Information & computer science publications
-
Anomaly Detection and Diagnosis for Automatic Radio Network Verification
This paper focuses on the verification problem, proposing a novel framework that uses anomaly detection and diagnosis techniques that operate within a specified spatial scope.
-
Snap-N-Eat: Food Recognition and Nutrition Estimation on a Smartphone
We present snap-n-eat, a mobile food recognition system. The system can recognize food and estimate the calorific and nutrition content of foods automatically without any user intervention.
-
AKI in Hospitalized Children: Comparing the pRIFLE, AKIN, and KDIGO Definitions
This study applied the Pediatric RIFLE, AKI Network, and Kidney Disease Improving Global Outcomes criteria to a cohort of hospitalizations to compare AKI incidence and outcomes in ICU and non-ICU…
-
Conflict-Directed Graph Coverage
In this paper, we open the black box and devise a new algorithm for this problem domain that we call conflict-directed graph coverage.
-
Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption without Obfuscation
We construct the first implementable encryption system supporting greater-than comparisons on encrypted data that provides the “best-possible” semantic security.
-
Channel and Noise Robustness of Articulatory Features in a Deep Neural Net Based Speech Recognition System
This work presents a deep neural network (DNN)—hidden Markov model (HMM) based acoustic model where articulatory features are used in addition to mel-frequency cepstral coefficients (MFCC) for the Aurora-4 speech recognition task.
-
Reasoning About Interruption of Biological Processes
Our work is motivated by the vision of automated asking and answering of questions related to a biology textbook—a capability which requires application of abstract reasoning patterns.
-
Beyond the PDP-11: Architectural Support for a Memory-Safe C Abstract Machine
We propose a new memory-safe interpretation of the C abstract machine that provides stronger protection to benefit security and debugging.
-
Blueswitch: Enabling Provably Consistent Configuration of Network Switches
In this paper, we focus on the behavior of individual switches, and demonstrate that even simple rule updates result in inconsistent packet switching in multi-table datapaths.
-
Marine Tar Residues: A Review
Methods of detection and removal of marine tar residues and their possible ecological effects are discussed, in addition to topics of marine tar research that warrant further investigation.
-
A Case Study on Occurrence of an Unusual Structure in the Sodium Layer over Gadanki, India
An investigation is carried out combining the data from multiple instruments that include the meteor wind radar over Thiruvananthapuram, India and the SABER instrument onboard the TIMED satellite.
-
Learning grounded finite-state representations from unstructured demonstrations
We present a series of algorithms that draw from recent advances in Bayesian nonparametric statistics and control theory to automatically detect and leverage repeated structure at multiple levels of abstraction…