Results for "Animesh Mukherjee"

total 2391took 0.12s
A Network-centric Framework for Auditing Recommendation SystemsFeb 07 2019Feb 11 2019To improve the experience of consumers, all social media, commerce and entertainment sites deploy Recommendation Systems (RSs) that aim to help users locate interesting content. These RSs are black-boxes - the way a chunk of information is filtered out ... More
Aging in language dynamicsJan 14 2011Human languages evolve continuously, and a puzzling problem is how to reconcile the apparent robustness of most of the deep linguistic structures we use with the evidence that they undergo possibly slow, yet ceaseless, changes. Is the state in which we ... More
Perturbations on K-fusion framesMar 27 2018K-fusion frames are generalizations of fusion frames in frame theory. This article characterizes various kinds of property of K-fusion frames. Several perturbation results on K-fusion frames are formulated and analyzed.
Characterizations of finite woven framesSep 25 2018In this article we provide methods of constructing finite woven frames. Several examples are discussed. We also introduce the notion of woven frame sequences and characterize them through the concepts of gaps and angles between spaces.
Characterizations of woven framesSep 25 2018May 08 2019In a separable Hilbert space $\mathcal H$, two frames $\{f_i\}_{i \in I}$ and $\{g_i\}_{i \in I}$ are said to be woven if there are constants $0<A \leq B$ so that for every $\sigma \subset I$, $\{f_i\}_{i \in \sigma} \cup \{g_i\}_{i \in \sigma ^c}$ forms ... More
Atomic subspaces for operatorsMay 17 2017Feb 23 2018This paper introduces the concept of atomic subspaces with respect to a bounded linear operator. Atomic subspaces generalize fusion frames and this generalization leads to the notion of $K$-fusion frames. Characterizations of $K$-fusion frames are discussed. ... More
On the Compositionality Prediction of Noun Phrases using Poincaré EmbeddingsJun 07 2019The compositionality degree of multiword expressions indicates to what extent the meaning of a phrase can be derived from the meaning of its constituents and their grammatical relations. Prediction of (non)-compositionality is a task that has been frequently ... More
A Condition for the Nullity of Quantum DiscordMar 27 2010Jun 19 2011The positivity of quantum discord is shown to be equivalent to the strong subadditivity of von-Neumann entropy. This leads us to a necessary and sufficient condition characterizing the set of states with zero quantum discord. This also gives us a mathematical ... More
Bandlimited Spatial Field Sampling with Mobile Sensors in the Absence of Location InformationSep 14 2015Jan 24 2016Sampling of physical fields with mobile sensor is an emerging area. In this context, this work introduces and proposes solutions to a fundamental question: can a spatial field be estimated from samples taken at unknown sampling locations? Unknown sampling ... More
Detecting Reliable Novel Word Senses: A Network-Centric ApproachDec 14 2018In this era of Big Data, due to expeditious exchange of information on the web, words are being used to denote newer meanings, causing linguistic shift. With the recent availability of large amounts of digitized texts, an automated analysis of the evolution ... More
Understanding how both the partitions of a bipartite network affect its one-mode projectionMay 19 2011It is a well-known fact that the degree distribution (DD) of the nodes in a partition of a bipartite network influences the DD of its one-mode projection on that partition. However, there are no studies exploring the effect of the DD of the other partition ... More
Syntax is from Mars while Semantics from Venus! Insights from Spectral Analysis of Distributional Similarity NetworksJun 08 2009We study the global topology of the syntactic and semantic distributional similarity networks for English through the technique of spectral analysis. We observe that while the syntactic network has a hierarchical structure with strong communities and ... More
Idea of a new Personality-Type based Recommendation EngineNov 08 2013Myers-Briggs Type Indicator (MBTI) types depict the psychological preferences by which a person perceives the world and make decisions. There are 4 principal functions through which the people see the world: sensation, intuition, feeling, and thinking. ... More
Time series analysis of temporal networksDec 04 2015An important feature of all real-world networks is that the network structure changes over time. Due to this dynamic nature, it becomes difficult to propose suitable growth models that can explain the various important characteristic properties of these ... More
A Network-centric Framework for Auditing Recommendation SystemsFeb 07 2019To improve the experience of consumers, all social media, commerce and entertainment sites deploy Recommendation Systems (RSs) that aim to help users locate interesting content. These RSs are black-boxes - the way a chunk of information is filtered out ... More
On Rich Clubs of Path-Based Centralities in NetworksAug 08 2018Many scale-free networks exhibit a rich club structure, where high degree vertices form tightly interconnected subgraphs. In this paper, we explore the emergence of rich clubs in the context of shortest path based centrality metrics. We term these subgraphs ... More
Discovering Global Patterns in Linguistic Networks through Spectral Analysis: A Case Study of the Consonant InventoriesJan 15 2009Recent research has shown that language and the socio-cognitive phenomena associated with it can be aptly modeled and visualized through networks of linguistic entities. However, most of the existing works on linguistic networks focus only on the local ... More
Analyzing Social Book Reading Behavior on Goodreads and how it predicts Amazon Best SellersSep 19 2018A book's success/popularity depends on various parameters - extrinsic and intrinsic. In this paper, we study how the book reading characteristics might influence the popularity of a book. Towards this objective, we perform a cross-platform study of Goodreads ... More
#Bieber + #Blast = #BieberBlast: Early Prediction of Popular Hashtag CompoundsOct 01 2015Compounding of natural language units is a very common phenomena. In this paper, we show, for the first time, that Twitter hashtags which, could be considered as correlates of such linguistic units, undergo compounding. We identify reasons for this compounding ... More
"Woman-Metal-White vs Man-Dress-Shorts": Combining Social, Temporal and Image Signals to Understand Popularity of Pinterest Fashion BoardsDec 19 2018Pinterest is a popular photo sharing website. Fashion is one the most popular and content generating category on this platform. Most of the popular fashion brands and designers use boards on Pinterest for showcasing their products. However, the characteristics ... More
Coverage analysis of information dissemination in throwbox-augmented DTNApr 19 2016This paper uses a bipartite network model to calculate the coverage achieved by a delay-tolerant information dissemination algorithm in a specialized setting. The specialized Delay Tolerant Network (DTN) system comprises static message buffers or throwboxes ... More
Information sharing and sorting in a communityJun 04 2013We present the results of detailed numerical study of a model for the sharing and sorting of informations in a community consisting of a large number of agents. The information gathering takes place in a sequence of mutual bipartite interactions where ... More
Analyzing the Degree Distribution of the One-mode Projection of an Alphabetic Bipartite Network (α-BIN)Feb 04 2009Dec 20 2010The paper is being withdrawn since the authors felt that the submission is a little premature after a careful reading by some of the experts in this field.
Why Did They #Unfollow Me? Early Detection of Follower Loss on TwitterFeb 14 2018Having more followers has become a norm in recent social media and micro-blogging communities. This battle has been taking shape from the early days of Twitter. Despite this strong competition for followers, many Twitter users are continuously losing ... More
Language Use Matters: Analysis of the Linguistic Structure of Question Texts Can Characterize Answerability in QuoraMar 11 2017Quora is one of the most popular community Q&A sites of recent times. However, many question posts on this Q&A site often do not get answered. In this paper, we quantify various linguistic activities that discriminates an answered question from an unanswered ... More
Entanglement in non-equilibrium steady states and many-body localization breakdown through dissipative tunnelingApr 08 2019We model an electric-field or current driven interacting disorder system, coupled to environment at the boundaries, through an effective non-Hermitian Hamiltonian and study the entanglement properties of its eigenstates. In particular, we investigate ... More
Metrics for Community Analysis: A SurveyApr 12 2016Detecting and analyzing dense groups or communities from social and information networks has attracted immense attention over last one decade due to its enormous applicability in different domains. Community detection is an ill-defined problem, as the ... More
Hateminers : Detecting Hate speech against WomenDec 17 2018With the online proliferation of hate speech, there is an urgent need for systems that can detect such harmful content. In this paper, We present the machine learning models developed for the Automatic Misogyny Identification (AMI) shared task at EVALITA ... More
Sensitivity and Reliability in Incomplete Networks: Centrality Metrics to Community Scoring FunctionsAug 18 2016Aug 24 2016Network analysis is an important tool in understanding the behavior of complex systems of interacting entities. However, due to the limitations of data gathering technologies, some interactions might be missing from the network model. This is a ubiquitous ... More
GenPerm: A Unified Method for Detecting Non-overlapping and Overlapping CommunitiesApr 12 2016Detection of non-overlapping and overlapping communities are essentially the same problem. However, current algorithms focus either on finding overlapping or non-overlapping communities. We present a generalized framework that can identify both non-overlapping ... More
How Difficult is it to Develop a Perfect Spell-checker? A Cross-linguistic Analysis through Complex Network ApproachMar 21 2007The difficulties involved in spelling error detection and correction in a language have been investigated in this work through the conceptualization of SpellNet - the weighted network of words, where edges indicate orthographic proximity between two words. ... More
Emergence of a non-scaling degree distribution in bipartite networks: a numerical and analytical studyMar 23 2007We study the growth of bipartite networks in which the number of nodes in one of the partitions is kept fixed while the other partition is allowed to grow. We study random and preferential attachment as well as combination of both. We derive the exact ... More
A fast no-rejection algorithm for the Category GameDec 16 2010The Category Game is a multi-agent model that accounts for the emergence of shared categorization patterns in a population of interacting individuals. In the framework of the model, linguistic categories appear as long lived consensus states that are ... More
Optimal Quantization of TV White Space Regions for a Broadcast Based Geolocation DatabaseMay 08 2015In the current paradigm, TV white space databases communicate the available channels over a reliable Internet connection to the secondary devices. For places where an Internet connection is not available, such as in developing countries, a broadcast based ... More
Estimation of Bandlimited Grayscale Images From the Single Bit Observations of Pixels Affected by Additive Gaussian NoiseOct 27 2016The estimation of grayscale images using their single-bit zero mean Gaussian noise-affected pixels is presented in this paper. The images are assumed to be bandlimited in the Fourier Cosine transform (FCT) domain. The images are oversampled over their ... More
Analyzing the hate and counter speech accounts on TwitterDec 06 2018The online hate speech is proliferating with several organization and countries implementing laws to ban such harmful speech. While these restrictions might reduce the amount of such hateful content, it does so by restricting freedom of speech. Thus, ... More
An Approach for Message Hiding using Substitution Techniques and Audio Hiding in SteganographySep 22 2011A crypto system can be used to encrypt messages sent between two communicating parties so that an eavesdropper who overhears the encrypted messages will not be able to decode them. The paper mainly concentrates on the method in which the substitution ... More
Rediscovering the Co-occurrence Principles of Vowel Inventories: A Complex Network ApproachFeb 06 2007Feb 07 2007In this work, we attempt to capture patterns of co-occurrence across vowel systems and at the same time figure out the nature of the force leading to the emergence of such patterns. For this purpose we define a weighted network where the vowels are the ... More
Self-organization of the Sound Inventories: Analysis and Synthesis of the Occurrence and Co-occurrence Networks of ConsonantsOct 17 2006Sep 18 2007The sound inventories of the world's languages self-organize themselves giving rise to similar cross-linguistic patterns. In this work we attempt to capture this phenomenon of self-organization, which shapes the structure of the consonant inventories, ... More
Analysis and Synthesis of the Distribution of Consonants over Languages: A Complex Network ApproachJun 15 2006Cross-linguistic similarities are reflected by the speech sound systems of languages all over the world. In this work we try to model such similarities observed in the consonant inventories, through a complex bipartite network. We present a systematic ... More
Relay-Linking Models for Prominence and Obsolescence in Evolving NetworksSep 27 2016The rate at which nodes in evolving social networks acquire links (friends, citations) shows complex temporal dynamics. Elegant and simple models, such as preferential attachment and link copying, model only rich-gets-richer effects, not aging and decline. ... More
Anomalies in the peer-review system: A case study of the journal of High Energy PhysicsAug 17 2016Peer-review system has long been relied upon for bringing quality research to the notice of the scientific community and also preventing flawed research from entering into the literature. The need for the peer-review system has often been debated as in ... More
On the Formation of Circles in Co-authorship NetworksMay 18 2015The availability of an overwhelmingly large amount of bibliographic information including citation and co-authorship data makes it imperative to have a systematic approach that will enable an author to organize her own personal academic network profitably. ... More
Spread of hate speech in online social mediaDec 04 2018The present online social media platform is afflicted with several issues, with hate speech being on the predominant forefront. The prevalence of online hate speech has fueled horrific real-world hate-crime such as the mass-genocide of Rohingya Muslims, ... More
On the categorization of scientific citation profiles in computer sciencesMar 21 2015A common consensus in the literature is that the citation profile of published articles in general follows a universal pattern - an initial growth in the number of citations within the first two to three years after publication followed by a steady peak ... More
On the Permanence of Vertices in Network CommunitiesJun 10 2014Despite the prevalence of community detection algorithms, relatively less work has been done on understanding whether a network is indeed modular and how resilient the community structure is under perturbations. To address this issue, we propose a new ... More
WikiRef: Wikilinks as a route to recommending appropriate references for scientific Wikipedia pagesJun 11 2018Jun 15 2018The exponential increase in the usage of Wikipedia as a key source of scientific knowledge among the researchers is making it absolutely necessary to metamorphose this knowledge repository into an integral and self-contained source of information for ... More
WikiM: Metapaths based Wikification of Scientific AbstractsMay 09 2017In order to disseminate the exponential extent of knowledge being produced in the form of scientific publications, it would be best to design mechanisms that connect it with already existing rich repository of concepts -- the Wikipedia. Not only does ... More
AppTechMiner: Mining Applications and Techniques from Scientific ArticlesSep 10 2017Nov 10 2017This paper presents AppTechMiner, a rule-based information extraction framework that automatically constructs a knowledge base of all application areas and problem solving techniques. Techniques include tools, methods, datasets or evaluation metrics. ... More
Which techniques does your application use?: An information extraction framework for scientific articlesAug 23 2016Every field of research consists of multiple application areas with various techniques routinely used to solve problems in these wide range of application areas. With the exponential growth in research volumes, it has become difficult to keep track of ... More
Opinion Conflicts: An Effective Route to Detect Incivility in TwitterSep 02 2018In Twitter, there is a rising trend in abusive behavior which often leads to incivility. This trend is affecting users mentally and as a result they tend to leave Twitter and other such social networking sites thus depleting the active user base. In this ... More
Out of vocabulary words decrease, running texts prevail and hashtags coalesce: Twitter as an evolving sociolinguistic systemSep 17 2015Twitter is one of the most popular social media. Due to the ease of availability of data, Twitter is used significantly for research purposes. Twitter is known to evolve in many aspects from what it was at its birth; nevertheless, how it evolved its own ... More
Opinion formation in time-varying social networks: The case of Naming GameApr 05 2012We study the dynamics of the Naming Game as an opinion formation model on time-varying social networks. This agent-based model captures the essential features of the agreement dynamics by means of a memory-based negotiation process. Our study focuses ... More
Influence of Reviewer Interaction Network on Long-term Citations: A Case Study of the Scientific Peer-Review System of the Journal of High Energy PhysicsMay 02 2017A `peer-review system' in the context of judging research contributions, is one of the prime steps undertaken to ensure the quality of the submissions received, a significant portion of the publishing budget is spent towards successful completion of the ... More
Relay-Linking Models for Prominence and Obsolescence in Evolving NetworksSep 27 2016Sep 06 2017The rate at which nodes in evolving social networks acquire links (friends, citations) shows complex temporal dynamics. Preferential attachment and link copying models, while enabling elegant analysis, only capture rich-gets-richer effects, not aging ... More
Permanence and Community Structure in Complex NetworksJun 05 2016The goal of community detection algorithms is to identify densely-connected units within large networks. An implicit assumption is that all the constituent nodes belong equally to their associated community. However, some nodes are more important in the ... More
Modeling the Structure and Dynamics of the Consonant Inventories: A Complex Network ApproachJun 05 2008Jun 21 2008We study the self-organization of the consonant inventories through a complex network approach. We observe that the distribution of occurrence as well as cooccurrence of the consonants across languages follow a power-law behavior. The co-occurrence network ... More
Is this conference a top-tier? ConfAssist: An assistive conflict resolution framework for conference categorizationAug 03 2016Classifying publication venues into top-tier or non top-tier is quite subjective and can be debatable at times. In this paper, we propose ConfAssist, a novel assisting framework for conference categorization that aims to address the limitations in the ... More
Sic Transit Gloria Manuscriptum: Two Views of the Aggregate Fate of Ancient PapersNov 26 2015Dec 01 2015When PageRank began to be used for ranking in Web search, a concern soon arose that older pages have an inherent --- and potentially unfair --- advantage over emerging pages of high quality, because they have had more time to acquire hyperlink citations. ... More
Using Core-Periphery Structure to Predict High Centrality Nodes in Time-Varying NetworksJun 20 2018Vertices with high betweenness and closeness centrality represent influential entities in a network. An important problem for time varying networks is to know a-priori, using minimal computation, whether the influential vertices of the current time step ... More
Understanding Stability of Noisy Networks through Centrality Measures and Local ConnectionsSep 17 2016Networks created from real-world data contain some inaccuracies or noise, manifested as small changes in the network structure. An important question is whether these small changes can significantly affect the analysis results. In this paper, we study ... More
Constant Communities in Complex NetworksFeb 23 2013Identifying community structure is a fundamental problem in network analysis. Most community detection algorithms are based on optimizing a combinatorial parameter, for example modularity. This optimization is generally NP-hard, thus merely changing the ... More
Modeling the Co-occurrence Principles of the Consonant Inventories: A Complex Network ApproachJun 15 2006Speech sounds of the languages all over the world show remarkable patterns of cooccurrence. In this work, we attempt to automatically capture the patterns of cooccurrence of the consonants across languages and at the same time figure out the nature of ... More
Opinion formation in time-varying social networks: The case of the naming gameApr 05 2012Sep 19 2018We study the dynamics of the naming game as an opinion formation model on time-varying social networks. This agent-based model captures the essential features of the agreement dynamics by means of a memory-based negotiation process. Our study focuses ... More
StRE: Self Attentive Edit Quality Prediction in WikipediaJun 11 2019Wikipedia can easily be justified as a behemoth, considering the sheer volume of content that is added or removed every minute to its several projects. This creates an immense scope, in the field of natural language processing towards developing automated ... More
Is this word borrowed? An automatic approach to quantify the likeliness of borrowing in social mediaMar 15 2017Code-mixing or code-switching are the effortless phenomena of natural switching between two or more languages in a single conversation. Use of a foreign word in a language; however, does not necessarily mean that the speaker is code-switching because ... More
A sufficient condition for uniqueness of weak solutions of the incompressible Euler systemJun 12 2019We give a new sufficient criteria to prove the uniqueness of the incompressible Euler equation in dimension $N\geq2$. In their celebrated works by V. Scheffer [18], A. Shnirelman [19], C. De Lellis and L. Sz\'ekelyhidi Jr. [7] they have obtained the nonuniqeness ... More
All that is English may be Hindi: Enhancing language identification through automatic ranking of likeliness of word borrowing in social mediaJul 25 2017Jul 29 2017In this paper, we present a set of computational methods to identify the likeliness of a word being borrowed, based on the signals from social media. In terms of Spearman correlation coefficient values, our methods perform more than two times better (nearly ... More
Estimation of Bandlimited Signals in Additive Gaussian Noise: a "Precision Indifference" PrincipleNov 28 2012The sampling, quantization, and estimation of a bounded dynamic-range bandlimited signal affected by additive independent Gaussian noise is studied in this work. For bandlimited signals, the distortion due to additive independent Gaussian noise can be ... More
Automated Early Leaderboard Generation From Comparative TablesFeb 13 2018Feb 20 2019A leaderboard is a tabular presentation of performance scores of the best competing techniques that address a specific scientific problem. Manually maintained leaderboards take time to emerge, which induces a latency in performance discovery and meaningful ... More
Language Diversity across the Consonant Inventories: A Study in the Framework of Complex NetworksApr 08 2009n this paper, we attempt to explain the emergence of the linguistic diversity that exists across the consonant inventories of some of the major language families of the world through a complex network based growth model. There is only a single parameter ... More
Deep Dive into Anonymity: A Large Scale Analysis of Quora QuestionsNov 17 2018Anonymity forms an integral and important part of our digital life. It enables us to express our true selves without the fear of judgment. In this paper, we investigate the different aspects of anonymity in the social Q&A site Quora. The choice of Quora ... More
A Large-scale Analysis of the Marketplace Characteristics in FiverrSep 20 2016Crowdsourcing platforms have become quite popular due to the increasing demand of human computation-based tasks. Though the crowdsourcing systems are primarily demand-driven like MTurk, supply-driven marketplaces are becoming increasingly popular. Fiverr ... More
Characterizing the spread of exaggerated news content over social mediaNov 19 2018In this paper, we consider a dataset comprising press releases about health research from different universities in the UK along with a corresponding set of news articles. First, we do an exploratory analysis to understand how the basic information published ... More
That's sick dude!: Automatic identification of word sense change across different timescalesMay 17 2014In this paper, we propose an unsupervised method to identify noun sense changes based on rigorous analysis of time-varying text data available in the form of millions of digitized books. We construct distributional thesauri based networks from data at ... More
Understanding Psycholinguistic Behavior of predominant drunk texters in Social MediaMay 28 2018In the last decade, social media has evolved as one of the leading platform to create, share, or exchange information; it is commonly used as a way for individuals to maintain social connections. In this online digital world, people use to post texts ... More
Precision metrology using weak measurementsOct 20 2013May 31 2015Weak values and measurements have been proposed as means to achieve dramatic enhancements in metrology based on the greatly increased range of possible measurement outcomes. Unfortunately, the very large values of measurement outcomes occur with highly ... More
Quantum leakage detection using a model-independent dimension witnessNov 13 2018Feb 19 2019Users of quantum computers must be able to confirm they are indeed functioning as intended, even when the devices are remotely accessed. In particular, if the Hilbert space dimension of the components are not as advertised -- for instance if the qubits ... More
Citation sentence reuse behavior of scientists: A case study on massive bibliographic text dataset of computer scienceMay 06 2017Our current knowledge of scholarly plagiarism is largely based on the similarity between full text research articles. In this paper, we propose an innovative and novel conceptualization of scholarly plagiarism in the form of reuse of explicit citation ... More
Understanding the Impact of Early Citers on Long-Term Scientific ImpactMay 09 2017This paper explores an interesting new dimension to the challenging problem of predicting long-term scientific impact (LTSI) usually measured by the number of citations accumulated by a paper in the long-term. It is well known that early citations (within ... More
Modeling Discrete Combinatorial Systems as Alphabetic Bipartite Networks: Theory and ApplicationsNov 04 2008Life and language are discrete combinatorial systems (DCSs) in which the basic building blocks are finite sets of elementary units: nucleotides or codons in a DNA sequence and letters or words in a language. Different combinations of these finite units ... More
Understanding Book Popularity on GoodreadsFeb 14 2018Goodreads has launched the Readers Choice Awards since 2009 where users are able to nominate/vote books of their choice, released in the given year. In this work, we question if the number of votes that a book would receive (aka the popularity of the ... More
Adapting predominant and novel sense discovery algorithms for identifying corpus-specific sense differencesFeb 01 2018Word senses are not static and may have temporal, spatial or corpus-specific scopes. Identifying such scopes might benefit the existing WSD systems largely. In this paper, while studying corpus specific word senses, we adapt three existing predominant ... More
CL Scholar: The ACL Anthology Knowledge Graph MinerApr 16 2018We present CL Scholar, the ACL Anthology knowledge graph miner to facilitate high-quality search and exploration of current research progress in the computational linguistics community. In contrast to previous works, periodically crawling, indexing and ... More
DeepTagRec: A Content-cum-User based Tag Recommendation Framework for Stack OverflowMar 10 2019In this paper, we develop a content-cum-user based deep learning framework DeepTagRec to recommend appropriate question tags on Stack Overflow. The proposed system learns the content representation from question title and body. Subsequently, the learnt ... More
WASSUP? LOL : Characterizing Out-of-Vocabulary Words in TwitterJan 31 2016Language in social media is mostly driven by new words and spellings that are constantly entering the lexicon thereby polluting it and resulting in high deviation from the formal written version. The primary entities of such language are the out-of-vocabulary ... More
High-resolution distributed sampling of bandlimited fields with low-precision sensorsJul 09 2007Dec 11 2008The problem of sampling a discrete-time sequence of spatially bandlimited fields with a bounded dynamic range, in a distributed, communication-constrained, processing environment is addressed. A central unit, having access to the data gathered by a dense ... More
Evaluating the Holevo Cramér-Rao bound for multi-parameter quantum metrologyJun 13 2019Only with the simultaneous estimation of multiple parameters are the quantum aspects of metrology fully revealed. This is due to the incompatibility of observables. The fundamental bound for multi-parameter quantum estimation is the Holevo Cram\'er-Rao ... More
Quantifying the Nonclassicality of OperationsJul 30 2012Feb 22 2013Deep insight can be gained into the nature of nonclassical correlations by studying the quantum operations that create them. Motivated by this we propose a measure of nonclassicality of a quantum operation utilizing the relative entropy to quantify its ... More
Klein Paradox in BosonsFeb 18 2003Apr 30 2003We show analytically that the {\it Zitterbewegung} and Klein Paradox, such well known aspects of the Dirac Equation are not found in the case of Bosons. We use the Kemmer-Duffin-Harish Chandra formalism with $\beta$ matrices to arrive at our results
Reducing resources for verification of quantum computationsSep 28 2017Aug 22 2018We present two verification protocols where the correctness of a "target" computation is checked by means of "trap" computations that can be efficiently simulated on a classical computer. Our protocols rely on a minimal set of noise-free operations (preparation ... More
Gibbs measures on mutually interacting Brownian paths under singularitiesOct 15 2015Apr 18 2016We are interested in the analysis of Gibbs measures defined on two independent Brownian paths in $\R^d$ interacting through a mutual self-attraction. This is expressed by the Hamiltonian $\int\int_{\R^{2d}} V(x-y) \mu(\d x)\nu(\d y)$ with two probability ... More
Ashes 2013 - A network theory analysis of Cricket strategiesAug 26 2013We demonstrate in this paper the use of tools of complex network theory to describe the strategy of Australia and England in the recently concluded Ashes 2013 Test series. Using partnership data made available by cricinfo during the Ashes 2013 Test series, ... More
Boundedness of spectral multipliers of generalized Laplacians on compact manifolds with boundaryOct 22 2014Jul 30 2015Consider a second order, strongly elliptic differential operator $L$ (maybe a system) on a compact Riemannian manifold $\overline{M}$ with smooth boundary, where $L$ is defined by coercive boundary conditions. The main result is the $L^\infty - \text{BMO}_L$ ... More
Quantum metrology to probe atomic parity violationJan 13 2009Oct 13 2010An entangled state prepared in the decoherence free sub-space together with a Ramsey type measurement can probe parity violation in heavy alkali ions like Ba+ or Ra+. Here we propose an experiment with Ba+ ions as an example to measure the small parity ... More
Charge dynamics of a molecular ion immersed in a Rydberg-dressed atomic lattice gasJan 18 2019Charge dynamics in an ultra-cold setup involving a laser dressed atom and an ion is studied here. This transfer of charge is enabled through molecular Rydberg states that are accessed via a laser. The character of the charge exchange crucially depends ... More
Soliton solutions of a gauged O(3) sigma model with interpolating potentialNov 02 1999Dec 13 2009Soliton modes in a gauged sigma model with interpolating potential have been investigated. Numerical solutions using a fourth order Runge -- Kutta method are discussed. By tuning the interpolation parameter the transition from symmetrybreaking to the ... More
Gap equation in scalar field theory at finite temperatureMay 23 1997Dec 24 1998We investigate the two-loop gap equation for the thermal mass of hot massless $g^2\phi^4$ theory and find that the gap equation itself has a non-zero finite imaginary part. This indicates that it is not possible to find the real thermal mass as a solution ... More
A Homology Theory For A Special Family Of Semi-groupsNov 17 2016In this paper, we construct a new homology theory for semi-groups satisfying the self distributivity axiom or the idempotency axiom. Next, we consider the geometric realization corresponding to the homology theory. We continue with the comparison of this ... More
A Fast Two Pass Multi-Value Segmentation Algorithm based on Connected Component AnalysisFeb 11 2014Connected component analysis (CCA) has been heavily used to label binary images and classify segments. However, it has not been well-exploited to segment multi-valued natural images. This work proposes a novel multi-value segmentation algorithm that utilizes ... More