Skip to main content

Showing 1–36 of 36 results for author: JayaPrakash

Searching in archive cs. Search in all archives.
.
  1. arXiv:2506.06999  [pdf, ps, other

    cs.LG cs.AI cs.CV stat.ML

    Towards Physics-informed Diffusion for Anomaly Detection in Trajectories

    Authors: Arun Sharma, Mingzhou Yang, Majid Farhadloo, Subhankar Ghosh, Bharat Jayaprakash, Shashi Shekhar

    Abstract: Given trajectory data, a domain-specific study area, and a user-defined threshold, we aim to find anomalous trajectories indicative of possible GPS spoofing (e.g., fake trajectory). The problem is societally important to curb illegal activities in international waters, such as unauthorized fishing and illicit oil transfers. The problem is challenging due to advances in AI generated in deep fakes g… ▽ More

    Submitted 14 June, 2025; v1 submitted 8 June, 2025; originally announced June 2025.

  2. arXiv:2506.06773  [pdf, ps, other

    cs.AR cs.LG cs.PF

    Taming Wild Branches: Overcoming Hard-to-Predict Branches using the Bullseye Predictor

    Authors: Emet Behrendt, Shing Wai Pun, Prashant J. Nair

    Abstract: Branch prediction is key to the performance of out-of-order processors. While the CBP-2016 winner TAGE-SC-L combines geometric-history tables, a statistical corrector, and a loop predictor, over half of its remaining mispredictions stem from a small set of hard-to-predict (H2P) branches. These branches occur under diverse global histories, causing repeated thrashing in TAGE and eviction before use… ▽ More

    Submitted 7 June, 2025; originally announced June 2025.

    Comments: Paper accepted and presented at the 6th Championship Branch Prediction (CBP) workshop, co-held with ISCA 2025, on June 21, 2025, Tokyo, Japan

    ACM Class: C.1.2; B.2.1; C.4; C.0

  3. arXiv:2504.07048  [pdf, other

    cs.CR cs.ET

    Context Switching for Secure Multi-programming of Near-Term Quantum Computers

    Authors: Avinash Kumar, Meng Wang, Chenxu Liu, Ang Li, Prashant J. Nair, Poulami Das

    Abstract: Multi-programming quantum computers improve device utilization and throughput. However, crosstalk from concurrent two-qubit CNOT gates poses security risks, compromising the fidelity and output of co-running victim programs. We design Zero Knowledge Tampering Attacks (ZKTAs), using which attackers can exploit crosstalk without knowledge of the hardware error profile. ZKTAs can alter victim program… ▽ More

    Submitted 17 April, 2025; v1 submitted 9 April, 2025; originally announced April 2025.

  4. arXiv:2503.05648  [pdf, other

    cs.LG

    Physics-based machine learning framework for predicting NOx emissions from compression ignition engines using on-board diagnostics data

    Authors: Harish Panneer Selvam, Bharat Jayaprakash, Yan Li, Shashi Shekhar, William F. Northrop

    Abstract: This work presents a physics-based machine learning framework to predict and analyze oxides of nitrogen (NOx) emissions from compression-ignition engine-powered vehicles using on-board diagnostics (OBD) data as input. Accurate NOx prediction from OBD datasets is difficult because NOx formation inside an engine combustion chamber is governed by complex processes occurring on timescales much shorter… ▽ More

    Submitted 7 March, 2025; originally announced March 2025.

  5. arXiv:2503.00979  [pdf, ps, other

    cs.CL cs.AI cs.LG

    Dialogue Without Limits: Constant-Sized KV Caches for Extended Responses in LLMs

    Authors: Ravi Ghadia, Avinash Kumar, Gaurav Jain, Prashant Nair, Poulami Das

    Abstract: Autoregressive Transformers rely on Key-Value (KV) caching to accelerate inference. However, the linear growth of the KV cache with context length leads to excessive memory consumption and bandwidth constraints. This bottleneck is particularly problematic in real-time applications -- such as chatbots and interactive assistants -- where low latency and high memory efficiency are critical. Existing… ▽ More

    Submitted 7 June, 2025; v1 submitted 2 March, 2025; originally announced March 2025.

    Comments: Published in the Proceedings of the 42nd International Conference on Machine Learning (ICML), Vancouver, Canada

  6. arXiv:2502.15013  [pdf, other

    cs.LG cs.AI

    Towards Physics-Guided Foundation Models

    Authors: Majid Farhadloo, Arun Sharma, Mingzhou Yang, Bharat Jayaprakash, William Northrop, Shashi Shekhar

    Abstract: Traditional foundation models are pre-trained on broad datasets to reduce the training resources (e.g., time, energy, labeled samples) needed for fine-tuning a wide range of downstream tasks. However, traditional foundation models struggle with out-of-distribution prediction and can produce outputs that are unrealistic and physically infeasible. We propose the notation of physics-guided foundation… ▽ More

    Submitted 23 April, 2025; v1 submitted 20 February, 2025; originally announced February 2025.

  7. QPRAC: Towards Secure and Practical PRAC-based Rowhammer Mitigation using Priority Queues

    Authors: Jeonghyun Woo, Chris S. Lin, Prashant J. Nair, Aamer Jaleel, Gururaj Saileshwar

    Abstract: JEDEC has introduced the Per Row Activation Counting (PRAC) framework for DDR5 and future DRAMs to enable precise counting of DRAM row activations. PRAC enables a holistic mitigation of Rowhammer attacks even at ultra-low Rowhammer thresholds. PRAC uses an Alert Back-Off (ABO) protocol to request the memory controller to issue Rowhammer mitigation requests. However, recent PRAC implementations are… ▽ More

    Submitted 15 May, 2025; v1 submitted 30 January, 2025; originally announced January 2025.

    Comments: 15 pages, including appendices. The paper was presented at HPCA 2025 (https://hpca-conf.org/2025/)

    Journal ref: 2025 IEEE Symposium on High-Performance Computer Architecture (HPCA 2025)

  8. DAPPER: A Performance-Attack-Resilient Tracker for RowHammer Defense

    Authors: Jeonghyun Woo, Prashant J. Nair

    Abstract: RowHammer vulnerabilities pose a significant threat to modern DRAM-based systems, where rapid activation of DRAM rows can induce bit-flips in neighboring rows. To mitigate this, state-of-the-art host-side RowHammer mitigations typically rely on shared counters or tracking structures. While these optimizations benefit benign applications, they are vulnerable to Performance Attacks (Perf-Attacks), w… ▽ More

    Submitted 15 May, 2025; v1 submitted 30 January, 2025; originally announced January 2025.

    Comments: The initial version of this paper was submitted to MICRO 2024 on April 18, 2024. The final version was presented at HPCA 2025 (https://hpca-conf.org/2025) and is 16 pages long, including references

    Journal ref: 2025 IEEE Symposium on High-Performance Computer Architecture (HPCA 2025)

  9. arXiv:2501.16762  [pdf, other

    cs.IT

    Rate-Distortion under Neural Tracking of Speech: A Directed Redundancy Approach

    Authors: Jan Østergaard, Sangeeth Geetha Jayaprakash, Rodrigo Ordoñez

    Abstract: The data acquired at different scalp EEG electrodes when human subjects are exposed to speech stimuli are highly redundant. The redundancy is partly due to volume conduction effects and partly due to localized regions of the brain synchronizing their activity in response to the stimuli. In a competing talker scenario, we use a recent measure of directed redundancy to assess the amount of redundant… ▽ More

    Submitted 28 January, 2025; originally announced January 2025.

    Comments: Accepted for IEEE Data Compression Conference

  10. arXiv:2412.05649  [pdf, other

    cs.NI

    RouteNet-Fermi: Network Modeling With GNN (Analysis And Re-implementation)

    Authors: Shourya Verma, Simran Kadadi, Swathi Jayaprakash, Arpan Kumar Mahapatra, Ishaan Jain

    Abstract: Network performance modeling presents important challenges in modern computer networks due to increasing complexity, scale, and diverse traffic patterns. While traditional approaches like queuing theory and packet-level simulation have served as foundational tools, they face limitations in modeling complex traffic behaviors and scaling to large networks. This project presents an extended implement… ▽ More

    Submitted 7 December, 2024; originally announced December 2024.

  11. arXiv:2412.03853  [pdf, other

    cs.CV cs.CL

    Automated LaTeX Code Generation from Handwritten Math Expressions Using Vision Transformer

    Authors: Jayaprakash Sundararaj, Akhil Vyas, Benjamin Gonzalez-Maldonado

    Abstract: Transforming mathematical expressions into LaTeX poses a significant challenge. In this paper, we examine the application of advanced transformer-based architectures to address the task of converting handwritten or digital mathematical expression images into corresponding LaTeX code. As a baseline, we utilize the current state-of-the-art CNN encoder and LSTM decoder. Additionally, we explore enhan… ▽ More

    Submitted 7 December, 2024; v1 submitted 4 December, 2024; originally announced December 2024.

    Comments: 7 pages; 3 figures

  12. arXiv:2406.00013  [pdf

    cs.IR cs.AI cs.CL cs.LG

    Thesis: Document Summarization with applications to Keyword extraction and Image Retrieval

    Authors: Jayaprakash Sundararaj

    Abstract: Automatic summarization is the process of reducing a text document in order to generate a summary that retains the most important points of the original document. In this work, we study two problems - i) summarizing a text document as set of keywords/caption, for image recommedation, ii) generating opinion summary which good mix of relevancy and sentiment with the text document. Intially, we prese… ▽ More

    Submitted 20 May, 2024; originally announced June 2024.

  13. arXiv:2404.04270  [pdf, other

    cs.IR cs.LG

    Accelerating Recommender Model Training by Dynamically Skipping Stale Embeddings

    Authors: Yassaman Ebrahimzadeh Maboud, Muhammad Adnan, Divya Mahajan, Prashant J. Nair

    Abstract: Training recommendation models pose significant challenges regarding resource utilization and performance. Prior research has proposed an approach that categorizes embeddings into popular and non-popular classes to reduce the training time for recommendation models. We observe that, even among the popular embeddings, certain embeddings undergo rapid training and exhibit minimal subsequent variatio… ▽ More

    Submitted 21 March, 2024; originally announced April 2024.

  14. arXiv:2403.09054  [pdf, other

    cs.LG cs.AI cs.AR cs.CL

    Keyformer: KV Cache Reduction through Key Tokens Selection for Efficient Generative Inference

    Authors: Muhammad Adnan, Akhil Arunkumar, Gaurav Jain, Prashant J. Nair, Ilya Soloveychik, Purushotham Kamath

    Abstract: Transformers have emerged as the underpinning architecture for Large Language Models (LLMs). In generative language models, the inference process involves two primary phases: prompt processing and token generation. Token generation, which constitutes the majority of the computational workload, primarily entails vector-matrix multiplications and interactions with the Key-Value (KV) Cache. This phas… ▽ More

    Submitted 5 April, 2024; v1 submitted 13 March, 2024; originally announced March 2024.

    MSC Class: 68U35 ACM Class: I.2.7; C.0

    Journal ref: Proceedings of the 7th Annual Conference on Machine Learning and Systems (MLSys), 2024

  15. Determination of Trace Organic Contaminant Concentration via Machine Classification of Surface-Enhanced Raman Spectra

    Authors: Vishnu Jayaprakash, Jae Bem You, Chiranjeevi Kanike, Jinfeng Liu, Christopher McCallum, Xuehua Zhang

    Abstract: Accurate detection and analysis of traces of persistent organic pollutants in water is important in many areas, including environmental monitoring and food quality control, due to their long environmental stability and potential bioaccumulation. While conventional analysis of organic pollutants requires expensive equipment, surface enhanced Raman spectroscopy (SERS) has demonstrated great potentia… ▽ More

    Submitted 31 January, 2024; originally announced February 2024.

  16. arXiv:2310.01301  [pdf, ps, other

    cs.CE

    Short Time Angular Impulse Response of Rayleigh Beams

    Authors: Bidhayak Goswami, K. R. Jayaprakash, Anindya Chatterjee

    Abstract: In the dynamics of linear structures, the impulse response function is of fundamental interest. In some cases one examines the short term response wherein the disturbance is still local and the boundaries have not yet come into play, and for such short-time analysis the geometrical extent of the structure may be taken as unbounded. Here we examine the response of slender beams to angular impulses.… ▽ More

    Submitted 2 October, 2023; originally announced October 2023.

  17. arXiv:2308.14902  [pdf, other

    cs.IR cs.LG

    Ad-Rec: Advanced Feature Interactions to Address Covariate-Shifts in Recommendation Networks

    Authors: Muhammad Adnan, Yassaman Ebrahimzadeh Maboud, Divya Mahajan, Prashant J. Nair

    Abstract: Recommendation models are vital in delivering personalized user experiences by leveraging the correlation between multiple input features. However, deep learning-based recommendation models often face challenges due to evolving user behaviour and item features, leading to covariate shifts. Effective cross-feature learning is crucial to handle data distribution drift and adapting to changing user b… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

  18. arXiv:2307.02623  [pdf, other

    cs.LG cs.DC

    FLuID: Mitigating Stragglers in Federated Learning using Invariant Dropout

    Authors: Irene Wang, Prashant J. Nair, Divya Mahajan

    Abstract: Federated Learning (FL) allows machine learning models to train locally on individual mobile devices, synchronizing model updates via a shared server. This approach safeguards user privacy; however, it also generates a heterogeneous training environment due to the varying performance capabilities across devices. As a result, straggler devices with lower performance often dictate the overall traini… ▽ More

    Submitted 26 September, 2023; v1 submitted 5 July, 2023; originally announced July 2023.

    Comments: Accepted at the 37th Conference on Neural Information Processing Systems (NeurIPS), 2023

  19. arXiv:2304.13807  [pdf, other

    cs.NE

    A Survey on Solving and Discovering Differential Equations Using Deep Neural Networks

    Authors: Hyeonjung, Jung, Jayant Gupta, Bharat Jayaprakash, Matthew Eagon, Harish Panneer Selvam, Carl Molnar, William Northrop, Shashi Shekhar

    Abstract: Ordinary and partial differential equations (DE) are used extensively in scientific and mathematical domains to model physical systems. Current literature has focused primarily on deep neural network (DNN) based methods for solving a specific DE or a family of DEs. Research communities with a history of using DE models may view DNN-based differential equation solvers (DNN-DEs) as a faster and tran… ▽ More

    Submitted 19 June, 2023; v1 submitted 26 April, 2023; originally announced April 2023.

    Comments: Under review for ACM Computing Surveys journal. 29 pages

  20. Scalable and Secure Row-Swap: Efficient and Safe Row Hammer Mitigation in Memory Systems

    Authors: Jeonghyun Woo, Gururaj Saileshwar, Prashant J. Nair

    Abstract: As Dynamic Random Access Memories (DRAM) scale, they are becoming increasingly susceptible to Row Hammer. By rapidly activating rows of DRAM cells (aggressor rows), attackers can exploit inter-cell interference through Row Hammer to flip bits in neighboring rows (victim rows). A recent work, called Randomized Row-Swap (RRS), proposed proactively swapping aggressor rows with randomly selected rows… ▽ More

    Submitted 23 December, 2022; originally announced December 2022.

    Journal ref: The 29th IEEE International Symposium on High-Performance Computer Architecture (HPCA 2022)

  21. The Dirty Secret of SSDs: Embodied Carbon

    Authors: Swamit Tannu, Prashant J. Nair

    Abstract: Scalable Solid-State Drives (SSDs) have ushered in a transformative era in data storage and accessibility, spanning both data centers and portable devices. However, the strides made in scaling this technology can bear significant environmental consequences. On a global scale, a notable portion of semiconductor manufacturing relies on electricity derived from coal and natural gas sources. A strikin… ▽ More

    Submitted 28 September, 2023; v1 submitted 8 July, 2022; originally announced July 2022.

    Journal ref: Energy Informatics Review (Volume 3 Issue 3, October 2023)

  22. arXiv:2204.05436  [pdf, other

    cs.AR cs.AI cs.LG

    Heterogeneous Acceleration Pipeline for Recommendation System Training

    Authors: Muhammad Adnan, Yassaman Ebrahimzadeh Maboud, Divya Mahajan, Prashant J. Nair

    Abstract: Recommendation models rely on deep learning networks and large embedding tables, resulting in computationally and memory-intensive processes. These models are typically trained using hybrid CPU-GPU or GPU-only configurations. The hybrid mode combines the GPU's neural network acceleration with the CPUs' memory storage and supply for embedding tables but may incur significant CPU-to-GPU transfer tim… ▽ More

    Submitted 28 April, 2024; v1 submitted 11 April, 2022; originally announced April 2022.

    Comments: Accepted at The International Symposium on Computer Architecture (ISCA), 2024

  23. Accelerating Simulation of Quantum Circuits under Noise via Computational Reuse

    Authors: Meng Wang, Swamit Tannu, Prashant J. Nair

    Abstract: To realize the full potential of quantum computers, we must mitigate qubit errors by developing noise-aware algorithms, compilers, and architectures. Thus, simulating quantum programs on high-performance computing (HPC) systems with different noise models is a de facto tool researchers use. Unfortunately, noisy simulators iteratively execute a similar circuit for thousands of trials, thereby incur… ▽ More

    Submitted 19 May, 2025; v1 submitted 25 March, 2022; originally announced March 2022.

    Comments: Accepted for publication in the Proceedings of the 52nd Annual International Symposium on Computer Architecture (ISCA '25). Manuscript length: 15 pages

  24. arXiv:2111.01354  [pdf, other

    cs.HC

    SmartKC: Smartphone-based Corneal Topographer for Keratoconus Detection

    Authors: Siddhartha Gairola, Murtuza Bohra, Nadeem Shaheer, Navya Jayaprakash, Pallavi Joshi, Anand Balasubramaniam, Kaushik Murali, Nipun Kwatra, Mohit Jain

    Abstract: Keratoconus is a severe eye disease affecting the cornea (the clear, dome-shaped outer surface of the eye), causing it to become thin and develop a conical bulge. The diagnosis of keratoconus requires sophisticated ophthalmic devices which are non-portable and very expensive. This makes early detection of keratoconus inaccessible to large populations in low- and middle-income countries, making it… ▽ More

    Submitted 21 January, 2022; v1 submitted 1 November, 2021; originally announced November 2021.

    Comments: Change Log: + Fixed sim-K computation (updated Section 5.5.3); re-ran our pipeline with the updated sim-K values (updated Figure 7); + Conducted the comparative evaluation with doctors again (total 4 doctors), and got improved results (updated Section 7.2 and Table 2); [Note: This is an updated version of the paper that was accepted for publication in IMWUT 2021.]

  25. arXiv:2106.15034  [pdf, other

    cs.DS

    Approximation Schemes for Capacitated Vehicle Routing on Graphs of Bounded Treewidth, Bounded Doubling, or Highway Dimension

    Authors: Aditya Jayaprakash, Mohammad R. Salavatipour

    Abstract: In this paper, we present Approximation Schemes for Capacitated Vehicle Routing Problem (CVRP) on several classes of graphs. In CVRP, introduced by Dantzig and Ramser (1959), we are given a graph $G=(V,E)$ with metric edges costs, a depot $r\in V$, and a vehicle of bounded capacity $Q$. The goal is to find minimum cost collection of tours for the vehicle that returns to the depot, each visiting at… ▽ More

    Submitted 28 June, 2021; originally announced June 2021.

  26. arXiv:2104.04598  [pdf, other

    cs.SD cs.CV cs.LG eess.AS eess.IV

    Cross-Modal learning for Audio-Visual Video Parsing

    Authors: Jatin Lamba, Abhishek, Jayaprakash Akula, Rishabh Dabral, Preethi Jyothi, Ganesh Ramakrishnan

    Abstract: In this paper, we present a novel approach to the audio-visual video parsing (AVVP) task that demarcates events from a video separately for audio and visual modalities. The proposed parsing approach simultaneously detects the temporal boundaries in terms of start and end times of such events. We show how AVVP can benefit from the following techniques geared towards effective cross-modal learning:… ▽ More

    Submitted 21 June, 2021; v1 submitted 3 April, 2021; originally announced April 2021.

    Comments: Work accepted at Interspeech 2021

  27. arXiv:2103.05457  [pdf, other

    cs.IR

    Rudder: A Cross Lingual Video and Text Retrieval Dataset

    Authors: Jayaprakash A, Abhishek, Rishabh Dabral, Ganesh Ramakrishnan, Preethi Jyothi

    Abstract: Video retrieval using natural language queries requires learning semantically meaningful joint embeddings between the text and the audio-visual input. Often, such joint embeddings are learnt using pairwise (or triplet) contrastive loss objectives which cannot give enough attention to 'difficult-to-retrieve' samples during training. This problem is especially pronounced in data-scarce settings wher… ▽ More

    Submitted 9 March, 2021; originally announced March 2021.

  28. arXiv:2103.00686  [pdf, other

    cs.IR cs.AI cs.AR cs.LG

    Accelerating Recommendation System Training by Leveraging Popular Choices

    Authors: Muhammad Adnan, Yassaman Ebrahimzadeh Maboud, Divya Mahajan, Prashant J. Nair

    Abstract: Recommender models are commonly used to suggest relevant items to a user for e-commerce and online advertisement-based applications. These models use massive embedding tables to store numerical representation of items' and users' categorical variables (memory intensive) and employ neural networks (compute intensive) to generate final recommendations. Training these large-scale recommendation model… ▽ More

    Submitted 28 September, 2021; v1 submitted 28 February, 2021; originally announced March 2021.

    ACM Class: I.2.6; C.5.0

    Journal ref: Proceedings of the VLDB Endowment, 2022

  29. arXiv:2006.08361  [pdf, other

    cs.CY stat.ML

    An Unsupervised Machine Learning Approach to Assess the ZIP Code Level Impact of COVID-19 in NYC

    Authors: Fadoua Khmaissia, Pegah Sagheb Haghighi, Aarthe Jayaprakash, Zhenwei Wu, Sokratis Papadopoulos, Yuan Lai, Freddy T. Nguyen

    Abstract: New York City has been recognized as the world's epicenter of the novel Coronavirus pandemic. To identify the key inherent factors that are highly correlated to the Increase Rate of COVID-19 new cases in NYC, we propose an unsupervised machine learning framework. Based on the assumption that ZIP code areas with similar demographic, socioeconomic, and mobility patterns are likely to experience simi… ▽ More

    Submitted 18 September, 2020; v1 submitted 10 June, 2020; originally announced June 2020.

    Comments: Presented at ICML 2020 Workshop on the Healthcare Systems, Population Health, and the Role of Health-Tech

  30. arXiv:1909.00553  [pdf, ps, other

    cs.AR cs.DC cs.PF eess.SY

    Touché: Towards Ideal and Efficient Cache Compression By Mitigating Tag Area Overheads

    Authors: Seokin Hong, Bulent Abali, Alper Buyuktosunoglu, Michael B. Healy, Prashant J. Nair

    Abstract: Compression is seen as a simple technique to increase the effective cache capacity. Unfortunately, compression techniques either incur tag area overheads or restrict data placement to only include neighboring compressed cache blocks to mitigate tag area overheads. Ideally, we should be able to place arbitrary compressed cache blocks without any placement restrictions and tag area overheads. This… ▽ More

    Submitted 2 September, 2019; originally announced September 2019.

    Comments: Keywords: Compression, Caches, Tag Array, Data Array, Hashing

    Journal ref: Proceedings of the 52nd Annual IEEE/ACM International Symposium on Microarchitecture, October 2019, Pages 453-465

  31. Randomized ICA and LDA Dimensionality Reduction Methods for Hyperspectral Image Classification

    Authors: Chippy Jayaprakash, Bharath Bhushan Damodaran, Sowmya V, K P Soman

    Abstract: Dimensionality reduction is an important step in processing the hyperspectral images (HSI) to overcome the curse of dimensionality problem. Linear dimensionality reduction methods such as Independent component analysis (ICA) and Linear discriminant analysis (LDA) are commonly employed to reduce the dimensionality of HSI. These methods fail to capture non-linear dependency in the HSI data, as data… ▽ More

    Submitted 19 April, 2018; originally announced April 2018.

    Comments: Submitted IEEE JSTARS

    Journal ref: J. of Applied Remote Sensing, 14(3), 036507 (2020)

  32. arXiv:1802.06970  [pdf, other

    cs.NI cs.CR

    ISA-Based Trusted Network Functions And Server Applications In The Untrusted Cloud

    Authors: Spyridon Mastorakis, Tahrina Ahmed, Jayaprakash Pisharath

    Abstract: Nowadays, enterprises widely deploy Network Functions (NFs) and server applications in the cloud. However, processing of sensitive data and trusted execution cannot be securely deployed in the untrusted cloud. Cloud providers themselves could accidentally leak private information (e.g., due to misconfigurations) or rogue users could exploit vulnerabilities of the providers' systems to compromise e… ▽ More

    Submitted 20 February, 2018; originally announced February 2018.

  33. arXiv:1704.03991  [pdf, ps, other

    cs.AR cs.ET

    Architectural Techniques to Enable Reliable and Scalable Memory Systems

    Authors: Prashant J. Nair

    Abstract: High capacity and scalable memory systems play a vital role in enabling our desktops, smartphones, and pervasive technologies like Internet of Things (IoT). Unfortunately, memory systems are becoming increasingly prone to faults. This is because we rely on technology scaling to improve memory density, and at small feature sizes, memory cells tend to break easily. Today, memory reliability is seen… ▽ More

    Submitted 13 April, 2017; originally announced April 2017.

    Comments: PhD thesis, Georgia Institute of Technology (May 2017)

  34. arXiv:1603.06297  [pdf

    cs.CR

    Notes on "An Effective ECC based User Access Control Scheme with Attribute based Encryption for WSN"

    Authors: Mrudula S, ChandraMouli Reddy, Lakshmi Narayana, JayaPrakash, Chandra Sekhar Vorugunti

    Abstract: The rapid growth of networking and communication technologies results in amalgamation of 'Internet of Things' and 'Wireless sensor networks' to form WSNIT. WSNIT facilitates the WSN to connect dynamically to Internet and exchange the data with the external world. The critical data stored in sensor nodes related to patient health, environment can be accessed by attackers via insecure internet. To c… ▽ More

    Submitted 18 March, 2016; originally announced March 2016.

    Comments: AIMOC 2016 Jadavpur university

  35. Optimal Energy Consumption Model for Smart Grid Households with Energy Storage

    Authors: Jayaprakash Rajasekharan, Visa Koivunen

    Abstract: In this paper, we propose to model the energy consumption of smart grid households with energy storage systems as an intertemporal trading economy. Intertemporal trade refers to transaction of goods across time when an agent, at any time, is faced with the option of consuming or saving with the aim of using the savings in the future or spending the savings from the past. Smart homes define optimal… ▽ More

    Submitted 12 October, 2013; originally announced October 2013.

    Comments: 26 pages, 9 figures, 34 equations

  36. arXiv:1112.1520  [pdf, ps, other

    cs.GT cs.IT cs.NI

    Cooperative Game-Theoretic Approach to Spectrum Sharing in Cognitive Radios

    Authors: Jayaprakash Rajasekharan, Jan Eriksson, Visa Koivunen

    Abstract: In this paper, a novel framework for normative modeling of the spectrum sensing and sharing problem in cognitive radios (CRs) as a transferable utility (TU) cooperative game is proposed. Secondary users (SUs) jointly sense the spectrum and cooperatively detect the primary user (PU) activity for identifying and accessing unoccupied spectrum bands. The games are designed to be balanced and super-add… ▽ More

    Submitted 7 December, 2011; originally announced December 2011.

    Comments: 11 pages, 9 figures, 6 tables, journal