Skip to main content

Showing 1–9 of 9 results for author: Kothapalli, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2108.04150  [pdf

    cs.DM

    Effect of stepwise adjustment of Damping factor upon PageRank

    Authors: Subhajit Sahu, Kishore Kothapalli, Dip Sankar Banerjee

    Abstract: The effect of adjusting damping factor α, from a small initial value α0 to the final desired αf value, upon then iterations needed for PageRank computation is observed. Adjustment of the damping factor is done in one or more steps. Results show no improvement in performance over a fixed damping factor based PageRank.

    Submitted 9 August, 2021; originally announced August 2021.

    Comments: 4 pages, 1 figure

    ACM Class: G.2.2

  2. arXiv:2108.02997  [pdf

    cs.DM

    Adjusting PageRank parameters and Comparing results

    Authors: Subhajit Sahu, Kishore Kothapalli, Dip Sankar Banerjee

    Abstract: The effect of adjusting damping factor α and tolerance τ on iterations needed for PageRank computation is studied here. Relative performance of PageRank computation with L1, L2, and L{\infty} norms used as convergence check, are also compared with six possible mean ratios. It is observed that increasing the damping factor α linearly increases the iterations needed almost exponentially. On the othe… ▽ More

    Submitted 6 August, 2021; originally announced August 2021.

    Comments: 13 pages, 10 figures, 2 tables

    ACM Class: G.2.2

  3. arXiv:2009.12477  [pdf, other

    cs.DC

    Sample-and-Gather: Fast Ruling Set Algorithms in the Low-Memory MPC Model

    Authors: Kishore Kothapalli, Shreyas Pai, Sriram V. Pemmaraju

    Abstract: Motivated by recent progress on symmetry breaking problems such as maximal independent set (MIS) and maximal matching in the low-memory Massively Parallel Computation (MPC) model (e.g., Behnezhad et al.~PODC 2019; Ghaffari-Uitto SODA 2019), we investigate the complexity of ruling set problems in this model. The MPC model has become very popular as a model for large-scale distributed computing and… ▽ More

    Submitted 25 September, 2020; originally announced September 2020.

  4. arXiv:2006.13486  [pdf, other

    cs.LG cs.DC stat.ML

    Ramanujan Bipartite Graph Products for Efficient Block Sparse Neural Networks

    Authors: Dharma Teja Vooturi, Girish Varma, Kishore Kothapalli

    Abstract: Sparse neural networks are shown to give accurate predictions competitive to denser versions, while also minimizing the number of arithmetic operations performed. However current hardware like GPU's can only exploit structured sparsity patterns for better efficiency. Hence the run time of a sparse neural network may not correspond to the arithmetic operations required. In this work, we propose R… ▽ More

    Submitted 2 July, 2020; v1 submitted 24 June, 2020; originally announced June 2020.

  5. arXiv:1307.5612  [pdf, other

    cs.CG

    Efficient Range Reporting of Convex Hull

    Authors: Jatin Agarwal, Nadeem Moidu, Kishore Kothapalli, Kannan Srinathan

    Abstract: We consider the problem of reporting convex hull points in an orthogonal range query in two dimensions. Formally, let $P$ be a set of $n$ points in $\mathbb{R}^{2}$. A point lies on the convex hull of a point set $S$ if it lies on the boundary of the minimum convex polygon formed by $S$. In this paper, we are interested in finding the points that lie on the boundary of the convex hull of the point… ▽ More

    Submitted 23 July, 2013; v1 submitted 22 July, 2013; originally announced July 2013.

    Comments: This work was previously submitted to IWOCA 2013 and was rejected. The work with better results will appear in proceedings of CCCG 2013

  6. arXiv:1303.2171  [pdf, ps, other

    cs.DC

    CPU and/or GPU: Revisiting the GPU Vs. CPU Myth

    Authors: Kishore Kothapalli, Dip Sankar Banerjee, P. J. Narayanan, Surinder Sood, Aman Kumar Bahl, Shashank Sharma, Shrenik Lad, Krishna Kumar Singh, Kiran Matam, Sivaramakrishna Bharadwaj, Rohit Nigam, Parikshit Sakurikar, Aditya Deshpande, Ishan Misra, Siddharth Choudhary, Shubham Gupta

    Abstract: Parallel computing using accelerators has gained widespread research attention in the past few years. In particular, using GPUs for general purpose computing has brought forth several success stories with respect to time taken, cost, power, and other metrics. However, accelerator based computing has signifi- cantly relegated the role of CPUs in computation. As CPUs evolve and also offer matching c… ▽ More

    Submitted 9 March, 2013; originally announced March 2013.

    Comments: 20 pages

  7. arXiv:1210.3735  [pdf, ps, other

    cs.DC cs.SI physics.soc-ph

    On the Analysis of a Label Propagation Algorithm for Community Detection

    Authors: Kishore Kothapalli, Sriram V. Pemmaraju, Vivek Sardeshmukh

    Abstract: This paper initiates formal analysis of a simple, distributed algorithm for community detection on networks. We analyze an algorithm that we call \textsc{Max-LPA}, both in terms of its convergence time and in terms of the "quality" of the communities detected. \textsc{Max-LPA} is an instance of a class of community detection algorithms called \textit{label propagation} algorithms. As far as we kno… ▽ More

    Submitted 13 October, 2012; originally announced October 2012.

    Comments: 17 pages. Submitted to ICDCN 2013

  8. arXiv:1207.3099  [pdf, ps, other

    cs.DC

    Super-Fast 3-Ruling Sets

    Authors: Kishore Kothapalli, Sriram Pemmaraju

    Abstract: A $t$-ruling set of a graph $G = (V, E)$ is a vertex-subset $S \subseteq V$ that is independent and satisfies the property that every vertex $v \in V$ is at a distance of at most $t$ from some vertex in $S$. A \textit{maximal independent set (MIS)} is a 1-ruling set. The problem of computing an MIS on a network is a fundamental problem in distributed algorithms and the fastest algorithm for this p… ▽ More

    Submitted 12 July, 2012; originally announced July 2012.

  9. arXiv:1003.5383  [pdf, other

    cs.CR cs.NI

    Automatic analysis of distance bounding protocols

    Authors: Sreekanth Malladi, Bezawada Bruhadeshwar, Kishore Kothapalli

    Abstract: Distance bounding protocols are used by nodes in wireless networks to calculate upper bounds on their distances to other nodes. However, dishonest nodes in the network can turn the calculations both illegitimate and inaccurate when they participate in protocol executions. It is important to analyze protocols for the possibility of such violations. Past efforts to analyze distance bounding protocol… ▽ More

    Submitted 28 March, 2010; originally announced March 2010.

    Comments: 22 pages, Appeared in Foundations of Computer Security, (Affiliated workshop of LICS 2009, Los Angeles, CA).

    Report number: FCS09