Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–9 of 9 results for author: Bajaj, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.17364  [pdf, other

    cs.IT cs.CR

    Reliability on QR codes and Reed-Solomon codes

    Authors: Bhavuk Sikka Bajaj

    Abstract: This study addresses the use of Reed-Solomon error correction codes in QR codes to enhance resilience against failures. To fully grasp this approach, a basic cryptographic context is provided, necessary for understanding Reed-Solomon codes. The study begins by defining a code and explores key outcomes for codes with additional properties, such as linearity. The theoretical framework is further dev… ▽ More

    Submitted 24 July, 2024; originally announced July 2024.

  2. arXiv:2406.00552  [pdf, other

    cs.LG cs.DC

    Graph Neural Network Training Systems: A Performance Comparison of Full-Graph and Mini-Batch

    Authors: Saurabh Bajaj, Hui Guan, Marco Serafini

    Abstract: Graph Neural Networks (GNNs) have gained significant attention in recent years due to their ability to learn representations of graph structured data. Two common methods for training GNNs are mini-batch training and full-graph training. Since these two methods require different training pipelines and systems optimizations, two separate categories of GNN training systems emerged, each tailored for… ▽ More

    Submitted 8 June, 2024; v1 submitted 1 June, 2024; originally announced June 2024.

    Comments: 12 pages, 1 appendix, 8 Figures, 16 Tables, Graph Neural Network, Graph Neural Networks, Full-graph training, Mini-batch training, full-batch training, distributed training, performance, epoch time, time to accuracy, accuracy

  3. arXiv:2403.15667  [pdf, other

    cs.IR

    QueryExplorer: An Interactive Query Generation Assistant for Search and Exploration

    Authors: Kaustubh D. Dhole, Shivam Bajaj, Ramraj Chandradevan, Eugene Agichtein

    Abstract: Formulating effective search queries remains a challenging task, particularly when users lack expertise in a specific domain or are not proficient in the language of the content. Providing example documents of interest might be easier for a user. However, such query-by-example scenarios are prone to concept drift, and the retrieval effectiveness is highly sensitive to the query generation method,… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

    Comments: NAACL 2024 Demonstration Track

  4. arXiv:2402.08747  [pdf, other

    cs.GT eess.SY

    Rationality of Learning Algorithms in Repeated Normal-Form Games

    Authors: Shivam Bajaj, Pranoy Das, Yevgeniy Vorobeychik, Vijay Gupta

    Abstract: Many learning algorithms are known to converge to an equilibrium for specific classes of games if the same learning algorithm is adopted by all agents. However, when the agents are self-interested, a natural question is whether agents have a strong incentive to adopt an alternative learning algorithm that yields them greater individual utility. We capture such incentives as an algorithm's rational… ▽ More

    Submitted 13 February, 2024; originally announced February 2024.

  5. arXiv:2401.14109  [pdf, other

    cs.CL cs.AI cs.LG quant-ph

    CompactifAI: Extreme Compression of Large Language Models using Quantum-Inspired Tensor Networks

    Authors: Andrei Tomut, Saeed S. Jahromi, Abhijoy Sarkar, Uygar Kurt, Sukhbinder Singh, Faysal Ishtiaq, Cesar Muñoz, Prabdeep Singh Bajaj, Ali Elborady, Gianni del Bimbo, Mehrazin Alizadeh, David Montero, Pablo Martin-Ramiro, Muhammad Ibrahim, Oussama Tahiri Alaoui, John Malcolm, Samuel Mugel, Roman Orus

    Abstract: Large Language Models (LLMs) such as ChatGPT and LlaMA are advancing rapidly in generative Artificial Intelligence (AI), but their immense size poses significant challenges, such as huge training and inference costs, substantial energy demands, and limitations for on-site deployment. Traditional compression methods such as pruning, distillation, and low-rank approximation focus on reducing the eff… ▽ More

    Submitted 13 May, 2024; v1 submitted 25 January, 2024; originally announced January 2024.

    Comments: 5 pages, 4 figures, 2 tables, and supplementary information of 2 pages and 1 figure. Revised version with new benchmarks for LlaMA2-7B

  6. arXiv:2211.05100  [pdf, other

    cs.CL

    BLOOM: A 176B-Parameter Open-Access Multilingual Language Model

    Authors: BigScience Workshop, :, Teven Le Scao, Angela Fan, Christopher Akiki, Ellie Pavlick, Suzana Ilić, Daniel Hesslow, Roman Castagné, Alexandra Sasha Luccioni, François Yvon, Matthias Gallé, Jonathan Tow, Alexander M. Rush, Stella Biderman, Albert Webson, Pawan Sasanka Ammanamanchi, Thomas Wang, Benoît Sagot, Niklas Muennighoff, Albert Villanova del Moral, Olatunji Ruwase, Rachel Bawden, Stas Bekman, Angelina McMillan-Major , et al. (369 additional authors not shown)

    Abstract: Large language models (LLMs) have been shown to be able to perform new tasks based on a few demonstrations or natural language instructions. While these capabilities have led to widespread adoption, most LLMs are developed by resource-rich organizations and are frequently kept from the public. As a step towards democratizing this powerful technology, we present BLOOM, a 176B-parameter open-access… ▽ More

    Submitted 27 June, 2023; v1 submitted 9 November, 2022; originally announced November 2022.

  7. arXiv:2110.04667  [pdf, other

    cs.DS eess.SY

    Competitive Perimeter Defense of Conical Environments

    Authors: Shivam Bajaj, Eric Torng, Shaunak D. Bopardikar, Alexander Von Moll, Isaac Weintraub, Eloy Garcia, David W. Casbeer

    Abstract: We consider a perimeter defense problem in a planar conical environment in which a single vehicle, having a finite capture radius, aims to defend a concentric perimeter from mobile intruders. The intruders are arbitrarily released at the circumference of the environment and they move radially toward the perimeter with fixed speed. We present a competitive analysis approach to this problem by measu… ▽ More

    Submitted 29 March, 2022; v1 submitted 9 October, 2021; originally announced October 2021.

    Comments: Version 2 has additional images

  8. arXiv:2108.04663  [pdf

    eess.IV cs.CV cs.NE

    Deep Learning for Breast Cancer Classification: Enhanced Tangent Function

    Authors: Ashu Thapa, Abeer Alsadoon, P. W. C. Prasad, Simi Bajaj, Omar Hisham Alsadoon, Tarik A. Rashid, Rasha S. Ali, Oday D. Jerew

    Abstract: Background and Aim: Recently, deep learning using convolutional neural network has been used successfully to classify the images of breast cells accurately. However, the accuracy of manual classification of those histopathological images is comparatively low. This research aims to increase the accuracy of the classification of breast cancer images by utilizing a Patch-Based Classifier (PBC) along… ▽ More

    Submitted 1 July, 2021; originally announced August 2021.

    Comments: 19

    Journal ref: Computational Intelligence, 2021

  9. arXiv:1501.06508  [pdf, ps, other

    cs.CR

    Practical Foundations of History Independence

    Authors: Sumeet Bajaj, Anrin Chakraborti, Radu Sion

    Abstract: The way data structures organize data is often a function of the sequence of past operations. The organization of data is referred to as the data structure's state, and the sequence of past operations constitutes the data structure's history. A data structure state can therefore be used as an oracle to derive information about its history. As a result, for history-sensitive applications, such as p… ▽ More

    Submitted 15 September, 2015; v1 submitted 26 January, 2015; originally announced January 2015.