Skip to main content

Showing 1–50 of 140 results for author: Krishnan, S

  1. arXiv:2407.13103  [pdf

    cs.CY

    Participatory Approaches in AI Development and Governance: Case Studies

    Authors: Ambreesh Parthasarathy, Aditya Phalnikar, Gokul S Krishnan, Ameen Jauhar, Balaraman Ravindran

    Abstract: This paper forms the second of a two-part series on the value of a participatory approach to AI development and deployment. The first paper had crafted a principled, as well as pragmatic, justification for deploying participatory methods in these two exercises (that is, development and deployment of AI). The pragmatic justification is that it improves the quality of the overall algorithm by provid… ▽ More

    Submitted 3 June, 2024; originally announced July 2024.

  2. arXiv:2407.13100  [pdf

    cs.CY

    Participatory Approaches in AI Development and Governance: A Principled Approach

    Authors: Ambreesh Parthasarathy, Aditya Phalnikar, Ameen Jauhar, Dhruv Somayajula, Gokul S Krishnan, Balaraman Ravindran

    Abstract: The widespread adoption of Artificial Intelligence (AI) technologies in the public and private sectors has resulted in them significantly impacting the lives of people in new and unexpected ways. In this context, it becomes important to inquire how their design, development and deployment takes place. Upon this inquiry, it is seen that persons who will be impacted by the deployment of these system… ▽ More

    Submitted 3 June, 2024; originally announced July 2024.

  3. arXiv:2407.09141  [pdf, other

    cs.LG

    Accuracy is Not All You Need

    Authors: Abhinav Dutta, Sanjeev Krishnan, Nipun Kwatra, Ramachandran Ramjee

    Abstract: When Large Language Models (LLMs) are compressed using techniques such as quantization, the predominant way to demonstrate the validity of such techniques is by measuring the model's accuracy on various benchmarks.If the accuracies of the baseline model and the compressed model are close, it is assumed that there was negligible degradation in quality.However, even when the accuracy of baseline and… ▽ More

    Submitted 12 July, 2024; originally announced July 2024.

  4. arXiv:2407.07858  [pdf, other

    cs.LG cs.CL

    FACTS About Building Retrieval Augmented Generation-based Chatbots

    Authors: Rama Akkiraju, Anbang Xu, Deepak Bora, Tan Yu, Lu An, Vishal Seth, Aaditya Shukla, Pritam Gundecha, Hridhay Mehta, Ashwin Jha, Prithvi Raj, Abhinav Balasubramanian, Murali Maram, Guru Muthusamy, Shivakesh Reddy Annepally, Sidney Knowles, Min Du, Nick Burnett, Sean Javiya, Ashok Marannan, Mamta Kumari, Surbhi Jha, Ethan Dereszenski, Anupam Chakraborty, Subhash Ranjan , et al. (13 additional authors not shown)

    Abstract: Enterprise chatbots, powered by generative AI, are emerging as key applications to enhance employee productivity. Retrieval Augmented Generation (RAG), Large Language Models (LLMs), and orchestration frameworks like Langchain and Llamaindex are crucial for building these chatbots. However, creating effective enterprise chatbots is challenging and requires meticulous RAG pipeline engineering. This… ▽ More

    Submitted 10 July, 2024; originally announced July 2024.

    Comments: 8 pages, 6 figures, 2 tables, Preprint submission to ACM CIKM 2024

  5. arXiv:2405.17845  [pdf, other

    cs.HC

    A System for Quantifying Data Science Workflows with Fine-Grained Procedural Logging and a Pilot Study

    Authors: Jinjin Zhao, Avidgor Gal, Sanjay Krishnan

    Abstract: It is important for researchers to understand precisely how data scientists turn raw data into insights, including typical programming patterns, workflow, and methodology. This paper contributes a novel system, called DataInquirer, that tracks incremental code executions in Jupyter notebooks (a type of computational notebook). The system allows us to quantitatively measure timing, workflow, and op… ▽ More

    Submitted 28 May, 2024; originally announced May 2024.

  6. arXiv:2405.17701  [pdf, other

    cs.DB

    Compression and In-Situ Query Processing for Fine-Grained Array Lineage

    Authors: Jinjin Zhao, Sanjay Krishnan

    Abstract: Tracking data lineage is important for data integrity, reproducibility, and debugging data science workflows. However, fine-grained lineage (i.e., at a cell level) is challenging to store, even for the smallest datasets. This paper introduces DSLog, a storage system that efficiently stores, indexes, and queries array data lineage, agnostic to capture methodology. A main contribution is our new com… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  7. arXiv:2405.17690  [pdf, other

    cs.HC

    Data Makes Better Data Scientists

    Authors: Jinjin Zhao, Avidgor Gal, Sanjay Krishnan

    Abstract: With the goal of identifying common practices in data science projects, this paper proposes a framework for logging and understanding incremental code executions in Jupyter notebooks. This framework aims to allow reasoning about how insights are generated in data science and extract key observations into best data science practices in the wild. In this paper, we show an early prototype of this fra… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  8. arXiv:2405.17686  [pdf, other

    cs.CV

    Towards Causal Physical Error Discovery in Video Analytics Systems

    Authors: Jinjin Zhao, Ted Shaowang, Stavos Sintos, Sanjay Krishnan

    Abstract: Video analytics systems based on deep learning models are often opaque and brittle and require explanation systems to help users debug. Current model explanation system are very good at giving literal explanations of behavior in terms of pixel contributions but cannot integrate information about the physical or systems processes that might influence a prediction. This paper introduces the idea tha… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  9. arXiv:2405.15893  [pdf, other

    cs.SI

    Quantifying Influencer Effects on Affective Polarization

    Authors: Rezaur Rashid, Joshua Melton, Ouldouz Ghorbani, Siddharth Krishnan, Shannon Reid, Gabriel Terejanu

    Abstract: In an era where digital platforms increasingly mediate public discourse, grasping the complexities and nuances in affective polarization--especially as influenced by key figures on social media--has never been more vital. This study delves into the intricate web of interactions on Twitter, now rebranded as 'X', to unravel how influencer-led conversations catalyze shifts in public sentiment, laying… ▽ More

    Submitted 24 May, 2024; originally announced May 2024.

    Comments: 8 pages, 4 figures

  10. arXiv:2405.07870  [pdf

    cs.SE

    Mapping the Invisible: A Framework for Tracking COVID-19 Spread Among College Students with Google Location Data

    Authors: Prajindra Sankar Krishnan, Chai Phing Chen, Gamal Alkawsi, Sieh Kiong Tiong, Luiz Fernando Capretz

    Abstract: The COVID-19 pandemic and the implementation of social distancing policies have rapidly changed people's visiting patterns, as reflected in mobility data that tracks mobility traffic using location trackers on cell phones. However, the frequency and duration of concurrent occupancy at specific locations govern the transmission rather than the number of customers visiting. Therefore, understanding… ▽ More

    Submitted 13 May, 2024; originally announced May 2024.

    Comments: 8 pages

    Journal ref: Latin American Workshop on Data Fusion (LAFUSION 2023), November/2023, pp 1-8, Rio de Janeiro, Brazil

  11. Towards Building Autonomous Data Services on Azure

    Authors: Yiwen Zhu, Yuanyuan Tian, Joyce Cahoon, Subru Krishnan, Ankita Agarwal, Rana Alotaibi, Jesús Camacho-Rodríguez, Bibin Chundatt, Andrew Chung, Niharika Dutta, Andrew Fogarty, Anja Gruenheid, Brandon Haynes, Matteo Interlandi, Minu Iyer, Nick Jurgens, Sumeet Khushalani, Brian Kroth, Manoj Kumar, Jyoti Leeka, Sergiy Matusevych, Minni Mittal, Andreas Mueller, Kartheek Muthyala, Harsha Nagulapalli , et al. (13 additional authors not shown)

    Abstract: Modern cloud has turned data services into easily accessible commodities. With just a few clicks, users are now able to access a catalog of data processing systems for a wide range of tasks. However, the cloud brings in both complexity and opportunity. While cloud users can quickly start an application by using various data services, it can be difficult to configure and optimize these services to… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: SIGMOD Companion of the 2023 International Conference on Management of Data. 2023

  12. arXiv:2404.10228  [pdf, other

    cs.LG cs.CL cs.SI

    Two-Stage Stance Labeling: User-Hashtag Heuristics with Graph Neural Networks

    Authors: Joshua Melton, Shannon Reid, Gabriel Terejanu, Siddharth Krishnan

    Abstract: The high volume and rapid evolution of content on social media present major challenges for studying the stance of social media users. In this work, we develop a two stage stance labeling method that utilizes the user-hashtag bipartite graph and the user-user interaction graph. In the first stage, a simple and efficient heuristic for stance labeling uses the user-hashtag bipartite graph to iterati… ▽ More

    Submitted 17 May, 2024; v1 submitted 15 April, 2024; originally announced April 2024.

  13. arXiv:2403.20329  [pdf, other

    cs.CL cs.AI cs.LG

    ReALM: Reference Resolution As Language Modeling

    Authors: Joel Ruben Antony Moniz, Soundarya Krishnan, Melis Ozyildirim, Prathamesh Saraf, Halim Cagri Ates, Yuan Zhang, Hong Yu, Nidhi Rajshree

    Abstract: Reference resolution is an important problem, one that is essential to understand and successfully handle context of different kinds. This context includes both previous turns and context that pertains to non-conversational entities, such as entities on the user's screen or those running in the background. While LLMs have been shown to be extremely powerful for a variety of tasks, their use in ref… ▽ More

    Submitted 29 March, 2024; originally announced March 2024.

  14. arXiv:2402.18707  [pdf, other

    cs.HC cs.RO

    Embodied Supervision: Haptic Display of Automation Command to Improve Supervisory Performance

    Authors: Alia Gilbert, Sachit Krishnan, R. Brent Gillespie

    Abstract: A human operator using a manual control interface has ready access to their own command signal, both by efference copy and proprioception. In contrast, a human supervisor typically relies on visual information alone. We propose supplying a supervisor with a copy of the operators command signal, hypothesizing improved performance, especially when that copy is provided through haptic display. We exp… ▽ More

    Submitted 28 February, 2024; originally announced February 2024.

    Comments: IEEE Haptics Symposium 2024

  15. arXiv:2402.10567  [pdf, other

    cs.CL cs.AI

    InSaAF: Incorporating Safety through Accuracy and Fairness | Are LLMs ready for the Indian Legal Domain?

    Authors: Yogesh Tripathi, Raghav Donakanti, Sahil Girhepuje, Ishan Kavathekar, Bhaskara Hanuma Vedula, Gokul S Krishnan, Shreya Goyal, Anmol Goel, Balaraman Ravindran, Ponnurangam Kumaraguru

    Abstract: Recent advancements in language technology and Artificial Intelligence have resulted in numerous Language Models being proposed to perform various tasks in the legal domain ranging from predicting judgments to generating summaries. Despite their immense potential, these models have been proven to learn and exhibit societal biases and make unfair predictions. In this study, we explore the ability o… ▽ More

    Submitted 17 June, 2024; v1 submitted 16 February, 2024; originally announced February 2024.

  16. arXiv:2402.09426  [pdf, other

    eess.SP cs.LG eess.SY

    Graph Koopman Autoencoder for Predictive Covert Communication Against UAV Surveillance

    Authors: Sivaram Krishnan, Jihong Park, Gregory Sherman, Benjamin Campbell, Jinho Choi

    Abstract: Low Probability of Detection (LPD) communication aims to obscure the very presence of radio frequency (RF) signals, going beyond just hiding the content of the communication. However, the use of Unmanned Aerial Vehicles (UAVs) introduces a challenge, as UAVs can detect RF signals from the ground by hovering over specific areas of interest. With the growing utilization of UAVs in modern surveillanc… ▽ More

    Submitted 23 January, 2024; originally announced February 2024.

  17. arXiv:2402.07332  [pdf, other

    cs.DB cs.CR

    Intent-Based Access Control: Using LLMs to Intelligently Manage Access Control

    Authors: Pranav Subramaniam, Sanjay Krishnan

    Abstract: In every enterprise database, administrators must define an access control policy that specifies which users have access to which assets. Access control straddles two worlds: policy (organization-level principles that define who should have access) and process (database-level primitives that actually implement the policy). Assessing and enforcing process compliance with a policy is a manual and ad… ▽ More

    Submitted 11 February, 2024; originally announced February 2024.

    Comments: 13 pages, 21 figures, 1 table

  18. arXiv:2402.06869  [pdf

    cs.CR

    Digital Footprints of Streaming Devices

    Authors: Sundar Krishnan, William Bradley Glisson

    Abstract: These days, there are many ways to watch streaming videos on television. When compared to a standalone smart television, streaming devices such as Roku and Amazon Fire Stick have a plethora of app selections. While these devices are platform agnostic and compatible with smartphones, they can still leave behind crumbs of sensitive data that can cause privacy, security, and forensic issues. In this… ▽ More

    Submitted 9 February, 2024; originally announced February 2024.

  19. arXiv:2402.03694  [pdf, other

    cs.NI cs.AI

    ServeFlow: A Fast-Slow Model Architecture for Network Traffic Analysis

    Authors: Shinan Liu, Ted Shaowang, Gerry Wan, Jeewon Chae, Jonatas Marques, Sanjay Krishnan, Nick Feamster

    Abstract: Network traffic analysis increasingly uses complex machine learning models as the internet consolidates and traffic gets more encrypted. However, over high-bandwidth networks, flows can easily arrive faster than model inference rates. The temporal nature of network flows limits simple scale-out approaches leveraged in other high-traffic machine learning applications. Accordingly, this paper presen… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

  20. arXiv:2312.15959  [pdf, other

    cs.DS cs.DB

    Range Entropy Queries and Partitioning

    Authors: Sanjay Krishnan, Stavros Sintos

    Abstract: Data partitioning that maximizes or minimizes Shannon entropy is a crucial subroutine in data compression, columnar storage, and cardinality estimation algorithms. These partition algorithms can be accelerated if we have a data structure to find the entropy in different subsets of data when the algorithm needs to decide what block to construct. While it is generally known how to compute the entrop… ▽ More

    Submitted 26 December, 2023; originally announced December 2023.

    Journal ref: ICDT 2024

  21. arXiv:2312.03756  [pdf, other

    cs.CL cs.AI cs.HC cs.LG

    LineConGraphs: Line Conversation Graphs for Effective Emotion Recognition using Graph Neural Networks

    Authors: Gokul S Krishnan, Sarala Padi, Craig S. Greenberg, Balaraman Ravindran, Dinesh Manoch, Ram D. Sriram

    Abstract: Emotion Recognition in Conversations (ERC) is a critical aspect of affective computing, and it has many practical applications in healthcare, education, chatbots, and social media platforms. Earlier approaches for ERC analysis involved modeling both speaker and long-term contextual information using graph neural network architectures. However, it is ideal to deploy speaker-independent models for r… ▽ More

    Submitted 4 December, 2023; originally announced December 2023.

    Comments: 13 pages, 6 figures

  22. arXiv:2311.07894  [pdf

    cs.CR

    Security in Drones

    Authors: Jonathan Morgan, Julio Perez, Jordan Wade, Sundar Krishnan

    Abstract: Drones are used in our everyday world for private, commercial, and government uses. It is important to establish both the cyber threats drone users face and security practices to combat those threats. Privacy will always be the main concern when using drones. Protecting information legally collected on drones and protecting people from the illegal collection of their data are topics that security… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

  23. arXiv:2311.07887  [pdf

    cs.CR cs.HC

    Challenges of Securing Massively Multiplayer Online Games

    Authors: Kolten Sinclair, Steven Womack, Jacob Elliott, Benjamin Stafford, Sundar Krishnan

    Abstract: When it comes to security in the modern world, things have improved a lot since the early 2000s. Hypertext Transfer Protocol Secure (HTTPS) and Transport Layer Security (TLS) have made the transfer of our data across the internet much safer than years prior, and the advent of VPNs and private browsing have only compounded that. However, the gaming industry has been notoriously behind the curve whe… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

  24. MFAAN: Unveiling Audio Deepfakes with a Multi-Feature Authenticity Network

    Authors: Karthik Sivarama Krishnan, Koushik Sivarama Krishnan

    Abstract: In the contemporary digital age, the proliferation of deepfakes presents a formidable challenge to the sanctity of information dissemination. Audio deepfakes, in particular, can be deceptively realistic, posing significant risks in misinformation campaigns. To address this threat, we introduce the Multi-Feature Audio Authenticity Network (MFAAN), an advanced architecture tailored for the detection… ▽ More

    Submitted 6 November, 2023; originally announced November 2023.

  25. arXiv:2310.15518  [pdf

    cs.CR

    Non-Fungible Token Security

    Authors: Ryleigh McKinney, Sundar Krishnan

    Abstract: Non-fungible tokens (NFTs) are unique digital assets stored on the blockchain and is used to certify ownership and authenticity of the digital asset. NFTs were first created in 2014 while their popularity peaked between 2021 and 2022. In this paper, the authors dive into the world of Non-Fungible Tokens (NFTs), their history, the Future of NFTs, as well as the security concerns.

    Submitted 24 October, 2023; originally announced October 2023.

  26. arXiv:2310.10768  [pdf

    cs.CR

    Security in Cryptocurrency

    Authors: Chelsea Medina, Lily Shaw, Dissy Vargas, Sundar Krishnan

    Abstract: This paper discusses the mechanisms of cryptocurrency, the idea of using security in the system, and the popularity of it. To begin, the authors provide a background on cryptocurrency and how it works. The authors understand that while most people may be familiar with the concept, they may not know how it works. Next, the authors discuss the security of cryptocurrency in-depth within the paper. Th… ▽ More

    Submitted 16 October, 2023; originally announced October 2023.

  27. arXiv:2310.09501  [pdf, other

    cs.CL

    DepNeCTI: Dependency-based Nested Compound Type Identification for Sanskrit

    Authors: Jivnesh Sandhan, Yaswanth Narsupalli, Sreevatsa Muppirala, Sriram Krishnan, Pavankumar Satuluri, Amba Kulkarni, Pawan Goyal

    Abstract: Multi-component compounding is a prevalent phenomenon in Sanskrit, and understanding the implicit structure of a compound's components is crucial for deciphering its meaning. Earlier approaches in Sanskrit have focused on binary compounds and neglected the multi-component compound setting. This work introduces the novel task of nested compound type identification (NeCTI), which aims to identify ne… ▽ More

    Submitted 14 October, 2023; originally announced October 2023.

    Comments: 9 Pages, Camera-ready version accepted at EMNLP23 (Findings)

  28. arXiv:2309.05178  [pdf, other

    cs.DB

    Quantifying Uncertainty in Aggregate Queries over Integrated Datasets

    Authors: Deniz Turkcapar, Sanjay Krishnan

    Abstract: Data integration is a notoriously difficult and heuristic-driven process, especially when ground-truth data are not readily available. This paper presents a measure of uncertainty by providing maximal and minimal ranges of a query outcome in two-table, one-to-many data integration workflows. Users can use these query results to guide a search through different matching parameters, similarity metri… ▽ More

    Submitted 10 September, 2023; originally announced September 2023.

  29. arXiv:2306.08888  [pdf, other

    cs.AR cs.LG

    ArchGym: An Open-Source Gymnasium for Machine Learning Assisted Architecture Design

    Authors: Srivatsan Krishnan, Amir Yazdanbaksh, Shvetank Prakash, Jason Jabbour, Ikechukwu Uchendu, Susobhan Ghosh, Behzad Boroujerdian, Daniel Richins, Devashree Tripathy, Aleksandra Faust, Vijay Janapa Reddi

    Abstract: Machine learning is a prevalent approach to tame the complexity of design space exploration for domain-specific architectures. Using ML for design space exploration poses challenges. First, it's not straightforward to identify the suitable algorithm from an increasing pool of ML methods. Second, assessing the trade-offs between performance and sample efficiency across these methods is inconclusive… ▽ More

    Submitted 15 June, 2023; originally announced June 2023.

    Comments: International Symposium on Computer Architecture (ISCA 2023)

  30. arXiv:2306.07179  [pdf, other

    cs.LG stat.ML

    Benchmarking Neural Network Training Algorithms

    Authors: George E. Dahl, Frank Schneider, Zachary Nado, Naman Agarwal, Chandramouli Shama Sastry, Philipp Hennig, Sourabh Medapati, Runa Eschenhagen, Priya Kasimbeg, Daniel Suo, Juhan Bae, Justin Gilmer, Abel L. Peirson, Bilal Khan, Rohan Anil, Mike Rabbat, Shankar Krishnan, Daniel Snider, Ehsan Amid, Kongtao Chen, Chris J. Maddison, Rakshith Vasudev, Michal Badura, Ankush Garg, Peter Mattson

    Abstract: Training algorithms, broadly construed, are an essential part of every deep learning pipeline. Training algorithm improvements that speed up training across a wide variety of workloads (e.g., better update rules, tuning protocols, learning rate schedules, or data selection schemes) could save time, save computational resources, and lead to better, more accurate, models. Unfortunately, as a communi… ▽ More

    Submitted 12 June, 2023; originally announced June 2023.

    Comments: 102 pages, 8 figures, 41 tables

  31. arXiv:2306.01355  [pdf, other

    cs.AI cs.NI

    Energy-Efficient UAV-Assisted IoT Data Collection via TSP-Based Solution Space Reduction

    Authors: Sivaram Krishnan, Mahyar Nemati, Seng W. Loke, Jihong Park, Jinho Choi

    Abstract: This paper presents a wireless data collection framework that employs an unmanned aerial vehicle (UAV) to efficiently gather data from distributed IoT sensors deployed in a large area. Our approach takes into account the non-zero communication ranges of the sensors to optimize the flight path of the UAV, resulting in a variation of the Traveling Salesman Problem (TSP). We prove mathematically that… ▽ More

    Submitted 2 June, 2023; originally announced June 2023.

  32. arXiv:2306.01268  [pdf, other

    cs.CV cs.DL cs.IR

    DeepScribe: Localization and Classification of Elamite Cuneiform Signs Via Deep Learning

    Authors: Edward C. Williams, Grace Su, Sandra R. Schloen, Miller C. Prosser, Susanne Paulus, Sanjay Krishnan

    Abstract: Twenty-five hundred years ago, the paperwork of the Achaemenid Empire was recorded on clay tablets. In 1933, archaeologists from the University of Chicago's Oriental Institute (OI) found tens of thousands of these tablets and fragments during the excavation of Persepolis. Many of these tablets have been painstakingly photographed and annotated by expert cuneiformists, and now provide a rich datase… ▽ More

    Submitted 2 June, 2023; originally announced June 2023.

    Comments: Currently under review in the ACM JOCCH

  33. arXiv:2306.01143  [pdf, other

    cs.LG cs.CR cs.NI

    Federated Graph Learning for Low Probability of Detection in Wireless Ad-Hoc Networks

    Authors: Sivaram Krishnan, Jihong Park, Subhash Sagar, Gregory Sherman, Benjamin Campbell, Jinho Choi

    Abstract: Low probability of detection (LPD) has recently emerged as a means to enhance the privacy and security of wireless networks. Unlike existing wireless security techniques, LPD measures aim to conceal the entire existence of wireless communication instead of safeguarding the information transmitted from users. Motivated by LPD communication, in this paper, we study a privacy-preserving and distribut… ▽ More

    Submitted 1 June, 2023; originally announced June 2023.

  34. arXiv:2305.14547  [pdf

    cs.AR cs.ET cs.LG

    Bulk-Switching Memristor-based Compute-In-Memory Module for Deep Neural Network Training

    Authors: Yuting Wu, Qiwen Wang, Ziyu Wang, Xinxin Wang, Buvna Ayyagari, Siddarth Krishnan, Michael Chudzik, Wei D. Lu

    Abstract: The need for deep neural network (DNN) models with higher performance and better functionality leads to the proliferation of very large models. Model training, however, requires intensive computation time and energy. Memristor-based compute-in-memory (CIM) modules can perform vector-matrix multiplication (VMM) in situ and in parallel, and have shown great promises in DNN inference applications. Ho… ▽ More

    Submitted 23 May, 2023; originally announced May 2023.

    Journal ref: Adv. Mater.35 (2023) 2305465

  35. arXiv:2305.03842  [pdf, other

    cs.DB

    Data Station: Delegated, Trustworthy, and Auditable Computation to Enable Data-Sharing Consortia with a Data Escrow

    Authors: Siyuan Xia, Zhiru Zhu, Chris Zhu, Jinjin Zhao, Kyle Chard, Aaron J. Elmore, Ian Foster, Michael Franklin, Sanjay Krishnan, Raul Castro Fernandez

    Abstract: Pooling and sharing data increases and distributes its value. But since data cannot be revoked once shared, scenarios that require controlled release of data for regulatory, privacy, and legal reasons default to not sharing. Because selectively controlling what data to release is difficult, the few data-sharing consortia that exist are often built around data-sharing agreements resulting from long… ▽ More

    Submitted 5 May, 2023; originally announced May 2023.

  36. arXiv:2304.13775  [pdf, other

    eess.IV cs.CV

    Advancing Ischemic Stroke Diagnosis: A Novel Two-Stage Approach for Blood Clot Origin Identification

    Authors: Koushik Sivarama Krishnan, P. J. Joe Nikesh, Swathi Gnanasekar, Karthik Sivarama Krishnan

    Abstract: An innovative two-stage methodology for categorizing blood clot origins is presented in this paper, which is important for the diagnosis and treatment of ischemic stroke. First, a background classifier based on MobileNetV3 segments big whole-slide digital pathology images into numerous tiles to detect the presence of cellular material. After that, different pre-trained image classification algorit… ▽ More

    Submitted 5 January, 2024; v1 submitted 26 April, 2023; originally announced April 2023.

  37. arXiv:2304.02736  [pdf, other

    cs.CV

    Image Stabilization for Hololens Camera in Remote Collaboration

    Authors: Gowtham Senthil, Siva Vignesh Krishnan, Annamalai Lakshmanan, Florence Kissling

    Abstract: With the advent of new technologies, Augmented Reality (AR) has become an effective tool in remote collaboration. Narrow field-of-view (FoV) and motion blur can offer an unpleasant experience with limited cognition for remote viewers of AR headsets. In this article, we propose a two-stage pipeline to tackle this issue and ensure a stable viewing experience with a larger FoV. The solution involves… ▽ More

    Submitted 5 April, 2023; originally announced April 2023.

  38. arXiv:2303.08028  [pdf, other

    cs.DB cs.DC cs.LG

    EdgeServe: A Streaming System for Decentralized Model Serving

    Authors: Ted Shaowang, Sanjay Krishnan

    Abstract: The relevant features for a machine learning task may arrive as one or more continuous streams of data. Serving machine learning models over streams of data creates a number of interesting systems challenges in managing data routing, time-synchronization, and rate control. This paper presents EdgeServe, a distributed streaming system that can serve predictions from machine learning models in real… ▽ More

    Submitted 22 February, 2024; v1 submitted 1 March, 2023; originally announced March 2023.

    Comments: 19 pages, 15 figures

  39. arXiv:2303.07247  [pdf

    cs.CL cs.CY

    Are Models Trained on Indian Legal Data Fair?

    Authors: Sahil Girhepuje, Anmol Goel, Gokul S Krishnan, Shreya Goyal, Satyendra Pandey, Ponnurangam Kumaraguru, Balaraman Ravindran

    Abstract: Recent advances and applications of language technology and artificial intelligence have enabled much success across multiple domains like law, medical and mental health. AI-based Language Models, like Judgement Prediction, have recently been proposed for the legal sector. However, these models are strife with encoded social biases picked up from the training data. While bias and fairness have bee… ▽ More

    Submitted 14 May, 2024; v1 submitted 13 March, 2023; originally announced March 2023.

    Comments: Presented at the Symposium on AI and Law (SAIL) 2023

  40. arXiv:2212.01745  [pdf, other

    cs.RO

    Design of an All-Purpose Terrace Farming Robot

    Authors: Vibhakar Mohta, Adarsh Patnaik, Shivam Kumar Panda, Siva Vignesh Krishnan, Abhinav Gupta, Abhay Shukla, Gauri Wadhwa, Shrey Verma, Aditya Bandopadhyay

    Abstract: Automation in farming processes is a growing field of research in both academia and industries. A considerable amount of work has been put into this field to develop systems robust enough for farming. Terrace farming, in particular, provides a varying set of challenges, including robust stair climbing methods and stable navigation in unstructured terrains. We propose the design of a novel autonomo… ▽ More

    Submitted 4 December, 2022; originally announced December 2022.

  41. arXiv:2211.16385  [pdf, other

    cs.AR cs.AI cs.LG cs.MA

    Multi-Agent Reinforcement Learning for Microprocessor Design Space Exploration

    Authors: Srivatsan Krishnan, Natasha Jaques, Shayegan Omidshafiei, Dan Zhang, Izzeddin Gur, Vijay Janapa Reddi, Aleksandra Faust

    Abstract: Microprocessor architects are increasingly resorting to domain-specific customization in the quest for high-performance and energy-efficiency. As the systems grow in complexity, fine-tuning architectural parameters across multiple sub-systems (e.g., datapath, memory blocks in different hierarchies, interconnects, compiler optimization, etc.) quickly results in a combinatorial explosion of design s… ▽ More

    Submitted 29 November, 2022; originally announced November 2022.

    Comments: Workshop on ML for Systems at NeurIPS 2022

  42. Doppler: Automated SKU Recommendation in Migrating SQL Workloads to the Cloud

    Authors: Joyce Cahoon, Wenjing Wang, Yiwen Zhu, Katherine Lin, Sean Liu, Raymond Truong, Neetu Singh, Chengcheng Wan, Alexandra M Ciortea, Sreraman Narasimhan, Subru Krishnan

    Abstract: Selecting the optimal cloud target to migrate SQL estates from on-premises to the cloud remains a challenge. Current solutions are not only time-consuming and error-prone, requiring significant user input, but also fail to provide appropriate recommendations. We present Doppler, a scalable recommendation engine that provides right-sized Azure SQL Platform-as-a-Service (PaaS) recommendations withou… ▽ More

    Submitted 9 August, 2022; originally announced August 2022.

    Journal ref: Proceedings of the VLDB Endowment 15 (12), 3509-3521, 2022

  43. arXiv:2207.14484  [pdf, other

    cs.LG

    Adaptive Gradient Methods at the Edge of Stability

    Authors: Jeremy M. Cohen, Behrooz Ghorbani, Shankar Krishnan, Naman Agarwal, Sourabh Medapati, Michal Badura, Daniel Suo, David Cardoze, Zachary Nado, George E. Dahl, Justin Gilmer

    Abstract: Very little is known about the training dynamics of adaptive gradient methods like Adam in deep learning. In this paper, we shed light on the behavior of these algorithms in the full-batch and sufficiently large batch settings. Specifically, we empirically demonstrate that during full-batch training, the maximum eigenvalue of the preconditioned Hessian typically equilibrates at a certain numerical… ▽ More

    Submitted 15 April, 2024; v1 submitted 29 July, 2022; originally announced July 2022.

    Comments: v2 corrects the formula for Adam's preconditioner in Eq 2

  44. arXiv:2205.05748  [pdf, other

    cs.LG cs.RO

    Tiny Robot Learning: Challenges and Directions for Machine Learning in Resource-Constrained Robots

    Authors: Sabrina M. Neuman, Brian Plancher, Bardienus P. Duisterhof, Srivatsan Krishnan, Colby Banbury, Mark Mazumder, Shvetank Prakash, Jason Jabbour, Aleksandra Faust, Guido C. H. E. de Croon, Vijay Janapa Reddi

    Abstract: Machine learning (ML) has become a pervasive tool across computing systems. An emerging application that stress-tests the challenges of ML system design is tiny robot learning, the deployment of ML on resource-constrained low-cost autonomous robots. Tiny robot learning lies at the intersection of embedded systems, robotics, and ML, compounding the challenges of these domains. Tiny robot learning i… ▽ More

    Submitted 11 May, 2022; originally announced May 2022.

    Comments: 4 pages, 3 figures, 1 table, in IEEE AICAS 2022

  45. arXiv:2205.03259  [pdf

    cs.CY cs.CR

    Decentralized Digital Currency System using Merkle Hash Trees

    Authors: Shreekanth M Prabhu, Natarajan Subramanyam, Ms. Shreya P Krishnan, Ms. Brindavana Sachidananda

    Abstract: In India, post the demonetization exercise in 2016, digital payments have become extremely popular. Among them, the volume of transactions using Paytm wallets and UPI (Unified Payment Interface) have grown manifold. The lockdowns due to COVID-19 Pandemic have furthered this trend. Side by side, crypto-currencies such as bitcoin are also gaining traction. Many countries are considering issuing a Di… ▽ More

    Submitted 6 May, 2022; originally announced May 2022.

    Comments: 37 pages, 9 Figures, 8 Tables, submitted to Journal of Banking and Financial Technology

  46. arXiv:2204.10898  [pdf, other

    cs.RO cs.AR

    Roofline Model for UAVs: A Bottleneck Analysis Tool for Onboard Compute Characterization of Autonomous Unmanned Aerial Vehicles

    Authors: Srivatsan Krishnan, Zishen Wan, Kshitij Bhardwaj, Ninad Jadhav, Aleksandra Faust, Vijay Janapa Reddi

    Abstract: We introduce an early-phase bottleneck analysis and characterization model called the F-1 for designing computing systems that target autonomous Unmanned Aerial Vehicles (UAVs). The model provides insights by exploiting the fundamental relationships between various components in the autonomous UAV, such as sensor, compute, and body dynamics. To guarantee safe operation while maximizing the perform… ▽ More

    Submitted 22 April, 2022; originally announced April 2022.

    Comments: To Appear in 2022 IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS). arXiv admin note: substantial text overlap with arXiv:2111.03792

  47. arXiv:2204.09235  [pdf, other

    cs.DB

    JanusAQP: Efficient Partition Tree Maintenance for Dynamic Approximate Query Processing

    Authors: Xi Liang, Stavros Sintos, Sanjay Krishnan

    Abstract: Approximate query processing over dynamic databases, i.e., under insertions/deletions, has applications ranging from high-frequency trading to internet-of-things analytics. We present JanusAQP, a new dynamic AQP system, which supports SUM, COUNT, AVG, MIN, and MAX queries under insertions and deletions to the dataset. JanusAQP extends static partition tree synopses, which are hierarchical aggregat… ▽ More

    Submitted 26 July, 2022; v1 submitted 20 April, 2022; originally announced April 2022.

  48. arXiv:2204.03350  [pdf

    cs.CV

    Implementing a Real-Time, YOLOv5 based Social Distancing Measuring System for Covid-19

    Authors: Narayana Darapaneni, Shrawan Kumar, Selvarangan Krishnan, Hemalatha K, Arunkumar Rajagopal, Nagendra, Anwesh Reddy Paduri

    Abstract: The purpose of this work is, to provide a YOLOv5 deep learning-based social distance monitoring framework using an overhead view perspective. In addition, we have developed a custom defined model YOLOv5 modified CSP (Cross Stage Partial Network) and assessed the performance on COCO and Visdrone dataset with and without transfer learning. Our findings show that the developed model successfully iden… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

  49. Multi-constrained 3D topology optimization via augmented topological level-set

    Authors: Shiguang Deng, Suresh Krishnan

    Abstract: The objective of this paper is to introduce and demonstrate a robust methodology for solving multi-constrained 3D topology optimization problems. The proposed methodology is a combination of the topological level-set formulation, augmented Lagrangian algorithm, and assembly-free deflated finite element analysis (FEA). The salient features of the proposed method include: (1) it exploits the topolog… ▽ More

    Submitted 30 March, 2022; v1 submitted 28 March, 2022; originally announced March 2022.

  50. Topology optimization under thermo-elastic buckling

    Authors: Shiguang Deng, Suresh Krishnan

    Abstract: The focus of this paper is on topology optimization of continuum structures subject to thermally induced buckling. Popular strategies for solving such problems include Solid Isotropic Material with Penalization (SIMP) and Rational Approximation of Material Properties (RAMP). Both methods rely on material parameterization, and can sometimes exhibit pseudo buckling modes in regions with low pseudo-d… ▽ More

    Submitted 30 March, 2022; v1 submitted 28 March, 2022; originally announced March 2022.