Skip to main content

Showing 1–50 of 53 results for author: Kulkarni, N

  1. arXiv:2410.09192  [pdf, other

    cs.CL cs.LG

    Long Range Named Entity Recognition for Marathi Documents

    Authors: Pranita Deshmukh, Nikita Kulkarni, Sanhita Kulkarni, Kareena Manghani, Geetanjali Kale, Raviraj Joshi

    Abstract: The demand for sophisticated natural language processing (NLP) methods, particularly Named Entity Recognition (NER), has increased due to the exponential growth of Marathi-language digital content. In particular, NER is essential for recognizing distant entities and for arranging and understanding unstructured Marathi text data. With an emphasis on managing long-range entities, this paper offers a… ▽ More

    Submitted 11 October, 2024; originally announced October 2024.

  2. arXiv:2410.09184  [pdf, ps, other

    cs.CL cs.LG

    L3Cube-MahaSum: A Comprehensive Dataset and BART Models for Abstractive Text Summarization in Marathi

    Authors: Pranita Deshmukh, Nikita Kulkarni, Sanhita Kulkarni, Kareena Manghani, Raviraj Joshi

    Abstract: We present the MahaSUM dataset, a large-scale collection of diverse news articles in Marathi, designed to facilitate the training and evaluation of models for abstractive summarization tasks in Indic languages. The dataset, containing 25k samples, was created by scraping articles from a wide range of online news sources and manually verifying the abstract summaries. Additionally, we train an Indic… ▽ More

    Submitted 11 October, 2024; originally announced October 2024.

  3. arXiv:2410.05573  [pdf, other

    cs.CR cs.AI cs.CL cs.LG

    TaeBench: Improving Quality of Toxic Adversarial Examples

    Authors: Xuan Zhu, Dmitriy Bespalov, Liwen You, Ninad Kulkarni, Yanjun Qi

    Abstract: Toxicity text detectors can be vulnerable to adversarial examples - small perturbations to input text that fool the systems into wrong detection. Existing attack algorithms are time-consuming and often produce invalid or ambiguous adversarial examples, making them less useful for evaluating or improving real-world toxicity content moderators. This paper proposes an annotation pipeline for quality… ▽ More

    Submitted 7 October, 2024; originally announced October 2024.

  4. Leveraging Parameter Efficient Training Methods for Low Resource Text Classification: A Case Study in Marathi

    Authors: Pranita Deshmukh, Nikita Kulkarni, Sanhita Kulkarni, Kareena Manghani, Raviraj Joshi

    Abstract: With the surge in digital content in low-resource languages, there is an escalating demand for advanced Natural Language Processing (NLP) techniques tailored to these languages. BERT (Bidirectional Encoder Representations from Transformers), serving as the foundational framework for numerous NLP architectures and language models, is increasingly employed for the development of low-resource NLP mod… ▽ More

    Submitted 6 August, 2024; originally announced August 2024.

    Comments: Accepted at I2CT 2024

  5. arXiv:2408.02860  [pdf, other

    cs.GT

    Nash Equilibrium in Games on Graphs with Incomplete Preferences

    Authors: Abhishek N. Kulkarni, Jie Fu, Ufuk Topcu

    Abstract: Games with incomplete preferences are an important model for studying rational decision-making in scenarios where players face incomplete information about their preferences and must contend with incomparable outcomes. We study the problem of computing Nash equilibrium in a subclass of two-player games played on graphs where each player seeks to maximally satisfy their (possibly incomplete) prefer… ▽ More

    Submitted 11 August, 2024; v1 submitted 5 August, 2024; originally announced August 2024.

    Comments: 14 page, 6 figure, under development

  6. arXiv:2407.14436  [pdf, other

    cs.GT

    Integrated Resource Allocation and Strategy Synthesis in Safety Games on Graphs with Deception

    Authors: Abhishek N. Kulkarni, Matthew S. Cohen, Charles A. Kamhoua, Jie Fu

    Abstract: Deception plays a crucial role in strategic interactions with incomplete information. Motivated by security applications, we study a class of two-player turn-based deterministic games with one-sided incomplete information, in which player 1 (P1) aims to prevent player 2 (P2) from reaching a set of target states. In addition to actions, P1 can place two kinds of deception resources: "traps" and "fa… ▽ More

    Submitted 19 July, 2024; originally announced July 2024.

    Comments: 37 pages, 7 figures

  7. arXiv:2405.06346  [pdf, other

    cs.CL

    Akal Badi ya Bias: An Exploratory Study of Gender Bias in Hindi Language Technology

    Authors: Rishav Hada, Safiya Husain, Varun Gumma, Harshita Diddee, Aditya Yadavalli, Agrima Seth, Nidhi Kulkarni, Ujwal Gadiraju, Aditya Vashistha, Vivek Seshadri, Kalika Bali

    Abstract: Existing research in measuring and mitigating gender bias predominantly centers on English, overlooking the intricate challenges posed by non-English languages and the Global South. This paper presents the first comprehensive study delving into the nuanced landscape of gender bias in Hindi, the third most spoken language globally. Our study employs diverse mining techniques, computational models,… ▽ More

    Submitted 10 May, 2024; originally announced May 2024.

    Comments: Accepted to FAccT 2024

  8. arXiv:2404.06579  [pdf, other

    cs.CL cs.AI cs.LG

    Less is More for Improving Automatic Evaluation of Factual Consistency

    Authors: Tong Wang, Ninad Kulkarni, Yanjun Qi

    Abstract: Assessing the factual consistency of automatically generated texts in relation to source context is crucial for developing reliable natural language generation applications. Recent literature proposes AlignScore which uses a unified alignment model to evaluate factual consistency and substantially outperforms previous methods across many benchmark tasks. In this paper, we take a closer look of dat… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

    Comments: Accepted in NAACL24 Industry; 7 pages

  9. arXiv:2403.18212  [pdf, other

    cs.RO cs.AI cs.FL cs.LO

    Preference-Based Planning in Stochastic Environments: From Partially-Ordered Temporal Goals to Most Preferred Policies

    Authors: Hazhar Rahmani, Abhishek N. Kulkarni, Jie Fu

    Abstract: Human preferences are not always represented via complete linear orders: It is natural to employ partially-ordered preferences for expressing incomparable outcomes. In this work, we consider decision-making and probabilistic planning in stochastic systems modeled as Markov decision processes (MDPs), given a partially ordered preference over a set of temporally extended goals. Specifically, each te… ▽ More

    Submitted 17 October, 2024; v1 submitted 26 March, 2024; originally announced March 2024.

    Comments: arXiv admin note: substantial text overlap with arXiv:2209.12267

  10. arXiv:2403.08768  [pdf, other

    cs.CV

    3DFIRES: Few Image 3D REconstruction for Scenes with Hidden Surface

    Authors: Linyi Jin, Nilesh Kulkarni, David Fouhey

    Abstract: This paper introduces 3DFIRES, a novel system for scene-level 3D reconstruction from posed images. Designed to work with as few as one view, 3DFIRES reconstructs the complete geometry of unseen scenes, including hidden surfaces. With multiple view inputs, our method produces full reconstruction within all camera frustums. A key feature of our approach is the fusion of multi-view information at the… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

    Comments: Accepted to CVPR 2024. Project Page https://jinlinyi.github.io/3DFIRES/

  11. arXiv:2403.03221  [pdf, other

    cs.CV

    FAR: Flexible, Accurate and Robust 6DoF Relative Camera Pose Estimation

    Authors: Chris Rockwell, Nilesh Kulkarni, Linyi Jin, Jeong Joon Park, Justin Johnson, David F. Fouhey

    Abstract: Estimating relative camera poses between images has been a central problem in computer vision. Methods that find correspondences and solve for the fundamental matrix offer high precision in most cases. Conversely, methods predicting pose directly using neural networks are more robust to limited overlap and can infer absolute translation scale, but at the expense of reduced precision. We show how t… ▽ More

    Submitted 5 March, 2024; originally announced March 2024.

    Comments: Accepted to CVPR 2024. Project Page: https://crockwell.github.io/far/

  12. arXiv:2307.07511  [pdf, other

    cs.CV

    NIFTY: Neural Object Interaction Fields for Guided Human Motion Synthesis

    Authors: Nilesh Kulkarni, Davis Rempe, Kyle Genova, Abhijit Kundu, Justin Johnson, David Fouhey, Leonidas Guibas

    Abstract: We address the problem of generating realistic 3D motions of humans interacting with objects in a scene. Our key idea is to create a neural interaction field attached to a specific object, which outputs the distance to the valid interaction manifold given a human pose as input. This interaction field guides the sampling of an object-conditioned human motion diffusion model, so as to encourage plau… ▽ More

    Submitted 14 July, 2023; originally announced July 2023.

    Comments: Project Page with additional results available https://nileshkulkarni.github.io/nifty

  13. arXiv:2306.08671  [pdf, other

    cs.CV

    Learning to Predict Scene-Level Implicit 3D from Posed RGBD Data

    Authors: Nilesh Kulkarni, Linyi Jin, Justin Johnson, David F. Fouhey

    Abstract: We introduce a method that can learn to predict scene-level implicit functions for 3D reconstruction from posed RGBD data. At test time, our system maps a previously unseen RGB image to a 3D reconstruction of a scene via implicit functions. While implicit functions for 3D reconstruction have often been tied to meshes, we show that we can train one using only a set of posed RGBD images. This settin… ▽ More

    Submitted 14 June, 2023; originally announced June 2023.

    Comments: Project page this https://nileshkulkarni.github.io/d2drdf/

  14. arXiv:2210.01878  [pdf, other

    cs.AI cs.GT cs.RO eess.SY

    Opportunistic Qualitative Planning in Stochastic Systems with Incomplete Preferences over Reachability Objectives

    Authors: Abhishek N. Kulkarni, Jie Fu

    Abstract: Preferences play a key role in determining what goals/constraints to satisfy when not all constraints can be satisfied simultaneously. In this paper, we study how to synthesize preference satisfying plans in stochastic systems, modeled as an MDP, given a (possibly incomplete) combinative preference model over temporally extended goals. We start by introducing new semantics to interpret preferences… ▽ More

    Submitted 4 October, 2022; originally announced October 2022.

    Comments: 7 pages, 3 figures, under review for IEEE ACC 2023

  15. arXiv:2209.12267  [pdf, other

    cs.RO cs.AI

    Probabilistic Planning with Partially Ordered Preferences over Temporal Goals

    Authors: Hazhar Rahmani, Abhishek N. Kulkarni, Jie Fu

    Abstract: In this paper, we study planning in stochastic systems, modeled as Markov decision processes (MDPs), with preferences over temporally extended goals. Prior work on temporal planning with preferences assumes that the user preferences form a total order, meaning that every pair of outcomes are comparable with each other. In this work, we consider the case where the preferences over possible outcomes… ▽ More

    Submitted 7 March, 2023; v1 submitted 25 September, 2022; originally announced September 2022.

  16. arXiv:2204.01584  [pdf, other

    math.OC cs.GT eess.SY

    Synthesizing Attack-Aware Control and Active Sensing Strategies under Reactive Sensor Attacks

    Authors: Sumukha Udupa, Abhishek N. Kulkarni, Shuo Han, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu

    Abstract: We consider the probabilistic planning problem for a defender (P1) who can jointly query the sensors and take control actions to reach a set of goal states while being aware of possible sensor attacks by an adversary (P2) who has perfect observations. To synthesize a provably-correct, attack-aware joint control and active sensing strategy for P1, we construct a stochastic game on graph with augmen… ▽ More

    Submitted 29 November, 2022; v1 submitted 28 March, 2022; originally announced April 2022.

    Comments: 7 pages, 3 figure, 1 table, 1 algorithm

    Journal ref: LCSS vol.7(2022)265-270

  17. arXiv:2203.13803  [pdf, other

    cs.FL cs.GT eess.SY

    Opportunistic Qualitative Planning in Stochastic Systems with Preferences over Temporal Logic Objectives

    Authors: Abhishek Ninad Kulkarni, Jie Fu

    Abstract: Preferences play a key role in determining what goals/constraints to satisfy when not all constraints can be satisfied simultaneously. In this work, we study preference-based planning in a stochastic system modeled as a Markov decision process, subject to a possible incomplete preference over temporally extended goals. Our contributions are three folds: First, we introduce a preference language to… ▽ More

    Submitted 25 March, 2022; originally announced March 2022.

    Comments: 6 pages, 3 figure, submitted to IEEE L-CSS

  18. arXiv:2112.04481  [pdf, other

    cs.CV cs.GR

    What's Behind the Couch? Directed Ray Distance Functions (DRDF) for 3D Scene Reconstruction

    Authors: Nilesh Kulkarni, Justin Johnson, David F. Fouhey

    Abstract: We present an approach for full 3D scene reconstruction from a single unseen image. We train on dataset of realistic non-watertight scans of scenes. Our approach predicts a distance function, since these have shown promise in handling complex topologies and large spaces. We identify and analyze two key challenges for predicting such image conditioned distance functions that have prevented their su… ▽ More

    Submitted 4 April, 2022; v1 submitted 8 December, 2021; originally announced December 2021.

    Comments: Updated illustrations for method section. Project Page see https://nileshkulkarni.github.io/scene_drdf

  19. arXiv:2108.13340  [pdf, other

    cs.SE cs.PL

    Learning Highly Recursive Input Grammars

    Authors: Neil Kulkarni, Caroline Lemieux, Koushik Sen

    Abstract: This paper presents Arvada, an algorithm for learning context-free grammars from a set of positive examples and a Boolean-valued oracle. Arvada learns a context-free grammar by building parse trees from the positive examples. Starting from initially flat trees, Arvada builds structure to these trees with a key operation: it bubbles sequences of sibling nodes in the trees into a new node, adding a… ▽ More

    Submitted 30 August, 2021; originally announced August 2021.

    Journal ref: In Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering (ASE 2021)

  20. arXiv:2105.01061  [pdf, other

    cs.CV

    Collision Replay: What Does Bumping Into Things Tell You About Scene Geometry?

    Authors: Alexander Raistrick, Nilesh Kulkarni, David F. Fouhey

    Abstract: What does bumping into things in a scene tell you about scene geometry? In this paper, we investigate the idea of learning from collisions. At the heart of our approach is the idea of collision replay, where we use examples of a collision to provide supervision for observations at a past frame. We use collision replay to train convolutional neural networks to predict a distribution over collision… ▽ More

    Submitted 3 May, 2021; originally announced May 2021.

  21. arXiv:2104.11676  [pdf, other

    cs.GT cs.FL

    Synthesis of Deceptive Strategies in Reachability Games with Action Misperception (Technical Report)

    Authors: Abhishek N. Kulkarni, Jie Fu

    Abstract: Strategic deception is an act of manipulating the opponent's perception to gain strategic advantages. In this paper, we study synthesis of deceptive winning strategies in two-player turn-based zero-sum reachability games on graphs with one-sided incomplete information of action sets. In particular, we consider the class of games in which Player 1 (P1) starts with a non-empty set of private actions… ▽ More

    Submitted 23 April, 2021; originally announced April 2021.

    Comments: 40 pages, 6 figures, under review Journal of AI Research (JAIR)

  22. arXiv:2104.00176  [pdf, ps, other

    cs.CR cs.FL cs.GT

    Qualitative Planning in Imperfect Information Games with Active Sensing and Reactive Sensor Attacks: Cost of Unawareness

    Authors: Abhishek N. Kulkarni, Shuo Han, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu

    Abstract: We consider the probabilistic planning problem where the agent (called Player 1, or P1) can jointly plan the control actions and sensor queries in a sensor network and an attacker (called player 2, or P2) can carry out attacks on the sensors. We model such an adversarial interaction using a formal model -- a reachability game with partially controllable observation functions. The main contribution… ▽ More

    Submitted 2 May, 2021; v1 submitted 31 March, 2021; originally announced April 2021.

    Comments: 7 pages, 5 figures, Submitted to CDC2021; Revised Alg. 2 to fix a typo and notation, results unchanged

  23. arXiv:2010.01208  [pdf, ps, other

    cs.GT cs.FL

    Decoy Allocation Games on Graphs with Temporal Logic Objectives

    Authors: Abhishek N. Kulkarni, Jie Fu, Huan Luo, Charles A. Kamhoua, Nandi O. Leslie

    Abstract: We study a class of games, in which the adversary (attacker) is to satisfy a complex mission specified in linear temporal logic, and the defender is to prevent the adversary from achieving its goal. A deceptive defender can allocate decoys, in addition to defense actions, to create disinformation for the attacker. Thus, we focus on the problem of jointly synthesizing a decoy placement strategy and… ▽ More

    Submitted 2 October, 2020; originally announced October 2020.

    Comments: 20 page, 4 figures, 2 algorithms, Accepted at Conference on Decision and Game Theory for Security (GameSec) 2020

  24. arXiv:2009.13626  [pdf, other

    cs.CY

    Monitoring My Dehydration: A Non-Invasive Dehydration Alert System Using Electrodermal Activity

    Authors: Nandan Kulkarni, Christopher Compton, Jooseppi Luna, Mohammad Arif Ul Alam

    Abstract: Staying hydrated and drinking fluids is extremely crucial to stay healthy and maintaining even basic bodily functions. Studies have shown that dehydration leads to loss of productivity, cognitive impairment and mood in both men and women. However, there are no such an existing tool that can monitor dehydration continuously and provide alert to users before it affects on their health. In this paper… ▽ More

    Submitted 25 September, 2020; originally announced September 2020.

  25. arXiv:2008.03210  [pdf, other

    cs.CR cs.AI cs.GT cs.LO cs.NI

    A Theory of Hypergames on Graphs for Synthesizing Dynamic Cyber Defense with Deception

    Authors: Abhishek N. Kulkarni, Jie Fu

    Abstract: In this chapter, we present an approach using formal methods to synthesize reactive defense strategy in a cyber network, equipped with a set of decoy systems. We first generalize formal graphical security models--attack graphs--to incorporate defender's countermeasures in a game-theoretic model, called an attack-defend game on graph. This game captures the dynamic interactions between the defender… ▽ More

    Submitted 7 August, 2020; originally announced August 2020.

    Comments: 32 pages, 10 figures, 2 tables, Accepted Book Chapter in "Game Theory and Machine Learning for Cyber Security" by Wiley-IEEE press, Editors: Charles A. Kamhoua, Christopher D. Kiekintveld, Fei Fang, Quanyan Zhu

  26. arXiv:2008.00329  [pdf, other

    cs.AR

    CuttleSys: Data-Driven Resource Management forInteractive Applications on Reconfigurable Multicores

    Authors: Neeraj Kulkarni, Gonzalo Gonzalez-Pumariega, Amulya Khurana, Christine Shoemaker, Christina Delimitrou, David Albonesi

    Abstract: Multi-tenancy for latency-critical applications leads to re-source interference and unpredictable performance. Core reconfiguration opens up more opportunities for colocation,as it allows the hardware to adjust to the dynamic performance and power needs of a specific mix of co-scheduled applications. However, reconfigurability also introduces challenges, as even for a small number of reconfigurabl… ▽ More

    Submitted 1 August, 2020; originally announced August 2020.

  27. arXiv:2007.15726  [pdf, other

    cs.GT

    Dynamic Hypergames for Synthesis of Deceptive Strategies with Temporal Logic Objectives

    Authors: Lening Li, Haoxiang Ma, Abhishek N. Kulkarni, Jie Fu

    Abstract: In this paper, we study the use of deception for strategic planning in adversarial environments. We model the interaction between the agent (player 1) and the adversary (player 2) as a two-player concurrent game in which the adversary has incomplete information about the agent's task specification in temporal logic. During the online interaction, the adversary can infer the agent's intention from… ▽ More

    Submitted 30 July, 2020; originally announced July 2020.

    Comments: 11 pages, 4 figures, submitted to IEEE Transactions on Automation Science and Engineering

  28. arXiv:2007.12731  [pdf, other

    cs.IR cs.AI cs.CL

    COVID-19 Knowledge Graph: Accelerating Information Retrieval and Discovery for Scientific Literature

    Authors: Colby Wise, Vassilis N. Ioannidis, Miguel Romero Calvo, Xiang Song, George Price, Ninad Kulkarni, Ryan Brand, Parminder Bhatia, George Karypis

    Abstract: The coronavirus disease (COVID-19) has claimed the lives of over 350,000 people and infected more than 6 million people worldwide. Several search engines have surfaced to provide researchers with additional tools to find and retrieve information from the rapidly growing corpora on COVID-19. These engines lack extraction and visualization tools necessary to retrieve and interpret complex relations… ▽ More

    Submitted 24 July, 2020; originally announced July 2020.

  29. arXiv:2007.08504  [pdf, other

    cs.CV

    Implicit Mesh Reconstruction from Unannotated Image Collections

    Authors: Shubham Tulsiani, Nilesh Kulkarni, Abhinav Gupta

    Abstract: We present an approach to infer the 3D shape, texture, and camera pose for an object from a single RGB image, using only category-level image collections with foreground masks as supervision. We represent the shape as an image-conditioned implicit function that transforms the surface of a sphere to that of the predicted mesh, while additionally predicting the corresponding texture. To derive super… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

    Comments: Project page: https://shubhtuls.github.io/imr/

  30. Deceptive Labeling: Hypergames on Graphs for Stealthy Deception

    Authors: Abhishek N. Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua, Jie Fu

    Abstract: With the increasing sophistication of attacks on cyber-physical systems, deception has emerged as an effective tool to improve system security and safety by obfuscating the attacker's perception. In this paper, we present a solution to the deceptive game in which a control agent is to satisfy a Boolean objective specified by a co-safe temporal logic formula in the presence of an adversary. The age… ▽ More

    Submitted 9 June, 2020; v1 submitted 10 April, 2020; originally announced April 2020.

    Comments: 6 page, 3 figures, submitted to CDC 2020/L-CSS

  31. arXiv:2004.00614  [pdf, other

    cs.CV

    Articulation-aware Canonical Surface Mapping

    Authors: Nilesh Kulkarni, Abhinav Gupta, David F. Fouhey, Shubham Tulsiani

    Abstract: We tackle the tasks of: 1) predicting a Canonical Surface Mapping (CSM) that indicates the mapping from 2D pixels to corresponding points on a canonical template shape, and 2) inferring the articulation and pose of the template corresponding to the input image. While previous approaches rely on keypoint supervision for learning, we present an approach that can learn without such annotations. Our k… ▽ More

    Submitted 26 May, 2020; v1 submitted 1 April, 2020; originally announced April 2020.

    Comments: To appear at CVPR 2020, project page https://nileshkulkarni.github.io/acsm/

  32. Synthesis of Deceptive Strategies in Reachability Games with Action Misperception

    Authors: Abhishek N. Kulkarni, Jie Fu

    Abstract: We consider a class of two-player turn-based zero-sum games on graphs with reachability objectives, known as reachability games, where the objective of Player 1 (P1) is to reach a set of goal states, and that of Player 2 (P2) is to prevent this. In particular, we consider the case where the players have asymmetric information about each other's action capabilities: P2 starts with an incomplete inf… ▽ More

    Submitted 17 February, 2020; originally announced February 2020.

    Comments: 7 pages, 4 figures, submitted to IJCAI 2020

  33. arXiv:2002.07025  [pdf, other

    cs.GT cs.FL cs.LO

    Secure-by-synthesis network with active deception and temporal logic specifications

    Authors: Jie Fu, Abhishek N. Kulkarni, Huan Luo, Nandi O. Leslie, Charles A. Kamhoua

    Abstract: This paper is concerned with the synthesis of strategies in network systems with active cyber deception. Active deception in a network employs decoy systems and other defenses to conduct defensive planning against the intrusion of malicious attackers who have been confirmed by sensing systems. In this setting, the defender's objective is to ensure the satisfaction of security properties specified… ▽ More

    Submitted 17 February, 2020; originally announced February 2020.

    Comments: 16 pages, 9 figures

  34. arXiv:1908.04364  [pdf, other

    cs.CL cs.IR

    AmazonQA: A Review-Based Question Answering Task

    Authors: Mansi Gupta, Nitish Kulkarni, Raghuveer Chanda, Anirudha Rayasam, Zachary C Lipton

    Abstract: Every day, thousands of customers post questions on Amazon product pages. After some time, if they are fortunate, a knowledgeable customer might answer their question. Observing that many questions can be answered based upon the available product reviews, we propose the task of review-based QA. Given a corpus of reviews and a question, the QA system synthesizes an answer. To this end, we introduce… ▽ More

    Submitted 20 August, 2019; v1 submitted 12 August, 2019; originally announced August 2019.

    Comments: 8 pages, 7 figures; IJCAI-19; first three authors contribute equally. Data and code available at https://github.com/amazonqa/amazonqa

  35. arXiv:1907.10043  [pdf, other

    cs.CV

    Canonical Surface Mapping via Geometric Cycle Consistency

    Authors: Nilesh Kulkarni, Abhinav Gupta, Shubham Tulsiani

    Abstract: We explore the task of Canonical Surface Mapping (CSM). Specifically, given an image, we learn to map pixels on the object to their corresponding locations on an abstract 3D model of the category. But how do we learn such a mapping? A supervised approach would require extensive manual labeling which is not scalable beyond a few hand-picked categories. Our key insight is that the CSM task (pixel to… ▽ More

    Submitted 15 August, 2019; v1 submitted 23 July, 2019; originally announced July 2019.

    Comments: To appear at ICCV 2019. Project page: https://nileshkulkarni.github.io/csm/

  36. Opportunistic Synthesis in Reactive Games under Information Asymmetry

    Authors: Abhishek N. Kulkarni, Jie Fu

    Abstract: Reactive synthesis is a class of methods to construct a provably-correct control system, referred to as a robot, with respect to a temporal logic specification in the presence of a dynamic and uncontrollable environment. This is achieved by modeling the interaction between the robot and its environment as a two-player zero-sum game. However, existing reactive synthesis methods assume both players… ▽ More

    Submitted 13 June, 2019; originally announced June 2019.

    Comments: Submitted to Conference on Decision and Control 2019

  37. arXiv:1906.02729  [pdf, other

    cs.CV

    3D-RelNet: Joint Object and Relational Network for 3D Prediction

    Authors: Nilesh Kulkarni, Ishan Misra, Shubham Tulsiani, Abhinav Gupta

    Abstract: We propose an approach to predict the 3D shape and pose for the objects present in a scene. Existing learning based methods that pursue this goal make independent predictions per object, and do not leverage the relationships amongst them. We argue that reasoning about these relationships is crucial, and present an approach to incorporate these in a 3D prediction framework. In addition to independe… ▽ More

    Submitted 4 March, 2020; v1 submitted 6 June, 2019; originally announced June 2019.

    Comments: Project page: https://nileshkulkarni.github.io/relative3d/

  38. arXiv:1807.08435  [pdf, other

    cs.CV cs.CL

    Question Relevance in Visual Question Answering

    Authors: Prakruthi Prabhakar, Nitish Kulkarni, Linghao Zhang

    Abstract: Free-form and open-ended Visual Question Answering systems solve the problem of providing an accurate natural language answer to a question pertaining to an image. Current VQA systems do not evaluate if the posed question is relevant to the input image and hence provide nonsensical answers when posed with irrelevant questions to an image. In this paper, we solve the problem of identifying the rele… ▽ More

    Submitted 23 July, 2018; originally announced July 2018.

  39. arXiv:1805.01040  [pdf, other

    cs.IT

    Max-Min Rates in Self-backhauled Millimeter Wave Cellular Networks

    Authors: Mandar N. Kulkarni, Amitava Ghosh, Jeffrey G. Andrews

    Abstract: This paper considers the following question for viable wide-area millimeter wave cellular networks. What is the maximum extended coverage area of a single fiber site using multi-hop relaying, while achieving a minimum target per user data rate? We formulate an optimization problem to maximize the minimum end-to-end per user data rate, and exploit unique features of millimeter wave deployments to y… ▽ More

    Submitted 19 November, 2018; v1 submitted 2 May, 2018; originally announced May 2018.

    Comments: under review, major revision, submitted to IEEE Trans. Wireless Commun

  40. arXiv:1804.05671  [pdf, other

    cs.PF

    Pliant: Leveraging Approximation to Improve Datacenter Resource Efficiency

    Authors: Neeraj Kulkarni, Feng Qi, Christina Delimitrou

    Abstract: Cloud multi-tenancy is typically constrained to a single interactive service colocated with one or more batch, low-priority services, whose performance can be sacrificed when deemed necessary. Approximate computing applications offer the opportunity to enable tighter colocation among multiple applications whose performance is important. We present Pliant, a lightweight cloud runtime that leverages… ▽ More

    Submitted 12 April, 2018; originally announced April 2018.

    Comments: 15 pages, 10 figures

  41. arXiv:1710.07369  [pdf, other

    cs.IT

    Correction Factor for Analysis of MIMO Wireless Networks With Highly Directional Beamforming

    Authors: Mandar N. Kulkarni, Eugene Visotsky, Jeffrey G. Andrews

    Abstract: In this letter, we reconsider a popular simplified received signal power model with single stream beamforming employed by the transmitter and the receiver in the regime when the beams have high gain and narrow beamwidth. We define the correction factor as the ratio of the average actual received signal power divided by the average received signal power using the popular simplified model. We analyt… ▽ More

    Submitted 31 January, 2018; v1 submitted 19 October, 2017; originally announced October 2017.

    Comments: This work has been submitted to the IEEE Wireless Communication Letters for possible publication

  42. arXiv:1708.05515  [pdf, ps, other

    cs.CL

    Syllable-level Neural Language Model for Agglutinative Language

    Authors: Seunghak Yu, Nilesh Kulkarni, Haejun Lee, Jihie Kim

    Abstract: Language models for agglutinative languages have always been hindered in past due to myriad of agglutinations possible to any given word through various affixes. We propose a method to diminish the problem of out-of-vocabulary words by introducing an embedding derived from syllables and morphemes which leverages the agglutinative property. Our model outperforms character-level embedding in perplex… ▽ More

    Submitted 18 August, 2017; originally announced August 2017.

    Comments: Accepted at EMNLP 2017 workshop on Subword and Character level models in NLP (SCLeM)

  43. arXiv:1707.01662  [pdf, ps, other

    cs.CL

    An Embedded Deep Learning based Word Prediction

    Authors: Seunghak Yu, Nilesh Kulkarni, Haejun Lee, Jihie Kim

    Abstract: Recent developments in deep learning with application to language modeling have led to success in tasks of text processing, summarizing and machine translation. However, deploying huge language models for mobile device such as on-device keyboards poses computation as a bottle-neck due to their puny computation capacities. In this work we propose an embedded deep learning based word prediction meth… ▽ More

    Submitted 6 July, 2017; originally announced July 2017.

    Comments: 5 pages, 3 figures, EMNLP 2017 submitted

  44. arXiv:1705.05229  [pdf, other

    cs.SD cs.LG

    Modeling of the Latent Embedding of Music using Deep Neural Network

    Authors: Zhou Xing, Eddy Baik, Yan Jiao, Nilesh Kulkarni, Chris Li, Gautam Muralidhar, Marzieh Parandehgheibi, Erik Reed, Abhishek Singhal, Fei Xiao, Chris Pouliot

    Abstract: While both the data volume and heterogeneity of the digital music content is huge, it has become increasingly important and convenient to build a recommendation or search system to facilitate surfacing these content to the user or consumer community. Most of the recommendation models fall into two primary species, collaborative filtering based and content based approaches. Variants of instantiatio… ▽ More

    Submitted 11 May, 2017; originally announced May 2017.

  45. Performance of Dynamic and Static TDD in Self-backhauled mmWave Cellular Networks

    Authors: Mandar N. Kulkarni, Jeffrey G. Andrews, Amitava Ghosh

    Abstract: Initial deployments of millimeter wave (mmWave) cellular networks are likely to be enabled with self-backhauling. In this work, we propose a random spatial model to analyze uplink (UL) and downlink (DL) SINR distribution and mean rates corresponding to different access-backhaul and UL-DL resource allocation schemes in a self-backhauled mmWave cellular network with Poisson point process (PPP) deplo… ▽ More

    Submitted 26 October, 2017; v1 submitted 24 January, 2017; originally announced January 2017.

    Comments: appeared in IEEE Transactions on Wireless Communications. Corrected some typos compared to previous ArXiv version

    Journal ref: IEEE Transactions on Wireless Communications, vol. 16, no. 10, pp. 6460-6478, Oct. 2017

  46. arXiv:1610.06009  [pdf

    cs.AI

    Constrained Cohort Intelligence using Static and Dynamic Penalty Function Approach for Mechanical Components Design

    Authors: Omkar Kulkarni, Ninad Kulkarni, Anand J Kulkarni, Ganesh Kakandikar

    Abstract: Most of the metaheuristics can efficiently solve unconstrained problems; however, their performance may degenerate if the constraints are involved. This paper proposes two constraint handling approaches for an emerging metaheuristic of Cohort Intelligence (CI). More specifically CI with static penalty function approach (SCI) and CI with dynamic penalty function approach (DCI) are proposed. The app… ▽ More

    Submitted 26 September, 2016; originally announced October 2016.

  47. arXiv:1603.07371  [pdf, other

    cs.DS

    Efficient Enumeration of Unidirectional Cuts for Technology Mapping of Boolean Networks

    Authors: Niranjan Kulkarni, Sarma Vrudhula

    Abstract: In technology mapping, enumeration of subcircuits or cuts to be replaced by a standard cell is an important step that decides both the quality of the solution and execution speed. In this work, we view cuts as set of edges instead of as set of nodes and based on it, provide a classification of cuts. It is shown that if enumeration is restricted to a subclass of cuts called unidirectional cuts, the… ▽ More

    Submitted 23 March, 2016; originally announced March 2016.

  48. arXiv:1603.07370  [pdf, other

    cs.CR cs.ET

    Digital IP Protection Using Threshold Voltage Control

    Authors: Joseph Davis, Niranjan Kulkarni, Jinghua Yang, Aykut Dengi, Sarma Vrudhula

    Abstract: This paper proposes a method to completely hide the functionality of a digital standard cell. This is accomplished by a differential threshold logic gate (TLG). A TLG with $n$ inputs implements a subset of Boolean functions of $n$ variables that are linear threshold functions. The output of such a gate is one if and only if an integer weighted linear arithmetic sum of the inputs equals or exceeds… ▽ More

    Submitted 23 March, 2016; originally announced March 2016.

  49. Downlink and Uplink Cell Association with Traditional Macrocells and Millimeter Wave Small Cells

    Authors: Hisham Elshaer, Mandar N. Kulkarni, Federico Boccardi, Jeffrey G. Andrews, Mischa Dohler

    Abstract: Millimeter wave (mmWave) links will offer high capacity but are poor at penetrating into or diffracting around solid objects. Thus, we consider a hybrid cellular network with traditional sub 6 GHz macrocells coexisting with denser mmWave small cells, where a mobile user can connect to either opportunistically. We develop a general analytical model to characterize and derive the uplink and downlink… ▽ More

    Submitted 20 January, 2016; originally announced January 2016.

    Comments: 30 pages, 9 figures. Submitted to IEEE Transactions on Wireless Communications

  50. arXiv:1601.02076  [pdf

    cs.MM

    An Enhanced Edge Adaptive Steganography Approach Using Threshold Value for Region Selection

    Authors: Sachin Mungmode, R. R. Sedamkar, Niranjan Kulkarni

    Abstract: This paper attempts to improve the quality and the modification rate of a Stego Image. The input image provided for estimating the quality of an image and the modified rate is a bitmap image. The threshold value is used as a parameter for selecting the high frequency pixels from the Cover Image. The data embedding process are performed on the pixels that are found with the help of Threshold value… ▽ More

    Submitted 8 January, 2016; originally announced January 2016.