployed along with kinematic sensors like radar. Different ESM sensors may pro… ▽ More

    Submitted 22 March, 2016; originally announced July 2016.

  33. arXiv:1601.07229  [pdf, other

    cs.HC eess.SY

    Genie: A Longitudinal Study Comparing Physical and Software-augmented Thermostats in Office Buildings

    Authors: Bharathan Balaji, Jason Koh, Nadir Weibel, Yuvraj Agarwal

    Abstract: Thermostats are primary interfaces for occupants of office buildings to express their comfort preferences. However, standard thermostats are often ineffective due to inaccessibility, lack of information, or limited responsiveness, leading to occupant discomfort. Software thermostats based on web or smartphone applications provide alternative interfaces to occupants with minimal deployment cost. Ho… ▽ More

    Submitted 26 January, 2016; originally announced January 2016.

    Comments: 12 pages

    ACM Class: H.5.3

  34. Binary Codes with Locality for Multiple Erasures Having Short Block Length

    Authors: S. B. Balaji, K. P. Prasanth, P. Vijay Kumar

    Abstract: The focus of this paper is on linear, binary codes with locality having locality parameter $r$, that are capable of recovering from $t\geq 2$ erasures and that moreover, have short block length. Both sequential and parallel (through orthogonal parity checks) recovery is considered here. In the case of parallel repair, minimum-block-length constructions for general $t$ are discussed. In the case of… ▽ More

    Submitted 2 February, 2016; v1 submitted 26 January, 2016; originally announced January 2016.

    Comments: 17 pages, submitted to ISIT 2016

  35. arXiv:1501.07130  [pdf, ps, other

    cs.IT

    On Partial Maximally-Recoverable and Maximally-Recoverable Codes

    Authors: S. B. Balaji, P. Vijay Kumar

    Abstract: An [n, k] linear code C that is subject to locality constraints imposed by a parity check matrix H0 is said to be a maximally recoverable (MR) code if it can recover from any erasure pattern that some k-dimensional subcode of the null space of H0 can recover from. The focus in this paper is on MR codes constrained to have all-symbol locality r. Given that it is challenging to construct MR codes ha… ▽ More

    Submitted 28 January, 2015; originally announced January 2015.

  36. arXiv:1104.4376  [pdf, ps, other

    stat.ME cs.CV cs.LG

    Intent Inference and Syntactic Tracking with GMTI Measurements

    Authors: Alex Wang, Vikram Krishnamurthy, Bhashyam Balaji

    Abstract: In conventional target tracking systems, human operators use the estimated target tracks to make higher level inference of the target behaviour/intent. This paper develops syntactic filtering algorithms that assist human operators by extracting spatial patterns from target tracks to identify suspicious/anomalous spatial trajectories. The targets' spatial trajectories are modeled by a stochastic co… ▽ More

    Submitted 21 April, 2011; originally announced April 2011.