Browsing Journal Articles by Title

Browsing Journal Articles by Title

Sort by: Order: Results:

  • Pandey, Pradumn Kumar; Singh, Mayank; Goyal, Pawan; Mukherjee, Animesh; Chakrabarti, Soumen (Elsevier, 2019-12)
  • Bhatia, Udit (Wiley, 2019-05)
    Open science practices such as publishing data and code are transforming water science by enabling synthesis and enhancing reproducibility. However, as research increasingly bridges the physical and social science domains ...
  • Goyal, Navin; Gupta, Manoj (Elsevier, 2019-01)
    In their seminal paper Sleator and Tarjan (1985) [15], the authors conjectured that the splay tree is a dynamically optimal binary search tree (BST). In spite of decades of intensive research, the problem remains open. ...
  • Kalainathan, Diviyan; Goudet, Olivier; Dutta, Ritik (Journal of Machine Learning Research, 2020-03)
    This paper presents a new open source Python framework for causal discovery from observational data and domain background knowledge, aimed at causal graph and causal mechanism modeling. The cdt package implements an ...
  • Das, Bireswar; Scharpfenecker, Patrick; Toran, Jacobo (Elsevier, 2017-04)
    It is well-known that succinct encodings of computational problems – using circuits or formulas to encode large instances – generally result in an exponential complexity blow-up compared to their original complexity. We ...
  • Banerjee, Sandip; Misra, Neeldhara; Nandy, Subhas C. (Elsevier, 2018-03)
    In this paper, we study the Shortest Color Spanning - Intervals problem, and related generalizations, namely Smallest Color Spanning - Squares and Smallest Color Spanning - Circles. The generic setting is the following: ...
  • Arvind, V.; Das, Bireswar; Kobler, Johannes; Toda, Seinosuke (Springer, 2015-01)
    We describe a fixed parameter tractable (fpt) algorithm for Colored Hypergraph Isomorphism, denoted CHI, which has running time (2 b N) O(1), where the parameter b is the maximum size of the color classes of the given ...
  • Deya, Palash; Misra, Neeldhara; Narahari, Y. (Elsevier, 2018-03)
    The Coalitional Manipulation problem has been studied extensively in the literature for many voting rules. However, most studies have focused on the complete information setting, wherein the manipulators know the votes of ...
  • Chawla, Manisha; Miyapuram, Krishna Prasad (Elsevier, 2018-11)
    Real-world information is primarily sensory in nature, and understandably people attach value to the sensory information to prepare for appropriate behavioral responses. This review presents research from value-based, ...
  • Saxena, Anupam; Pal, Om; Saquib, Zia; Patel, Dhiren R. (Eswar Publications, 2010-03)
    Security of SCADA (supervisory Control and Data Acquisition) has become a challenging issue today because of its connectivity with the outside world and remote access to the system. One major challenge in the SCADA systems ...
  • Bhimani, Janki; Yang, Zhengyu; Mi, Ningfang; Yang, Jingpei; Xu, Qiumin; Awasthi, Manu; Pandurangan, Rajinikanth; Balakrishnan, Vijay (IEEE xplore digital library, 2018-02)
    By using fast back-end storage, performance benefits of a lightweight container platform can be leveraged with quick I/O response. Nevertheless, the performance of simultaneously executing multiple instances of same or ...
  • Cormode, Graham; Dasgupta, Anirban; Goyal, Amit; Lee, Chi Hoon (Public Library of Science, 2018-01)
    Many modern applications of AI such as web search, mobile browsing, image processing, and natural language processing rely on finding similar items from a large database of complex objects. Due to the very large scale of ...
  • Agnihotri, Apoorv; Batra, Nipun (Distill Working Group, 2020-05)
  • Garg, Dinesh; Jain, Alankar; Borkar, Vivek (Springer Vienna, 2016-12)
    We consider the problem of inferring the source of a rumor in a given large network. We assume that the rumor propagates in the network through a discrete time susceptible-infected model. Input to our problem includes ...
  • Goyal, Shruti; Miyapuram, Krishna Prasad (Frontiers Media, 2019-04)
    Our understanding of the decisions made under scenarios where both descriptive and experience-based information are available is very limited. Underweighting of small probabilities was observed in the gain domain when both ...
  • Dey, Palash; Misra, Neeldhara; Narahari, Y. (Elsevier, 2017-05)
    Bribery in elections is an important problem in computational social choice theory. We introduce and study two important special cases of the classical $Bribery problem, namely, Frugal-bribery and Frugal-$bribery where the ...
  • Baswana, Surender; Gupta, Manoj; Sen, Sandeep (Society for Industrial and Applied Mathematics, 2018-01)
    We present an algorithm for maintaining a maximal matching in a graph under addition and deletion of edges. Our algorithm is randomized and it takes expected amortized O(log n) time for each edge update, where n is the ...
  • Yale, Andrew; Dash, Saloni; Dutta, Ritik; Guyon, Isabelle; Pavao, Adrien; Bennett, Kristin P. (Elsevier, 2020-04)
    We develop metrics for measuring the quality of synthetic health data for both education and research. We use novel and existing metrics to capture a synthetic dataset�s resemblance, privacy, utility and footprint. Using ...
  • Patel, Dhiren R.; Limkar, Suresh (Foundation of Computer Science, 2010-09)
    We are moving towards an era where location information will be necessary for access control. The use of location information can be used for enhancing the security of an application, for critical applications, such as the ...
  • Moody, Dustin; Paul, Souradyuti; Smith-Tone, Daniel (Springer, 2016-05)
    Indifferentiability security of a hash mode of operation guarantees the mode's resistance against all generic attacks. It is also useful to establish the security of protocols that use hash functions as random functions. ...

Search Digital Repository


Browse

My Account