Skip to main content

Showing 1–41 of 41 results for author: Gupta, I

  1. arXiv:2406.08878  [pdf, other

    cs.LG

    CIMRL: Combining IMitation and Reinforcement Learning for Safe Autonomous Driving

    Authors: Jonathan Booher, Khashayar Rohanimanesh, Junhong Xu, Vladislav Isenbaev, Ashwin Balakrishna, Ishan Gupta, Wei Liu, Aleksandr Petiushko

    Abstract: Modern approaches to autonomous driving rely heavily on learned components trained with large amounts of human driving data via imitation learning. However, these methods require large amounts of expensive data collection and even then face challenges with safely handling long-tail scenarios and compounding errors over time. At the same time, pure Reinforcement Learning (RL) methods can fail to le… ▽ More

    Submitted 26 June, 2024; v1 submitted 13 June, 2024; originally announced June 2024.

  2. arXiv:2405.04373  [pdf, other

    cs.CR cs.AI

    Leveraging LSTM and GAN for Modern Malware Detection

    Authors: Ishita Gupta, Sneha Kumari, Priya Jha, Mohona Ghosh

    Abstract: The malware booming is a cyberspace equal to the effect of climate change to ecosystems in terms of danger. In the case of significant investments in cybersecurity technologies and staff training, the global community has become locked up in the eternal war with cyber security threats. The multi-form and changing faces of malware are continuously pushing the boundaries of the cybersecurity practit… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

    Comments: 11 pages

    Report number: Paper ID: IST-BDE-MNNR-170524-5719

  3. arXiv:2312.02254  [pdf

    cs.LG cs.AI

    Innovations in Agricultural Forecasting: A Multivariate Regression Study on Global Crop Yield Prediction

    Authors: Ishaan Gupta, Samyutha Ayalasomayajula, Yashas Shashidhara, Anish Kataria, Shreyas Shashidhara, Krishita Kataria, Aditya Undurti

    Abstract: The prediction of crop yields internationally is a crucial objective in agricultural research. Thus, this study implements 6 regression models (Linear, Tree, Gradient Descent, Gradient Boosting, K Nearest Neighbors, and Random Forest) to predict crop yields in 37 developing countries over 27 years. Given 4 key training parameters, insecticides (tonnes), rainfall (mm), temperature (Celsius), and yi… ▽ More

    Submitted 14 March, 2024; v1 submitted 4 December, 2023; originally announced December 2023.

    Comments: 12 pages, 8 figures, 1 table, Guided by Dr. Aditya Undurti

    MSC Class: 68W03

  4. arXiv:2311.09862  [pdf, other

    cs.CL cs.SI

    Which Modality should I use -- Text, Motif, or Image? : Understanding Graphs with Large Language Models

    Authors: Debarati Das, Ishaan Gupta, Jaideep Srivastava, Dongyeop Kang

    Abstract: Our research integrates graph data with Large Language Models (LLMs), which, despite their advancements in various fields using large text corpora, face limitations in encoding entire graphs due to context size constraints. This paper introduces a new approach to encoding a graph with diverse modalities, such as text, image, and motif, coupled with prompts to approximate a graph's global connectiv… ▽ More

    Submitted 13 March, 2024; v1 submitted 16 November, 2023; originally announced November 2023.

  5. An AI-Driven VM Threat Prediction Model for Multi-Risks Analysis-Based Cloud Cybersecurity

    Authors: Deepika Saxena, Ishu Gupta, Rishabh Gupta, Ashutosh Kumar Singh, Xiaoqing Wen

    Abstract: Cloud virtualization technology, ingrained with physical resource sharing, prompts cybersecurity threats on users' virtual machines (VM)s due to the presence of inevitable vulnerabilities on the offsite servers. Contrary to the existing works which concentrated on reducing resource sharing and encryption and decryption of data before transfer for improving cybersecurity which raises computational… ▽ More

    Submitted 18 August, 2023; originally announced August 2023.

    Journal ref: IEEE Transactions on Systems, Man, and Cybernetics: Systems Journal, 2023

  6. arXiv:2308.03615  [pdf, other

    cs.DC cs.DB

    Dirigo: Self-scaling Stateful Actors For Serverless Real-time Data Processing

    Authors: Le Xu, Divyanshu Saxena, Neeraja J. Yadwadkar, Aditya Akella, Indranil Gupta

    Abstract: We propose Dirigo, a distributed stream processing service built atop virtual actors. Dirigo achieves both a high level of resource efficiency and performance isolation driven by user intent (SLO). To improve resource efficiency, Dirigo adopts a serverless architecture that enables time-sharing of compute resources among streaming operators, both within and across applications. Meanwhile, Dirigo i… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

  7. arXiv:2303.00207  [pdf, other

    cs.DC

    CoMesh: Fully-Decentralized Control for Sense-Trigger-Actuate Routines in Edge Meshes

    Authors: Anna Karanika, Rui Yang, Xiaojuan Ma, Jiangran Wang, Shalni Sundram, Indranil Gupta

    Abstract: While mesh networking for edge settings (e.g., smart buildings, farms, battlefields, etc.) has received much attention, the layer of control over such meshes remains largely centralized and cloud-based. This paper focuses on applications with sense-trigger-actuate (STA) workloads -- these are similar to the abstraction of routines popular in smart homes, but applied to larger-scale edge IoT deploy… ▽ More

    Submitted 28 February, 2023; originally announced March 2023.

    Comments: 12 pages, 12 figures

  8. arXiv:2302.06227  [pdf, other

    eess.AS cs.SD

    Fast and small footprint Hybrid HMM-HiFiGAN based system for speech synthesis in Indian languages

    Authors: Sudhanshu Srivastava, Ishika Gupta, Anusha Prakash, Jom Kuriakose, Hema A. Murthy

    Abstract: Hidden-Markov-model (HMM) based text-to-speech (HTS) offers flexibility in speaking styles along with fast training and synthesis while being computationally less intense. HTS performs well even in low-resource scenarios. The primary drawback is that the voice quality is poor compared to that of E2E systems. A hybrid approach combining HMM-based feature generation and neural-network-based HiFi-GAN… ▽ More

    Submitted 13 February, 2023; originally announced February 2023.

    Comments: 5 pages, 5 figures

  9. arXiv:2302.05476  [pdf, other

    cs.DB cs.HC

    Transactional Panorama: A Conceptual Framework for User Perception in Analytical Visual Interfaces

    Authors: Dixin Tang, Alan Fekete, Indranil Gupta, Aditya G. Parameswaran

    Abstract: Many tools empower analysts and data scientists to consume analysis results in a visual interface, such as a dashboard. When the underlying data changes, these results need to be updated, but this update can take a long time -- all while the user continues to explore the results. In this context, tools can either (i) hide away results that haven't been updated, hindering exploration; (ii) make the… ▽ More

    Submitted 10 February, 2023; originally announced February 2023.

  10. arXiv:2301.08695  [pdf, other

    cs.DC cs.LG

    Baechi: Fast Device Placement of Machine Learning Graphs

    Authors: Beomyeol Jeon, Linda Cai, Chirag Shetty, Pallavi Srivastava, Jintao Jiang, Xiaolan Ke, Yitao Meng, Cong Xie, Indranil Gupta

    Abstract: Machine Learning graphs (or models) can be challenging or impossible to train when either devices have limited memory, or models are large. To split the model across devices, learning-based approaches are still popular. While these result in model placements that train fast on data (i.e., low step times), learning-based model-parallelism is time-consuming, taking many hours or days to create a pla… ▽ More

    Submitted 20 January, 2023; originally announced January 2023.

    Comments: Extended version of SoCC 2020 paper: https://dl.acm.org/doi/10.1145/3419111.3421302

  11. A Fault Tolerant Elastic Resource Management Framework Towards High Availability of Cloud Services

    Authors: Deepika Saxena, Ishu Gupta, Ashutosh Kumar Singh, Chung-Nan Lee

    Abstract: Cloud computing has become inevitable for every digital service which has exponentially increased its usage. However, a tremendous surge in cloud resource demand stave off service availability resulting into outages, performance degradation, load imbalance, and excessive power-consumption. The existing approaches mainly attempt to address the problem by using multi-cloud and running multiple repli… ▽ More

    Submitted 7 December, 2022; originally announced December 2022.

    Comments: IEEE Transactions of Network and Service Management, 2022

  12. arXiv:2211.01338  [pdf, other

    eess.AS cs.CL cs.MM cs.SD eess.IV

    Technology Pipeline for Large Scale Cross-Lingual Dubbing of Lecture Videos into Multiple Indian Languages

    Authors: Anusha Prakash, Arun Kumar, Ashish Seth, Bhagyashree Mukherjee, Ishika Gupta, Jom Kuriakose, Jordan Fernandes, K V Vikram, Mano Ranjith Kumar M, Metilda Sagaya Mary, Mohammad Wajahat, Mohana N, Mudit Batra, Navina K, Nihal John George, Nithya Ravi, Pruthwik Mishra, Sudhanshu Srivastava, Vasista Sai Lodagala, Vandan Mujadia, Kada Sai Venkata Vineeth, Vrunda Sukhadia, Dipti Sharma, Hema Murthy, Pushpak Bhattacharya , et al. (2 additional authors not shown)

    Abstract: Cross-lingual dubbing of lecture videos requires the transcription of the original audio, correction and removal of disfluencies, domain term discovery, text-to-text translation into the target language, chunking of text using target language rhythm, text-to-speech synthesis followed by isochronous lipsyncing to the original video. This task becomes challenging when the source and target languages… ▽ More

    Submitted 1 November, 2022; originally announced November 2022.

  13. arXiv:2203.11287  [pdf, other

    cs.LG cs.NE

    PCA-RF: An Efficient Parkinson's Disease Prediction Model based on Random Forest Classification

    Authors: Ishu Gupta, Vartika Sharma, Sizman Kaur, Ashutosh Kumar Singh

    Abstract: In this modern era of overpopulation disease prediction is a crucial step in diagnosing various diseases at an early stage. With the advancement of various machine learning algorithms, the prediction has become quite easy. However, the complex and the selection of an optimal machine learning technique for the given dataset greatly affects the accuracy of the model. A large amount of datasets exist… ▽ More

    Submitted 21 March, 2022; originally announced March 2022.

    Comments: 10 pages, 3 figures

  14. arXiv:2203.08143  [pdf, other

    q-fin.ST cs.AI cs.LG

    HiSA-SMFM: Historical and Sentiment Analysis based Stock Market Forecasting Model

    Authors: Ishu Gupta, Tarun Kumar Madan, Sukhman Singh, Ashutosh Kumar Singh

    Abstract: One of the pillars to build a country's economy is the stock market. Over the years, people are investing in stock markets to earn as much profit as possible from the amount of money that they possess. Hence, it is vital to have a prediction model which can accurately predict future stock prices. With the help of machine learning, it is not an impossible task as the various machine learning techni… ▽ More

    Submitted 10 March, 2022; originally announced March 2022.

  15. arXiv:2203.05835  [pdf, other

    cs.LG

    MLRM: A Multiple Linear Regression based Model for Average Temperature Prediction of A Day

    Authors: Ishu Gupta, Harsh Mittal, Deepak Rikhari, Ashutosh Kumar Singh

    Abstract: Weather is a phenomenon that affects everything and everyone around us on a daily basis. Weather prediction has been an important point of study for decades as researchers have tried to predict the weather and climatic changes using traditional meteorological techniques. With the advent of modern technologies and computing power, we can do so with the help of machine learning techniques. We aim to… ▽ More

    Submitted 11 March, 2022; originally announced March 2022.

  16. arXiv:2203.05367  [pdf, other

    cs.CR

    TIDF-DLPM: Term and Inverse Document Frequency based Data Leakage Prevention Model

    Authors: Ishu Gupta, Sloni Mittal, Ankit Tiwari, Priya Agarwal, Ashutosh Kumar Singh

    Abstract: Confidentiality of the data is being endangered as it has been categorized into false categories which might get leaked to an unauthorized party. For this reason, various organizations are mainly implementing data leakage prevention systems (DLPs). Firewalls and intrusion detection systems are being outdated versions of security mechanisms. The data which are being used, in sending state or are re… ▽ More

    Submitted 10 March, 2022; originally announced March 2022.

  17. arXiv:2202.12530  [pdf, other

    cs.DB cs.DC

    Banyan: A Scoped Dataflow Engine for Graph Query Service

    Authors: Li Su, Xiaoming Qin, Zichao Zhang, Rui Yang, Le Xu, Indranil Gupta, Wenyuan Yu, Kai Zeng, Jingren Zhou

    Abstract: Graph query services (GQS) are widely used today to interactively answer graph traversal queries on large-scale graph data. Existing graph query engines focus largely on optimizing the latency of a single query. This ignores significant challenges posed by GQS, including fine-grained control and scheduling during query execution, as well as performance isolation and load balancing in various level… ▽ More

    Submitted 25 February, 2022; originally announced February 2022.

  18. arXiv:2202.11965  [pdf, other

    cs.CR

    A Holistic View on Data Protection for Sharing, Communicating, and Computing Environments: Taxonomy and Future Directions

    Authors: Ishu Gupta, Ashutosh Kumar Singh

    Abstract: The data is an important asset of an organization and it is essential to keep this asset secure. It requires security in whatever state is it i.e. data at rest, data in use, and data in transit. There is a need to pay more attention to it when the third party is included i.e. when the data is stored in the cloud then it requires more security. Since confidential data can reside on a variety of com… ▽ More

    Submitted 24 February, 2022; originally announced February 2022.

  19. arXiv:2109.02485  [pdf

    cs.LG q-bio.PE

    Severity and Mortality Prediction Models to Triage Indian COVID-19 Patients

    Authors: Samarth Bhatia, Yukti Makhija, Sneha Jayaswal, Shalendra Singh, Ishaan Gupta

    Abstract: As the second wave in India mitigates, COVID-19 has now infected about 29 million patients countrywide, leading to more than 350 thousand people dead. As the infections surged, the strain on the medical infrastructure in the country became apparent. While the country vaccinates its population, opening up the economy may lead to an increase in infection rates. In this scenario, it is essential to e… ▽ More

    Submitted 23 October, 2021; v1 submitted 2 September, 2021; originally announced September 2021.

    Comments: 31 pages, 6 figures, 8 tables. The first two authors (SB and YM) have equal contribution. IG is the corresponding author (ishaan@iitd.ac.in) Changes: Author List updated

  20. A Secure and Multi-objective Virtual Machine Placement Framework for Cloud Data Centre

    Authors: Deepika Saxena, Ishu Gupta, Jitendra Kumar, Ashutosh Kumar Singh, Xiaoqing Wen

    Abstract: To facilitate cost-effective and elastic computing benefits to the cloud users, the energy-efficient and secure allocation of virtual machines (VMs) plays a significant role at the data centre. The inefficient VM Placement (VMP) and sharing of common physical machines among multiple users leads to resource wastage, excessive power consumption, increased inter-communication cost and security breach… ▽ More

    Submitted 28 July, 2021; originally announced July 2021.

    Comments: This article has been accepted for inclusion in a future issue of IEEE Systems Journal (2021)

  21. arXiv:2101.07215  [pdf

    cs.LG

    Challenges in the application of a mortality prediction model for COVID-19 patients on an Indian cohort

    Authors: Yukti Makhija, Samarth Bhatia, Shalendra Singh, Sneha Kumar Jayaswal, Prabhat Singh Malik, Pallavi Gupta, Shreyas N. Samaga, Shreya Johri, Sri Krishna Venigalla, Rabi Narayan Hota, Surinder Singh Bhatia, Ishaan Gupta

    Abstract: Many countries are now experiencing the third wave of the COVID-19 pandemic straining the healthcare resources with an acute shortage of hospital beds and ventilators for the critically ill patients. This situation is especially worse in India with the second largest load of COVID-19 cases and a relatively resource-scarce medical infrastructure. Therefore, it becomes essential to triage the patien… ▽ More

    Submitted 15 January, 2021; originally announced January 2021.

    Comments: 8 pages, 1 figure, 1 table Study designed by: IG, SB, YM, SJ. Data collected and curated by: SKJ, PG, SNS, RNH, SSB, PSM, SKV and SS. Data analysis performed by: SB, YM. Manuscript was written by: IG, SS, SB, YM . All authors read and approved the final manuscript. The first two authors have contributed equally

  22. arXiv:2010.03035  [pdf, other

    cs.DC

    Move Fast and Meet Deadlines: Fine-grained Real-time Stream Processing with Cameo

    Authors: Le Xu, Shivaram Venkataraman, Indranil Gupta, Luo Mai, Rahul Potharaju

    Abstract: Resource provisioning in multi-tenant stream processing systems faces the dual challenges of keeping resource utilization high (without over-provisioning), and ensuring performance isolation. In our common production use cases, where streaming workloads have to meet latency targets and avoid breaching service-level agreements, existing solutions are incapable of handling the wide variability of us… ▽ More

    Submitted 6 October, 2020; originally announced October 2020.

  23. arXiv:2007.13221  [pdf, other

    cs.LG cs.DC stat.ML

    CSER: Communication-efficient SGD with Error Reset

    Authors: Cong Xie, Shuai Zheng, Oluwasanmi Koyejo, Indranil Gupta, Mu Li, Haibin Lin

    Abstract: The scalability of Distributed Stochastic Gradient Descent (SGD) is today limited by communication bottlenecks. We propose a novel SGD variant: Communication-efficient SGD with Error Reset, or CSER. The key idea in CSER is first a new technique called "error reset" that adapts arbitrary compressors for SGD, producing bifurcated local models with periodic reset of resulting local residual errors. S… ▽ More

    Submitted 4 December, 2020; v1 submitted 26 July, 2020; originally announced July 2020.

  24. Home, SafeHome: Smart Home Reliability with Visibility and Atomicity

    Authors: Shegufta Bakht Ahsan, Rui Yang, Shadi A. Noghabi, Indranil Gupta

    Abstract: Smart environments (homes, factories, hospitals, buildings) contain an increasing number of IoT devices, making them complex to manage. Today, in smart homes where users or triggers initiate routines (i.e., a sequence of commands), concurrent routines and device failures can cause incongruent outcomes. We describe SafeHome, a system that provides notions of atomicity and serial equivalence for sma… ▽ More

    Submitted 24 July, 2020; originally announced July 2020.

    Comments: 12 pages

  25. arXiv:1911.09030  [pdf, other

    cs.LG cs.DC stat.ML

    Local AdaAlter: Communication-Efficient Stochastic Gradient Descent with Adaptive Learning Rates

    Authors: Cong Xie, Oluwasanmi Koyejo, Indranil Gupta, Haibin Lin

    Abstract: When scaling distributed training, the communication overhead is often the bottleneck. In this paper, we propose a novel SGD variant with reduced communication and adaptive learning rates. We prove the convergence of the proposed algorithm for smooth but non-convex problems. Empirical results show that the proposed algorithm significantly reduces the communication overhead, which, in turn, reduces… ▽ More

    Submitted 4 December, 2020; v1 submitted 20 November, 2019; originally announced November 2019.

  26. arXiv:1905.09945  [pdf, other

    cs.SI cs.CR

    Multifaceted Privacy: How to Express Your Online Persona without Revealing Your Sensitive Attributes

    Authors: Victor Zakhary, Ishani Gupta, Rey Tang, Amr El Abbadi

    Abstract: Recent works in social network stream analysis show that a user's online persona attributes (e.g., gender, ethnicity, political interest, location, etc.) can be accurately inferred from the topics the user writes about or engages with. Attribute and preference inferences have been widely used to serve personalized recommendations, directed ads, and to enhance the user experience in social networks… ▽ More

    Submitted 23 May, 2019; originally announced May 2019.

  27. arXiv:1903.07020  [pdf, other

    cs.LG cs.DC stat.ML

    Zeno++: Robust Fully Asynchronous SGD

    Authors: Cong Xie, Sanmi Koyejo, Indranil Gupta

    Abstract: We propose Zeno++, a new robust asynchronous Stochastic Gradient Descent~(SGD) procedure which tolerates Byzantine failures of the workers. In contrast to previous work, Zeno++ removes some unrealistic restrictions on worker-server communications, allowing for fully asynchronous updates from anonymous workers, arbitrarily stale worker updates, and the possibility of an unbounded number of Byzantin… ▽ More

    Submitted 9 May, 2021; v1 submitted 16 March, 2019; originally announced March 2019.

    Comments: ICML version with some additional remarks related to the acceptance rate of Byzantine validation, and also with the full version of error bounds in the theorems

  28. arXiv:1903.06996  [pdf, other

    cs.LG cs.DC stat.ML

    SLSGD: Secure and Efficient Distributed On-device Machine Learning

    Authors: Cong Xie, Sanmi Koyejo, Indranil Gupta

    Abstract: We consider distributed on-device learning with limited communication and security requirements. We propose a new robust distributed optimization algorithm with efficient communication and attack tolerance. The proposed algorithm has provable convergence and robustness under non-IID settings. Empirical results show that the proposed algorithm stabilizes the convergence and tolerates data poisoning… ▽ More

    Submitted 1 October, 2019; v1 submitted 16 March, 2019; originally announced March 2019.

  29. arXiv:1903.03936  [pdf, other

    cs.LG cs.CR cs.DC stat.ML

    Fall of Empires: Breaking Byzantine-tolerant SGD by Inner Product Manipulation

    Authors: Cong Xie, Sanmi Koyejo, Indranil Gupta

    Abstract: Recently, new defense techniques have been developed to tolerate Byzantine failures for distributed machine learning. The Byzantine model captures workers that behave arbitrarily, including malicious and compromised workers. In this paper, we break two prevailing Byzantine-tolerant techniques. Specifically we show robust aggregation methods for synchronous SGD -- coordinate-wise median and Krum --… ▽ More

    Submitted 10 March, 2019; originally announced March 2019.

  30. arXiv:1903.03934  [pdf, other

    cs.DC cs.LG

    Asynchronous Federated Optimization

    Authors: Cong Xie, Sanmi Koyejo, Indranil Gupta

    Abstract: Federated learning enables training on a massive number of edge devices. To improve flexibility and scalability, we propose a new asynchronous federated optimization algorithm. We prove that the proposed approach has near-linear convergence to a global optimum, for both strongly convex and a restricted family of non-convex problems. Empirical results show that the proposed algorithm converges quic… ▽ More

    Submitted 4 December, 2020; v1 submitted 10 March, 2019; originally announced March 2019.

  31. arXiv:1805.10032  [pdf, other

    cs.LG cs.CR cs.DC stat.ML

    Zeno: Distributed Stochastic Gradient Descent with Suspicion-based Fault-tolerance

    Authors: Cong Xie, Oluwasanmi Koyejo, Indranil Gupta

    Abstract: We present Zeno, a technique to make distributed machine learning, particularly Stochastic Gradient Descent (SGD), tolerant to an arbitrary number of faulty workers. Zeno generalizes previous results that assumed a majority of non-faulty nodes; we need assume only one non-faulty worker. Our key idea is to suspect workers that are potentially defective. Since this is likely to lead to false positiv… ▽ More

    Submitted 17 May, 2019; v1 submitted 25 May, 2018; originally announced May 2018.

    Comments: ICML 2019

  32. arXiv:1805.09682  [pdf, other

    cs.DC stat.ML

    Phocas: dimensional Byzantine-resilient stochastic gradient descent

    Authors: Cong Xie, Oluwasanmi Koyejo, Indranil Gupta

    Abstract: We propose a novel robust aggregation rule for distributed synchronous Stochastic Gradient Descent~(SGD) under a general Byzantine failure model. The attackers can arbitrarily manipulate the data transferred between the servers and the workers in the parameter server~(PS) architecture. We prove the Byzantine resilience of the proposed aggregation rules. Empirical analysis shows that the proposed t… ▽ More

    Submitted 23 May, 2018; originally announced May 2018.

    Comments: Submitted to NIPS 2018. arXiv admin note: substantial text overlap with arXiv:1802.10116

  33. arXiv:1802.10116  [pdf, other

    cs.DC stat.ML

    Generalized Byzantine-tolerant SGD

    Authors: Cong Xie, Oluwasanmi Koyejo, Indranil Gupta

    Abstract: We propose three new robust aggregation rules for distributed synchronous Stochastic Gradient Descent~(SGD) under a general Byzantine failure model. The attackers can arbitrarily manipulate the data transferred between the servers and the workers in the parameter server~(PS) architecture. We prove the Byzantine resilience properties of these aggregation rules. Empirical analysis shows that the pro… ▽ More

    Submitted 23 March, 2018; v1 submitted 27 February, 2018; originally announced February 2018.

  34. arXiv:1802.00082  [pdf, other

    cs.DC

    Henge: Intent-driven Multi-Tenant Stream Processing

    Authors: Faria Kalim, Le Xu, Sharanya Bathey, Richa Meherwal, Indranil Gupta

    Abstract: We present Henge, a system to support intent-based multi-tenancy in modern stream processing applications. Henge supports multi-tenancy as a first-class citizen: everyone inside an organization can now submit their stream processing jobs to a single, shared, consolidated cluster. Additionally, Henge allows each tenant (job) to specify its own intents (i.e., requirements) as a Service Level Objecti… ▽ More

    Submitted 31 January, 2018; originally announced February 2018.

  35. arXiv:1712.10056  [pdf, other

    cs.DC cs.LO

    Inferring Formal Properties of Production Key-Value Stores

    Authors: Edgar Pek, Pranav Garg, Muntasir Raihan Rahman, Karl Palmskog, Indranil Gupta, P. Madhusudan

    Abstract: Production distributed systems are challenging to formally verify, in particular when they are based on distributed protocols that are not rigorously described or fully understood. In this paper, we derive models and properties for two core distributed protocols used in eventually consistent production key-value stores such as Riak and Cassandra. We propose a novel modeling called certified progra… ▽ More

    Submitted 28 December, 2017; originally announced December 2017.

    Comments: 15 pages, 2 figures

  36. arXiv:1707.08772  [pdf

    cs.ET

    Spike sorting using non-volatile metal-oxide memristors

    Authors: Isha Gupta, Alexantrou Serb, Ali Khiat, Maria Trapatseli, Themistoklis Prodromakis

    Abstract: Electrophysiological techniques have improved substantially over the past years to the point that neuroprosthetics applications are becoming viable. This evolution has been fuelled by the advancement of implantable microelectrode technologies that have followed their own version of Moore's scaling law. Similarly to electronics, however, excessive data-rates and strained power budgets require the d… ▽ More

    Submitted 27 July, 2017; originally announced July 2017.

    Comments: 7 pages, 3 figures

  37. arXiv:1611.09671  [pdf

    cs.ET

    Sub 100nW volatile nano-metal-oxide memristor as synaptic-like encoder of neuronal spikes

    Authors: Isha Gupta, Alexantrou Serb, Ali Khiat, Ralf Zeitler, Stefano Vassanelli, Themistoklis Prodromakis

    Abstract: Advanced neural interfaces mediate a bio-electronic link between the nervous system and microelectronic devices, bearing great potential as innovative therapy for various diseases. Spikes from a large number of neurons are recorded leading to creation of big data that require on-line processing under most stringent conditions, such as minimal power dissipation and on-chip space occupancy. Here, we… ▽ More

    Submitted 29 November, 2016; originally announced November 2016.

    Comments: 15 pages main article, 15 pages supplementary information, 2 pages supplementary notes

  38. arXiv:1509.02464  [pdf, other

    cs.DC

    Characterizing and Adapting the Consistency-Latency Tradeoff in Distributed Key-value Stores

    Authors: Muntasir Raihan Rahman, Lewis Tseng, Son Nguyen, Indranil Gupta, Nitin Vaidya

    Abstract: The CAP theorem is a fundamental result that applies to distributed storage systems. In this paper, we first present and prove two CAP-like impossibility theorems. To state these theorems, we present probabilistic models to characterize the three important elements of the CAP theorem: consistency (C), availability or latency (A), and partition tolerance (P). The theorems show the un-achievable env… ▽ More

    Submitted 23 January, 2016; v1 submitted 8 September, 2015; originally announced September 2015.

  39. arXiv:1507.06832  [pdf

    cs.ET

    Memristive integrative sensors for neuronal activity

    Authors: Isha Gupta, Alexantrou Serb, Ali Khiat, Ralf Zeitler, Stefano Vassanelli, Themistoklis Prodromakis

    Abstract: The advent of advanced neuronal interfaces offers great promise for linking brain functions to electronics. A major bottleneck in achieving this is real-time processing of big data that imposes excessive requirements on bandwidth, energy and computation capacity; limiting the overall number of bio-electronic links. Here, we present a novel monitoring system concept that exploits the intrinsic prop… ▽ More

    Submitted 24 July, 2015; originally announced July 2015.

  40. arXiv:1207.2991  [pdf

    cs.NI

    BIGP- a new single protocol that can work as an igp (interior gateway protocol) as well as egp (exterior gateway protocol)

    Authors: Isha Gupta

    Abstract: EGP and IGP are the key components of the present internet infrastructure. Routers in a domain forward IP packet within and between domains. Each domain uses an intra-domain routing protocol known as Interior Gateway Protocol (IGP) like IS-IS, OSPF, RIP etc to populate the routing tables of its routers. Routing information must also be exchanged between domains to ensure that a host in one domain… ▽ More

    Submitted 12 July, 2012; originally announced July 2012.

    Comments: 5 Pages, 6 Figures

  41. arXiv:cs/0509095  [pdf

    cs.NI cs.CY

    Leveraging Social-Network Infrastructure to Improve Peer-to-Peer Overlay Performance: Results from Orkut

    Authors: Zahid Anwar, William Yurcik, Vivek Pandey, Asim Shankar, Indranil Gupta, Roy H. Campbell

    Abstract: Application-level peer-to-peer (P2P) network overlays are an emerging paradigm that facilitates decentralization and flexibility in the scalable deployment of applications such as group communication, content delivery, and data sharing. However the construction of the overlay graph topology optimized for low latency, low link and node stress and lookup performance is still an open problem. We pr… ▽ More

    Submitted 28 September, 2005; originally announced September 2005.

    Comments: 9 pages 8 figures

    ACM Class: C.2.2