Skip to main content

Showing 1–17 of 17 results for author: Chaki, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2509.23241  [pdf, ps, other

    cs.DC

    Memory Efficient and Staleness Free Pipeline Parallel DNN Training Framework with Improved Convergence Speed

    Authors: Ankita Dutta, Nabendu Chaki, Rajat K. De

    Abstract: High resource requirement for Deep Neural Network (DNN) training across multiple GPUs necessitates development of various parallelism techniques. In this paper, we introduce two interconnected DNN training frameworks, namely, V-TiMePReSt and I-TiMePReSt, based on pipeline parallelism, a variant of model parallelism. V-TiMePReSt is a completely staleness-free system which enables the DNNs to be tra… ▽ More

    Submitted 27 September, 2025; originally announced September 2025.

  2. arXiv:2410.14312  [pdf, other

    cs.DC

    TiMePReSt: Time and Memory Efficient Pipeline Parallel DNN Training with Removed Staleness

    Authors: Ankita Dutta, Nabendu Chaki, Rajat K. De

    Abstract: DNN training is time-consuming and requires efficient multi-accelerator parallelization, where a single training iteration is split over available accelerators. Current approaches often parallelize training using intra-batch parallelization. Combining inter-batch and intra-batch pipeline parallelism is common to further improve training throughput. In this article, we develop a system, called TiMe… ▽ More

    Submitted 23 October, 2024; v1 submitted 18 October, 2024; originally announced October 2024.

  3. arXiv:2303.04519  [pdf, other

    cs.SE cs.AI

    An Annexure to the Paper "Driving the Technology Value Stream by Analyzing App Reviews"

    Authors: Souvick Das, Novarun Deb, Agostino Cortesi, Nabendu Chaki

    Abstract: This paper presents a novel framework that utilizes Natural Language Processing (NLP) techniques to understand user feedback on mobile applications. The framework allows software companies to drive their technology value stream based on user reviews, which can highlight areas for improvement. The framework is analyzed in depth, and its modules are evaluated for their effectiveness. The proposed ap… ▽ More

    Submitted 8 March, 2023; originally announced March 2023.

  4. arXiv:1905.04777  [pdf, other

    cs.SE

    AFSCR: Annotation of Functional Satisfaction Conditions and their Reconciliation within i* models

    Authors: Novarun Deb, Nabendu Chaki

    Abstract: Context: Researchers, both in industry and academia, are facing the challenge of leveraging the benefits of goal oriented requirements engineering (GORE) techniques to business compliance management. This requires analyzing goal models along with their semantics. However, most prominent goal modeling frameworks have no means of capturing the semantics of goals (except what is trivially conveyed by… ▽ More

    Submitted 12 May, 2019; originally announced May 2019.

  5. Extracting State Transition Models from i* Models

    Authors: Novarun Deb, Nabendu Chaki, Aditya Ghose

    Abstract: i* models are inherently sequence agnostic. There is an immediate need to bridge the gap between such a sequence agnostic model and an industry implemented process modelling standard like Business Process Modelling Notation (BPMN). This work is an attempt to build State Transition Models from i* models. In this paper, we first spell out the Naive Algorithm formally, which is on the lines of Formal… ▽ More

    Submitted 24 July, 2015; originally announced July 2015.

    Comments: 41 pages, 13 figures, 5 tables, submitted to the Journal of Systems and Software, pending resubmission

    Journal ref: Journal of Systems and Software, Elsevier, Volume 121, November 2016, Pages 265-280

  6. arXiv:1406.4941  [pdf

    cs.NI cs.CR

    Study of Security Issues in Pervasive Environment of Next Generation Internet of Things

    Authors: Tapalina Bhattasali, Rituparna Chaki, Nabendu Chaki

    Abstract: Internet of Things is a novel concept that semantically implies a world-wide network of uniquely addressable interconnected smart objects. It is aimed at establishing any paradigm in computing. This environment is one where the boundary between virtual and physical world is eliminated. As the network gets loaded with hitherto unknown applications, security threats also become rampant. Current secu… ▽ More

    Submitted 19 June, 2014; originally announced June 2014.

    Comments: 12 pages, CISIM 2013

  7. arXiv:1312.2175   

    cs.NI

    Ant Colony based Routing for Mobile Ad-Hoc Networks towards Improved Quality of Services

    Authors: Bibhas Roy, Suman Banik, Parthi Dey, Sugata Sanyal, Nabendu Chaki

    Abstract: Mobile Ad Hoc Network (MANET) is a dynamic multihop wireless network which is established by a set of mobile nodes on a shared wireless channel. One of the major issues in MANET is routing due to the mobility of the nodes. Routing means the act of moving information across an internet work from a source to a destination. When it comes to MANET, the complexity increases due to various characteristi… ▽ More

    Submitted 10 December, 2013; v1 submitted 7 December, 2013; originally announced December 2013.

    Comments: This paper has been withdrawn by the author due to a crucial sign error in equation 1

  8. arXiv:1206.6322  [pdf

    cs.IR cs.DB

    A New Scale for Attribute Dependency in Large Database Systems

    Authors: Soumya Sen, Anjan Dutta, Agostino Cortesi, Nabendu Chaki

    Abstract: Large, data centric applications are characterized by its different attributes. In modern day, a huge majority of the large data centric applications are based on relational model. The databases are collection of tables and every table consists of numbers of attributes. The data is accessed typically through SQL queries. The queries that are being executed could be analyzed for different types of… ▽ More

    Submitted 27 June, 2012; originally announced June 2012.

    Comments: 12 pages - paper accepted for presentation and publication in CISIM 2012 International Confrence

  9. arXiv:1201.3978  [pdf

    cs.OH

    Learners' Quanta based Design of a Learning Management System

    Authors: Souvik Sengupta, Nabendu Chaki, Ranjan Dasgupta

    Abstract: In this paper IEEE Learning Technology System Architecture (LTSA) for LMS software has been analyzed. It has been observed that LTSA is too abstract to be adapted in a uniform way by LMS developers. A Learners' Quanta based high level design that satisfies the IEEE LTSA standard has been proposed for future development of efficient LMS software. A hybrid model of learning fitting into LTSA model h… ▽ More

    Submitted 19 January, 2012; originally announced January 2012.

  10. arXiv:1111.0427   

    cs.OH

    A Stochastic Net Model for Controlling Bullwhip Effect in Virtual Multi-Tier Retail Network

    Authors: Bidyut Biman Sarkar, Sugata Sanyal, Nabendu Chaki

    Abstract: Supply Chain operation is an integrated business process starting from primary supplier to end user and the process produce products, services and information. A successful chain will explore technology, lean operations, and quality management by adding value for customers and stakeholders. It is a strategic alliance among the partnering enterprises without geographical boundary. Every chain has i… ▽ More

    Submitted 2 November, 2011; v1 submitted 2 November, 2011; originally announced November 2011.

    Comments: The paper has been withdrawn as the authors have found some inadvertent but, serious gaps in the content

  11. arXiv:1109.5388   

    cs.CR

    A Survey on Security Issues in Cloud Computing

    Authors: Rohit Bhadauria, Rituparna Chaki, Nabendu Chaki, Sugata Sanyal

    Abstract: Cloud Computing holds the potential to eliminate the requirements for setting up of high-cost computing infrastructure for the IT-based solutions and services that the industry uses. It promises to provide a flexible IT architecture, accessible through internet for lightweight portable devices. This would allow many-fold increase in the capacity or capabilities of the existing and new software. In… ▽ More

    Submitted 21 May, 2013; v1 submitted 25 September, 2011; originally announced September 2011.

    Comments: This review is incomplete and contains some erroneous interpretation of existing works

  12. arXiv:1108.6010  [pdf

    cs.CR

    A State-of-the-art Survey on IDS for Mobile Ad-Hoc Networks and Wireless Mesh Networks

    Authors: Novarun Deb, Manali Chakraborty, Nabendu Chaki

    Abstract: An Intrusion Detection System (IDS) detects malicious and selfish nodes in a network. Ad hoc networks are often secured by using either intrusion detection or by secure routing. Designing efficient IDS for wireless ad-hoc networks that would not affect the performance of the network significantly is indeed a challenging task. Arguably, the most common thing in a review paper in the domain of wirel… ▽ More

    Submitted 30 August, 2011; originally announced August 2011.

    Comments: Accepted for publication in PDCTA 2011 to be held in Chennair during September 25-27, 2011

  13. arXiv:1108.5466  [pdf

    cs.OH

    Quality Evaluation of Conceptual Level Object Multidimensional Data Model

    Authors: Supriya Chakrabarty, Nabendu Chaki

    Abstract: The advancement of technology facilitates explosive growth of mobile usage in the last decade. Numerous applications have been developed to support its usage. However, gap in technology exists in obtaining correct and trusted values for evaluation indexes of the precise amount of usage. The claims of loss in revenue by the service providers could be more due to unexpected behaviour of the hardware… ▽ More

    Submitted 27 August, 2011; originally announced August 2011.

    Comments: 14 pages - accepted in June 2011 for publication in the International Journal of Computer Science & Information Technology (ISSN: 0975-3826)

  14. arXiv:1108.4139  [pdf

    cs.OH

    Modeling Smart Grid using Generalized Stochastic Petri Net

    Authors: Amrita Dey, Nabendu Chaki, Sugata Sanyal

    Abstract: Building smart grid for power system is a major challenge for safe, automated and energy efficient usage of electricity. The full implementation of the smart grid will evolve over time. However, before a new set of infrastructures are invested to build the smart grid, proper modeling and analysis is needed to avoid wastage of resources. Modeling also helps to identify and prioritize appropriate sy… ▽ More

    Submitted 20 August, 2011; originally announced August 2011.

    Comments: 10 Pages, 10 Figures

  15. arXiv:1108.4138  [pdf

    cs.NI

    QoS Routing using OLSR with Optimization for Flooding

    Authors: Suman Banik, Bibhash Roy, Parthi Dey, Nabendu Chaki, Sugata Sanyal

    Abstract: Mobile Ad-hoc Network (MANET) is the self organizing collection of mobile nodes. The communication in MANET is done via a wireless media. Ad hoc wireless networks have massive commercial and military potential because of their mobility support. Due to demanding real time multimedia applications, Quality of Services (QoS) support in such infrastructure less networks have become essential. QoS routi… ▽ More

    Submitted 20 August, 2011; originally announced August 2011.

    Comments: 4 Pages, 3 Figures

  16. arXiv:1108.4100  [pdf

    cs.CR

    A New Trusted and Collaborative Agent Based Approach for Ensuring Cloud Security

    Authors: Shantanu Pal, Sunirmal Khatua, Nabendu Chaki, Sugata Sanyal

    Abstract: In order to determine the user's trust is a growing concern for ensuring privacy and security in a cloud computing environment. In cloud, user's data is stored in one or more remote server(s) which poses more security challenges for the system. One of the most important concerns is to protect user's sensitive information from other users and hackers that may cause data leakage in cloud storage. Ha… ▽ More

    Submitted 20 August, 2011; originally announced August 2011.

    Comments: 12 pages, 5 Figures, 1 Table

  17. arXiv:1004.0587  [pdf

    cs.NI

    A New Cluster-based Wormhole Intrusion detection algorithm for Mobile Ad-Hoc Networks

    Authors: Debdutta Barman Roy, Rituparna Chaki, Nabendu Chaki

    Abstract: In multi-hop wireless systems, the need for cooperation among nodes to relay each other's packets exposes them to a wide range of security attacks. A particularly devastating attack is the wormhole attack, where a malicious node records control traffic at one location and tunnels it to another compromised node, possibly far away, which replays it locally. Routing security in ad hoc networks is oft… ▽ More

    Submitted 5 April, 2010; originally announced April 2010.

    Comments: 9Pages

    Journal ref: International Journal of Network Security & Its Applications 1.1 (2009) 44-52