Skip to main content

Showing 1–12 of 12 results for author: Dara, S

.
  1. arXiv:2107.00718  [pdf, ps, other

    math.CO

    Strong edge coloring of Cayley graphs and some product graphs

    Authors: Suresh Dara, Suchismita Mishra, Narayanan Narayanan, Zsolt Tuza

    Abstract: A strong edge coloring of a graph $G$ is a proper edge coloring of $G$ such that every color class is an induced matching. The minimum number of colors required is termed the strong chromatic index. In this paper, we determine the exact value of the strong chromatic index of all unitary Cayley graphs. Our investigations reveal an underlying product structure from which the unitary Cayley graphs em… ▽ More

    Submitted 9 July, 2021; v1 submitted 1 July, 2021; originally announced July 2021.

  2. arXiv:2007.15974  [pdf, other

    eess.SP

    Beamformed Energy Detection in the Presence of an Interferer for Cognitive mmWave Network

    Authors: Madhuri Latha Mannedu, Sai Krishna Charan Dara, Sachin Chaudhari, Neeraj Varshney

    Abstract: In this paper, we propose beamformed energy detection (BFED) spectrum sensing schemes for a single secondary user (SU) or a cognitive radio to detect a primary user (PU) transmission in the presence of an interferer. In the millimeter wave (mmWave) band, due to high attenuation, there are fewer multipaths, and the channel is sparse, giving rise to fewer directions of arrivals (DoAs). Sensing in on… ▽ More

    Submitted 1 June, 2021; v1 submitted 31 July, 2020; originally announced July 2020.

    Comments: 6 pages, 6 figures

  3. arXiv:1910.00007  [pdf, ps, other

    math.CO

    Some results on domination number of the graph defined by two levels of the n-cube

    Authors: Yeshwant Pandit, S. L. Sravanthi, Suresh Dara, S. M. Hegde

    Abstract: Let ${[n] \choose k}$ and ${[n] \choose l}$ $( k > l ) $ where $[n] = \{1,2,3,...,n\}$ denote the family of all $k$-element subsets and $l$-element subsets of $[n]$ respectively. Define a bipartite graph $G_{k,l} = ({[n] \choose k},{[n] \choose l},E)$ such that two vertices $S\, ε\,{[n] \choose k} $ and $T\, ε\,{[n] \choose l} $ are adjacent if and only if $T \subset S$. In this paper, we give an… ▽ More

    Submitted 25 November, 2019; v1 submitted 30 September, 2019; originally announced October 2019.

  4. arXiv:1808.02247  [pdf, ps, other

    cs.DM math.CO

    Extending some results on the second neighborhood conjecture

    Authors: Suresh Dara, Mathew C. Francis, Dalu Jacob, N. Narayanan

    Abstract: A vertex in a directed graph is said to have a large second neighborhood if it has at least as many second out-neighbors as out-neighbors. The Second Neighborhood Conjecture, first stated by Seymour, asserts that there is a vertex having a large second neighborhood in every oriented graph (a directed graph without loops or digons). We prove that oriented graphs whose missing edges can be partition… ▽ More

    Submitted 22 October, 2021; v1 submitted 7 August, 2018; originally announced August 2018.

    Comments: 23 pages, 2 figures

    MSC Class: 05C20

  5. arXiv:1806.08154  [pdf, ps, other

    math.CO

    Bounds on Erd{ő}s - Faber - Lovász Conjecture - the Uniform and Regular Cases

    Authors: S. M. Hegde, Suresh Dara

    Abstract: We consider the Erd{ő}s - Faber - Lovász (EFL) conjecture for hypergraphs. This paper gives an upper bound for the chromatic number of $r$ regular linear hypergraphs $\textbf{H}$ of size $n$. If $r \ge 4$, $χ(\textbf{H}) \le 1.181n$ and if $r=3$, $χ(\textbf{H}) \le 1.281n$

    Submitted 9 January, 2019; v1 submitted 21 June, 2018; originally announced June 2018.

    Comments: 5 pages

  6. arXiv:1701.04550  [pdf, ps, other

    math.CO

    On Erdos-Faber-Lovasz Conjecture

    Authors: S. M. Hegde, Suresh Dara

    Abstract: In 1972, Erdös - Faber - Lovász (EFL) conjectured that, if $\textbf{H}$ is a linear hypergraph consisting of $n$ edges of cardinality $n$, then it is possible to color the vertices with $n$ colors so that no two vertices with the same color are in the same edge. In 1978, Deza, Erdös and Frankl had given an equivalent version of the same for graphs: Let $G= \bigcup_{i=1}^{n} A_i$ denote a graph wit… ▽ More

    Submitted 17 January, 2017; originally announced January 2017.

    Comments: 12 Pages, 6 Figures. arXiv admin note: substantial text overlap with arXiv:1508.03476

    MSC Class: 05A05; 05B15; 05C15

  7. arXiv:1602.02452  [pdf, other

    cs.CR

    Privacy Preserving Architectures for Collaborative Intrusion Detection

    Authors: Sashank Dara, V. N. Muralidhara

    Abstract: Collaboration among multiple organizations is imperative for contemporary intrusion detection. As modern threats become well sophisticated it is difficult for organizations to defend with threat context local to their networks alone. Availability of global \emph{threat intelligence} is must for organizations to defend against modern advanced persistent threats (APTs). In order to benefit from such… ▽ More

    Submitted 7 February, 2016; originally announced February 2016.

    Comments: 9 Pages, 2 figures, Position paper

  8. arXiv:1601.01041  [pdf, ps, other

    math.CO

    The Dynamics of the Forest Graph Operator

    Authors: Suresh Dara, S. M. Hegde, Venkateshwarlu Deva, S. B. Rao, Thomas Zaslavsky

    Abstract: In 1966, Cummins introduced the "tree graph": the tree graph $\mathbf{T}(G)$ of a graph $G$ (possibly infinite) has all its spanning trees as vertices, and distinct such trees correspond to adjacent vertices if they differ in just one edge, i.e., two spanning trees $T_1$ and $T_2$ are adjacent if $T_2 = T_1 -e +f$ for some edges $e\in T_1$ and $f\notin T_1$. The tree graph of a connected graph nee… ▽ More

    Submitted 5 January, 2016; originally announced January 2016.

    Comments: 13 pp

    MSC Class: Primary 05C76; Secondary 05C05; 05C63

    Journal ref: Discussiones Mathematicae Graph Theory, 36 (2016), no. 4, 899--913

  9. arXiv:1508.03971  [pdf, ps, other

    math.CO

    On Clique Convergences of Graphs

    Authors: S. M. Hegde, V. V. P. R. V. B. Suresh Dara

    Abstract: Let $G$ be a graph and $\mathcal{K}_G$ be the set of all cliques of $G$, then the clique graph of G denoted by $K(G)$ is the graph with vertex set $\mathcal{K}_G$ and two elements $Q_i,Q_j \in \mathcal{K}_G$ form an edge if and only if $Q_i \cap Q_j \neq \emptyset$. Iterated clique graphs are defined by $K^0(G)=G$, and $K^n(G)=K(K^{n-1}(G))$ for $n>0$. In this paper we determine the number of cliq… ▽ More

    Submitted 17 August, 2015; originally announced August 2015.

    Comments: 12 pages

    MSC Class: 05C69; 05C76; 37E15; 94C15

  10. arXiv:1508.03476  [pdf, ps, other

    math.CO

    A Proof of the Erdös - Faber - Lovász Conjecture

    Authors: Suresh M. H., V. V. P. R. V. B. Suresh Dara

    Abstract: In 1972, Erdös - Faber - Lovász (EFL) conjectured that, if $\textbf{H}$ is a linear hypergraph consisting of $n$ edges of cardinality $n$, then it is possible to color the vertices with $n$ colors so that no two vertices with the same color are in the same edge. In 1978, Deza, Erdös and Frankl had given an equivalent version of the same for graphs: Let $G= \bigcup _{i=1}^{n} A_i$ denote a graph wi… ▽ More

    Submitted 19 November, 2015; v1 submitted 14 August, 2015; originally announced August 2015.

    Comments: 10 pages. arXiv admin note: substantial text overlap with arXiv:1508.03476

    MSC Class: 05A05; 05B15; 05C15

  11. arXiv:1406.1823  [pdf, ps, other

    cs.CR

    Multi-user protocols with access control for computational privacy in public clouds

    Authors: Sashank Dara

    Abstract: Computational privacy is a property of cryptographic system that ensures the privacy of data being processed at an untrusted server. Fully Homomorphic Encryption Schemes (FHE) promise to provide such property. Contemporary FHE schemes are suited for applications that have single user and server. In reality many of the cloud applications involve multiple users with various degrees of trust and the… ▽ More

    Submitted 6 June, 2014; originally announced June 2014.

    Comments: 6 pages

  12. arXiv:1208.0070  [pdf

    cs.CR

    Confidentiality without Encryption For Cloud Computational Privacy

    Authors: Sashank Dara

    Abstract: Advances in technology has given rise to new computing models where any individual/organization (Cloud Service Consumers here by denoted as CSC's) can outsource their computational intensive tasks on their data to a remote Cloud Service Provider (CSP) for many advantages like lower costs, scalability etc. But such advantages come for a bigger cost "Security and Privacy of data" for this very reaso… ▽ More

    Submitted 31 July, 2012; originally announced August 2012.

    Comments: 3 pages, 2 figures