Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–50 of 103 results for author: Kannan, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.01459  [pdf, other

    cs.CR

    Unconditionally Safe Light Client

    Authors: Niusha Moshrefi, Peiyao Sheng, Soubhik Deb, Sreeram Kannan, Pramod Viswanath

    Abstract: Blockchain applications often rely on lightweight clients to access and verify on-chain data efficiently without the need to run a resource-intensive full node. These light clients must maintain robust security to protect the blockchain's integrity for users of applications built upon it, achieving this with minimal resources and without significant latency. Moreover, different applications have v… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  2. arXiv:2403.02508  [pdf, other

    eess.SY cs.RO math.DS

    Collision Avoidance and Geofencing for Fixed-wing Aircraft with Control Barrier Functions

    Authors: Tamas G. Molnar, Suresh K. Kannan, James Cunningham, Kyle Dunlap, Kerianne L. Hobbs, Aaron D. Ames

    Abstract: Safety-critical failures often have fatal consequences in aerospace control. Control systems on aircraft, therefore, must ensure the strict satisfaction of safety constraints, preferably with formal guarantees of safe behavior. This paper establishes the safety-critical control of fixed-wing aircraft in collision avoidance and geofencing tasks. A control framework is developed wherein a run-time a… ▽ More

    Submitted 6 March, 2024; v1 submitted 4 March, 2024; originally announced March 2024.

    Comments: Submitted to the IEEE Transactions on Control System Technology. 13 pages, 7 figures

  3. arXiv:2401.13082  [pdf, other

    cs.CV cs.RO

    PlaceFormer: Transformer-based Visual Place Recognition using Multi-Scale Patch Selection and Fusion

    Authors: Shyam Sundar Kannan, Byung-Cheol Min

    Abstract: Visual place recognition is a challenging task in the field of computer vision, and autonomous robotics and vehicles, which aims to identify a location or a place from visual inputs. Contemporary methods in visual place recognition employ convolutional neural networks and utilize every region within the image for the place recognition task. However, the presence of dynamic and distracting elements… ▽ More

    Submitted 27 May, 2024; v1 submitted 23 January, 2024; originally announced January 2024.

    Comments: Accepted for publication in Robotics and Automation Letters

  4. arXiv:2401.05797  [pdf, other

    cs.CR cs.NI

    STAKESURE: Proof of Stake Mechanisms with Strong Cryptoeconomic Safety

    Authors: Soubhik Deb, Robert Raynor, Sreeram Kannan

    Abstract: As of July 15, 2023, Ethererum, which is a Proof-of-Stake (PoS) blockchain [1] has around 410 Billion USD in total assets on chain (popularly referred to as total-value-locked, TVL) but has only 33 Billion USD worth of ETH staked in securing the underlying consensus of the chain [2]. A preliminary analysis might suggest that as the amount staked is far less (11x less) than the value secured, the E… ▽ More

    Submitted 11 January, 2024; originally announced January 2024.

    Comments: 18 pages, 3 figures

  5. arXiv:2401.02030  [pdf, other

    cs.CR cs.NI

    Travelers: A scalable fair ordering BFT system

    Authors: Bowen Xue, Sreeram Kannan

    Abstract: Many blockchain platform are subject to maximal value extraction (MEV), and users on the platform are losing money while sending transactions because the transaction order can be manipulated to extract value from them. Consensus protocols have been augmented with different notion of fair ordering in order to counter the problem. Out of all practical protocols, the most efficient BFT consensus requ… ▽ More

    Submitted 3 January, 2024; originally announced January 2024.

  6. arXiv:2312.08748  [pdf, other

    cs.DC cs.ET cs.NE quant-ph

    All-to-all reconfigurability with sparse and higher-order Ising machines

    Authors: Srijan Nikhar, Sidharth Kannan, Navid Anjum Aadit, Shuvro Chowdhury, Kerem Y. Camsari

    Abstract: Domain-specific hardware to solve computationally hard optimization problems has generated tremendous excitement recently. Here, we evaluate probabilistic bit (p-bit) based on Ising Machines (IM) or p-computers with a benchmark combinatorial optimization problem, namely the 3-regular 3-XOR Satisfiability (3R3X). The 3R3X problem has a glassy energy landscape, and it has recently been used to bench… ▽ More

    Submitted 21 May, 2024; v1 submitted 21 November, 2023; originally announced December 2023.

    Comments: First three authors are equally contributing

  7. arXiv:2310.04652  [pdf, other

    cs.LG

    Oracle Efficient Algorithms for Groupwise Regret

    Authors: Krishna Acharya, Eshwar Ram Arunachaleswaran, Sampath Kannan, Aaron Roth, Juba Ziani

    Abstract: We study the problem of online prediction, in which at each time step $t$, an individual $x_t$ arrives, whose label we must predict. Each individual is associated with various groups, defined based on their features such as age, sex, race etc., which may intersect. Our goal is to make predictions that have regret guarantees not just overall but also simultaneously on each sub-sequence comprised of… ▽ More

    Submitted 6 October, 2023; originally announced October 2023.

  8. arXiv:2309.16031  [pdf, other

    cs.RO

    DynaCon: Dynamic Robot Planner with Contextual Awareness via LLMs

    Authors: Gyeongmin Kim, Taehyeon Kim, Shyam Sundar Kannan, Vishnunandan L. N. Venkatesh, Donghan Kim, Byung-Cheol Min

    Abstract: Mobile robots often rely on pre-existing maps for effective path planning and navigation. However, when these maps are unavailable, particularly in unfamiliar environments, a different approach become essential. This paper introduces DynaCon, a novel system designed to provide mobile robots with contextual awareness and dynamic adaptability during navigation, eliminating the reliance of traditiona… ▽ More

    Submitted 27 September, 2023; originally announced September 2023.

    Comments: Submitted to ICRA 2024

  9. arXiv:2309.10062  [pdf, other

    cs.RO

    SMART-LLM: Smart Multi-Agent Robot Task Planning using Large Language Models

    Authors: Shyam Sundar Kannan, Vishnunandan L. N. Venkatesh, Byung-Cheol Min

    Abstract: In this work, we introduce SMART-LLM, an innovative framework designed for embodied multi-robot task planning. SMART-LLM: Smart Multi-Agent Robot Task Planning using Large Language Models (LLMs), harnesses the power of LLMs to convert high-level task instructions provided as input into a multi-robot task plan. It accomplishes this by executing a series of stages, including task decomposition, coal… ▽ More

    Submitted 22 March, 2024; v1 submitted 18 September, 2023; originally announced September 2023.

    Comments: Submitted to IROS 2024

  10. arXiv:2307.16562  [pdf, other

    cs.CR

    SAKSHI: Decentralized AI Platforms

    Authors: Suma Bhat, Canhui Chen, Zerui Cheng, Zhixuan Fang, Ashwin Hebbar, Sreeram Kannan, Ranvir Rana, Peiyao Sheng, Himanshu Tyagi, Pramod Viswanath, Xuechao Wang

    Abstract: Large AI models (e.g., Dall-E, GPT4) have electrified the scientific, technological and societal landscape through their superhuman capabilities. These services are offered largely in a traditional web2.0 format (e.g., OpenAI's GPT4 service). As more large AI models proliferate (personalizing and specializing to a variety of domains), there is a tremendous need to have a neutral trust-free platfor… ▽ More

    Submitted 31 July, 2023; originally announced July 2023.

    Comments: 23 pages, 9 figures

  11. arXiv:2307.10185  [pdf, other

    cs.CR cs.NI eess.SY

    BigDipper: A hyperscale BFT system with short term censorship resistance

    Authors: Bowen Xue, Soubhik Deb, Sreeram Kannan

    Abstract: Byzantine-fault-tolerant (BFT) protocols underlie a variety of decentralized applications including payments, auctions, data feed oracles, and decentralized social networks\cite{chainlink,lens}. In most leader-based BFT protocols, an important property that has been missing is the censorship resistance of transaction in the short term. The protocol should provide inclusion guarantees in the next b… ▽ More

    Submitted 24 September, 2023; v1 submitted 3 July, 2023; originally announced July 2023.

  12. arXiv:2303.09761  [pdf, other

    cs.NI

    Goldfish: Peer selection using Matrix completion in unstructured P2P network

    Authors: Bowen Xue, Yifan Mao, Shaileshh Bojja Venkatakrishnan, Sreeram Kannan

    Abstract: Peer-to-peer (P2P) networks underlie a variety of decentralized paradigms including blockchains, distributed file storage and decentralized domain name systems. A central primitive in P2P networks is the peer selection algorithm, which decides how a node should select a fixed number of neighbors to connect with. In this paper, we consider the design of a peer-selection algorithm for unstructured P… ▽ More

    Submitted 16 March, 2023; originally announced March 2023.

  13. arXiv:2303.04284  [pdf, other

    cs.RO

    UPPLIED: UAV Path Planning for Inspection through Demonstration

    Authors: Shyam Sundar Kannan, Vishnunandan L. N. Venkatesh, Revanth Krishna Senthilkumaran, Byung-Cheol Min

    Abstract: In this paper, a new demonstration-based path-planning framework for the visual inspection of large structures using UAVs is proposed. We introduce UPPLIED: UAV Path PLanning for InspEction through Demonstration, which utilizes a demonstrated trajectory to generate a new trajectory to inspect other structures of the same kind. The demonstrated trajectory can inspect specific regions of the structu… ▽ More

    Submitted 24 July, 2023; v1 submitted 7 March, 2023; originally announced March 2023.

    Comments: Accepted for publication in IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2023), Detroit, Michigan, USA

  14. arXiv:2303.00920  [pdf, other

    cs.MA

    Beacon-based Distributed Structure Formation in Multi-agent Systems

    Authors: Tamzidul Mina, Wonse Jo, Shyam S. Kannan, Byung-Cheol Min

    Abstract: Autonomous shape and structure formation is an important problem in the domain of large-scale multi-agent systems. In this paper, we propose a 3D structure representation method and a distributed structure formation strategy where settled agents guide free moving agents to a prescribed location to settle in the structure. Agents at the structure formation frontier looking for neighbors to settle a… ▽ More

    Submitted 28 July, 2023; v1 submitted 1 March, 2023; originally announced March 2023.

    Comments: 8 pages, 6 figures, accepted for publication in IROS 2023. A link to the simulation videos is provided under the Validation section

  15. arXiv:2301.03834  [pdf, other

    q-bio.GN cs.OH

    HQAlign: Aligning nanopore reads for SV detection using current-level modeling

    Authors: Dhaivat Joshi, Suhas Diggavi, Mark J. P. Chaisson, Sreeram Kannan

    Abstract: Motivation: Detection of structural variants (SV) from the alignment of sample DNA reads to the reference genome is an important problem in understanding human diseases. Long reads that can span repeat regions, along with an accurate alignment of these long reads play an important role in identifying novel SVs. Long read sequencers such as nanopore sequencing can address this problem by providing… ▽ More

    Submitted 10 January, 2023; originally announced January 2023.

  16. arXiv:2210.11571  [pdf, other

    cs.CR

    TrustBoost: Boosting Trust among Interoperable Blockchains

    Authors: Peiyao Sheng, Xuechao Wang, Sreeram Kannan, Kartik Nayak, Pramod Viswanath

    Abstract: Currently there exist many blockchains with weak trust guarantees, limiting applications and participation. Existing solutions to boost the trust using a stronger blockchain, e.g., via checkpointing, requires the weaker blockchain to give up sovereignty. In this paper, we propose a family of protocols in which multiple blockchains interact to create a combined ledger with boosted trust. We show th… ▽ More

    Submitted 20 September, 2023; v1 submitted 20 October, 2022; originally announced October 2022.

    Comments: Forthcoming in ACM Conference on Computer and Communications Security (CCS) 2023

  17. arXiv:2209.07375  [pdf, other

    cs.GT

    Wealth Dynamics Over Generations: Analysis and Interventions

    Authors: Krishna Acharya, Eshwar Ram Arunachaleswaran, Sampath Kannan, Aaron Roth, Juba Ziani

    Abstract: We present a stylized model with feedback loops for the evolution of a population's wealth over generations. Individuals have both talent and wealth: talent is a random variable distributed identically for everyone, but wealth is a random variable that is dependent on the population one is born into. Individuals then apply to a downstream agent, which we treat as a university throughout the paper… ▽ More

    Submitted 15 September, 2022; originally announced September 2022.

  18. Optimal Bootstrapping of PoW Blockchains

    Authors: Ranvir Rana, Dimitris Karakostas, Sreeram Kannan, Aggelos Kiayias, Pramod Viswanath

    Abstract: Proof of Work (PoW) blockchains are susceptible to adversarial majority mining attacks in the early stages due to incipient participation and corresponding low net hash power. Bootstrapping ensures safety and liveness during the transient stage by protecting against a majority mining attack, allowing a PoW chain to grow the participation base and corresponding mining hash power. Liveness is especi… ▽ More

    Submitted 22 August, 2022; originally announced August 2022.

  19. arXiv:2207.08392  [pdf, other

    cs.CR

    Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities

    Authors: Ertem Nusret Tas, David Tse, Fangyu Gai, Sreeram Kannan, Mohammad Ali Maddah-Ali, Fisher Yu

    Abstract: Bitcoin is the most secure blockchain in the world, supported by the immense hash power of its Proof-of-Work miners. Proof-of-Stake chains are energy-efficient, have fast finality but face several security issues: susceptibility to non-slashable long-range safety attacks, low liveness resilience and difficulty to bootstrap from low token valuation. We show that these security issues are inherent i… ▽ More

    Submitted 12 May, 2023; v1 submitted 18 July, 2022; originally announced July 2022.

    Comments: Forthcoming in IEEE Symposium on Security and Privacy 2023

  20. arXiv:2206.07672  [pdf, other

    cs.DS

    Reconstructing Ultrametric Trees from Noisy Experiments

    Authors: Eshwar Ram Arunachaleswaran, Anindya De, Sampath Kannan

    Abstract: The problem of reconstructing evolutionary trees or phylogenies is of great interest in computational biology. A popular model for this problem assumes that we are given the set of leaves (current species) of an unknown binary tree and the results of `experiments' on triples of leaves (a,b,c), which return the pair with the deepest least common ancestor. If the tree is assumed to be an ultrametric… ▽ More

    Submitted 15 June, 2022; originally announced June 2022.

  21. arXiv:2205.15320  [pdf, other

    econ.GN cs.LG

    Payday loans -- blessing or growth suppressor? Machine Learning Analysis

    Authors: Rohith Mahadevan, Sam Richard, Kishore Harshan Kumar, Jeevitha Murugan, Santhosh Kannan, Saaisri, Tarun, Raja CSP Raman

    Abstract: The upsurge of real estate involves a variety of factors that have got influenced by many domains. Indeed, the unrecognized sector that would affect the economy for which regulatory proposals are being drafted to keep this in control is the payday loans. This research paper revolves around the impact of payday loans in the real estate market. The research paper draws a first-hand experience of obt… ▽ More

    Submitted 30 May, 2022; originally announced May 2022.

    Comments: 8 pages, 8 figures

  22. arXiv:2205.04876  [pdf, other

    stat.ML cs.LG

    Turtle Score -- Similarity Based Developer Analyzer

    Authors: Sanjjushri Varshini, Ponshriharini V, Santhosh Kannan, Snekha Suresh, Harshavardhan Ramesh, Rohith Mahadevan, Raja CSP Raman

    Abstract: In day-to-day life, a highly demanding task for IT companies is to find the right candidates who fit the companies' culture. This research aims to comprehend, analyze and automatically produce convincing outcomes to find a candidate who perfectly fits right in the company. Data is examined and collected for each employee who works in the IT domain focusing on their performance measure. This is don… ▽ More

    Submitted 10 May, 2022; originally announced May 2022.

    Comments: 10 pages, 3 figures

  23. arXiv:2204.04768  [pdf, other

    cs.AI cs.NE

    Analysis of Power-Oriented Fault Injection Attacks on Spiking Neural Networks

    Authors: Karthikeyan Nagarajan, Junde Li, Sina Sayyah Ensan, Mohammad Nasim Imtiaz Khan, Sachhidh Kannan, Swaroop Ghosh

    Abstract: Spiking Neural Networks (SNN) are quickly gaining traction as a viable alternative to Deep Neural Networks (DNN). In comparison to DNNs, SNNs are more computationally powerful and provide superior energy efficiency. SNNs, while exciting at first appearance, contain security-sensitive assets (e.g., neuron threshold voltage) and vulnerabilities (e.g., sensitivity of classification accuracy to neuron… ▽ More

    Submitted 10 April, 2022; originally announced April 2022.

    Comments: Design, Automation and Test in Europe Conference (DATE) 2022

  24. Minotaur: Multi-Resource Blockchain Consensus

    Authors: Matthias Fitzi, Xuechao Wang, Sreeram Kannan, Aggelos Kiayias, Nikos Leonardos, Pramod Viswanath, Gerui Wang

    Abstract: Resource-based consensus is the backbone of permissionless distributed ledger systems. The security of such protocols relies fundamentally on the level of resources actively engaged in the system. The variety of different resources (and related proof protocols, some times referred to as PoX in the literature) raises the fundamental question whether it is possible to utilize many of them in tandem… ▽ More

    Submitted 7 September, 2022; v1 submitted 27 January, 2022; originally announced January 2022.

    Comments: To appear in ACM CCS 2022

  25. arXiv:2201.07946  [pdf, other

    cs.CR

    Babylon: Reusing Bitcoin Mining to Enhance Proof-of-Stake Security

    Authors: Ertem Nusret Tas, David Tse, Fisher Yu, Sreeram Kannan

    Abstract: Bitcoin is the most secure blockchain in the world, supported by the immense hash power of its Proof-of-Work miners, but consumes huge amount of energy. Proof-of-Stake chains are energy-efficient, have fast finality and accountability, but face several fundamental security issues: susceptibility to non-slashable long-range safety attacks, non-slashable transaction censorship and stalling attacks a… ▽ More

    Submitted 19 January, 2022; originally announced January 2022.

    Comments: 26 pages, 10 figures

  26. arXiv:2110.04371  [pdf, other

    cs.NI

    DispersedLedger: High-Throughput Byzantine Consensus on Variable Bandwidth Networks

    Authors: Lei Yang, Seo Jin Park, Mohammad Alizadeh, Sreeram Kannan, David Tse

    Abstract: The success of blockchains has sparked interest in large-scale deployments of Byzantine fault tolerant (BFT) consensus protocols over wide area networks. A central feature of such networks is variable communication bandwidth across nodes and across time. We present DispersedLedger, an asynchronous BFT protocol that provides near-optimal throughput in the presence of such variable network bandwidth… ▽ More

    Submitted 12 October, 2021; v1 submitted 8 October, 2021; originally announced October 2021.

    Comments: NSDI '22

    Journal ref: 19th USENIX Symposium on Networked Systems Design and Implementation, 2022

  27. arXiv:2108.12616  [pdf, other

    cs.RO

    A Predictive Application Offloading Algorithm Using Small Datasets for Cloud Robotics

    Authors: Manoj Penmetcha, Shyam Sundar Kannan, Byung-Cheol Min

    Abstract: Many robotic applications that are critical for robot performance require immediate feedback, hence execution time is a critical concern. Furthermore, it is common that robots come with a fixed quantity of hardware resources; if an application requires more computational resources than the robot can accommodate, its onboard execution might be extended to a degree that degrades the robot performanc… ▽ More

    Submitted 28 August, 2021; originally announced August 2021.

  28. arXiv:2108.03045  [pdf, other

    cs.RO

    External Human-Machine Interface on Delivery Robots: Expression of Navigation Intent of the Robot

    Authors: Shyam Sundar Kannan, Ahreum Lee, Byung-Cheol Min

    Abstract: External Human-Machine Interfaces (eHMI) are widely used on robots and autonomous vehicles to convey the machine's intent to humans. Delivery robots are getting common, and they share the sidewalk along with the pedestrians. Current research has explored the design of eHMI and its effectiveness for social robots and autonomous vehicles, but the use of eHMIs on delivery robots still remains unexplo… ▽ More

    Submitted 6 August, 2021; originally announced August 2021.

    Comments: Accepted at 30th IEEE International Conference on Robot and Human Interactive Communication (RO-MAN 2021)

  29. arXiv:2106.01063  [pdf, other

    cs.SE

    Tolerance in Model-Driven Engineering: A Systematic Literature Review with Model-Driven Tool Support

    Authors: Nils Weidmann, Suganya Kannan, Anthony Anjorin

    Abstract: Managing models in a consistent manner is an important task in the field of Model-Driven Engineering (MDE). Although restoring and maintaining consistency is desired in general, recent work has pointed out that always strictly enforcing consistency at any point of time is often not feasible in real-world scenarios, and sometimes even contrary to what a user expects from a trustworthy MDE tool. The… ▽ More

    Submitted 2 June, 2021; originally announced June 2021.

  30. arXiv:2105.02927  [pdf, other

    cs.CR

    Securing Parallel-chain Protocols under Variable Mining Power

    Authors: Xuechao Wang, Viswa Virinchi Muppirala, Lei Yang, Sreeram Kannan, Pramod Viswanath

    Abstract: Several emerging PoW blockchain protocols rely on a "parallel-chain" architecture for scaling, where instead of a single chain, multiple chains are run in parallel and aggregated. A key requirement of practical PoW blockchains is to adapt to mining power variations over time. In this paper, we consider the design of provably secure parallel-chain protocols which can adapt to such mining power vari… ▽ More

    Submitted 9 May, 2021; v1 submitted 6 May, 2021; originally announced May 2021.

    Comments: 26 pages, 18 figures. A shorter version of this paper will appear in the 2021 ACM Conference on Computer and Communications Security (CCS)

  31. arXiv:2105.01799  [pdf, other

    cs.RO cs.AI

    Towards End-to-End Deep Learning for Autonomous Racing: On Data Collection and a Unified Architecture for Steering and Throttle Prediction

    Authors: Shakti N. Wadekar, Benjamin J. Schwartz, Shyam S. Kannan, Manuel Mar, Rohan Kumar Manna, Vishnu Chellapandi, Daniel J. Gonzalez, Aly El Gamal

    Abstract: Deep Neural Networks (DNNs) which are trained end-to-end have been successfully applied to solve complex problems that we have not been able to solve in past decades. Autonomous driving is one of the most complex problems which is yet to be completely solved and autonomous racing adds more complexity and exciting challenges to this problem. Towards the challenge of applying end-to-end learning to… ▽ More

    Submitted 4 May, 2021; originally announced May 2021.

    Comments: 6 pages, 10 figures, 3 tables

  32. arXiv:2104.05503  [pdf, other

    cs.RO

    Autonomous Drone Delivery to Your Door and Yard

    Authors: Shyam Sundar Kannan, Byung-Cheol Min

    Abstract: In this work, we present a system that enables delivery drones to autonomously navigate and deliver packages at various locations around a house according to the desire of the recipient and without the need for any external markers as currently used. This development is motivated by recent advancements in deep learning that can potentially supplant the specialized markers presently used by deliver… ▽ More

    Submitted 10 May, 2022; v1 submitted 12 April, 2021; originally announced April 2021.

    Comments: Accepted for publication in International Conference on Unmanned Aircraft Systems (ICUAS) 2022

  33. arXiv:2102.07809  [pdf, ps, other

    cs.GT econ.TH physics.soc-ph

    Best vs. All: Equity and Accuracy of Standardized Test Score Reporting

    Authors: Sampath Kannan, Mingzi Niu, Aaron Roth, Rakesh Vohra

    Abstract: We study a game theoretic model of standardized testing for college admissions. Students are of two types; High and Low. There is a college that would like to admit the High type students. Students take a potentially costly standardized exam which provides a noisy signal of their type. The students come from two populations, which are identical in talent (i.e. the type distribution is the same),… ▽ More

    Submitted 15 February, 2021; originally announced February 2021.

  34. arXiv:2011.00102  [pdf, other

    cs.CR

    ACeD: Scalable Data Availability Oracle

    Authors: Peiyao Sheng, Bowen Xue, Sreeram Kannan, Pramod Viswanath

    Abstract: A popular method in practice offloads computation and storage in blockchains by relying on committing only hashes of off-chain data into the blockchain. This mechanism is acknowledged to be vulnerable to a stalling attack: the blocks corresponding to the committed hashes may be unavailable at any honest node. The straightforward solution of broadcasting all blocks to the entire network sidesteps t… ▽ More

    Submitted 3 March, 2021; v1 submitted 30 October, 2020; originally announced November 2020.

  35. arXiv:2010.13711  [pdf, other

    cs.CR

    Blockchain CAP Theorem Allows User-Dependent Adaptivity and Finality

    Authors: Suryanarayana Sankagiri, Xuechao Wang, Sreeram Kannan, Pramod Viswanath

    Abstract: Longest-chain blockchain protocols, such as Bitcoin, guarantee liveness even when the number of actively participating users is variable, i.e., they are adaptive. However, they are not safe under network partitions, i.e., they do not guarantee finality. On the other hand, classical blockchain protocols, like PBFT, achieve finality but not adaptivity. Indeed, the CAP theorem in the context of block… ▽ More

    Submitted 2 April, 2021; v1 submitted 26 October, 2020; originally announced October 2020.

    Comments: 40 pages, 9 figures. This is the full version of the paper with the same title, which appeared in Financial Cryptography, 2021

  36. arXiv:2010.08154  [pdf, other

    cs.CR cs.DC cs.IT

    PoSAT: Proof-of-Work Availability and Unpredictability, without the Work

    Authors: Soubhik Deb, Sreeram Kannan, David Tse

    Abstract: An important feature of Proof-of-Work (PoW) blockchains is full dynamic availability, allowing miners to go online and offline while requiring only 50% of the online miners to be honest. Existing Proof-of-stake (PoS), Proof-of-Space and related protocols are able to achieve this property only partially, either putting the additional assumption that adversary nodes to be online from the beginning… ▽ More

    Submitted 18 February, 2021; v1 submitted 15 October, 2020; originally announced October 2020.

    Comments: arXiv admin note: text overlap with arXiv:2005.10484

  37. BFT Protocol Forensics

    Authors: Peiyao Sheng, Gerui Wang, Kartik Nayak, Sreeram Kannan, Pramod Viswanath

    Abstract: Byzantine fault-tolerant (BFT) protocols allow a group of replicas to come to a consensus even when some of the replicas are Byzantine faulty. There exist multiple BFT protocols to securely tolerate an optimal number of faults $t$ under different network settings. However, if the number of faults $f$ exceeds $t$ then security could be violated. In this paper we mathematically formalize the study o… ▽ More

    Submitted 8 November, 2021; v1 submitted 13 October, 2020; originally announced October 2020.

  38. arXiv:2008.07997  [pdf, other

    cs.IT stat.ML

    Deepcode and Modulo-SK are Designed for Different Settings

    Authors: Hyeji Kim, Yihan Jiang, Sreeram Kannan, Sewoong Oh, Pramod Viswanath

    Abstract: We respond to [1] which claimed that "Modulo-SK scheme outperforms Deepcode [2]". We demonstrate that this statement is not true: the two schemes are designed and evaluated for entirely different settings. DeepCode is designed and evaluated for the AWGN channel with (potentially delayed) uncoded output feedback. Modulo-SK is evaluated on the AWGN channel with coded feedback and unit delay. [1] als… ▽ More

    Submitted 18 August, 2020; originally announced August 2020.

  39. Adaptive Workload Allocation for Multi-human Multi-robot Teams for Independent and Homogeneous Tasks

    Authors: Tamzidul Mina, Shyam Sundar Kannan, Wonse Jo, Byung-Cheol Min

    Abstract: Multi-human multi-robot (MH-MR) systems have the ability to combine the potential advantages of robotic systems with those of having humans in the loop. Robotic systems contribute precision performance and long operation on repetitive tasks without tiring, while humans in the loop improve situational awareness and enhance decision-making abilities. A system's ability to adapt allocated workload to… ▽ More

    Submitted 27 July, 2020; originally announced July 2020.

    Comments: 14 pages, 13 figures, submitted to IEEE ACCESS. For associated file, see https://youtu.be/-WY49FPbNWg

  40. arXiv:2006.14186  [pdf, other

    cs.NI cs.MA math.OC stat.AP

    Perigee: Efficient Peer-to-Peer Network Design for Blockchains

    Authors: Yifan Mao, Soubhik Deb, Shaileshh Bojja Venkatakrishnan, Sreeram Kannan, Kannan Srinivasan

    Abstract: A key performance metric in blockchains is the latency between when a transaction is broadcast and when it is confirmed (the so-called, confirmation latency). While improvements in consensus techniques can lead to lower confirmation latency, a fundamental lower bound on confirmation latency is the propagation latency of messages through the underlying peer-to-peer (p2p) network (inBitcoin, the pro… ▽ More

    Submitted 25 June, 2020; originally announced June 2020.

    Comments: Accepted at ACM PODC 2020

  41. arXiv:2006.05490  [pdf, ps, other

    cs.DS

    Sublinear Algorithms and Lower Bounds for Metric TSP Cost Estimation

    Authors: Yu Chen, Sampath Kannan, Sanjeev Khanna

    Abstract: We consider the problem of designing sublinear time algorithms for estimating the cost of a minimum metric traveling salesman (TSP) tour. Specifically, given access to a $n \times n$ distance matrix $D$ that specifies pairwise distances between $n$ points, the goal is to estimate the TSP cost by performing only sublinear (in the size of $D$) queries. For the closely related problem of estimating t… ▽ More

    Submitted 9 June, 2020; originally announced June 2020.

    Comments: ICALP 2020

  42. arXiv:2006.05102  [pdf, other

    cs.CY

    ROSbag-based Multimodal Affective Dataset for Emotional and Cognitive States

    Authors: Wonse Jo, Shyam Sundar Kannan, Go-Eum Cha, Ahreum Lee, Byung-Cheol Min

    Abstract: This paper introduces a new ROSbag-based multimodal affective dataset for emotional and cognitive states generated using Robot Operating System (ROS). We utilized images and sounds from the International Affective Pictures System (IAPS) and the International Affective Digitized Sounds (IADS) to stimulate targeted emotions (happiness, sadness, anger, fear, surprise, disgust, and neutral), and a dua… ▽ More

    Submitted 20 October, 2020; v1 submitted 9 June, 2020; originally announced June 2020.

    Comments: Accepted for publication in SMC2020, TORONTO, CANADA

  43. arXiv:2006.04351  [pdf, other

    cs.DS

    Near-Perfect Recovery in the One-Dimensional Latent Space Model

    Authors: Yu Chen, Sampath Kannan, Sanjeev Khanna

    Abstract: Suppose a graph $G$ is stochastically created by uniformly sampling vertices along a line segment and connecting each pair of vertices with a probability that is a known decreasing function of their distance. We ask if it is possible to reconstruct the actual positions of the vertices in $G$ by only observing the generated unlabeled graph. We study this question for two natural edge probability fu… ▽ More

    Submitted 8 June, 2020; originally announced June 2020.

    Comments: Web Conference 2020

  44. arXiv:2006.03805  [pdf, other

    cs.HC cs.RO

    Investigating the Effect of Deictic Movements of a Multi-robot

    Authors: Ahreum Lee, Wonse Jo, Shyam Sundar Kannan, Byung-Cheol Min

    Abstract: Multi-robot systems are made up of a team of multiple robots, which provides the advantage of performing complex tasks with high efficiency, flexibility, and robustness. Although research on human-robot interaction is ongoing as robots become more readily available and easier to use, the study of interactions between a human and multiple robots represents a relatively new field of research. In par… ▽ More

    Submitted 6 June, 2020; originally announced June 2020.

    Comments: 13 pages, 9 figures;

  45. arXiv:2006.03784  [pdf, other

    cs.RO cs.HC

    A ROS-based Framework for Monitoring Human and Robot Conditions in a Human-Multi-robot Team

    Authors: Wonse Jo, Shyam Sundar Kannan, Go-Eum Cha, Ahreum Lee, Byung-Cheol Min

    Abstract: This paper presents a framework for monitoring human and robot conditions in human multi-robot interactions. The proposed framework consists of four modules: 1) human and robot conditions monitoring interface, 2) synchronization time filter, 3) data feature extraction interface, and 4) condition monitoring interface. The framework is based on Robot Operating System (ROS), and it supports physiolog… ▽ More

    Submitted 6 June, 2020; originally announced June 2020.

    Comments: 7 pages, 9 figures

  46. arXiv:2005.10484  [pdf, other

    cs.CR

    Everything is a Race and Nakamoto Always Wins

    Authors: Amir Dembo, Sreeram Kannan, Ertem Nusret Tas, David Tse, Pramod Viswanath, Xuechao Wang, Ofer Zeitouni

    Abstract: Nakamoto invented the longest chain protocol, and claimed its security by analyzing the private double-spend attack, a race between the adversary and the honest nodes to grow a longer chain. But is it the worst attack? We answer the question in the affirmative for three classes of longest chain protocols, designed for different consensus models: 1) Nakamoto's original Proof-of-Work protocol; 2) Ou… ▽ More

    Submitted 30 August, 2020; v1 submitted 21 May, 2020; originally announced May 2020.

    Comments: 27 pages, 12 figures. A shorter version of this paper will appear in the 2020 ACM Conference on Computer and Communications Security (CCS)

  47. arXiv:2005.09610  [pdf, other

    cs.CR cs.DC cs.GT cs.IT

    Free2Shard: Adaptive-adversary-resistant sharding via Dynamic Self Allocation

    Authors: Ranvir Rana, Sreeram Kannan, David Tse, Pramod Viswanath

    Abstract: Propelled by the growth of large-scale blockchain deployments, much recent progress has been made in designing sharding protocols that achieve throughput scaling linearly in the number of nodes. However, existing protocols are not robust to an adversary adaptively corrupting a fixed fraction of nodes. In this paper, we propose Free2Shard -- a new architecture that achieves near-linear scaling whil… ▽ More

    Submitted 19 May, 2020; originally announced May 2020.

  48. arXiv:2005.08226  [pdf, other

    cs.LG cs.IT stat.ML

    C-MI-GAN : Estimation of Conditional Mutual Information using MinMax formulation

    Authors: Arnab Kumar Mondal, Arnab Bhattacharya, Sudipto Mukherjee, Prathosh AP, Sreeram Kannan, Himanshu Asnani

    Abstract: Estimation of information theoretic quantities such as mutual information and its conditional variant has drawn interest in recent times owing to their multifaceted applications. Newly proposed neural estimators for these quantities have overcome severe drawbacks of classical $k$NN-based estimators in high dimensions. In this work, we focus on conditional mutual information (CMI) estimation by uti… ▽ More

    Submitted 23 July, 2020; v1 submitted 17 May, 2020; originally announced May 2020.

    Comments: Updated for UAI, 2020 camera-ready version

  49. arXiv:2004.05524  [pdf, other

    cs.OS

    Accelerating Filesystem Checking and Repair with pFSCK

    Authors: David Domingo, Kyle Stratton, Sudarsun Kannan

    Abstract: File system checking and recovery (C/R) tools play a pivotal role in increasing the reliability of storage software, identifying and correcting file system inconsistencies. However, with increasing disk capacity and data content, file system C/R tools notoriously suffer from long runtimes. We posit that current file system checkers fail to exploit CPU parallelism and high throughput offered by mod… ▽ More

    Submitted 11 April, 2020; originally announced April 2020.

    Comments: 13 pages, 9 figures

  50. arXiv:2004.04760  [pdf, other

    cs.OS

    Efficient Kernel Object Management for Tiered Memory Systems with KLOC

    Authors: Sudarsun Kannan, Yujie Ren, Abhishek Bhatacharjee

    Abstract: Software-controlled heterogeneous memory systems have the potential to improve performance, efficiency, and cost tradeoffs in emerging systems. Delivering on this promise requires an efficient operating system (OS) mechanisms and policies for data management. Unfortunately, modern OSes do not support efficient tiering of data between heterogeneous memories. While this problem is known (and is bein… ▽ More

    Submitted 9 April, 2020; originally announced April 2020.