Skip to main content

Showing 1–8 of 8 results for author: Bose, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.12103  [pdf, other

    cs.AI cs.CY cs.LG

    The Amazon Nova Family of Models: Technical Report and Model Card

    Authors: Amazon AGI, Aaron Langford, Aayush Shah, Abhanshu Gupta, Abhimanyu Bhatter, Abhinav Goyal, Abhinav Mathur, Abhinav Mohanty, Abhishek Kumar, Abhishek Sethi, Abi Komma, Abner Pena, Achin Jain, Adam Kunysz, Adam Opyrchal, Adarsh Singh, Aditya Rawal, Adok Achar Budihal Prasad, AdriĆ  de Gispert, Agnika Kumar, Aishwarya Aryamane, Ajay Nair, Akilan M, Akshaya Iyengar, Akshaya Vishnu Kudlu Shanbhogue , et al. (761 additional authors not shown)

    Abstract: We present Amazon Nova, a new generation of state-of-the-art foundation models that deliver frontier intelligence and industry-leading price performance. Amazon Nova Pro is a highly-capable multimodal model with the best combination of accuracy, speed, and cost for a wide range of tasks. Amazon Nova Lite is a low-cost multimodal model that is lightning fast for processing images, video, documents… ▽ More

    Submitted 17 March, 2025; originally announced June 2025.

    Comments: 48 pages, 10 figures

    Report number: 20250317

  2. arXiv:2504.14674  [pdf, ps, other

    cs.IT

    Binary cyclic codes from permutation polynomials over $\mathbb{F}_{2^m}$

    Authors: Mrinal Kanti Bose, Udaya Parampalli, Abhay Kumar Singh

    Abstract: Binary cyclic codes having large dimensions and minimum distances close to the square-root bound are highly valuable in applications where high-rate transmission and robust error correction are both essential. They provide an optimal trade-off between these two factors, making them suitable for demanding communication and storage systems, post-quantum cryptography, radar and sonar systems, wireles… ▽ More

    Submitted 20 April, 2025; originally announced April 2025.

    MSC Class: 94B15; 11T71; 11T06 ACM Class: B.4.1; H.1.1

  3. arXiv:2408.08934  [pdf, other

    cs.CR cs.AI cs.LG

    A Factored MDP Approach To Moving Target Defense With Dynamic Threat Modeling and Cost Efficiency

    Authors: Megha Bose, Praveen Paruchuri, Akshat Kumar

    Abstract: Moving Target Defense (MTD) has emerged as a proactive and dynamic framework to counteract evolving cyber threats. Traditional MTD approaches often rely on assumptions about the attackers knowledge and behavior. However, real-world scenarios are inherently more complex, with adaptive attackers and limited prior knowledge of their payoffs and intentions. This paper introduces a novel approach to MT… ▽ More

    Submitted 16 August, 2024; originally announced August 2024.

  4. arXiv:2301.09892  [pdf, other

    cs.GT cs.CR

    Learning Effective Strategies for Moving Target Defense with Switching Costs

    Authors: Vignesh Viswanathan, Megha Bose, Praveen Paruchuri

    Abstract: Moving Target Defense (MTD) has emerged as a key technique in various security applications as it takes away the attacker's ability to perform reconnaissance for exploiting a system's vulnerabilities. However, most of the existing research in the field assumes unrealistic access to information about the attacker's motivations and/or actions when developing MTD strategies. Many of the existing appr… ▽ More

    Submitted 24 January, 2023; originally announced January 2023.

  5. arXiv:2209.09900  [pdf, other

    cs.CL cs.AI cs.LG

    LINGUIST: Language Model Instruction Tuning to Generate Annotated Utterances for Intent Classification and Slot Tagging

    Authors: Andy Rosenbaum, Saleh Soltan, Wael Hamza, Yannick Versley, Markus Boese

    Abstract: We present LINGUIST, a method for generating annotated data for Intent Classification and Slot Tagging (IC+ST), via fine-tuning AlexaTM 5B, a 5-billion-parameter multilingual sequence-to-sequence (seq2seq) model, on a flexible instruction prompt. In a 10-shot novel intent setting for the SNIPS dataset, LINGUIST surpasses state-of-the-art approaches (Back-Translation and Example Extrapolation) by a… ▽ More

    Submitted 20 September, 2022; originally announced September 2022.

    Comments: Accepted to The 29th International Conference on Computational Linguistics (COLING 2022) October 12-17, 2022, Gyeongju, Republic of Korea https://coling2022.org/

  6. arXiv:1108.0243  [pdf, ps, other

    cs.CR

    Key Predistribution Schemes for Distributed Sensor Networks

    Authors: Mausumi Bose, Aloke Dey, Rahul Mukerjee

    Abstract: Key predistribution schemes for distributed sensor networks have received significant attention in the recent literature. In this paper we propose a new construction method for these schemes based on combinations of duals of standard block designs. Our method is a broad spectrum one which works for any intersection threshold. By varying the initial designs, we can generate various schemes and this… ▽ More

    Submitted 1 August, 2011; originally announced August 2011.

    Comments: Indian Statistical Institute Kolkata Tech., November 10, 2010 (Revised version)

    Report number: ASD/2010/3

  7. arXiv:1105.5681  [pdf

    cs.CR

    Improving Anonymity in Shared Key Primitives Based on Perfect Hash Families

    Authors: Mausumi Bose, Rahul Mukerjee

    Abstract: We propose a new scheme for sharing symmetric key operations among a set of participants according to a (t,n) threshold access structure. We focus on anonymity properties of this scheme and show that this scheme provides improved values of anonymity measures than the existing ones. In particular, the scheme can provide optimal and equitable participant anonymity when it is based on balanced perfec… ▽ More

    Submitted 27 May, 2011; originally announced May 2011.

  8. arXiv:1007.0619  [pdf

    cs.CR

    Anti-Collusion Digital Fingerprinting Codes via Partially Cover-Free Families

    Authors: Mausumi Bose, Rahul Mukerjee

    Abstract: Anti-collusion digital fingerprinting codes have been of significant current interest in the context of deterring unauthorized use of multimedia content by a coalition of users. In this article, partially cover-free families of sets are considered and these are employed to obtain such codes. Compared to the existing methods of construction, our methods ensure gains in terms of accommodating more u… ▽ More

    Submitted 5 July, 2010; originally announced July 2010.