Skip to main content

Showing 1–50 of 85 results for author: Nayak, A

  1. arXiv:2406.05599  [pdf, other

    quant-ph cs.IT

    Reliable Quantum Memories with Unreliable Components

    Authors: Anuj K. Nayak, Eric Chitambar, Lav R. Varshney

    Abstract: Quantum memory systems are vital in quantum information processing for dependable storage and retrieval of quantum states. Inspired by classical reliability theories that synthesize reliable computing systems from unreliable components, we formalize the problem of reliable storage of quantum information using noisy components. We introduce the notion of stable quantum memories and define the stora… ▽ More

    Submitted 8 June, 2024; originally announced June 2024.

    Comments: 15 pages, 3 figures

  2. arXiv:2405.04437  [pdf, other

    cs.LG cs.OS

    vAttention: Dynamic Memory Management for Serving LLMs without PagedAttention

    Authors: Ramya Prabhu, Ajay Nayak, Jayashree Mohan, Ramachandran Ramjee, Ashish Panwar

    Abstract: Efficient management of GPU memory is essential for high throughput LLM inference. Prior systems used to reserve KV-cache memory ahead-of-time that resulted in wasted capacity due to internal fragmentation. Inspired by demand paging, vLLM proposed PagedAttention to enable dynamic memory allocation for KV-cache. This approach eliminates fragmentation and improves serving throughout. However, to be… ▽ More

    Submitted 12 July, 2024; v1 submitted 7 May, 2024; originally announced May 2024.

    Comments: 14 pages, 13 figures, 10 tables

  3. arXiv:2404.12415  [pdf

    eess.IV cs.CV cs.LG

    Soil Fertility Prediction Using Combined USB-microscope Based Soil Image, Auxiliary Variables, and Portable X-Ray Fluorescence Spectrometry

    Authors: Shubhadip Dasgupta, Satwik Pate, Divya Rathore, L. G. Divyanth, Ayan Das, Anshuman Nayak, Subhadip Dey, Asim Biswas, David C. Weindorf, Bin Li, Sergio Henrique Godinho Silva, Bruno Teixeira Ribeiro, Sanjay Srivastava, Somsubhra Chakraborty

    Abstract: This study explored the application of portable X-ray fluorescence (PXRF) spectrometry and soil image analysis to rapidly assess soil fertility, focusing on critical parameters such as available B, organic carbon (OC), available Mn, available S, and the sulfur availability index (SAI). Analyzing 1,133 soil samples from various agro-climatic zones in Eastern India, the research combined color and t… ▽ More

    Submitted 17 April, 2024; originally announced April 2024.

    Comments: 37 pages, 10 figures; manuscript under peer-review for publication in the jounral 'Computers and Electronics in Agriculture'

  4. arXiv:2403.03295  [pdf, ps, other

    quant-ph cs.CC cs.LG

    Proper vs Improper Quantum PAC learning

    Authors: Ashwin Nayak, Pulkit Sinha

    Abstract: A basic question in the PAC model of learning is whether proper learning is harder than improper learning. In the classical case, there are examples of concept classes with VC dimension $d$ that have sample complexity $Ω\left(\frac dε\log\frac1ε\right)$ for proper learning with error $ε$, while the complexity for improper learning is O$\!\left(\frac dε\right)$. One such example arises from the Cou… ▽ More

    Submitted 5 March, 2024; originally announced March 2024.

    Comments: 23 Pages

  5. arXiv:2312.05003  [pdf, other

    cs.IT

    On the Regret of Online Coded Caching

    Authors: Anupam Nayak, Sheel Shah, Nikhil Karamchandani

    Abstract: We consider the widely studied problem of coded caching under non-uniform requests where users independently request files according to some underlying popularity distribution in each slot. This work is a first step towards analyzing this framework through the lens of online learning. We consider the case where the underlying request distribution is apriori unknown and propose an online policy as… ▽ More

    Submitted 8 December, 2023; originally announced December 2023.

  6. arXiv:2312.03733  [pdf

    cs.CL cs.AI

    Methods to Estimate Large Language Model Confidence

    Authors: Maia Kotelanski, Robert Gallo, Ashwin Nayak, Thomas Savage

    Abstract: Large Language Models have difficulty communicating uncertainty, which is a significant obstacle to applying LLMs to complex medical tasks. This study evaluates methods to measure LLM confidence when suggesting a diagnosis for challenging clinical vignettes. GPT4 was asked a series of challenging case questions using Chain of Thought and Self Consistency prompting. Multiple methods were investigat… ▽ More

    Submitted 8 December, 2023; v1 submitted 28 November, 2023; originally announced December 2023.

  7. arXiv:2312.03296  [pdf, other

    cs.RO cs.CV cs.LG

    Cooperative Probabilistic Trajectory Forecasting under Occlusion

    Authors: Anshul Nayak, Azim Eskandarian

    Abstract: Perception and planning under occlusion is essential for safety-critical tasks. Occlusion-aware planning often requires communicating the information of the occluded object to the ego agent for safe navigation. However, communicating rich sensor information under adverse conditions during communication loss and limited bandwidth may not be always feasible. Further, in GPS denied environments and i… ▽ More

    Submitted 6 December, 2023; originally announced December 2023.

    Comments: 10 pages, 13 figures, 1 table

  8. arXiv:2311.12825  [pdf, ps, other

    cs.AI cs.LG stat.ME

    A PSO Based Method to Generate Actionable Counterfactuals for High Dimensional Data

    Authors: Shashank Shekhar, Asif Salim, Adesh Bansode, Vivaswan Jinturkar, Anirudha Nayak

    Abstract: Counterfactual explanations (CFE) are methods that explain a machine learning model by giving an alternate class prediction of a data point with some minimal changes in its features. It helps the users to identify their data attributes that caused an undesirable prediction like a loan or credit card rejection. We describe an efficient and an actionable counterfactual (CF) generation method based o… ▽ More

    Submitted 30 November, 2023; v1 submitted 30 September, 2023; originally announced November 2023.

    Comments: Accepted in IEEE CSDE 2023

  9. arXiv:2310.04271  [pdf, other

    cs.RO cs.CV

    Compositional Servoing by Recombining Demonstrations

    Authors: Max Argus, Abhijeet Nayak, Martin Büchner, Silvio Galesso, Abhinav Valada, Thomas Brox

    Abstract: Learning-based manipulation policies from image inputs often show weak task transfer capabilities. In contrast, visual servoing methods allow efficient task transfer in high-precision scenarios while requiring only a few demonstrations. In this work, we present a framework that formulates the visual servoing task as graph traversal. Our method not only extends the robustness of visual servoing, bu… ▽ More

    Submitted 6 October, 2023; originally announced October 2023.

    Comments: http://compservo.cs.uni-freiburg.de

  10. arXiv:2309.09875  [pdf, other

    cs.RO cs.CV

    RaLF: Flow-based Global and Metric Radar Localization in LiDAR Maps

    Authors: Abhijeet Nayak, Daniele Cattaneo, Abhinav Valada

    Abstract: Localization is paramount for autonomous robots. While camera and LiDAR-based approaches have been extensively investigated, they are affected by adverse illumination and weather conditions. Therefore, radar sensors have recently gained attention due to their intrinsic robustness to such conditions. In this paper, we propose RaLF, a novel deep neural network-based approach for localizing radar sca… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

  11. arXiv:2308.16321  [pdf, other

    cs.CR cs.CY

    Exposing and Addressing Security Vulnerabilities in Browser Text Input Fields

    Authors: Asmit Nayak, Rishabh Khandelwal, Kassem Fawaz

    Abstract: In this work, we perform a comprehensive analysis of the security of text input fields in web browsers. We find that browsers' coarse-grained permission model violates two security design principles: least privilege and complete mediation. We further uncover two vulnerabilities in input fields, including the alarming discovery of passwords in plaintext within the HTML source code of the web page.… ▽ More

    Submitted 30 August, 2023; originally announced August 2023.

  12. arXiv:2308.14089  [pdf, other

    cs.CL cs.AI cs.LG

    MedAlign: A Clinician-Generated Dataset for Instruction Following with Electronic Medical Records

    Authors: Scott L. Fleming, Alejandro Lozano, William J. Haberkorn, Jenelle A. Jindal, Eduardo P. Reis, Rahul Thapa, Louis Blankemeier, Julian Z. Genkins, Ethan Steinberg, Ashwin Nayak, Birju S. Patel, Chia-Chun Chiang, Alison Callahan, Zepeng Huo, Sergios Gatidis, Scott J. Adams, Oluseyi Fayanju, Shreya J. Shah, Thomas Savage, Ethan Goh, Akshay S. Chaudhari, Nima Aghaeepour, Christopher Sharp, Michael A. Pfeffer, Percy Liang , et al. (5 additional authors not shown)

    Abstract: The ability of large language models (LLMs) to follow natural language instructions with human-level fluency suggests many opportunities in healthcare to reduce administrative burden and improve quality of care. However, evaluating LLMs on realistic text generation tasks for healthcare remains challenging. Existing question answering datasets for electronic health record (EHR) data fail to capture… ▽ More

    Submitted 24 December, 2023; v1 submitted 27 August, 2023; originally announced August 2023.

  13. arXiv:2308.13207  [pdf, other

    cs.CL

    LLM2KB: Constructing Knowledge Bases using instruction tuned context aware Large Language Models

    Authors: Anmol Nayak, Hari Prasad Timmapathini

    Abstract: The advent of Large Language Models (LLM) has revolutionized the field of natural language processing, enabling significant progress in various applications. One key area of interest is the construction of Knowledge Bases (KB) using these powerful models. Knowledge bases serve as repositories of structured information, facilitating information retrieval and inference tasks. Our paper proposes LLM2… ▽ More

    Submitted 25 August, 2023; originally announced August 2023.

    Comments: 16 pages, 1 figure, LM-KBC 2023 Challenge at International Semantic Web Conference 2023

  14. arXiv:2308.06834  [pdf

    cs.CL cs.AI cs.HC

    Diagnostic Reasoning Prompts Reveal the Potential for Large Language Model Interpretability in Medicine

    Authors: Thomas Savage, Ashwin Nayak, Robert Gallo, Ekanath Rangan, Jonathan H Chen

    Abstract: One of the major barriers to using large language models (LLMs) in medicine is the perception they use uninterpretable methods to make clinical decisions that are inherently different from the cognitive processes of clinicians. In this manuscript we develop novel diagnostic reasoning prompts to study whether LLMs can perform clinical reasoning to accurately form a diagnosis. We find that GPT4 can… ▽ More

    Submitted 13 August, 2023; originally announced August 2023.

  15. arXiv:2306.08111  [pdf, other

    cs.CY cs.HC

    Unpacking Privacy Labels: A Measurement and Developer Perspective on Google's Data Safety Section

    Authors: Rishabh Khandelwal, Asmit Nayak, Paul Chung, Kassem Fawaz

    Abstract: Google has mandated developers to use Data Safety Sections (DSS) to increase transparency in data collection and sharing practices. In this paper, we present a comprehensive analysis of Google's Data Safety Section (DSS) using both quantitative and qualitative methods. We conduct the first large-scale measurement study of DSS using apps from Android Play store (n=1.1M). We find that there are inte… ▽ More

    Submitted 13 June, 2023; originally announced June 2023.

  16. arXiv:2305.16620  [pdf, other

    cs.RO cs.AI cs.LG eess.SY

    Pedestrian Trajectory Forecasting Using Deep Ensembles Under Sensing Uncertainty

    Authors: Anshul Nayak, Azim Eskandarian, Zachary Doerzaph, Prasenjit Ghorai

    Abstract: One of the fundamental challenges in the prediction of dynamic agents is robustness. Usually, most predictions are deterministic estimates of future states which are over-confident and prone to error. Recently, few works have addressed capturing uncertainty during forecasting of future states. However, these probabilistic estimation methods fail to account for the upstream noise in perception data… ▽ More

    Submitted 26 May, 2023; originally announced May 2023.

    Comments: 13 pages, 11 figures, 3 tables

  17. arXiv:2303.08213  [pdf, other

    cs.CY

    The Overview of Privacy Labels and their Compatibility with Privacy Policies

    Authors: Rishabh Khandelwal, Asmit Nayak, Paul Chung, Kassem Fawaz

    Abstract: Privacy nutrition labels provide a way to understand an app's key data practices without reading the long and hard-to-read privacy policies. Recently, the app distribution platforms for iOS(Apple) and Android(Google) have implemented mandates requiring app developers to fill privacy nutrition labels highlighting their privacy practices such as data collection, data sharing, and security practices.… ▽ More

    Submitted 24 April, 2023; v1 submitted 14 March, 2023; originally announced March 2023.

  18. arXiv:2302.06951  [pdf, other

    cs.CL

    Few-shot learning approaches for classifying low resource domain specific software requirements

    Authors: Anmol Nayak, Hari Prasad Timmapathini, Vidhya Murali, Atul Anil Gohad

    Abstract: With the advent of strong pre-trained natural language processing models like BERT, DeBERTa, MiniLM, T5, the data requirement for industries to fine-tune these models to their niche use cases has drastically reduced (typically to a few hundred annotated samples for achieving a reasonable performance). However, the availability of even a few hundred annotated samples may not always be guaranteed in… ▽ More

    Submitted 14 February, 2023; originally announced February 2023.

    Comments: 6 pages, 1 figure

  19. arXiv:2301.10987  [pdf, other

    cs.IT

    A Decentralized Policy for Minimization of Age of Incorrect Information in Slotted ALOHA Systems

    Authors: Anupam Nayak, Anders E. Kalør, Federico Chiariotti, Petar Popovski

    Abstract: The Age of Incorrect Information (AoII) is a metric that can combine the freshness of the information available to a gateway in an Internet of Things (IoT) network with the accuracy of that information. As such, minimizing the AoII can allow the operators of IoT systems to have a more precise and up-to-date picture of the environment in which the sensors are deployed. However, most IoT systems do… ▽ More

    Submitted 26 January, 2023; originally announced January 2023.

    Comments: Accepted to IEEE ICC 2023

  20. arXiv:2301.02227  [pdf, ps, other

    quant-ph cs.CC cs.IT cs.LG

    Optimal lower bounds for Quantum Learning via Information Theory

    Authors: Shima Bab Hadiashar, Ashwin Nayak, Pulkit Sinha

    Abstract: Although a concept class may be learnt more efficiently using quantum samples as compared with classical samples in certain scenarios, Arunachalam and de Wolf (JMLR, 2018) proved that quantum learners are asymptotically no more efficient than classical ones in the quantum PAC and Agnostic learning models. They established lower bounds on sample complexity via quantum state identification and Fouri… ▽ More

    Submitted 27 February, 2024; v1 submitted 5 January, 2023; originally announced January 2023.

    Comments: v3: 40 pages; Added references; edited extensively; simplified the proof of Theorem 3.2; results unchanged. A preliminary version of the results in Section 3 was included in the S.B.H.'s PhD thesis at University of Waterloo (Dec. 2020). An extended abstract of the results in Section 4 was included in the P.S.' bachelor's project report at Indian Institute of Science (Apr. 2022)

    ACM Class: F.2.2

    Journal ref: IEEE Transactions on Information Theory, vol. 70, no. 3, pp. 1876-1896, March 2024

  21. A Converse for Fault-tolerant Quantum Computation

    Authors: Uthirakalyani G, Anuj K. Nayak, Avhishek Chatterjee

    Abstract: As techniques for fault-tolerant quantum computation keep improving, it is natural to ask: what is the fundamental lower bound on redundancy? In this paper, we obtain a lower bound on the redundancy required for $ε$-accurate implementation of a large class of operations that includes unitary operators. For the practically relevant case of sub-exponential depth and sub-linear gate size, our bound o… ▽ More

    Submitted 9 August, 2023; v1 submitted 1 November, 2022; originally announced November 2022.

    Comments: Some changes were made, and results changed in the lower order term only (scaling factor added), Edited license

    Journal ref: Quantum 7, 1087 (2023)

  22. arXiv:2207.14438  [pdf, ps, other

    quant-ph cs.CC cs.IT cs.LG

    Lower bounds for learning quantum states with single-copy measurements

    Authors: Angus Lowe, Ashwin Nayak

    Abstract: We study the problems of quantum tomography and shadow tomography using measurements performed on individual, identical copies of an unknown $d$-dimensional state. We first revisit a known lower bound due to Haah et al. (2017) on quantum tomography with accuracy $ε$ in trace distance, when the measurements choices are independent of previously observed outcomes (i.e., they are nonadaptive). We giv… ▽ More

    Submitted 1 August, 2022; v1 submitted 28 July, 2022; originally announced July 2022.

    Comments: v2. 43 pages. Source files updated to correct PDF generation error. Added some details on prior work; results unchanged. v1. 43 pages. Most of the results in this article were included in the first author's Master's thesis at U. Waterloo (Oct. 2021) and were presented at QIP 2022 (Mar. 2022)

  23. arXiv:2207.10629  [pdf, other

    cs.RO

    A Solution to Adaptive Mobile Manipulator Throwing

    Authors: Yang Liu, Aradhana Nayak, Aude Billard

    Abstract: Mobile manipulator throwing is a promising method to increase the flexibility and efficiency of dynamic manipulation in factories. Its major challenge is to efficiently plan a feasible throw under a wide set of task specifications. We show that the mobile manipulator throwing problem can be simplified to a planar problem, hence greatly reducing the computational costs. Using machine learning appro… ▽ More

    Submitted 3 August, 2022; v1 submitted 21 July, 2022; originally announced July 2022.

    Comments: Accepted at IROS 2022. Code is available at: https://github.com/epfl-lasa/mobile-throwing

  24. arXiv:2207.09127  [pdf, ps, other

    cs.CR

    Smart Contract Assisted Blockchain based PKI System

    Authors: Amrutanshu Panigrahi, Ajit Kumar Nayak, Rourab Paul

    Abstract: The proposed smart contract can prevent seven cyber attacks, such as Denial of Service (DoS), Man in the Middle Attack (MITM), Distributed Denial of Service (DDoS), 51\%, Injection attacks, Routing Attack, and Eclipse attack. The Delegated Proof of Stake (DPoS) consensus algorithm used in this model reduces the number of validators for each transaction which makes it suitable for lightweight appli… ▽ More

    Submitted 19 July, 2022; originally announced July 2022.

    Comments: manuscript

  25. arXiv:2207.08714  [pdf, other

    cs.RO

    Learning High Dimensional Demonstrations Using Laplacian Eigenmaps

    Authors: Sthithpragya Gupta, Aradhana Nayak, Aude Billard

    Abstract: This article proposes a novel methodology to learn a stable robot control law driven by dynamical systems. The methodology requires a single demonstration and can deduce a stable dynamics in arbitrary high dimensions. The method relies on the idea that there exists a latent space in which the nonlinear dynamics appears quasi linear. The original nonlinear dynamics is mapped into a stable linear DS… ▽ More

    Submitted 18 July, 2022; originally announced July 2022.

  26. Uncertainty estimation of pedestrian future trajectory using Bayesian approximation

    Authors: Anshul Nayak, Azim Eskandarian, Zachary Doerzaph

    Abstract: Past research on pedestrian trajectory forecasting mainly focused on deterministic predictions which provide only point estimates of future states. These future estimates can help an autonomous vehicle plan its trajectory and avoid collision. However, under dynamic traffic scenarios, planning based on deterministic predictions is not trustworthy. Rather, estimating the uncertainty associated with… ▽ More

    Submitted 4 May, 2022; originally announced May 2022.

    Comments: 12 pages, 17 figures, 1 table

  27. Mutually Unbiased Measurements, Hadamard Matrices, and Superdense Coding

    Authors: Máté Farkas, Jędrzej Kaniewski, Ashwin Nayak

    Abstract: Mutually unbiased bases (MUBs) are highly symmetric bases on complex Hilbert spaces, and the corresponding rank-1 projective measurements are ubiquitous in quantum information theory. In this work, we study a recently introduced generalization of MUBs called mutually unbiased measurements (MUMs). These measurements inherit the essential property of complementarity from MUBs, but the Hilbert space… ▽ More

    Submitted 12 October, 2023; v1 submitted 25 April, 2022; originally announced April 2022.

    Comments: v2: Added some references and related discussion. v1: 20 pages. Comments welcome!

    Journal ref: IEEE Transactions on Information Theory, vol. 69, no. 6, pp. 3814--3824, June 2023

  28. arXiv:2204.04221  [pdf, other

    cs.CR

    CookieEnforcer: Automated Cookie Notice Analysis and Enforcement

    Authors: Rishabh Khandelwal, Asmit Nayak, Hamza Harkous, Kassem Fawaz

    Abstract: Online websites use cookie notices to elicit consent from the users, as required by recent privacy regulations like the GDPR and the CCPA. Prior work has shown that these notices use dark patterns to manipulate users into making website-friendly choices which put users' privacy at risk. In this work, we develop CookieEnforcer, a new system for automatically discovering cookie notices and deciding… ▽ More

    Submitted 14 April, 2022; v1 submitted 8 April, 2022; originally announced April 2022.

  29. X-CAR: An Experimental Vehicle Platform for Connected Autonomy Research Powered by CARMA

    Authors: Goodarz Mehr, Prasenjit Ghorai, Ce Zhang, Anshul Nayak, Darshit Patel, Shathushan Sivashangaran, Azim Eskandarian

    Abstract: Autonomous vehicles promise a future with a safer, cleaner, more efficient, and more reliable transportation system. However, the current approach to autonomy has focused on building small, disparate intelligences that are closed off to the rest of the world. Vehicle connectivity has been proposed as a solution, relying on a vision of the future where a mix of connected autonomous and human-driven… ▽ More

    Submitted 25 May, 2022; v1 submitted 5 April, 2022; originally announced April 2022.

    Comments: ©2022 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

  30. arXiv:2202.12205  [pdf, ps, other

    cs.AI cs.CL cs.LG

    Is Neuro-Symbolic AI Meeting its Promise in Natural Language Processing? A Structured Review

    Authors: Kyle Hamilton, Aparna Nayak, Bojan Božić, Luca Longo

    Abstract: Advocates for Neuro-Symbolic Artificial Intelligence (NeSy) assert that combining deep learning with symbolic reasoning will lead to stronger AI than either paradigm on its own. As successful as deep learning has been, it is generally accepted that even our best deep learning systems are not very good at abstract reasoning. And since reasoning is inextricably linked to language, it makes intuitive… ▽ More

    Submitted 30 June, 2022; v1 submitted 24 February, 2022; originally announced February 2022.

    Comments: Survey

    Journal ref: Semantic Web, vol. Pre-press, no. Pre-press, pp. 1-42, 2022

  31. arXiv:2112.00283  [pdf, other

    cs.CL

    Wiki to Automotive: Understanding the Distribution Shift and its impact on Named Entity Recognition

    Authors: Anmol Nayak, Hari Prasad Timmapathini

    Abstract: While transfer learning has become a ubiquitous technique used across Natural Language Processing (NLP) tasks, it is often unable to replicate the performance of pre-trained models on text of niche domains like Automotive. In this paper we aim to understand the main characteristics of the distribution shift with automotive domain text (describing technical functionalities such as Cruise Control) a… ▽ More

    Submitted 1 December, 2021; originally announced December 2021.

    Comments: 6 pages, 1 figure

  32. arXiv:2111.14535  [pdf, other

    cs.AR

    Enabling Reusable Physical Design Flows with Modular Flow Generators

    Authors: Alex Carsello, James Thomas, Ankita Nayak, Po-Han Chen, Mark Horowitz, Priyanka Raina, Christopher Torng

    Abstract: Achieving high code reuse in physical design flows is challenging but increasingly necessary to build complex systems. Unfortunately, existing approaches based on parameterized Tcl generators support very limited reuse and struggle to preserve reusable code as designers customize flows for specific designs and technologies. We present a vision and framework based on modular flow generators that en… ▽ More

    Submitted 29 November, 2021; originally announced November 2021.

  33. arXiv:2109.01655  [pdf, other

    cs.CV eess.IV math.NA

    Instabilities in Plug-and-Play (PnP) algorithms from a learned denoiser

    Authors: Abinash Nayak

    Abstract: It's well-known that inverse problems are ill-posed and to solve them meaningfully, one has to employ regularization methods. Traditionally, popular regularization methods are the penalized Variational approaches. In recent years, the classical regularization approaches have been outclassed by the so-called plug-and-play (PnP) algorithms, which copy the proximal gradient minimization processes, su… ▽ More

    Submitted 17 August, 2021; originally announced September 2021.

    Comments: arXiv admin note: text overlap with arXiv:2106.07795

    MSC Class: Primary 65K05; 65K10; Secondary 65R30; 65R32

  34. arXiv:2108.13551  [pdf, other

    cs.LG eess.IV

    Regularizing Instabilities in Image Reconstruction Arising from Learned Denoisers

    Authors: Abinash Nayak

    Abstract: It's well-known that inverse problems are ill-posed and to solve them meaningfully one has to employ regularization methods. Traditionally, popular regularization methods have been the penalized Variational approaches. In recent years, the classical regularized-reconstruction approaches have been outclassed by the (deep-learning-based) learned reconstruction algorithms. However, unlike the traditi… ▽ More

    Submitted 15 February, 2022; v1 submitted 21 August, 2021; originally announced August 2021.

    MSC Class: Primary 65K05; 65K10; Secondary 65R30; 65R32

  35. arXiv:2108.11860  [pdf, ps, other

    cs.RO

    Auxiliary Heuristics for Frontier Based Planners

    Authors: Arsh Tangri, Dhruv Joshi, Ashalatha Nayak

    Abstract: Autonomous exploration of unknown environments is a vital function for robots and has applications in a wide variety of scenarios. Our focus primarily lies in its application for the task of efficient coverage of unknown environments. Various methods have been proposed for this task and frontier based methods are an efficient category in this class of methods. Efficiency is of utmost importance in… ▽ More

    Submitted 26 August, 2021; originally announced August 2021.

  36. arXiv:2107.14036  [pdf, ps, other

    cs.CY

    Self-Driving Cars and Driver Alertness

    Authors: Nguyen H Tran, Abhaya C Nayak

    Abstract: Recent years have seen growing interest in the development of self-driving vehicles that promise (or threaten) to replace human drivers with intelligent software. However, current self-driving cars still require human supervision and prompt takeover of control when necessary. Poor alertness while controlling self-driving cars could hinder the drivers' ability to intervene during unpredictable situ… ▽ More

    Submitted 20 July, 2021; originally announced July 2021.

    Comments: 12 pages. Planned to be submitted to the 34th Australasian Joint Conference on Artificial Intelligence (AJCAI) 2021

  37. arXiv:2107.04140  [pdf, other

    cs.AR

    First-Generation Inference Accelerator Deployment at Facebook

    Authors: Michael Anderson, Benny Chen, Stephen Chen, Summer Deng, Jordan Fix, Michael Gschwind, Aravind Kalaiah, Changkyu Kim, Jaewon Lee, Jason Liang, Haixin Liu, Yinghai Lu, Jack Montgomery, Arun Moorthy, Satish Nadathur, Sam Naghshineh, Avinash Nayak, Jongsoo Park, Chris Petersen, Martin Schatz, Narayanan Sundaram, Bangsheng Tang, Peter Tang, Amy Yang, Jiecao Yu , et al. (90 additional authors not shown)

    Abstract: In this paper, we provide a deep dive into the deployment of inference accelerators at Facebook. Many of our ML workloads have unique characteristics, such as sparse memory accesses, large model sizes, as well as high compute, memory and network bandwidth requirements. We co-designed a high-performance, energy-efficient inference accelerator platform based on these requirements. We describe the in… ▽ More

    Submitted 4 August, 2021; v1 submitted 8 July, 2021; originally announced July 2021.

  38. arXiv:2106.07349  [pdf, other

    cs.CL

    Using Integrated Gradients and Constituency Parse Trees to explain Linguistic Acceptability learnt by BERT

    Authors: Anmol Nayak, Hari Prasad Timmapathini

    Abstract: Linguistic Acceptability is the task of determining whether a sentence is grammatical or ungrammatical. It has applications in several use cases like Question-Answering, Natural Language Generation, Neural Machine Translation, where grammatical correctness is crucial. In this paper we aim to understand the decision-making process of BERT (Devlin et al., 2019) in distinguishing between Linguistical… ▽ More

    Submitted 8 March, 2022; v1 submitted 1 June, 2021; originally announced June 2021.

    Comments: Accepted at International Conference on Natural Language Processing (ICON) 2021. 6 pages, 3 figures

  39. arXiv:2104.14436  [pdf, ps, other

    cs.DS cs.CC math.GR quant-ph

    Deterministic Algorithms for the Hidden Subgroup Problem

    Authors: Ashwin Nayak

    Abstract: We present deterministic algorithms for the Hidden Subgroup Problem. The first algorithm, for abelian groups, achieves the same asymptotic worst-case query complexity as the optimal randomized algorithm, namely O($\sqrt{ n}\,$), where $n$ is the order of the group. The analogous algorithm for non-abelian groups comes within a $\sqrt{ \log n}$ factor of the optimal randomized query complexity. The… ▽ More

    Submitted 10 June, 2022; v1 submitted 29 April, 2021; originally announced April 2021.

    Comments: v3: 14 pages. Added some details. Minor edits for clarity. Close to published version. v2: 14 pages. Added references to past and recent related work, added new algorithms partially resolving an open question from the previous version. v1: 7 pages

    MSC Class: 68Q25; 68Q12 (Primary) 20D99 (Secondary) ACM Class: F.2.2

    Journal ref: Quantum Information and Computation, Vol. 22, No. 9&10 (2022), pp. 755--769

  40. One-shot quantum state redistribution and quantum Markov chains

    Authors: Anurag Anshu, Shima Bab Hadiashar, Rahul Jain, Ashwin Nayak, Dave Touchette

    Abstract: We revisit the task of quantum state redistribution in the one-shot setting, and design a protocol for this task with communication cost in terms of a measure of distance from quantum Markov chains. More precisely, the distance is defined in terms of quantum max-relative entropy and quantum hypothesis testing entropy. Our result is the first to operationally connect quantum state redistribution… ▽ More

    Submitted 12 October, 2023; v1 submitted 18 April, 2021; originally announced April 2021.

    Comments: v2: Exposition improved, references added, typos corrected. 32 pages, 2 figures. v1: 26 pages, 2 figures

    Journal ref: IEEE Transactions on Information Theory, vol. 69, no. 9, pp. 5788--5804, Sept. 2023

  41. arXiv:2104.05158  [pdf, other

    cs.DC cs.AI cs.LG cs.PF

    Software-Hardware Co-design for Fast and Scalable Training of Deep Learning Recommendation Models

    Authors: Dheevatsa Mudigere, Yuchen Hao, Jianyu Huang, Zhihao Jia, Andrew Tulloch, Srinivas Sridharan, Xing Liu, Mustafa Ozdal, Jade Nie, Jongsoo Park, Liang Luo, Jie Amy Yang, Leon Gao, Dmytro Ivchenko, Aarti Basant, Yuxi Hu, Jiyan Yang, Ehsan K. Ardestani, Xiaodong Wang, Rakesh Komuravelli, Ching-Hsiang Chu, Serhat Yilmaz, Huayu Li, Jiyuan Qian, Zhuobo Feng , et al. (28 additional authors not shown)

    Abstract: Deep learning recommendation models (DLRMs) are used across many business-critical services at Facebook and are the single largest AI application in terms of infrastructure demand in its data-centers. In this paper we discuss the SW/HW co-designed solution for high-performance distributed training of large-scale DLRMs. We introduce a high-performance scalable software stack based on PyTorch and pa… ▽ More

    Submitted 26 February, 2023; v1 submitted 11 April, 2021; originally announced April 2021.

  42. arXiv:2011.10036  [pdf, other

    cs.LG cs.NE

    On the Dynamics of Training Attention Models

    Authors: Haoye Lu, Yongyi Mao, Amiya Nayak

    Abstract: The attention mechanism has been widely used in deep neural networks as a model component. By now, it has become a critical building block in many state-of-the-art natural language models. Despite its great success established empirically, the working mechanism of attention has not been investigated at a sufficient theoretical depth to date. In this paper, we set up a simple text classification ta… ▽ More

    Submitted 18 March, 2021; v1 submitted 19 November, 2020; originally announced November 2020.

  43. arXiv:2006.09815  [pdf, other

    eess.AS cs.LG cs.SD stat.ML

    A Deep Neural Network for Audio Classification with a Classifier Attention Mechanism

    Authors: Haoye Lu, Haolong Zhang, Amit Nayak

    Abstract: Audio classification is considered as a challenging problem in pattern recognition. Recently, many algorithms have been proposed using deep neural networks. In this paper, we introduce a new attention-based neural network architecture called Classifier-Attention-Based Convolutional Neural Network (CAB-CNN). The algorithm uses a newly designed architecture consisting of a list of simple classifiers… ▽ More

    Submitted 14 June, 2020; originally announced June 2020.

  44. arXiv:2002.11795  [pdf, other

    quant-ph cs.CC cs.DC

    Quantum Distributed Complexity of Set Disjointness on a Line

    Authors: Frederic Magniez, Ashwin Nayak

    Abstract: Set Disjointness on a Line is a variant of the Set Disjointness problem in a distributed computing scenario with $d+1$ processors arranged on a path of length $d$. It was introduced by Le Gall and Magniez (PODC 2018) for proving lower bounds on the quantum distributed complexity of computing the diameter of an arbitrary network in the CONGEST model. However, they were only able to provide a lower… ▽ More

    Submitted 8 March, 2022; v1 submitted 26 February, 2020; originally announced February 2020.

    Comments: 24 pages, 2 figures. In v3, background on Theorem 3.5 (from prior work) was included in an appendix. In v4, a detail in the statement of Theorem 3.5 has been corrected, and corresponding changes have been made in the rest of the paper. The results remain unchanged. In v5, extended main theorems to the entanglement-assisted setting, added explanations and clarifications, corrected typos

    Journal ref: ACM Transactions on Computation Theory, Volume 14, Issue 1, March 2022, Article No.: 5, pp 1-22

  45. arXiv:2001.02818  [pdf, other

    quant-ph cs.CC cs.DS cs.IT

    Capacity Approaching Coding for Low Noise Interactive Quantum Communication, Part I: Large Alphabets

    Authors: Debbie Leung, Ashwin Nayak, Ala Shayeghi, Dave Touchette, Penghui Yao, Nengkun Yu

    Abstract: We consider the problem of implementing two-party interactive quantum communication over noisy channels, a necessary endeavor if we wish to fully reap quantum advantages for communication. For an arbitrary protocol with $n$ messages, designed for a noiseless qudit channel over a $\mathrm{poly}(n)$ size alphabet, our main result is a simulation method that fails with probability less than… ▽ More

    Submitted 8 January, 2020; originally announced January 2020.

    Comments: 94 pages, 7 figures

  46. arXiv:1907.01692  [pdf, other

    cs.RO

    An Approximation Algorithm for a Task Allocation, Sequencing and Scheduling Problem involving a Human-Robot Team

    Authors: Sai Krishna Hari, Abhishek Nayak, Sivakumar Rathinam

    Abstract: This article presents an approximation algorithm for a task allocation, sequencing and scheduling problem involving a team of human operators and robots. Specifically, we present an algorithm with an approximation ratio as a function of the number of human operators ($m$) and the number of robots ($k$) in the team. The approximation ratios are $\frac{7}{2} -\frac{5}{2k}$,… ▽ More

    Submitted 11 September, 2019; v1 submitted 2 July, 2019; originally announced July 2019.

  47. arXiv:1907.01682  [pdf, ps, other

    cs.AI

    On Conforming and Conflicting Values

    Authors: Kinzang Chhogyal, Abhaya Nayak, Aditya Ghose, Mehmet Orgun, Hoa Dam

    Abstract: Values are things that are important to us. Actions activate values - they either go against our values or they promote our values. Values themselves can either be conforming or conflicting depending on the action that is taken. In this short paper, we argue that values may be classified as one of two types - conflicting and inherently conflicting values. They are distinguished by the fact that th… ▽ More

    Submitted 7 July, 2019; v1 submitted 2 July, 2019; originally announced July 2019.

    Comments: AI for Social Good Workshop, IJCAI 2019

  48. arXiv:1905.13380  [pdf, ps, other

    cs.AI cs.MA

    A Value-based Trust Assessment Model for Multi-agent Systems

    Authors: Kinzang Chhogyal, Abhaya Nayak, Aditya Ghose, Hoa Khanh Dam

    Abstract: An agent's assessment of its trust in another agent is commonly taken to be a measure of the reliability/predictability of the latter's actions. It is based on the trustor's past observations of the behaviour of the trustee and requires no knowledge of the inner-workings of the trustee. However, in situations that are new or unfamiliar, past observations are of little help in assessing trust. In s… ▽ More

    Submitted 30 May, 2019; originally announced May 2019.

  49. arXiv:1905.02110  [pdf, other

    quant-ph cs.CC cs.IT

    On the Entanglement Cost of One-Shot Compression

    Authors: Shima Bab Hadiashar, Ashwin Nayak

    Abstract: We revisit the task of visible compression of an ensemble of quantum states with entanglement assistance in the one-shot setting. The protocols achieving the best compression use many more qubits of shared entanglement than the number of qubits in the states in the ensemble. Other compression protocols, with potentially larger communication cost, have entanglement cost bounded by the number of qub… ▽ More

    Submitted 2 July, 2020; v1 submitted 6 May, 2019; originally announced May 2019.

    Comments: 23 pages, 1 figure. The paper is the same as v3; only metadata are updated. In v3: Main body reorganized; Thm 1.1 rephrased; a discussion of the entanglement measure added to Sec. 4; several improvements to the text throughout; Cor. 3.5 and Cor. 3.6 merged; Appendix created for the proofs of Cor. 3.5 and another statement in the main body; typos fixed; three references added

    Journal ref: Quantum 4, 286 (2020)

  50. arXiv:1901.00209  [pdf, other

    cs.SI physics.soc-ph

    Smart Information Spreading for Opinion Maximization in Social Networks

    Authors: Anuj Nayak, Seyyedali Hosseinalipour, Huaiyu Dai

    Abstract: The goal of opinion maximization is to maximize the positive view towards a product, an ideology or any entity among the individuals in social networks. So far, opinion maximization is mainly studied as finding a set of influential nodes for fast content dissemination in a social network. In this paper, we propose a novel approach to solve the problem, where opinion maximization is achieved throug… ▽ More

    Submitted 1 January, 2019; originally announced January 2019.

    Comments: 13 pages, 11 figures, INFOCOM extended version