no code implementations • 16 Jan 2025 • Rohit Singh, Anil Kumar Yerrapragada, Radha Krishna Ganti
One way to serve such applications is through backscatter devices, which communicate using energy harvested from ambient sources such as radio waves transmitted by a reader.
no code implementations • 3 Nov 2024 • Rohit Singh, Anil Kumar Yerrapragada, Radha Krishna Ganti
Random Access is a critical procedure using which a User Equipment (UE) identifies itself to a Base Station (BS).
no code implementations • 24 Feb 2024 • Rohit Singh, Roshan M. Bodile
This article provides a quick overview of quantum communication, bringing together several innovative aspects of quantum enabled transmission.
no code implementations • 12 Jan 2024 • Rohit Singh, Anil Kumar Yerrapragada, Jeeva Keshav S, Radha Krishna Ganti
The UE identifies itself by embedding a Preamble Index (RAPID) in the phase rotation of a known base sequence, which it transmits on the Physical Random Access Channel (PRACH).
no code implementations • 20 Oct 2022 • Alexander P. Wu, Thomas Markovich, Bonnie Berger, Nils Hammerla, Rohit Singh
Graph attention networks estimate the relational importance of node neighbors to aggregate relevant information over local neighborhoods for a prediction task.
1 code implementation • ICLR 2022 • Rohit Singh, Alexander P. Wu, Bonnie Berger
When a dynamical system can be modeled as a sequence of observations, Granger causality is a powerful approach for detecting predictive interactions between its variables.
no code implementations • 18 Feb 2021 • Yasasvi Hari, Rohit Singh, Kizito Nyuytiymbiy, David Butera
Devices connected to the Internet of Things (IoT) are rapidly becoming ubiquitous across modern homes, workplaces, and other social environments.
Cryptography and Security
no code implementations • 22 Sep 2020 • Rohit Singh, Doug Sicker
Using distributed device-to-device (D2D) communication in the THz, we can cater to these Ultra-dense Low Data Rate (UDLD) type applications.
no code implementations • 13 Nov 2019 • Rohit Singh, Douglas Sicker, Kazi Mohammed Saidul Huq
One solution is to maximize the user coverage for a single AP, which might be dependent on multiple parameters.
1 code implementation • 8 Mar 2019 • Lily Xu, Shahrzad Gholami, Sara Mc Carthy, Bistra Dilkina, Andrew Plumptre, Milind Tambe, Rohit Singh, Mustapha Nsubuga, Joshua Mabonga, Margaret Driciru, Fred Wanyama, Aggrey Rwetsiba, Tom Okello, Eric Enyel
We evaluate our approach on real-world historical poaching data from Murchison Falls and Queen Elizabeth National Parks in Uganda and, for the first time, Srepok Wildlife Sanctuary in Cambodia.
no code implementations • 17 Jan 2019 • Xinyu Hu, Paul Szerlip, Theofanis Karaletsos, Rohit Singh
A regression-based BNN model is proposed to predict spatiotemporal quantities like hourly rider demand with calibrated uncertainties.
no code implementations • 6 Nov 2018 • Yufei Wang, Zheyuan Ryan Shi, Lantao Yu, Yi Wu, Rohit Singh, Lucas Joppa, Fei Fang
Green Security Games (GSGs) have been proposed and applied to optimize patrols conducted by law enforcement agencies in green security domains such as combating poaching, illegal logging and overfishing.
1 code implementation • 18 Oct 2018 • Eli Bingham, Jonathan P. Chen, Martin Jankowiak, Fritz Obermeyer, Neeraj Pradhan, Theofanis Karaletsos, Rohit Singh, Paul Szerlip, Paul Horsfall, Noah D. Goodman
Pyro is a probabilistic programming language built on Python as a platform for developing advanced probabilistic models in AI research.
no code implementations • 5 May 2018 • Zheyuan Ryan Shi, Ziye Tang, Long Tran-Thanh, Rohit Singh, Fei Fang
We study Stackelberg Security Games where the defender, in addition to allocating defensive resources to protect targets from the attacker, can strategically manipulate the attacker's payoff under budget constraints in weighted L^p-norm form regarding the amount of change.