Entity

Time filter

Source Type


JayPrakash L.T.,IIIT Bangalore
2013 IEEE 1st International Workshop on Communicating Business Process and Software Models: Quality, Understandability, and Maintainability, CPSM 2013 | Year: 2013

We propose a technique for analysis of impact of design changes using dynamic slicing of UML models. For a software architecture specified using UML, we first transform a given model into a graph representation which we have named Model Dependency Graph (MDG). MDG combines information available in the interaction model along with the relevant information available in class model into an integrated model. For a given slicing criterion, our slicing algorithm traverses the constructed MDG to identify the relevant model elements forming the dynamic slice. We use these slices to identify the model changes, and their impact. Our impact analysis methodology is based on using the difference between the dynamic slices computed before and after changes are made to the model. Our methodology's novelty lies in performing impact analysis based on a graph metamodel as against independently processing separate UML models. © 2013 IEEE. Source


Choudhury A.,IIIT Bangalore | Patra A.,Indian Institute of Science | Smart N.P.,University of Bristol
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2014

We present a secure honest majority MPC protocol, against a static adversary, which aims to reduce the communication cost in the situation where there are a large number of parties and the number of adversarially controlled parties is relatively small. Our goal is to reduce the usage of point-to-point channels among the parties, thus enabling them to run multiple different protocol executions. Our protocol has highly efficient theoretical communication cost when compared with other protocols in the literature; specifically the circuit-dependent communication cost, for circuits of suitably large depth, is O(|ckt|κ7), for security parameter κ and circuit size |ckt|. Our protocol finds application in cloud computing scenario, where the fraction of corrupted parties is relatively small. By minimizing the usage of point-to-point channels, our protocol can enable a cloud service provider to run multiple MPC protocols. © Springer International Publishing Switzerland 2014. Source


Saxena A.,Indian Institute of Technology Kharagpur | Rao S.,IIIT Bangalore
International Journal of Reliability, Quality and Safety Engineering | Year: 2014

Degradation analysis is used to analyze the useful lifetimes of systems, their failure rates, and various other system parameters like mean time to failure (MTTF), mean time between failures (MTBF), and the system failure rate (SFR). In many systems, certain possible parallel paths of execution that have greater chances of success are preferred over others. Thus we introduce here the concept of probabilistic parallel choice. We use binary and n-ary probabilistic choice operators in describing the selections of parallel paths. These binary and n-ary probabilistic choice operators are considered so as to represent the complete system (described as a series-parallel system) in terms of the probabilities of selection of parallel paths and their relevant parameters. Our approach allows us to derive new and generalized formulae for system parameters like MTTF, MTBF, and SFR. We use a generalized exponential distribution, allowing distinct installation times for individual components, and use this model to derive expressions for such system parameters. © 2014 World Scientific Publishing Company. Source


Haloi M.,Indian Institute of Technology Guwahati | Jayagopi D.B.,IIIT Bangalore
IEEE Intelligent Vehicles Symposium, Proceedings | Year: 2015

In this work, we have developed a robust lane detection and departure warning technique. Our system is based on single camera sensor. For lane detection a modified Inverse Perspective Mapping using only a few extrinsic camera parameters and illuminant Invariant techniques is used. Lane markings are represented using a combination of 2nd and 4th order steerable filters, robust to shadowing. Effect of shadowing and extra sun light are removed using Lab color space, and illuminant invariant representation. Lanes are assumed to be cubic curves and fitted using robust RANSAC. This method can reliably detect lanes of the road and its boundary. This method has been experimented in Indian road conditions under different challenging situations and the result obtained were very good. For lane departure angle an optical flow based method were used. © 2015 IEEE. Source


Ganesan R.,Infosys | Sarkar S.,Infosys | Narayan A.,IIIT Bangalore
Proceedings - 2012 IEEE 5th International Conference on Cloud Computing, CLOUD 2012 | Year: 2012

Sharing of physical infrastructure using virtualization presents an opportunity to improve the overall resource utilization. It is extremely important for a Software as a Service (SaaS) provider to understand the characteristics of the business application workload in order to size and place the virtual machine (VM) containing the application. A typical business application has a multi-tier architecture and the application workload is often predictable. Using the knowledge of the application architecture and statistical analysis of the workload, one can obtain an appropriate capacity and a good placement strategy for the corresponding VM. In this paper we propose a tool iCirrus-WoP that determines VM capacity and VM collocation possibilities for a given set of application workloads. We perform an empirical analysis of the approach on a set of business application workloads obtained from geographically distributed data centers. The iCirrus-WoP tool determines the fixed reserved capacity and a shared capacity of a VM which it can share with another collocated VM. Based on the workload variation, the tool determines if the VM should be statically allocated or needs a dynamic placement. To determine the collocation possibility, iCirrus-WoP performs a peak utilization analysis of the workloads. The empirical analysis reveals the possibility of collocating applications running in different time-zones. The VM capacity that the tool recommends, show a possibility of improving the overall utilization of the infrastructure by more than 70% if they are appropriately collocated. © 2012 IEEE. Source

Discover hidden collaborations